Professional Documents
Culture Documents
Measuring The Efficiency of Cloud Computing For E-Learning Systems
Measuring The Efficiency of Cloud Computing For E-Learning Systems
Abstract: - As with rapid growth of the cloud computing architecture usage, more and more industries move
their focus from investing into processing power to renting processing power from a specialized vendor.
Education field is no different. E-learning systems usually require many hardware and software resources.
There are numerous educational institutions that cannot afford such investments, and cloud computing is the
best solution for them. The implementation of a cloud computing e-learning system has its peculiarities and
needs a specific approach. This paper measures the positive impact of using cloud computing architectures
upon e-learning solutions development. We advance a set of cloud computing efficiency metrics for enhanced
e-learning implementation process control. Also, the long term overall efficiency of the cloud computing usage
in the field of e-learning system is evaluated.
Key-Words: - Cloud computing, E-learning, Mobile learning, Project management, Paretto Principle
intended to help companies and individuals to Moodle, the biggest players in the field of e-learning
stretch resources and work smarter by moving software, have now versions of the base applications
everything to the cloud. that are cloud oriented.
One of the biggest promoters of the cloud E-learning is widely used today on different
computing is Google that already owns a massive educational levels: continuous education, company
computer infrastructure (the cloud) where millions trainings, academic courses, etc.
of people are connecting to. Today, the Google There are various e-learning solutions from open
cloud can be accessed by Google Apps [6] intended source to commercial. There are at least two entities
to be software as a service suite dedicated to involved in an e-learning system: the students and
information sharing and security. Google Apps the trainers.
covers the following three main areas: messaging The students' actions within an e-learning
(Gmail, Calendar and Google Talk), collaboration platform are:
(Google Docs, Video and Sites) and security (email • Taking online course
security, encryption and archiving). • Taking exams
Microsoft is developing a new Windows • Sending feedback
platform, called Windows Azure, which will be able • Sending homework, projects.
to run cloud based applications [7].
In 2006, Amazon extended its AWS (Amazon The trainers involved in e-learning solutions are:
Web Services) suite with a new component called • Dealing with content management
Amazon Elastic Compute Cloud (or EC2), that • Preparing tests
allows to the users to rent from Amazon processing • Assessing tests, homework, projects taken
power to be used to run their own applications [8]. by students
The EC2 users rent out from Amazon virtual
• Sending feedback
machines that can be accessed remotely. The cloud
• Communicating with students (forums).
is an elastic one just because the user can start, stop
and create the virtual machines through the web
Each of these actions requires a certain degree
service. There are three predefines sizes for the
of security, depending on the importance and data
virtual machines that can be rented: small, medium
sensitivity.
and large, depending on the physical hardware
performances.
Grid computing represents a new evolutionary
level of distributed computing that tries to create the
illusion of a virtual single powerful computer
instead of a large collection of individual systems
connected together.
The easiest way to use a grid is to remotely run
an application on a different computer than the one
on it is usually executed. If a computer is busy, the
application can be executed on another idle machine
from the grid network. The remote machine must
meet hardware, software and resource requirements
of the application.
We can easily imagine the datacenter in the
cloud as being a grid composed by several
computers. Grid computing is able to increase the
resource usage efficiency because it could be
obtained a better balance of resource utilization. Fig. 3 E-learning system
infrastructure and servers). stored into the cloud so a new client can be
The client hardware could be a mobile device or connected very fast. Imagine what is
a desktop computer. The client application can be a happening today if a laptop that stores the
simple web browser or a dedicated application. examination questions is stolen;
Even with the current hardware and software • monitoring of data access becomes easier in
limitations, mobile devices are supporting view of the fact that only one place should
multimedia based applications. Compared with be supervised, not thousands of computers
desktop applications, nowadays mobile applications, belonging to a university, for example. Also,
especially multimedia-based applications, have the security changes can be easily tested and
serious limitations due the processing power and implemented since the cloud represents a
memory constraints. Due the fact that the data unique entry point for all the clients.
processing is on the server side, the use of mobile
devices for learning is growing fast. Still, the mobile Another important benefit is related to costs. If
applications need to be optimized to be used for e- the e-learning services are used for a relative short
learning. In [3], [9] and [18] the m-learning time (several weeks, a quarter, a semester), the
applications characteristics were analyzed. savings are very important.
The e-learning server will use cloud computing,
so all the required resources will be adjusted as
needed. 4 Project Management Challenges
E-learning systems can use benefit from cloud This section deals with the impact of employing
computing using: cloud computing architectures in the field of e-
• Infrastructure: use an e-learning solution on learning software systems development. We analyze
the provider's infrastructure the individual influence of the cloud computing
• Platform: use and develop an e-learning model characteristics on the project development
solution based on the provider's process.
development interface
• Services: use the e-learning solution given
by the provider. 4.1 Definitions
A project is “a temporary endeavor undertaken to
A very big concern is related to the data security create a unique product, service, or result” [10]. In
because both the software and the data are located [11] we find that “a software development project is
on remote servers that can crash or disappear a temporary endeavor undertaken to create a unique
without any additional warnings. piece of software.” Considering the two former
Even if it seems not very reasonable, the cloud definitions, we state that a cloud computing based
computing provides some major security benefits development project is a temporary endeavor
for individuals and companies that are undertaken to create a unique system (both
using/developing e-learning solutions, like the hardware and software) that will be running on a
following: cloud computing architecture. High quality cloud
• improved improbability – it is almost computing based development projects deliver the
impossible for any interested person (thief) required product within scope, on time and within
to determine where is located the machine budget. It is the project manager’s duty to skillfully
that stores some wanted data (tests, exam balance the competing demands for project quality,
questions, results) or to find out which is the project duration and cost of resources in order to be
physical component he needs to steal in able to deliver the system as planned.
order to get a digital asset;
• virtualization – makes possible the rapid
replacement of a compromised cloud located 4.2 Project management for cloud computing
server without major costs or damages. It is
system development
very easy to create a clone of a virtual
At the top level view, cloud computing based
machine so the cloud downtime is expected
development of e-learning systems follows the same
to be reduced substantially;
pattern as any other software development project.
• centralized data storage – losing a cloud
client is no longer a major incident while the
main part of the applications and data is
(1)
A service availability A of more than 99% is Using cloud computing instead of investments in
considered a highly available e-learning system. datacenters (hardware and software licenses) will
The data security e-leaning efficiency metrics is result in a shift from capital expenditure (CapEx) to
defined as: operational expenditure (OpEx).
Quality planning project process involves
(4) creating test plans for the future e-learning system.
The tests should take into consideration both
where: intrinsic system features and performance testing on
DS – the security degree of the e-learning the cloud computing architecture.
system, measured in percents; Human resource planning entails allocating both
DA – the number of successfully denied attacks legacy software development personnel and cloud
upon the e-leaning system during a year; computing engineers that are aware of the
TNA – the total number of denied attacks upon peculiarities of these platforms.
the e-leaning system during a year. Communications planning means deciding what
project processes and tools will be used for timely
The more business oriented and less technical and appropriate generation, collection, distribution,
nature of the cloud computing based project storage and retrieval of project information. More
activities can be immediately observed in the project exactly, this means setting up the reports that have
scope planning, project work breakdown structure, to be generated, their content and frequency. Also,
activity identification and sequencing, activity this implies setting up a bug tracking system for
duration estimation and schedule development. This recording all the issues that arise during e-learning
is because the service provider takes on this initial system development.
burden and then offers on-demand virtualized The ration of bugs to the total number of features
processing power. For project activity duration developed is called bug-feature ration:
estimation, one or several of the described
techniques [13], [14] and [19] can be successfully (5)
employed.
Cost estimation and cost budgeting project where:
processes are highly biased because of the cloud BFR – the ration between the number of bugs
computing architecture. The service supplier (defects) discovered and the number of features
absorbs up-front costs and spreads the costs over a developed. This metric show how many bugs are
longer period and over several cloud computing there for every developed feature;
customers. Thus, the initial capital expenditure of Bugs – the number of defects found in the
the project is converted to ongoing operational system;
expenditure of the e-leaning system maintenance. Features – the number of features developed
Table 1 shows the average fees for cloud computing according to the project plan.
services.
Google App Engine includes a free quota. After Risk management planning project processes
this quota is exceeded, the rates from table 1 apply need special attention when working with cloud
[15]. computing infrastructure. It is true that the cloud
Amazon EC2 services are charged based on the computing maintenance burden resides solely within
required resources (small, medium or large) [4]. the responsibilities of the provider. Even though
Microsoft Azzure services are not yet there are service level agreement items in the
commercially available [6]. contract with the vendor, still Gartner analysts
advices us [16] to discuss the following items with
Table 1 Average fees for cloud computing services our future cloud computing vendor:
Provider Average Average Average Privileged user access, means asking who has
CPU cost bandwidth storage specialized access to data and what are the
(per hour) cost (per cost (per procedures regarding hiring and management of
GB/month) GB/month such administrators.
) Regulatory compliance, means asking whether
Amazon 0.11$ 0.12 0.15$ the vendor is willing to undergo external audits
Google 0.10$ 0.11$ 0.15$ and/or security certifications.
Microsoft 0.12$ 0.125$ 0.15$ Data location, does the provider allow for any
control over the location of data. is the importance to manage the duration of that task
Data segregation means making sure that data in order to avoid project delays.
encryption is available at all stages. Also this The sensitivity index of a task represents the
implies making sure that the encryption schemes correlation between task duration and the overall
are designed and tested by experienced project duration. In practice, the sensitivity index SI
professionals. is calculated as the Spearman’s Rank Correlation
Recovery, means discussing what happens to between task duration and project duration:
data in the case of a disaster, and whether the
vendor offers complete restoration. If so, how 6∑ d i2
SI = 1 − (7)
long does that process will take. n(n 2 − 1)
Investigative support means making sure that where:
the vendor has the ability to investigate any SI – sensitivity index of a task;
inappropriate or illegal activity. di = xi – yi – the difference between the ranks of
Long-term viability, what happens to data if the the corresponding values xi (task duration) and yi
company goes out of business. Also this implies
(project duration);
making sure that the date will be returned in an
n – the number of simulations performed.
appropriate format.
Data availability means asking what are the
procedures of moving the data onto a different The sensitivity index SI values lie between -1
environment, should the vendor decide to do and 1. In the field of project duration estimation, a
that. SI less than 0 has no sense because the project
duration cannot be shorter as long as the task
4.2.3 Project execution process group duration goes longer. So the only meaningful values
Executing the project means directing and managing are between 0 and 1 inclusively. The greater the SI
the project development and performing ongoing of a task, the higher is the correlation between task
quality assurance. For a successful cloud computing duration and the overall project duration.
based e-learning system to be developed, legacy The cruciality index CI represents the product of
software development techniques can be the two indexes calculated above and shows the
successfully employed. That is source control importance to manage the duration-uncertainty of an
software, build scripts for building the deployment activity:
package and automated tests for regression testing. CRUI = CI × SI (8)
Project criticality analysis techniques [17] can be
easily employed in order to enhance the project where:
development quality.
CRUI – the cruciality index of a task;
The criticality index of a task represents the
CI – criticality index of a task;
probability that this task will be on the critical path:
SI – sensitivity index of a task.
N
The CRUI metric has no unit of measure but its
∑ TC
i =1
i
significance lies in its ability to rank project tasks
TC =
N (6) according to the descending order of the importance
to manage the uncertainty of an activity. The higher
where: the CRUI of a task, the more attention the task
TC – task criticality, a number between 0 and 1 needs from the manager of the project regarding
inclusively. timely execution of the task.
TCi – equals 1 if task is on critical path at Project execution during e-learning system
iteration i and 0 otherwise. implementation can benefit from such performance
metrics used in the field of automated software
N – the total number of Monte Carlo simulations.
testing. Test success rate is defined as:
The closer to 1 is TC for a given task, the higher
the probability that that task will be on the critical
* 100% (9)
path. The closer to 0 is a task’s TC, the higher the
probability that the task will not reside on the
critical path. The higher the TC of a task, the higher where:
TS – test success rate, measured as a percentage; for a regular e-learning project implementation.
TP – test cases that passed with success;
TNT – total number of tests. (10)
The ongoing performance of the project can be 4.2.5 Project closing process group
successfully tracked using Earned Value Project closing involves finalizing all project
Management technique. See figure 5. activities and performing the acceptance and
delivery of the final e-learning system. During this
stage the project scope is checked against the initial
objectives, the e-learning system installation and
maintenance is documented, the acceptance testing
of the final product is performed and the formal
closing of the project is executed.
He revealed the work of the 19th century In our days, the principle is still very applied in
Italian professor of political economy Vilfredo a variety of areas, especially the quality control
Pareto that discovered that the top 20% of any field. For example, in the IT industry it is
country’s population accounts for more or less 80% considered that 80% of users are actually using only
of its total income. 20% of the features.
Initially, Pareto noticed the distribution for In the recent years, the principle was mostly
Italy but right after he extended the analysis on applied on errors rather than features because it was
several other countries obtaining very similar observed that 80% of errors are generated by the
results. Of course, the principle can be virtually 20% of the detected bugs, so a small proportion
applied in any area, like domestic behavior, for causes most of the errors (figure 6).
example – we can easily notice that we eat 20% of This is a winning strategy applied by the big
favorite food for 80% of time or, similarly, we software companies that are fighting with the bugs
spend 80% of time doing the most frequent 20% of since the customer satisfaction can be quickly
activities. improved by fixing only a small amount of the
Mathematically speaking, there is nothing reported errors.
special about the proportion of 80/20 but many real This principle can be successfully applied for e-
systems come across a ratio very closed by the learning projects based on cloud computing.
Pareto’s distribution.
In the modern economy, the principle was
quickly extended to quality control [20], stating that 6 Conclusions and Future Work
most defects in production are the result of a small The development of e-learning solution cannot
percentage of the causes of all defects. This is ignore the cloud computing trends.
generally defined as “the vital few and the trivial There are many benefits from using the cloud
many” or “the vital few and the useful many”. computing for e-learning systems. Also, there are
Starting from the Pareto Principle, Juran lately some disadvantages that have to be taken into
introduced the concept of CWQM (Company Wide account.
Quality Management) [21] that was based on three Using cloud computing for e-learning solutions
pillars (also known as Juran Trilogy): influences the way the e-learning software projects
quality planning – is focused on identifying are managed. There are specific tasks that deal with
the customers together with their needs that finding providers for cloud computing, depending
should be satisfied; on the requirements (infrastructure, platform or
quality control – follows the process of services). Also, the cost and risk management
producing goods and services that meet the influences the way the e-learning solutions based on
previously identified needs; cloud computing are managed.
quality improvement – the efforts A metrics system has been developed in order to
performed to constantly improve the measure the efficiency of cloud computing based e-
previous processes. learning solutions.
Also, the Pareto Principle is still a strong
mechanism constantly used in quality control of
projects from various areas, including the IT field.
The Academy of Economic Studies from
Bucharest uses a e-learning solution based on
Moodle and it has its own datacenter that can be in
the future a platform for cloud computing.
Acknowledgements
This paper presents some results of the research
project IDEI 2673: Project management
methodologies for the development of mobile
applications in the educational system, financed
Fig. 6. Graphical Representation of the Pareto
within the framework of IDEI research program.
Principle