scispace - formally typeset
Open AccessProceedings ArticleDOI

Enforcing performance isolation across virtual machines in Xen

TLDR
The design and evaluation of a set of primitives implemented in Xen to address performance isolation across virtual machines in Xen are presented and it is indicated that these mechanisms effectively enforce performance isolation for a variety of workloads and configurations.
Abstract
Virtual machines (VMs) have recently emerged as the basis for allocating resources in enterprise settings and hosting centers. One benefit of VMs in these environments is the ability to multiplex several operating systems on hardware based on dynamically changing system characteristics. However, such multiplexing must often be done while observing per-VM performance guarantees or service level agreements. Thus, one important requirement in this environment is effective performance isolation among VMs. In this paper, we address performance isolation across virtual machines in Xen [1]. For instance, while Xen can allocate fixed shares of CPU among competing VMs, it does not currently account for work done on behalf of individual VMs in device drivers. Thus, the behavior of one VM can negatively impact resources available to other VMs even if appropriate per-VM resource limits are in place.In this paper, we present the design and evaluation of a set of primitives implemented in Xen to address this issue. First, XenMon accurately measures per-VM resource consumption, including work done on behalf of a particular VM in Xen's driver domains. Next, our SEDF-DC scheduler accounts for aggregate VM resource consumption in allocating CPU. Finally, ShareGuard limits the total amount of resources consumed in privileged and driver domains based on administrator-specified limits. Our performance evaluation indicates that our mechanisms effectively enforce performance isolation for a variety of workloads and configurations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article

Black-box and gray-box strategies for virtual machine migration

TL;DR: This work presents Sandpiper, a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources and initiating the necessary migrations, and implements a black- box approach that is fully OS- and application-agnostic and a gray-box approach that exploits OS-and- application-level statistics.
Proceedings ArticleDOI

Automated control of multiple virtualized resources

TL;DR: Experimental evaluation with RUBiS and TPC-W benchmarks along with production-trace-driven workloads indicates that AutoControl can detect and mitigate CPU and disk I/O bottlenecks that occur over time and across multiple nodes by allocating each resource accordingly.
Proceedings ArticleDOI

Scheduling I/O in virtual machine monitors

TL;DR: This paper is the first to study the impact of the VMM scheduler on performance using multiple guest domains concurrently running different types of applications, and offers insight into the key problems in VMM scheduling for I/O and motivates future innovation in this area.
Journal ArticleDOI

Comparison of the three CPU schedulers in Xen

TL;DR: This work uses the open source Xen virtual machine monitor to perform a comparative evaluation of three different CPU schedulers for virtual machines and analyzes the impact of the choice of scheduler and its parameters on application performance, and discusses challenges in estimating the application resource requirements in virtualized environments.
Proceedings ArticleDOI

An Analysis of Performance Interference Effects in Virtual Environments

TL;DR: This paper identifies clusters of applications that generate certain types of performance interference and develops mathematical models to predict the performance of a new application from its workload characteristics, able to predict performance with average error.
References
More filters
Journal ArticleDOI

Xen and the art of virtualization

TL;DR: Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacrificing either performance or functionality, considerably outperform competing commercial and freely available solutions.
Journal ArticleDOI

Memory resource management in VMware ESX server

TL;DR: Several novel ESX Server mechanisms and policies for managing memory are introduced, including a ballooning technique that reclaims the pages considered least valuable by the operating system running in a virtual machine, and an idle memory tax that achieves efficient memory utilization.
Proceedings ArticleDOI

Exokernel: an operating system architecture for application-level resource management

TL;DR: The prototype exokernel system implemented here is at least five times faster on operations such as exception dispatching and interprocess communication, and allows applications to control machine resources in ways not possible in traditional operating systems.
Journal ArticleDOI

PlanetLab: an overlay testbed for broad-coverage services

TL;DR: This paper discribes the initial implementation of PlanetLab, including the mechanisms used to impelment virtualization, and the collection of core services used to manage PlanetLab.
Journal ArticleDOI

On "Software engineering"

TL;DR: The software engineering baccalaureate program consists of a rigorous curriculum of science, math, computer science, and software engineering courses.
Related Papers (5)