ABSTRACT
Highly Available systems often require sophisticated, expensive techniques. However, end-users may not have enough resources on their premises, or the knowledge to make their systems reach that goal. It may be fully impractical to expect an end-user to easily transform a regular application into a highly available one. In this work, we propose a novel perspective on Availability as a Service (AaaS). The proposed model has the potential to offer different levels of availability in a simplified fashion. AaaS has been often used to describe clouds that offer highly available services. Our proposal, on the other hand, is for the environment itself to provide, on demand, the functionality required for end-user systems to achieve specific levels of availability. We also envision that AaaS can go beyond the cloud. This includes the case in which AaaS is provided in a scenario we call Edge-Core-Cloud Continuum, where the network core plays a prominent role through NFV-COIN (Network Functions Virtualization - COmputing In the Network).
- Ejaz Ahmed, Arif Ahmed, 2017. Bringing computation closer toward the user network: Is edge computing the solution?IEEE Communications Magazine 55, 11 (2017), 138–144.Google Scholar
- Algirdas Avizienis, J-C Laprie, Brian Randell, and Carl Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing 1, 1 (2004), 11–33.Google ScholarDigital Library
- Emmanuel Bertin, Noël Crespi, and Thomas Magedanz. 2021. Shaping Future 6G Networks: Needs, Impacts, and Technologies. John Wiley & Sons.Google Scholar
- Lucas Bondan, Muriel F Franco, Leonardo Marcuzzo, Giovanni Venancio, 2019. FENDE: marketplace-based distribution, execution, and life cycle management of VNFs. IEEE Communications Magazine 57, 1 (2019), 13–19.Google ScholarDigital Library
- Pietro Bressana, Noa Zilberman, Dejan Vucinic, and Robert Soulé. 2020. Trading latency for compute in the network. In Proceedings of the Workshop on Network Application Integration/CoDesign. 35–40.Google ScholarDigital Library
- Frederico Manuel Duarte Cerveira. 2021. Evaluating and improving cloud computing dependability. Ph. D. Dissertation. 00500:: Universidade de Coimbra.Google Scholar
- Margaret Chiosi, Don Clarke, Peter Willis, Andy Reid, James Feger, Michael Bugenhagen, Waqar Khan, Michael Fargano, Chunfeng Cui, Hui Deng, 2012. Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action. In SDN and OpenFlow world congress, Vol. 48. sn, 1–16.Google Scholar
- Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, and Andrew Warfield. 2008. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX symposium on networked systems design and implementation. San Francisco, 161–174.Google ScholarDigital Library
- Huynh Tu Dang, Pietro Bressana, Han Wang, Ki Suh Lee, Noa Zilberman, Hakim Weatherspoon, Marco Canini, Fernando Pedone, and Robert Soulé. 2020. P4xos: Consensus as a network service. IEEE/ACM Transactions on Networking 28, 4 (2020), 1726–1738.Google ScholarDigital Library
- Huynh Tu Dang, Marco Canini, Fernando Pedone, and Robert Soulé. 2016. Paxos made switch-y. ACM SIGCOMM Computer Communication Review 46, 2 (2016), 18–24.Google ScholarDigital Library
- João Paulo de Araujo, Luciana Arantes, Elias P Duarte Jr, Luiz A Rodrigues, and Pierre Sens. 2019. VCube-PS: A causal broadcast topic-based publish/subscribe system. J. Parallel and Distrib. Comput. 125 (2019), 18–30.Google ScholarCross Ref
- Yucong Duan, Guohua Fu, Nianjun Zhou, Xiaobing Sun, Nanjangud C Narendra, and Bo Hu. 2015. Everything as a service (XaaS) on the cloud: origins, current and future trends. In 2015 IEEE 8th International Conference on Cloud Computing. IEEE, 621–628.Google ScholarDigital Library
- Elias P Duarte, Thiago Garrett, Luis CE Bona, Renato Carmo, and Alexandre P Züge. 2010. Finding stable cliques of PlanetLab nodes. In 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, 317–322.Google ScholarCross Ref
- Elias Procópio Duarte Jr, Rogério Santini, and Jaime Cohen. 2004. Delivering packets during the routing convergence latency interval through highly connected detours. In International Conference on Dependable Systems and Networks, 2004. IEEE, 495–504.Google ScholarCross Ref
- ETSI. 2015. Network Functions Virtualisation (NFV); Infrastructure Overview. Technical Report. European Telecommunications Standards Institute.Google Scholar
- Kurt Friday, Elie Kfoury, Elias Bou-Harb, and Jorge Crichigno. 2020. Towards a unified in-network DDoS detection and mitigation strategy. In 2020 6th IEEE Conference on Network Softwarization (NetSoft). IEEE, 218–226.Google ScholarCross Ref
- Vinicius Fulber-Garcia, Elias P Duarte Jr, Alexandre Huff, and Carlos RP dos Santos. 2020. Network service topology: Formalization, taxonomy and the custom specification model. Computer Networks 178 (2020), 107337.Google ScholarDigital Library
- Thiago Garrett, Schahram Dustdar, Luis CE Bona, and Elias P Duarte. 2018. Traffic differentiation on internet of things. In The 12th IEEE Symposium on Service-Oriented System Engineering (SOSE). IEEE, 142–151.Google ScholarCross Ref
- Jim Gray and Daniel P. Siewiorek. 1991. High-availability computer systems. Computer 24, 9 (1991), 39–48.Google ScholarDigital Library
- Bo Han, Vijay Gopalakrishnan, Lusheng Ji, and Seungjoon Lee. 2015. Network function virtualization: Challenges and opportunities for innovations. IEEE communications magazine 53, 2 (2015), 90–97.Google Scholar
- Gustavo B Heimovski, Rogerio C Turchetti, Juliano A Wickboldt, Lisandro Z Granville, and Elias P Duarte Jr. 2020. FT-Aurora: A highly available IaaS cloud manager based on replication. Computer Networks 168 (2020), 107041.Google ScholarDigital Library
- Chetan Jaiswal and Vijay Kumar. 2015. DBHAaaS: Database high availability as a service. In 11th SITIS. IEEE, 725–732.Google Scholar
- Xin Jin, Xiaozhou Li, Haoyu Zhang, Robert Soulé, Jeongkeun Lee, Nate Foster, Changhoon Kim, and Ion Stoica. 2017. Netcache: Balancing key-value stores with fast in-network caching. In Proceedings of the 26th Symposium on Operating Systems Principles. 121–136.Google ScholarDigital Library
- Somayeh Kianpisheh and Tarik Taleb. 2022. A Survey on In-network Computing: Programmable Data Plane And Technology Specific Applications. IEEE Communications Surveys & Tutorials (2022).Google Scholar
- Peng Kuang, Ying Liu, and Lin He. 2020. P4DAD: Securing duplicate address detection using P4. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1–7.Google ScholarCross Ref
- Neeraj Kumar, Al-Sakib Khan Pathan, Elias P Duarte, and Riaz Ahmed Shaikh. 2015. Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems 58 (2015), 275–277.Google ScholarDigital Library
- David S Linthicum. 2009. Cloud computing and SOA convergence in your enterprise: a step-by-step guide. Pearson Education.Google Scholar
- Zaoxing Liu, Zhihao Bai, Zhenming Liu, Xiaozhou Li, Changhoon Kim, Vladimir Braverman, Xin Jin, and Ion Stoica. 2019. DistCache: Provable Load Balancing for Large-Scale Storage Systems with Distributed Caching.. In FAST, Vol. 19. 143–157.Google Scholar
- Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. 2021. Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches.. In USENIX Security Symposium. 3829–3846.Google Scholar
- Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. 2015. Network function virtualization: State-of-the-art and research challenges. IEEE Communications surveys & tutorials 18, 1 (2015), 236–262.Google Scholar
- Chris Misa, Ramakrishnan Durairajan, Reza Rejaie, and Walter Willinger. 2021. Revisiting network telemetry in coin: A case for runtime programmability. IEEE Network 35, 5 (2021), 14–20.Google ScholarDigital Library
- Jrgen Quittek, Prashant Bauskar, Tayeb BenMeriem, Andy Bennett, Michel Besson, 2014. Network functions virtualisation (nfv)-management and orchestration. ETSI NFV ISG, White Paper (2014), 0733–8716.Google Scholar
- Amedeo Sapio, Ibrahim Abdelaziz, Abdulla Aldilaijan, Marco Canini, and Panos Kalnis. 2017. In-network computation is a dumb idea whose time has come. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks. 150–156.Google ScholarDigital Library
- Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30–39.Google ScholarDigital Library
- Mohamed Sohail, Emanuela Caramagna, and Sameh Gad. 2016. High Availability as a Service (HAaaS). Technical Report. Dell EMC.Google Scholar
- Abacus Solutions. [n. d.]. High Availability as a Service (HAaaS). https://www.abacusllc.com/high-availability-as-a-service-haaasGoogle Scholar
- T. Tavares, L. da C. Marcuzzo, V. Fulber-Garcia, G. Venancio, M. Franco, L. Bondan, F. De Turck, L. Granville, E. P. Duarte, C. R. P. dos Santos, 2018. Niep: Nfv infrastructure emulation platform. In IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 173–180.Google ScholarCross Ref
- Yuta Tokusashi, Hiroki Matsutani, and Noa Zilberman. 2018. Lake: the power of in-network computing. In 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1–8.Google ScholarCross Ref
- Rogério C Turchetti, Elias P Duarte, Luciana Arantes, and Pierre Sens. 2016. A QoS-configurable failure detection service for internet applications. Journal of Internet Services and Applications 7, 1 (2016), 1–14.Google ScholarCross Ref
- Rogerio C Turchetti and Elias P Duarte Jr. 2017. NFV-FD: Implementation of a failure detector using network virtualization technology. International Journal of Network Management 27, 6 (2017), e1988.Google ScholarCross Ref
- Michele Vadursi, Andrea Ceccarelli, Elias P Duarte, Aniket Mahanti, 2016. System and network security: anomaly detection and monitoring.Google Scholar
- Giovanni Venâncio, Rogério C Turchetti, Edson T Camargo, and Elias P Duarte Jr. 2021. VNF-Consensus: A virtual network function for maintaining a consistent distributed software-defined network control plane. International Journal of Network Management 31, 3 (2021), e2124.Google ScholarDigital Library
- Giovanni Venâncio, Rogério C Turchetti, and Elias P Duarte. 2019. Nfv-rbcast: Enabling the network to offer reliable and ordered broadcast services. In 2019 9th Latin-American Symposium on Dependable Computing (LADC). IEEE, 1–10.Google ScholarCross Ref
- Giovanni Venâncio, Rogério C Turchetti, and Elias Procópio Duarte Jr. 2022. NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies. Journal of Internet Services and Applications 13, 1 (2022), 46–53.Google ScholarCross Ref
- Qing Wang, Youyou Lu, Erci Xu, Junru Li, Youmin Chen, and Jiwu Shu. 2021. Concordia: Distributed Shared Memory with In-Network Cache Coherence.. In FAST. 277–292.Google Scholar
- Yaoguang Wang, Weiming Lu, Bin Yu, and Baogang Wei. 2012. HAaaS: Towards Highly Available Distributed Systems. In 2012 IEEE International Conference on Cluster Computing. IEEE, 618–621.Google Scholar
- Deze Zeng, Nirwan Ansari, Marie-José Montpetit, Eve M Schooler, and Daniele Tarchi. 2021. Guest editorial: In-network computing: Emerging trends for the edge-cloud continuum. IEEE Network 35, 5 (2021), 12–13.Google ScholarDigital Library
- Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qianqian Li, Mingwei Xu, and Jianping Wu. 2020. Poseidon: Mitigating volumetric ddos attacks with programmable switches. In the 27th Network and Distributed System Security Symposium (NDSS 2020).Google ScholarCross Ref
Index Terms
- Towards a Novel Model for Availability as a Service
Recommendations
Cloud federation in a layered service model
We show how a layered Cloud service model of software (SaaS), platform (PaaS), and infrastructure (IaaS) leverages multiple independent Clouds by creating a federation among the providers. The layered architecture leads naturally to a design in which ...
QoS-Oriented Monitoring Model of Cloud Computing Resources Availability
ICCIS '13: Proceedings of the 2013 International Conference on Computational and Information SciencesWith the development of cloud computing, many critical applications have been supported to provide many key services in the cloud computing. So the availability of cloud computing services turns to be higher and higher. Because resources of cloud ...
Cloud service engineering
ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2Building on compute and storage virtualization, Cloud Computing provides scalable, network-centric, abstracted IT infrastructure, platforms, and applications as on-demand services that are billed by consumption. Cloud Service Engineering is the ...
Comments