Scalable Constraint-based Virtual Data Center Allocation

Size: px
Start display at page:

Download "Scalable Constraint-based Virtual Data Center Allocation"

Transcription

1 Scalable Constraint-based Virtual Data Center Allocation Sam Bayless Nodir Kodirov Ivan Beschastnikh Holger H. Hoos Alan J. Hu Computer Science University of British Columbia

2 Data centers, data centers, for all

3 Data centers, data centers, for all Flexible abstraction: Provider

4 Data centers, data centers, for all Flexible abstraction: Provider get() ip Customer

5 Data centers, data centers, for all Cisco: traffic flowing through data centers will triple between 014 and 019 (reaching 10.4 ZB/year) Wide variety of applications being hosted [Benson et al. IMC 10, Kanev et al. ISCA 15]

6 More capacity + capabilities lead to more complex workloads Complex workload examples Allocate a web-server, cache, database in a particular topology and with enough bandwidth to satisfy a certain QoS Deploy a distributed compute task in which some nodes communicate a lot, and others rarely Allocate a chain of NFV elements some of which require special hardware (GPUs)

7 allocation Customer

8 allocation Customer

9 allocation ToR Customer

10 allocation ToR Customer

11 allocation Aggregation Switch ToR ToR Customer

12 allocation: multi-tenancy Customer Customer Customer

13 allocation Observation 1: get()-style API is inappropriate Customer Customer Customer

14 allocation Observation 1: get()-style API is inappropriate Observation : It is more effective to allocate virtual data centers (VDCs), than virtual machines (s) Customer Customer Customer

15 As DCs evolve, so must the programming models and allocation mechanisms Allocation one at a time: get() Sub-optimal for the provider and the customer More info about an allocation: helps the provider plan and to effectively pack the data center Customers benefit since they get the properties that they ultimately need

16 As DCs evolve, so do the programming models and allocation mechanisms Allocation one at a time Sub-optimal for the provider and the customer More info about an allocation: helps the provider plan and to effectively pack the data center Customers benefit since they get the properties that they ultimately need AWS Lambda Amazon EMR (Hadoop)

17 In this talk Introduce virtual data center (VDC) allocation Discuss prior work (there is lots of it, mostly in the networking community) Describe NetSolver: our approach to solve VDC allocation (based on MonoSAT SMT-solver) Show how NetSolver compares to other approaches

18 What s the problem? Multi-path VDC allocation Input 1: a (directed/undirected) physical DC topology (DC) with edge capacities/latencies and per-host constraints (disk/memory/cpu/gpu/etc) Input : a virtual data center (VDC) that describe connectivity graph between s, and connectivity/ requirements Output: assignment of s to hosts, and virtual edges to physical paths (possibly multi-path) s.t. all constraints (end-to-end bandw, and ) are satisfied and respect DC

19 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ]

20 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

21 What s the problem? AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Output: Mapping Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

22 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

23 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

24 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

25 Example NetSolver solution AggSw1 AggSw Physical DC topology: ToR ToR Mapping : - edges -> paths core [ 4 GB ] core [ 4 GB ] core [ 4 GB ] Mapping 1: -> host Virtual data center (VDC): s1 m 1 core [ GB ] s 1 core [ GB ] 1 core 1 core [ GB ] GB s3 [ ]

26 Related work dimensions Sound: respect end-to-end bandw. guarantees VDC topology: Star/Hose/All DC topology: Tree/All Complete: finds a solution if a solution exists Multi-: can map more than one to a host Multi-path: supports multi-path allocations

27 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

28 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

29 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

30 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

31 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

32 Related work break-down 9: Guo et al. CoNEXT 10 48: Tantawi, MASCOTS 1 8: Ballani et al. CCR 11 54: Zhani et al. INM 13 43: Rost et al. CCR 15 50: Yu et al. SIGCOMM 08 15: Cheng et al. CCR 11 31: Huang et al., ICC : Chowdhury et al, INFOCOM 09 36: Lischika et al., VISA 09 51: Yuan, FMCAD 13

33 MonoSAT background Switch to other slide-deck

34 The MonoSAT constraint solver MonoSAT is an SMT solver for monotonic theories. MonoSAT supports: Graph constraints (shortest paths, maximum flows... ) Finite state machines & string acceptance Temporal logic (CTL) synthesis D polygonal geometry constraints Bounded integer & cardinality constraints Propositional logic (Boolean satisfiability) Has C++, Python, and Java bindings August 14, / 7

35 Finite Monotonic Predicates Apredicatep is positive monotonic i : : p(...,x,...), x apple y =) p(...,y,...) Apredicatep is negative monotonic i : : p(...,x,...), x apple y =) p(...,y,...) August 14, / 7

36 Monotonic theories Many useful predicates are monotonic: Graph Predicates: I Reachability I Shortest paths I Maximum s t flow I Minimum Spanning Tree I Acyclicity August 14, / 7

37 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7

38 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7

39 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7

40 Monotonic predicates Reachability is monotonic with respect to edges: August 14, / 7

41 Graph constraints in MonoSAT MonoSAT supports constraints over one or more finite graphs: Combines arbitrary Boolean constraints with high performance graph constraints. Supported graph constraints I Reachability I Shortest paths I Maximum s-t flow I Minimum spanning tree I Acyclicity Graphs can be directed Edges can have bit vector weights/capacities Scales to 100,000s of nodes and edges August 14, / 7

42 Graph constraints in MonoSAT s_0 a b c s_1 d e s_3 s_ ( a _ b) ^ ( d _ e) ^ reaches(s 0, s 3 ) ^ reaches(s 1, s 3 ) Figure : A directed graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and a formula constraining the graph. August 14, / 7

43 Graph constraints in MonoSAT s_0 a b c s_1 d e s_3 s_ ( a _ b) ^ ( d _ e) ^ reaches(s 0, s 3 ) ^ reaches(s 1, s 3 ) Figure : A directed graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and a formula constraining the graph. s_0 b s_1 e s_3 s_0 a c s_1 e s_3 s_ s_ Figure : Satisfying (left) and unsatisfying (right) solutions. August 14, / 7

44 Weighted graph constraints in MonoSAT s_0 x s_1 z y s_ (x > 1)^(x < y)^(y < 4)^(z = y)^(shortestpath(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. August 14, / 7

45 Weighted graph constraints in MonoSAT s_0 x s_1 z y s_ (x > 1)^(x < y)^(y < 4)^(z = y)^(shortestpath(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. s_0 s_1 3 3 s_ s_0 1 s_1 s_ Figure : Satisfying (left) and unsatisfying (right) solutions. August 14, / 7

46 Maximum-flow graph constraints in MonoSAT s_0 x y w s_1 v z s_3 s_ (x apple z apple )^(x > y)^(z > v)^( apple maximumflow(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. August 14, / 7

47 Maximum-flow graph constraints in MonoSAT s_0 x y w s_1 v z s_3 s_ (x apple z apple )^(x > y)^(z > v)^( apple maximumflow(s 0, s ) apple 3) Figure : A directed graph with variable edge weights, and a formula constraining those weights. s_0 0 s_1 0 s_3 s_0 1 s_1 1 s_3 s_ s_ Figure : Two satisfying solutions. August 14, / 7

48 Combined graph constraints in MonoSAT s_0 a,x s_1 d,v b,y c,w e,z s_3 s_ reaches(s 0, s ) ^ shortestpath(s, s 3 )=maximumflow(s 0, s 3 ) Figure : A graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and edge weights {v, w, x, y, z}. August 14, / 7

49 Combined graph constraints in MonoSAT s_0 a,x s_1 d,v b,y c,w e,z s_3 s_ reaches(s 0, s ) ^ shortestpath(s, s 3 )=maximumflow(s 0, s 3 ) Figure : A graph with edge inclusion controlled by Booleans {a, b, c, d, e}, and edge weights {v, w, x, y, z}. s_0 a,1 s_1 s_ d,1 e,1 s_3 Figure : A satisfying solution. August 14, / 7

50 NetSolver design Basic idea: encode VDC allocation as a MonoSAT query. Either outputs a solution or one does not exist Global constraints: connectivity and bandwidth Local constraints: s respect host resources Challenge: efficiency (e.g., each - path can be modeled as a max-flow constraint, these are expensive)

51 Global constraints Assume: that we know the -host assignments Given: G =(V,E) c(u, v) (u, v) E Directed graph and integer constraints on each edge K i K, i =(s i,t i,d i ) d i s i V t i V commodity demands, representing demand between and Graph (DC): Demands (VDC): s1 m s s3

52 Global constraints Assume: that we know the to host assignment Given: G =(V,E) c(u, v) (u, v) E Directed graph and integer constraints on each edge K i K, i =(s i,t i,d i ) d i s i V t i V commodity demands, representing demand between and Integral multi-commodity flow problem: Find feasible flow such that each satisfied For each edge total flow of all capacities is d i (u, v) apple c(u, v)

53 Commodity flow encoding Create graphs G 1... K : one per demand with same topology as G For each edge create a new symbolic capacity Assert: that (u, v) i G i c(u, v) i apple c(u, v) X i c(u, v) i apple c(u, v) Assert: for each demand, i =(s i,t i,d i ) max-flow(s i,t i ) d Solver s task: find partitioning of capacities across K graphs while satisfying lower-bounds across all demands

54 Modeling local constraints G Construct a graph that is the VDC and one node for each For each v and each server s G, create directed symbolic edge e vs with unlimited capacity; e vs controls allocation of v to servers v e vs Assert: for each, exactly on enabled s Assert: for each server, set of s assigned to s obey server s local resources G (s i,t i,d i ) Assert: satisfies flow for each commodity constraint

55 Further technical innovations Naive encoding slow: V max-flow constraints in worst case. Optimize by merging demands from same source So far assumed that VDC topology constant: only works for allocating sequence of identical VDCs To allocate diverse VDCs, encode superset of VDCs and use MonoSAT s assumption mechanism to disable parts of this superset during allocation

56 NetSolver Evaluation Key questions: Can a sound+complete scale to realistic topologies? Are there any practical benefits to being complete? How does NetSolver compare to related work? SecondNet (CoNEXT 10) Z3-based abstraction refinement technique (FMCAD 13)

57 Identical VDC packing and median alloc runtime (Tree) 000 servers, 16 cores; varying VDC sizes; Tree DC topologies

58 Identical VDC packing and median alloc runtime (BCube/FatTree) 51 servers, 16 cores; varying VDC sizes; BCube DC topologies 43 servers, 16 cores; varying VDC sizes; FatTree DC topologies

59 NFV chain allocation Intrusion Prevention System 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD Video Firewall Cache Optimizer 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD CPU core 4 GPU core 8 GB RAM 0 TB SSD CPU core 0 GPU core 4 GB RAM 10 TB SSD Parental Control 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD

60 NFV chain allocation Intrusion Prevention System 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD Video Firewall Cache Optimizer 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD CPU core 4 GPU core 8 GB RAM 0 TB SSD CPU core 0 GPU core 4 GB RAM 10 TB SSD Parental Control 4 CPU core 0 GPU core 8 GB RAM 0 TB SSD 100 servers; commercial DC topology; increasing chain bandwidth constraint

61 Extensibility NetSolver supports a variety of additional constraints A B C A B C 0/4 0/4 0/4 3/6 1/6 0/6 3/6 1/6 0/6 VDC Affinity Affinity Possible allocations No-hotspot: B, C C, C C, B VDC Possible allocations Minimize utilized servers: A, B B, A A, A B, B VDC Affinity No hotspots Minimize utilized severs

62 AggSw1 AggSw Contributions Physical Data Center ToR1 ToR Virtual Data Center Developed NetSolver, a new VDC allocator NetSolver encodes problem into MonoSAT. Can be reused for other problems: NFV placement, data migration, task distribution, etc Improves DC capacity utilization by 300% over prior work (but slower than incomplete approaches) Constraints-based approach flexibly extends to other kinds of constraints, such as (anti-)affinity

VNF Chain Allocation and Management at Data Center Scale

VNF Chain Allocation and Management at Data Center Scale VNF Chain Allocation and Management at Data Center Scale Internet Cloud Provider Tenants Nodir Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger Hoos, Alan Hu Network Functions (NF) are useful

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

Utilizing Datacenter Networks: Centralized or Distributed Solutions?

Utilizing Datacenter Networks: Centralized or Distributed Solutions? Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such

More information

Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-Demand Applications

Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-Demand Applications Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-Demand Applications Di Niu, Hong Xu, Baochun Li University of Toronto Shuqiao Zhao UUSee, Inc., Beijing, China 1 Applications in the Cloud WWW

More information

Programmable Networks with Synthesis

Programmable Networks with Synthesis Programmable Networks with Synthesis Ahmed ElHassany Petar Tsankov Laurent Vanbever Martin Vechev Network Misconfigurations are Common What Example Makes Network Configuration Hard? Low-level, local router

More information

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and

More information

COMP9319 Web Data Compression & Search. Cloud and data optimization XPath containment Distributed path expression processing

COMP9319 Web Data Compression & Search. Cloud and data optimization XPath containment Distributed path expression processing COMP9319 Web Data Compression & Search Cloud and data optimization XPath containment Distributed path expression processing DATA OPTIMIZATION ON CLOUD Cloud Virtualization Cloud layers Cloud computing

More information

Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing

Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing Nesime Tatbul Uğur Çetintemel Stan Zdonik Talk Outline Problem Introduction Approach Overview Advance Planning with an

More information

15-744: Computer Networking. Data Center Networking II

15-744: Computer Networking. Data Center Networking II 15-744: Computer Networking Data Center Networking II Overview Data Center Topology Scheduling Data Center Packet Scheduling 2 Current solutions for increasing data center network bandwidth FatTree BCube

More information

Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks. Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02

Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks. Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02 Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02 Outline Introduction The Tiny AGgregation Approach Aggregate

More information

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service

Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple

More information

Scalable Enterprise Networks with Inexpensive Switches

Scalable Enterprise Networks with Inexpensive Switches Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises

More information

NaaS Network-as-a-Service in the Cloud

NaaS Network-as-a-Service in the Cloud NaaS Network-as-a-Service in the Cloud joint work with Matteo Migliavacca, Peter Pietzuch, and Alexander L. Wolf costa@imperial.ac.uk Motivation Mismatch between app. abstractions & network How the programmers

More information

Main Memory and the CPU Cache

Main Memory and the CPU Cache Main Memory and the CPU Cache CPU cache Unrolled linked lists B Trees Our model of main memory and the cost of CPU operations has been intentionally simplistic The major focus has been on determining

More information

SCALING SOFTWARE DEFINED NETWORKS. Chengyu Fan (edited by Lorenzo De Carli)

SCALING SOFTWARE DEFINED NETWORKS. Chengyu Fan (edited by Lorenzo De Carli) SCALING SOFTWARE DEFINED NETWORKS Chengyu Fan (edited by Lorenzo De Carli) Introduction Network management is driven by policy requirements Network Policy Guests must access Internet via web-proxy Web

More information

Topics. Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples

Topics. Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples Hadoop Introduction 1 Topics Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples 2 Big Data Analytics What is Big Data?

More information

Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design

Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design A H M Jakaria, Mohammad Ashiqur Rahman, and Carol J Fung Department of Computer Science, Tennessee Tech University, Cookeville,

More information

Programming Systems for Big Data

Programming Systems for Big Data Programming Systems for Big Data CS315B Lecture 17 Including material from Kunle Olukotun Prof. Aiken CS 315B Lecture 17 1 Big Data We ve focused on parallel programming for computational science There

More information

Goals of Program Optimization (1 of 2)

Goals of Program Optimization (1 of 2) Goals of Program Optimization (1 of 2) Goal: Improve program performance within some constraints Ask Three Key Questions for Every Optimization 1. Is it legal? 2. Is it profitable? 3. Is it compile-time

More information

Camdoop Exploiting In-network Aggregation for Big Data Applications Paolo Costa

Camdoop Exploiting In-network Aggregation for Big Data Applications Paolo Costa Camdoop Exploiting In-network Aggregation for Big Data Applications costa@imperial.ac.uk joint work with Austin Donnelly, Antony Rowstron, and Greg O Shea (MSR Cambridge) MapReduce Overview Input file

More information

Efficient Data Structures for Tamper-Evident Logging

Efficient Data Structures for Tamper-Evident Logging Efficient Data Structures for Tamper-Evident Logging Scott A. Crosby Dan S. Wallach Rice University Everyone has logs Tamper evident solutions Current commercial solutions Write only hardware appliances

More information

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor

More information

Static Program Checking

Static Program Checking Bounded Verification Jalloy Automated Software Analysis Group, Institute of Theoretical Informatics Jun.-prof. Mana Taghdiri June 5, 2014 KIT University of the State of Baden-Wuerttemberg and National

More information

Outline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator

Outline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator Scalable Architecture for Service Function Chain Orchestration Sahel Sahhaf, Wouter Tavernier, Janos Czentye, Balazs Sonkoly Pontus Skoldstrom, David Jocha, Jokin Garay 30/09/2015- EWSDN 2015 3/10/2015

More information

Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia

Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, ON, Canada Motivation: IoT

More information

Introduction to MapReduce

Introduction to MapReduce Basics of Cloud Computing Lecture 4 Introduction to MapReduce Satish Srirama Some material adapted from slides by Jimmy Lin, Christophe Bisciglia, Aaron Kimball, & Sierra Michels-Slettvet, Google Distributed

More information

Data Transformation and Migration in Polystores

Data Transformation and Migration in Polystores Data Transformation and Migration in Polystores Adam Dziedzic, Aaron Elmore & Michael Stonebraker September 15th, 2016 Agenda Data Migration for Polystores: What & Why? How? Acceleration of physical data

More information

HECTOR: Formal System-Level to RTL Equivalence Checking

HECTOR: Formal System-Level to RTL Equivalence Checking ATG SoC HECTOR: Formal System-Level to RTL Equivalence Checking Alfred Koelbl, Sergey Berezin, Reily Jacoby, Jerry Burch, William Nicholls, Carl Pixley Advanced Technology Group Synopsys, Inc. June 2008

More information

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software

More information

THE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER

THE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT

More information

CSE507. Practical Applications of SAT. Computer-Aided Reasoning for Software. Emina Torlak

CSE507. Practical Applications of SAT. Computer-Aided Reasoning for Software. Emina Torlak Computer-Aided Reasoning for Software CSE507 Practical Applications of SAT courses.cs.washington.edu/courses/cse507/18sp/ Emina Torlak emina@cs.washington.edu Today Past 2 lectures The theory and mechanics

More information

Venice: Reliable Virtual Data Center Embedding in Clouds

Venice: Reliable Virtual Data Center Embedding in Clouds Venice: Reliable Virtual Data Center Embedding in Clouds Qi Zhang, Mohamed Faten Zhani, Maissa Jabri and Raouf Boutaba University of Waterloo IEEE INFOCOM Toronto, Ontario, Canada April 29, 2014 1 Introduction

More information

Strong Bridges and Strong Articulation Points of Directed Graphs

Strong Bridges and Strong Articulation Points of Directed Graphs Strong Bridges and Strong Articulation Points of Directed Graphs Giuseppe F. Italiano Univ. of Rome Tor Vergata Based on joint work with Donatella Firmani, Luigi Laura, Alessio Orlandi and Federico Santaroni

More information

Static Analysis and Bugfinding

Static Analysis and Bugfinding Static Analysis and Bugfinding Alex Kantchelian 09/12/2011 Last week we talked about runtime checking methods: tools for detecting vulnerabilities being exploited in deployment. So far, these tools have

More information

Finding and Fixing Bugs in Liquid Haskell. Anish Tondwalkar

Finding and Fixing Bugs in Liquid Haskell. Anish Tondwalkar Finding and Fixing Bugs in Liquid Haskell Anish Tondwalkar Overview Motivation Liquid Haskell Fault Localization Fault Localization Evaluation Predicate Discovery Predicate Discovery Evaluation Conclusion

More information

Framework for replica selection in fault-tolerant distributed systems

Framework for replica selection in fault-tolerant distributed systems Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.

More information

Networked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013

Networked Systems. Boon Thau Loo. University of Pennsylvania. NSF ExCAPE Meeting 20 Aug 2013 Networked Systems Boon Thau Loo University of Pennsylvania NSF ExCAPE Meeting 20 Aug 2013 Outline Summary (activities over past year) Research highlights Conclusion Year 1 in Retrospect Original proposal

More information

FOUNDATIONS OF INTENT- BASED NETWORKING

FOUNDATIONS OF INTENT- BASED NETWORKING FOUNDATIONS OF INTENT- BASED NETWORKING Loris D Antoni Aditya Akella Aaron Gember Jacobson Network Policies Enterprise Network Cloud Network Enterprise Network 2 3 Tenant Network Policies Enterprise Network

More information

Getting Performance from OpenMP Programs on NUMA Architectures

Getting Performance from OpenMP Programs on NUMA Architectures Getting Performance from OpenMP Programs on NUMA Architectures Christian Terboven, RWTH Aachen University terboven@itc.rwth-aachen.de EU H2020 Centre of Excellence (CoE) 1 October 2015 31 March 2018 Grant

More information

Robust validation of network designs under uncertain demands and failures

Robust validation of network designs under uncertain demands and failures Robust validation of network designs under uncertain demands and failures Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani Purdue University USENIX NSDI 2017 Validating network design Network design today

More information

Lecture 7: Data Center Networks

Lecture 7: Data Center Networks Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE

More information

Evolution of Rack Scale Architecture Storage

Evolution of Rack Scale Architecture Storage Evolution of Rack Scale Architecture Storage Murugasamy (Sammy) Nachimuthu, Principal Engineer Mohan J Kumar, Fellow Intel Corporation August 2016 1 Agenda Introduction to Intel Rack Scale Design Storage

More information

CA485 Ray Walshe Google File System

CA485 Ray Walshe Google File System Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

SPARTA: Scalable Per-Address RouTing Architecture

SPARTA: Scalable Per-Address RouTing Architecture SPARTA: Scalable Per-Address RouTing Architecture John Carter Data Center Networking IBM Research - Austin IBM Research Science & Technology IBM Research activities related to SDN / OpenFlow IBM Research

More information

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

CS / Cloud Computing. Recitation 3 September 9 th & 11 th, 2014

CS / Cloud Computing. Recitation 3 September 9 th & 11 th, 2014 CS15-319 / 15-619 Cloud Computing Recitation 3 September 9 th & 11 th, 2014 Overview Last Week s Reflection --Project 1.1, Quiz 1, Unit 1 This Week s Schedule --Unit2 (module 3 & 4), Project 1.2 Questions

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

Lecture Notes on Real-world SMT

Lecture Notes on Real-world SMT 15-414: Bug Catching: Automated Program Verification Lecture Notes on Real-world SMT Matt Fredrikson Ruben Martins Carnegie Mellon University Lecture 15 1 Introduction In the previous lecture we studied

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern

More information

CS221: Algorithms and Data Structures. Asymptotic Analysis. Alan J. Hu (Borrowing slides from Steve Wolfman)

CS221: Algorithms and Data Structures. Asymptotic Analysis. Alan J. Hu (Borrowing slides from Steve Wolfman) CS221: Algorithms and Data Structures Asymptotic Analysis Alan J. Hu (Borrowing slides from Steve Wolfman) 1 Learning Goals By the end of this unit, you will be able to Define which program operations

More information

Exploiting Inter-Flow Relationship for Coflow Placement in Data Centers. Xin Sunny Huang, T. S. Eugene Ng Rice University

Exploiting Inter-Flow Relationship for Coflow Placement in Data Centers. Xin Sunny Huang, T. S. Eugene Ng Rice University Exploiting Inter-Flow Relationship for Coflow Placement in Data Centers Xin Sunny Huang, T S Eugene g Rice University This Work Optimizing Coflow performance has many benefits such as avoiding application

More information

Distributed DNS Name server Backed by Raft

Distributed DNS Name server Backed by Raft Distributed DNS Name server Backed by Raft Emre Orbay Gabbi Fisher December 13, 2017 Abstract We implement a asynchronous distributed DNS server backed by Raft. Our DNS server system supports large cluster

More information

Virtualization of Data Center towards Load Balancing and Multi- Tenancy

Virtualization of Data Center towards Load Balancing and Multi- Tenancy IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 4 Issue 6, June 2017 ISSN (Online) 2348 7968 Impact Factor (2017) 5.264 www.ijiset.com Virtualization of Data Center

More information

Accelerating Analytical Workloads

Accelerating Analytical Workloads Accelerating Analytical Workloads Thomas Neumann Technische Universität München April 15, 2014 Scale Out in Big Data Analytics Big Data usually means data is distributed Scale out to process very large

More information

Drilling Through The Stack. Burkhard Neidecker-Lutz Technical Director, SAP Research SAP AG

Drilling Through The Stack. Burkhard Neidecker-Lutz Technical Director, SAP Research SAP AG Drilling Through The Stack Burkhard Neidecker-Lutz Technical Director, SAP Research SAP AG Talk Outline Where I come from Layered stacks Violating layers for fun and profit The mother of all stacks: Future

More information

Architectural challenges for building a low latency, scalable multi-tenant data warehouse

Architectural challenges for building a low latency, scalable multi-tenant data warehouse Architectural challenges for building a low latency, scalable multi-tenant data warehouse Mataprasad Agrawal Solutions Architect, Services CTO 2017 Persistent Systems Ltd. All rights reserved. Our analytics

More information

Column Stores vs. Row Stores How Different Are They Really?

Column Stores vs. Row Stores How Different Are They Really? Column Stores vs. Row Stores How Different Are They Really? Daniel J. Abadi (Yale) Samuel R. Madden (MIT) Nabil Hachem (AvantGarde) Presented By : Kanika Nagpal OUTLINE Introduction Motivation Background

More information

SAT Modulo Monotonic Theories

SAT Modulo Monotonic Theories Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence SAT Modulo Monotonic Theories Sam Bayless sbayless@cs.ubc.ca Univ. of British Columbia Noah Bayless nbayless@pgmini.org Point

More information

CIT 668: System Architecture. Amazon Web Services

CIT 668: System Architecture. Amazon Web Services CIT 668: System Architecture Amazon Web Services Topics 1. AWS Global Infrastructure 2. Foundation Services 1. Compute 2. Storage 3. Database 4. Network 3. AWS Economics Amazon Services Architecture Regions

More information

Column-Stores vs. Row-Stores. How Different are they Really? Arul Bharathi

Column-Stores vs. Row-Stores. How Different are they Really? Arul Bharathi Column-Stores vs. Row-Stores How Different are they Really? Arul Bharathi Authors Daniel J.Abadi Samuel R. Madden Nabil Hachem 2 Contents Introduction Row Oriented Execution Column Oriented Execution Column-Store

More information

Additional Slides to De Micheli Book

Additional Slides to De Micheli Book Additional Slides to De Micheli Book Sungho Kang Yonsei University Design Style - Decomposition 08 3$9 0 Behavioral Synthesis Resource allocation; Pipelining; Control flow parallelization; Communicating

More information

Map Reduce. Yerevan.

Map Reduce. Yerevan. Map Reduce Erasmus+ @ Yerevan dacosta@irit.fr Divide and conquer at PaaS 100 % // Typical problem Iterate over a large number of records Extract something of interest from each Shuffle and sort intermediate

More information

Track Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross

Track Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross Track Join Distributed Joins with Minimal Network Traffic Orestis Polychroniou Rajkumar Sen Kenneth A. Ross Local Joins Algorithms Hash Join Sort Merge Join Index Join Nested Loop Join Spilling to disk

More information

Indexing in RAMCloud. Ankita Kejriwal, Ashish Gupta, Arjun Gopalan, John Ousterhout. Stanford University

Indexing in RAMCloud. Ankita Kejriwal, Ashish Gupta, Arjun Gopalan, John Ousterhout. Stanford University Indexing in RAMCloud Ankita Kejriwal, Ashish Gupta, Arjun Gopalan, John Ousterhout Stanford University RAMCloud 1.0 Introduction Higher-level data models Without sacrificing latency and scalability Secondary

More information

EsgynDB Enterprise 2.0 Platform Reference Architecture

EsgynDB Enterprise 2.0 Platform Reference Architecture EsgynDB Enterprise 2.0 Platform Reference Architecture This document outlines a Platform Reference Architecture for EsgynDB Enterprise, built on Apache Trafodion (Incubating) implementation with licensed

More information

Improving Hadoop MapReduce Performance on Supercomputers with JVM Reuse

Improving Hadoop MapReduce Performance on Supercomputers with JVM Reuse Thanh-Chung Dao 1 Improving Hadoop MapReduce Performance on Supercomputers with JVM Reuse Thanh-Chung Dao and Shigeru Chiba The University of Tokyo Thanh-Chung Dao 2 Supercomputers Expensive clusters Multi-core

More information

Fast Hierarchical Clustering via Dynamic Closest Pairs

Fast Hierarchical Clustering via Dynamic Closest Pairs Fast Hierarchical Clustering via Dynamic Closest Pairs David Eppstein Dept. Information and Computer Science Univ. of California, Irvine http://www.ics.uci.edu/ eppstein/ 1 My Interest In Clustering What

More information

CQNCR: Optimal VM Migration Planning in Cloud Data Centers

CQNCR: Optimal VM Migration Planning in Cloud Data Centers CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School

Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T

More information

Network Verification: Reflections from Electronic Design Automation (EDA)

Network Verification: Reflections from Electronic Design Automation (EDA) Network Verification: Reflections from Electronic Design Automation (EDA) Sharad Malik Princeton University MSR Faculty Summit: 7/8/2015 $4 Billion EDA industry EDA Consortium $350 Billion Semiconductor

More information

Toward a Memory-centric Architecture

Toward a Memory-centric Architecture Toward a Memory-centric Architecture Martin Fink EVP & Chief Technology Officer Western Digital Corporation August 8, 2017 1 SAFE HARBOR DISCLAIMERS Forward-Looking Statements This presentation contains

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

SCREAM: Sketch Resource Allocation for Software-defined Measurement

SCREAM: Sketch Resource Allocation for Software-defined Measurement SCREAM: Sketch Resource Allocation for Software-defined Measurement (CoNEXT 15) Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat Measurement is Crucial for Network Management Network Management

More information

Automatic Algorithm Configuration based on Local Search

Automatic Algorithm Configuration based on Local Search Automatic Algorithm Configuration based on Local Search Frank Hutter 1 Holger Hoos 1 Thomas Stützle 2 1 Department of Computer Science University of British Columbia Canada 2 IRIDIA Université Libre de

More information

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability

More information

Reasoning About Imperative Programs. COS 441 Slides 10

Reasoning About Imperative Programs. COS 441 Slides 10 Reasoning About Imperative Programs COS 441 Slides 10 The last few weeks Agenda reasoning about functional programming It s very simple and very uniform: substitution of equal expressions for equal expressions

More information

Parallelizing SAT Solver With specific application on solving Sudoku Puzzles

Parallelizing SAT Solver With specific application on solving Sudoku Puzzles 6.338 Applied Parallel Computing Final Report Parallelizing SAT Solver With specific application on solving Sudoku Puzzles Hank Huang May 13, 2009 This project was focused on parallelizing a SAT solver

More information

Computer Memory. Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1

Computer Memory. Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1 Computer Memory Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1 Warm Up public int sum1(int n, int m, int[][] table) { int output = 0; for (int i = 0; i < n; i++) { for (int j = 0; j

More information

CSE 373: Data Structures and Algorithms. Memory and Locality. Autumn Shrirang (Shri) Mare

CSE 373: Data Structures and Algorithms. Memory and Locality. Autumn Shrirang (Shri) Mare CSE 373: Data Structures and Algorithms Memory and Locality Autumn 2018 Shrirang (Shri) Mare shri@cs.washington.edu Thanks to Kasey Champion, Ben Jones, Adam Blank, Michael Lee, Evan McCarty, Robbie Weber,

More information

The ITAPS Mesh Interface

The ITAPS Mesh Interface The ITAPS Mesh Interface Carl Ollivier-Gooch Advanced Numerical Simulation Laboratory, University of British Columbia Needs and Challenges for Unstructured Mesh Usage Application PDE Discretization Mesh

More information

New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO

New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO Agenda Company profile and background Business and Users needs OpenIO approach Competition Conclusion Company profile

More information

Outline. Introduction SDV Motivation Model vs Real Implementation SLIC SDVRP SLAM-2 Comparisons Conclusions

Outline. Introduction SDV Motivation Model vs Real Implementation SLIC SDVRP SLAM-2 Comparisons Conclusions Outline Introduction SDV Motivation Model vs Real Implementation SIC SDVRP SAM-2 Comparisons Conclusions SDV Research Platform Academic release of SDV (Static Driver Verifier), based on the code that ships

More information

Data Center Network Topologies II

Data Center Network Topologies II Data Center Network Topologies II Hakim Weatherspoon Associate Professor, Dept of Computer cience C 5413: High Performance ystems and Networking April 10, 2017 March 31, 2017 Agenda for semester Project

More information

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.

More information

Principles of Program Analysis. Lecture 1 Harry Xu Spring 2013

Principles of Program Analysis. Lecture 1 Harry Xu Spring 2013 Principles of Program Analysis Lecture 1 Harry Xu Spring 2013 An Imperfect World Software has bugs The northeast blackout of 2003, affected 10 million people in Ontario and 45 million in eight U.S. states

More information

OpenSMT2. A Parallel, Interpolating SMT Solver. Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina

OpenSMT2. A Parallel, Interpolating SMT Solver. Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina OpenSMT2 A Parallel, Interpolating SMT Solver Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina Why another SMT solver? Model checking OpenSMT Interpolation Parallel

More information

Next-Generation Cloud Platform

Next-Generation Cloud Platform Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology

More information

Automatic Scaling Iterative Computations. Aug. 7 th, 2012

Automatic Scaling Iterative Computations. Aug. 7 th, 2012 Automatic Scaling Iterative Computations Guozhang Wang Cornell University Aug. 7 th, 2012 1 What are Non-Iterative Computations? Non-iterative computation flow Directed Acyclic Examples Batch style analytics

More information

PARALLEL CONSENSUS PROTOCOL

PARALLEL CONSENSUS PROTOCOL CANOPUS: A SCALABLE AND MASSIVELY PARALLEL CONSENSUS PROTOCOL Bernard Wong CoNEXT 2017 Joint work with Sajjad Rizvi and Srinivasan Keshav CONSENSUS PROBLEM Agreement between a set of nodes in the presence

More information

Fast Generation of Lexicographic Satisfiable Assignments: Enabling Canonicity in SAT-based Applications

Fast Generation of Lexicographic Satisfiable Assignments: Enabling Canonicity in SAT-based Applications Fast Generation of Lexicographic Satisfiable Assignments: Enabling Canonicity in -based Applications Ana Petkovska 1 ana.petkovska@epfl.ch Giovanni De Micheli 1 giovanni.demicheli@epfl.ch Alan Mishchenko

More information

PAC485 Managing Datacenter Resources Using the VirtualCenter Distributed Resource Scheduler

PAC485 Managing Datacenter Resources Using the VirtualCenter Distributed Resource Scheduler PAC485 Managing Datacenter Resources Using the VirtualCenter Distributed Resource Scheduler Carl Waldspurger Principal Engineer, R&D This presentation may contain VMware confidential information. Copyright

More information

Dynamic Graph Query Primitives for SDN-based Cloud Network Management

Dynamic Graph Query Primitives for SDN-based Cloud Network Management Dynamic Graph Query Primitives for SDN-based Cloud Network Management Ramya Raghavendra, Jorge Lobo, Kang-Won Lee IBM T. J. Watson Research Center Network as a Service Model High-level VM and network description

More information

Hadoop 2.x Core: YARN, Tez, and Spark. Hortonworks Inc All Rights Reserved

Hadoop 2.x Core: YARN, Tez, and Spark. Hortonworks Inc All Rights Reserved Hadoop 2.x Core: YARN, Tez, and Spark YARN Hadoop Machine Types top-of-rack switches core switch client machines have client-side software used to access a cluster to process data master nodes run Hadoop

More information

VNE-Sim: A Virtual Network Embedding Simulator

VNE-Sim: A Virtual Network Embedding Simulator VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,

More information

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect Serverless Architecture Hochskalierbare Anwendungen ohne Server Sascha Möllering, Solutions Architect Agenda Serverless Architecture AWS Lambda Amazon API Gateway Amazon DynamoDB Amazon S3 Serverless Framework

More information

Stream Processing on IoT Devices using Calvin Framework

Stream Processing on IoT Devices using Calvin Framework Stream Processing on IoT Devices using Calvin Framework by Ameya Nayak A Project Report Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science Supervised

More information

Lost in translation. Leonardo de Moura Microsoft Research. how easy problems become hard due to bad encodings. Vampire Workshop 2015

Lost in translation. Leonardo de Moura Microsoft Research. how easy problems become hard due to bad encodings. Vampire Workshop 2015 Lost in translation how easy problems become hard due to bad encodings Vampire Workshop 2015 Leonardo de Moura Microsoft Research I wanted to give the following talk http://leanprover.github.io/ Automated

More information

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,

More information