Copyright © 2011, A Resource Allocation Mechanism of Data Center for Public Cloud Service 指導教授:王國禎 學生:連懷恩 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室.

Slides:



Advertisements
Similar presentations
ECE 667 Synthesis and Verification of Digital Circuits
Advertisements

Traveling Salesperson Problem
EDA (CS286.5b) Day 10 Scheduling (Intro Branch-and-Bound)
Types of Algorithms.
Copyright © 2012, Software Defined Networking for Big Data Applications 指導教授:王國禎 博士 學生:徐逸懷 連懷恩 賴寬嶧 洪維藩 張晏誌 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室 1.
Constraint Optimization Presentation by Nathan Stender Chapter 13 of Constraint Processing by Rina Dechter 3/25/20131Constraint Optimization.
Techniques for Dealing with Hard Problems Backtrack: –Systematically enumerates all potential solutions by continually trying to extend a partial solution.
5-1 Chapter 5 Tree Searching Strategies. 5-2 Satisfiability problem Tree representation of 8 assignments. If there are n variables x 1, x 2, …,x n, then.
Branch & Bound Algorithms
Quick Sort, Shell Sort, Counting Sort, Radix Sort AND Bucket Sort
Copyright © 2012, An SLA-aware load balancing scheme for cloud datacenters 指導教授:王國禎 學生:黎中誠 國立交通大學資訊工程系 行動計算與寬頻網路實驗室 1.
6 - 1 § 6 The Searching Strategies e.g. satisfiability problem x1x1 x2x2 x3x3 FFF FFT FTF FTT TFF TFT TTF TTT.
ECE Synthesis & Verification - Lecture 2 1 ECE 697B (667) Spring 2006 ECE 697B (667) Spring 2006 Synthesis and Verification of Digital Circuits Scheduling.
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
Dealing with NP-Complete Problems
DAST, Spring © L. Joskowicz 1 Data Structures – LECTURE 1 Introduction Motivation: algorithms and abstract data types Easy problems, hard problems.
1 search CS 331/531 Dr M M Awais A* Examples:. 2 search CS 331/531 Dr M M Awais 8-Puzzle f(N) = g(N) + h(N)
MAE 552 – Heuristic Optimization Lecture 26 April 1, 2002 Topic:Branch and Bound.
1 Branch and Bound Searching Strategies 2 Branch-and-bound strategy 2 mechanisms: A mechanism to generate branches A mechanism to generate a bound so.
Ch 13 – Backtracking + Branch-and-Bound
Backtracking Reading Material: Chapter 13, Sections 1, 2, 4, and 5.
Backtracking.
DAST, Spring © L. Joskowicz 1 Data Structures – LECTURE 1 Introduction Motivation: algorithms and abstract data types Easy problems, hard problems.
Distributed Constraint Optimization * some slides courtesy of P. Modi
Sequencing Problem.
Busby, Dodge, Fleming, and Negrusa. Backtracking Algorithm Is used to solve problems for which a sequence of objects is to be selected from a set such.
Design of double- and triple-sampling X-bar control charts using genetic algorithms 指導教授: 童超塵 作者: D. HE, A. GRIGORYAN and M. SIGH 主講人:張怡笳.
Copyright © 2010, OpenFlow - Innovate in Your Network 指導教授:王國禎 學生:洪維藩 國立交通大學資訊科學與工程研究所 行動計算與寬頻網路實驗室.
Copyright © 2010, SLA-aware load balancing for cloud datacenters 指導教授:王國禎 學生:黎中誠 國立交通大學資訊工程系 行動計算與寬頻網路實驗室.
Network Aware Resource Allocation in Distributed Clouds.
Copyright © 2011, A Dynamic Area of Interest Management and Collaboration Model for P2P MMOGs 張晏誌 行動計算與寬頻網路實驗室 王國禎 教授 1.
Copyright © 2012, A Minimum Cost Resource Allocation Approach for Cloud Data Centers 指導教授:王國禎 學生:連懷恩 國立交通大學資訊工程系 行動計算與寬頻網路實驗室 1.
Copyright © 2011, Programming Your Network at Run-time for Big Data Applications 張晏誌 指導老師:王國禎 教授.
Copyright © 2012, Road-Based Multipath Routing in Urban VANETs 都會區車輛隨意網路之多重路徑繞徑技術 指導教授:王國禎 博士 學生:鍾昆佑 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室 1.
Copyright © 2011, Road-Based Multipath Routing With Resilient Video Streaming for Urban VANETs 指導教授:王國禎 博士 學生:鍾昆佑 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室.
Copyright © 2011, Resource allocation for MMOG based on AFK players in the cloud 指導教授:王國禎 博士 學生:陳治豪 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室.
Exact methods for ALB ALB problem can be considered as a shortest path problem The complete graph need not be developed since one can stop as soon as in.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Applications of Dynamic Programming and Heuristics to the Traveling Salesman Problem ERIC SALMON & JOSEPH SEWELL.
Managing Server Energy and Operational Costs Chen, Das, Qin, Sivasubramaniam, Wang, Gautam (Penn State) Sigmetrics 2005.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
GAME PLAYING 1. There were two reasons that games appeared to be a good domain in which to explore machine intelligence: 1.They provide a structured task.
1 Branch and Bound Searching Strategies Updated: 12/27/2010.
Maximization of System Lifetime for Data-Centric Wireless Sensor Networks 指導教授:林永松 博士 具資料集縮能力無線感測網路 系統生命週期之最大化 研究生:郭文政 國立臺灣大學資訊管理學研究所碩士論文審查 民國 95 年 7 月.
國立清華大學高速通訊與計算實驗室 NTHU High-Speed Communication & Computing Laboratory Optimal Provisioning for Elastic Service Oriented Virtual Network Request in Cloud.
A local search algorithm with repair procedure for the Roadef 2010 challenge Lauri Ahlroth, André Schumacher, Henri Tokola
Types of Algorithms. 2 Algorithm classification Algorithms that use a similar problem-solving approach can be grouped together We’ll talk about a classification.
CPSC 322, Lecture 6Slide 1 Uniformed Search (cont.) Computer Science cpsc322, Lecture 6 (Textbook finish 3.5) Sept, 17, 2012.
Copyright © 2010, Performance and Power Management for Cloud Infrastructures Hien Nguyen Van; Tran, F.D.; Menaud, J.-M. Cloud Computing (CLOUD),
Lecture 9COMPSCI.220.FS.T Lower Bound for Sorting Complexity Each algorithm that sorts by comparing only pairs of elements must use at least 
Copyright © 2011, A Road-based QoS-aware Multipath Routing for Urban Vehicular Ad Hoc Networks 指導教授:王國禎 學生:謝宜玲 國立交通大學資訊科學與工程研究所 行動計算與寬頻網路實驗室.
Chapter 13 Backtracking Introduction The 3-coloring problem
CSCE350 Algorithms and Data Structure Lecture 21 Jianjun Hu Department of Computer Science and Engineering University of South Carolina
ICS 353: Design and Analysis of Algorithms Backtracking King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Branch and Bound Searching Strategies
Adversarial Search 2 (Game Playing)
Parallel Programming in Chess Simulations Part 2 Tyler Patton.
Copyright © 2010, Install OpenFlow Mininet 指導教授:王國禎 學生:洪維藩 國立交通大學資訊科學與工程研究所 行動計算與寬頻網路實驗室.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Copyright © 2012, A Minimum Cost Resource Allocation Approach for Cloud Data Centers 指導教授:王國禎 學生:連懷恩 國立交通大學資訊工程系 行動計算與寬頻網路實驗室 1.
Traveling Salesperson Problem
Algorithm Design Methods
Branch and Bound.
Analysis & Design of Algorithms (CSCE 321)
Introduction Basic formulations Applications
Backtracking and Branch-and-Bound
Algorithm Design Methods
ICS 353: Design and Analysis of Algorithms
Algorithm Design Methods
Presentation transcript:

Copyright © 2011, A Resource Allocation Mechanism of Data Center for Public Cloud Service 指導教授:王國禎 學生:連懷恩 國立交通大學網路工程研究所 行動計算與寬頻網路實驗室

Copyright © 2011, Outline Introduction Scenario and settings A branch and bound approach Discussion and ongoing works

Copyright © 2011, Introduction Dealing with Number of active servers, number of VMs for each application, VM placement problem, and optimization over a series of time slots. Apply an existing load-prediction method to get the forecast of resource demand of each application over a series of time slots.

Copyright © 2011, Scenario and Settings All servers and VMs have fixed capacity. When the workload of an application changes, we readjust the number of VMs dedicated to that application.

Copyright © 2011, Scenario and Settings – The Power Consumption Model

Copyright © 2011, Scenario and Settings – The Cost Function Thus, for the operating cost, we define P idle as the basic energy cost in a time slot when a server is idle, and α as the incremental energy cost in a time slot every time when we add in a new VM. For the switching cost, we define δs as the cost to switch on/off a server, and δv as the cost to switch on/off a VM.

Copyright © 2011, Scenario and Settings – The Cost Function The cost function will be the sum of operating cost and switching cost, considering all running servers and VMs. Suppose there are T time slots in our scenario, then the objective function will be the minimization of cost function over T time slots, subject to the number of hosted VMs must not exceed the server capacity.

Copyright © 2011, A Branch-and-Bound Approach – Problem Simplification Claim 1: The solution of optimum(# of servers, # of VMs) is a superset of the solution of optimum(# of servers, #number of VMs, VM placement). Thus, we can apply a two-pass algorithm to reduce the complexity of the problem.

Copyright © 2011, A Branch-and-Bound Approach – Problem Simplification Claim 2: When doing pass1 of the algorithm, we only need to consider the concave upwards parts.

Copyright © 2011, A Branch-and-Bound Approach Use the branch and bound approach to find the optimal solution of (# of servers, # of VMs). Given the status of source and sink, the resource demand of each time slot, find a minimal weighted path from source to sink.

Copyright © 2011, A Branch-and-Bound Approach – Problem Complexity A simple relation to decide when to keep the unnecessary VM is ∆α < 2δv, and for the server, it is ∆P idle < 2δs, ∆ is the time interval by that we need the resource again. The problem comes when that VM is the last remaining VM on that server, or, last two VMs from two apps, and so on. What is more, the result of deciding # of VMs will affect the way deciding # of servers. Its hard to find a simple way to find the optimal solution.

Copyright © 2011, A Branch-and-Bound Approach – Main Idea The key idea of the BB algorithm is: if the lower bound for some tree node A is greater than the upper bound for some other node B, then A may be safely discarded from the search. A global upper bound: the minimum cost among all accomplished paths so far. The lower bound of each node: current accumulated cost + minimum remaining operating cost + switching cost to the status of sink node

Copyright © 2011, A Branch-and-Bound Approach – A Paradigm Set α = 1.0, P idle = 0.5, δv = 0.6, δs = 0.7

Copyright © 2011, A Branch-and-Bound Approach – Tree Structure Suppose there are n applications, define the resource provision tuple as a (n+1)-tuple. The 1 st element represents the # of active servers, the 2 nd element represents the # of VMs for the first app, and i-th element represents the # of VMs for the (i-1)-th app. A search tree with depth T. Every node consists of a resource provision tuple, the current accumulated cost field and lower bound field. Using doubly linked list. A path can be represented by its tail node and backtracked to its preceding nodes.

Copyright © 2011, A Branch-and-Bound Approach – Branch Table When it happens a resource demand degradation, it may be worthy of keeping the VM if ∆α < 2δv. The false-positive is allowed. Construct a branch table composed of T resource provision tuple. Each element in the tuple indicates how many possible branches of # of VMs for that app.

Copyright © 2011, A Branch-and-Bound Approach – Branch Table Similarly, for the server field in the tuple, consider ∆P idle < 2δs. Note that the total server capacity must accommodate the maximal possible number of VMs in that time slot. From a certain node, the possible number of branches in the next time slot is the product of all elements of that tuple.

Copyright © 2011, A Branch-and-Bound Approach – Shortcut Table A shortcut is a discovered path from a certain time slot to the sink node with minimal cost. In the shortcut table, every time slot records a discovered best path and its cost. Note that the shortcut of (t = a) is not necessarily contained in shortcut of (t = b), for any a < b.

Copyright © 2011, A Branch-and-Bound Approach – Shortcut Table Updating shortcut table: every time when we finish a path to the sink node. The cost of a shortcut is reversely accumulated. Applying shortcut: apply a shortcut when (current accumulated cost + shortcut cost + switching cost transferring to shortcut) < upper bound. The reason of using shortcut : –To reduce the complexity of the algorithm, we must discard nodes as early as possible. It is possible to lower the upper bound only when we finish another path to the sink.

Copyright © 2011, A Branch-and-Bound Approach – The Whole Procedure The baseline path: the minimal operating path. Using a priority depth-first search.

Copyright © 2011, Discussion and Ongoing Works The worst case complexity is still extremely high. We don’t know the effectiveness of the those acceleration method. Need to prove or analyze those two claims. Need an approach to deal with the VM placement problem.