Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 4 <strong>and</strong> Chapter 5 respectively.<br />
The second component is temporal consistency monitoring which deals with<br />
monitoring <strong>of</strong> temporal consistency state against temporal violations. Based on a<br />
temporal consistency model, the temporal consistency states <strong>of</strong> scientific cloud<br />
workflows should be under constant monitoring in order to detect potential temporal<br />
violations in a timely fashion. However, as mentioned before, the cost <strong>of</strong> temporal<br />
verification can be very huge due to the complexity <strong>and</strong> uncertainty in cloud<br />
workflow system environments. Therefore, cost-effective strategies need to be<br />
designed to detect potential temporal violations in an efficient fashion.<br />
In our framework, the function <strong>of</strong> temporal consistency state monitoring is<br />
realised through a two-step process. The first step is temporal checkpoint selection.<br />
Given the probability based temporal consistency model, our minimum probability<br />
time redundancy based checkpoint selection strategy can choose the minimal set <strong>of</strong><br />
activity points (i.e. necessary <strong>and</strong> sufficient checkpoints) for temporal verification.<br />
The second process is temporal verification which checks the current temporal<br />
consistency states at the selected checkpoints with our probability based temporal<br />
consistency model. In our temporal framework, instead <strong>of</strong> conventional four types <strong>of</strong><br />
checkpoint <strong>and</strong> temporal consistency states, only one type <strong>of</strong> checkpoint <strong>and</strong><br />
temporal consistency state (i.e. recoverable state) needs to be verified, <strong>and</strong> thus<br />
reduce the cost <strong>of</strong> checkpoint selection <strong>and</strong> temporal verification. The detailed<br />
process will be introduced in Section 3.3 <strong>and</strong> the algorithms will be further<br />
presented in Chapter 6.<br />
The third component is temporal violation h<strong>and</strong>ling which deals with recovery <strong>of</strong><br />
temporal violations. Based on the results <strong>of</strong> the previous component for monitoring<br />
temporal consistency, a necessary <strong>and</strong> sufficient checkpoint is selected where a<br />
potential temporal violation is detected. Conventional temporal verification work<br />
believes in the philosophy that temporal violation h<strong>and</strong>ling should be executed at all<br />
necessary <strong>and</strong> sufficient checkpoints. However, given the probability <strong>of</strong> selfrecovery<br />
(i.e. the time deficit can be automatically compensated by the saved<br />
execution time <strong>of</strong> the subsequent workflow activities), we have identified that such a<br />
philosophy is not necessarily ideal. Therefore, a temporal violation h<strong>and</strong>ling point<br />
selection process should be designed to further determine whether temporal<br />
violation h<strong>and</strong>ling is necessary at each checkpoint. Here, necessity for temporal<br />
25