Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2663165.2663327acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Stay-Away, protecting sensitive applications from performance interference

Published: 08 December 2014 Publication History

Abstract

While co-locating virtual machines improves utilization in resource shared environments, the resulting performance interference between VMs is difficult to model or predict. QoS sensitive applications can suffer from resource co-location with other less short-term resource sensitive or batch applications. The common practice of overprovisioning resources helps to avoid performance interference and guarantee QoS but leads to low machine utilization. Recent work that relies on static approaches suffer from practical limitations due to assumptions such as a priori knowledge of application behaviour and workload.
To address these limitations, we present Stay-Away, a generic and adaptive mechanism to mitigate the detrimental effects of performance interference on sensitive applications when co-located with batch applications. Our mechanism complements the allocation decisions of resource schedulers by continuously learning the favourable and unfavourable states of co-execution and mapping them to a state-space representation. Trajectories in this representation are used to predict and prevent any transition towards interference of sensitive applications by proactively throttling the execution of batch applications. The representation also doubles as a template to prevent violations in the future execution of the repeatable sensitive application when co-located with other batch applications. Experimental results with realistic applications show that it is possible to guarantee a high level of QoS for latency sensitive applications while also improving machine utilization.

References

[1]
Cloud Suite Benchmark. http://parsa.epfl.ch/cloudsuite/.
[2]
Confine Open Dataset. https://wiki.confine-project.eu/experiments:datasets.
[3]
Linux Containers. http://lxc.sourceforge.net.
[4]
VLC. http://www.videolan.org/vlc/index.html.
[5]
Wikipedia Trace Data. https://aws.amazon.com/datasets/6025882142118545.
[6]
L. A. Barroso and U. Hölzle. The case for energy-proportional computing. IEEE computer, 40(12):33--37, 2007.
[7]
B. Braem, C. Blondia, C. Barz, H. Rogge, F. Freitag, L. Navarro, J. Bonicioli, S. Papathanasiou, P. Escrich, R. Baig Viñas, et al. A case for research with and on community networks. ACM SIGCOMM Computer Communication Review, 43(3):68--73, 2013.
[8]
B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman. Planetlab: an overlay testbed for broad-coverage services. ACM SIGCOMM Computer Communication Review, 33(3):3--12, 2003.
[9]
E. A. Codling. Biased random walks in biology. PhD thesis, The University of Leeds, 2003.
[10]
T. F. Cox and M. A. Cox. Multidimensional scaling. CRC Press, 2010.
[11]
C. Delimitrou and C. Kozyrakis. Paragon: Qos-aware scheduling for heterogeneous datacenters. In Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, pages 77--88. ACM, 2013.
[12]
M. Dobrescu, K. Argyraki, and S. Ratnasamy. Toward predictable performance in software packet-processing platforms. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pages 11--11. USENIX Association, 2012.
[13]
A. Ghodsi, M. Zaharia, S. Shenker, and I. Stoica. Choosy: max-min fair sharing for datacenter jobs with constraints. In Proceedings of the 8th ACM European Conference on Computer Systems, pages 365--378. ACM, 2013.
[14]
F. Guo, Y. Solihin, L. Zhao, and R. Iyer. A framework for providing quality of service in chip multi-processors. In Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, pages 343--355. IEEE Computer Society, 2007.
[15]
J. L. Henning. Spec cpu2006 benchmark descriptions. ACM SIGARCH Computer Architecture News, 34(4):1--17, 2006.
[16]
R. Iyer, L. Zhao, F. Guo, R. Illikkal, S. Makineni, D. Newell, Y. Solihin, L. Hsu, and S. Reinhardt. Qos policies and architecture for cache/memory in cmp platforms. In ACM SIGMETRICS Performance Evaluation Review, volume 35, pages 25--36. ACM, 2007.
[17]
Y. Koh, R. C. Knauerhase, P. Brett, M. Bowman, Z. Wen, and C. Pu. An analysis of performance interference effects in virtual environments. In ISPASS, pages 200--209, 2007.
[18]
Y. Liu, V. Xhagjika, V. Vlassov, and A. Al-Shishtawy. Bwman: Bandwidth manager for elastic services in the cloud. In 12th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2014). IEEE, 2014.
[19]
J. Machina and A. Sodan. Predicting cache needs and cache sensitivity for applications in cloud computing on cmp servers with configurable caches. In Parallel & Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on, pages 1--8. IEEE, 2009.
[20]
J. Mars, L. Tang, R. Hundt, K. Skadron, and M. L. Soffa. Bubble-up: Increasing utilization in modern warehouse scale computers via sensible co-locations. In Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, pages 248--259. ACM, 2011.
[21]
L. Marsh and R. Jones. The form and consequences of random walk movement models. Journal of Theoretical Biology, 133(1):113--131, 1988.
[22]
J. N. Matthews, W. Hu, M. Hapuarachchi, T. Deshane, D. Dimatos, G. Hamilton, M. McCabe, and J. Owens. Quantifying the performance isolation properties of virtualization systems. In Proceedings of the 2007 workshop on Experimental computer science, page 6. ACM, 2007.
[23]
M. Moreto, F. J. Cazorla, A. Ramirez, R. Sakellariou, and M. Valero. Flexdcp: a qos framework for cmp architectures. ACM SIGOPS Operating Systems Review, 43(2):86--96, 2009.
[24]
R. Nathuji, A. Kansal, and A. Ghaffarkhah. Q-clouds: managing performance interference effects for qos-aware clouds. In Proceedings of the 5th European conference on Computer systems, pages 237--250. ACM, 2010.
[25]
S. Novakovic, D. Novakovic, R. Bianchini, D. Kostic, and N. Vasic. Deepdive: Transparently identifying and managing performance interference in virtualized environments. Technical report, 2013.
[26]
A. P. Probability. Random variables and stochastic processes. McGrow, Hill Series Elastical Eng, NY, 1984.
[27]
T. Sherwood, E. Perelman, G. Hamerly, S. Sair, and B. Calder. Discovering and exploiting program phases. Micro, IEEE, 23(6):84--93, 2003.
[28]
M. F. Shlesinger and J. Klafter. Lévy walks versus lévy flights. In On growth and form, pages 279--283. Springer, 1986.
[29]
J. B. Tenenbaum, V. De Silva, and J. C. Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319--2323, 2000.
[30]
F. Urbano, F. Cagnacci, C. Calenge, H. Dettki, A. Cameron, and M. Neteler. Wildlife tracking data management: a new vision. Philosophical Transactions of the Royal Society B: Biological Sciences, 365(1550):2177--2185, 2010.
[31]
N. Vasić, D. Novaković, S. Miučin, D. Kostić, and R. Bianchini. Dejavu: accelerating resource allocation in virtualized environments. In ACM SIGARCH Computer Architecture News, volume 40, pages 423--436. ACM, 2012.
[32]
D. Williams and D. Williams. Weighing the odds: a course in probability and statistics, volume 548. Springer, 2001.
[33]
M. Williams and T. Munzner. Steerable, progressive multidimensional scaling. In Information Visualization, 2004. INFOVIS 2004. IEEE Symposium on, pages 57--64. IEEE, 2004.
[34]
M. G. Xavier, M. V. Neves, F. D. Rossi, T. C. Ferreto, T. Lange, and C. A. De Rose. Performance evaluation of container-based virtualization for high performance computing environments. In Parallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on, pages 233--240. IEEE, 2013.
[35]
H. Yang, A. Breslow, J. Mars, and L. Tang. Bubble-flux: Precise online qos management for increased utilization in warehouse scale computers. In Proceedings of the 40th Annual International Symposium on Computer Architecture, ISCA '13, pages 607--618, New York, NY, USA, 2013. ACM.
[36]
T. Yang, J. Liu, L. McMillan, and W. Wang. A fast approximation to multidimensional scaling. In Proceedings of the ECCV Workshop on Computation Intensive Methods for Computer Vision (CIMCV), pages 354--359, 2006.
[37]
J. Zhang and R. J. Figueiredo. Application classification through monitoring and learning of resource consumption patterns. In Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International, pages 10--pp. IEEE, 2006.
[38]
S. Zhuravlev, S. Blagodurov, and A. Fedorova. Addressing shared resource contention in multicore processors via scheduling. In ACM SIGARCH Computer Architecture News, volume 38, pages 129--142. ACM, 2010.

Cited By

View all
  • (2024)FEDGE: An Interference-Aware QoS Prediction Framework for Black-Box Scenario in IaaS Clouds with Domain Generalization2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS57955.2024.00020(128-138)Online publication date: 27-May-2024
  • (2024)Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approachJournal of Systems and Software10.1016/j.jss.2024.112117216(112117)Online publication date: Oct-2024
  • (2023)Component-distinguishable Co-location and Resource Reclamation for High-throughput ComputingACM Transactions on Computer Systems10.1145/363000642:1-2(1-37)Online publication date: 18-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Middleware '14: Proceedings of the 15th International Middleware Conference
December 2014
334 pages
ISBN:9781450327855
DOI:10.1145/2663165
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Orange
  • Conseil Régional d'Aquitaine
  • LaBRI: LaBRI
  • Raytheon BBN Technologies: Raytheon BBN Technologies
  • ACM: Association for Computing Machinery
  • Red Hat JBoss Middleware: Red Hat JBoss Middleware
  • Bordeaux: City of Bordeaux
  • USENIX Assoc: USENIX Assoc
  • GDR ASR: GDR Architecture, Systèmes et Réseaux
  • IBM: IBM
  • HP: HP
  • IFIP

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. interference mitigation
  2. performance interference
  3. performance sensitivity
  4. quality of service
  5. virtualization

Qualifiers

  • Research-article

Funding Sources

Conference

Middleware '14
Sponsor:
  • LaBRI
  • Raytheon BBN Technologies
  • ACM
  • Red Hat JBoss Middleware
  • Bordeaux
  • USENIX Assoc
  • GDR ASR
  • IBM
  • HP

Acceptance Rates

Middleware '14 Paper Acceptance Rate 27 of 144 submissions, 19%;
Overall Acceptance Rate 203 of 948 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)FEDGE: An Interference-Aware QoS Prediction Framework for Black-Box Scenario in IaaS Clouds with Domain Generalization2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS57955.2024.00020(128-138)Online publication date: 27-May-2024
  • (2024)Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approachJournal of Systems and Software10.1016/j.jss.2024.112117216(112117)Online publication date: Oct-2024
  • (2023)Component-distinguishable Co-location and Resource Reclamation for High-throughput ComputingACM Transactions on Computer Systems10.1145/363000642:1-2(1-37)Online publication date: 18-Nov-2023
  • (2023)Towards a Robust On-line Performance Model Identification for Change Impact Prediction2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)10.1109/SEAMS59076.2023.00018(68-78)Online publication date: May-2023
  • (2022)Guaranteeing Performance SLAs of Cloud Applications Under Resource StormsIEEE Transactions on Cloud Computing10.1109/TCC.2020.298537210:2(1329-1343)Online publication date: 1-Apr-2022
  • (2021)Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud EnvironmentIEEE Transactions on Cloud Computing10.1109/TCC.2018.28370409:1(168-181)Online publication date: 1-Jan-2021
  • (2021)Low overhead performance monitoring for shared infrastructuresExpert Systems with Applications10.1016/j.eswa.2020.114558171(114558)Online publication date: Jun-2021
  • (2020)RhythmProceedings of the Fifteenth European Conference on Computer Systems10.1145/3342195.3387534(1-17)Online publication date: 15-Apr-2020
  • (2018)PythiaProceedings of the 19th International Middleware Conference10.1145/3274808.3274820(146-160)Online publication date: 26-Nov-2018
  • (2018)Automatic Generation of Workload Profiles Using Unsupervised Learning PipelinesIEEE Transactions on Network and Service Management10.1109/TNSM.2017.278604715:1(142-155)Online publication date: Mar-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media