Abstract:Abstract-Elasticity is key for the cloud paradigm, where the pay-per use nature provides great flexibility for end-users. However, elasticity complicates long-term capacity planning for cloud providers as the exact amount of resources required over time becomes uncertain. Admission control techniques are thus needed to handle the trade-off between resource utilization and potential overload. We define a set of admission control algorithms that combine risk assessment methods with a fuzzy aggregation framework.… Show more
“…Both internet server resource management and web data mining have attracted extensive research in the literature. Internet resource management can be achieved through resource provisioning (Urgaonkar et al, ; Urgaonkar, Kozat, Igarashi, & Neely, ; Villela et al, ; Xue et al, ), AC (Ashraf et al, ; Elnikety et al, ; Khojasteh et al, ; Konstanteli et al, ; Tomas & Tordsson, ; Wu et al, ), service differentiation (Chandra et al, ; Dutta et al, ; Hjort et al, ; Lakew et al, ), and request scheduling (Zhu, Yang, Chen, Wang, & Yin, ). It is common practice to combine more than one of the techniques to achieve better results.…”
Section: Related Workmentioning
confidence: 99%
“…ISPs always aim at maximizing their profits by making the best use of their resources, that is, while maintaining the SLAs, they will try to allocate resources to as many e‐commerce companies as possible. In system overloading situations, unless e‐commerce companies are willing to pay for extra resources, ISPs usually apply admission control (AC) Schemes (Ashraf, Byholm, & Porres, ; Elnikety, Nahum, Tracey, & Zwaenepoel, ; Khojasteh, Misic, & Misic, ; Konstanteli, Cucinotta, Psychas, & Varvarigou, ; Tomas & Tordsson, ; Wu, Garg, & Buyya, ) to their services. By rejecting less important requests when the system is overloaded, AC schemes can guarantee the performance of internet services.…”
Workload demands in e-commerce applications are very dynamic in nature, therefore it is essential for internet service providers to manage server resources effectively to maximize total revenue in server overloading situations. In this paper, a data mining technique is applied to a typical e-commerce application model for identification of composite association rules that capture user navigation patterns. Two algorithms are then developed based on the derived rules for admission control, service differentiation, and priority scheduling. Our approach takes the following aspects into consideration: (a) only final purchase requests result in company revenue; (b) any other request can potentially lead to final purchase, depending upon the likelihood of the navigation sequence that starts from current request and leads to final purchase; (c) service differentiation and priority assignment are based on aggregated confidence and average support of the composite association rules. As identification of composite association rules and computation of confidence and support of the rules can be pre-computed offline, the proposed approach incurs minimum performance overheads. The evaluation results suggest that the proposed approach is effective in terms of request management for revenue maximization.
“…Both internet server resource management and web data mining have attracted extensive research in the literature. Internet resource management can be achieved through resource provisioning (Urgaonkar et al, ; Urgaonkar, Kozat, Igarashi, & Neely, ; Villela et al, ; Xue et al, ), AC (Ashraf et al, ; Elnikety et al, ; Khojasteh et al, ; Konstanteli et al, ; Tomas & Tordsson, ; Wu et al, ), service differentiation (Chandra et al, ; Dutta et al, ; Hjort et al, ; Lakew et al, ), and request scheduling (Zhu, Yang, Chen, Wang, & Yin, ). It is common practice to combine more than one of the techniques to achieve better results.…”
Section: Related Workmentioning
confidence: 99%
“…ISPs always aim at maximizing their profits by making the best use of their resources, that is, while maintaining the SLAs, they will try to allocate resources to as many e‐commerce companies as possible. In system overloading situations, unless e‐commerce companies are willing to pay for extra resources, ISPs usually apply admission control (AC) Schemes (Ashraf, Byholm, & Porres, ; Elnikety, Nahum, Tracey, & Zwaenepoel, ; Khojasteh, Misic, & Misic, ; Konstanteli, Cucinotta, Psychas, & Varvarigou, ; Tomas & Tordsson, ; Wu, Garg, & Buyya, ) to their services. By rejecting less important requests when the system is overloaded, AC schemes can guarantee the performance of internet services.…”
Workload demands in e-commerce applications are very dynamic in nature, therefore it is essential for internet service providers to manage server resources effectively to maximize total revenue in server overloading situations. In this paper, a data mining technique is applied to a typical e-commerce application model for identification of composite association rules that capture user navigation patterns. Two algorithms are then developed based on the derived rules for admission control, service differentiation, and priority scheduling. Our approach takes the following aspects into consideration: (a) only final purchase requests result in company revenue; (b) any other request can potentially lead to final purchase, depending upon the likelihood of the navigation sequence that starts from current request and leads to final purchase; (c) service differentiation and priority assignment are based on aggregated confidence and average support of the composite association rules. As identification of composite association rules and computation of confidence and support of the rules can be pre-computed offline, the proposed approach incurs minimum performance overheads. The evaluation results suggest that the proposed approach is effective in terms of request management for revenue maximization.
“…In our case, to account for this uncertainty and possible prediction errors, we presented a fuzzy admission control [11] that decides whether a new VM can be accepted without relying on user information about how tolerable their applications are to overbooking. The steps performed are: (1) predict the future status of the data center; (2) evaluate the possible impact of accepting a new VM by using a fuzzy logic engine that accounts for the uncertainty about future events [7]; and finally (3) take the admission decision based on the acceptable level of risk (threshold) of the datacenter at the current time. The risk thresholds are obtained through a distributed set of PID controllers that adjusts their own risk threshold based on current vs. target utilization levels (for more details see [11]).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Due to the complexity of the problem, as well as the uncertainty about future status of CPU cores and application needs, we take a fuzzy logic approach. Fuzzy logic is a highly expressive, natural, and efficient way to deal with uncertainty and approximate reasoning, and we previously applied this approach to cloud admission control with good results [7].…”
Abstract-Overbooking techniques have been proven efficient to increase overall utilization of cloud datacenters. However, overbooking may also degrade applications performance as (at least) some applications need to share physical resources such as CPU or memory. Consequently, interference may increase among the virtual machines that share resources, the so called noisy neighbors effect. We present an affinity-aware scheduler to reduce the impact of such interference. A fuzzy logic engine accounts for the uncertainty in these environments and estimates which CPU cores are currently more suitable for each incoming application. This helps the scheduler make virtual machine to physical resource mapping decisions, also known as vcpu pinning. An experimental evaluation based on a combination of interactive services and batch applications confirms that our affinity-aware fuzzy scheduler reduces the interference among applications, enabling more predictable performance and consequently safer overbooking.
“…Admission control decisions are based on a fuzzy logic risk assessment [19], combined with a proportionalintegral-derivative (PID) controller [20]. The PID controller changes the acceptable level of risk over time and the associated overbooking pressure, depending on the deviation of the current data center utilization from the target [1].…”
Abstract-Low resource utilization in cloud data centers can be mitigated by overbooking but this increases the risk of performance degradation. We propose a three level Quality of Service (QoS) scheme for overbooked cloud data centers to assure high performance QoS for applications that need it. We design a controller that dynamically maps virtual cores to physical cores and whenever feasible shares physical cores among applications. Our evaluation based on real cloud applications and workloads demonstrates that performance isolation can be achieved for critical applications while overall utilization is increased thanks to overbooking.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.