Cloud Applications: Less Guessing, more Planning and Knowing

Similar documents
GSM / UMTS

EEWC 2014 Enterprise Architecture at the Portuguese Government

Optimal Location of Natural Gas Sources in the Iberian System

Herbert Bruderer Swiss Federal Institute of Technology, Zurich

Herbert Bruderer. Swiss Federal Institute of Technology, Zurich

2012 Business Continuity Management for CRISIS. Network Infrastructure for BCM

Selective Java Code Transformation into AWS Lambda Functions

5G/NR Architecture Is it revolutionary or evolutionary?

NEVIS Smart Solutions against sophisticated attackers

6/5/ Michael Hojnicki Chief of Technology and Administrative Services

An EMUSIM Technique and its Components in Cloud Computing- A Review

Heuristic Model for Iberian Natural Gas Sources Location

PriDynSim: A Simulator for Dynamic Priority Based I/O Scheduling for Cloud Applications

RANtoCoreTM. Delivering the most realistic test environments

Lesson 14: Cloud Computing

CIS : Computational Reproducibility

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Learning outcomes. On successful completion of this unit you will: More detail on the wiki.

Data Governance for Smart City Management

History of Electronic Computers

3GPP Advances Towards Transport

Thomas Polzer Institut für Technische Informatik

A CUSTOMER S PERSPECTIVE ON MUNICIPAL IT-SERVICES

Computers in Engineering COMP 208. A Brief History. Mechanical Calculators. A Historic Perspective Michael A. Hawker

Computers in Engineering COMP 208

The New Net, Edge Computing, and Services. Michael R. Nelson, Ph.D. Tech Strategy, Cloudflare May 2018

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

CENTER FOR SECURITY STUDIES

HCI mit VMware vsan Radikal einfach und vollständig in die SDDC Strategie integriert

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

Smart Grid Network. A core component for FttH-Infrastructure in Constance. Roland Stader. Area Manager AAT & Telecommunications

DNA Microcode and Processor Modes. Alexandre David

Computer Networks 2012/2013. Introduction part 1 (01) Dr. Tanir Ozcelebi. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S.

VC 17/18 TP14 Pattern Recognition

Future of the Data Center

Deliver End-to-End Systems Management for Cisco Data Centers That Run Microsoft Applications

Computing Power at the push of a button: Dynamic Services for Infrastructure.

ENIAC - background. ENIAC - details. Structure of von Nuemann machine. von Neumann/Turing Computer Architecture

Chapter One. Computers in Context

CS Computer Architecture

A Review on Reliability Issues in Cloud Service

COMPUTER ARCHITECTURE

Hard Disk Storage Deflation Is There a Floor?

Services in the Virtualization Plane. Andrew Warfield Adjunct Professor, UBC Technical Director, Citrix Systems

Unisys SafeGuard Solutions

Zuse's Z3 Square Root Algorithm Talk given at Fall meeting of the Ohio Section of the MAA October College of Wooster (Revised 02/02/2009)

time step first instruction second instruction

Database data security through the lens of cryptographic engineering

IBM PC Controlled Keypunch. Stan Paddock Computer History Museum July 13, 2008

BASE Biofeedback Augmented Software Engineering

The Programmable World Opportunities and Challenges

How to succeed with data centre migration

Storage CloudSim A Simulation Environment for Cloud Object Storage Infrastructures

History of Modern Computing Lesson 1

Collaborations with University of Coimbra and Budapest University of Technology and Economics

Integrated & Robust Arctic Data Services

Can Europe Lead in 5G? Dr. Jan Krancke, VP Regulatory Strategy and Projects, Group Public & Regulatory Affairs Deutsche Telekom Brussels,

Building Data Centers With Vxlan Bgp Evpn A Cisco Nx Os Perspective Networking Technology

Workshop on Dependability Benchmarking. 39th Meeting of IFIP Working Group 10.4, Parati, Brazil, March 1-3, 2001

#BERLIN5GWEEK. Truths and myths about the new super-technology

An Operating System History of Operating Systems. Operating Systems. Autumn CS4023

InGenius Connector Enterprise 5.0. November Version

CITY MANAGER MEMORANDUM. The Honorable Mayor Partington and City Commissioners

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

API, DEVOPS & MICROSERVICES

Operating Systems Concepts. CMPUT 379, Winter 2014 Section B1

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Analysis of CPU Pinning and Storage Configuration in 100 Gbps Network Data Transfer

EnterpriseLink Benefits

Fundamental Concepts and History

VMware vsphere Clusters in Security Zones

COMMUNICATION NETWORKS. FOX615/612 TEGO1 IEC GOOSE Proxy Gateway interface module.

Fabric Connect Multicast A Technology Overview. Ed Koehler - Director DSE. Avaya Networking Solutions Group

The Road to Istio: How IBM, Google and Lyft Joined Forces to Simplify Microservices

DICE: a Model-Driven DevOps Framework for Big Data

Microsoft SQL Server HA and DR with DVX

Convergence & Standards in IT Infrastructure. 15 Minute Analysis (Nominal)

Privacy hacking & Data Theft

Seminar Course 392N Spring2012 EE392N. April 3, Dan O Neill Dimitry Gorinevsky

Capabilities & Offering for the Spanish Academic Community. Madrid, 28th November 2017

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

High Performance Computing Cloud - a PaaS Perspective

TRAINING AND CERTIFICATION UPDATE

vsan Security Zone Deployment First Published On: Last Updated On:

Japan s s Broadband Policy. Ministry of Public Management, Home Affairs, Posts and Telecommunications

Computer & Microprocessor Architecture HCA103

Optimizing Device, Packaging, Test: The Art of Fast Tracking a Design to Production

Securing intelligent networks: a guide for CISO and CIOs

City, University of London Institutional Repository

Huh? Lecture 01 Introduction to CSE You can learn about good routes to run if you!re visiting Chicago...

5 Fundamental Strategies for Building a Data-centered Data Center

Companion Guide to Practical Tools for Serverless Computing UCC 2017

Smart Meters between Innovation Promise and Consumer Benefit. Anne Kallies, RMIT and Lee Godden, Melbourne Law School

Reserves time on a paper sign-up sheet. Programmer runs his own program. Relays or vacuum tube hardware. Plug board or punch card input.

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Does the cloud require a new privacy framework? The European perspective. Thomas Fetzer

SCTE Event. Metro Network Alternatives 5/22/2013

Looking Beyond the Buzz of Edge Computing. Thomas M. Bohnert et alia OCD 2018, ZHAW Winterthur

Japan s Broadband Policy

Technology Insights for Leaders in State & Local

Transcription:

Cloud Applications: Less Guessing, more Planning and Knowing Josef Spillner <josef.spillner@zhaw.ch> Service Prototyping Lab (blog.zhaw.ch/icclab) 23.05.2016 Universidade de Coimbra Zürcher Fachhochschule

Cruise Ships History England 1842: P&O Postship with spare capacity in the Med Germany 1888: Augusta Victoria Liner in summer, cruiser in winter time [Klu01] 2

Winterthur Computer History Remington Rand (pre-unisys), Swiss daughter company Mithra [Bru11]: M9 (alias Z9), designed around 1953-1954 using Stibitz coding instead of regular BCD: easier handling of negatives users: Winterthur city administration(*), machine producer Rieter in Winterthur, Swissair, Zurich cantonal electricity provider, & many more business model: buy lease/rent (with time-based fee) (*) only one M9 left world-wide in Museum for Communication, Bern installed in 1961 for computing of bills for utilities using punch cards for input and output (no screen, no printer) 3

Winterthur Computer History The M9: Cases and relays [Bru11] 4

Bringing it all together... Capacity use: Augusta Victoria early virtualisation Business model: M9 e.g. in Winterthur early PAYG service model + scaling + on-demand provisioning - risks = cloud computing infrastructure perspective 5

... and predicting the future Fundamentals: resource services Compute governed by Moore's Law (for transistors) [CuYo16] Networking governed by Keck's Law (for optical fiber) [Hec16] Storage governed by Kryder's Law? (for magnetic disks; not quite) [Ros14] Services on top: not so straightforward - not just speed 6

Cloud Applications Perspective Initial onboarding 7

Cloud Applications Perspective Continuous operation and re-engineering 8

Planning and Knowing A-priori safeguarding: design for risks/threats... failure / unavailability unpredictable popularity leaks / surveillance dependency changes and issues A-posteriori knowledge monitoring event processing log file analysis incident detection 9

Novel Techniques Cloud-Native Applications Stealth Computing Active Service Management / Fault Injection 10

Technique: Cloud-Native Applications 11

Technique: Stealth Computing [Image sources: dreamstime.com, bitrebels.com, suitsofarmour.com] Stealth layer: Coverable cloud service evolution s: cloud services 12

Technique: Stealth Computing resource & service multiplexing local resources Compute resource service Storage resource service local resources Network resource service Network Network multiplexer/ multiplexer/ proxy interface File storage File storage service interface Stream storage Stream storage interface service Database Lambda service interface Event stream Event Database processing stream interface processing interf. stealth layer Application Application service (SaaS) 13

Technique: Stealth Computing 14

Technique: Active Service Management 15

Tools Existing tools for planning and knowing network simulators and emulators CloudSim [Buyya et al.] EMUSIM [Calheiros et al.] for performance Cloud Workflow Emulator [Senna et al.] for resources/performance 16

Tools MC-EMU: Multi-Cloud Emulation 4 targets: no-op (sim.) web/file server gatling (storage) OS container docker (compute) L4 proxy morebalance (network) 3 properties: availability netem slowness popularity tsung 3 behavioural models: convergence incident replay/library 17

Tools MC-EMU example: storage/availability/convergence 18

Tools MC-EMU example: compute/popularity/spikes (above) without failures (below) with induced failures in a CNA application 19

Service Prototyping Lab - Research this talk 20

Service Prototyping Lab - Events Open Cloud Day 15.06.2016 Winterthur Cloud Computing Summer School 4.-15.7.2016 Winterthur IEEE/ACM UCC 6.-9.12.2016 Shanghai 21

Conclusion Service Prototyping Lab + Cloud Computing Lab Viana do Castelo Vila Real Braga blog.zhaw.ch/icclab github.com/serviceprototypinglab Active Service Management research initiative enforce predictable application behaviour designs, methods and tools Bragança Porto Viseu Aveiro Guarda Coimbra ri Ob Castelo Branco o! ã d ga Leiria Santarém Portalegre Lisboa 2016 Évora Madeira Setubal Açores Beja Faro 2012 2009 2007 0 20 0 20 40km 40mi 2005 22

Sources [Bru11] Herbert Bruderer: Konrad Zuse und die Schweiz. Abschnitt: Rechenlocher M9 for die Schweizer Remington Rand. ETH Zürich, Departement. Informatik, Professur für Informationstechnologie und Ausbildung, Juli 2011. [Klu01] Arnold Kludas: Vergnügungsreisen zur See. Bd. 1: 1889-1939. Convent-Verlag Hamburg, ISBN 3-934613-21-7, S. 21-28, 2001. [Hec16] Jeff Hecht: Great Leaps of Light. IEEE Spectrum, 53(2):24-48, February 2016. [KuYo16] Michael A. Cusumano and David B. Yoffie: Technology Strategy and Management Extrapolating from Moore's Law. CACM 01/16, pp. 33-35. [Ros14] David Rosenthal: Talk at Seagate. DSHR's Blog, May 2014. (Analysis in The Register, November 2014.) (Rosenthal's discussion of Kryder's Law @ UNESCO) http://www.theregister.co.uk/2014/11/10/kryders_law_of_ever_cheaper_storage_disproven/?page=2 23