21.01.2014 Views

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4 <strong>and</strong> Chapter 5 respectively.<br />

The second component is temporal consistency monitoring which deals with<br />

monitoring <strong>of</strong> temporal consistency state against temporal violations. Based on a<br />

temporal consistency model, the temporal consistency states <strong>of</strong> scientific cloud<br />

workflows should be under constant monitoring in order to detect potential temporal<br />

violations in a timely fashion. However, as mentioned before, the cost <strong>of</strong> temporal<br />

verification can be very huge due to the complexity <strong>and</strong> uncertainty in cloud<br />

workflow system environments. Therefore, cost-effective strategies need to be<br />

designed to detect potential temporal violations in an efficient fashion.<br />

In our framework, the function <strong>of</strong> temporal consistency state monitoring is<br />

realised through a two-step process. The first step is temporal checkpoint selection.<br />

Given the probability based temporal consistency model, our minimum probability<br />

time redundancy based checkpoint selection strategy can choose the minimal set <strong>of</strong><br />

activity points (i.e. necessary <strong>and</strong> sufficient checkpoints) for temporal verification.<br />

The second process is temporal verification which checks the current temporal<br />

consistency states at the selected checkpoints with our probability based temporal<br />

consistency model. In our temporal framework, instead <strong>of</strong> conventional four types <strong>of</strong><br />

checkpoint <strong>and</strong> temporal consistency states, only one type <strong>of</strong> checkpoint <strong>and</strong><br />

temporal consistency state (i.e. recoverable state) needs to be verified, <strong>and</strong> thus<br />

reduce the cost <strong>of</strong> checkpoint selection <strong>and</strong> temporal verification. The detailed<br />

process will be introduced in Section 3.3 <strong>and</strong> the algorithms will be further<br />

presented in Chapter 6.<br />

The third component is temporal violation h<strong>and</strong>ling which deals with recovery <strong>of</strong><br />

temporal violations. Based on the results <strong>of</strong> the previous component for monitoring<br />

temporal consistency, a necessary <strong>and</strong> sufficient checkpoint is selected where a<br />

potential temporal violation is detected. Conventional temporal verification work<br />

believes in the philosophy that temporal violation h<strong>and</strong>ling should be executed at all<br />

necessary <strong>and</strong> sufficient checkpoints. However, given the probability <strong>of</strong> selfrecovery<br />

(i.e. the time deficit can be automatically compensated by the saved<br />

execution time <strong>of</strong> the subsequent workflow activities), we have identified that such a<br />

philosophy is not necessarily ideal. Therefore, a temporal violation h<strong>and</strong>ling point<br />

selection process should be designed to further determine whether temporal<br />

violation h<strong>and</strong>ling is necessary at each checkpoint. Here, necessity for temporal<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!