Resource Management of Highly Configurable Tasks April 26, 2004 Jeffery P. HansenSourav Ghosh Raj RajkumarJohn P. Lehoczky Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
QoS-based Management of Multiple Shared Resources in Dynamic Real-Time Systems Klaus Ecker, Frank Drews School of EECS, Ohio University, Athens, OH {ecker,
Advertisements

Hadi Goudarzi and Massoud Pedram
Chapter 5 Fundamental Algorithm Design Techniques.
Yasuhiro Fujiwara (NTT Cyber Space Labs)
22 nd September 2008 | Tariciso F. Maciel Suboptimal Resource Allocation for Multi-User MIMO-OFDMA Systems Tarcisio F. Maciel Darmstadt, 22 nd September.
Proactive Learning: Cost- Sensitive Active Learning with Multiple Imperfect Oracles Pinar Donmez and Jaime Carbonell Pinar Donmez and Jaime Carbonell Language.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 19 Scheduling IV.
Chapter 5 CPU Scheduling. CPU Scheduling Topics: Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling.
Artificial Intelligence in Game Design Introduction to Learning.
Distributed Association Control in Shared Wireless Networks Krishna C. Garikipati and Kang G. Shin University of Michigan-Ann Arbor.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Planning under Uncertainty
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Power-Aware Placement
Reinforcement Learning Rafy Michaeli Assaf Naor Supervisor: Yaakov Engel Visit project’s home page at: FOR.
EE360: Lecture 7 Outline Adaptive CDMA Techniques Introduction CDMA with power control Adaptive techniques for interference reduction Rate and power adaptation.
Ant Colony Optimization Optimisation Methods. Overview.
Chapter 11 Operating Systems
By Group: Ghassan Abdo Rayyashi Anas to’meh Supervised by Dr. Lo’ai Tawalbeh.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Isolated-Word Speech Recognition Using Hidden Markov Models
OPERATING SYSTEMS CPU SCHEDULING.  Introduction to CPU scheduling Introduction to CPU scheduling  Dispatcher Dispatcher  Terms used in CPU scheduling.
Network Aware Resource Allocation in Distributed Clouds.
Integrating Fine-Grained Application Adaptation with Global Adaptation for Saving Energy Vibhore Vardhan, Daniel G. Sachs, Wanghong Yuan, Albert F. Harris,
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
Swarm Intelligence 虞台文.
Gapped BLAST and PSI- BLAST: a new generation of protein database search programs By Stephen F. Altschul, Thomas L. Madden, Alejandro A. Schäffer, Jinghui.
The X-Tree An Index Structure for High Dimensional Data Stefan Berchtold, Daniel A Keim, Hans Peter Kriegel Institute of Computer Science Munich, Germany.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks Authors : Okan Yilmaz, Ing-Ray Chen.
Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband wireless Access Systems Bader Al-Manthari, Member, IEEE,
Euro-Par, A Resource Allocation Approach for Supporting Time-Critical Applications in Grid Environments Qian Zhu and Gagan Agrawal Department of.
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
Managing Server Energy and Operational Costs Chen, Das, Qin, Sivasubramaniam, Wang, Gautam (Penn State) Sigmetrics 2005.
The Greedy Method. The Greedy Method Technique The greedy method is a general algorithm design paradigm, built on the following elements: configurations:
Kanpur Genetic Algorithms Laboratory IIT Kanpur 25, July 2006 (11:00 AM) Multi-Objective Dynamic Optimization using Evolutionary Algorithms by Udaya Bhaskara.
TSV-Constrained Micro- Channel Infrastructure Design for Cooling Stacked 3D-ICs Bing Shi and Ankur Srivastava, University of Maryland, College Park, MD,
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Tetris Agent Optimization Using Harmony Search Algorithm
Probabilistic Algorithms Evolutionary Algorithms Simulated Annealing.
1  The Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Implicit Hitting Set Problems Richard M. Karp Erick Moreno Centeno DIMACS 20 th Anniversary.
1 Solving Infinite Horizon Stochastic Optimization Problems John R. Birge Northwestern University (joint work with Chris Donohue, Xiaodong Xu, and Gongyun.
R-Trees: A Dynamic Index Structure For Spatial Searching Antonin Guttman.
Multimedia Computing and Networking Jan Reduced Energy Decoding of MPEG Streams Malena Mesarina, HP Labs/UCLA CS Dept Yoshio Turner, HP Labs.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Algorithmic Mechanism Design Shuchi Chawla 11/7/2001.
CS 3343: Analysis of Algorithms Lecture 19: Introduction to Greedy Algorithms.
Submitted by: Sounak Paul Computer Science & Engineering 4 th Year, 7 th semester Roll No:
Learning for Physically Diverse Robot Teams Robot Teams - Chapter 7 CS8803 Autonomous Multi-Robot Systems 10/3/02.
Artificial Intelligence in Game Design Lecture 20: Hill Climbing and N-Grams.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
A stochastic scheduling algorithm for precedence constrained tasks on Grid Future Generation Computer Systems (2011) Xiaoyong Tang, Kenli Li, Guiping Liao,
Determining Optimal Processor Speeds for Periodic Real-Time Tasks with Different Power Characteristics H. Aydın, R. Melhem, D. Mossé, P.M. Alvarez University.
EMGT 5412 Operations Management Science Nonlinear Programming: Introduction Dincer Konur Engineering Management and Systems Engineering 1.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Basic Concepts Maximum CPU utilization obtained with multiprogramming
Yun, Hyuk Jin. Theory A.Nonuniformity Model where at location x, v is the measured signal, u is the true signal emitted by the tissue, is an unknown.
Chapter 6: CPU Scheduling
CPU Scheduling G.Anuradha
Module 5: CPU Scheduling
Chapter5: CPU Scheduling
Chapter 6: CPU Scheduling
1st Annual Israel Multinational BMD Conference & Exhibition
Chapter 6: CPU Scheduling
Chapter 6: CPU Scheduling
Presentation transcript:

Resource Management of Highly Configurable Tasks April 26, 2004 Jeffery P. HansenSourav Ghosh Raj RajkumarJohn P. Lehoczky Carnegie Mellon University

Outline Radar Tracking Problem Introduction to Q-RAM Application of Q-RAM to Radar Tracking Slope-Based Traversal Fast Traversal Experimental Results

For each target we need to choose: –Radar parameters such as dwell period, dwell time and transmit power. –Ship/antenna to use. –Signal processing algorithm to use. –CPU from processing bank to use. While satisfying constraints on: –Power dissipation –Radar and CPU Utilization –Scheduling We must quickly respond to: –Changes in target position –New target arrivals –Target departures Resource Management for Radar Tracking

0% 50% 100% 0% 50% 100% Radar Resource Management Approaches Existing solutions use operational doctrine to make resource allocation decisions. –Resources allocated to tasks in order of importance based only on each task’s characteristics. –Some problems with this approach are: Important tasks can starve tasks of slightly lower priority. Does not make best use of resources. Difficulty in predicting viable scenarios. QoS-based optimization considers resource tradeoffs and relative task importance. –Resources allocated in proportion to importance. –Tasks can have unlimited access to resource when demand is low. –Tasks can not starve other tasks of similar importance. –Operator can dynamically change importance. Priority-Based Allocation QoS-Based Optimization

QoS Optimization with Q-RAM Image Resolution Frames/sec. QoS modeled as an n-dimensional space –Each set-point in the space has an associated “utility” value representing user satisfaction. –Utility values can be assigned individually or via dimension-wise utility functions. A single QoS set-point can be realized by multiple “Resource Options”. –Resource trade-offs –QoS Routing Optimization goal is to maximize total system utility while meeting resource constraints. Per-user weights give higher priority to “important” users. Near optimal solution for search space of over a trillion QoS setpoint combinations found in under 1 sec.

QoS Model of Radar Tracking Problem Resources Radar bandwidth Short-term power Long-term power CPUs Memory Operational Dimensions Dwell Period Dwell Time Transmit Power Tracking Algorithm # of task replicas Environment Distance Speed Direction Maneuvering Counter Measures Threat Assessment QoS Dimensions Track Error Target Drop Probability Reliability Marginal Utility Control

QoS Setpoints QoS Resource Option 1 Resource Option 2 Utility (0.0) (0.4) (0.6) (1.0) CPU CPU CPU

Radar Constraint/Resource Model Per Antenna Constraints: Global Constraints: … R1R2Global Computing (C max ) – Limit on processing capabilities for tracking targets. Power (P max ) – Limit on power that can be provided to power radars. Heat (H i ) – Limit on heat that can be dissipated per unit time. Utilization(U i ) – Limit on fraction of time radar can be in continuous use.

Radar Model Error Estimation Radar tracking error is estimated by a function: Environmental Dimensions r v a ξ n CPU Usage Radar Usage Operational Dimensions w Tx Rx w Tx Rx Target Type Distance Velocity Acceleration Noise Dwell Period Dwell Time Tx Time Tx Power Tracking Alg.

Setpoint Explosion Problem Concave majorant algorithm used by Q-RAM requires O(n ln n) and must examine every setpoint. For applications with more than a few operational dimensions, the number of setpoints can be very large –With k dimensions having m settings, there are m k setpoints. –Even a linear algorithm may take a long time. One Dimension Two Dimensions Three Dimensions Four Dimensions

Optimization goal: Maximize total system utility while meeting resource constraints. Algorithm: –Generate concave majorant of utility/resource curve for each target. –Assign minimum resource allocation to all targets. –Increase allocation for target with the highest marginal utility. –Repeat until all resources have been allocated. Solution Properties –Optimal in continuous case –Within a fixed distance of optimal in discrete case. Q-RAM Overview Resources Utility Resources Utility Track 1 Track 2 Dwell Period: 100ms Dwell Time: 1ms Power: 1.3 kW Tracking Alg.: Kalman

Slope Based Traversal Algorithm –Determine minimum and maximum QoS points. –Eliminate points under the line connecting them. –Apply concave majorant to remaining points. Initial scan is linear –Reduces number of points to which we must apply the concave majorant algorithm. –Some reduction in execution time. –But, still must examine every setpoint. Compound Resource Utility

Fast Convex Hull Algorithms Resource/utility values associated with setpoints are not random. Utilize structure in the resource management problem to reduce this complexity. For most operational dimensions, an increase in quality on any dimension results in: –Non-decreasing resource consumption. –Non-decreasing utility. We call dimensions with the above property “monotonic” dimensions. All other dimensions are called “non- monotonic” dimensions. Dwell Period Transmit Power R U R U R U

Fast Traversal Methods Observations of the points on the concave majorant have revealed that for monotonic dimensions: –Concave majorant is usually composed of sub-sequences of points differing in only one quality index. –Dimension that is changing may shift as the concave majorant is traversed. –May need to treat “non- monotonic” dimensions separately. Compound Resource Utility

Fast Traversal Algorithms FOFT: First Order Fast Traversal Algorithm: –Make the minimum QoS point the current point. –Examine points adjacent in the quality index space to the current point. –Choose next point with highest marginal utility. –Repeat until reaching maximum QoS point. –Apply concave majorant to resulting set of points. Generates nearly the same set of points as full concave majorant. Explicitly examines only a small subset of the possible setpoints. Utility values within a few percent of standard Q-RAM algorithm. Dwell Period Transmit Power Compound Resource Utility R* U U U U U U U U U U

Higher Order Traversal Algorithms SOFT* - Modified Second Order Fast Traversal Same as SOFT, but include points which increase in at least one dimension, but may decrease in the other. Experimental results show that –SOFT* requires more execution time than FOFT and SOFT. –Resulting concave majorant is slightly better than FOFT. Dwell Period Transmit Power SOFT - Second Order Fast Traversal Same as FOFT, but we include setpoints that increase in up to two dimensions. Experimental results show that –SOFT requires more execution time than FOFT. –Resulting concave majorant is actually worse than FOFT. Dwell Period Transmit Power

Optimization with Non-Monotonic Dimensions Compound Resource Utility Dwell Period Transmit Power Dwell Period Transmit Power Algorithm Kalman αβγ Concave Majorant Generation with Non-Monotonic Dimensions For each combination of non- monotonic parameters, apply the traversal algorithm. Generate the concave majorant from the combined set of setpoints.

Concave Majorant Compound Resource Utility

Slope-Based Concave Majorant

FOFT Concave Majorant Approximation

2-FOFT Concave Majorant Approximation

Global Utility

Number of Setpoint per Task

Total Optimization Time

Conclusion Approach Overview –Leverage structure in the setpoint space to generate concave majorant approximation. –Concave majorant estimated by following the adjacent point on the monotonic dimension with the highest marginal utility. –Algorithm repeated for all combinations of non-monotonic dimensions. Benefits of Approach –Significantly reduces the number of setpoints that must be examined to obtain a concave majorant estimate. –Complexity is sub-linear in the number of setpoints. –Works best when most operational dimensions are monotonic. Results –No significant reduction in solution quality. –Order of magnitude reduction in optimization time.