21.01.2014 Views

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

conducted for three times, i.e. starting from the verification <strong>of</strong> strong consistency,<br />

then weak consistency, then weak inconsistency, before the verification <strong>of</strong> strong<br />

inconsistency [15]. Therefore, the cost <strong>of</strong> other three times <strong>of</strong> temporal verification<br />

is actually unnecessary <strong>and</strong> should be avoided. In our strategy, with the probability<br />

based temporal consistency model where continuous temporal consistency states are<br />

defined, it is no longer necessary to verify different types <strong>of</strong> temporal consistency<br />

states as one is sufficient to determine the actual level <strong>of</strong> temporal violations.<br />

Specifically, each temporal consistency state is associated with a unique probability<br />

value <strong>and</strong> it is either within the range <strong>of</strong> statistically recoverable or non-recoverable<br />

temporal violations. Therefore, checkpoint selection <strong>and</strong> temporal verification are<br />

required to be conducted only once at every activity in our temporal framework.<br />

Details about the temporal verification strategy will be presented in Chapter 6.<br />

3.4 Component 3: Temporal Violation H<strong>and</strong>ling<br />

The third component is temporal violation h<strong>and</strong>ling. At a selected temporal violation<br />

h<strong>and</strong>ling point, temporal violation h<strong>and</strong>ling is to tackle the existing temporal<br />

violations by reducing or ideally removing the occurred time deficits. As depicted in<br />

Table 3.3, the input includes the necessary <strong>and</strong> sufficient checkpoints, temporal<br />

consistency states <strong>and</strong> the current workflow scheduling plans (which define the<br />

assignment <strong>of</strong> workflow activities to computing resources, e.g. virtual machines in<br />

cloud computing environments). The output includes the temporal violation<br />

h<strong>and</strong>ling points <strong>and</strong> regenerated workflow scheduling plans which can reduce or<br />

ideally remove the occurred time deficits <strong>of</strong> violated workflow instances.<br />

The First step is to select temporal violation h<strong>and</strong>ling points. In the conventional<br />

temporal verification work [15, 17, 56], a temporal violation h<strong>and</strong>ling point is<br />

regarded the same as a necessary <strong>and</strong> sufficient checkpoint in nature, i.e. temporal<br />

violation h<strong>and</strong>ling should be triggered whenever a temporal violation is detected.<br />

However, due to the dynamic nature <strong>of</strong> cloud workflow environments, the number<br />

<strong>of</strong> selected checkpoints can still be very huge especially in large scale scientific<br />

cloud workflow applications. Therefore, given the probability <strong>of</strong> self-recovery <strong>and</strong><br />

motivated by r<strong>and</strong>om testing techniques, an adaptive temporal violation h<strong>and</strong>ling<br />

point selection strategy is designed to further select a subset <strong>of</strong> necessary <strong>and</strong><br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!