1 / 16

Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments

Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments. Ananth I. Sundararaj, Manan Sanghi, John R. Lange and Peter A. Dinda {ais,manan,jarusl,pdinda}@cs.northwestern.edu Prescience Lab Department of Electrical Engineering and Computer Science

latona
Download Presentation

Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hardness of Approximation and GreedyAlgorithms for the Adaptation Problem inVirtual Environments Ananth I. Sundararaj, Manan Sanghi, John R. Lange and Peter A. Dinda {ais,manan,jarusl,pdinda}@cs.northwestern.edu Prescience Lab Department of Electrical Engineering and Computer Science Northwestern University

  2. Summary • Virtual execution environments provide opportunities for dynamic adaptation • Important components are • Resource monitoring and inference • Application independent adaptation mechanisms • Efficient adaptation algorithms • In this work • Formalize the adaptation problem • Show that it is NP-hard • Prove that it is NP-hard to approximate • Evaluate greedy heuristics

  3. Virtual Machine Grid Computing Deliver arbitrary amounts of computational power to perform distributed and parallel computations Aim 1 Traditional Paradigm New Paradigm 2 5 Grid Computing using virtual machines Resource multiplexing using OS level mechanism Grid Computing 4 3a 3b 6a Problem1: 6b Virtual Machines What are they? Complexity from resource user’s perspective Solution Problem2: How to leverage them? Complexity from resource owner’s perspective

  4. Virtual Machines Virtual machine monitors (VMMs) • Raw machine is the abstraction • VM represented by a single • image • VMware GSX Server

  5. The Simplified Virtuoso Model Virtual networking ties the machine back to user’s home network User’s LAN Specific hardware and performance VM Basic software installation available Orders a raw machine Virtuoso continuously monitors and adapts User

  6. Virtual Networks VM traffic going out on foreign LAN Foreign hostile LAN X User’s friendly LAN IP network Virtual Machine Host • A machine is suddenly plugged into a foreign network. What happens? • Does it get an IP address? • Is it a routeable address? • Does firewall let its traffic • through? To any port? Proxy VNET: A bridge with long wires

  7. Measurement and Inference Underlying network Host and VM • Size and compute capacities • Size and compute demands • Topology • Bandwidth • Latency Application (VTTIF) [Gupta et al. IPDPS 06] • Topology • Traffic load [Gupta et al. LNCS 05] Application layer VM layer Virtual network layer VNET daemons Underlying network layer Physical hosts

  8. Adaptation Mechanisms VM Migration Topology changes • Overlay links • Overlay forwarding rules • Third party migration schemes [Sundararaj et al. LCR 04, HPDC 05] Resource reservation • Network • CPU [Lange et al. HPDC 05] [Lin et al. GRID 2004] X VM Migration VM layer X Topology changes X VNET daemons Resource reservation Physical hosts

  9. Adaptation in Virtuoso Any Adaptation Scheme Infer application’s resource demands input Algorithmmatches demands to resources bydriving Adaptation mechanisms suchthat Defined objective function is optimized Measure physically available resources input Adaptation in Virtuoso VTTIF Infers application’s demands input Algorithm matches demands to resources by driving VM Migration, Topology, routing, Resource reservation that Maximizes sum of residual bottleneck bandwidths Wren measures available resources input

  10. Optimization Problem • Given the • network traffic load matrix of the application • computational intensity in each VM • topology of the network • load on its links, routers and hosts • What is the • mapping of VMs to hosts • overlay topology connecting the hosts • forwarding rules on that topology • required CPU and network reservations • That • maximizes the application performance?

  11. Problem Formulation (MARPVEE) Mapping and Routing Problem in Virtual Execution Environments Measured data Application demands VM to host mapping Constraints Objective function

  12. Results • Theorem 1: MARPVEED (decision version) is NP-complete. • The NP-hardness is established by reduction from the Edge Disjoint Path Problem (EDPP) • A simpler problem with only the routing component • (RPVEED) is shown to be NP-complete • Theorem 2: For any δ> 0, it is NP-hard to approximate • MARPVEE within m1/2- δ unless P=NP. • EDPP is used to investigate the approximability of MARPVEE. • m is the number of edges in the virtual overlay graph

  13. Greedy Adaptation Algorithms • Devised two greedy algorithms for mapping VMs to hosts • Finds all mappings in a single pass (GreedyMapOne) • Other takes two passes over input data (GreedyMapTwo) • Adapted Dijkstra’s shortest path algorithm • Finds widest path for an unsplittable network flow (GreedyRouting) • MARPVEE involves both, mapping and routing network flows • First apply the mapping algorithm (either one) followed by the routing algorithm • Alternatively we can interleave the two

  14. Physical Topology Virginia, USA 100 Mbit backplane internal bandwidth 10 MB/sec 0.89 IP network 1.76 1.58 Illinois, USA 100 Mbit backplane internal bandwidth 11 MB/sec Pittsburgh, USA Numbers indicate end-to-end available bandwidth (MB/sec) between the different locations Application Topology vm6 vm1 vm2 0.98 Mapping an application topology onto a physical topology 0.75 0.56 1.3 0.7 0.98 vm3 0.56 0.56 0.56 0.33 0.59 0.7 vm5 vm4 vm7 vm8 An application consisting of two disjoint pieces executing inside of the virtual machines (VMs). The numbers indicate the bandwidth (MB/sec) demand among the communicating pairs

  15. Evaluation • Implemented an evaluator to calculate the residual bandwidth for multiple test cases • We evaluated the four algorithm variations in three different settings • randomly generated topologies using BRITE • smaller topologies created by hand • a real world scenario • All the algorithms were found to perform well in most scenarios. • For randomly generated topologies we do not see any differences between the different variations. • However for the topology created by hand and for the real world scenario that result in a clustered setting, the one-pass variation outperforms the two-pass algorithm. • Further, we did not notice in difference between the interleaved and non-interleaved variations.

  16. For More Information • Please visit • Virtuoso: Resource Management and Prediction for Distributed Computing using Virtual Machines • http://virtuoso.cs.northwestern.edu • Prescience Lab(Northwestern University) • http://plab.cs.northwestern.edu

More Related