C3PO: Computation Congestion Control (PrOactive)

Similar documents
Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading

arxiv: v2 [cs.ni] 6 Apr 2016

Service-Centric Networking for the Developing World

Cache Management for TelcoCDNs. Daphné Tuncer Department of Electronic & Electrical Engineering University College London (UK)

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Congestion Management in Lossless Interconnects: Challenges and Benefits

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Summary Cache based Co-operative Proxies

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Data Center Network Topologies II

Real-time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments

Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN

Measurement of packet networks, e.g. the internet

On Network Dimensioning Approach for the Internet

Assignment 5. Georgia Koloniari

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Graph Theoretic Models for Ad hoc Wireless Networks

An Introduction to Cyber-Physical Systems INF5910/INF9910

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Active source routing for ad-hoc network: seamless integration of wireless environment

P2P and the Future Internet. Pablo Rodriguez Telefonica Research, Barcelona

Distributed Scheduling. Distributed Scheduling

V Conclusions. V.1 Related work

QCN: Quantized Congestion Notification. Rong Pan, Balaji Prabhakar, Ashvin Laxmikantha

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Exploiting ICN for Flexible Management of Software-Defined Networks

Routing Protocols in MANETs

Replicate It! Scalable Content Delivery: Why? Scalable Content Delivery: How? Scalable Content Delivery: How? Scalable Content Delivery: What?

Study of Load Balancing Schemes over a Video on Demand System

Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09)

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

Some economical principles

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

MediaTek CorePilot 2.0. Delivering extreme compute performance with maximum power efficiency

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Lecture 5: Performance Analysis I

Application of SDN: Load Balancing & Traffic Engineering

CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION

A Proactive Network Coding Strategy for Pervasive Wireless Networking

Presented by: Murad Kaplan

Chapter 7 CONCLUSION

Capacity planning and.

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

Part I. Wireless Communication

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

WSN Routing Protocols

TCP and BBR. Geoff Huston APNIC

A model for Endpoint Admission Control Based on Packet Loss

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

TCP and BBR. Geoff Huston APNIC. #apricot

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

Delay Tolerant Networks

A Survey - Energy Efficient Routing Protocols in MANET

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

TCP and BBR. Geoff Huston APNIC

Prof. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

Optimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space

A Novel Review on Routing Protocols in MANETs

PROBABILISTIC SCHEDULING MICHAEL ROITZSCH

ITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology

Routing Protocols in MANET: Comparative Study

Network-Adaptive Video Coding and Transmission

Big Data Analytics CSCI 4030

Lecture 8 Wireless Sensor Networks: Overview

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Course Routing Classification Properties Routing Protocols 1/39

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

Tutorial 9 : TCP and congestion control part I

Congestion and its control: Broadband access networks. David Clark MIT CFP October 2008

DiffServ Architecture: Impact of scheduling on QoS

CSMA based Medium Access Control for Wireless Sensor Network

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Network Load Balancing Methods: Experimental Comparisons and Improvement

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network

A Rant on Queues. Van Jacobson. July 26, MIT Lincoln Labs Lexington, MA

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

Sensor Tasking and Control

A Scalable, Commodity Data Center Network Architecture

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER

POLYMORPHIC ON-CHIP NETWORKS

Performance Consequences of Partial RED Deployment

Network-on-chip (NOC) Topologies

Implementing stable TCP variants

Transcription:

C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge, UK Telefonica Research, ES* Presented by Suzan Bayhan (TU Berlin, Germany)

Question: Where Computations Happen "Fat client and thin server" or "thin client and fat server". Trend changes driven by the changes in usage pattern, advances in hardware and software technologies, and even new business models. Nowadays, both fat clients and fat servers: high processing power and storage capacity Still difficult to keep their pace with the ever-growing user demands. 2

Observation I: Pervasive Mobile Apps Pervasive mobile clients have given birth to complex mobile apps. These apps are continuously generating, disseminating, consuming, and processing all kinds of information, in order to provide us convenient daily services. 3

Observation II: Battery Is The Bottleneck Unfortunately, given current battery technology, these demanding apps impose a huge burden on energy constrained devices. Power hogging apps are responsible for 41% degradation of battery life on average. Even popular ones such as social networks and instant messaging apps (e.g., Facebook and Skype) can drain a device's battery up to 9X faster due only to maintaining an online presence. 4

Observation III: MiddleBoxes Grow Stronger Quite different from a decade ago, network middleboxes are no longer simple devices which only forward packets. ISPs' own network services have been shifting from specialized servers to generic hardware with the adoption of the NFV paradigm. E.g., Telefonica is shifting 30% of their infrastructure to NFV by 2016. Other providers such as AT&T, Vodafone, NTT Docomo, and China Mobile. There are many in-network resources we can exploit. Besides, many of them are underutilised. 5

A New Paradigm: In-network Service Execution Ubiquitous in-network service execution Example services:???? 6

Challenge: How To Avoid Congestions Because service execution consumes multiple resources on a router, especially demands CPU cycles for computation intensive tasks, it introduces a new type of "congestion" in a network - "computation congestion". An obvious and important question: How to avoid such congestions? i.e., what would be the mechanism of Computation Congestion Control for those ephemeral computation-intensive in-network services? 7

How Is It Different From Previous Settings Traffic congestion: the solutions usually either try to reduce the transmission rate or take advantage of multiple paths. congestions are avoided by the cooperation of both communication ends. But: In-network services do not necessarily impose a point-to-point paradigm! Load balancing: a cluster often has a regular structure, i.e., network topology, central coordination, homogeneous configurations, uniform demands, and etc. Therefore, fully centralised control is the norm in the cluster. The jobs are often able to tolerate long scheduling delay. 8

Characteristics Of Our Context Our context in an ISP network is more complicated: 1. the underlying topology is not regular 2. the node configurations can be heterogeneous 3. demands distribution is highly skewed hence the resources in a neighbourhood needs to be well utilised 4. central coordination is often expensive and reduces responsiveness of those networked nodes 5. services (and clients) are intolerable to long scheduling delay. 9

Our Solution: C3PO: Computation Congestion Control (PrOactive) C3PO: a low-complexity distributed load balancer based on the pessimistic prediction of the service queue. Why do we go for a distributed one instead of a centralised solver? A central solver needs global knowledge of all the nodes in a network the optimal strategy needs to be calculated periodically given the dynamic nature of a network and traffic there is a single point of failure there is often only marginal improvements over a smartly designed heuristic. 10

Two Strategies Are Studied: Passive Control if NOT overloaded, execute the process Else, forward to the next on-path node Node 1 Node 2 Last Node Drop if overloaded and the last node in the ISP network User requests + Very simple - Reactive 11

Proactive Control Estimate the request arrival rate Estimate potential consumption If may become overloaded, forward to the neighbor with the least load Else, execute the process Node 1 User requests Node 2 Node 3 Node 4 + Proactive, anticipatory - Requires 1-hop information12exchange Last Node Drop if overloaded and the last node in the ISP network

Proactive Control: A Closer Look Neighbor node requests User requests Birth-death system Total arriving reqs λ = λj Total completed reqs μ = 1/tj Node n Service fj: Poisson λj CPU req. cj Memory mj Exec.time tj λ, μ, service popularity q CPU load Memory load Service load analyzer 13 For a stable system, workload < node capacity Probabilistically (q) execute requests to ensure stability Tune q based on expected load

Intuitive Explanations of C3PO Stationary analysis of M/M/1-PS model on the service queue on a router. Intuitively: Try to estimate the future incoming request rate based on the previous observations, If a router thinks it is going to be overloaded based on its capacity and service requirements, it only probabilistically executes some of the service requests. When estimating the future request rate, a router takes into account the second-order information (i.e., the derivative) of the rate. Essentially, it is smoothing. But it only considers the positive derivatives (line 4 in the code), so it is pessimistic, therefore proactive. Why :) 14

Proactive Strategy: C3PO The algorithm is simple yet effective. We need to make sure the load balancing itself will not cause too much overhead. The algorithm maintains four circular buffer with fixed size. on_arrival and on_complete two functions need to be performed whenever a request arrives or finished. Overall complexity The proactiveness is achieved by being conservative. Technically, by smoothing the load curve, or getting the derivative of the load increasing rate. 15

Implementation Details We use four fixed-size circular buffers instead of fixed time window to prevent the memory usage from being subject to service arrival/completion rate. The reason is the number of arrived requests can vary in a fixed time window. Parameter k (buffer size) represents a trade-off between stability and responsiveness. Larger k more stable estimates (longer history considered) Smaller k higher responsiveness to the changes in λ and μ. Although λ needs to be calculated at every request arrival (line 3), further optimisations can be easily done to reduce the complexity. 16

Evaluation Setup Aim: analyze how different strategy impacts load distribution as well as latency, drop rate, responsiveness to jitters. We test three strategies on both synthetic and realistic topologies using Icarus simulator None (only edge routers execute services), Passive, Proactive Poisson request stream with λ = 1000 as arrival rate We assume CPU is the first bottleneck in the system for computation intensive services, and only present the results of using Exodus network in the following. 17

C3PO Exploits Its Neighbourhood Client connected to router at (0,0) Server connected to router at (9,9). Proactive is more capable at utilizing the nearby resources within its neighborhood, leading to better load balancing and smaller latency. Increasing load On-path routers: a few due to small-world structure of networks Yellow: high load 18

Scalable to Workload on Exodus ISP network x-axis is node index and y-axis is load. Top 50 nodes of the heaviest load are sorted in decreasing order Increasing load τ : average load; φ : average latency (in ms); ψ : ratio of dropped requests. 19

Scalable to Workload on Exodus ISP network Proactive: No service drops due to load balancing capability 20

Scalable to Workload on Exodus ISP network Lower latency because only edge routers execute services Heavy Tail proves the success of load balancing in the network 21

Passive Responsiveness to Jitters n1 Simple line topology: client n1 n2 server. n2 Jitters (6λ arrival for 10ms) are injected at time 40 ms and 70 ms. Load during jitter period C3PO balances the load on n1 and n2 whereas Passive cannot! C3PO n1 n2 Time 22

Conclusion We studied two control strategies (Passive and Proactive). Based on the Proactive control, we proposed a fully distributed, low complexity, and responsive load controller to avoid potential computation congestions when executing in-network services. Our results showed that the proposed solution C3PO can effectively take advantage of available resources in a neighbourhood to balance the service load and further reduce service latency and request drop rate. 23

Thank you. Questions? For more information: Liang Wang liang.wang@cl.cam.ac.uk 24