Information Technology Reference
In-Depth Information
Figure 6. Test case scenario, where (i) two local sessions are created at Hoster 1 and Hoster 2 (ii) Zone
0 is created and attached to local session 1,(iii) Game players are connected to Zone 0, and (iv)Zone
0 is migrated from Hoster 1 to Hoster 2. Each Hoster can be regarded as a single Cloud provider, and
they together formulate a service-oriented infrastructure of federated Cloud computing for on-demand
resource provisioning
(i.e. Hunter). Six metrics, namely, (i)
RTFRickDuration,(ii) AveragePacketLossTCP,
(iii)RTFThroughputIn, (vi) RTFThroughOut, (v)
AveragePacketLatency, and (vi) ClientConnec-
tionCount are defined in the SLA. Once the
Hunter game is in use, its usage is monitored and
QoS measurement data of these metrics are re-
ported back. The Coordinator then monitors the
SLA conformance of the local session through
Coordinator SLA monitoring service.
Assume some QoS measurement data (e.g.
RTFThroughputIn, RTFThroughputOut) for ' local
session 1 ' at ' hoster1 ' is predicted to exceed the
thresholds defined in SLA, ' zone0 ' can then be
migrated to the idle ' local session 2 ' at ' hoster2 '
either manually or atomically. After the migration,
the number of clients connected to ' local session 1 '
(i.e. ClientConnectionCount) drops to zero, hence
measurement data of metric RTFThroughputIn and
RTFThroughOut are all zero. This is reflected in
the Figure 7 that the running total of QoS measure-
ment data of RTFThroughputIn and RTFThrough-
Out remain unchanged. Now if we migrate back
' zone0 ' from ' local session 2 ' to ' local session
1 ', the running total of QoS measurement data
of RTFThroughputIn and RTFThroughOut start
going up again, as shown in Figure 7. This whole
migration process is transparent to the customers,
whose quality of experience of playing the Hunter
game will not be impacted.
DISCUSSIONS AND FUTURE
RESEARCH DIRECTIONS
There is no doubt that security is paramount in
SLA manager. The reference architecture proposed
mainly concerns with the functional requirements
of the SLA manager, and the security model is not
included. The security model within SLA manager
Search WWH ::




Custom Search