SlideShare a Scribd company logo
OCCI Monitoring
Augusto Ciuffoletti
OCCI Monitoring
Extending the OCCI API with monitoring capabilities
Augusto Ciuffoletti
Dept. of Computer Science - Univ. of Pisa
September 13, 2013
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
The user may be in its turn a service provider (inside
monitoring)
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
The user may be in its turn a service provider (inside
monitoring)
The user may simply want to verify the quality of the
service (outside monitoring)
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
The user may be in its turn a service provider (inside
monitoring)
The user may simply want to verify the quality of the
service (outside monitoring)
In both cases, the user needs the tools to define
resource monitoring
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
The user may be in its turn a service provider (inside
monitoring)
The user may simply want to verify the quality of the
service (outside monitoring)
In both cases, the user needs the tools to define
resource monitoring
Keep into account the case of a composite service
(many providers)
OCCI Monitoring
Augusto Ciuffoletti
Motivation
SLA is a defined target to obtain user confidence
SLA is tightly related with monitoring, so we start from
cloud monitoring
The user may be in its turn a service provider (inside
monitoring)
The user may simply want to verify the quality of the
service (outside monitoring)
In both cases, the user needs the tools to define
resource monitoring
Keep into account the case of a composite service
(many providers)
A simple API aligned with OCCI
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
Monitoring is made of three basic activities
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
Monitoring is made of three basic activities
extract operational parameters from a Resource
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
Monitoring is made of three basic activities
extract operational parameters from a Resource
gather the operational parameters to obtain the
measure of a metric of interest
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
Monitoring is made of three basic activities
extract operational parameters from a Resource
gather the operational parameters to obtain the
measure of a metric of interest
deliver the measurement to the relevant party
OCCI Monitoring
Augusto Ciuffoletti
Aggregate and deliver
Distiguished activities that need the provision of
computing, storage, networking resources
OCCI Monitoring
Augusto Ciuffoletti
Aggregate and deliver
Distiguished activities that need the provision of
computing, storage, networking resources
Tightly integrated, under control of the provider
OCCI Monitoring
Augusto Ciuffoletti
Aggregate and deliver
Distiguished activities that need the provision of
computing, storage, networking resources
Tightly integrated, under control of the provider
Candidate for the introduction of a new kind of
resource: the Sensor
OCCI Monitoring
Augusto Ciuffoletti
Aggregate and deliver
Distiguished activities that need the provision of
computing, storage, networking resources
Tightly integrated, under control of the provider
Candidate for the introduction of a new kind of
resource: the Sensor
The user that wants to exert monitoring instantiates
(and pays for) a Sensor
OCCI Monitoring
Augusto Ciuffoletti
Aggregate and deliver
Distiguished activities that need the provision of
computing, storage, networking resources
Tightly integrated, under control of the provider
Candidate for the introduction of a new kind of
resource: the Sensor
The user that wants to exert monitoring instantiates
(and pays for) a Sensor
Note: a cost is associated to the Sensor, although this
is not explicit in the definition of monitoring
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
The native attributes of a Sensor are:
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
The native attributes of a Sensor are:
How frequently it produces a new measurement
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
The native attributes of a Sensor are:
How frequently it produces a new measurement
During which time lapse it performs the measurements
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
The native attributes of a Sensor are:
How frequently it produces a new measurement
During which time lapse it performs the measurements
Too many variants for aggregation/delivery:
OCCI-mixins
OCCI Monitoring
Augusto Ciuffoletti
Basic functions
The monitoring function is controlled by time
The native attributes of a Sensor are:
How frequently it produces a new measurement
During which time lapse it performs the measurements
Too many variants for aggregation/delivery:
OCCI-mixins
Mixins are classified using tags (sort of subtyping)
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
This is represented as a collector link from the sensor to
the resource
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
This is represented as a collector link from the sensor to
the resource
The generic attributes of a collector correspond to the
sampling period:
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
This is represented as a collector link from the sensor to
the resource
The generic attributes of a collector correspond to the
sampling period:
The sampling period
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
This is represented as a collector link from the sensor to
the resource
The generic attributes of a collector correspond to the
sampling period:
The sampling period
The accuracy of the sampling period
OCCI Monitoring
Augusto Ciuffoletti
Extract measurements
This is an ability that a sensor has with respect to a real
resource
Capability of extracting measurements (e.g., through
resource instrumentation)
This is represented as a collector link from the sensor to
the resource
The generic attributes of a collector correspond to the
sampling period:
The sampling period
The accuracy of the sampling period
OCCI-mixins are introduced to specify the measurement
technique used
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
By defining tagged mixins, the provider describes the
monitoring capabilities offered to the user
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
By defining tagged mixins, the provider describes the
monitoring capabilities offered to the user
Next slides describe three such tags:
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
By defining tagged mixins, the provider describes the
monitoring capabilities offered to the user
Next slides describe three such tags:
metric specific for collector links
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
By defining tagged mixins, the provider describes the
monitoring capabilities offered to the user
Next slides describe three such tags:
metric specific for collector links
aggregator specific for sensor resources
OCCI Monitoring
Augusto Ciuffoletti
Mixin sub-typing: the tags
According with the OCCI core specification a mixin with
no attributes (a tag) can be associated to another mixin
as a sort of label
Syntactic and semantic restrictions can be introduced
for mixins with a certain label, thus supporting a
specification
By defining tagged mixins, the provider describes the
monitoring capabilities offered to the user
Next slides describe three such tags:
metric specific for collector links
aggregator specific for sensor resources
publisher specific for sensor resources
OCCI Monitoring
Augusto Ciuffoletti
The metric tag
The tag metric is associated with a measurement
technique, and is related with a collector link;
OCCI Monitoring
Augusto Ciuffoletti
The metric tag
The tag metric is associated with a measurement
technique, and is related with a collector link;
The mixin that has the metric tag has the following
attributes:
OCCI Monitoring
Augusto Ciuffoletti
The metric tag
The tag metric is associated with a measurement
technique, and is related with a collector link;
The mixin that has the metric tag has the following
attributes:
metric attribute strings that are used as an identifier to
refer to the output measurement stream
OCCI Monitoring
Augusto Ciuffoletti
The metric tag
The tag metric is associated with a measurement
technique, and is related with a collector link;
The mixin that has the metric tag has the following
attributes:
metric attribute strings that are used as an identifier to
refer to the output measurement stream
control attributes used to control the measurement
process (e.g. packet length of a ping)
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
an aggregator mixin is related with a sensor resource
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
an aggregator mixin is related with a sensor resource
the mixin with the aggregator tag are characterized by:
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
an aggregator mixin is related with a sensor resource
the mixin with the aggregator tag are characterized by:
input attributes strings that are used as an identifier to
refer to input measurement streams
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
an aggregator mixin is related with a sensor resource
the mixin with the aggregator tag are characterized by:
input attributes strings that are used as an identifier to
refer to input measurement streams
control attributes that are parameters for the
aggregation function (e.g. the gain in an
EWMA)
OCCI Monitoring
Augusto Ciuffoletti
The aggregator tag
the tag aggregator is associated with a mixin that
implements an algorithm for monitoring data
aggregation
an aggregator mixin is related with a sensor resource
the mixin with the aggregator tag are characterized by:
input attributes strings that are used as an identifier to
refer to input measurement streams
control attributes that are parameters for the
aggregation function (e.g. the gain in an
EWMA)
metric attributes strings that are used as an identifier to
refer to the output measurement stream
OCCI Monitoring
Augusto Ciuffoletti
The publisher tag
the tag publisher is associated with a mixin that
implements a technique to deliver the data outside the
monitoring infrastructure
OCCI Monitoring
Augusto Ciuffoletti
The publisher tag
the tag publisher is associated with a mixin that
implements a technique to deliver the data outside the
monitoring infrastructure
a publisher mixin is related with a sensor resource
OCCI Monitoring
Augusto Ciuffoletti
The publisher tag
the tag publisher is associated with a mixin that
implements a technique to deliver the data outside the
monitoring infrastructure
a publisher mixin is related with a sensor resource
the mixin with a publisher tag are characterized by:
OCCI Monitoring
Augusto Ciuffoletti
The publisher tag
the tag publisher is associated with a mixin that
implements a technique to deliver the data outside the
monitoring infrastructure
a publisher mixin is related with a sensor resource
the mixin with a publisher tag are characterized by:
input attribute a string that is used as an identifier to
refer to input measurement stream
OCCI Monitoring
Augusto Ciuffoletti
The publisher tag
the tag publisher is associated with a mixin that
implements a technique to deliver the data outside the
monitoring infrastructure
a publisher mixin is related with a sensor resource
the mixin with a publisher tag are characterized by:
input attribute a string that is used as an identifier to
refer to input measurement stream
control attributes that are parameters for the publishing
function (e.g. the UDP port that is used
for streaming)
OCCI Monitoring
Augusto Ciuffoletti
The role of metric and input attributes
they describe the flow of monitoring data
OCCI Monitoring
Augusto Ciuffoletti
The role of metric and input attributes
they describe the flow of monitoring data
their values are unique identifiers in a scope
corresponding to a sensor and all outgoing collectors
OCCI Monitoring
Augusto Ciuffoletti
The role of metric and input attributes
they describe the flow of monitoring data
their values are unique identifiers in a scope
corresponding to a sensor and all outgoing collectors
the provider is free to implement the transport of the
measurement stream in the most convenient way
OCCI Monitoring
Augusto Ciuffoletti
Shortcuts for simple use cases
here metric mixin, can be associated directly to the
monitored resource and has a web service interface
OCCI Monitoring
Augusto Ciuffoletti
Shortcuts for simple use cases
here metric mixin, can be associated directly to the
monitored resource and has a web service interface
a tagged mixin can be associated with a generic
resource or link, avoiding the definition of a sensor or
collector
OCCI Monitoring
Augusto Ciuffoletti
Shortcuts for simple use cases
here metric mixin, can be associated directly to the
monitored resource and has a web service interface
a tagged mixin can be associated with a generic
resource or link, avoiding the definition of a sensor or
collector
shortcuts effectively help very simple use cases, but are
generally a source of inefficiency and complexity
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
The resources we want to monitor
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Create one Sensor resource
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Use two collectors to define the measurement activiy
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Associate two metric mixins to the Collector X
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
And another two metric mixins to the Collector Y
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Associate two aggregator mixins to the Sensor
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
One publisher is going to use raw data from the collector
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Another is going to receive measurements from the
aggregators
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
A frame for Collector X and its mixins
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
... one for Collector Y...
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
... one for the sensor
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
The scope of the Sensor (for metric streams ids)
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Feeding the aggregators: a,b,d are measurement stream ids
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Feeding publisher 2: aggregated (f,g) and raw data (e)
OCCI Monitoring
Augusto Ciuffoletti
Step by step design of a monitoring infrastructure
Feeding publisher 1: measurement stream b is multicast
OCCI Monitoring
Augusto Ciuffoletti
Also in the document
Conformance profiles: to accomodate the presence of
providers that do not implement a monitoring interface
OCCI Monitoring
Augusto Ciuffoletti
Also in the document
Conformance profiles: to accomodate the presence of
providers that do not implement a monitoring interface
Security issues
OCCI Monitoring
Augusto Ciuffoletti
Also in the document
Conformance profiles: to accomodate the presence of
providers that do not implement a monitoring interface
Security issues
A detailed example using the http rendering
OCCI Monitoring
Augusto Ciuffoletti
Also in the document
Conformance profiles: to accomodate the presence of
providers that do not implement a monitoring interface
Security issues
A detailed example using the http rendering
...and several bugs.
OCCI Monitoring
Augusto Ciuffoletti
Also in the document
Conformance profiles: to accomodate the presence of
providers that do not implement a monitoring interface
Security issues
A detailed example using the http rendering
...and several bugs.
That’s all...

More Related Content

Similar to Extending the OCCI API with monitoring capabilities

OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
Augusto Ciuffoletti
 
Fitbit-Final Presentation
Fitbit-Final PresentationFitbit-Final Presentation
Fitbit-Final PresentationAvik Das
 
SpringBoot 3 Observability
SpringBoot 3 ObservabilitySpringBoot 3 Observability
SpringBoot 3 Observability
Knoldus Inc.
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
tsteh
 
04 intel v_tune_session_05
04 intel v_tune_session_0504 intel v_tune_session_05
04 intel v_tune_session_05
Vivek chan
 
UCIAD overview
UCIAD overviewUCIAD overview
UCIAD overview
Mathieu d'Aquin
 
Creating aggregated Sensu monitors, or how to monitor a group of monitors
Creating aggregated Sensu monitors, or how to monitor a group of monitorsCreating aggregated Sensu monitors, or how to monitor a group of monitors
Creating aggregated Sensu monitors, or how to monitor a group of monitors
Maggie Moreno
 
Monitoring Models
Monitoring ModelsMonitoring Models
Monitoring Models
Eng Teong Cheah
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET Journal
 
COIT20270 Application Development for Mobile PlatformsWeek 4.docx
COIT20270 Application Development for Mobile PlatformsWeek 4.docxCOIT20270 Application Development for Mobile PlatformsWeek 4.docx
COIT20270 Application Development for Mobile PlatformsWeek 4.docx
mary772
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
SilvaGraf83
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
IRJET Journal
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architecture
Vishnupriya T H
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
Debjyoti Ghosh
 
Wearable Gait Classification Using STM Sensortile
Wearable Gait Classification Using STM SensortileWearable Gait Classification Using STM Sensortile
Wearable Gait Classification Using STM Sensortile
Shayan Mamaghani
 
Android location and sensors API
Android location and sensors APIAndroid location and sensors API
Android location and sensors API
eleksdev
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
IOSR Journals
 
Blue eyes
Blue eyesBlue eyes
IRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone SensorsIRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone Sensors
IRJET Journal
 
Threshold based filtering technique for efficient moving object detection and...
Threshold based filtering technique for efficient moving object detection and...Threshold based filtering technique for efficient moving object detection and...
Threshold based filtering technique for efficient moving object detection and...
eSAT Journals
 

Similar to Extending the OCCI API with monitoring capabilities (20)

OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Fitbit-Final Presentation
Fitbit-Final PresentationFitbit-Final Presentation
Fitbit-Final Presentation
 
SpringBoot 3 Observability
SpringBoot 3 ObservabilitySpringBoot 3 Observability
SpringBoot 3 Observability
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
04 intel v_tune_session_05
04 intel v_tune_session_0504 intel v_tune_session_05
04 intel v_tune_session_05
 
UCIAD overview
UCIAD overviewUCIAD overview
UCIAD overview
 
Creating aggregated Sensu monitors, or how to monitor a group of monitors
Creating aggregated Sensu monitors, or how to monitor a group of monitorsCreating aggregated Sensu monitors, or how to monitor a group of monitors
Creating aggregated Sensu monitors, or how to monitor a group of monitors
 
Monitoring Models
Monitoring ModelsMonitoring Models
Monitoring Models
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
 
COIT20270 Application Development for Mobile PlatformsWeek 4.docx
COIT20270 Application Development for Mobile PlatformsWeek 4.docxCOIT20270 Application Development for Mobile PlatformsWeek 4.docx
COIT20270 Application Development for Mobile PlatformsWeek 4.docx
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architecture
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
 
Wearable Gait Classification Using STM Sensortile
Wearable Gait Classification Using STM SensortileWearable Gait Classification Using STM Sensortile
Wearable Gait Classification Using STM Sensortile
 
Android location and sensors API
Android location and sensors APIAndroid location and sensors API
Android location and sensors API
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
IRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone SensorsIRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone Sensors
 
Threshold based filtering technique for efficient moving object detection and...
Threshold based filtering technique for efficient moving object detection and...Threshold based filtering technique for efficient moving object detection and...
Threshold based filtering technique for efficient moving object detection and...
 

More from Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
Augusto Ciuffoletti
 
0 basic
0 basic0 basic
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
Augusto Ciuffoletti
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
Augusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
Augusto Ciuffoletti
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
Augusto Ciuffoletti
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
Augusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
Augusto Ciuffoletti
 
The wandering token
The wandering tokenThe wandering token
The wandering token
Augusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
Augusto Ciuffoletti
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membershipAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
Augusto Ciuffoletti
 

More from Augusto Ciuffoletti (14)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
The wandering token
The wandering tokenThe wandering token
The wandering token
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membership
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Extending the OCCI API with monitoring capabilities

  • 1. OCCI Monitoring Augusto Ciuffoletti OCCI Monitoring Extending the OCCI API with monitoring capabilities Augusto Ciuffoletti Dept. of Computer Science - Univ. of Pisa September 13, 2013
  • 2. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence
  • 3. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring
  • 4. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring The user may be in its turn a service provider (inside monitoring)
  • 5. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring The user may be in its turn a service provider (inside monitoring) The user may simply want to verify the quality of the service (outside monitoring)
  • 6. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring The user may be in its turn a service provider (inside monitoring) The user may simply want to verify the quality of the service (outside monitoring) In both cases, the user needs the tools to define resource monitoring
  • 7. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring The user may be in its turn a service provider (inside monitoring) The user may simply want to verify the quality of the service (outside monitoring) In both cases, the user needs the tools to define resource monitoring Keep into account the case of a composite service (many providers)
  • 8. OCCI Monitoring Augusto Ciuffoletti Motivation SLA is a defined target to obtain user confidence SLA is tightly related with monitoring, so we start from cloud monitoring The user may be in its turn a service provider (inside monitoring) The user may simply want to verify the quality of the service (outside monitoring) In both cases, the user needs the tools to define resource monitoring Keep into account the case of a composite service (many providers) A simple API aligned with OCCI
  • 9. OCCI Monitoring Augusto Ciuffoletti Basic functions Monitoring is made of three basic activities
  • 10. OCCI Monitoring Augusto Ciuffoletti Basic functions Monitoring is made of three basic activities extract operational parameters from a Resource
  • 11. OCCI Monitoring Augusto Ciuffoletti Basic functions Monitoring is made of three basic activities extract operational parameters from a Resource gather the operational parameters to obtain the measure of a metric of interest
  • 12. OCCI Monitoring Augusto Ciuffoletti Basic functions Monitoring is made of three basic activities extract operational parameters from a Resource gather the operational parameters to obtain the measure of a metric of interest deliver the measurement to the relevant party
  • 13. OCCI Monitoring Augusto Ciuffoletti Aggregate and deliver Distiguished activities that need the provision of computing, storage, networking resources
  • 14. OCCI Monitoring Augusto Ciuffoletti Aggregate and deliver Distiguished activities that need the provision of computing, storage, networking resources Tightly integrated, under control of the provider
  • 15. OCCI Monitoring Augusto Ciuffoletti Aggregate and deliver Distiguished activities that need the provision of computing, storage, networking resources Tightly integrated, under control of the provider Candidate for the introduction of a new kind of resource: the Sensor
  • 16. OCCI Monitoring Augusto Ciuffoletti Aggregate and deliver Distiguished activities that need the provision of computing, storage, networking resources Tightly integrated, under control of the provider Candidate for the introduction of a new kind of resource: the Sensor The user that wants to exert monitoring instantiates (and pays for) a Sensor
  • 17. OCCI Monitoring Augusto Ciuffoletti Aggregate and deliver Distiguished activities that need the provision of computing, storage, networking resources Tightly integrated, under control of the provider Candidate for the introduction of a new kind of resource: the Sensor The user that wants to exert monitoring instantiates (and pays for) a Sensor Note: a cost is associated to the Sensor, although this is not explicit in the definition of monitoring
  • 18. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time
  • 19. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time The native attributes of a Sensor are:
  • 20. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time The native attributes of a Sensor are: How frequently it produces a new measurement
  • 21. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time The native attributes of a Sensor are: How frequently it produces a new measurement During which time lapse it performs the measurements
  • 22. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time The native attributes of a Sensor are: How frequently it produces a new measurement During which time lapse it performs the measurements Too many variants for aggregation/delivery: OCCI-mixins
  • 23. OCCI Monitoring Augusto Ciuffoletti Basic functions The monitoring function is controlled by time The native attributes of a Sensor are: How frequently it produces a new measurement During which time lapse it performs the measurements Too many variants for aggregation/delivery: OCCI-mixins Mixins are classified using tags (sort of subtyping)
  • 24. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource
  • 25. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation)
  • 26. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation) This is represented as a collector link from the sensor to the resource
  • 27. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation) This is represented as a collector link from the sensor to the resource The generic attributes of a collector correspond to the sampling period:
  • 28. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation) This is represented as a collector link from the sensor to the resource The generic attributes of a collector correspond to the sampling period: The sampling period
  • 29. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation) This is represented as a collector link from the sensor to the resource The generic attributes of a collector correspond to the sampling period: The sampling period The accuracy of the sampling period
  • 30. OCCI Monitoring Augusto Ciuffoletti Extract measurements This is an ability that a sensor has with respect to a real resource Capability of extracting measurements (e.g., through resource instrumentation) This is represented as a collector link from the sensor to the resource The generic attributes of a collector correspond to the sampling period: The sampling period The accuracy of the sampling period OCCI-mixins are introduced to specify the measurement technique used
  • 31. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label
  • 32. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification
  • 33. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification By defining tagged mixins, the provider describes the monitoring capabilities offered to the user
  • 34. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification By defining tagged mixins, the provider describes the monitoring capabilities offered to the user Next slides describe three such tags:
  • 35. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification By defining tagged mixins, the provider describes the monitoring capabilities offered to the user Next slides describe three such tags: metric specific for collector links
  • 36. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification By defining tagged mixins, the provider describes the monitoring capabilities offered to the user Next slides describe three such tags: metric specific for collector links aggregator specific for sensor resources
  • 37. OCCI Monitoring Augusto Ciuffoletti Mixin sub-typing: the tags According with the OCCI core specification a mixin with no attributes (a tag) can be associated to another mixin as a sort of label Syntactic and semantic restrictions can be introduced for mixins with a certain label, thus supporting a specification By defining tagged mixins, the provider describes the monitoring capabilities offered to the user Next slides describe three such tags: metric specific for collector links aggregator specific for sensor resources publisher specific for sensor resources
  • 38. OCCI Monitoring Augusto Ciuffoletti The metric tag The tag metric is associated with a measurement technique, and is related with a collector link;
  • 39. OCCI Monitoring Augusto Ciuffoletti The metric tag The tag metric is associated with a measurement technique, and is related with a collector link; The mixin that has the metric tag has the following attributes:
  • 40. OCCI Monitoring Augusto Ciuffoletti The metric tag The tag metric is associated with a measurement technique, and is related with a collector link; The mixin that has the metric tag has the following attributes: metric attribute strings that are used as an identifier to refer to the output measurement stream
  • 41. OCCI Monitoring Augusto Ciuffoletti The metric tag The tag metric is associated with a measurement technique, and is related with a collector link; The mixin that has the metric tag has the following attributes: metric attribute strings that are used as an identifier to refer to the output measurement stream control attributes used to control the measurement process (e.g. packet length of a ping)
  • 42. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation
  • 43. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation an aggregator mixin is related with a sensor resource
  • 44. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation an aggregator mixin is related with a sensor resource the mixin with the aggregator tag are characterized by:
  • 45. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation an aggregator mixin is related with a sensor resource the mixin with the aggregator tag are characterized by: input attributes strings that are used as an identifier to refer to input measurement streams
  • 46. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation an aggregator mixin is related with a sensor resource the mixin with the aggregator tag are characterized by: input attributes strings that are used as an identifier to refer to input measurement streams control attributes that are parameters for the aggregation function (e.g. the gain in an EWMA)
  • 47. OCCI Monitoring Augusto Ciuffoletti The aggregator tag the tag aggregator is associated with a mixin that implements an algorithm for monitoring data aggregation an aggregator mixin is related with a sensor resource the mixin with the aggregator tag are characterized by: input attributes strings that are used as an identifier to refer to input measurement streams control attributes that are parameters for the aggregation function (e.g. the gain in an EWMA) metric attributes strings that are used as an identifier to refer to the output measurement stream
  • 48. OCCI Monitoring Augusto Ciuffoletti The publisher tag the tag publisher is associated with a mixin that implements a technique to deliver the data outside the monitoring infrastructure
  • 49. OCCI Monitoring Augusto Ciuffoletti The publisher tag the tag publisher is associated with a mixin that implements a technique to deliver the data outside the monitoring infrastructure a publisher mixin is related with a sensor resource
  • 50. OCCI Monitoring Augusto Ciuffoletti The publisher tag the tag publisher is associated with a mixin that implements a technique to deliver the data outside the monitoring infrastructure a publisher mixin is related with a sensor resource the mixin with a publisher tag are characterized by:
  • 51. OCCI Monitoring Augusto Ciuffoletti The publisher tag the tag publisher is associated with a mixin that implements a technique to deliver the data outside the monitoring infrastructure a publisher mixin is related with a sensor resource the mixin with a publisher tag are characterized by: input attribute a string that is used as an identifier to refer to input measurement stream
  • 52. OCCI Monitoring Augusto Ciuffoletti The publisher tag the tag publisher is associated with a mixin that implements a technique to deliver the data outside the monitoring infrastructure a publisher mixin is related with a sensor resource the mixin with a publisher tag are characterized by: input attribute a string that is used as an identifier to refer to input measurement stream control attributes that are parameters for the publishing function (e.g. the UDP port that is used for streaming)
  • 53. OCCI Monitoring Augusto Ciuffoletti The role of metric and input attributes they describe the flow of monitoring data
  • 54. OCCI Monitoring Augusto Ciuffoletti The role of metric and input attributes they describe the flow of monitoring data their values are unique identifiers in a scope corresponding to a sensor and all outgoing collectors
  • 55. OCCI Monitoring Augusto Ciuffoletti The role of metric and input attributes they describe the flow of monitoring data their values are unique identifiers in a scope corresponding to a sensor and all outgoing collectors the provider is free to implement the transport of the measurement stream in the most convenient way
  • 56. OCCI Monitoring Augusto Ciuffoletti Shortcuts for simple use cases here metric mixin, can be associated directly to the monitored resource and has a web service interface
  • 57. OCCI Monitoring Augusto Ciuffoletti Shortcuts for simple use cases here metric mixin, can be associated directly to the monitored resource and has a web service interface a tagged mixin can be associated with a generic resource or link, avoiding the definition of a sensor or collector
  • 58. OCCI Monitoring Augusto Ciuffoletti Shortcuts for simple use cases here metric mixin, can be associated directly to the monitored resource and has a web service interface a tagged mixin can be associated with a generic resource or link, avoiding the definition of a sensor or collector shortcuts effectively help very simple use cases, but are generally a source of inefficiency and complexity
  • 59. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure The resources we want to monitor
  • 60. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Create one Sensor resource
  • 61. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Use two collectors to define the measurement activiy
  • 62. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Associate two metric mixins to the Collector X
  • 63. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure And another two metric mixins to the Collector Y
  • 64. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Associate two aggregator mixins to the Sensor
  • 65. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure One publisher is going to use raw data from the collector
  • 66. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Another is going to receive measurements from the aggregators
  • 67. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure A frame for Collector X and its mixins
  • 68. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure ... one for Collector Y...
  • 69. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure ... one for the sensor
  • 70. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure The scope of the Sensor (for metric streams ids)
  • 71. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Feeding the aggregators: a,b,d are measurement stream ids
  • 72. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Feeding publisher 2: aggregated (f,g) and raw data (e)
  • 73. OCCI Monitoring Augusto Ciuffoletti Step by step design of a monitoring infrastructure Feeding publisher 1: measurement stream b is multicast
  • 74. OCCI Monitoring Augusto Ciuffoletti Also in the document Conformance profiles: to accomodate the presence of providers that do not implement a monitoring interface
  • 75. OCCI Monitoring Augusto Ciuffoletti Also in the document Conformance profiles: to accomodate the presence of providers that do not implement a monitoring interface Security issues
  • 76. OCCI Monitoring Augusto Ciuffoletti Also in the document Conformance profiles: to accomodate the presence of providers that do not implement a monitoring interface Security issues A detailed example using the http rendering
  • 77. OCCI Monitoring Augusto Ciuffoletti Also in the document Conformance profiles: to accomodate the presence of providers that do not implement a monitoring interface Security issues A detailed example using the http rendering ...and several bugs.
  • 78. OCCI Monitoring Augusto Ciuffoletti Also in the document Conformance profiles: to accomodate the presence of providers that do not implement a monitoring interface Security issues A detailed example using the http rendering ...and several bugs. That’s all...