1 SLA Enforcement in the Service Cloud Anja Grünheid Fakultät für Informatik Lehrstuhl III - Datenbanksysteme.

Slides:



Advertisements
Similar presentations
Planning Reports and Proposals
Advertisements

Software Requirements
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Chapter 5: CPU Scheduling
1 Concurrency: Deadlock and Starvation Chapter 6.
Zhongxing Telecom Pakistan (Pvt.) Ltd
C9: SOA Management with Actional® for Sonic™
Advanced Piloting Cruise Plot.
Motivation Business analysis Order entry Maintenance
Technische Universität München + Hewlett Packard Laboratories Dynamic Workload Management for Very Large Data Warehouses Juggling Feathers and Bowling.
Libra: An Economy driven Job Scheduling System for Clusters Jahanzeb Sherwani 1, Nosheen Ali 1, Nausheen Lotia 1, Zahra Hayat 1, Rajkumar Buyya 2 1. Lahore.
Pricing for Utility-driven Resource Management and Allocation in Clusters Chee Shin Yeo and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS)
Chapter 1: The Database Environment
Chapter 8 Software Prototyping.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Relational Database and Data Modeling
On the Use of Service Level Agreements in AssessGrid.
OGF19 -- NC 1 Service Level Agreements and QoS: what do we measure and why? Omer F. Rana School of Computer Science, Cardiff.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
Making the System Operational
VARUN GUPTA Carnegie Mellon University 1 Partly based on joint work with: Anshul Gandhi Mor Harchol-Balter Mike Kozuch (CMU) (CMU) (Intel Research)
Real Time Versions of Linux Operating System Present by Tr n Duy Th nh Quách Phát Tài 1.
Configuration management
Software change management
Operating Systems Disk Scheduling A. Frank - P. Weisberg.
DOROTHY Design Of customeR dRiven shOes and multi-siTe factorY Product and Production Configuration Method (PPCM) ICE 2009 IMS Workshops Dorothy Parallel.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide
Chapter 18 Methodology – Monitoring and Tuning the Operational System Transparencies © Pearson Education Limited 1995, 2005.
Managing Web server performance with AutoTune agents by Y. Diao, J. L. Hellerstein, S. Parekh, J. P. Bigu Jangwon Han Seongwon Park
Web Performance Tuning Lin Wang, Ph.D. US Department of Education Copyright [Lin Wang] [2004]. This work is the intellectual property of the author. Permission.
ABC Technology Project
@ Carnegie Mellon Databases Data-oriented Transaction Execution VLDB 2010 Ippokratis Pandis Ryan Johnson Nikos Hardavellas Anastasia Ailamaki Carnegie.
Virtual Memory II Chapter 8.
Proposal by CA Technologies, IBM, SAP, Vnomic
1 Thursday, June 29, 2006 "If you really think there's a bug you should report a bug. Maybe you're not using it properly. Have you ever considered that?"
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Quality Manual for Interoperability Testing Morten Bruun-Rasmussen Presented by Milan Zoric, ETSI.
Database System Concepts and Architecture
Requirements Analysis Moving to Design b521.ppt © Copyright De Montfort University 2000 All Rights Reserved INFO2005 Requirements Analysis.
Evaluation of an intervention to increase online filing of individuals’ tax returns Peter Lumb September 2009.
Lecture 6: Software Design (Part I)
Lecture 5: Requirements Engineering
Chapter 10 Software Testing
Short-term Capacity Optimization
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
© 2004, D. J. Foreman 1 Scheduling & Dispatching.
Addition 1’s to 20.
25 seconds left…...
Controlling as a Management Function
Håkan Sundell, Chalmers University of Technology 1 Evaluating the performance of wait-free snapshots in real-time systems Björn Allvin.
Week 1.
We will resume in: 25 Minutes.
Distributed DBMS©M. T. Özsu & P. Valduriez Ch.15/1 Outline Introduction Background Distributed Database Design Database Integration Semantic Data Control.
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
Chapter 13 The Data Warehouse
Implementing Strategy in Companies That Compete in a Single Industry
Microsoft Volume Licensing
Hadi Goudarzi and Massoud Pedram
SLA-Oriented Resource Provisioning for Cloud Computing
Intro – Part 2 Introduction to Database Management: Ch 1 & 2.
A Method for Transparent Admission Control and Request Scheduling in E-Commerce Web Sites S. Elnikety, E. Nahum, J. Tracey and W. Zwaenpoel Presented By.
1 Admission Control and Request Scheduling in E-Commerce Web Sites Sameh Elnikety, EPFL Erich Nahum, IBM Watson John Tracey, IBM Watson Willy Zwaenepoel,
Admission Control and Request Scheduling in E-Commerce Web Sites
Presentation transcript:

1 SLA Enforcement in the Service Cloud Anja Grünheid Fakultät für Informatik Lehrstuhl III - Datenbanksysteme

2 Agenda Introduction Quality of Service (QoS) Approach Request Scheduling (RS) Approach Priority Mechanisms (PM) Approach Conclusion

3 Introduction: Background Increase in the deployment of service-oriented architecture (SOA) Different quality of service requirements for each customer Limited hardware and software resources

4 Introduction: Service Level Agreements Defined for services invoked by the customer Formal contract between provider and customer to prevent customers from bad performance Violations of one SLA are punished with pre- defined penalties The complete penalty sum is dependent on the severity and number of overall violations

5 QoS Approach: Introduction Developed by a research team of the Technical University of Munich, Germany Main ideas: Specific service model Control in the Large, static and dynamic resource management Control in the Small, adaptive SLA enforcement

6 QoS Approach: Service Model Differentiation between Dynamic and static services Scale-out capable and non scale-out capable services

7 QoS Approach: Static Resource Management

7

8 QoS Approach: Dynamic Resource Management

8

9 QoS Approach: Adaptive SLA Enforcement I

9

10 QoS Approach: Adaptive SLA Enforcement II Conformance c as measurement of service level agreement Definition of stepwise SLAs: Percentile constraints Deadline constraints

11 QoS Approach: Adaptive SLA Enforcement III Lower service levels correspond to higher penalties Maximum of opportunity costs and marginal costs defines the current penalty value

12 QoS Approach: Adaptive SLA Enforcement IV SLA as external component, penalty information is piggybacked in SQL The external database scheduler Normalizes the SQL query to confirm service classes Knows the execution times of service classes through execution monitoring plus a small overhead Gives either admission to access the database directly or queues the request according to a specified algorithm

13 QoS Approach: Adaptive SLA Enforcement V

13 QoS Approach: Adaptive SLA Enforcement V

14 RS Approach: Introduction Developed by a research team consisting of researchers at the EPFL Lausanne, Switzerland, and IBM researchers at New York, USA Main ideas: Gatekeeper proxy as black box intercepting service requests to schedule them more efficiently Developed for three-tier architectures, like e- commerce web sites

15 RS Approach: Admission Control Important factors: Knowledge of the system capacity Service load knowledge Admission is granted if the capacity is not exceeded, else the transaction is queued in a FIFO queue until admission can be granted

16 RS Approach: Request Scheduling Schedules the SQL requests according to a pre- defined algorithm Gatekeeper uses the request scheduling policy shortest-job first (SJF) To avoid starvation an aging algorithm is implemented

17 RS Approach: Example

17 RS Approach: Example

17 RS Approach: Example

17 RS Approach: Example

17 RS Approach: Example

18 RS Approach: Locks Blocking the resource for other services Two different options where to lock: In the database, the DBMS controls the locking itself Controlled by the application servlet, which improves the performance for example by using Java synchronization mechanisms

19 PM Approach: Introduction Developed by a research team at the Carnegie Mellon University, Pittsburgh, USA Main ideas: DBMS internal scheduling policies instead of external methods like the admission control Step 1: Detection of the bottleneck resource Step 2: Implementation of specific algorithms improving the bottleneck

20 PM Approach: Bottleneck Resource I Transaction time T is split into three components: CPU I/0 Lock Monitoring of their behavior while using three different database systems: IBM DB2, Shore and PostgreSQL

21 PM Approach: Bottleneck Resource II TPC-C benchmark, 10 clients per database warehouse Picture 1: IBM DB2 Picture 2: PostgreSQL differences in bottleneck resources

22 PM Approach: Scheduling the Bottleneck Lock scheduling policies Non-preemptive Preemptive CPU scheduling policies All processors use generalized processor sharing (GPS) and are therefore preemptive

23 Conclusion I All systems have found ways to improve the service execution for the customer Difficulties and levels of implementation differ, depending on the approach The database as bottleneck is approached differently

24 Conclusion II - Comparison QoS approachRS approachPM approach used forSOA systemsMultiply-tiered web sites OLTP and transactional web applications componentexternal internal bottleneckdatabase CPU, I/O, locking content - Control in the large - Control in the small - Adaptive SLA management - Gatekeeper proxy - Bottleneck identification - Algorithm implementation

25 Literature D. Gmach, S. Krompass, A. Scholz, M. Wimmer and A. Kemper: Adaptive Quality of Service Managament, ACM 2006 S. Krompass, D. Gmach, A. Scholz, S. Seltzsam and A. Kemper: Quality of Service Enabled Database Applications S. Elnikety, J. Tracey, E. Nahum, W. Zwaenepol: A Method for Transparent Admission Control and Request Scheduling in E-Commerce Web Sites D. McWherter, B. Schroeder, A. Ailamaki, M. Harchol- Balter: Priority Mechanisms for OLTP and Transactional Web Applications

26 Thank you for your attention!

QoS Approach: Static Resource Management I Service load analysis for different resources, e.g. CPU Three steps: Preprocessing phase, Analysis phase, Classification phase

QoS Approach: Static Resource Management II Static allocation of services according to previously derived load patterns Implementation of a greedy heuristics Give resources to static and non scale-out capable services first because of their inflexibility Find for non scale-out capable services best-match servers Scale-out capable services are distributed following a specified, self-defined allocation strategy

QoS Approach: Dynamic Resource Management I Dynamic adaptations during runtime Two general approaches Queuing models, high development and maintenance costs Feedback control systems, e.g. event condition action (ECA) systems or fuzzy controller Decision in favor of the fuzzy controller, because of low administration efforts and low costs

QoS Approach: Dynamic Resource Management II Four main components: Monitor and advisor modules monitoring system fuzzy controller archive

QoS Approach: Dynamic Resource Management III

QoS Approach: Dynamic Resource Management IV Another method of dynamic resource management: short-term load forecasting Take statistical knowledge derived from load patterns into consideration to allocate resources

QoS Approach: Performance Analysis – Control in the Large 80% of CPU use as overload limit 15% more users than the system has been originally designed for Snapshots before and after implementing the control in the large significant improvement

QoS Approach: Performance Analysis – Control in the Small Combination of high, medium and low priority SLAs with matching penalties Snapshots before and after implementing the control in the small significant improvement

RS Approach: Performance Analysis Locking is done in the application server, top picture, and the database (MySQL) improvement using FIFO and SJF improvement when locking is done in the application server

PM Approach: Performance Analysis TPC-C benchmark, high- priority transactions Picture 1: Shore Picture 2: PostgreSQL lock scheduling more effective for Shore, CPU scheduling more effective for PostgreSQL

PM Approach: Performance Analysis II Preemptive lock scheduling was proven to be insufficient through experimental results Possible reasons: Overhead due to abortion of service transactions Low-priority transactions suffer because they are again queued at the end after an abortion