SlideShare una empresa de Scribd logo
1 de 133
Black Box Methods for Inferring Parallel Applications' Properties in Virtual Environments Ashish Gupta March 2008 PhD Final Talk Committee: Prof. Peter Dinda Prof. Fabian Bustamante Prof. Yan Chen Prof. Dongyan Xu (Purdue University)
Introduction
Background ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Problem Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Adaptation in Virtuoso Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Input for adaptation problem formalization in my colleague Ananth Sundararaj’s thesis Different input components Many more inferable properties VM/application demands Resource availability User constraints
Thesis Statement ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Chapter 2 Chapter 3 Chapter 4 Appendices A, B
Black box assumption and impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Components of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 1 2 3 4 5 6
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Topics I cover Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B
BSP application model ,[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Patterns ,[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Some parameters Topology Number of processors Message size # of iterations Flops per element Memory Reads/Writes  per element Topologies N-dimensional mesh N-dimensional torus N-dimensional hypercube Binary reduction tree All to All
Patterns application’s capabilities Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 2-D Mesh 3-D Toroid 3-D Hypercube Reduction Tree All-to-All
NAS parallel benchmarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Different contributions of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B
Collective Inference for Topology: VTTIF
Goal of VTTIF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Low Level Traffic  Monitoring ? An online topology inference framework for a VM environment Application Topology
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Traffic Analyzer Rate based  Change detection Traffic Matrix Query Agent VM Network Scheduling Agent VNET daemon VM VNET overlay network To other VNET daemons Physical Host VTTIF Architecture
Inferred topology Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Parallel Integer Sort
Black Box Measures of performance
The problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Cost model for BSP applications ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Computation cost Communication cost Number of super steps Sync latency cost Speed of computation in FLOPS Static model of performance +  requires detailed application profiling and access to source code
Super-step approach ,[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Another possible measure of performance: number of super-steps executed per second, or the  iteration rate     dynamic metric Multiple super-steps for dynamic applications    iteration rate is not constant
A new black box metric: Round Trip Iteration Rate (RIR) ,[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Inter send-packet delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 176  Receive  from 175 176  Send  to 175 176  Send  to 175 176  Send  to 175 176  Receive  from 175 176  Send  to 175
Inter send-packet delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Traffic trace for Patterns Message size = 4000 bytes Computation per iteration: 100 MFlops Clustering based on inter-send delays Count  in cluster matches actual iteration rate output by application (325)
Patterns: clusters without load Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Actual: 568 Reported: 569
Patterns: clusters with external CPU load Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Actual: 142 Reported: 153 Actual execution time ratio: 3.922 Ratio from reported iteration rate: 3.72 Within 5%
Why Does Circled Bin Correspond To Iteration Rate? ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments time Send packets
Plotting inter send-packet delay for MG Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments ,[object Object],[object Object]
Computing the RIR metric ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For a given packet time series, 1. Count send pairs whose inter-packet delay exceeds by c * RTT 2. Send pair must be interleaved by one receive Based on BSP principles
RIR time series Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For dynamic applications, RIR changes with time Need a time series for RIR over the trace
Outputting RIR time series - Workflow Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Sniff Packets Send packets that  obey the conditions Slide a 1 second window  over these send packets Sliding interval =   t Get a new time series  denoting RIR for each  1 second sliding window Sampling duration = T Derivative Metrics from  the above time series Average RIR CDF Power Spectrum Super-phase period Using tcpdump/libpcap for the VM traffic Send packets satisfying  the two conditions 1 sec Slide by   t i 1 , i 2,  i 3,  i 4,  i 5, ….  i n Each number represents number of  iterations for a particular 1 sec window  instance
Representing Dynamic Performance  ,[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments RIR avg RIR-CDF RIR-PS RIR-PSE Long term stationary average of RIR time series CDF of RIR time series indicating spread of iteration rates Phase structure, periodicities, application fingerprinting, statistical scheduling Summary of the periodic behavior for multiple supersteps
Computing the stationary Average – sampling issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Effectiveness of RIR avg Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For MG application, running under different load conditions (100% and 60% CPU load), predicted execution time error rates were  13%  and  7%  respectively (completely black box) Value of c = 1.1 here  (c*RTT factor)
RIR time series graph Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments A super-step
Can we predict slowdown of application if we put it under load ? For the IS and MG applications,  which application may be hurt more  if one of the processes from each application shares the physical host with an external computational load? The impact: we can now determine in  advance , the impact of external load if we must choose one of these applications to be influenced by the load. ,[object Object],[object Object],[object Object]
Role of CDF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Slowdown mapping
Other metrics  ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
A sample power spectrum for 4 processes Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Consistency across processes
Example for MG Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Significant frequency separation Exec time = 19.44 seconds Super-phase period = 4.1 seconds (1/0.244) Number of super-phases ~4
Recap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Ball In the Court Methods
The problem ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Ball in the Court ,[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments BIC delay
Developing a strategy ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments stretched Under load
Why BIC delay? ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Approach to computing the BIC delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Let’s compute the time differential for event pairs, for *.176 Some computation  (6 ms) Some computation (6ms)
With Load, Some BIC Delays Get Larger Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Loaded process Unloaded process 1. Sending an ack    process’s responsibility 2. This responsibility was hugely inflated in the loaded case ( 64 us to 23822 us) 3. BIC delays for other receives are similar (receive    BIC for other processes)
An Algorithm for BIC Delay? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
BIC events ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Computing the BIC delay ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Using BIC Delays to Measure Application Imbalance ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Using BIC Delays to Measure Application Imbalance Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Compute BIC delay Imbalance Algorithm Slowdown
Computing the no-load runtime using BIC delays ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Global BIC algorithm Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Evaluation with the IS application Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Balanced case Total runtime = 14.36 seconds Total runtime = 152.67 seconds Loaded case Imbalance between 176 and 175 = 124.49 seconds Actual difference = 138.41 seconds Using completely black box means, we could determine, how slow is the application running with load,  without knowing about the unloaded case
More sophisticated Imbalance Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Other contributions in the Chapter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Global bottlenecks and Time Decomposition
Global Bottleneck ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments BIC analysis for  local imbalance Global  Time Decomposition Measure current performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Eliminate a bottleneck using  adaptation mechanisms NO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Flowchart for diagnosis Chap 3 Chap 4 Chap 5 Appendices A,B Tools Questions/problems
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Different contributions of dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B * An API also defined in the dissertation
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Monitoring and inference Application performance measure Adaptation algorithm Adaptation mechanisms Adaptation Applications Optimization metric ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput For high Compute/Communicate Ratio,  Migration + Topology dramatically improves performance Adapting to External Load Imbalance External load removed, but I/O still dominates, so topology helps External load removed, can drive higher I/O
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Free Network Measurement For Adaptive Virtualized Distributed Computing
Closest Related Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Closest Related Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Related Publications ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Other Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Sketch-based reverse hashing work User feedback work
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Components of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 1 2 3 4 5 6
Thank you !
Backup slides
Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Increasing Application Performance In Virtual Environments Through Run-time Inference and Adaptation ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Published in LCR 2004,  HPDC 2005
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Optimization Problem (2/2) Topology + Migration Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments The algorithm is described in detail in the paper
Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput Adapting to Compute/Communicate Ratio For high Compute/Communicate Ratio,  Migration + Topology dramatically improves performance Less time spent in I/O, so migration alone is enough Since I/O dominates, drop in latency improves performance Even for small amount of I/O, it takes up significant time
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments TPCW Throughput (WIPS) With Image Server Facing External Load  No Topology Topology No Migration 1.216 1.76 Migration 1.4 2.52
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Free Network Measurement for Adaptive Virtualized Distributed Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],WREN PAPER, Published in IPDPS 2006
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments What is WREN ? Developed by my colleague Marcia Zangrilli from WM College 1. Observes incoming/outgoing packets 2. Online analysis to derive latency/bandwidth information for all host pair connections 3. Answers network queries for any pair of hosts What does it do ?
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments An important Contribution: Problem Formalization
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Two approaches to adaptation
VTTIF in a dynamic topology environment Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Parameters:  Smoothing Window    sliding window duration over which updates  are aggregated Update Rate Detection Threshold
Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Bin
Evidence of Adaptation Driven by Inference
Evidence of Adaptation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Optimization Problem (2/2) Topology + Migration Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments The algorithm is described in detail in the paper
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput For high Compute/Communicate Ratio,  Migration + Topology dramatically improves performance Adapting to External Load Imbalance External load removed, but I/O still dominates, so topology helps External load removed, can drive higher I/O
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Evaluation Scenario 2  : Large 256 host topology. 32 potential hosts, 8 Virtual Machines Results for  Multi Constraint Cost Function  : Bandwidth and Latency Annealing easy to adapt and finds good mappings compared to heuristic
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments The New Adaptation Process
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Two approaches to adaptation
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Evaluation Scenario 2  : Large 256 host topology. 32 potential hosts, 8 Virtual Machines Results for  Multi Constraint Cost Function  : Bandwidth and Latency Annealing easy to adapt and finds good mappings compared to heuristic
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance  Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing
Overview of the Talk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Overview of the Talk ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Virtual Machine Distributed Computing ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Impact ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Impact Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Model ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Citations [167] VALIANT, L. A bridging model for parallel computation.  Communications of the ACM 33 , 8 (Aug. 1990), 103–111.
Two threads to my dissertation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Two threads to my dissertation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Other inference properties ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Impact ,[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
A VNET virtual layer ,[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments VNET Layer Physical Layer A Virtual LAN over wide area
Overall Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Dynamic Topology Inference by VTTIF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 1. Fast updates Smoothed Traffic Matrix 2. Low Pass Filter Aggregation 3. Threshold change detection Topology change output VNET Daemons on Hosts VNET Daemon at Proxy Aggregated Traffic Matrix
Contributions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Solving the issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Gives us 95% cutoff sampling rate
Solving the issues Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Capturing the right time duration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Effect of load on the RIR time series Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 1. Expansion effect 2. Basic structure of time series is same 3. Each phase more irregular (more spikes) 4. Captures the time dynamics of the application
The RIR-CDF metric ,[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Global metric
The RIR-CDF metric Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments CDF indicates the RIR region application spends most of its time in RIR-CDF can be used to predict which application will be more affected by external load (for dynamic applications) I show how we can predict slowdown for MG vs IS Slowdown mapping
Taking guidance from RIR-CDF : a proof of concept ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Effect of load on different RIR areas Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Difference of performance over 12.46 times at the extremes  under full load Applications with higher iteration rates always seem to be more drastically affected by external load then those with lower iteration rates.
Scheduling using the CDF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments ,[object Object],Input: RIR value Output: Fractional slowdown Assumed load = 100% More realistic mappings may take bandwidth and CPU utilization as input
Scheduling using the CDF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For the IS and MG applications we have seen till now, which application may be hurt more if one of the processes from each application shares the physical host with an external computational load? The impact: we can now determine in  advance , the impact of external load if we must choose one of these applications to be influenced by the load. Map each RIR value to its slowdown RIR value from the mapping Slowdown CDF
Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Slowdown CDF For MG Slowdown CDF For IS More time spent in low regions Avg = 0.103 Avg = 0.065
Actual slowdown ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Power Spectrum ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Why do I want to do this? ,[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
The Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
Process Level BIC imbalance Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments

Más contenido relacionado

La actualidad más candente

Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...VLSICS Design
 
slam_research_paper
slam_research_paperslam_research_paper
slam_research_paperVinit Payal
 
Raminder kaur presentation_two
Raminder kaur presentation_twoRaminder kaur presentation_two
Raminder kaur presentation_tworamikaurraminder
 
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : Notes
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : NotesIs Multicore Hardware For General-Purpose Parallel Processing Broken? : Notes
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : NotesSubhajit Sahu
 
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...VLSICS Design
 
Vlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmVlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmjpstudcorner
 
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic ReasoningHybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic ReasoningHassan Rifky
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 

La actualidad más candente (8)

Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...
 
slam_research_paper
slam_research_paperslam_research_paper
slam_research_paper
 
Raminder kaur presentation_two
Raminder kaur presentation_twoRaminder kaur presentation_two
Raminder kaur presentation_two
 
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : Notes
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : NotesIs Multicore Hardware For General-Purpose Parallel Processing Broken? : Notes
Is Multicore Hardware For General-Purpose Parallel Processing Broken? : Notes
 
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...
 
Vlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmVlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithm
 
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic ReasoningHybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 

Destacado

Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficAcademia Sinica
 
554 paper bag princess
554  paper bag princess554  paper bag princess
554 paper bag princesslizbrianne
 
Analyzing and inferring plot and theme
Analyzing and inferring plot and themeAnalyzing and inferring plot and theme
Analyzing and inferring plot and thememelzoerhof
 
The thesis statement
The thesis statementThe thesis statement
The thesis statementmelzoerhof
 
Inferring: The Heartbeat of Comprehension K-6
Inferring: The Heartbeat of Comprehension K-6Inferring: The Heartbeat of Comprehension K-6
Inferring: The Heartbeat of Comprehension K-6katiekeier
 
Query Linguistic Intent Detection
Query Linguistic Intent DetectionQuery Linguistic Intent Detection
Query Linguistic Intent Detectionbutest
 
Neural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewNeural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewAshish Khetan
 
Logica | Intelligent Self learning - a helping hand in financial crime
Logica | Intelligent Self learning - a helping hand in financial crimeLogica | Intelligent Self learning - a helping hand in financial crime
Logica | Intelligent Self learning - a helping hand in financial crimeCGI
 
Deep Learning for NLP Applications
Deep Learning for NLP ApplicationsDeep Learning for NLP Applications
Deep Learning for NLP ApplicationsSamiur Rahman
 
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...Philippe Laborie
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Mahdi Hosseini Moghaddam
 
Inferring Strategy
Inferring StrategyInferring Strategy
Inferring StrategyJody Sulser
 
Cognitive Modeling & Intelligent Tutors
Cognitive Modeling & Intelligent TutorsCognitive Modeling & Intelligent Tutors
Cognitive Modeling & Intelligent TutorsCody Ray
 
Ai and neural networks
Ai and neural networksAi and neural networks
Ai and neural networksNikhil Kansari
 
Home Automation: Design and Construction of an intelligent design for Cooling...
Home Automation: Design and Construction of an intelligent design for Cooling...Home Automation: Design and Construction of an intelligent design for Cooling...
Home Automation: Design and Construction of an intelligent design for Cooling...Adedamola Wuraola
 

Destacado (20)

Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
 
554 paper bag princess
554  paper bag princess554  paper bag princess
554 paper bag princess
 
W3 Inference PL
W3 Inference PLW3 Inference PL
W3 Inference PL
 
Analyzing and inferring plot and theme
Analyzing and inferring plot and themeAnalyzing and inferring plot and theme
Analyzing and inferring plot and theme
 
The thesis statement
The thesis statementThe thesis statement
The thesis statement
 
CGI_Multiplication_And_Division
CGI_Multiplication_And_DivisionCGI_Multiplication_And_Division
CGI_Multiplication_And_Division
 
Inferring: The Heartbeat of Comprehension K-6
Inferring: The Heartbeat of Comprehension K-6Inferring: The Heartbeat of Comprehension K-6
Inferring: The Heartbeat of Comprehension K-6
 
7 inferring
7 inferring7 inferring
7 inferring
 
Query Linguistic Intent Detection
Query Linguistic Intent DetectionQuery Linguistic Intent Detection
Query Linguistic Intent Detection
 
Neural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewNeural Network Applications In Machining: A Review
Neural Network Applications In Machining: A Review
 
Logica | Intelligent Self learning - a helping hand in financial crime
Logica | Intelligent Self learning - a helping hand in financial crimeLogica | Intelligent Self learning - a helping hand in financial crime
Logica | Intelligent Self learning - a helping hand in financial crime
 
Deep Learning for NLP Applications
Deep Learning for NLP ApplicationsDeep Learning for NLP Applications
Deep Learning for NLP Applications
 
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
An Optimal Iterative Algorithm for Extracting MUCs in a Black-box Constraint ...
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 
Inferring Strategy
Inferring StrategyInferring Strategy
Inferring Strategy
 
Cognitive Modeling & Intelligent Tutors
Cognitive Modeling & Intelligent TutorsCognitive Modeling & Intelligent Tutors
Cognitive Modeling & Intelligent Tutors
 
Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...
 
Ai and neural networks
Ai and neural networksAi and neural networks
Ai and neural networks
 
Neural
NeuralNeural
Neural
 
Home Automation: Design and Construction of an intelligent design for Cooling...
Home Automation: Design and Construction of an intelligent design for Cooling...Home Automation: Design and Construction of an intelligent design for Cooling...
Home Automation: Design and Construction of an intelligent design for Cooling...
 

Similar a Black Box Methods for Inferring Parallel Applications' Properties in Virtual Environments

Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clusteringNishanth Harapanahalli
 
A petri net model for hardware software codesign
A petri net model for hardware software codesignA petri net model for hardware software codesign
A petri net model for hardware software codesignJULIO GONZALEZ SANZ
 
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...HostedbyConfluent
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...Fatima Qayyum
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingIRJET Journal
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...ieeepondy
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...IEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEEMEMTECHSTUDENTPROJECTS
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics TestingCloudCheckr
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationNikolay Milovanov
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaGabriele Bozzi
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
 
COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING
 COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING
COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCINGnexgentechnology
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxMichel Burger
 

Similar a Black Box Methods for Inferring Parallel Applications' Properties in Virtual Environments (20)

Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Methodology of virtual machines sizing
Methodology of virtual machines sizingMethodology of virtual machines sizing
Methodology of virtual machines sizing
 
A petri net model for hardware software codesign
A petri net model for hardware software codesignA petri net model for hardware software codesign
A petri net model for hardware software codesign
 
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Automatic scaling of internet applic...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics Testing
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
 
COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING
 COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING
COST-EFFECTIVE LOW-DELAY DESIGN FOR MULTI-PARTY CLOUD VIDEO CONFERENCING
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Black Box Methods for Inferring Parallel Applications' Properties in Virtual Environments

  • 1. Black Box Methods for Inferring Parallel Applications' Properties in Virtual Environments Ashish Gupta March 2008 PhD Final Talk Committee: Prof. Peter Dinda Prof. Fabian Bustamante Prof. Yan Chen Prof. Dongyan Xu (Purdue University)
  • 3.
  • 4.
  • 5. Adaptation in Virtuoso Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Input for adaptation problem formalization in my colleague Ananth Sundararaj’s thesis Different input components Many more inferable properties VM/application demands Resource availability User constraints
  • 6.
  • 7.
  • 8. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Components of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 1 2 3 4 5 6
  • 9. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Topics I cover Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B
  • 10.
  • 11.
  • 12. Patterns application’s capabilities Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 2-D Mesh 3-D Toroid 3-D Hypercube Reduction Tree All-to-All
  • 13.
  • 14. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Different contributions of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B
  • 15. Collective Inference for Topology: VTTIF
  • 16. Goal of VTTIF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Low Level Traffic Monitoring ? An online topology inference framework for a VM environment Application Topology
  • 17. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Traffic Analyzer Rate based Change detection Traffic Matrix Query Agent VM Network Scheduling Agent VNET daemon VM VNET overlay network To other VNET daemons Physical Host VTTIF Architecture
  • 18. Inferred topology Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Parallel Integer Sort
  • 19. Black Box Measures of performance
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Inter send-packet delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 176 Receive from 175 176 Send to 175 176 Send to 175 176 Send to 175 176 Receive from 175 176 Send to 175
  • 25. Inter send-packet delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Traffic trace for Patterns Message size = 4000 bytes Computation per iteration: 100 MFlops Clustering based on inter-send delays Count in cluster matches actual iteration rate output by application (325)
  • 26. Patterns: clusters without load Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Actual: 568 Reported: 569
  • 27. Patterns: clusters with external CPU load Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Actual: 142 Reported: 153 Actual execution time ratio: 3.922 Ratio from reported iteration rate: 3.72 Within 5%
  • 28.
  • 29.
  • 30.
  • 31. RIR time series Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For dynamic applications, RIR changes with time Need a time series for RIR over the trace
  • 32. Outputting RIR time series - Workflow Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Sniff Packets Send packets that obey the conditions Slide a 1 second window over these send packets Sliding interval =  t Get a new time series denoting RIR for each 1 second sliding window Sampling duration = T Derivative Metrics from the above time series Average RIR CDF Power Spectrum Super-phase period Using tcpdump/libpcap for the VM traffic Send packets satisfying the two conditions 1 sec Slide by  t i 1 , i 2, i 3, i 4, i 5, …. i n Each number represents number of iterations for a particular 1 sec window instance
  • 33.
  • 34.
  • 35. Effectiveness of RIR avg Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For MG application, running under different load conditions (100% and 60% CPU load), predicted execution time error rates were 13% and 7% respectively (completely black box) Value of c = 1.1 here (c*RTT factor)
  • 36. RIR time series graph Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments A super-step
  • 37.
  • 38.
  • 39.
  • 40. A sample power spectrum for 4 processes Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Consistency across processes
  • 41. Example for MG Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Significant frequency separation Exec time = 19.44 seconds Super-phase period = 4.1 seconds (1/0.244) Number of super-phases ~4
  • 42.
  • 43. Ball In the Court Methods
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Approach to computing the BIC delay Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Let’s compute the time differential for event pairs, for *.176 Some computation (6 ms) Some computation (6ms)
  • 49. With Load, Some BIC Delays Get Larger Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Loaded process Unloaded process 1. Sending an ack  process’s responsibility 2. This responsibility was hugely inflated in the loaded case ( 64 us to 23822 us) 3. BIC delays for other receives are similar (receive  BIC for other processes)
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. Using BIC Delays to Measure Application Imbalance Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Compute BIC delay Imbalance Algorithm Slowdown
  • 55.
  • 56. Global BIC algorithm Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
  • 57. Evaluation with the IS application Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Balanced case Total runtime = 14.36 seconds Total runtime = 152.67 seconds Loaded case Imbalance between 176 and 175 = 124.49 seconds Actual difference = 138.41 seconds Using completely black box means, we could determine, how slow is the application running with load, without knowing about the unloaded case
  • 58.
  • 59.
  • 60.
  • 61. Global bottlenecks and Time Decomposition
  • 62.
  • 63.
  • 64. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Different contributions of dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 2 3 4 5 A B * An API also defined in the dissertation
  • 65.
  • 66. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput For high Compute/Communicate Ratio, Migration + Topology dramatically improves performance Adapting to External Load Imbalance External load removed, but I/O still dominates, so topology helps External load removed, can drive higher I/O
  • 67. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Free Network Measurement For Adaptive Virtualized Distributed Computing
  • 68.
  • 69.
  • 70.
  • 71.
  • 72. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Components of my dissertation Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing Inference Adaptation 1 2 3 4 5 6
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput Adapting to Compute/Communicate Ratio For high Compute/Communicate Ratio, Migration + Topology dramatically improves performance Less time spent in I/O, so migration alone is enough Since I/O dominates, drop in latency improves performance Even for small amount of I/O, it takes up significant time
  • 80. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments TPCW Throughput (WIPS) With Image Server Facing External Load No Topology Topology No Migration 1.216 1.76 Migration 1.4 2.52
  • 81.
  • 82. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments What is WREN ? Developed by my colleague Marcia Zangrilli from WM College 1. Observes incoming/outgoing packets 2. Online analysis to derive latency/bandwidth information for all host pair connections 3. Answers network queries for any pair of hosts What does it do ?
  • 83. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments An important Contribution: Problem Formalization
  • 84. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Two approaches to adaptation
  • 85. VTTIF in a dynamic topology environment Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Parameters: Smoothing Window  sliding window duration over which updates are aggregated Update Rate Detection Threshold
  • 86.
  • 87.
  • 88. Bin
  • 89. Evidence of Adaptation Driven by Inference
  • 90.
  • 91.
  • 92. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Effect on BSP Application Throughput For high Compute/Communicate Ratio, Migration + Topology dramatically improves performance Adapting to External Load Imbalance External load removed, but I/O still dominates, so topology helps External load removed, can drive higher I/O
  • 93. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Evaluation Scenario 2 : Large 256 host topology. 32 potential hosts, 8 Virtual Machines Results for Multi Constraint Cost Function : Bandwidth and Latency Annealing easy to adapt and finds good mappings compared to heuristic
  • 94. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments The New Adaptation Process
  • 95. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Two approaches to adaptation
  • 96. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Evaluation Scenario 2 : Large 256 host topology. 32 potential hosts, 8 Virtual Machines Results for Multi Constraint Cost Function : Bandwidth and Latency Annealing easy to adapt and finds good mappings compared to heuristic
  • 97.
  • 98.
  • 99.
  • 100.
  • 101. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing
  • 102. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Summary of contributions Virtual Topology and Traffic Inference Framework Black box metrics for Absolute Performance Ball in The Court principles to compute application slowdown Global Bottlenecks using time decomposition Increasing Application Performance In Virtual Environments through Run-time Inference and Adaptation Free Network Measurement For Adaptive Virtualized Distributed Computing
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. Citations [167] VALIANT, L. A bridging model for parallel computation. Communications of the ACM 33 , 8 (Aug. 1990), 103–111.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116. Dynamic Topology Inference by VTTIF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 1. Fast updates Smoothed Traffic Matrix 2. Low Pass Filter Aggregation 3. Threshold change detection Topology change output VNET Daemons on Hosts VNET Daemon at Proxy Aggregated Traffic Matrix
  • 117.
  • 118.
  • 119. Solving the issues Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments
  • 120.
  • 121. Effect of load on the RIR time series Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments 1. Expansion effect 2. Basic structure of time series is same 3. Each phase more irregular (more spikes) 4. Captures the time dynamics of the application
  • 122.
  • 123. The RIR-CDF metric Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments CDF indicates the RIR region application spends most of its time in RIR-CDF can be used to predict which application will be more affected by external load (for dynamic applications) I show how we can predict slowdown for MG vs IS Slowdown mapping
  • 124.
  • 125. Effect of load on different RIR areas Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Difference of performance over 12.46 times at the extremes under full load Applications with higher iteration rates always seem to be more drastically affected by external load then those with lower iteration rates.
  • 126.
  • 127. Scheduling using the CDF Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments For the IS and MG applications we have seen till now, which application may be hurt more if one of the processes from each application shares the physical host with an external computational load? The impact: we can now determine in advance , the impact of external load if we must choose one of these applications to be influenced by the load. Map each RIR value to its slowdown RIR value from the mapping Slowdown CDF
  • 128. Black Box Methods for Inferring Parallel Applications' properties in Virtual Environments Slowdown CDF For MG Slowdown CDF For IS More time spent in low regions Avg = 0.103 Avg = 0.065
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.

Notas del editor

  1. Adopt the “we” attitude. We will be looking at two main part in the presentation. The first part is about low overhead statistics gathering.