Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 5th Symposium on Operating Systems Design and Implementation - OSDI '02 2002
DOI: 10.1145/1060289.1060312
|View full text |Cite
|
Sign up to set email alerts
|

Resource overbooking and application profiling in shared hosting platforms

Abstract: In this paper, we present techniques for provisioning CPU and network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
146
0
6

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 158 publications
(153 citation statements)
references
References 9 publications
0
146
0
6
Order By: Relevance
“…Many research groups have used a similar approach to characterize application behaviour and applied trace-based methods to support what-if analysis in the assignment of workloads to consolidated servers [23,7,8,24,25,1,3]. A consolidation analysis presented in [23] packs existing server workloads onto a smaller number of servers using an Integer Linear Programming based bin-packing method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many research groups have used a similar approach to characterize application behaviour and applied trace-based methods to support what-if analysis in the assignment of workloads to consolidated servers [23,7,8,24,25,1,3]. A consolidation analysis presented in [23] packs existing server workloads onto a smaller number of servers using an Integer Linear Programming based bin-packing method.…”
Section: Related Workmentioning
confidence: 99%
“…The approach is able to minimize migrations over successive control intervals. Some researchers propose to limit the capacity requirement of an application workload to a percentile of its demand [24]. This does not take into account the impact of sustained performance degradation over time on user experience as our required capacity definition does.…”
Section: Related Workmentioning
confidence: 99%
“…Urgaonkar et al, propose techniques to overbook cluster resources in a controlled way, guaranteeing applications performance even despite overbooking [12]. Nevertheless, they assume that users provide information regarding the degree of overbooking that their applications may tolerate as well as their time periods, which may be known by the users in a cluster environments but is not available for cloud infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…As highlighted in [12], taking overbooking actions by only considering average resource requirements or only one dimension can result in significantly reduced performance. This is one of the main reasons why different logics for risk assessment were implemented [13].…”
mentioning
confidence: 99%
“…This approach is not application-centricit focuses on global throughput-and considers only transactional applications. The algorithm proposed in [20] allows applications to share physical machines, but does not change the number of instances of an application, does not minimize placement changes, and considers a single bottleneck resource.…”
Section: Related Workmentioning
confidence: 99%