Kara Zaffarano SunyIT.  Detect CPU bound and I/O bound processes  Increase process priority for CPU bound processes and lower nice value  Lower priority.

Slides:



Advertisements
Similar presentations
Concurrent programming: From theory to practice Concurrent Algorithms 2014 Vasileios Trigonakis Georgios Chatzopoulos.
Advertisements

Detecting Covert Timing Channels with Time-deterministic Replay Ang Chen * W. Brad Moore + Hanjun Xiao * Andreas Haeberlen * Linh Thi Xuan Phan * Micah.
Differentiated I/O services in virtualized environments
DAISY Pipeline in NLB Functional and technical requirements.
Ubuntu/ Linux Mobile Phone operating systems My Cole Eldridge.
Predicting The Performance Of Virtual Machine Migration Presented by : Eli Nazarov Sherif Akoush, Ripduman Sohan, Andrew W.Moore, Andy Hopper University.
Big Data: Why Now?. Computers TI 99 4A 1982 ENIAC 1946 Phones 1983 first public cell phone 1915: First U.S. coast-to-coast phone call Over 25 tons, larger.
MapR – HADOOP DEVELOPMENT IN A VIRTUAL MACHINE Thomas Tiahrt, MA, PhD CSC482 Introduction to Text Analytics.
Properties Change theme Properties Change theme Windows (standard) Windows start.
WINDOWS 7 AND UBUNTU INSTALLING LINUX WITHIN WINDOWS.
QTIP Version 0.2 4th August 2015.
MICHAEL EDDINGTON Advanced Fuzzing with Peach 2.
Nagios and Mod-Gearman In a Large-Scale Environment Jason Cook 8/28/2012.
Evaluation of Delta Compression Techniques for Efficient Live Migration of Large Virtual Machines Petter Svärd, Benoit Hudzia, Johan Tordsson and Erik.
How to Resolve Bottlenecks and Optimize your Virtual Environment Chris Chesley, Sr. Systems Engineer
Predictive Runtime Code Scheduling for Heterogeneous Architectures 1.
Profiling Grid Data Transfer Protocols and Servers George Kola, Tevfik Kosar and Miron Livny University of Wisconsin-Madison USA.
VMware Infrastructure 3 The Next Generation in Virtualization.
Parallelizing Security Checks on Commodity Hardware E.B. Nightingale, D. Peek, P.M. Chen and J. Flinn U Michigan.
Goodbye rows and tables, hello documents and collections.
OPERATING SYSTEM: DESIGN AND IMPLEMENT FINAL PROPOSAL SCHEDULER 周長毅, 周榆豐.
29th ACSAC (December, 2013) SPIDER: Stealthy Binary Program Instrumentation and Debugging via Hardware Virtualization Zhui Deng, Xiangyu Zhang, and Dongyan.
StratusLab is co-funded by the European Community’s Seventh Framework Programme (Capacities) Grant Agreement INFSO-RI Virtual Machine Isolation.
By: James Ross. Outline  Collision Conecpts  Axis Aligned Bounding Box  ECMs  Objective  Methodology  Expected Results.
What Every Developer Should Know about the Kernel Dr. Michael L. Collard 1.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
DEEP RED An Intelligent Approach to Chinese Checkers.
A Neural Network Implementation on the GPU By Sean M. O’Connell CSC 7333 Spring 2008.
An Investigation of Xen and PTLsim for Exploring Latency Constraints of Co-Processing Units Grant Jenks UCLA.
Running Mantevo Benchmark on a Bare-metal Server Mohammad H. Mofrad January 28, 2016
Experimental Perspectives on Lasso-related Algorithms on Parallel Computing Frameworks
Atlas Software Structure Complicated system maintained at CERN – Framework for Monte Carlo and real data (Athena) MC data generation, simulation and reconstruction.
Canny Edge Detection Using an NVIDIA GPU and CUDA Alex Wade CAP6938 Final Project.
Computer Performance. Hard Drive - HDD Stores your files, programs, and information. If it gets full, you can’t save any more. Measured in bytes (KB,
Managing a growing campus pool Eric Sedore
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
 Using Touchloggers To Build User Profiles Through Machine Learning Craig Dezangle.
Performance analysis comparison Andrea Chierici Virtualization tutorial Catania 1-3 dicember 2010.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
A comparison between xen and kvm Andrea Chierici Riccardo Veraldi INFN-CNAF CCR 2009.
VM Layout. Virtual Machine (Ubuntu Server) VM x.x You can putty into this machine from on campus. Or you can use vSphere to control the hardware.
Comparing TensorFlow Deep Learning Performance Using CPUs, GPUs, Local PCs and Cloud Pace University, Research Day, May 5, 2017 John Lawrence, Jonas Malmsten,
Matt Lemons Nate Mayotte
Server pschiu.
Working With Azure Batch AI
Distributed Network Traffic Feature Extraction for a Real-time IDS
Windows Server 2008 and SQL 2008 Windows Server 2008.
MOM + oVirt: Nurturing our Virtual Machines
Technical and operational requirements
Practical Rootkit Detection with RAI
TESTING AMI PERFORMANCE OF J-DEMETRA+ Turaç YAVUZ TURKSTAT
عمل الطالبة : هايدى محمد عبد المنعم حسين
ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs
Lecture 17 Syed Mansoor Sarwar
Processes and Threads Part III
MY RACING IDEA By Malik Lindsay.
Tools.
8 WASTES: (“DOWNTIME”) Definition: Application: Purpose:
Threads and Concurrency
Approaching an ML Problem
User-driven Scheduling Of Interactive Virtual Machines
CS533 Concepts of Operating Systems Class 15
Tools.
G suite Customer Service Phone Number.
Device Performance Testing
CS533 Concepts of Operating Systems Class 15
Korea Software HRD Center
Hitachi Storage Service Manager
What’s Happening with my App, Application Insights?
Presentation transcript:

Kara Zaffarano SunyIT

 Detect CPU bound and I/O bound processes  Increase process priority for CPU bound processes and lower nice value  Lower priority for I/O bound processes and increase nice value  Control operation using a system call  Toggle functionality  Set parameters  Log detection and changes to process priority

 Virtual machine (VM)  2GB RAM  2 2.1GHz cores  Ubuntu  3.8-rc6 Kernel

 Kernel/sched/fair.c  Include/linux/syscalls.h  Arch/x86/syscalls.tbl

 Phoronix  Automated open source testing framework   Chess test suite  Tscp – AI algorithm for the game of chess  Custom AI project test  Classification

 High deviations in collected data both with and without modifications  Caused by virtual environment?  Time skew issue wasted a lot of time  Would have tested/validated modifications more  Would have cleaned up the code a bit more  Would have explored rt, se  Etc.  Slow VM!!!!