Sie sind auf Seite 1von 7

2015 IEEE 54th Annual Conference on Decision and Control (CDC)

December 15-18, 2015. Osaka, Japan

Performance Optimization and Regulation for Multitier Servers


José Marcio Luna, Chaouki T. Abdallah, and Gregory L. Heileman

Abstract— In this paper we present a novel approach to


optimize and regulate performance in a multitier server. By
using a queueing network model, we optimize the values of
the mean service rates at each tier in the server by applying
randomized algorithms based on statistical learning theory.
After the optimization process is carried out, an IPA algorithm
is implemented to regulate the throughput of the system to the
calculated optimal reference value in a closed loop. The case
study of a server with three tiers is simulated to validate our
approach.

I. INTRODUCTION
Common Internet services such as, e-mail, online retails,
Fig. 1. Multitier server in series.
news and e-commerce are based on client-server architec-
tures where multiple clients access an online server con-
currently. The dynamics of these services are difficult to
a Presentation tier which usually carries out the HTTP
model because of the randomness induced by the event-
tasks, an Application tier that implements web server and
based interactions between clients and servers, as well as the
logic associated with generating dynamic web content, (e.g.,
number of clients accessing the system and sharing the web
Java enterprise server), and a Data tier which implements a
resources. Server unavailability and thrashing are undesired
database server. In this case the MPL parameter is usually
behaviors directly related to variations in heavy workloads
defined for each tier, and the contention control is carried out
usually present in these systems. Admission control is a com-
between tiers, therefore, every tier is able to drop requests
mon practice to improve the availability of Internet services
from its predecessor once its MPL has been reached.
[1]. It consists of limiting the number of clients of the server
Mathematical modeling is a powerful tool to optimize,
by defining a Multi-Programming Level (MPL) parameter.
regulate and predict performance of systems with dynamic
The MPL is a quantity that defines the maximum number of
behavior. Linear differential and difference equations to
requests that may be processed by the server. Whenever a
describe multitier server behavior were proposed in [3].
server reaches its concurrency limit, the subsequent requests
However, the dynamics of multitier servers are intrinsically
are dropped generating an error message and activating a
nonlinear [4], which makes the linear models limited for an
timeout mechanism that allows the reissue of the request
accurate analysis of the system. Furthermore, computing sys-
for a number of times before the request is either processed
tems such as the multitier server, are event-based rather than
or finally abandoned. This approach is mainly supported
time-based, which makes the utilization of time-dependent
by heuristics, trial and error and ad-hoc tuning instead of
differential equations not entirely suitable. Discrete Event
formal theoretical concepts. This raises concerns about its
System (DES) models may provide an accurate description
lack of optimality since it is proven to have a strong effect on
of the behavior of multitier servers [5], [6]. For some
the quality of service (QoS), server performance and server
real-time applications, such as video streaming and remote
availability [1], [2].
monitoring, being able to improve the predictability of the
Internet applications employ multitier architectures dis-
system’s behavior is important to get a reliable estimate of
tributed on a cluster of servers. Each tier provides a specific
performance measures of the system and to guarantee the
functionality which carries out a part of the overall request.
provision of the service at a consistent frequency.
Every tier uses the service provided by its successor and
Our proposed regulation approach provides an indirect
provides a service to its predecessor in order to process
way to reduce power while guaranteeing average perfor-
the overall request following the layout illustrated in Fig.
mance. It may potentially improve the predictability of multi-
1. Multitier servers may have as many tiers as it is required.
tier servers. Although the main drawback of DES approaches
However, a typical server consists of three tiers namely,
is the complexity of the model calibration process and of
J. M Luna is with the Department of Computer and Informa- their mathematical analysis [7], Infinitesimal Perturbation
tion Science, University of Pennsylvania, Philadelphia, PA 19104, USA Analysis (IPA) estimators have proven rather easy to imple-
joseluna@seas.upenn.edu ment. However, the price to pay for this “easiness” of im-
C. T. Abdallah & G.L. Heileman are with the Department of Electrical
and Computer Engineering, University of New Mexico, Albuquerque, NM plementation is the difficulty of carrying out rigorous math-
87131, USA {chaouki,heileman}@unm.edu ematical analyses, making it possible only for simple cases.

978-1-4799-7886-1/15/$31.00 ©2015 IEEE 1026


Guaranteeing the unbiasedness of IPA estimates in fairly
complex systems is still an open problem. These limitations
have hindered IPA’s further development and raised questions
about its applicability [8]. Experimental evidence and current
work in the area [8], [9], suggested that unbiasedness may
not be a necessary condition for the successful application of
optimization and control algorithms in practical applications.
In fact, such evidence indicates that low-complexity estima-
tors with bounded bias rather than unbiased estimators may
be enough to guarantee the applicability of IPA in complex
event-based automata. Urgaonkar et. al., present and validate
an analytical model that captures the dynamics of multitier
servers [3]. By restricting the aforementioned model to be a
Fig. 2. Model of a multitier server.
Jackson-like network, we propose to use mathematical tools
such as sensitivity analysis and statistical learning theory to
optimize and regulate performance in these servers. To the
best of the author’s knowledge, no existing solution has been to Qi−1 with probability 1 − pi . Notice that the last tier
proposed towards this goal. QR returns all its requests to queue QR−1 and the first tier
This paper is organized as follows: Section II, explains Q1 completes its request every time there is a return to the
in detail the multitier model based on queueing network preceding stage Q0 .
proposed in [3]. Section III, presents the mathematical The first stage of the model, labeled Q0 , consists of
conditions, definitions and assumptions that guarantee the an infinite server queueing system which incorporates the
applicability of IPA in the regulation and optimization of per- session-based nature of the Internet workload. Every time
formance in multitier servers. We introduce some additional an Internet session is open, several requests are generated.
modeling assumptions to guarantee unbiased IPA estimates. This is modeled by assuming sequential requests at Q1 that
Section IV, describes the sensitivity analysis carried out over start traveling back and forth between the tiers as required
the queue network and how this result allows the regulation by the system until the overall request is processed and then
of throughput in the multitier server. We present an algorithm it returns to Q0 . The processed request spends a so-called
to regulate throughput for the particular case of servers with think time at Q0 and after that, the following request of the
three tiers. In Section V, we incorporate an open-loop stage same session enters the queueing network.
to optimize the configuration of the multitier servers prior The think time is denoted by the random variable Y with
to the regulation process by using an statistical learning E{Y } = ρ1 . The random variable representing the service
approach. In Section VI, we present a case study simulation time of the i-th tier is denoted Zi with E{Zi } = µ1i ,
to minimize mean service rates while keeping the throughput therefore, ρ represents the mean think rate and µi the mean
of the multitier server regulated. In Section VII, we present service rate of the i-th tier. The mean service rate µi provides
our conclusions. the average number of requests that are served in the i-th tier
per unit of time, and is therefore an average measure of the
II. A M ULTITIER M ODEL BASED ON Q UEUE N ETWORKS operation frequency of every tier. The fact that it is modeled
The following model for a multitier server was proposed as a random variable conveys a) the idea that requests may
in [3]. Let us assume an application with R tiers modeled be processed randomly in several cycles by the tiers, and b)
by a closed queueing network interconnected as shown in the randomness induced in the tiers given the multiple open
Fig. 2. Each queue Qi with i = 1, . . . , R represents a tier. sessions being processed at every tier.
The system has a constant population of N requests moving In the model proposed in [3], the authors assumed product
through the queues, such that the network is able to process form closed queueing networks to be able to calculate
a maximum number of N concurrent requests, and once response times through the mean-value analysis (MVA)
a request is processed, a new request enters the system in algorithm [10]. A broad class of queue networks are known
order to replace the processed one. When a request arrives to have product form solutions which is convenient for
to tier Qi , it activates one or more requests at tier Qi+1 . modeling a wide variety of multitier servers. Our goal is to
In real Internet applications, a request may trigger parallel tune the mean service rate in the Presentation tier, namely, µ1
requests in some of the tiers, (e.g., a keyword in an online so that, we are able to regulate the throughput to a reference
store that searches several catalogs at the same time [3]). value defined a priori by implementing a regulator based on
In this approach, parallel requests are modeled as sequential IPA. In order to indirectly reduce power consumption, we
requests that visit the tiers multiple times. Therefore, there propose an open-loop optimizer which reduces the values
are transitions from tier Qi to Qi−1 that allow every request of the parameters µi with i = 1, . . . , R, which are directly
to make multiple visits to every tier when processing the proportional to the frequency of the server processors, thus,
overall request. After a request has been processed by tier by Dynamic Voltage and Frequency Scaling (DVFS) the
Qi , it either proceeds to Qi+1 with probability pi or returns power consumed by the server is reduced. In Fig. 3, we

1027
A. Commuting Condition
Let p(y|x, α) denote the probability that the queueing
network goes to state y after the feasible event α is observed
while being at state x. Now, we present the mathematical
definition of CC introduced in [11].
Definition 1: Let us consider a queue network whose state
space is denoted by X and whose event set is denoted by
Ξ. Let us define Γ(x) ⊂ Ξ as the set of feasible events
when the current state is x ∈ X . Now, let x, y, z1 ∈ X and
α, β ∈ Γ(x) such that p(z1 |x, α) · p(y|z1 , β) > 0.
Then, for some z2 ∈ X , we get that
p(z2 |x, β) = p(y|z1 , β) and p(y|z2 , α) = p(z1 |x, α).
Moreover, for any x, z1 , z2 ∈ X such that
p(z1 |x, α) = p(z2 |x, α) > 0, we get z1 = z2 .
The CC is not necessarily fulfilled by all product form
Fig. 3. Open-loop optimizer and closed-loop regulator in the multitier server queueing networks. However, there is a subset of such
problem. networks that has been proven to satisfy the CC. These
networks are known as Jackson-like networks.

present a block diagram illustrating the open-loop optimizer B. Jackson-like Networks [11]
and the closed-loop regulator. Definition 2: Jackson-like networks are open or closed
queueing networks such that, every queue has one server
III. IPA FOR P ERFORMANCE R EGULATION with infinite queueing capacity and each queue implements a
The product form closed queueing network assumption FCFS queue discipline. Furthermore, these networks process
specified in [3] is key to guarantee that the MVA algorithm a single class of customers and the routing of costumers
is applied to estimate performance measures of this queueing between queues is probabilistic.
network. Since this is a closed queueing network formed
C. Event Time Derivatives
by a set of R interconnected queues, the stationary state
probability has the form p(x1 , . . . , xR ) = C(N1
QR
f i (x i ),
In order to derive expressions for event time derivatives we
) i=1
where fi (xi ) is a function of the state xi of the i-th queue proceed to make the following assumptions based on [11].
and C(N ) is a normalizing constant dependent on the request Assumption 1: Let us denote the lifetime of the k-th
population size N . One of the advantages of this particular occurrence of the event α ∈ Ξ by Vα,k (ψ), where Ξ is the
model is its generality, since product form networks are set of feasible events. Let us assume that for all event α,
not necessarily Markovian in nature. In fact, product form Vα,k (ψ) is almost surely continuously differentiable in ψ,
networks such as the BCMP network [11] may have several with k = 1, 2, . . ..
customer classes as well as a variety of possible queuing Assumption 2: For all event α ∈ Ξ, with cumulative
disciplines such as first-come-first-served (FCFS), processor distribution function (cdf) Fα (x, ψ), with parameter ψ ∈ Ψ
sharing (PS), last-come-first-served (LCFS), and different and x ∈ X . Let us assume that Fα (x, ψ) is continuous in ψ
service time distributions, among other complexities. The and Fα (0, ψ) = 0.
model in [3] was not defined considering sensitivity anal- Given the event α with associated event lifetime distribu-
ysis applications. Therefore, we proceed to determine the tion Fα (x, ψ) with parameter ψ, we can define the lifetimes
sufficient conditions to guarantee the validity of IPA for the as functions of ψ, i.e., Vα,k (ψ). If Assumptions 1 and 2 are
dVα,k
aforementioned model. fulfilled, the derivative dψ may be calculated as,
In this problem, we need to estimate the expectation of dVα,k ∂Fα (x, ψ)/∂ψ

the derivative of a performance function J : Λ × Ψ → R, = − . (2)
¯ dψ ∂Fα (x, ψ)/∂x x=Vα,k
such that, J(ψ) = E {J(λ, ψ)}, where J(λ, ψ) is the sample
function of interest, i.e., Although closed expressions can be calculated for some
¯   probability distributions using (2), some expressions can be
dJ(ψ) dJ(λ, ψ)
=E . (1) easily determined by taking advantage of the definition of
dψ dψ scale parameters [11].
where λ ∈ Λ ⊆ Rnλ is a random variable with probability Definition 3: Given a random variable X1 with cdf
distribution function fλ (λ) and λ(1,...,N ) is a multi-sample FX1 (x1 , ψ1 ), where ψ1 ∈ Ψ, we say that ψ1 is a scale
of λ. ψ ∈ Ψ ⊆ Rnψ is a parameter vector. This means parameter if the cdf of ψ1 X1 is independent of ψ1 .
dJ
that the sample derivative is an unbiased estimate of dψ . As an example, the normal distribution has a scale parameter,
First of all, let us analyze the continuity of the sample namely, the standard deviation. In another example, the
function J(λ, ψ). A necessary condition for continuity is the exponential distribution has a scale parameter which is the
commuting condition (CC). inverse of its mean. Based on Definition 3 and (2), it is easy

1028
to prove that if a random variable X1 has scale parameter Moreover, by implementing the probabilistic routing defined
ψ1 then, by p1 , . . . , pR in Fig. 2, this network belongs to the Jackson-
dX1 like networks described by Definition 2, and consequently,
= ψ1 X1 . (3)
dψ1 CC is satisfied.
A general-purpose algorithm for evaluating event time A. Estimation of Throughput
derivatives while a sample path is observed in a General-
Semi-Markov-Process (GSMP) is presented in [11]. We To continue with our development, let us define Tα,M
reproduce it in Algorithm 1. as the time of the M -th occurrence of some event α. The
throughput y of the multitier model is measured at the
Algorithm 1 Event time derivative for stochastic timed output of the first tier, since a departure d10 means a request
automata. has been completed. Consequently, the sample function for
the throughput of the system after M requests have been
If event α is feasible at x0 : ∆α = dV

α
completed is given by,
Else, for all other event α ∈ Ξ : ∆α = 0
1: while Queueing network is in execution do M
y(µ1 ) = , (5)
2: if Event β is observed then Td10,M
3: if Event α is activated with lifetime Vα then where Td10 ,M is the time of the M -th occurrence of the event
4: Calculate dV
dψ using (2)
α
d10 .
5: Calculate ∆α = ∆β + dV dψ
α
Since we want to estimate the derivative of the throughput
6: end if y with respect to the mean service rate of the first tier µ1 ,
7: end if we proceed to calculate dµdy
by applying the chain rule and
1
8: end while we get,  
dy −M dTd10 ,M
= 2 , (6)
dµ1 Td10 ,M dµ1
D. A Sufficient Condition for Unbiasedness
dTd10 ,M
Based on [11], the equality in (1) is enforced by the therefore, all that is left is to estimate dµ1 .
dominated convergence theorem if we can determine a finite
B. Regulation Algorithm
upper bound R, E{R} < ∞ such that J(ψ+∆ψ)−J(ψ) ≤ R.

∆ψ
Following the same approach presented in [8], given a
Assuming that the sample function J(λ, ψ) is continuous
reference value yref and with the quadratic error defined by,
and differentiable, the generalized mean value theorem as-
serts that, e2 = (yref − y)2 , (7)

J(ψ + ∆ψ) − J(ψ)
≤ sup dJ(γ) . the update of the parameter µ1 is carried out through the

(4)
∆ψ dψ
γ∈[a,b] equation,
en−1
Therefore, by calculating bounds for the sample derivatives µ1n = µ1n−1 + K dy(µ ) , (8)
1
dJ(λ,ψ) dµ1
dψ we can assure that (1) is satisfied and the IPA
estimates are unbiased. where K ∈ R is a positive scalar that determines the step-
size of the Newton’s method with n = 1, 2 . . ..
IV. S AMPLE F UNCTION FOR T HROUGHPUT AND ITS
D ERIVATIVE IN M ULTITIER S ERVERS C. Unbiasedness of IPA for Multitier Servers
The model proposed in Section II should be simplified The following corollary, provides us with the sufficient
in order to enforce (1) and to be able to implement the conditions for continuity of the throughput y.
IPA approach for performance regulation. In order to satisfy Corollary 1: If Assumptions 1 and 2, as well as the CC,
Assumptions 1 and 2 it is enough to assume that the are satisfied by the queueing network described in Fig. 2,
service times have an exponential distribution with parameter then the sample function,
µ1 , µ2 , . . . , µR for the queues Q1 , Q2 , . . . , QR respectively. Z Td ,M
10
We assume that the servers in the infinite server queueing Ld10 ,M (ψ) = dt = Td10 ,M ,
system Q0 are identical and their think times occur at a 0

rate ρ according to a Poisson process. This means that the is (almost surely) continuous in ψ for finite Td10 ,M .
think time process at the output of the server Q0 when the Proof: This proof trivially follows from Theorem 11.1
server is hosting a population of n requests from a total of in [11].
N requests in the network, now have the superposition of From Corollary 1, and under the assumptions we have
(N − n) Poisson processes. This is proven to be a Poisson made on the model in Section IV, we have that y given
process with parameter ρ(N − n) [12]. by (5) is continuous. The proof of unbiasedness is out of
Now, let us assume that the queues Q1 , Q2 , . . . , QR the scope of this section, but roughly speaking, by taking
have infinite queueing capacity, implement a FCFS queue advantage of the Markovian nature of our simplified model
dVd10 ,j
discipline and that there is a single class of customers. and assuming that the lifetimes dψ < c < ∞, for some

1029
c ∈ R we should be able to carry out a case-by-case analysis Algorithm 2 Event time derivative for three-tier servers w.r.t
of the states of the network [11]. It turns out that all possible µ1 .
dVa
combinations of the perturbation propagation will be upper Initial state x1 = x2 = x3 = 0, then event a is feasible and ∆a = dµ1 =0
Events d10 , d12 , d21 , d23 and d32 are infeasible,
bounded by polynomial combinations of c and M which are then, ∆d10 = ∆d12 = ∆d21 = ∆d23 = ∆d32 = 0
finite. The generalized mean value theorem then implies (4), 1: while Queueing network is in execution do
2: if Event a is observed ∧ x1 = 0 then
allowing us to apply the dominated convergence theorem, dVd
3: ∆d10 = ∆a + dµ10
thus the unbiasedness of the IPA estimates is assured. dVd
1
4: ∆d12 = ∆a + dµ12
1
D. Estimation of Throughput Derivative for Three-tier 5: end if
6: if Event d10 is observed then
Servers 7: ∆a = ∆d10
dVd
8: 10
The model of the three-tier server has the possible events ∆d10 = ∆d10 + dµ1
dVd
a, d10 , d12 , d21 , d23 and d32 . Notice the presence of the rout- 9: ∆d12 = ∆d10 + dµ1
12

ing probabilities p1 and p2 whose effect becomes apparent 10: end if


11: if Event d12 is observed then
when estimating the event time derivatives. The service times 12: ∆d10 = ∆d12 + dµ10
dVd
1
at every tier are assumed to be exponential, and queues Q1 13: ∆d12 = ∆d12 + dµ12
dVd
1
and Q2 present bifurcations at the output. These bifurcations 14: if x2 = 0 then
have distributions formed by a superposition of exponential 15: ∆d21 = ∆d12
16: ∆d23 = ∆d12
random variables with parameter µ1 and µ2 , and Bernoulli 17: end if
random variables with parameter p1 and p2 . In particular, the 18: end if
19: if Event d21 is observed then
event time derivatives associated with the departure events 20: ∆d23 = ∆d21
at tier Q1 are given by, 21: if x1 = 0 then
dVd
22: ∆d10 = ∆d21 + dµ10
1
dVd10 23: ∆d12 = ∆d21 + dµ12
d dV
= Z1 µ1 (1 − p1 ), (9) 1
dµ1 24: end if
dVd12 25: end if
= Z 1 µ1 p 1 . (10) 26: if Event d23 is observed then
dµ1 27: ∆d21 = ∆d23
28: if x3 = 0 then
This is equivalent to defining the scale parameter associated 29: ∆d32 = ∆d23
with the event d10 as µ1 (1 − p1 ) and the one associated to 30: end if
31: end if
d12 as µ1 p1 . 32: if Event d32 is observed ∧ x2 = 0 then
Therefore, the analysis of the dependencies between life- 33: ∆d21 = ∆d32
34: ∆d23 = ∆d32
times and events should consider the states of each tier. Let us 35: end if
illustrate this idea by studying the perturbation propagation 36: end while
when the parameter µ1 is changed in tier Q1 . Let us assume
that the departure of a request from Q1 to Q2 , namely d12
is observed. Events d12 and d10 are coupled because both
are departures from Q1 and depend on µ1 . Therefore, by V. S TATISTICAL L EARNING FOR O PTIMAL
following Algorithm 1, we have that the perturbation ∆d10 PARAMETERIZATION
dV
is obtained by ∆d10 = ∆d12 + dµd10 1
and ∆d12 is obtained Up to this point, we have been able to guarantee the
dV
by ∆d12 = ∆d12 + dµd12 . However, if x2 = 0 then Q2 regulation of throughput to a reference value yref . However,
1
is receiving a first arrival after an idle time, which means we are interested not only in regulating throughput but also
that the events d21 and d23 are activated. Hence, ∆d21 is in reducing power consumption by reducing the operation
dV
updated by ∆d21 = ∆d12 + dµd21 = ∆d12 and ∆d23 is frequency of the servers. Roughly speaking, since we are
1
dVd23 assuming M/M/1 queues whose arrivals are supplied by
updated by ∆d23 = ∆d12 + dµ1 = ∆d12 . Remember that
dVd21 dVd23 Poisson processes, the departure processes of the queues in
dµ1 = dµ1 = 0 because the service time Z2 depends on the network will be Poisson distributed by Burke’s Theorem
µ2 and not on µ1 . Notice that variations of µ1 in Q1 couples [11]. This implies that for queues Q1 , Q2 and Q3 , their
with the events d21 and d23 in tier Q2 only when the state respective throughputs, namely, y1 , y2 and y3 will be given
x2 = 0. Following similar analyses for all the possible events by,
dTd10 ,M
in the system, we obtain Algorithm 2 to estimate dµ . 
Remark 1: The event time derivatives in Algorithm 2 are
1
λ(N − n) if µ1 > λ(N − n)
y1 = , (12)
calculated using (9) and (10). µ1 otherwise

Remark 2: The perturbation propagation provides an es- µ1 p1 if µ2 > µ1 p1
dT y2 = , (13)
timate of the derivative dµd10 , given by ∆d10 . Hence, based µ2 otherwise
1 
on (6), the estimate of the derivative of the throughput at the µ2 p2 if µ3 > µ2 p2
y3 = . (14)
M -th observation of the event d10 is given by, µ3 otherwise
−M From (12)–(14), we can infer that as long as the mean
ŷ ′ = (∆d10 ) . (11)
Td210 ,M arrival rate parameters, namely, λ(N − n), µ1 p1 and µ2 p2 ,

1030
are less than or equal to their correspondent mean service rate Proof: The proof is provided in [13].
parameters, namely, µ1 , µ2 and µ3 respectively, we should Therefore, given the accuracies ǫ1 and ǫ2 , and the confi-
be able to regulate the throughput of all three queues by dence 1 − δ we are able to determine the minimum number
controlling µ1 . Otherwise, the throughputs are saturated by of random samples M1 and M2 needed to estimate the pa-
a value proportional to one of the mean service rates µi with rameters ψ that minimize the expectation E (J(λ, ψ)) of the
i = 1, 2, 3. This in turn, implies that there is not a unique performance function J(λ, ψ). The randomized algorithm is
triplet (µ1 , µ2 , µ3 ) to regulate the throughput to a certain summarized in Algorithm 3. Note that the randomized algo-
value. Therefore, we propose an optimization approach to rithm might provide an erroneous estimate with probability
reduce the values of the triplet of mean service rate while at most δ.
guaranteeing the regulation of the throughput of the system.
This optimization step is carried out in open-loop. We Algorithm 3 Performance Optimization [13]
take advantage of the direct relation between power and Define: J : Λ × Ψ → [0, 1]
throughput making use of DVFS. The consumed power is Define: ǫ1 , ǫ2 , δ ∈ (0, 1)
ln 2δ
directly proportional to the frequency of operation and this, 1: M2 = ⊲ According to Corollary 2
ln 1 1−ǫ2
in turn, is directly proportional to the mean service rate µi . ln
4M2

The main goal is to minimize the mean service rates µi so 2: M1 = 2ǫ2δ


1
that the regulation error (7) is minimized on average. 3: ψ = randSamples(M1) ⊲ Draw M1 samples of ψ
4: λ = randSamples(M2) ⊲ Draw
P M12 samples of λ
A. Sample Complexity 5: return ψ̂ M1 M2 = arg min M11 M k=0 J(λ (k)
, ψ (i)
)
i=1,...,M2
One of the main tools supporting this technique is tail
inequalities which consists of closed mathematical expres-
sions that bound the probability that random variables with B. Performance Function
no compact support take values in the tail of the distribution,
i.e., far from the mean [12] e.g., Markov’s and Chebyshev’s Let us assume that we have a set of R tiers in a multitier
inequalities. Next, we introduce mathematical results to processor. The throughput of the system, namely, y is given
support the implementation of our probabilistic resource by (5) which, as explained above, depends on the output of
optimization. the tier Q1 .
As before, let us consider the performance function Let us define the parameter set
J : Λ × Ψ → [0, 1]. where λ ∈ Λ ⊆ Rnλ and Ψ = ψ ∈ RR : ψ = (µ1 , . . . , µR ) , which consists
ψ ∈ Ψ ⊆ Rnψ . of the vector containing the mean service rates of all tiers.
We are interested in providing statements based on finite Based on hardware considerations we determine the finite
sample bounds. A randomized algorithm aims at estimating bounds for the parameters µk , such that, µk ∈ [µkmin , µkmax ],
µ −µkmin
a probability of fulfillment of a given performance specifi- with k = 1, 2, . . . , R. Thus, we define, µ̄k = µk k −µ kmin
, so
max

cation. that µ̄k ∈ [0, 1]. Similarly, let us assume that we can calculate
In general, the exact calculation of the expected value finite bounds for e in (7), such that e ∈ [emin, emax ], so we
e−emin
E (J(λ, ψ)) remains computationally demanding there- define ē = emax −emin ∈ [0, 1].
fore, we proceed Pto calculate the empirical version, Now, let us define the random sample λ = y ∈ Λ ⊂ R
N
ÊN (J(λ, ψ)) = N1 i=1 J(λ(i) , ψ). and the performance function,
With the aforementioned elements in mind, we present the R
X
following result introduced in [13]: J(λ, ψ) = J = αk µ̄k + βē, (17)
Corollary 2: Given the empirical probable parameter vec- k=1
tor, where αk , β ∈ R+ are chosen so that J : Λ × Ψ → [0, 1].
ψ̂ M1 M2 = arg min ÊM1 (J(λ, ψ (i) )), By minimizing (17), we minimize the mean service rates µi
i=1,...,M2
while minimizing the throughput error e. Later on, the IPA
and the performance function J : Λ × Ψ → [0, 1], where regulator will make sure that e → 0.
λ ∈ Λ, and ψ ∈ Ψ. For some given ǫ1 , ǫ2 , δ ∈ (0, 1), let,
VI. S IMULATION R ESULTS
ln δ2 To validate our approach we carried out a simulation of
M2 ≥ 1 , (15)
ln 1−ǫ 2 a queueing network modeling the three-tier server using
and Matlab R
. For this simulation we assume a set of N = 100
ln 4M 2 concurrent requests in the system, a mean think time ρ1 =
δ
M1 ≥ 2 , (16) 33 31 s and nominal probabilities p1 = p2 = 21 . Our goal is
2ǫ1
to regulate the throughput of the system to a reference value
then, yref = 3 requests/s while minimizing the mean service rates
n o

PR E (J(λ, ψ)) < ÊM1 J(λ, ψ M1 M2 ) −ǫ1 ≤ ǫ2 , µ1 , µ2 , µ3 ∈ [1, 50] ⊂ R with accuracy ǫ1 = ǫ2 = ǫ = 0.02
1
and confidence 1 − δ = 0.98. We have chosen αk = 30 with
with probability at least 1 − δ. i = 1, 2, 3 and β = 0.9 in (17). Furthermore K = 0.1 in (8).

1031
VII. C ONCLUSIONS
3.5
We have presented an approach that optimizes and reg-
ulates performance in a multitier server. Given a reference
3
value for the throughput, we optimize the values of the mean
service rates at each tier in the server using statistical learning
y (request/s)

theory. This parameter is directly proportional to the opera-


tion frequencies of the tiers, and therefore, by using DVFS
2.5
we are able to indirectly decrease power consumption while
satisfying throughput requirements. After the optimization
process is carried out, an IPA algorithm is implemented to
2 regulate the throughput of the system to the reference value
p1=p2=0.5 in a closed loop.
p1=0.6, p2=0.4 We validated our results by carrying out the simulation
1.5 of a three tier server in Matlab R
. The system is able to
0 0.5 1 1.5 2
Time (s) 4 calculate the optimal mean service rate parameters in all
x 10
three servers for the given accuracy and confidence. The IPA-
based regulator keeps the throughput regulated under small
Fig. 4. Plot of regulated throughput for a three-tier server.
variations of the routing probabilities.
In order to eliminate the need for exponential distributions
30 on the queues and closed-form solutions, our future research
p1=p2=0.5 will explore the computation of IPA derivatives using con-
p1=0.6, p2=0.4 tinuous flow models by assuming a specific distribution of
25
the service time.
20 R EFERENCES
µ1 (request/s)

[1] L. Malrait, “Qos-oriented control of server systems,” ACM SIGOPS


15 Operating Systems Review, vol. 44, no. 3, pp. 59–64, July 2010.
[2] C. Lu, X. Wang, and X. Koutsoukos, “Feedback utilization control in
distributed real-time systems with end-to-end tasks,” IEEE. Trans. on
10 Paraller and Dist. Sys., vol. 16, no. 6, pp. 560–561, June 2005.
[3] B. Urgaonkar, G. Pacifi, P. Shenoy, M. Spreitzer, and A. Tantawi,
“Analytic modeling of multitier internet applications,” ACM Trans. on
5 the Web, vol. 1, no. 1, May 2007.
[4] S. Parekh, N. Gandhi, J. Hellerstein, D. Tilbury, T. Jayram, and
J. Bigus, “Using control theory to achieve service level objectives in
0 performance management,” Real-Time Systems, vol. 23, no. 1-2, pp.
0 0.5 1 1.5 2
Time (s) 4 127–141, 2002.
x 10 [5] S. Ranjan, J. Rolia, H. Fu, and E. Knightly, “Qos-driven server
migration for internet data centers,” in IEEE International Workshop
on Quality of Service. IEEE, 2002, pp. 3–12.
Fig. 5. Plot of the controlled parameter µ1 for a three-tier server.
[6] D. Villela, P. Pradhan, and D. Rubenstein, “Provisioning servers in
the application tier for e-commerce systems,” ACM Trans. on Internet
Technology (TOIT), vol. 7, no. 1, p. 7, 2007.
[7] A. Robertsson, B. Wittenmark, M. Kihl, and M. Andersson, “Ad-
For the given values of ǫ and δ and using Algorithm 3 mission control for web server systems-design and experimental
we obtain that M1 = 228 values of the parameter triplet evaluation,” in IEEE Conf. on Decision and Control, CDC’04, vol. 1.
(µ1 , µ2 , µ3 ) should be evaluated. Furthermore, per each IEEE, 2004, pp. 531–536.
[8] N. Almoosa, W. Song, Y. S. Yalamanchili, and Y. Wardi, “Throughput
evaluated parameter triplet, M2 = 13, 410 samples should be regulation in multicore processors via ipa,” in Proc. of American Ctrl.
observed. After running Algorithm 3 the system calculates Conf., Montreal, June 2012.
the following mean service rates µ∗1 = 2.4262, µ∗2 = 8.3696, [9] C. G. Cassandras, Y. Wardi, B. Melamed, G. Sun, and C. G. Payan-
iotou, “Perturbation analysis for on-line control and optimization of
and µ∗3 = 28.1239 request/s. stochastic fluid models,” IEEE Trans. on Autom. Ctrl, vol. AC-47,
In Fig. 4 we show the transient behavior of the regulated no. 8, pp. 1234–1248, 2002.
throughput. The blue line with circular markers shows the [10] M. Reiser and S. S. Lavenberg, “Mean-value analysis of closed
multichain queuing networks,” Journal of the ACM (JACM), vol. 27,
regulation applied to the model with routing probabilities no. 2, pp. 313–322, 1980.
p1 = p2 = 0.5, i.e., the same used for the optimization. [11] C. G. Cassandras and S. Lafortune, Introduction to Discrete Event
The green line with triangular markers shows the regulation Systems, 2nd ed. New York: Springer, 2008.
[12] H. Stark and J. W. Woods, Probability and random processes with
when the routing probabilities are perturbed so that their applications to signal processing. Upper Saddle River, N.J. Prentice
value changed to p1 = 0.6 and p2 = 0.4. Notice that even Hall, 2002.
in the perturbed case the system manages to stay regulated. [13] R. Tempo, G. Calafiore, and F. Dabbene, Randomized Algorithms for
Analysis and Control of Uncertain Systems, with Applications, 2nd ed.
However, regulating the perturbed system requires a higher London: Springer-Verlag, 2013.
mean service rate µ1 as illustrated in Fig. 5, which might
imply more power consumption in tier Q1 .

1032

Das könnte Ihnen auch gefallen