Scalable Constraint-based Virtual Data Center Allocation
|
|
- Benedict Kennedy
- 5 years ago
- Views:
Transcription
1 Scalable Constraint-based Virtual Data Center Allocation Sam Bayless Nodir Kodirov Ivan Beschastnikh Holger H. Hoos Alan J. Hu Computer Science University of British Columbia
2 Data centers, data centers, for all
3 Data centers, data centers, for all Flexible abstraction: Provider
4 Data centers, data centers, for all Flexible abstraction: Provider get() ip Customer
5 Data centers, data centers, for all Cisco: traffic flowing through data centers will triple between 014 and 019 (reaching 10.4 ZB/year) Wide variety of applications being hosted [Benson et al. IMC 10, Kanev et al. ISCA 15]
6 More capacity + capabilities lead to more complex workloads Complex workload examples Allocate a web-server, cache, database in a particular topology and with enough bandwidth to satisfy a certain QoS Deploy a distributed compute task in which some nodes communicate a lot, and others rarely Allocate a chain of NFV elements some of which require special hardware (GPUs)
7 allocation Customer
8 allocation Customer
9 allocation ToR Customer
10 allocation ToR Customer
11 allocation Aggregation Switch ToR ToR Customer
12 allocation: multi-tenancy Customer Customer Customer
13 allocation Observation 1: get()-style API is inappropriate Customer Customer Customer
14 allocation Observation 1: get()-style API is inappropriate Observation : It is more effective to allocate virtual data centers (VDCs), than virtual machines (s) Customer Customer Customer
15 As DCs evolve, so must the programming models and allocation mechanisms Allocation one at a time: get() Sub-optimal for the provider and the customer More info about an allocation: helps the provider plan and to effectively pack the data center Customers benefit since they get the properties that they ultimately need
16 As DCs evolve, so do the programming models and allocation mechanisms Allocation one at a time Sub-optimal for the provider and the customer More info about an allocation: helps the provider plan and to effectively pack the data center Customers benefit since they get the properties that they ultimately need AWS Lambda Amazon EMR (Hadoop)
17 In this talk Introduce virtual data center (VDC) allocation Discuss prior work (there is lots of it, mostly in the networking community) Describe NetSolver: our approach to solve VDC allocation (based on MonoSAT SMT-solver) Show how NetSolver compares to other approaches
18 What s the problem? Multi-path VDC allocation Input 1: a (directed/undirected) physical DC topology (DC) with edge capacities/latencies and per-host constraints (disk/memory/cpu/gpu/etc) Input : a virtual data center (VDC) that describe connectivity graph between s, and connectivity/ requirements Output: assignment of s to hosts, and virtual edges to physical paths (possibly multi-path) s.t. all constraints (end-to-end bandw, and ) are satisfied and respect DC
19 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ]
20 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
21 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Output: Mapping Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
22 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
23 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
24 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
25 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]
26 Related work dimensions Sound: respect end-to-end bandw. guarantees VDC topology: Star/Hose/All DC topology: Tree/All Complete: finds a solution if a solution exists Multi-: can map more than one to a host Multi-path: supports multi-path allocations
27 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
28 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
29 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
30 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
31 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
32 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13
33 MonoSAT background Switch to other slide-deck
34 The MonoSAT constraint solver MonoSAT is an SMT solver for monotonic theories. MonoSAT supports: Graph constraints (shortest paths, maximum flows... ) Finite state machines & string acceptance Temporal logic (CTL) synthesis D polygonal geometry constraints Bounded integer & cardinality constraints Propositional logic (Boolean satisfiability) Has C++, Python, and Java bindings August 14, / 7
35 Finite Monotonic Predicates Apredicatep is positive monotonic i : : p(...,x,...), x apple y =) p(...,y,...) Apredicatep is negative monotonic i : : p(...,x,...), x apple y =) p(...,y,...) August 14, / 7
36 Monotonic theories Many useful predicates are monotonic: Graph Predicates: I Reachability I Shortest paths I Maximum s t flow I Minimum Spanning Tree I Acyclicity August 14, / 7
37 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7
38 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7
39 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7
40 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7
41 Graph constraints in MonoSAT MonoSAT supports constraints over one or more finite graphs: Combines arbitrary Boolean constraints with high performance graph constraints. Supported graph constraints I Reachability I Shortest paths I Maximum s-t flow I Minimum spanning tree I Acyclicity Graphs can be directed Edges can have bit vector weights/capacities Scales to 100,000s of nodes and edges August 14, / 7
42 Graph constraints in MonoSAT s_0 a b c s_1 d e s_3 s_ ( a _ b) ^ ( d _ e) ^ reaches(s 0, s 3 ) ^ reaches(s 1, s 3 ) Figure : A directed graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and a formula constraining the graph. August 14, / 7
43 Graph constraints in MonoSAT s_0 a b c s_1 d e s_3 s_ ( a _ b) ^ ( d _ e) ^ reaches(s 0, s 3 ) ^ reaches(s 1, s 3 ) Figure : A directed graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and a formula constraining the graph. s_0 b s_1 e s_3 s_0 a c s_1 e s_3 s_ s_ Figure : Satisfying (left) and unsatisfying (right) solutions. August 14, / 7
44 Weighted graph constraints in MonoSAT s_0 x s_1 z y s_ (x > 1)^(x < y)^(y < 4)^(z = y)^(shortestpath(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. August 14, / 7
45 Weighted graph constraints in MonoSAT s_0 x s_1 z y s_ (x > 1)^(x < y)^(y < 4)^(z = y)^(shortestpath(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. s_0 s_1 3 3 s_ s_0 1 s_1 s_ Figure : Satisfying (left) and unsatisfying (right) solutions. August 14, / 7
46 Maximum-flow graph constraints in MonoSAT s_0 x y w s_1 v z s_3 s_ (x apple z apple )^(x > y)^(z > v)^( apple maximumflow(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. August 14, / 7
47 Maximum-flow graph constraints in MonoSAT s_0 x y w s_1 v z s_3 s_ (x apple z apple )^(x > y)^(z > v)^( apple maximumflow(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. s_0 0 s_1 0 s_3 s_0 1 s_1 1 s_3 s_ s_ Figure : Two satisfying solutions. August 14, / 7
48 Combined graph constraints in MonoSAT s_0 a,x s_1 d,v b,y c,w e,z s_3 s_ reaches(s 0, s ) ^ shortestpath(s, s 3 )=maximumflow(s 0, s 3 ) Figure : A graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and edge weights {v, w, x, y, z}. August 14, / 7
49 Combined graph constraints in MonoSAT s_0 a,x s_1 d,v b,y c,w e,z s_3 s_ reaches(s 0, s ) ^ shortestpath(s, s 3 )=maximumflow(s 0, s 3 ) Figure : A graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and edge weights {v, w, x, y, z}. s_0 a,1 s_1 s_ d,1 e,1 s_3 Figure : A satisfying solution. August 14, / 7
50 NetSolver design Basic idea: encode VDC allocation as a MonoSAT query. Either outputs a solution or one does not exist Global constraints: connectivity and bandwidth Local constraints: s respect host resources Challenge: efficiency (e.g., each - path can be modeled as a max-flow constraint, these are expensive)
51 Global constraints Assume: that we know the -host assignments Given: G =(V,E) c(u, v) (u, v) E Directed graph and integer constraints on each edge K i K, i =(s i,t i,d i ) d i s i V t i V commodity demands, representing demand between and Graph (DC): Demands (VDC): s1 m s s3
52 Global constraints Assume: that we know the to host assignment Given: G =(V,E) c(u, v) (u, v) E Directed graph and integer constraints on each edge K i K, i =(s i,t i,d i ) d i s i V t i V commodity demands, representing demand between and Integral multi-commodity flow problem: Find feasible flow such that each satisfied For each edge total flow of all capacities is d i (u, v) apple c(u, v)
53 Commodity flow encoding Create graphs G 1... K : one per demand with same topology as G For each edge create a new symbolic capacity Assert: that (u, v) i G i c(u, v) i apple c(u, v) X i c(u, v) i apple c(u, v) Assert: for each demand, i =(s i,t i,d i ) max-flow(s i,t i ) d Solver s task: find partitioning of capacities across K graphs while satisfying lower-bounds across all demands
54 Modeling local constraints G Construct a graph that is the VDC and one node for each For each v and each server s G, create directed symbolic edge e vs with unlimited capacity; e vs controls allocation of v to servers v e vs Assert: for each, exactly on enabled s Assert: for each server, set of s assigned to s obey server s local resources G (s i,t i,d i ) Assert: satisfies flow for each commodity constraint
55 Further technical innovations Naive encoding slow: V max-flow constraints in worst case. Optimize by merging demands from same source So far assumed that VDC topology constant: only works for allocating sequence of identical VDCs To allocate diverse VDCs, encode superset of VDCs and use MonoSAT s assumption mechanism to disable parts of this superset during allocation
56 NetSolver Evaluation Key questions: Can a sound+complete scale to realistic topologies? Are there any practical benefits to being complete? How does NetSolver compare to related work? SecondNet (CoNEXT 10) Z3-based abstraction refinement technique (FMCAD 13)
57 Identical VDC packing and median alloc runtime (Tree) 000 servers, 16 cores; varying VDC sizes; Tree DC topologies
58 Identical VDC packing and median alloc runtime (BCube/FatTree) 51 servers, 16 cores; varying VDC sizes; BCube DC topologies 43 servers, 16 cores; varying VDC sizes; FatTree DC topologies
59 NFV chain allocation Intrusion Prevention System 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD Video Firewall Cache Optimizer 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD CPU core 4 GPU core 8 GB RAM 0 TB SSD CPU core 0 GPU core 4 GB RAM 10 TB SSD Parental Control 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD
60 NFV chain allocation Intrusion Prevention System 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD Video Firewall Cache Optimizer 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD CPU core 4 GPU core 8 GB RAM 0 TB SSD CPU core 0 GPU core 4 GB RAM 10 TB SSD Parental Control 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD 100 servers; commercial DC topology; increasing chain bandwidth constraint
61 Extensibility NetSolver supports a variety of additional constraints A B C A B C 0/4 0/4 0/4 3/6 1/6 0/6 3/6 1/6 0/6 VDC Affinity Affinity Possible allocations No-hotspot: B, C C, C C, B VDC Possible allocations Minimize utilized servers: A, B B, A A, A B, B VDC Affinity No hotspots Minimize utilized severs
62 AggSw1 AggSw Contributions Physical Data Center ToR1 ToR Virtual Data Center Developed NetSolver, a new VDC allocator NetSolver encodes problem into MonoSAT. Can be reused for other problems: NFV placement, data migration, task distribution, etc Improves DC capacity utilization by 300% over prior work (but slower than incomplete approaches) Constraints-based approach flexibly extends to other kinds of constraints, such as (anti-)affinity
VNF Chain Allocation and Management at Data Center Scale
VNF Chain Allocation and Management at Data Center Scale Internet Cloud Provider Tenants Nodir Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger Hoos, Alan Hu Network Functions (NF) are useful
More informationLecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end
More informationUtilizing Datacenter Networks: Centralized or Distributed Solutions?
Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such
More informationQuality-Assured Cloud Bandwidth Auto-Scaling for Video-on-Demand Applications
Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-Demand Applications Di Niu, Hong Xu, Baochun Li University of Toronto Shuqiao Zhao UUSee, Inc., Beijing, China 1 Applications in the Cloud WWW
More informationProgrammable Networks with Synthesis
Programmable Networks with Synthesis Ahmed ElHassany Petar Tsankov Laurent Vanbever Martin Vechev Network Misconfigurations are Common What Example Makes Network Configuration Hard? Low-level, local router
More informationDeploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017
Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and
More informationCOMP9319 Web Data Compression & Search. Cloud and data optimization XPath containment Distributed path expression processing
COMP9319 Web Data Compression & Search Cloud and data optimization XPath containment Distributed path expression processing DATA OPTIMIZATION ON CLOUD Cloud Virtualization Cloud layers Cloud computing
More informationStaying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing
Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Nesime Tatbul Uğur Çetintemel Stan Zdonik Talk Outline Problem Introduction Approach Overview Advance Planning with an
More information15-744: Computer Networking. Data Center Networking II
15-744: Computer Networking Data Center Networking II Overview Data Center Topology Scheduling Data Center Packet Scheduling 2 Current solutions for increasing data center network bandwidth FatTree BCube
More informationTag a Tiny Aggregation Service for Ad-Hoc Sensor Networks. Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02
Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02 Outline Introduction The Tiny AGgregation Approach Aggregate
More informationMulti-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service
in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple
More informationScalable Enterprise Networks with Inexpensive Switches
Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises
More informationNaaS Network-as-a-Service in the Cloud
NaaS Network-as-a-Service in the Cloud joint work with Matteo Migliavacca, Peter Pietzuch, and Alexander L. Wolf costa@imperial.ac.uk Motivation Mismatch between app. abstractions & network How the programmers
More informationMain Memory and the CPU Cache
Main Memory and the CPU Cache CPU cache Unrolled linked lists B Trees Our model of main memory and the cost of CPU operations has been intentionally simplistic The major focus has been on determining
More informationSCALING SOFTWARE DEFINED NETWORKS. Chengyu Fan (edited by Lorenzo De Carli)
SCALING SOFTWARE DEFINED NETWORKS Chengyu Fan (edited by Lorenzo De Carli) Introduction Network management is driven by policy requirements Network Policy Guests must access Internet via web-proxy Web
More informationTopics. Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples
Hadoop Introduction 1 Topics Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples 2 Big Data Analytics What is Big Data?
More informationAutomated Synthesis of NFV Topology: A Security Requirement-Oriented Design
Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design A H M Jakaria, Mohammad Ashiqur Rahman, and Carol J Fung Department of Computer Science, Tennessee Tech University, Cookeville,
More informationProgramming Systems for Big Data
Programming Systems for Big Data CS315B Lecture 17 Including material from Kunle Olukotun Prof. Aiken CS 315B Lecture 17 1 Big Data We ve focused on parallel programming for computational science There
More informationGoals of Program Optimization (1 of 2)
Goals of Program Optimization (1 of 2) Goal: Improve program performance within some constraints Ask Three Key Questions for Every Optimization 1. Is it legal? 2. Is it profitable? 3. Is it compile-time
More informationCamdoop Exploiting In-network Aggregation for Big Data Applications Paolo Costa
Camdoop Exploiting In-network Aggregation for Big Data Applications costa@imperial.ac.uk joint work with Austin Donnelly, Antony Rowstron, and Greg O Shea (MSR Cambridge) MapReduce Overview Input file
More informationEfficient Data Structures for Tamper-Evident Logging
Efficient Data Structures for Tamper-Evident Logging Scott A. Crosby Dan S. Wallach Rice University Everyone has logs Tamper evident solutions Current commercial solutions Write only hardware appliances
More informationPaperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper
Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor
More informationStatic Program Checking
Bounded Verification Jalloy Automated Software Analysis Group, Institute of Theoretical Informatics Jun.-prof. Mana Taghdiri June 5, 2014 KIT University of the State of Baden-Wuerttemberg and National
More informationOutline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator
Scalable Architecture for Service Function Chain Orchestration Sahel Sahhaf, Wouter Tavernier, Janos Czentye, Balazs Sonkoly Pontus Skoldstrom, David Jocha, Jokin Garay 30/09/2015- EWSDN 2015 3/10/2015
More informationThomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia
Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, ON, Canada Motivation: IoT
More informationIntroduction to MapReduce
Basics of Cloud Computing Lecture 4 Introduction to MapReduce Satish Srirama Some material adapted from slides by Jimmy Lin, Christophe Bisciglia, Aaron Kimball, & Sierra Michels-Slettvet, Google Distributed
More informationData Transformation and Migration in Polystores
Data Transformation and Migration in Polystores Adam Dziedzic, Aaron Elmore & Michael Stonebraker September 15th, 2016 Agenda Data Migration for Polystores: What & Why? How? Acceleration of physical data
More informationHECTOR: Formal System-Level to RTL Equivalence Checking
ATG SoC HECTOR: Formal System-Level to RTL Equivalence Checking Alfred Koelbl, Sergey Berezin, Reily Jacoby, Jerry Burch, William Nicholls, Carl Pixley Advanced Technology Group Synopsys, Inc. June 2008
More informationTALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE
DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software
More informationTHE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER
WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT
More informationCSE507. Practical Applications of SAT. Computer-Aided Reasoning for Software. Emina Torlak
Computer-Aided Reasoning for Software CSE507 Practical Applications of SAT courses.cs.washington.edu/courses/cse507/18sp/ Emina Torlak emina@cs.washington.edu Today Past 2 lectures The theory and mechanics
More informationVenice: Reliable Virtual Data Center Embedding in Clouds
Venice: Reliable Virtual Data Center Embedding in Clouds Qi Zhang, Mohamed Faten Zhani, Maissa Jabri and Raouf Boutaba University of Waterloo IEEE INFOCOM Toronto, Ontario, Canada April 29, 2014 1 Introduction
More informationStrong Bridges and Strong Articulation Points of Directed Graphs
Strong Bridges and Strong Articulation Points of Directed Graphs Giuseppe F. Italiano Univ. of Rome Tor Vergata Based on joint work with Donatella Firmani, Luigi Laura, Alessio Orlandi and Federico Santaroni
More informationStatic Analysis and Bugfinding
Static Analysis and Bugfinding Alex Kantchelian 09/12/2011 Last week we talked about runtime checking methods: tools for detecting vulnerabilities being exploited in deployment. So far, these tools have
More informationFinding and Fixing Bugs in Liquid Haskell. Anish Tondwalkar
Finding and Fixing Bugs in Liquid Haskell Anish Tondwalkar Overview Motivation Liquid Haskell Fault Localization Fault Localization Evaluation Predicate Discovery Predicate Discovery Evaluation Conclusion
More informationFramework for replica selection in fault-tolerant distributed systems
Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.
More informationNetworked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013
Networked Systems Boon Thau Loo University of Pennsylvania NSF ExCAPE Meeting 20 Aug 2013 Outline Summary (activities over past year) Research highlights Conclusion Year 1 in Retrospect Original proposal
More informationFOUNDATIONS OF INTENT- BASED NETWORKING
FOUNDATIONS OF INTENT- BASED NETWORKING Loris D Antoni Aditya Akella Aaron Gember Jacobson Network Policies Enterprise Network Cloud Network Enterprise Network 2 3 Tenant Network Policies Enterprise Network
More informationGetting Performance from OpenMP Programs on NUMA Architectures
Getting Performance from OpenMP Programs on NUMA Architectures Christian Terboven, RWTH Aachen University terboven@itc.rwth-aachen.de EU H2020 Centre of Excellence (CoE) 1 October 2015 31 March 2018 Grant
More informationRobust validation of network designs under uncertain demands and failures
Robust validation of network designs under uncertain demands and failures Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani Purdue University USENIX NSDI 2017 Validating network design Network design today
More informationLecture 7: Data Center Networks
Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE
More informationEvolution of Rack Scale Architecture Storage
Evolution of Rack Scale Architecture Storage Murugasamy (Sammy) Nachimuthu, Principal Engineer Mohan J Kumar, Fellow Intel Corporation August 2016 1 Agenda Introduction to Intel Rack Scale Design Storage
More informationCA485 Ray Walshe Google File System
Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationSPARTA: Scalable Per-Address RouTing Architecture
SPARTA: Scalable Per-Address RouTing Architecture John Carter Data Center Networking IBM Research - Austin IBM Research Science & Technology IBM Research activities related to SDN / OpenFlow IBM Research
More informationReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck
ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding
More informationCS / Cloud Computing. Recitation 3 September 9 th & 11 th, 2014
CS15-319 / 15-619 Cloud Computing Recitation 3 September 9 th & 11 th, 2014 Overview Last Week s Reflection --Project 1.1, Quiz 1, Unit 1 This Week s Schedule --Unit2 (module 3 & 4), Project 1.2 Questions
More informationSoftware-Defined Networking (SDN) Overview
Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it
More informationLecture Notes on Real-world SMT
15-414: Bug Catching: Automated Program Verification Lecture Notes on Real-world SMT Matt Fredrikson Ruben Martins Carnegie Mellon University Lecture 15 1 Introduction In the previous lecture we studied
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationCS221: Algorithms and Data Structures. Asymptotic Analysis. Alan J. Hu (Borrowing slides from Steve Wolfman)
CS221: Algorithms and Data Structures Asymptotic Analysis Alan J. Hu (Borrowing slides from Steve Wolfman) 1 Learning Goals By the end of this unit, you will be able to Define which program operations
More informationExploiting Inter-Flow Relationship for Coflow Placement in Data Centers. Xin Sunny Huang, T. S. Eugene Ng Rice University
Exploiting Inter-Flow Relationship for Coflow Placement in Data Centers Xin Sunny Huang, T S Eugene g Rice University This Work Optimizing Coflow performance has many benefits such as avoiding application
More informationDistributed DNS Name server Backed by Raft
Distributed DNS Name server Backed by Raft Emre Orbay Gabbi Fisher December 13, 2017 Abstract We implement a asynchronous distributed DNS server backed by Raft. Our DNS server system supports large cluster
More informationVirtualization of Data Center towards Load Balancing and Multi- Tenancy
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 4 Issue 6, June 2017 ISSN (Online) 2348 7968 Impact Factor (2017) 5.264 www.ijiset.com Virtualization of Data Center
More informationAccelerating Analytical Workloads
Accelerating Analytical Workloads Thomas Neumann Technische Universität München April 15, 2014 Scale Out in Big Data Analytics Big Data usually means data is distributed Scale out to process very large
More informationDrilling Through The Stack. Burkhard Neidecker-Lutz Technical Director, SAP Research SAP AG
Drilling Through The Stack Burkhard Neidecker-Lutz Technical Director, SAP Research SAP AG Talk Outline Where I come from Layered stacks Violating layers for fun and profit The mother of all stacks: Future
More informationArchitectural challenges for building a low latency, scalable multi-tenant data warehouse
Architectural challenges for building a low latency, scalable multi-tenant data warehouse Mataprasad Agrawal Solutions Architect, Services CTO 2017 Persistent Systems Ltd. All rights reserved. Our analytics
More informationColumn Stores vs. Row Stores How Different Are They Really?
Column Stores vs. Row Stores How Different Are They Really? Daniel J. Abadi (Yale) Samuel R. Madden (MIT) Nabil Hachem (AvantGarde) Presented By : Kanika Nagpal OUTLINE Introduction Motivation Background
More informationSAT Modulo Monotonic Theories
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence SAT Modulo Monotonic Theories Sam Bayless sbayless@cs.ubc.ca Univ. of British Columbia Noah Bayless nbayless@pgmini.org Point
More informationCIT 668: System Architecture. Amazon Web Services
CIT 668: System Architecture Amazon Web Services Topics 1. AWS Global Infrastructure 2. Foundation Services 1. Compute 2. Storage 3. Database 4. Network 3. AWS Economics Amazon Services Architecture Regions
More informationColumn-Stores vs. Row-Stores. How Different are they Really? Arul Bharathi
Column-Stores vs. Row-Stores How Different are they Really? Arul Bharathi Authors Daniel J.Abadi Samuel R. Madden Nabil Hachem 2 Contents Introduction Row Oriented Execution Column Oriented Execution Column-Store
More informationAdditional Slides to De Micheli Book
Additional Slides to De Micheli Book Sungho Kang Yonsei University Design Style - Decomposition 08 3$9 0 Behavioral Synthesis Resource allocation; Pipelining; Control flow parallelization; Communicating
More informationMap Reduce. Yerevan.
Map Reduce Erasmus+ @ Yerevan dacosta@irit.fr Divide and conquer at PaaS 100 % // Typical problem Iterate over a large number of records Extract something of interest from each Shuffle and sort intermediate
More informationTrack Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross
Track Join Distributed Joins with Minimal Network Traffic Orestis Polychroniou Rajkumar Sen Kenneth A. Ross Local Joins Algorithms Hash Join Sort Merge Join Index Join Nested Loop Join Spilling to disk
More informationIndexing in RAMCloud. Ankita Kejriwal, Ashish Gupta, Arjun Gopalan, John Ousterhout. Stanford University
Indexing in RAMCloud Ankita Kejriwal, Ashish Gupta, Arjun Gopalan, John Ousterhout Stanford University RAMCloud 1.0 Introduction Higher-level data models Without sacrificing latency and scalability Secondary
More informationEsgynDB Enterprise 2.0 Platform Reference Architecture
EsgynDB Enterprise 2.0 Platform Reference Architecture This document outlines a Platform Reference Architecture for EsgynDB Enterprise, built on Apache Trafodion (Incubating) implementation with licensed
More informationImproving Hadoop MapReduce Performance on Supercomputers with JVM Reuse
Thanh-Chung Dao 1 Improving Hadoop MapReduce Performance on Supercomputers with JVM Reuse Thanh-Chung Dao and Shigeru Chiba The University of Tokyo Thanh-Chung Dao 2 Supercomputers Expensive clusters Multi-core
More informationFast Hierarchical Clustering via Dynamic Closest Pairs
Fast Hierarchical Clustering via Dynamic Closest Pairs David Eppstein Dept. Information and Computer Science Univ. of California, Irvine http://www.ics.uci.edu/ eppstein/ 1 My Interest In Clustering What
More informationCQNCR: Optimal VM Migration Planning in Cloud Data Centers
CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationAbstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School
Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T
More informationNetwork Verification: Reflections from Electronic Design Automation (EDA)
Network Verification: Reflections from Electronic Design Automation (EDA) Sharad Malik Princeton University MSR Faculty Summit: 7/8/2015 $4 Billion EDA industry EDA Consortium $350 Billion Semiconductor
More informationToward a Memory-centric Architecture
Toward a Memory-centric Architecture Martin Fink EVP & Chief Technology Officer Western Digital Corporation August 8, 2017 1 SAFE HARBOR DISCLAIMERS Forward-Looking Statements This presentation contains
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationSCREAM: Sketch Resource Allocation for Software-defined Measurement
SCREAM: Sketch Resource Allocation for Software-defined Measurement (CoNEXT 15) Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat Measurement is Crucial for Network Management Network Management
More informationAutomatic Algorithm Configuration based on Local Search
Automatic Algorithm Configuration based on Local Search Frank Hutter 1 Holger Hoos 1 Thomas Stützle 2 1 Department of Computer Science University of British Columbia Canada 2 IRIDIA Université Libre de
More informationXuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata
BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability
More informationReasoning About Imperative Programs. COS 441 Slides 10
Reasoning About Imperative Programs COS 441 Slides 10 The last few weeks Agenda reasoning about functional programming It s very simple and very uniform: substitution of equal expressions for equal expressions
More informationParallelizing SAT Solver With specific application on solving Sudoku Puzzles
6.338 Applied Parallel Computing Final Report Parallelizing SAT Solver With specific application on solving Sudoku Puzzles Hank Huang May 13, 2009 This project was focused on parallelizing a SAT solver
More informationComputer Memory. Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1
Computer Memory Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1 Warm Up public int sum1(int n, int m, int[][] table) { int output = 0; for (int i = 0; i < n; i++) { for (int j = 0; j
More informationCSE 373: Data Structures and Algorithms. Memory and Locality. Autumn Shrirang (Shri) Mare
CSE 373: Data Structures and Algorithms Memory and Locality Autumn 2018 Shrirang (Shri) Mare shri@cs.washington.edu Thanks to Kasey Champion, Ben Jones, Adam Blank, Michael Lee, Evan McCarty, Robbie Weber,
More informationThe ITAPS Mesh Interface
The ITAPS Mesh Interface Carl Ollivier-Gooch Advanced Numerical Simulation Laboratory, University of British Columbia Needs and Challenges for Unstructured Mesh Usage Application PDE Discretization Mesh
More informationNew Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO
New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO Agenda Company profile and background Business and Users needs OpenIO approach Competition Conclusion Company profile
More informationOutline. Introduction SDV Motivation Model vs Real Implementation SLIC SDVRP SLAM-2 Comparisons Conclusions
Outline Introduction SDV Motivation Model vs Real Implementation SIC SDVRP SAM-2 Comparisons Conclusions SDV Research Platform Academic release of SDV (Static Driver Verifier), based on the code that ships
More informationData Center Network Topologies II
Data Center Network Topologies II Hakim Weatherspoon Associate Professor, Dept of Computer cience C 5413: High Performance ystems and Networking April 10, 2017 March 31, 2017 Agenda for semester Project
More informationLecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.
More informationPrinciples of Program Analysis. Lecture 1 Harry Xu Spring 2013
Principles of Program Analysis Lecture 1 Harry Xu Spring 2013 An Imperfect World Software has bugs The northeast blackout of 2003, affected 10 million people in Ontario and 45 million in eight U.S. states
More informationOpenSMT2. A Parallel, Interpolating SMT Solver. Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina
OpenSMT2 A Parallel, Interpolating SMT Solver Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina Why another SMT solver? Model checking OpenSMT Interpolation Parallel
More informationNext-Generation Cloud Platform
Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology
More informationAutomatic Scaling Iterative Computations. Aug. 7 th, 2012
Automatic Scaling Iterative Computations Guozhang Wang Cornell University Aug. 7 th, 2012 1 What are Non-Iterative Computations? Non-iterative computation flow Directed Acyclic Examples Batch style analytics
More informationPARALLEL CONSENSUS PROTOCOL
CANOPUS: A SCALABLE AND MASSIVELY PARALLEL CONSENSUS PROTOCOL Bernard Wong CoNEXT 2017 Joint work with Sajjad Rizvi and Srinivasan Keshav CONSENSUS PROBLEM Agreement between a set of nodes in the presence
More informationFast Generation of Lexicographic Satisfiable Assignments: Enabling Canonicity in SAT-based Applications
Fast Generation of Lexicographic Satisfiable Assignments: Enabling Canonicity in -based Applications Ana Petkovska 1 ana.petkovska@epfl.ch Giovanni De Micheli 1 giovanni.demicheli@epfl.ch Alan Mishchenko
More informationPAC485 Managing Datacenter Resources Using the VirtualCenter Distributed Resource Scheduler
PAC485 Managing Datacenter Resources Using the VirtualCenter Distributed Resource Scheduler Carl Waldspurger Principal Engineer, R&D This presentation may contain VMware confidential information. Copyright
More informationDynamic Graph Query Primitives for SDN-based Cloud Network Management
Dynamic Graph Query Primitives for SDN-based Cloud Network Management Ramya Raghavendra, Jorge Lobo, Kang-Won Lee IBM T. J. Watson Research Center Network as a Service Model High-level VM and network description
More informationHadoop 2.x Core: YARN, Tez, and Spark. Hortonworks Inc All Rights Reserved
Hadoop 2.x Core: YARN, Tez, and Spark YARN Hadoop Machine Types top-of-rack switches core switch client machines have client-side software used to access a cluster to process data master nodes run Hadoop
More informationVNE-Sim: A Virtual Network Embedding Simulator
VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,
More informationServerless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect
Serverless Architecture Hochskalierbare Anwendungen ohne Server Sascha Möllering, Solutions Architect Agenda Serverless Architecture AWS Lambda Amazon API Gateway Amazon DynamoDB Amazon S3 Serverless Framework
More informationStream Processing on IoT Devices using Calvin Framework
Stream Processing on IoT Devices using Calvin Framework by Ameya Nayak A Project Report Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science Supervised
More informationLost in translation. Leonardo de Moura Microsoft Research. how easy problems become hard due to bad encodings. Vampire Workshop 2015
Lost in translation how easy problems become hard due to bad encodings Vampire Workshop 2015 Leonardo de Moura Microsoft Research I wanted to give the following talk http://leanprover.github.io/ Automated
More informationDeadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen
Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,
More information