Scheduling Real-Time Applications in the Cloud: Challenges and Research Directions
Dr. Helen Karatza is a Professor Emeritus in the Department of Informatics at the Aristotle University of Thessaloniki, Greece, where she teaches courses in the postgraduate and undergraduate level, and supervises doctoral and postdoctoral research. Dr. Karatza's research interests include Computer Systems Modeling and Simulation, Performance Evaluation, Grid and Cloud Computing, Energy Efficiency in Large Scale Distributed Systems, Resource Allocation and Scheduling and Real-time Distributed Systems.
Dr. Karatza has authored or co-authored over 210 technical papers and book chapters including four papers that earned best paper awards at international conferences. She is senior member of IEEE, ACM and SCS, and she served as an elected member of the Board of Directors at Large of the Society for Modeling and Simulation International. She served as Chair and Keynote Speaker in International Conferences.
Dr. Karatza is the Editor-in-Chief of the Elsevier Journal “Simulation Modeling Practice and Theory” and Senior Associate Editor of the “Journal of Systems and Software” of Elsevier. She was Editor-in-Chief of “Simulation Transactions of The Society for Modeling and Simulation International” and Associate Editor of “ACM Transactions on Modeling and Computer Simulation”. She served as Guest Editor of Special Issues in International Journals. More info about her activities/publications can be found in http://agent.csd.auth.gr/~karatza/
Cloud computing, a distributed computing paradigm, offers computational services to scientists, consumers and enterprises as utilities, on a pay-per-use billing approach.
Cloud computing provides a large range of services, such as computational resources for urban mobility, health care, social networking, environmental science, etc. Furthermore, the simultaneous usage of services from different clouds can have additional benefits such as lower cost and high availability.
Cloud computing involves many challenges due to the heterogeneity of the resources and the nature of the applications executed on such platforms. Applications are usually complex consisting of multiple component tasks, featuring different degrees of variability in their computational demands. Furthermore, complex multiple-task applications may have precedence constraints and specific deadlines and may impose several restrictions and QoS requirements.
Cloud infrastructures provide an efficient means to execute real-time applications. Users can rent cloud resources to meet application requirements, making cloud a good option for running real-time jobs. Therefore, one of the most important aspects in cloud computing is the effective scheduling of real-time complex applications, allowing for guarantees that the deadlines will be met.
The scheduling algorithms must seek a way to maintain a good response time to leasing cost ratio. Furthermore, scheduling techniques are required to improve the energy-efficiency of servers and to consolidate the workload on efficiently utilized resources. However, to reduce the energy consumption while meeting deadlines, appropriate adaptive scheduling techniques are required.
In this talk we will present state-of-the-art research covering a variety of concepts on real-time application scheduling in the cloud. We will present new perspectives and we will highlight challenges in this important research area.
Abderrahim Benslimane is Professor of Computer-Science at the Avignon University/France since 2001. He has been recently a Technical International Expert at the French Ministry of Foreign and European affairs (2012-2016). He served as a coordinator of the Faculty of Engineering at the French University in Egypt. He obtained the French award of Doctoral supervisions (2017-2021) and he was attributed the French award of Scientific Excellency (2011-2014).
He has been as Associate Professor at the University of Technology of Belfort-Montbéliard since September 1994. He obtained the title to supervise researches (HDR 2000) from the University of Cergy-Pontoise, France. He received the PhD degree (1993), DEA (MS 1989) from the Franche-Comte University of Besançon, and BS (1987) from the University of Nancy, all in Computer Science.
He is Area Editor of Wiley Security and Privacy journal and editorial member of IEEE Wireless Communication Magazine and Elsevier Ad Hoc. He is founder and serves as General-Chair of the IEEE WiMob since 2005 and of iCOST and MoWNet international conference since 2011. He served as a Symposium co-chair/leader in many IEEE international conferences such as ICC, Globecom, AINA and VTC. He was Guest Editor of many special issues. He participates to the steering and the program committee of many IEEE international conferences. He was Board committee member, Vice-chair of Student activities of IEEE France section/Region 8, he was Publication Vice-chair, Conference Vice-Chair and he is now Chair of the ComSoc TC of Communication and Information Security. He participates to the steering and the program committee of many IEEE international conferences.
His research interests are in development of communication protocols with the use of graph theory for mobile and wireless networks. Currently, he is working on the conception and performance evaluation of protocols for security in Internet of Things. Also, he works on multicast routing, inter-vehicular communications, Quality of service, energy conservation, localization, intrusion detection and MAC layer performance evaluation. He was awarded several best papers awards.
He is involved in many national and international founded projects. He was the head of Computer Networks and Multimedia Applications group (RAM) of the Computer Laboratory of Avignon from 2001 to 2009.
More info about his activities and all his publications can be found in http://abderrahimbenslimane.org/
The emergence of the Internet of Things (IoT) is introducing more and more services and applications such as smart cities. IoT networks tend to experience unexpected communication problems during deployment, because resource-constrained embedded devices are unreliable by nature for a variety of reasons, such as uncertain radio connectivity and battery drain. Despite the fact that IoT networks are dynamic and vulnerable, the offered services need the continuous availability of defined network components.
The availability of devices, the reliability of communication, the Quality of Service (QoS), and security are all essential for the utilization of the IoT. Over time, the state of devices and the overall network may depreciate. This is due to the challenging and failure-prone nature of the IoT; consisting of a huge number of heterogeneous and resource-constrained things in terms of memory, communication, energy and computational capabilities. Furthermore, energy constraints impose hard duty cycles to maximise longevity, which in turn causes unreliable connectivity.
To ensure robustness in wireless networks, monitoring the network state, performance and functioning of the nodes and links is crucial, especially for critical applications. Safety-critical applications, such as a distributed fire- or burglar-alarm system, require that all sensor nodes are up and functional.
To that end, monitoring techniques for detecting, localizing and recovering network failures in IoT should be significantly developed.
There are several tools and methods to monitor fixed networks and even wireless sensor networks. However, there is a lack of solutions for the Internet of Things with its complexity and heterogeneity. Monitoring can be passive or active including using network tomography for beacon placements and probes optimization.
In this talk, we will introduce all the concept above. So, we will first introduce the Internet of Things, its challenges and the monitoring concept. We will present the Research motivations and objectives for the monitoring. After presenting the stat-of-the-art research on monitoring, we will present our theoretical solutions for monitoring IoT.
We target the optimization of IoT network monitoring for fault tolerance, security and quality of service purposes.