Sie sind auf Seite 1von 2

A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems IEEE Link http://ieeexplore.ieee.org/xpl/login.jsp?

tp=&arnumber=6473795&url=http%3A% !% !ieeexplore.ieee.org % !iel7% !7"% !435939#% !#6473795.p$%%3!arnumber%3&6473795

Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding uality of !ervice " o!# e$perienced by users. !uch analyses are not feasible by simulation or on-the-field e$perimentation, due to the great number of parameters that have to be investigated. %n this paper, we present an analytical model, based on !tochastic &eward 'ets "!&'s#, that is both scalable to model systems composed of thousands of resources and fle$ible to represent different policies and cloud-specific strategies. !everal performance metrics are defined and evaluated to analy(e the behavior of a Cloud data center) utili(ation, availability, waiting time, and responsiveness. * resiliency analysis is also provided to take into account load bursts. +inally, a general methodology is presented that, starting from the concept of system capacity, can help system managers to opportunely set the data center parameters under different working conditions.

Distance !ounding A Practical Security Solution for "eal #ime Location Systems IEEE LI$%&'http://ieeexplore.ieee.org/xpl/login.jsp?
tp=&arnumber=6 9(95(&url=http%3A% !% !ieeexplore.ieee.org % !iel5% !94 4% !63(7656% !#6 9(95(.p$%%3!arnumber%3&6 9(95(

,he need for implementing adequate security services in industrial applications is increasing. Verifying the physical pro$imity or location of a device has become an important security service in ad-hoc wireless environments. -istance-bounding is a prominent secure neighbor detection method that cryptographically determines an upper bound for the physical distance between two communicating parties based on the round-trip time of cryptographic challenge-response pairs. ,his paper gives a brief overview of distancebounding protocols and discusses the possibility of implementing such protocols within industrial &+%- and real-time location applications, which requires an emphasis on aspects such as reliability and real-time communication. ,he practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation are discussed.

Das könnte Ihnen auch gefallen