Models and Guidelines for Dimensioning Private Clouds

Laura Brandwacht, Erik Meeuwissen, Hans Van Den Berg, Miroslav Živković

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Downloads (Pure)

Abstract

It is a real challenge for cloud providers to offer cloud resources that are 'virtually unlimited and can be appropriated in any quantity at any time' in a cost-effective way. In this paper, we propose quantitative models that enable cloud providers to make an informed trade-off between cost and quality. Distinguishing between public and private cloud environments we consider infinite and finite source models respectively. In both cases either homogeneous or heterogeneous cloud resource requests are considered. These models can be applied to cloud dimensioning based on request blocking probability, an important SLA parameter. We derive a novel, insightful method that makes it possible to compute resource requirements in private clouds with heterogeneous resource requests. We show the importance of applying finite source models in the context of private clouds. We also use the proposed models to quantify the benefits of cloud federations.

Original languageEnglish
Title of host publication2013 IEEE Sixth International Conference on Cloud Computing
PublisherIEEE
Pages880-886
Number of pages7
ISBN (Electronic)978-0-7695-5028-2
DOIs
Publication statusPublished - 17 Feb 2014
Event2013 IEEE 6th International Conference on Cloud Computing, CLOUD 2013 - Santa Clara, CA, United States
Duration: 27 Jun 20132 Jul 2013

Publication series

NameIEEE International Conference on Cloud Computing, CLOUD
PublisherIEEE
ISSN (Print)2159-6182
ISSN (Electronic)2159-6190

Conference

Conference2013 IEEE 6th International Conference on Cloud Computing, CLOUD 2013
Country/TerritoryUnited States
CitySanta Clara, CA
Period27/06/132/07/13

Keywords

  • 2024 OA procedure

Fingerprint

Dive into the research topics of 'Models and Guidelines for Dimensioning Private Clouds'. Together they form a unique fingerprint.

Cite this