1 / 52

Adviser : Frank,Yeong -Sung Lin Present by Chris Chang

OPTIMAL PLACEMENT OF VIRTUAL MACHINES WITH DIFFERENT PLACEMENT CONSTRAINTS IN IAAS CLOUDS Lei Shi, Bernard Butler, Runxin Wang, Dmitri Botvich and Brendan Jennings. Adviser : Frank,Yeong -Sung Lin Present by Chris Chang. Agenda. Introduction Related Work

Download Presentation

Adviser : Frank,Yeong -Sung Lin Present by Chris Chang

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. OPTIMAL PLACEMENT OF VIRTUAL MACHINES WITHDIFFERENT PLACEMENT CONSTRAINTS IN IAAS CLOUDSLei Shi, Bernard Butler, Runxin Wang, Dmitri Botvich and Brendan Jennings Adviser: Frank,Yeong-Sung Lin Present by Chris Chang

  2. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  3. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  4. Introduction • Cloud computing is becoming a general utility (like electricity or piped water) that provides on-demand resource leases as transparent services to the user. • Cloud computing provides a variety of services ranging from web search,online social networking and online office applications, to ITinfrastructure outsourcing.

  5. Introduction • These services are generally categorized as : • Infrastructure as a Service (IaaS) • Platform as aService (PaaS) • Software as a Service (SaaS) • Everything asa service(XaaS)

  6. Introduction • In a data center a group of servers is provided and multiplerequests for VMs need to be placed in these servers. • Each request has a list of the number of different VM types, along witha placement constraint. • For example: • Arequest for services requiring high-level fault tolerance has an anti-collocation placementconstraint. • A request for data safety-sensitive services requires hardware-based security.

  7. Introduction • When there is a profit associated with each allocated VM… • The goal of this paper is to maximize the total profit of the VMs assigned to the servers, while ensuring that the placement is feasible in respect of the server capacity and placement constraints.

  8. Introduction • Most research focuses on selected aspects of placement optimization including server consolidation, migration costs or placement restrictions. • However, considerations such as revenue maximization, multiple requests that each contains a list of the number of different VM types, and mixture of different placement constraints associated with these requests are rarely considered together.

  9. Introduction • Our approaches address the problem of predicting the optimized allocation of VM sets, which enables the cloud provider to have a better understanding of revenue and operational considerations before negotiating SLAs with groups of customers. • Given a typical mix of customer demands for virtualized computing resources, our approach formulates this resource allocation problem as an integer linear programming (ILP) problem.

  10. Introduction • The ILP model produces an optimal placement for VMs with different placement constraints. • The performance of the algorithm is evaluated by means of numerical experiments.

  11. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  12. Related Work • The problem outlined in this paper is closely related to thevector bin packing problem. • the resources used by each item (e.g., CPU and memory) are “additive in each dimension” • In [12], the authors claim that for the large dimensional vector bin packing problem, no practical algorithms better than variants of (first-fit decreasing) FFD have been found.

  13. Related Work • In Urgaonkar’s work [11], they consider maximizing the number of placed applications, where each application comprise a set of application components that should be placed in full on a cluster of servers. • They also considered anti-collocation placement constraints for failure tolerance purpose.

  14. Related Work • In Breitgand’s work [3],they also consider maximizing the IaaS provider profit from service provisioning obtained from the placed VMs, while respecting placement constraints and resource capacity constraints. • A direct integer programming formulation is proposed to obtain the exact solutions • However, in [3] only full deployment and anti-collocation constraints are considered not hardware-based security placement constraint

  15. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  16. Integer Linear Programming Formulation • We are given a set H of h physical hosts and n VM provisioning requests. • Each request is associated with a placement constraint k and contains VMs, s ∈ [1 ..n ], representing the demands of various customers.

  17. Integer Linear Programming Formulation • Table 1 lists the four placement constraint types (best-effort, security, anti-collocation and full deployment) together with the feasible pairs of constraint types that may be applied together in any VM request set.

  18. Integer Linear Programming Formulation • Each VM l of request has size and value to the cloud provider when it is assigned to physical host i. • Each physical host i has a d-dimensional capacity c ( i ) in terms of CPU, memory, network bandwidth, etc.

  19. Integer Linear Programming Formulation • For each VM l of request , there are two (0,1)-valued decision variables : • : = 1 indicates that VM l is assigned to physical host i and = 0 otherwise. • : = 1 means request is included into the placement, 0 means that for all VMs l belonging to this request , all are zero.

  20. Integer Linear Programming Formulation • The purpose of the integer programming formulation for the VM placement problem is to maximize the objective which is the sum of values (where each value is the revenue per hour per allocated VM).

  21. Integer Linear Programming Formulation • The full deployment (β)constraint ensures that the total revenue of a given VM subset is the sum of the revenues of all its constituent VMs if the whole subset is placed; otherwise its value is zero. • The anti-collocation(γ)constraint requires (for fault tolerance purposes) that every VM of a given subset should be assigned to a different physical server.

  22. Integer Linear Programming Formulation • The security(α)constraint requires that each server can accommodate only those VMs from a particular request in order to exclude VMs of other requests. • The best effort(τ) placement is effectively unconstrained, apart from the usual constraints such as the resource placement constraints in the VM request set.

  23. Integer Linear Programming Formulation • The anti-collocation and the security constraints are effectively mutually exclusive. • Full deployment is compatible with each of the other constraints (constraints δ and κ)

  24. Integer Linear Programming Formulation • Security α: • For security reasons, the VMs belonging to the same requestmust be placed on the same physical server.

  25. Integer Linear Programming Formulation • Full deployment β: • This placement constraint ensures that VM requests should be either fully placed, or none of the VMs will be allocated. • Assigning the value of to 0 means all are zero.

  26. Integer Linear Programming Formulation • Anti-collocation (Fault tolerance) γ: • This ensures that the VMs of a given request with placement constraint γ cannot be placed on the same server.

  27. Integer Linear Programming Formulation • Security and full-deployment δ: • To meet both requirements, given aserver accommodating VM(s) of a request with placement constraint δ, no VMs from other requests could coexist on the samephysical host.

  28. Integer Linear Programming Formulation • Security and full-deployment δ:

  29. Integer Linear Programming Formulation • Anti-collocation and full-deployment κ: • For agiven server and VM request , only one VM from can beplaced on this server, which satisfies the requirement of anti-collocation. • We also have the full-deployment constraint specified.

  30. Integer Linear Programming Formulation • Anti-collocation and full-deployment κ:

  31. Integer Linear Programming Formulation • Best effort τ: • For all VM requests associated with placement constraint τ, as long as the capacity constraint is not violated, as many VMs as possible of this request could be placed into the physical hosts.

  32. Integer Linear Programming Formulation • Best effort τ: • Let designate the rth-dimension resource requirement when VM l in request is assigned to physical host i. • When VM l in request is assigned to physical host i. cr ( i) is used to describe the rth-dimension of the resource capacity of host i, and d indicates the number of dimensions of resource capacities.

  33. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  34. Performance Evaluation • Performance Evaluation • Test Setup • Experimental Results

  35. Performance Evaluation(Test Setup) • For allexperiments, the specification of the servers is homogeneous:24 processors (each equivalent to 1 Amazon ECU) with eachserver having 32GB of memory. • We set up 4 different test cases for our experimentand form 2 main groups. • In experiments 1–3, the algorithm chooses how to allocate server resources (notably, memory and CPU) to VMs that can be drawn from Amazon EC2 VM instance types, as indicated in Table 2.

  36. Performance Evaluation(Test Setup) • For each VM request in test 1-3, the VM instances are generated by a combinatorial auction algorithm. • Test 2 has the least requested VMs and Test 3 has an intermediate number of request VMs. • In test 4, we target the scalability issue of our model and increase the number of VMs tested to 1276. The placement constraints, VM types and VM ranges are randomly assigned to each request.

  37. Performance Evaluation(Test Setup) • Table 3 summarizes the experiments we used to investigate the usefulness of the model.

  38. Performance Evaluation(Test Setup) • Generally, in test 1-3, the experiment “sizes” were chosen in such a way that experiment run-times were considered acceptable. • We limit the run time of each placement for test 1-3 to 10 minutes. • For test 4, due to the increased complexity of the VM placement program with the large scale input, we limit the run time of each placement to 5 minutes.

  39. Performance Evaluation(Experimental Results)

  40. Performance Evaluation(Experimental Results)

  41. Performance Evaluation(Experimental Results)

  42. Performance Evaluation(Experimental Results)

  43. Performance Evaluation(Experimental Results)

  44. Performance Evaluation(Experimental Results) • The results show that given the VM requests which have a variety of VM types and placement constraints, placement canhave a dramatic change with the increase of physical servers.

  45. Performance Evaluation(Experimental Results) • The best effort placement constraint (τ) : • It often changein each placement plan, mainly because the VMs belonging to the same VM type are essentially the same for maximizing revenue. • The requests with security placement constraint (α and δ) : • If the number of VMs in this request is small, they might be only placed when there are enough servers because they generates relatively small profit compared to the servers it consumes.

  46. Performance Evaluation(Experimental Results) • The request with both full and anti-collocation placement constraint (κ) : • It requires as many servers as the number of VMs in this request, it can be allocated when there are enough servers. • The requests with full or anti-collocation placement constraints (β and γ) • They can co-exist with best effort requests and can be selected even there are only few servers.

  47. Performance Evaluation(Experimental Results)

  48. Agenda • Introduction • Related Work • Integer Linear Programming Formulation • Performance Evaluation • Conclusion and Future Work

  49. Conclusion and Future Work • We present a model of VM placement that enables cloud service providers to perform numerical simulations of differentVM demand scenarios. • The main contributions are the followings : • A comprehensive ILP model dealingwith a wide variety of placement constraints and VM types. • This model is such that it can be solved by standard commercialsoftware.

  50. Conclusion and Future Work • The results show that having a variety of VM types and placement constraints can have a dramatic effect on VM placements, but interestingly, relatively little effect on predicted revenue. • That is, such complicated scenarios present operational difficulties, but are not critical when the cloud provider prepares a business model.

More Related