SlideShare a Scribd company logo
Managing Services in
Heterogeneous Environments
Adaptive Approaches Towards Non-Functional
Requirements Satisfaction
Monica Vitali - Politecnico di Milano
monica.vitali@polimi.it
Once Upon the Time...
Applications were designed as monoliths
● Pros: easy to manage, easy to monitor
● Cons: no scalability, no flexibility
http://ryanjbaxter.com/2015/07/15/using-microservices-to-build-cloud-native-applications-part-1/
From Monoliths to Microservices
Applications are decomposed in smaller specialised units
● Pros: high scalability, improved specialization
● Cons: complex management and monitoring
http://ryanjbaxter.com/2015/07/15/using-microservices-to-build-cloud-native-applications-part-1/
From Microservices to Functions
Applications are a composition of specialised functions. Execution is event-driven.
Payed by execution time of the single function and not by running time of the thread.
● Pros: extremely scalable, no complex maintenance and building of infrastructure
(serverless)
● Cons: difficult coordination and monitoring
From Monoliths to Functions
https://medium.freecodecamp.org/serverless-is-cheaper-not-simpler-a10c4fc30e49
From Monoliths to Functions
https://medium.freecodecamp.org/serverless-is-cheaper-not-simpler-a10c4fc30e49
Management complexity
Fog Computing
https://erpinnews.com/fog-computing-vs-edge-computing
During the cloud era all the applications moved from local to remote execution
Smaller applications and IoT data volume are bringing them back to local
Managing Services
An effective management of services depends on (i) the application architectural style
and (ii) the infrastructure architecture.
GOAL Keep non-functional requirements satisfied during the application life-cycle
HOW? Making decisions on ...
Where to deploy/move the microservices/functions composing the application ->
COMPUTATION MOVEMENT
Where to place the data the application is using -> DATA MOVEMENT
Monitoring System
The monitoring system is the enabler of the application management
It gives insights on the performance of the application
It detects violations in SLA
SLA is the agreement with the customer indicating the non-functional requirements
for the execution of the services:
● QoS, Security & Privacy, Energy Efficiency, Data Quality => UTILITY
DITAS: Data Provisioning in Fog Environments
DITAS Cloud Platform allows developers to design data-intensive applications, deploy
them on a mixed cloud/edge environment and execute the resulting distributed
application in an optimal way by exploiting the data and computation movement
strategies
DITAS: Data Provisioning in Fog Environments
DESIGN
Data
administrator
Data sources
offersregisters
Bluprint
repository
Data source
description +
Data Utility
Application
Developer
requests
Data source
description +
Data Utility
requirements
Resolution
engine
DaaS - the resolution engine selects the best data source according to the
application developer’s functional and non-functional requirements
DITAS: Data Provisioning in Fog Environments
DEPLOY
The VIRTUAL DATA CONTAINER hide the complexity of the data sources
and their location and provides a personalised access to the data.
TASK
VDC
query data
Ensures SLA
satisfaction through
monitoring and
enactment
EXECUTE
DITAS: Data Provisioning in Fog Environments
EXECUTE
Movement Strategies consists of data and computation movement between
resources in the cloud or in the edge and between customer’s resources and
data administrator’s facilities
Movement
Strategies
Data Utility
requirements
DU
DQ QoS
Security &
Privacy
+
+
+ +
+
Decides the location of
data and computation
optimising the Data
Utility
DITAS: e-health scenario
Hospitals produce and store a huge amount of data
As data administrator
Hospitals can decide which data to
share, who can access them, and
which restrictions (e.g., due to
privacy and security) will be
applied
As data consumer
VDCs provide an abstract
representation of patients’ data,
taking care of movement across
environments (edge vs cloud) and
data transformations to comply with
data protection regulations
DITAS: e-health scenario
P. Plebani, M. Salnitri, and M. Vitali, “Fog Computing and Data as a Service: A Goal-Based Modeling Approach to Enable Effective
Data Movements,” in International Conference on Advanced Information Systems Engineering, 2018, pp. 203-219.
P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. I. Kat, A. Marinakis, V. Moulos, F. Pallas, S. Tai, and M. Vitali,
“Data and Computation Movement in Fog Environments: the DITAS Approach.” , 2018, vol. 1, pp. 249-266.
P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. I. Kat, A. Marinakis, V. Moulos, F. Pallas, B. Pernici, and others,
“DITAS: Unleashing the Potential of Fog Computing to Improve Data-Intensive Applications,” in European Conference on
Service-Oriented and Cloud Computing, 2017, pp. 154-158.
C. Cappiello, B. Pernici, P. Plebani, and M. Vitali, “Utility-Driven Data Management for Data-Intensive Applications in Fog
Environments,” in International Conference on Conceptual Modeling, 2017, pp. 216-226.
P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. Kat, F. Pallas, B. Pernici, S. Tai, and M. Vitali, “Information
Logistics and Fog Computing: The DITAS Approach,” in 29th International Conference on Advanced Information Systems
Engineering Forum (CAISE Forum), 2017, pp. 129-136.
http://ditas-project.eu
Deployment based on Monitoring Capabilities
E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on
Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
Deployment based on Monitoring Capabilities
The application owner expresses
QoS requirements and
monitorability requirements
E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on
Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
Deployment based on Monitoring Capabilities
The application owner expresses
QoS requirements and
monitorability requirements
Cloud Providers expresses QoS and
monitoring capabilities
E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on
Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
Deployment based on Monitoring Capabilities
The application owner expresses
QoS requirements and
monitorability requirements
Cloud Providers expresses QoS and
monitoring capabilities
Multi-cloud optimal
deployment of
microservices
E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on
Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
Managing Services in
Heterogeneous Environments
Adaptive Approaches Towards Non-Functional
Requirements Satisfaction
Monica Vitali - Politecnico di Milano
monica.vitali@polimi.it

More Related Content

What's hot

Grid computing & its applications
Grid computing & its applicationsGrid computing & its applications
Grid computing & its applications
Alokeparna Choudhury
 
The Environmental Impact of Cloud Computing
The Environmental Impact of Cloud ComputingThe Environmental Impact of Cloud Computing
The Environmental Impact of Cloud Computing
Suyati Technologies
 
Applications of big data in electrical energy system document
Applications of big data  in electrical energy system documentApplications of big data  in electrical energy system document
Applications of big data in electrical energy system document
Obul Naidu
 
Vps server 8
Vps server 8Vps server 8
Vps server 8
EagerLock023
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
RECAP Project Overview
RECAP Project OverviewRECAP Project Overview
RECAP Project Overview
RECAP Project
 
Green cloud computing using heuristic algorithms
Green cloud computing using heuristic algorithmsGreen cloud computing using heuristic algorithms
Green cloud computing using heuristic algorithms
Iliad Mnd
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Cfp ijccsa pdf
Cfp ijccsa pdfCfp ijccsa pdf
Cfp ijccsa pdf
ijccsa
 
GreenLight Data Collection Architecture
GreenLight Data Collection ArchitectureGreenLight Data Collection Architecture
GreenLight Data Collection Architecture
Jerry Sheehan
 
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
Nexgen Technology
 
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
Giuseppe Procaccianti
 
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALAGREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
Saikiran Panjala
 
Future of jobs and digital economy citi conference 090618
Future of jobs and digital economy citi conference 090618Future of jobs and digital economy citi conference 090618
Future of jobs and digital economy citi conference 090618
Economic Strategy Institute
 
Big Data in an modern Enterprise
Big Data in an modern EnterpriseBig Data in an modern Enterprise
Big Data in an modern Enterprise
Alexander Alten
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 

What's hot (20)

Grid computing & its applications
Grid computing & its applicationsGrid computing & its applications
Grid computing & its applications
 
The Environmental Impact of Cloud Computing
The Environmental Impact of Cloud ComputingThe Environmental Impact of Cloud Computing
The Environmental Impact of Cloud Computing
 
Applications of big data in electrical energy system document
Applications of big data  in electrical energy system documentApplications of big data  in electrical energy system document
Applications of big data in electrical energy system document
 
Vps server 8
Vps server 8Vps server 8
Vps server 8
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
RECAP Project Overview
RECAP Project OverviewRECAP Project Overview
RECAP Project Overview
 
Green cloud computing using heuristic algorithms
Green cloud computing using heuristic algorithmsGreen cloud computing using heuristic algorithms
Green cloud computing using heuristic algorithms
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cfp ijccsa pdf
Cfp ijccsa pdfCfp ijccsa pdf
Cfp ijccsa pdf
 
GreenLight Data Collection Architecture
GreenLight Data Collection ArchitectureGreenLight Data Collection Architecture
GreenLight Data Collection Architecture
 
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wirel...
 
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
Energy Efficiency in Cloud Software Architectures - ICT.OPEN 2013
 
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALAGREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
GREEN CLOUD COMPUTING BY SAIKIRAN PANJALA
 
Future of jobs and digital economy citi conference 090618
Future of jobs and digital economy citi conference 090618Future of jobs and digital economy citi conference 090618
Future of jobs and digital economy citi conference 090618
 
Big Data in an modern Enterprise
Big Data in an modern EnterpriseBig Data in an modern Enterprise
Big Data in an modern Enterprise
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 

Similar to Umu seminar 02-2019

Ditas factsheet h2020 v1.1
Ditas factsheet h2020  v1.1Ditas factsheet h2020  v1.1
Ditas factsheet h2020 v1.1
Oliver Barreto Rodríguez
 
Cloud computing
Cloud computingCloud computing
Cloud computing
perfectican
 
cloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptxcloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptx
bemniman2
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English
Appear
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
offensoSEOwork
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
Ankit Gupta
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
Orange Business Services
 
Cloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS studentCloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS student
bemnitekalegn
 
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Peter Melander
 
Scalable & Secure Infrastructure: Cloud Services Solutions
Scalable & Secure Infrastructure: Cloud Services SolutionsScalable & Secure Infrastructure: Cloud Services Solutions
Scalable & Secure Infrastructure: Cloud Services Solutions
GrapesTech Solutions
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
Denodo
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Denodo
 
Impact of Cloud Computing on IT Infrastructure Support.pdf
Impact of Cloud Computing on IT Infrastructure Support.pdfImpact of Cloud Computing on IT Infrastructure Support.pdf
Impact of Cloud Computing on IT Infrastructure Support.pdf
ACS Networks & Technologies
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
1js20ec036ksspoorthi
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
IRJET Journal
 

Similar to Umu seminar 02-2019 (20)

Ditas factsheet h2020 v1.1
Ditas factsheet h2020  v1.1Ditas factsheet h2020  v1.1
Ditas factsheet h2020 v1.1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptxcloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptx
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
Enhancing Data Infrastructure: Leveraging Hybrid Data Centers for Cybersecuri...
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Cloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS studentCloud Computing Tearm paper for first year IS student
Cloud Computing Tearm paper for first year IS student
 
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
 
Scalable & Secure Infrastructure: Cloud Services Solutions
Scalable & Secure Infrastructure: Cloud Services SolutionsScalable & Secure Infrastructure: Cloud Services Solutions
Scalable & Secure Infrastructure: Cloud Services Solutions
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
 
Impact of Cloud Computing on IT Infrastructure Support.pdf
Impact of Cloud Computing on IT Infrastructure Support.pdfImpact of Cloud Computing on IT Infrastructure Support.pdf
Impact of Cloud Computing on IT Infrastructure Support.pdf
 
Digital twin technology - seminar presentation
Digital twin technology - seminar presentationDigital twin technology - seminar presentation
Digital twin technology - seminar presentation
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 

Recently uploaded

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 

Recently uploaded (20)

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 

Umu seminar 02-2019

  • 1. Managing Services in Heterogeneous Environments Adaptive Approaches Towards Non-Functional Requirements Satisfaction Monica Vitali - Politecnico di Milano monica.vitali@polimi.it
  • 2. Once Upon the Time... Applications were designed as monoliths ● Pros: easy to manage, easy to monitor ● Cons: no scalability, no flexibility http://ryanjbaxter.com/2015/07/15/using-microservices-to-build-cloud-native-applications-part-1/
  • 3. From Monoliths to Microservices Applications are decomposed in smaller specialised units ● Pros: high scalability, improved specialization ● Cons: complex management and monitoring http://ryanjbaxter.com/2015/07/15/using-microservices-to-build-cloud-native-applications-part-1/
  • 4. From Microservices to Functions Applications are a composition of specialised functions. Execution is event-driven. Payed by execution time of the single function and not by running time of the thread. ● Pros: extremely scalable, no complex maintenance and building of infrastructure (serverless) ● Cons: difficult coordination and monitoring
  • 5. From Monoliths to Functions https://medium.freecodecamp.org/serverless-is-cheaper-not-simpler-a10c4fc30e49
  • 6. From Monoliths to Functions https://medium.freecodecamp.org/serverless-is-cheaper-not-simpler-a10c4fc30e49 Management complexity
  • 7. Fog Computing https://erpinnews.com/fog-computing-vs-edge-computing During the cloud era all the applications moved from local to remote execution Smaller applications and IoT data volume are bringing them back to local
  • 8. Managing Services An effective management of services depends on (i) the application architectural style and (ii) the infrastructure architecture. GOAL Keep non-functional requirements satisfied during the application life-cycle HOW? Making decisions on ... Where to deploy/move the microservices/functions composing the application -> COMPUTATION MOVEMENT Where to place the data the application is using -> DATA MOVEMENT
  • 9. Monitoring System The monitoring system is the enabler of the application management It gives insights on the performance of the application It detects violations in SLA SLA is the agreement with the customer indicating the non-functional requirements for the execution of the services: ● QoS, Security & Privacy, Energy Efficiency, Data Quality => UTILITY
  • 10. DITAS: Data Provisioning in Fog Environments DITAS Cloud Platform allows developers to design data-intensive applications, deploy them on a mixed cloud/edge environment and execute the resulting distributed application in an optimal way by exploiting the data and computation movement strategies
  • 11. DITAS: Data Provisioning in Fog Environments DESIGN Data administrator Data sources offersregisters Bluprint repository Data source description + Data Utility Application Developer requests Data source description + Data Utility requirements Resolution engine DaaS - the resolution engine selects the best data source according to the application developer’s functional and non-functional requirements
  • 12. DITAS: Data Provisioning in Fog Environments DEPLOY The VIRTUAL DATA CONTAINER hide the complexity of the data sources and their location and provides a personalised access to the data. TASK VDC query data Ensures SLA satisfaction through monitoring and enactment EXECUTE
  • 13. DITAS: Data Provisioning in Fog Environments EXECUTE Movement Strategies consists of data and computation movement between resources in the cloud or in the edge and between customer’s resources and data administrator’s facilities Movement Strategies Data Utility requirements DU DQ QoS Security & Privacy + + + + + Decides the location of data and computation optimising the Data Utility
  • 14. DITAS: e-health scenario Hospitals produce and store a huge amount of data As data administrator Hospitals can decide which data to share, who can access them, and which restrictions (e.g., due to privacy and security) will be applied As data consumer VDCs provide an abstract representation of patients’ data, taking care of movement across environments (edge vs cloud) and data transformations to comply with data protection regulations
  • 16. P. Plebani, M. Salnitri, and M. Vitali, “Fog Computing and Data as a Service: A Goal-Based Modeling Approach to Enable Effective Data Movements,” in International Conference on Advanced Information Systems Engineering, 2018, pp. 203-219. P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. I. Kat, A. Marinakis, V. Moulos, F. Pallas, S. Tai, and M. Vitali, “Data and Computation Movement in Fog Environments: the DITAS Approach.” , 2018, vol. 1, pp. 249-266. P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. I. Kat, A. Marinakis, V. Moulos, F. Pallas, B. Pernici, and others, “DITAS: Unleashing the Potential of Fog Computing to Improve Data-Intensive Applications,” in European Conference on Service-Oriented and Cloud Computing, 2017, pp. 154-158. C. Cappiello, B. Pernici, P. Plebani, and M. Vitali, “Utility-Driven Data Management for Data-Intensive Applications in Fog Environments,” in International Conference on Conceptual Modeling, 2017, pp. 216-226. P. Plebani, D. Garcia-Perez, M. Anderson, D. Bermbach, C. Cappiello, R. Kat, F. Pallas, B. Pernici, S. Tai, and M. Vitali, “Information Logistics and Fog Computing: The DITAS Approach,” in 29th International Conference on Advanced Information Systems Engineering Forum (CAISE Forum), 2017, pp. 129-136. http://ditas-project.eu
  • 17. Deployment based on Monitoring Capabilities E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
  • 18. Deployment based on Monitoring Capabilities The application owner expresses QoS requirements and monitorability requirements E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
  • 19. Deployment based on Monitoring Capabilities The application owner expresses QoS requirements and monitorability requirements Cloud Providers expresses QoS and monitoring capabilities E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
  • 20. Deployment based on Monitoring Capabilities The application owner expresses QoS requirements and monitorability requirements Cloud Providers expresses QoS and monitoring capabilities Multi-cloud optimal deployment of microservices E. Fadda, P. Plebani, and M. Vitali, “Optimizing Monitorability of Multi-cloud Applications,” in 28th International Conference on Advanced Information Systems Engineering (CAISE’16), 2016, pp. 411-426.
  • 21. Managing Services in Heterogeneous Environments Adaptive Approaches Towards Non-Functional Requirements Satisfaction Monica Vitali - Politecnico di Milano monica.vitali@polimi.it