SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
2011 IEEE Conference on Commerce and Enterprise Computing



              Assessing NoSQL Databases for Telecom
                           Applications
          Francisco Cruz                     Pedro Gomes                           Rui Oliveira                  Jos´ Pereira
                                                                                                                    e
             HASlab                            HASlab                                HASlab                        HASlab
      Universidade do Minho             Universidade do Minho                 Universidade do Minho         Universidade do Minho
         Braga, Portugal                   Braga, Portugal                       Braga, Portugal               Braga, Portugal
       fmcruz@di.uminho.pt           pedrogomes@lsd.di.uminho.pt                rco@di.uminho.pt              jop@di.uminho.pt



    Abstract—The constant evolution of access technologies are              sequently, the major online players searched for alternatives
 turning Internet access more ubiquitous, faster, better and                into building extreme large scale storage systems and the
 cheaper. In connection with the proliferation of Internet access,          result was a great set of different data stores popularly called
 Cloud Computing is changing the way users look at data, moving
 from local applications and installations to remote services,
                                                                            NoSQL: Dynamo [4], PNUTS [3], BigTable [2], Cassandra [5],
 accessible from any device. This new paradigm presents numer-              DataDroplets [7], among others. Such data stores provide
 ous opportunities that even traditional businesses like telecoms           high availability and elasticity in a distributed environment
 cannot ignore, in particular, enabling new and more cost effective         composed by a set of commodity hardware, avoiding the need
 solutions to old problems.                                                 to invest in very powerful and expensive servers to host the
    The work presented in this paper provides a detailed descrip-
 tion of how a telecom application can be migrated to a NoSQL
                                                                            database. In addition, these data stores automatically provide
 database. Particularly, by pointing out the necessary change of            replication, fail-over, load balancing and data distribution.
 how we reason about data as well as the data structures that               Nevertheless, when compared to the more mature RDBMS,
 support it, in order to take full advantage of Cloud Computing.            NoSQL databases have some fundamental limitations that
 In addition, we also present a preliminary evaluation of different         should be taken into account. They provide high scalability at
 data persistency paradigms based on a fully tunable simulation
 platform that mimics the operation of a telecom business.
                                                                            the expense of a more relaxed data consistency model and only
    Index Terms—Cloud Computing; Distributed Databases;                     provide primitive querying and searching capability. Imposing
 NoSQL; Telecom;                                                            an additional complexity to the application.
                                                                               This work aims at assessing how these solutions can be
                        I. I NTRODUCTION                                    adapted to the business model of telecommunication operator.
    The constant evolution of access technologies, wired as                 As with other large enterprises, telecommunications enter-
 the optical fiber, or wireless such as the WiMAX and LTE                    prises tend to rely on very centralised systems, and the field
 are turning Internet access more and more ubiquitous, faster,              of CC offers an innovative and important opportunity in terms
 better and cheaper. The proliferation of Internet access allows            of new concepts and paradigms. Thus, this paper describes the
 users to use services directly provided by it, which results               process of modelling required for the transition of a relational
 in a change of paradigm for the use of applications and                    model to a non-relational one, in the context of managing
 how users communicate, popularizing the paradigm known as                  customer data, services and telephone calls.
 Cloud Computing (CC). In a CC environment, the majority                       The remainder of this paper is organized as follows. Section
 of applications, as well as data, do not need to be installed              2 presents the data model used for the simulation platform.
 or stored on the user’s computer, as they are provided by the              Section 3 describes the process and differences between using
 “cloud” through dedicated service providers, also known as                 a RDBMS and a NoSQL database. Section 5 and 6 present
 Cloud Providers (CPs). The Cloud Provider is responsible,                  the workload used to benchmark the system, in order evaluate
 for example, for the storage, maintenance and backup of all                and compare the relational approach and the non-relational
 user information, and the user just has to access the platform             approach. Section 7 concludes the paper.
 provided by the CP and only pay for the services she uses and
 when she needs them [1] – a concept known as pay-as-you-go.                                      II. DATA M ODEL
    The new paradigm implies the access of millions of users                   In its core, the system presented here is responsible for
 to the same application and partly as a result, storage of                 the data management and the business decisions related to
 digital data has reached unprecedented levels [6]. A good                  customers information in relation to incoming calls. During
 example of such a applications are the social networking                   runtime, it handles the incoming calls, fetching the caller’s
 platforms like Facebook and MySpace, that have to deal                     information and subscribed services to know if they are valid
 with millions of requests everyday. But, traditional relational            and how should they be treated (tariff cost, discounts, etc.).
 databases, RDBMS (Relational Database Management Sys-                         In order to support this system, the telecom’s data model
 tem), seem to be not well suited for these environments. Con-              is composed of 7 entities (Fig. 1): Customer, Bucket, Bucket

978-0-7695-4535-6/11 $26.00 © 2011 IEEE                               267
DOI 10.1109/CEC.2011.48
Customer                                                                          However, the Cloud Computing paradigm has already proven
                                                               1
                                                                                                                                          that scaling horizontally offers the desired scalability and
                                                                                                                                          availability. In fact, scalability is achieved by adding new
                                                                                                                                          machines to the system on demand, in order to cope with
                                                              1...*         0...1
                                                                                                                                          the load in the system, and at the same time can provide
                                                   Account                          1...*
                                                                                                                                          fault-tolerance, ensuring availability. Besides, it is more cost-
 Bucket Type                                                                                                              Service
                  1...*                        *                                    *                             1...*                   effective because it relies on commodity hardware and allows
          1...*                                                *                                                                *
                                                                                                                                          a granular adaptation from small to large scenarios.
                          Bucket

                          Balance
                                                               1                            Subscribed Service
                                                                                                                                             For this case study, it was considered two different data
                                                   Tariff plan                              Priority
                          Expiration date
                                                   Id
                                                                                            Number (Network Id)                           stores: PostgreSQL and Cassandra. This choice is related
                                                   Priority
                                                   Use period
                                                                                                                                          to one of the contributions of this work: to show how a
                                                   Info (tariff per minute, etc)
                                                                                                                                          telecom’s data management system can be ported to a NoSQL
                                                                                                                                          database, oriented towards a CC environment. Additionally,
                                                                                                                                          PostgreSQL represents the typical approach using relational
                               Fig. 1: Telecom’s data model.
                                                                                                                                          database management systems (RDBMS) and, thus, will serve
                                                                                                                                          as term of comparison.
                                                                                                                                             In the platform, each incoming call is composed of four
Type, Subscribed Service, Service, Account and Tariff Plan.
                                                                                                                                          main phases: 1) the first phase evaluates what services the
   The Customer entity bears the personal information regard-
                                                                                                                                          user has subscribed verifying each one in the priority order
ing each of the telecom’s customers. In addition, this entity is
                                                                                                                                          until a valid one is found; 2) in the second phase the tariff
related to the entity Account in the sense that a customer can
                                                                                                                                          plan is queried to assess what types of buckets can be used;
be associated with one or more accounts.
                                                                                                                                          3) the third phase concerns the discovery of the account that
   The Bucket entity represents the balance associated with
                                                                                                                                          contains such entity, in fact a client can have a service in
each account and each bucket type. The Bucket Type holds
                                                                                                                                          association with a company that supports some of her costs.
information related to the type of buckets existent in the system
                                                                                                                                          4) the last phase consists of a bucket subtraction i.e. a balance
(money, SMS, etc).
                                                                                                                                          update, being this the only phase that cannot be easily moved
   As it can be inferred from its name, the Subscribed Service
                                                                                                                                          to Cassandra due to its transactional requirements.
entity represents the services subscribed by each customer. In
                                                                                                                                             We select the first phase of this process, the choice of
addition to the phone number, the account identifier and the
                                                                                                                                          services, as an example for the migration process presented
service name, this entity also contains a priority field, which
                                                                                                                                          next. This operation has the following input and output.
is used to select the most advantageous service.
   With regard to the Service entity, it maps service names
into service types. The latter’s attribute, similarly to Bucket                                                                           Input: The caller number and the type of incoming call.
Type, is a finite set of possible type of services provided by                                                                             Output: The available list of services and the account identi-
the telecom, for instance, voice or text messaging.                                                                                               fication associated with them, ordered by priority.
   The entity Account plays a central role in this model, it                                                                              A. PostgreSQL
contains as attributes the identification of the account, the                                                                                 Based on the normal relational approach, the data was then
customer identification and also a tariff plan identification.                                                                              analysed and the queries were built upon it. The data model
In addition, it introduces the concept of hierarchy between                                                                               showed in Figure 1 is in fact no more than a conceptual
accounts. By way of explanation, when a set of accounts have a                                                                            entity-relationship model and, thus was easily implemented
shared balance, it is introduced the notion of a parent account.                                                                          in PostgreSQL. As a result, the schema of the database
Each account can be associated at most with a single parent                                                                               is composed of the same 7 relations, with the respective
account.                                                                                                                                  attributes.
   From the assumption that different services may use differ-                                                                               Based in this model, the specific queries for each one of
ent types of bucket, there is a relationship between Services                                                                             the phases was then created and implemented with JDBC.
and Bucket Type. Therefore, the entity Tariff Plan establishes                                                                            In order to achieve maximum performance, several runs of
this relationship by mapping service names into bucket types                                                                              the simulation were carefully analysed resulting in some
for each plan identification. In addition, it also provides a                                                                              optimisations. Namely, some queries were rewritten and were
priority field and informations about the plan, such as the                                                                                also introduced secondary indexes over some attributes.
period of use or the cost per minute.                                                                                                        Looking at the presented example, its implementation in this
                                            III. DATA S TORE                                                                              data stores assumes the following form:
  A telecom has to deal with millions of requests everyday                                                                                SELECT SubscribedService.account_id, SubscribedService.name
                                                                                                                                           FROM SubscribedService
and as with other large enterprises, they tend to rely on very                                                                              JOIN Service
centralised systems for data storage. Whenever the need for                                                                                  ON Service.service_name = SubscribedService.name
                                                                                                                                             AND Service.service_type = Type
more capacity arises, the solution is always to acquire a new,                                                                             WHERE SubscribedServ.number = Id
more powerful and expensive server i.e. scaling vertically.                                                                                ORDER BY SubscribedServ.priority DESC




                                                                                                                                    268
This query, which represents the relational approach to the                                                                 Column
                                                                                                                                       Priority
problem, was then optimized with indexes over some of the                                                                          Account Service
                                                                                                 SuperColumns
presented fields in the SubscribedService and Service.                                 Row key
                                                                                                                                      id   Name

                                                                                                                        1                   2
                                                                                                     voice      1       family         1    voice
B. Cassandra                                                                         963593939
                                                                                                                    1                           2
                                                                                                      sms
   Initially developed at Facebook to support the social net-                                                   1 community                 1 sms

working application, Cassandra is, by definition, a highly avail-                                                        1                   2
                                                                                                      voice
able distributed data store that encompasses concepts from                                                      1           work        1    voice
                                                                                     965416789
Dynamo’s architecture and the data model from BigTable.                                               sms
                                                                                                                        1
                                                                                                                    1       sms
   Moreover, Cassandra’s data model implements a variant of
the entity-attribute-value (EAV) model and can be thought of
                                                                           Fig. 2: SuperColumnFamily representing the choice of ser-
as a multi-dimension sorted map. The Keyspace is a namespace
                                                                           vices.
for ColumnFamilies, which in turn map rows to a set of
columns. In fact, there is a rough correspondence between
a ColumnFamily and a table in the relational model, but
they differ on the property that within a ColumnFamily each                of such fact, or when she removes a service, it can still be
row can have a completely different set of columns. As a                   active for some moments even after the confirmation is given.
result, there is no pre-defined schema so columns can be                       However, in the case where two or more accounts share
added dynamically. There is yet another higher data structure              a bucket i.e. have a shared balance, a stronger consistency
SuperColumnFamilies where each of its attribute columns (in                criteria would be needed to prevent simultaneous concurrent
this structure named SuperColumns) can have a list of ordinary             updates of the balance. Even if such services only affect in
columns. Within a ColumnFamily and a SuperColumnFamily,                    average 10% of the population, they still need full transactional
both columns and supercolumns can be ordered according to                  guarantees (ACID). There are, for this problem, two main
their names, using one of the following supported criteria:                possible solutions: (i) a hybrid approach where the bulk of
ASCII, UTF-8, Long, UUID or binary ordering.                               data would be stored in Cassandra, except for data related
   The differences between the two paradigms also imply a                  to the shared buckets; (ii) using an external entity to restrict
different approach in application development. In contrast to              concurrent accesses to the shared bucket. The isolation of
the relational paradigm, when designing an application with                the bucket in a separated database or different code wrapper
a NoSQL database as back-end one should not start from                     is however straightforward as this entity is only used in a
defining the data model but from the features that are intended             restricted phase of incoming calls process.
for the system. As a result, the development process of the
Cassandra’s interface was fundamentally different. For each                              IV. P LATFORM AND W ORKLOADS
of the presented phases, it was analysed both the input and
the output desired, then the ColumnFamilies or SuperColumn-                   In order to test and compare the relational and non re-
Familes were created, so that from the input, the desired output           lational solutions, a simulation platform for benchmarking
was easily obtained.                                                       of the system was developed. More than just a workload
   For the presented example, in the implementation process a              execution platform, it allows for the generation of consistent
SuperColumnFamily was created with the row key being the                   data to populate the underlying database and the definition
caller number and the name of the SuperColumn being the                    of operations to simulate different scenarios of use. Trying to
type of incoming call. Then, each SuperColumn has a list of                mimic the real world, this platform allows the manipulation of
columns corresponding to the list of available services and the            several factors that affect the users’ behaviour, such as their
account identification associated with them. These columns are              relationships and the associated services or their call history.
ordered by priority. An example of the structure is depicted                  There were created different execution scenarios in order
in Figure 2. In the migration of this phase and also in the                to simulate different periods of use, where the load and
remaining, the same method is used, where the queries based                type of requests vary. With the implementation of several
on Joins are translated to data structures where data is naturally         typical telecom services based in list of families or time based
indexed.                                                                   discounts we define their coverage over the population and its
   In terms of consistency, this is not a major concern in this            effect over the user. Many more parameters are available such
study since customers’ accounts are usually independent from               as the type of incoming calls that are given to the platform,
each other, i.e. isolation is provided by the characteristics of           or the importance of the client’s call history in the incoming
the case study. The nature of the data that is in most cases               calls formation.
rarely written also helps in this process, where such operations              Based on this set of parameters, there were created 2 distinct
as the services’ subscription can be implemented based on                  workloads: a Day workload representing the regular load
a system of delayed confirmations. With such techniques,                    during a day with more focus on business activities and a
services are activated and used even before the client is aware            Christmas workload that simulates the Christmas holidays.


                                                                     269
260000
                                                                              cassandra                                         VI. C ONCLUSION
                           240000                                             postgres
                                                                                                         With the appearance of the Cloud Computing paradigm and
                           220000
                                                                                                      facing an ever-changing market, new data stores developed
                           200000                                                                     by Internet giants emerge. In this context, this work aims at
         Initiated calls




                           180000                                                                     assessing how NoSQL data stores could be adapted to the
                           160000                                                                     business model of a telecommunications enterprise.
                           140000                                                                        In that purpose it was developed a implementation of a tele-
                           120000                                                                     com application over two distinct paradigms and a simulation
                           1000000
                                                                                                      platform based on human activity that allow the creation of dis-
                                     100   200   300     400      500   600     700       800
                                                       Time (s)                                       tinct workloads to test it. With implementations in PostgreSQL
                                                       (a)                                            and Cassandra, a resume of the differences between the
                                                                                                      different models were shown in terms of development methods
                                                                                                      and some preliminary results. Even if at this point they are
                           400000
                                                                              cassandra               more favorable to the non relational paradigm, the platform
                                                                              postgres
                           350000                                                                     needs to be executed in a distributed environment to test the
                                                                                                      capability of the system to scale progressively. In fact the value
                           300000
                                                                                                      of this implementation would be not in its raw performance but
         Initiated calls




                           250000                                                                     advantages like the increased adaptability of the system and
                                                                                                      the associated cost reductions. Nonetheless, the non-relational
                           200000
                                                                                                      paradigm requires an optimization of data structures, requiring
                           150000                                                                     data de-normalization and pre-materialization of the results not
                                                                                                      supporting also transactional operations, that is a fault that we
                           1000000   100   200   300     400      500   600     700       800
                                                       Time (s)                                       intend to tackle in the future.
                                                       (b)
                                                                                                         In the long term, this work intends to evaluate if the non-
                                                                                                      relational paradigm can be advantageous even in a business
        Fig. 3: Initiated calls - 7 000 000 customers                                                 model like a telecom. However, it should be noted that the
                                                                                                      transition to CC is not easy, and the documentation of this
                                                                                                      extra effort is also a valuable result.
                                      V. E XPERIMENTATION                                                                          R EFERENCES
                                                                                                      [1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,
   A series of preliminary experiments were conducted to eval-                                            G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of
                                                                                                          cloud computing. Commun. ACM, 53:50–58, April 2010.
uate the performance of both data stores. These experiments                                           [2] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Bur-
cover the 2 defined workloads in a population of 7 million                                                 rows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed
customers. Regarding the experiments setting, the simulation                                              storage system for structured data. ACM Trans. Comput. Syst., 26:4:1–
                                                                                                          4:26, June 2008.
platform was run on a 8-core, 16GB RAM machine being the                                              [3] B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohan-
data stores limited to a single 24-core, 128GB RAM machine,                                               non, H.-A. Jacobsen, N. Puz, D. Weaver, and R. Yerneni. Pnuts: Yahoo!’s
with disks in RAID1.                                                                                      hosted data serving platform. Proc. VLDB Endow., 1:1277–1288, August
                                                                                                          2008.
   The main goal of this experiment is to simulate a small                                            [4] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman,
country and for that purpose, the total number of generated                                               A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo:
                                                                                                          amazon’s highly available key-value store. In Proceedings of twenty-first
calls reaches two million. During the execution time, the                                                 ACM SIGOPS symposium on Operating systems principles, SOSP ’07,
Day workload uses 160 execution clients that make 5 minute                                                pages 205–220, New York, NY, USA, 2007. ACM.
calls. The think time is 10 milliseconds and the number of                                            [5] A. Lakshman and P. Malik. Cassandra: a decentralized structured storage
                                                                                                          system. SIGOPS Oper. Syst. Rev., 44:35–40, April 2010.
simultaneous calls is 20 000, and thus, each execution client                                         [6] D. Skillicorn. The case for datacentric grids. Technical Report ISSN-
has to establish 12 500 calls. In the Christmas workload the                                              0836-0227-2001-451, Department of Computing and Information Sci-
think time is 0 seconds to simulate a higher load.                                                        ence, Queen’s University, November 2001.
                                                                                                      [7] R. Vilaca, F. Cruz, and R. Oliveira. On the expressiveness and trade-offs
                                                                                                                  ¸
   Figure 3 shows that in this experiment the non-relational                                              of large scale tuple stores. In R. Meersman, T. Dillon, and P. Herrero,
data store achieves better results at the level of the number                                             editors, On the Move to Meaningful Internet Systems, OTM 2010, volume
                                                                                                          6427 of Lecture Notes in Computer Science, pages 727–744. Springer
of initiated calls. These numbers were as expected since                                                  Berlin / Heidelberg, 2010.
no transactional guarantees are offered in Cassandra and no
external mechanism was implemented at this point. Even if the
results are promising, there is a need for a further evaluation
of the scalability of both approaches, being the Cassandra
solution complemented with a transactional mechanism or a
ACID compliant database.



                                                                                                270

Contenu connexe

Tendances

Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryStudying
 
High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...Silvio Sangineto
 
Nota de prensa Telefonica Digital e Intel Nubes Hbrídas
Nota de prensa Telefonica Digital e Intel Nubes HbrídasNota de prensa Telefonica Digital e Intel Nubes Hbrídas
Nota de prensa Telefonica Digital e Intel Nubes HbrídasAntonio Da Silva Campos
 
Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1Bill Alatis
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier CloudNECIndia
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSNexgen Technology
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam readyHai Nguyen
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
2013 storage prediction hds hong kong
2013 storage prediction hds hong kong2013 storage prediction hds hong kong
2013 storage prediction hds hong kongAndrew Wong
 
Audio/Video Conferencing in Distributed Brokering Systems
Audio/Video Conferencing in Distributed Brokering SystemsAudio/Video Conferencing in Distributed Brokering Systems
Audio/Video Conferencing in Distributed Brokering SystemsVideoguy
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Idc Reducing It Costs With Blades
Idc Reducing It Costs With BladesIdc Reducing It Costs With Blades
Idc Reducing It Costs With Bladespankaj009
 
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic DatacentersSystem Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic DatacentersIBM India Smarter Computing
 
Cloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big ThingCloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big Thingg2ix
 
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...IBM India Smarter Computing
 

Tendances (19)

Cloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industryCloud computing: new challenge to the entire computer industry
Cloud computing: new challenge to the entire computer industry
 
High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...
 
Cloud computing ppt_0
Cloud computing ppt_0Cloud computing ppt_0
Cloud computing ppt_0
 
Nota de prensa Telefonica Digital e Intel Nubes Hbrídas
Nota de prensa Telefonica Digital e Intel Nubes HbrídasNota de prensa Telefonica Digital e Intel Nubes Hbrídas
Nota de prensa Telefonica Digital e Intel Nubes Hbrídas
 
Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier Cloud
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
2013 storage prediction hds hong kong
2013 storage prediction hds hong kong2013 storage prediction hds hong kong
2013 storage prediction hds hong kong
 
Audio/Video Conferencing in Distributed Brokering Systems
Audio/Video Conferencing in Distributed Brokering SystemsAudio/Video Conferencing in Distributed Brokering Systems
Audio/Video Conferencing in Distributed Brokering Systems
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Idc Reducing It Costs With Blades
Idc Reducing It Costs With BladesIdc Reducing It Costs With Blades
Idc Reducing It Costs With Blades
 
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic DatacentersSystem Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
 
Cloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big ThingCloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big Thing
 
14 19
14 1914 19
14 19
 
DATEV aG
DATEV aGDATEV aG
DATEV aG
 
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...
IBM Launches Newest ProtecTIER Appliance — Positioning Data Dedupe for Mid-Ma...
 

Similaire à Assessing no sql databases for telecom applications

cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfsuriyakalavinoth
 
La computación en nube el estado de la técnica y desafíos de la investigación
La computación en nube el estado de la técnica y desafíos de la investigaciónLa computación en nube el estado de la técnica y desafíos de la investigación
La computación en nube el estado de la técnica y desafíos de la investigaciónLILI
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionHossam Zein
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
Challenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetChallenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetSOFIProject
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingHayden McCall
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and coresWajiha Muhammad Ismail
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
ITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxZaharaddeenAbubuakar
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 

Similaire à Assessing no sql databases for telecom applications (20)

cc notes one.pdf
cc notes one.pdfcc notes one.pdf
cc notes one.pdf
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdf
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
La computación en nube el estado de la técnica y desafíos de la investigación
La computación en nube el estado de la técnica y desafíos de la investigaciónLa computación en nube el estado de la técnica y desafíos de la investigación
La computación en nube el estado de la técnica y desafíos de la investigación
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
Challenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetChallenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future Internet
 
iStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computingiStart hitchhikers guide to cloud computing
iStart hitchhikers guide to cloud computing
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Cloud
CloudCloud
Cloud
 
Cloud
CloudCloud
Cloud
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
ITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptx
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 

Plus de João Gabriel Lima

Deep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer SegmentationDeep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer SegmentationJoão Gabriel Lima
 
Aplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full StackAplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full StackJoão Gabriel Lima
 
Realidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKitRealidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKitJoão Gabriel Lima
 
Big data e Inteligência Artificial
Big data e Inteligência ArtificialBig data e Inteligência Artificial
Big data e Inteligência ArtificialJoão Gabriel Lima
 
Mineração de Dados no Weka - Regressão Linear
Mineração de Dados no Weka -  Regressão LinearMineração de Dados no Weka -  Regressão Linear
Mineração de Dados no Weka - Regressão LinearJoão Gabriel Lima
 
Segurança na Internet - Estudos de caso
Segurança na Internet - Estudos de casoSegurança na Internet - Estudos de caso
Segurança na Internet - Estudos de casoJoão Gabriel Lima
 
Segurança na Internet - Google Hacking
Segurança na Internet - Google  HackingSegurança na Internet - Google  Hacking
Segurança na Internet - Google HackingJoão Gabriel Lima
 
Segurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentaisSegurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentaisJoão Gabriel Lima
 
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...João Gabriel Lima
 
Mineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - ClusterizaçãoMineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - ClusterizaçãoJoão Gabriel Lima
 
Mineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e WekaMineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e WekaJoão Gabriel Lima
 
Visualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark sideVisualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark sideJoão Gabriel Lima
 
REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?João Gabriel Lima
 
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...João Gabriel Lima
 
E-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãosE-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãosJoão Gabriel Lima
 
[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.js[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.jsJoão Gabriel Lima
 
Hackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com JavascriptHackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com JavascriptJoão Gabriel Lima
 

Plus de João Gabriel Lima (20)

Cooking with data
Cooking with dataCooking with data
Cooking with data
 
Deep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer SegmentationDeep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer Segmentation
 
Aplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full StackAplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full Stack
 
Realidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKitRealidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKit
 
JS - IA
JS - IAJS - IA
JS - IA
 
Big data e Inteligência Artificial
Big data e Inteligência ArtificialBig data e Inteligência Artificial
Big data e Inteligência Artificial
 
Mineração de Dados no Weka - Regressão Linear
Mineração de Dados no Weka -  Regressão LinearMineração de Dados no Weka -  Regressão Linear
Mineração de Dados no Weka - Regressão Linear
 
Segurança na Internet - Estudos de caso
Segurança na Internet - Estudos de casoSegurança na Internet - Estudos de caso
Segurança na Internet - Estudos de caso
 
Segurança na Internet - Google Hacking
Segurança na Internet - Google  HackingSegurança na Internet - Google  Hacking
Segurança na Internet - Google Hacking
 
Segurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentaisSegurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentais
 
Web Machine Learning
Web Machine LearningWeb Machine Learning
Web Machine Learning
 
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
 
Mineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - ClusterizaçãoMineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - Clusterização
 
Mineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e WekaMineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e Weka
 
Visualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark sideVisualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark side
 
REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?
 
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
 
E-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãosE-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãos
 
[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.js[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.js
 
Hackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com JavascriptHackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com Javascript
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Assessing no sql databases for telecom applications

  • 1. 2011 IEEE Conference on Commerce and Enterprise Computing Assessing NoSQL Databases for Telecom Applications Francisco Cruz Pedro Gomes Rui Oliveira Jos´ Pereira e HASlab HASlab HASlab HASlab Universidade do Minho Universidade do Minho Universidade do Minho Universidade do Minho Braga, Portugal Braga, Portugal Braga, Portugal Braga, Portugal fmcruz@di.uminho.pt pedrogomes@lsd.di.uminho.pt rco@di.uminho.pt jop@di.uminho.pt Abstract—The constant evolution of access technologies are sequently, the major online players searched for alternatives turning Internet access more ubiquitous, faster, better and into building extreme large scale storage systems and the cheaper. In connection with the proliferation of Internet access, result was a great set of different data stores popularly called Cloud Computing is changing the way users look at data, moving from local applications and installations to remote services, NoSQL: Dynamo [4], PNUTS [3], BigTable [2], Cassandra [5], accessible from any device. This new paradigm presents numer- DataDroplets [7], among others. Such data stores provide ous opportunities that even traditional businesses like telecoms high availability and elasticity in a distributed environment cannot ignore, in particular, enabling new and more cost effective composed by a set of commodity hardware, avoiding the need solutions to old problems. to invest in very powerful and expensive servers to host the The work presented in this paper provides a detailed descrip- tion of how a telecom application can be migrated to a NoSQL database. In addition, these data stores automatically provide database. Particularly, by pointing out the necessary change of replication, fail-over, load balancing and data distribution. how we reason about data as well as the data structures that Nevertheless, when compared to the more mature RDBMS, support it, in order to take full advantage of Cloud Computing. NoSQL databases have some fundamental limitations that In addition, we also present a preliminary evaluation of different should be taken into account. They provide high scalability at data persistency paradigms based on a fully tunable simulation platform that mimics the operation of a telecom business. the expense of a more relaxed data consistency model and only Index Terms—Cloud Computing; Distributed Databases; provide primitive querying and searching capability. Imposing NoSQL; Telecom; an additional complexity to the application. This work aims at assessing how these solutions can be I. I NTRODUCTION adapted to the business model of telecommunication operator. The constant evolution of access technologies, wired as As with other large enterprises, telecommunications enter- the optical fiber, or wireless such as the WiMAX and LTE prises tend to rely on very centralised systems, and the field are turning Internet access more and more ubiquitous, faster, of CC offers an innovative and important opportunity in terms better and cheaper. The proliferation of Internet access allows of new concepts and paradigms. Thus, this paper describes the users to use services directly provided by it, which results process of modelling required for the transition of a relational in a change of paradigm for the use of applications and model to a non-relational one, in the context of managing how users communicate, popularizing the paradigm known as customer data, services and telephone calls. Cloud Computing (CC). In a CC environment, the majority The remainder of this paper is organized as follows. Section of applications, as well as data, do not need to be installed 2 presents the data model used for the simulation platform. or stored on the user’s computer, as they are provided by the Section 3 describes the process and differences between using “cloud” through dedicated service providers, also known as a RDBMS and a NoSQL database. Section 5 and 6 present Cloud Providers (CPs). The Cloud Provider is responsible, the workload used to benchmark the system, in order evaluate for example, for the storage, maintenance and backup of all and compare the relational approach and the non-relational user information, and the user just has to access the platform approach. Section 7 concludes the paper. provided by the CP and only pay for the services she uses and when she needs them [1] – a concept known as pay-as-you-go. II. DATA M ODEL The new paradigm implies the access of millions of users In its core, the system presented here is responsible for to the same application and partly as a result, storage of the data management and the business decisions related to digital data has reached unprecedented levels [6]. A good customers information in relation to incoming calls. During example of such a applications are the social networking runtime, it handles the incoming calls, fetching the caller’s platforms like Facebook and MySpace, that have to deal information and subscribed services to know if they are valid with millions of requests everyday. But, traditional relational and how should they be treated (tariff cost, discounts, etc.). databases, RDBMS (Relational Database Management Sys- In order to support this system, the telecom’s data model tem), seem to be not well suited for these environments. Con- is composed of 7 entities (Fig. 1): Customer, Bucket, Bucket 978-0-7695-4535-6/11 $26.00 © 2011 IEEE 267 DOI 10.1109/CEC.2011.48
  • 2. Customer However, the Cloud Computing paradigm has already proven 1 that scaling horizontally offers the desired scalability and availability. In fact, scalability is achieved by adding new machines to the system on demand, in order to cope with 1...* 0...1 the load in the system, and at the same time can provide Account 1...* fault-tolerance, ensuring availability. Besides, it is more cost- Bucket Type Service 1...* * * 1...* effective because it relies on commodity hardware and allows 1...* * * a granular adaptation from small to large scenarios. Bucket Balance 1 Subscribed Service For this case study, it was considered two different data Tariff plan Priority Expiration date Id Number (Network Id) stores: PostgreSQL and Cassandra. This choice is related Priority Use period to one of the contributions of this work: to show how a Info (tariff per minute, etc) telecom’s data management system can be ported to a NoSQL database, oriented towards a CC environment. Additionally, PostgreSQL represents the typical approach using relational Fig. 1: Telecom’s data model. database management systems (RDBMS) and, thus, will serve as term of comparison. In the platform, each incoming call is composed of four Type, Subscribed Service, Service, Account and Tariff Plan. main phases: 1) the first phase evaluates what services the The Customer entity bears the personal information regard- user has subscribed verifying each one in the priority order ing each of the telecom’s customers. In addition, this entity is until a valid one is found; 2) in the second phase the tariff related to the entity Account in the sense that a customer can plan is queried to assess what types of buckets can be used; be associated with one or more accounts. 3) the third phase concerns the discovery of the account that The Bucket entity represents the balance associated with contains such entity, in fact a client can have a service in each account and each bucket type. The Bucket Type holds association with a company that supports some of her costs. information related to the type of buckets existent in the system 4) the last phase consists of a bucket subtraction i.e. a balance (money, SMS, etc). update, being this the only phase that cannot be easily moved As it can be inferred from its name, the Subscribed Service to Cassandra due to its transactional requirements. entity represents the services subscribed by each customer. In We select the first phase of this process, the choice of addition to the phone number, the account identifier and the services, as an example for the migration process presented service name, this entity also contains a priority field, which next. This operation has the following input and output. is used to select the most advantageous service. With regard to the Service entity, it maps service names into service types. The latter’s attribute, similarly to Bucket Input: The caller number and the type of incoming call. Type, is a finite set of possible type of services provided by Output: The available list of services and the account identi- the telecom, for instance, voice or text messaging. fication associated with them, ordered by priority. The entity Account plays a central role in this model, it A. PostgreSQL contains as attributes the identification of the account, the Based on the normal relational approach, the data was then customer identification and also a tariff plan identification. analysed and the queries were built upon it. The data model In addition, it introduces the concept of hierarchy between showed in Figure 1 is in fact no more than a conceptual accounts. By way of explanation, when a set of accounts have a entity-relationship model and, thus was easily implemented shared balance, it is introduced the notion of a parent account. in PostgreSQL. As a result, the schema of the database Each account can be associated at most with a single parent is composed of the same 7 relations, with the respective account. attributes. From the assumption that different services may use differ- Based in this model, the specific queries for each one of ent types of bucket, there is a relationship between Services the phases was then created and implemented with JDBC. and Bucket Type. Therefore, the entity Tariff Plan establishes In order to achieve maximum performance, several runs of this relationship by mapping service names into bucket types the simulation were carefully analysed resulting in some for each plan identification. In addition, it also provides a optimisations. Namely, some queries were rewritten and were priority field and informations about the plan, such as the also introduced secondary indexes over some attributes. period of use or the cost per minute. Looking at the presented example, its implementation in this III. DATA S TORE data stores assumes the following form: A telecom has to deal with millions of requests everyday SELECT SubscribedService.account_id, SubscribedService.name FROM SubscribedService and as with other large enterprises, they tend to rely on very JOIN Service centralised systems for data storage. Whenever the need for ON Service.service_name = SubscribedService.name AND Service.service_type = Type more capacity arises, the solution is always to acquire a new, WHERE SubscribedServ.number = Id more powerful and expensive server i.e. scaling vertically. ORDER BY SubscribedServ.priority DESC 268
  • 3. This query, which represents the relational approach to the Column Priority problem, was then optimized with indexes over some of the Account Service SuperColumns presented fields in the SubscribedService and Service. Row key id Name 1 2 voice 1 family 1 voice B. Cassandra 963593939 1 2 sms Initially developed at Facebook to support the social net- 1 community 1 sms working application, Cassandra is, by definition, a highly avail- 1 2 voice able distributed data store that encompasses concepts from 1 work 1 voice 965416789 Dynamo’s architecture and the data model from BigTable. sms 1 1 sms Moreover, Cassandra’s data model implements a variant of the entity-attribute-value (EAV) model and can be thought of Fig. 2: SuperColumnFamily representing the choice of ser- as a multi-dimension sorted map. The Keyspace is a namespace vices. for ColumnFamilies, which in turn map rows to a set of columns. In fact, there is a rough correspondence between a ColumnFamily and a table in the relational model, but they differ on the property that within a ColumnFamily each of such fact, or when she removes a service, it can still be row can have a completely different set of columns. As a active for some moments even after the confirmation is given. result, there is no pre-defined schema so columns can be However, in the case where two or more accounts share added dynamically. There is yet another higher data structure a bucket i.e. have a shared balance, a stronger consistency SuperColumnFamilies where each of its attribute columns (in criteria would be needed to prevent simultaneous concurrent this structure named SuperColumns) can have a list of ordinary updates of the balance. Even if such services only affect in columns. Within a ColumnFamily and a SuperColumnFamily, average 10% of the population, they still need full transactional both columns and supercolumns can be ordered according to guarantees (ACID). There are, for this problem, two main their names, using one of the following supported criteria: possible solutions: (i) a hybrid approach where the bulk of ASCII, UTF-8, Long, UUID or binary ordering. data would be stored in Cassandra, except for data related The differences between the two paradigms also imply a to the shared buckets; (ii) using an external entity to restrict different approach in application development. In contrast to concurrent accesses to the shared bucket. The isolation of the relational paradigm, when designing an application with the bucket in a separated database or different code wrapper a NoSQL database as back-end one should not start from is however straightforward as this entity is only used in a defining the data model but from the features that are intended restricted phase of incoming calls process. for the system. As a result, the development process of the Cassandra’s interface was fundamentally different. For each IV. P LATFORM AND W ORKLOADS of the presented phases, it was analysed both the input and the output desired, then the ColumnFamilies or SuperColumn- In order to test and compare the relational and non re- Familes were created, so that from the input, the desired output lational solutions, a simulation platform for benchmarking was easily obtained. of the system was developed. More than just a workload For the presented example, in the implementation process a execution platform, it allows for the generation of consistent SuperColumnFamily was created with the row key being the data to populate the underlying database and the definition caller number and the name of the SuperColumn being the of operations to simulate different scenarios of use. Trying to type of incoming call. Then, each SuperColumn has a list of mimic the real world, this platform allows the manipulation of columns corresponding to the list of available services and the several factors that affect the users’ behaviour, such as their account identification associated with them. These columns are relationships and the associated services or their call history. ordered by priority. An example of the structure is depicted There were created different execution scenarios in order in Figure 2. In the migration of this phase and also in the to simulate different periods of use, where the load and remaining, the same method is used, where the queries based type of requests vary. With the implementation of several on Joins are translated to data structures where data is naturally typical telecom services based in list of families or time based indexed. discounts we define their coverage over the population and its In terms of consistency, this is not a major concern in this effect over the user. Many more parameters are available such study since customers’ accounts are usually independent from as the type of incoming calls that are given to the platform, each other, i.e. isolation is provided by the characteristics of or the importance of the client’s call history in the incoming the case study. The nature of the data that is in most cases calls formation. rarely written also helps in this process, where such operations Based on this set of parameters, there were created 2 distinct as the services’ subscription can be implemented based on workloads: a Day workload representing the regular load a system of delayed confirmations. With such techniques, during a day with more focus on business activities and a services are activated and used even before the client is aware Christmas workload that simulates the Christmas holidays. 269
  • 4. 260000 cassandra VI. C ONCLUSION 240000 postgres With the appearance of the Cloud Computing paradigm and 220000 facing an ever-changing market, new data stores developed 200000 by Internet giants emerge. In this context, this work aims at Initiated calls 180000 assessing how NoSQL data stores could be adapted to the 160000 business model of a telecommunications enterprise. 140000 In that purpose it was developed a implementation of a tele- 120000 com application over two distinct paradigms and a simulation 1000000 platform based on human activity that allow the creation of dis- 100 200 300 400 500 600 700 800 Time (s) tinct workloads to test it. With implementations in PostgreSQL (a) and Cassandra, a resume of the differences between the different models were shown in terms of development methods and some preliminary results. Even if at this point they are 400000 cassandra more favorable to the non relational paradigm, the platform postgres 350000 needs to be executed in a distributed environment to test the capability of the system to scale progressively. In fact the value 300000 of this implementation would be not in its raw performance but Initiated calls 250000 advantages like the increased adaptability of the system and the associated cost reductions. Nonetheless, the non-relational 200000 paradigm requires an optimization of data structures, requiring 150000 data de-normalization and pre-materialization of the results not supporting also transactional operations, that is a fault that we 1000000 100 200 300 400 500 600 700 800 Time (s) intend to tackle in the future. (b) In the long term, this work intends to evaluate if the non- relational paradigm can be advantageous even in a business Fig. 3: Initiated calls - 7 000 000 customers model like a telecom. However, it should be noted that the transition to CC is not easy, and the documentation of this extra effort is also a valuable result. V. E XPERIMENTATION R EFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, A series of preliminary experiments were conducted to eval- G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Commun. ACM, 53:50–58, April 2010. uate the performance of both data stores. These experiments [2] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Bur- cover the 2 defined workloads in a population of 7 million rows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed customers. Regarding the experiments setting, the simulation storage system for structured data. ACM Trans. Comput. Syst., 26:4:1– 4:26, June 2008. platform was run on a 8-core, 16GB RAM machine being the [3] B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohan- data stores limited to a single 24-core, 128GB RAM machine, non, H.-A. Jacobsen, N. Puz, D. Weaver, and R. Yerneni. Pnuts: Yahoo!’s with disks in RAID1. hosted data serving platform. Proc. VLDB Endow., 1:1277–1288, August 2008. The main goal of this experiment is to simulate a small [4] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, country and for that purpose, the total number of generated A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: amazon’s highly available key-value store. In Proceedings of twenty-first calls reaches two million. During the execution time, the ACM SIGOPS symposium on Operating systems principles, SOSP ’07, Day workload uses 160 execution clients that make 5 minute pages 205–220, New York, NY, USA, 2007. ACM. calls. The think time is 10 milliseconds and the number of [5] A. Lakshman and P. Malik. Cassandra: a decentralized structured storage system. SIGOPS Oper. Syst. Rev., 44:35–40, April 2010. simultaneous calls is 20 000, and thus, each execution client [6] D. Skillicorn. The case for datacentric grids. Technical Report ISSN- has to establish 12 500 calls. In the Christmas workload the 0836-0227-2001-451, Department of Computing and Information Sci- think time is 0 seconds to simulate a higher load. ence, Queen’s University, November 2001. [7] R. Vilaca, F. Cruz, and R. Oliveira. On the expressiveness and trade-offs ¸ Figure 3 shows that in this experiment the non-relational of large scale tuple stores. In R. Meersman, T. Dillon, and P. Herrero, data store achieves better results at the level of the number editors, On the Move to Meaningful Internet Systems, OTM 2010, volume 6427 of Lecture Notes in Computer Science, pages 727–744. Springer of initiated calls. These numbers were as expected since Berlin / Heidelberg, 2010. no transactional guarantees are offered in Cassandra and no external mechanism was implemented at this point. Even if the results are promising, there is a need for a further evaluation of the scalability of both approaches, being the Cassandra solution complemented with a transactional mechanism or a ACID compliant database. 270