SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Stenio Fernandes, Eduardo Tavares, Marcelo Santos,
Victor Lira, Paulo Maciel
Federal University of Pernambuco (UFPE)
Center for Informatics
Recife, Brazil
Dependability Assessment of Virtualized
Networks
Outline
 Motivation, Problem Statement, and Proposal
 Related Work
 Technical Background
 Hierarchical Dependability Modeling and
Evaluation
 Dependability Assessment of VNs
 Contributions and Future Work
MOTIVATION, PROBLEM
STATEMENT, AND PROPOSAL
Motivation (1/3)
 Network Virtualization is a paradigm shift to allow
highly flexible networks deployment
 Virtual Networks (VN)
– have intrinsic dynamic aspects
 It allows operators to have on-demand negotiation of a
variety of services
 Important properties: concurrent use of the underlying
resources, along with router, host, and link isolation and
abstraction
– resources reuse is performed through appropriate
resource allocation and partitioning techniques
Motivation (2/3)
 Network Virtualization management strategies
– rely on dynamic resource allocation mechanisms for
deploying efficient high-performance VNs
 Goal: achieve efficient resource allocation of the physical
network infrastructure
– heuristic approaches due to its NP-hardness nature
– Efficient partitioning and allocation of network
resources is the fundamental issue to be tackled
PhysicalNetworks
Composed Network - Virtual
Motivation (3/3)
 However, from the point of view of the end-user
– a Service Provider or any entity that wants to build VN
to offer services
 there is still a missing point:
– What are the risks associated to a certain VN?
Problem statement
 Argument & hypotheses:
– risks are inherent to virtualized infrastructures since
the underlying physical network components are failure-
prone
 E.g., subject to hardware and software components
failures
– Understanding Network Failures in Data Centers:
Measurement, Analysis, and Implications, SIGCOMM 2011
– A first look at problems in the cloud. USENIX HotCloud 2010
– Risk is a crucial factor to the establishment of Service
Level Agreements (SLA) between NV engineering and
business players
Problem statement
 Risk evaluation and analysis, from assessment of
dependability attributes, can quantify and give
concrete measures to be used for network
management and control tasks
 Risk evaluation must be taken into account when
formulating an optimization problem for resource
allocation and provisioning of components at the
physical network
Proposal
 This paper proposes and evaluates a method to
estimate dependability attributes (risks) in virtual
network environments,
– It adopts an hierarchical methodology to mitigate the
complexity of representing large VNs
 Reliability Block Diagram (RBD)
 Stochastic Petri Nets (SPN)
 Assessment of dependability attributes could be
adopted as a critical factor for accurate SLA
contracts
RELATED WORK
Related Work
 Xia et al. tackle the problem of resource provisioning in
the context of routing in optical Wavelength-Division
Multiplexing (WDM) mesh networks
– Risk-Aware Provisioning scheme that elegantly minimizes the
probability of SLA violation
 "Risk-Aware Provisioning for Optical WDM Mesh Networks,"
Networking, IEEE/ACM Transactions on, June 2011
 Sun et al. proposes a cloud dependability model using
System-level Virtualization (CDSV), which adopts
quantitative metrics to evaluate the dependability
– They focus on cloud security and evaluate the impact of
dependability properties of the virtualized components at
system-level
 "A Dependability Model to Enhance Security of Cloud
Environment Using System-Level Virtualization Techniques,"
1st Conference on Pervasive on Computing Signal
Processing and Applications (PCSPA), 2010
Related Work
 Techniques for assessing dependability attributes
have been evaluated in virtual computing systems.
– SPN and Markov models have been adopted to assess them
in VMs and Oses.
 Koslovski et al. takes into account reliability only
support in virtual networks
– it has a general view on nodes and links at the physical
infrastructure
– it does not take into account the hierarchical nature of real
systems,
 Composed of virtual machines, disks, operating systems, etc.
– "Reliability Support in Virtual Infrastructures”, IEEE CloudCom
2010
Related Work
 In general
– Simplified views
 Specific to components, sub-systems, etc OR
 Consider only a direct mapping between the
physical infrastructure and a given VN
– little effort on research studies that provide
dependability measures for risk assessment
 They could be adopted as input for resource
allocation algorithms and provisioning techniques
TECHNICAL BACKGROUND
Technical Background
 Dependability of a system can be understood as
the ability to deliver a set of services that can be
justifiably trusted
– It is also related to fault tolerance, availability, and
reliability disciplines
 Dependability metrics can be calculated by
– Combinatorial Models
 Reliability Block Diagrams (RBD) and Fault Trees
– State-based stochastic models
 Markov chains and Stochastic Petri Nets (SPN)
Technical Background
 Some dependability metrics
– Availability (A) of a given device, component, or system
it is related to its uptime and downtime
 Time to Failure (TTF) or Time to Repair (TTR)
 Mean Time to Failure (MTTF) and Mean Time To Repair
(MTTR)
– Steady-state availability (A) may be represented by the
MTTF and MTTR, as:
Technical Background
 MTTF can be computed considering the system
reliability (R) as
 Exponential, Erlang, and Hyperexponential
distributions are commonly adopted for
representing TTFs and TTR
– i.e., adoption of semi-markovian solution methods
HIERARCHICAL DEPENDABILITY
MODELLING AND EVALUATION
Hierarchical Dependability modelling and
evaluation
Proposed methodology for dependability
evaluation of virtualized networks
Three
steps
System
specification
Subsystem
model
generation
System
model
construction
Hierarchical Dependability modelling and
evaluation
• information concerning the
dependences of VNs and
possible mutual impacts,
such as Common Mode
Failure (CMF)
• information related to the
TTF of each component or
sub-components and the
respective TTR
System
specification
Hierarchical Dependability modelling and
evaluation
• the system may be
represented either by one
model or split into smaller
models that comprise system
parts (i.e., subsystems).
• Such an approach mitigates
possible state space size
explosion for large and
detailed models
Subsystem
model
generation
Hierarchical Dependability modelling and
evaluation
• intermediate results are combined
into a higher level model using the
most suitable representation
• For instance, physical nodes are
initially represented by a RBD
model (using series composition)
and the obtained results are
adopted into a SPN model.
• Final model is then constructed by
using the metrics obtained in
previous activity and, lastly, such a
model is evaluated.
System
model
construction
Hierarchical Dependability modelling and
evaluation
 Proposed method provides the basis for
obtaining the dependability metrics and for
evaluating quantitative properties
 It utilizes Mercury/ASTRO environment for
modeling and evaluating dependability models
– Tools available to academics (under request)
DEPENDABILITY ASSESSMENT OF
VIRTUAL NETWORKS
Dependability Assessment of VNs
Evaluation Methodology
• Generation of several VNs requests that must be allocated
on the top of a common physical network
• For each new allocated VN, we assess dependability
metrics for each system and subsystem in the physical and
virtual network
• We assume that dependability metrics are known for
each component of the network, including their subsystems.
• Information from real measurements and data are
available in the literature
• Depending on the chosen model, dependability metrics
may change for each new VN allocation
Dependability Assessment of VNs
 Virtual Network Topology Generation (R-ViNE)
– the substrate network topologies are randomly generated
using the GT-ITM tool;
– Pairs of nodes are randomly attached with probability 0.5;
 500 VN requests during the simulation time (50,000
time units) in a network substrate with 50 nodes.
– VN requests follow a Poisson process with mean λ = 4
(average of 4 VNs per 100 time units);
– Each VN follows an exponential distribution for its lifetime
with λ = 1000 (i.e., an average of 1000 time units);
– For each request, the number of virtual nodes per VN
follows a uniform distribution in the interval [2, 10].
Dependability Assessment of VNs
 Case Study
 mapping algorithm proposed in [3]
– "Virtual Network Embedding with Coordinated Node and
Link Mapping”, IEEE INFOCOM 2009
– The algorithm provides VN allocations in an
infrastructure provider satisfying CPU, link, and other
constraints.
– It does not assume dependability issues, which may
impact the feasibility of a given allocated VN
 We applied the resource allocation algorithm to
evaluate the dependability features for each
allocated VN
Dependability Assessment of VNs
 Case study (cont.)
– demonstrate the estimation of point availability (i.e.,
availability at a time t) and reliability
– assuming independent allocations and common mode
failure (CMF)
 we assume that the components are connected via series
composition
– if a component fails, the virtualized network fails
Dependability Assessment of VNs
 Typical MTTFs and MTTRs
Node MTTF (h) MTTR (h)
CPU 2500000 1
Hard Disk 200000 1
Memory 480000 1
Network Interface Card 6200000 1
Operating Systems 1440 2
Virtual Machines (VM) 2880 2
VM Monitor 2880 2
Switch/Router 320000 1
Optical Link 19996 12
Dependability Assessment of VNs
 VN net0 has a lower availability level, when CMF is
assumed
 the algorithm could avoid overload in some links
and nodes with smaller MTTFs
Dependability Assessment of VNs
 Availability measures for the sampled VNs are very
similar
– In more complex environments, dispersion metrics can
vary significantly
Extensions to the resource allocation algorithm
 Mapping algorithm might have to take into account
one or more dependability measures
– To meet strict requirements
 For instance, a Service Provider can require an availability
of 0.95 and minimum reliability of 0.99 during the lifetime
of a certain VN.
 Allocation alternatives
– to minimize the impact on availability and reliability of
previously defined VNs
– to improve the dependability measures of a new VN
allocation
CONTRIBUTIONS AND FUTURE
WORK
Contributions and Future Work
 Contributions
– an approach for dependability modeling and evaluation
of virtual networks using a hybrid modeling technique
that considers representative combinatorial and state-
based models.
– The proposed approach provides a basis for estimating
dependability metrics, such as reliability and availability,
which we consider important for heuristics dealing with
resource allocation in VNs
Contributions and Future Work
 Future Work
– analysis of fault-tolerant techniques to improve
dependability levels
 when the ordinary components are not able to achieve the
required service level
– formulate an efficient optimization model in the way that
dependability metrics can be handled as range of values

Weitere ähnliche Inhalte

Was ist angesagt?

Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...The Air Force Office of Scientific Research
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNIRJET Journal
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...DETER-Project
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkKhushbooGupta145
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFOrahulmonikasharma
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocoleSAT Journals
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol surveyeSAT Publishing House
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networksIRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 

Was ist angesagt? (20)

Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFO
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
D035418024
D035418024D035418024
D035418024
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 

Ähnlich wie Dependability Assessment of Virtualized Networks

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALSEMSTUDENTPROJECTS
 
To minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloudTo minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloudArumugam Reddy
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALYEARSTUDENTPROJECT
 
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...YOU SHENG CHEN
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...chennaijp
 
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...Luigi Vanfretti
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
ID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptxID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptxDrSNAVANEETHAN
 
H03401049054
H03401049054H03401049054
H03401049054theijes
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceEricsson
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architectureIvano Malavolta
 
A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...Papitha Velumani
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...ieeepondy
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 

Ähnlich wie Dependability Assessment of Virtualized Networks (20)

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
To minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloudTo minimize energy consumption in virtualization based on a computing cloud
To minimize energy consumption in virtualization based on a computing cloud
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
 
B03410609
B03410609B03410609
B03410609
 
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...JPJ1403   A Stochastic Model To Investigate Data Center Performance And QoS I...
JPJ1403 A Stochastic Model To Investigate Data Center Performance And QoS I...
 
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
The RaPId Toolbox for Parameter Identification and Model Validation: How Mode...
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
ID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptxID725_Samuthirapandi_IoT_karuppu.pptx
ID725_Samuthirapandi_IoT_karuppu.pptx
 
H03401049054
H03401049054H03401049054
H03401049054
 
Conference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function PerformanceConference Paper: Cross-platform estimation of Network Function Performance
Conference Paper: Cross-platform estimation of Network Function Performance
 
[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture[2015/2016] Introduction to software architecture
[2015/2016] Introduction to software architecture
 
A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...A stochastic model to investigate data center performance and qos in iaas clo...
A stochastic model to investigate data center performance and qos in iaas clo...
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 

Mehr von Stenio Fernandes

The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networkingStenio Fernandes
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networkingStenio Fernandes
 
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...Stenio Fernandes
 
A brief history of streaming video in the Internet
A brief history of streaming video in the InternetA brief history of streaming video in the Internet
A brief history of streaming video in the InternetStenio Fernandes
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
 
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1Stenio Fernandes
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsStenio Fernandes
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 

Mehr von Stenio Fernandes (9)

The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
 
Data analytics in computer networking
Data analytics in computer networkingData analytics in computer networking
Data analytics in computer networking
 
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
SDN Dependability: Assessment, Techniques, and Tools - SDN Research Group - I...
 
A brief history of streaming video in the Internet
A brief history of streaming video in the InternetA brief history of streaming video in the Internet
A brief history of streaming video in the Internet
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
Orientações para a pós graduação - reunião semestral - orientandos - 2014.1
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
A referee's plea reviewed
A referee's plea reviewedA referee's plea reviewed
A referee's plea reviewed
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Dependability Assessment of Virtualized Networks

  • 1. Stenio Fernandes, Eduardo Tavares, Marcelo Santos, Victor Lira, Paulo Maciel Federal University of Pernambuco (UFPE) Center for Informatics Recife, Brazil Dependability Assessment of Virtualized Networks
  • 2. Outline  Motivation, Problem Statement, and Proposal  Related Work  Technical Background  Hierarchical Dependability Modeling and Evaluation  Dependability Assessment of VNs  Contributions and Future Work
  • 4. Motivation (1/3)  Network Virtualization is a paradigm shift to allow highly flexible networks deployment  Virtual Networks (VN) – have intrinsic dynamic aspects  It allows operators to have on-demand negotiation of a variety of services  Important properties: concurrent use of the underlying resources, along with router, host, and link isolation and abstraction – resources reuse is performed through appropriate resource allocation and partitioning techniques
  • 5. Motivation (2/3)  Network Virtualization management strategies – rely on dynamic resource allocation mechanisms for deploying efficient high-performance VNs  Goal: achieve efficient resource allocation of the physical network infrastructure – heuristic approaches due to its NP-hardness nature – Efficient partitioning and allocation of network resources is the fundamental issue to be tackled PhysicalNetworks Composed Network - Virtual
  • 6. Motivation (3/3)  However, from the point of view of the end-user – a Service Provider or any entity that wants to build VN to offer services  there is still a missing point: – What are the risks associated to a certain VN?
  • 7. Problem statement  Argument & hypotheses: – risks are inherent to virtualized infrastructures since the underlying physical network components are failure- prone  E.g., subject to hardware and software components failures – Understanding Network Failures in Data Centers: Measurement, Analysis, and Implications, SIGCOMM 2011 – A first look at problems in the cloud. USENIX HotCloud 2010 – Risk is a crucial factor to the establishment of Service Level Agreements (SLA) between NV engineering and business players
  • 8. Problem statement  Risk evaluation and analysis, from assessment of dependability attributes, can quantify and give concrete measures to be used for network management and control tasks  Risk evaluation must be taken into account when formulating an optimization problem for resource allocation and provisioning of components at the physical network
  • 9. Proposal  This paper proposes and evaluates a method to estimate dependability attributes (risks) in virtual network environments, – It adopts an hierarchical methodology to mitigate the complexity of representing large VNs  Reliability Block Diagram (RBD)  Stochastic Petri Nets (SPN)  Assessment of dependability attributes could be adopted as a critical factor for accurate SLA contracts
  • 11. Related Work  Xia et al. tackle the problem of resource provisioning in the context of routing in optical Wavelength-Division Multiplexing (WDM) mesh networks – Risk-Aware Provisioning scheme that elegantly minimizes the probability of SLA violation  "Risk-Aware Provisioning for Optical WDM Mesh Networks," Networking, IEEE/ACM Transactions on, June 2011  Sun et al. proposes a cloud dependability model using System-level Virtualization (CDSV), which adopts quantitative metrics to evaluate the dependability – They focus on cloud security and evaluate the impact of dependability properties of the virtualized components at system-level  "A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques," 1st Conference on Pervasive on Computing Signal Processing and Applications (PCSPA), 2010
  • 12. Related Work  Techniques for assessing dependability attributes have been evaluated in virtual computing systems. – SPN and Markov models have been adopted to assess them in VMs and Oses.  Koslovski et al. takes into account reliability only support in virtual networks – it has a general view on nodes and links at the physical infrastructure – it does not take into account the hierarchical nature of real systems,  Composed of virtual machines, disks, operating systems, etc. – "Reliability Support in Virtual Infrastructures”, IEEE CloudCom 2010
  • 13. Related Work  In general – Simplified views  Specific to components, sub-systems, etc OR  Consider only a direct mapping between the physical infrastructure and a given VN – little effort on research studies that provide dependability measures for risk assessment  They could be adopted as input for resource allocation algorithms and provisioning techniques
  • 15. Technical Background  Dependability of a system can be understood as the ability to deliver a set of services that can be justifiably trusted – It is also related to fault tolerance, availability, and reliability disciplines  Dependability metrics can be calculated by – Combinatorial Models  Reliability Block Diagrams (RBD) and Fault Trees – State-based stochastic models  Markov chains and Stochastic Petri Nets (SPN)
  • 16. Technical Background  Some dependability metrics – Availability (A) of a given device, component, or system it is related to its uptime and downtime  Time to Failure (TTF) or Time to Repair (TTR)  Mean Time to Failure (MTTF) and Mean Time To Repair (MTTR) – Steady-state availability (A) may be represented by the MTTF and MTTR, as:
  • 17. Technical Background  MTTF can be computed considering the system reliability (R) as  Exponential, Erlang, and Hyperexponential distributions are commonly adopted for representing TTFs and TTR – i.e., adoption of semi-markovian solution methods
  • 19. Hierarchical Dependability modelling and evaluation Proposed methodology for dependability evaluation of virtualized networks Three steps System specification Subsystem model generation System model construction
  • 20. Hierarchical Dependability modelling and evaluation • information concerning the dependences of VNs and possible mutual impacts, such as Common Mode Failure (CMF) • information related to the TTF of each component or sub-components and the respective TTR System specification
  • 21. Hierarchical Dependability modelling and evaluation • the system may be represented either by one model or split into smaller models that comprise system parts (i.e., subsystems). • Such an approach mitigates possible state space size explosion for large and detailed models Subsystem model generation
  • 22. Hierarchical Dependability modelling and evaluation • intermediate results are combined into a higher level model using the most suitable representation • For instance, physical nodes are initially represented by a RBD model (using series composition) and the obtained results are adopted into a SPN model. • Final model is then constructed by using the metrics obtained in previous activity and, lastly, such a model is evaluated. System model construction
  • 23. Hierarchical Dependability modelling and evaluation  Proposed method provides the basis for obtaining the dependability metrics and for evaluating quantitative properties  It utilizes Mercury/ASTRO environment for modeling and evaluating dependability models – Tools available to academics (under request)
  • 25. Dependability Assessment of VNs Evaluation Methodology • Generation of several VNs requests that must be allocated on the top of a common physical network • For each new allocated VN, we assess dependability metrics for each system and subsystem in the physical and virtual network • We assume that dependability metrics are known for each component of the network, including their subsystems. • Information from real measurements and data are available in the literature • Depending on the chosen model, dependability metrics may change for each new VN allocation
  • 26. Dependability Assessment of VNs  Virtual Network Topology Generation (R-ViNE) – the substrate network topologies are randomly generated using the GT-ITM tool; – Pairs of nodes are randomly attached with probability 0.5;  500 VN requests during the simulation time (50,000 time units) in a network substrate with 50 nodes. – VN requests follow a Poisson process with mean λ = 4 (average of 4 VNs per 100 time units); – Each VN follows an exponential distribution for its lifetime with λ = 1000 (i.e., an average of 1000 time units); – For each request, the number of virtual nodes per VN follows a uniform distribution in the interval [2, 10].
  • 27. Dependability Assessment of VNs  Case Study  mapping algorithm proposed in [3] – "Virtual Network Embedding with Coordinated Node and Link Mapping”, IEEE INFOCOM 2009 – The algorithm provides VN allocations in an infrastructure provider satisfying CPU, link, and other constraints. – It does not assume dependability issues, which may impact the feasibility of a given allocated VN  We applied the resource allocation algorithm to evaluate the dependability features for each allocated VN
  • 28. Dependability Assessment of VNs  Case study (cont.) – demonstrate the estimation of point availability (i.e., availability at a time t) and reliability – assuming independent allocations and common mode failure (CMF)  we assume that the components are connected via series composition – if a component fails, the virtualized network fails
  • 29. Dependability Assessment of VNs  Typical MTTFs and MTTRs Node MTTF (h) MTTR (h) CPU 2500000 1 Hard Disk 200000 1 Memory 480000 1 Network Interface Card 6200000 1 Operating Systems 1440 2 Virtual Machines (VM) 2880 2 VM Monitor 2880 2 Switch/Router 320000 1 Optical Link 19996 12
  • 30. Dependability Assessment of VNs  VN net0 has a lower availability level, when CMF is assumed  the algorithm could avoid overload in some links and nodes with smaller MTTFs
  • 31. Dependability Assessment of VNs  Availability measures for the sampled VNs are very similar – In more complex environments, dispersion metrics can vary significantly
  • 32. Extensions to the resource allocation algorithm  Mapping algorithm might have to take into account one or more dependability measures – To meet strict requirements  For instance, a Service Provider can require an availability of 0.95 and minimum reliability of 0.99 during the lifetime of a certain VN.  Allocation alternatives – to minimize the impact on availability and reliability of previously defined VNs – to improve the dependability measures of a new VN allocation
  • 34. Contributions and Future Work  Contributions – an approach for dependability modeling and evaluation of virtual networks using a hybrid modeling technique that considers representative combinatorial and state- based models. – The proposed approach provides a basis for estimating dependability metrics, such as reliability and availability, which we consider important for heuristics dealing with resource allocation in VNs
  • 35. Contributions and Future Work  Future Work – analysis of fault-tolerant techniques to improve dependability levels  when the ordinary components are not able to achieve the required service level – formulate an efficient optimization model in the way that dependability metrics can be handled as range of values

Hinweis der Redaktion

  1. I’m just gonna give a cople of definitions
  2. In such a case, the resource allocation algorithm must take into account the current deployed resources, their dependency with other VNs, and the dependability features. All those issues must be part of the constraints in the optimization problem. Results from the new extensions were not available to due to space restrictions