Non-invasive estimation of cloud applications performance via hypervisor’s operating systems counters

Fabio Diniz Rossi, Israel Campos de Oliveira, Cesar A. F. De Rose, Rodrigo Neves Calheiros, Rajkumar Buyya

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

![CDATA[The adoption of cloud computing environments as the infrastructure of choice for computing services is growing rapidly, due to features such as scalability and pay-per-use. As a result, more pressure is put on cloud providers, which manage the underlying computing platform, to maintain the Quality of Experience of application users within acceptable levels. However, the mapping of high-level application metrics, such as response time, to low-level infrastructure metrics, such as utilization rate of resources, is a non-trivial task. Many works present monitoring of processor, memory, and network utilization. Nevertheless, the monitoring of these resources can be intrusive to the system that provides the service. This paper presents a non-invasive approach for estimating the response time of cloud applications through the mapping of Quality of Service metrics to operating system counters at the hypervisor level. We developed a model that estimates the response time of real-time applications based on Linux Operating Systems counters that presented an accuracy of 94% in our evaluation.]]
Original languageEnglish
Title of host publicationSOFTNETWORKING 2015: Proceedings of the Fourteenth International Conference on Networks, ICN 2015, 19-24 April 2015, Barcelona, Spain
PublisherIARIA
Pages177-184
Number of pages8
ISBN (Print)9781612083988
Publication statusPublished - 2015
EventInternational Conference on Networks -
Duration: 19 Apr 2015 → …

Publication series

Name
ISSN (Print)2308-4413

Conference

ConferenceInternational Conference on Networks
Period19/04/15 → …

Keywords

  • cloud computing
  • performance

Fingerprint

Dive into the research topics of 'Non-invasive estimation of cloud applications performance via hypervisor’s operating systems counters'. Together they form a unique fingerprint.

Cite this