Virtual Networks Comparison Solutions for Community Clouds

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Networks Comparison Solutions for Community Clouds University of Business and Technology in Kosovo UBT Knowledge Center Theses and Dissertations Student Work Fall 9-2016 Virtual Networks Comparison Solutions for Community Clouds Adnan Lupçi University for Business and Technology - UBT Follow this and additional works at: https://knowledgecenter.ubt-uni.net/etd Part of the Computer Sciences Commons Recommended Citation Lupçi, Adnan, "Virtual Networks Comparison Solutions for Community Clouds" (2016). Theses and Dissertations. 1180. https://knowledgecenter.ubt-uni.net/etd/1180 This Thesis is brought to you for free and open access by the Student Work at UBT Knowledge Center. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of UBT Knowledge Center. For more information, please contact [email protected]. College UBT Department of Computer Science and Engineering Virtual Networks Comparison Solutions for Community Clouds Student: Adnan Lupçi September 2016 Prishtinë College UBT Department of Computer Science and Engineering Bachelor Thesis Academic Year 2012-2016 Student: Adnan Lupçi Virtual Networks Comparison Solutions for Community Clouds Mentor: Fisnik Prekazi September 2016 This Thesis was prepared and submitted in partial fulfillment of the requirements for the Bachelor Degree Abstract Cloud computing has a huge importance and big impact nowadays on the IT world. The idea of community clouds has emerged recently in order to satisfy several user expectations. Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services. Albanian Cloud Community is an Albanian project that aims to provide a design and implementation of a self-configured, fully distributed, decentralized, scalable and robust cloud for a community of users across a community network. One of the aspects to analyze in this design is which kind of Virtual Private Network (VPN) is going to be used to interconnect the nodes of the community members interested in access cloud services. In this thesis we will study, compare and analyze the possibility of using Tinc, IPOP or SDN-based solutions such as OpenFlow to establish such a VPN. i Acknowledgements This thesis would have been incomplete without the contributions of the following people. First and foremost, I would like to express my sincere gratitude to my mentor prof. MSc. Fisnik Prekazi who despite his busy schedule devoted a great deal of time in supervising me. Thank you very much for your constant confidence and encouraging support throughout the process of writing this thesis. I will also have to show appreciation to the management of the department of Computer Science for the period of my Bachelor studies here at University of Business and Technology – UBT in Prishtina. Lastly, I am very grateful to my Family, who always expressed full hope and encouragement toward me. Without their support, this thesis would prove unsuccessful. Prishtinë, 02 September 2016 Adnan Lupçi ii Table of Content Contents 1. Introduction ...................................................................................................................................... 4 2. Literature Review ................................................................................................................................. 6 2.1 Cloud Computing ........................................................................................................................... 6 2.2 Community Clouds ........................................................................................................................ 6 2.3 Virtual Private Networks ................................................................................................................ 8 2.3.1 Tinc VPN .................................................................................................................................. 9 2.3.2 IPOP ...................................................................................................................................... 10 2.4 Software-Defined Networks ......................................................................................................... 11 3. Problem Statement ............................................................................................................................ 14 3.1 Goals ............................................................................................................................................ 14 4. Methodology ...................................................................................................................................... 15 5. Case Study .......................................................................................................................................... 16 5.1 Solutions Study ............................................................................................................................. 16 5.1.1 Tinc VPN ................................................................................................................................ 16 5.1.2 IPOP ....................................................................................................................................... 18 5.1.3 SDN ........................................................................................................................................ 21 5.1.4 Feature Comparison Table .................................................................................................... 21 5.2 Tinc and IPOP Evaluation ............................................................................................................ 22 5.2.1 Tinc Test ................................................................................................................................ 22 5.2.2 Fault tolerance ...................................................................................................................... 23 5.2.3 Resource Consumption ......................................................................................................... 23 5.3 IPOP Tests .................................................................................................................................... 23 5.3.1 Latency added ....................................................................................................................... 23 5.3.2 Fault Tolerance ...................................................................................................................... 25 5.3.3 Join/Leave ............................................................................................................................. 25 5.3.4 Resources Consumption ........................................................................................................ 25 5.4 Evaluation Outcome ..................................................................................................................... 26 1 6. Conclusions and future work .......................................................................................................... 28 6.1 Conclusions .................................................................................................................................. 28 6.2 Future Work ................................................................................................................................. 29 6.2.1 Evaluation on bigger scenario ............................................................................................... 29 6.2.2 Configuration server in Tinc .................................................................................................. 29 i. IPOP bootstrapping node improvements .............................................................................. 30 7. References .......................................................................................................................................... 31 8. Appendix A: IPOP Deployment Scripts ......................................................................................... 33 List of figures Figure 1 : Architecture of Public Cloud vs Community Cloud .................................................................. 7 Figure 2 :VPN Tunnel over Internet.......................................................................................................... 9 Figure 3 :Ring topology of IPOP VPN. (source: slide 14 of ”Peer-to-peer Virtual Private Networks and Applications” by Renato Figueiredo)...................................................................................................... 11 Figure 4: Software-De_ned Network Architecture. (source: opennetworking.org) .............................. 12 Figure 5: Schema of Tinc testing environment ...................................................................................... 18 Figure 6: Schema of IPOP testing environment ..................................................................................... 20 Figure 7: Screenshot of the network crawling tool included in IPOP .................................................... 20 Figure 8: Tinc evaluation: Graph showing different
Recommended publications
  • On the Design and Implementation of IP-Over-P2P Overlay Virtual Private
    DOI:10.1587/transcom.2019CPI0001 Publicized:2019/08/05 This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. 1 Invited Paper On the Design and Implementation of IP-over-P2P Overlay Virtual Private Networks Kensworth Subratie†, Saumitra Aditya†, Vahid Daneshmand†, Kohei Ichikawa††, and Renato Figueiredo† SUMMARY The success and scale of the Internet and its protocol IP has protocols (e.g. TLS [2], [3]). As a result, distributed spurred emergent distributed technologies such as fog/edge computing and applications that run across the Internet often must deal with new application models based on distributed containerized microservices. The Internet of Things and Connected Communities are poised to build on devices without public IPv4 addresses that are behind these technologies and models and to benefit from the ability to various NAT and firewall middleboxes and must create communicate in a peer-to-peer (P2P) fashion. Ubiquitous sensing, actuating secure transport sessions for communication. While these and computing implies a scale that breaks the centralized cloud computing issues are relatively easy to handle with client-server model. Challenges stemming from limited IPv4 public addresses, the need applications, they place a burden to applications where peer- for transport layer authentication, confidentiality and integrity become a burden on developing new middleware and applications designed for the to-peer communication is needed. network’s edge. One approach - not reliant on the slow adoption of IPv6 - Emerging distributed applications in edge/fog [4], [5] is the use of virtualized overlay networks, which abstract the complexities computing are poised to benefit from the ability for IoT and of the underlying heterogeneous networks that span the components of edge nodes to communicate in a peer-to-peer fashion.
    [Show full text]
  • Comparison of Virtual Networks Solutions for Community Clouds
    KTH Royal Institute of Technology Bachelor Thesis Comparison of Virtual Networks Solutions for Community Clouds Examiner: Vladimir Vlassov Author: Albert Avellana Supervisors: Paris Carbone, Hooman Peiro Information and Communication Technology School February 2014 KTH Royal Institute of Technology Abstract Information and Communication Technology School Bachelor Thesis Comparison of Virtual Networks Solutions for Community Clouds by Albert Avellana Cloud computing has a huge importance and big impact nowadays on the IT world. The idea of community clouds has emerged recently in order to satisfy several user expectations. Clommunity is a European project that aims to provide a design and implementation of a self-configured, fully distributed, decentralized, scalable and robust cloud for a community of users across a commmunity network. One of the aspects to analyze in this design is which kind of Virtual Private Network (VPN) is going to be used to interconnect the nodes of the community members interested in access cloud services. In this thesis we will study, compare and analyze the possibility of using Tinc, IPOP or SDN-based solutions such as OpenFlow to establish such a VPN. Acknowledgements I would like to express my gratitude to all those who gave me the possibility to do this thesis in KTH. Firstly, I would like to thank Vlad for the opportunity he gave me to do this thesis and for his support. Secondly, thanks to my thesis supervisors: Paris Carbone and Hooman Peiro, who guided me through the research, helped me and gave me recommendations during this period. Also, I would like to thank F´elixFreitag and Leandro Navarro from Universitat Polit`ecnica de Catalunya for supporting me from Barcelona and make this stay in Stockholm possi- ble.
    [Show full text]
  • HIP Based Mobility for Cloudlets
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Helsingin yliopiston digitaalinen arkisto Date of acceptance Grade Instructor: D.Sc. Miika Komu Supervisor: Prof. Sasu Tarkoma HIP based mobility for Cloudlets Juhani Toivonen Master’s thesis UNIVERSITY OF HELSINKI Department of Computer Science Helsinki, Wednesday 11th November, 2015 HELSINGIN YLIOPISTO — HELSINGFORS UNIVERSITET — UNIVERSITY OF HELSINKI Tiedekunta — Fakultet — Faculty Laitos — Institution — Department Faculty of Science Department of Computer Science Tekijä — Författare — Author Juhani Toivonen Työn nimi — Arbetets titel — Title HIP based mobility for Cloudlets Oppiaine — Läroämne — Subject Computer Science Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages Master’s thesis Wednesday 11th November, 2015 69 pages + 8 appendix pages Tiivistelmä — Referat — Abstract Computation offloading can be used to leverage the resources of nearby computers to ease the computational burden of mobile devices. Cloudlets are an approach, where the client’s tasks are executed inside a virtual machine (VM) on a nearby computing element, while the client orchestrates the deployment of the VM and the remote execution in it. Mobile devices tend to move, and while moving between networks, their address is prone to change. Should a user bring their device close to a better performing Cloudlet host, migration of the original Cloudlet VM might also be desired, but their address is then prone to change as well. Communication with Cloudlets relies on the TCP/IP networking stack, which resolves address changes by terminating connections, and this seriously impairs the usefulness of Cloudlets in presence of mobility events.
    [Show full text]
  • Virtuaalikone Ja -Verkkoympäristön Hyödyntäminen Tietoverkkotekniikan Tutkimus- Ja Opetusympäristöjen Rakentamisessa
    Iikka Jaakkola Virtuaalikone ja -verkkoympäristön hyödyntäminen tietoverkkotekniikan tutkimus- ja opetusympäristöjen rakentamisessa Elektroniikan, tietoliikenteen ja automaation tiedekunta Diplomityö, joka on jätetty opinnäytteenä tarkastettavaksi diplomi-insinöörin tutkintoa varten Espoossa 10.5.2010 Työn valvoja: Prof. Jukka Manner Työn ohjaaja: TkL Markus Peuhkuri i AALTO-YLIOPISTO DIPLOMITYÖN TEKNILLINEN KORKEAKOULU TIIVISTELMÄ Tekijä: Iikka Jaakkola Työn nimi: Virtuaalikone ja -verkkoympäristön hyödyntäminen tietoverkkotekniikan tutkimus- ja opetusympäristöjen rakentamisessa Päivämäärä: 10.5.2010 Kieli: suomi Sivumäärä:55+26 Elektroniikan, tietoliikenteen ja automaation tiedekunta Tietoliikenne- ja tietoverkkotekniikan laitos Professuuri: Tietoverkot Koodi: S-38 Valvoja: Prof. Jukka Manner Ohjaaja: TkL Markus Peuhkuri Työn tavoitteena oli selvittää virtuaalisen tutkimusverkkoyhteyden tarvetta, vaatimuk- sia ja toteutuskelpoista tuomista tutkijoiden ja muiden tahojen, kuten opiskelijoiden, käyttöön. Virtuaalinen ympäristö oli tarkoitus rakentaa maksutta saatavilla olevien vir- tuaalikone- ja VPN-asiakasyhteysohjelmistojen varaan ja sen tulisi olla mahdollista asentaa tutkijoiden keskitetysti hallittuihin työasemiin. Lisäksi tutkittiin ratkaisun käyt- tökohteita, joista tärkeimpänä oli testiverkkoihin yhdistäminen. Ratkaisulle asetettavia vaatimuksia selvitettiin tietoturvapolitiikan, loppukäyttäjien, tietojärjestelmien ylläpi- don ja laitteistovaatimusten kannalta. Käyttäjien ja ylläpidon näkemyksiä kyseltiin haastatteluin ja kyselyin.
    [Show full text]
  • On the Design of Autonomic, Decentralized Vpns
    On the Design of Autonomic, Decentralized VPNs David Isaac Wolinsky, Kyungyong Lee, P. Oscar Boykin, Renato Figueiredo University of Florida Abstract—Decentralized and P2P (peer-to-peer) VPNs (virtual whereas existing decentralized solutions require manual con- private networks) have recently become quite popular for con- figuration of links between peers, which is beyond the scope necting users in small to medium collaborative environments, of Archer’s target users. Current P2P VPN approaches either such as academia, businesses, and homes. In the realm of VPNs, there exist centralized, decentralized, and P2P solutions. Central- lack scalability or proper security components to be useful for ized systems require a single entity to provide and manage VPN VPN approaches. server(s); decentralized approaches allow more than one entity to We began our original foray into user-friendly VPN ap- share the management responsibility for the VPN infrastructure, proaches with IPOP [2]. Previous work on IPOP focused on while existing P2P approaches rely on a centralized infrastructure the routing mechanisms and address allocation with multiple but allow users to bypass it to form direct low-latency, high- throughput links between peers. In this paper, we describe a virtual networks (VNs) sharing a single P2P overlay. Though novel VPN architecture that can claim to be both decentralized a shared has significant drawbacks as misconfigured or ma- and P2P, using methods that lower the entry barrier for VPN licious peers could disable the entire overlay, rendering all deployment compared to other VPN approaches. Our solution VPNs useless, and the system would have to be recreated as extends existing work on IP-over-P2P (IPOP) overlay networks to there exists no methods to remove the peer from the overlay.
    [Show full text]
  • User-Defined P2P Virtual Network Overlays for Ad-Hoc Collaboration
    EAI Endorsed Transactions on Collaborative Computing Research Article TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration 1 1 1 2 1 Pierre St Juste∗ , Kyuho Jeong , Heungsik Eom , Corey Baker , Renato Figueiredo 1Advanced Computing and Information Systems Lab, 2Wireless and Mobile Systems Lab Electrical and Computer Engineering, University of Florida, Gainesville, FL, 32611, USA Abstract Virtual private networking (VPN) has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic is tunneled through a VPN gateway. Nonetheless, there are several use case scenarios that require a model where end-to-end VPN links are tunneled upon existing Internet infrastructure in a peer-to-peer (P2P) fashion, removing the bottleneck of a centralized VPN gateway. We propose a novel virtual network — TinCan — based on peer- to-peer private network tunnels. It reuses existing standards and implementations of services for discovery notification (XMPP), reflection (STUN) and relaying (TURN), facilitating configuration. In this approach, trust relationships maintained by centralized (or federated) services are automatically mapped to TinCan links. In one use scenario, TinCan allows unstructured P2P overlays connecting trusted end-user devices — while only requiring VPN software on user devices and leveraging online social network (OSN) infrastructure already widely deployed. This paper describes the architecture and design of TinCan and presents an experimental evaluation of a prototype supporting Windows, Linux, and Android mobile devices.
    [Show full text]
  • Design, Implementation, and Applications of Peer-To-Peer Virtual Private Networks from Grids to Social Networks
    DESIGN, IMPLEMENTATION, AND APPLICATIONS OF PEER-TO-PEER VIRTUAL PRIVATE NETWORKS FROM GRIDS TO SOCIAL NETWORKS By DAVID ISAAC WOLINSKY A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2011 ⃝c 2011 David Isaac Wolinsky 2 I dedicate this to family and those whose have supported me. 3 ACKNOWLEDGMENTS Over the past 5 years, there has been many constants and many changes, soon there will be only changes. Though through it all, I have been surrounded by wonderful people who have helped and encouraged me to succeed and can only hope that the relationship was beneficial for them as well. To begin naming names, I will begin with my advisor, Professor Renato Figueiredo. I greatly appreciate the time he has invested into me and his wisdom shared with me. I am greatly blessed to have worked so closely with a professor whom I work so well with. That leads me into Professor P. Oscar Boykin, the other head of the ACIS P2P Group, who along with Professor Figueiredo, molded me into the bold Ph.D. I am today. Professor Boykin also helped enrich my design and development skills, for which, I am extremely grateful. Rounding out the ACIS professors, leads to Professor Jose Fortes, who has always been a good source of wisdom and encouragement. As leader of the ACIS lab, Professor Fortes has always been very generous in providing both his time, which is why I am very appreciative to have him as a member on my Ph.D.
    [Show full text]
  • Openvpn for Windows 7 Free Download Openvpn 2.5.3
    openvpn for windows 7 free download OpenVPN 2.5.3. OpenVPN is a robust and highly flexible VPN daemon. OpenVPN supports SSL/TLS security, ethernet bridging, TCP or UDP tunnel transport through proxies or NAT, support for dynamic IP addresses and DHCP, scalability to hundreds or thousands of users, and portability to most major OS platforms. OpenVPN is tightly bound to the OpenSSL library, and derives much of its crypto capabilities from it. OpenVPN supports conventional encryption using a pre-shared secret key (Static Key mode) or public key security (SSL/TLS mode) using client & server certificates. OpenVPN also supports non-encrypted TCP/UDP tunnels. OpenVPN is designed to work with the TUN/TAP virtual networking interface that exists on most platforms. Overall, OpenVPN aims to offer many of the key features of IPSec but with a relatively lightweight footprint. With OpenVPN, you can: Tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port, Configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients, Use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet, Use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library, Choose between static-key based conventional encryption or certificate-based public key encryption, Use static, pre-shared keys or TLS-based dynamic key exchange, Use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization, Tunnel networks whose public endpoints are dynamic such as DHCP or dial- in clients, Tunnel networks through connection-oriented stateful firewalls without having to use explicit firewall rules, Tunnel networks over NAT, Create secure ethernet bridges using virtual tap devices, and Control OpenVPN using a GUI on Windows or Mac OS X.
    [Show full text]
  • Cisco Bandwidth Quality Manager User Guide Software Release 3.2
    Cisco Bandwidth Quality Manager User Guide Software Release 3.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-11097-03 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • A Software-Defined Overlay Virtual Network with Self-Organizing Small-World Topology and Forwarding for Fog Computing
    A SOFTWARE-DEFINED OVERLAY VIRTUAL NETWORK WITH SELF-ORGANIZING SMALL-WORLD TOPOLOGY AND FORWARDING FOR FOG COMPUTING By KENSWORTH C. SUBRATIE A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2019 © 2019 Kensworth C. Subratie This dissertation enshrines the memories of your love, aspirations, and selfless sacrifices. Dedicated to Myrtle Doocran. ACKNOWLEDGMENTS I acknowledge and thank the many people who have influenced and contributed to my progress throughout my doctoral studies. Foremost, I thank my advisor Dr. Renato Figueiredo for his ongoing guidance through this journey. Next, I thank Dr. Jose Fortes for presenting the opportunities that have challenged me to grow as a researcher. I also thank the rest of my PhD committee for their valuable comments, feedback and time. To my peers in the ACIS Lab, both its current and graduated members, with whom I worked alongside over the years, I thank you for making my time at UF a very enjoyable experience. I would like to thank Dr. Paul Hansen, Dr. Cayelan Carey and the members of the PRAGMA and CENTRA groups whose collaborations and support have broadened my insight. Additionally, the experience I garnered from internships with the IBM, Intel and NICT research groups has been invaluable and is sincerely appreciated. Finally, I must express my heartfelt gratitude to my family and loved ones for their ongoing patience, encouragement, support and willingness to attempt to understand what I do and why I chose to do it. This material is based upon work supported in part by the National Science Foundation under Grants No.
    [Show full text]
  • On the Design, Performance, and Management of Virtual Networks for Grid Computing
    ON THE DESIGN, PERFORMANCE, AND MANAGEMENT OF VIRTUAL NETWORKS FOR GRID COMPUTING By MAURÍCIO TSUGAWA A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2009 1 © 2009 Maurício Tsugawa 2 To all who, directly or indirectly, contributed to make this milestone possible 3 ACKNOWLEDGMENTS I would like to express my sincere gratitude to my advisor, Prof. José Fortes, for his invaluable guidance and support throughout my many years as graduate student. Prof. Fortes presented me with opportunities to pursue challenging research problems; always made time to work with me through his busy schedule; and shared his experience, helping me become a better researcher. I would like to thank Prof. Alan George, Prof. Renato Figueiredo, and Prof. Shigang Chen for serving on my supervisory committee. I would like to thank Tim Freeman and Dr. Kate Keahey for their support with Nimbus clouds, and for the opportunity to work in a "flash" internship at the Argonne National Laboratory. I would like to thank Dr. Ananth Sundararaj, Dr. Peter Dinda, Dr. Sebastien Goasguen, Dr. Sumalatha Adabala and Rick Kennel for the help in setting up the test environment at Northwestern University and Purdue University. I am thankful to Andréa Matsunaga for all her help. Special thanks to my sister, Dr. Márcia Rupnow, who always supported me. This work was funded in part by the National Science Foundation under Grants No. EIA- 9975275, EIA-0224442, ACI-0219925, EEC-0228390, EIA-0107686, EIA-0131886, OCI- 0721867 and CNS-0821622; NSF Middleware Initiative (NMI) collaborative grants ANI- 0301108/ANI-0222828, SCI-0438246.
    [Show full text]