DOC PREVIEW
Berkeley COMPSCI 268 - Resource Allocation

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS 194: Distributed Systems Resource AllocationGoals and ApproachType of ResourcesAllocation ModelsNot in this Lecture…In this Lecture…Two ModelsIntegrated Services ExampleSlide 9Slide 10Slide 11Integrated Services Example: Data PathSlide 13Slide 14Service ClassesHard Real Time: Guaranteed ServicesSoft Real Time: Controlled Load ServiceRole of RSVP in the ArchitectureRSVP Design FeaturesRSVP Basic OperationsRSVP ProtocolPATH and RESV messagesToken Bucket and Arrival CurveHow Is the Token Bucket Used?Traffic Enforcement: ExampleSource Traffic CharacterizationSource Traffic Characterization: ExampleQoS Guarantees: Per-hop ReservationEnd-to-End ReservationWeighted Fair Queueing (WFQ)Fair Rate Computation: Example 1Fair Rate Computation: Example 2Fluid Flow SystemFluid Flow System: Example 1Fluid Flow System: Example 2Implementation In Packet SystemPacket System: Example 1Packet System: Example 2Properties of WFQHierarchical Link Sharing1CS 194: Distributed SystemsResource AllocationScott Shenker and Ion Stoica Computer Science DivisionDepartment of Electrical Engineering and Computer SciencesUniversity of California, BerkeleyBerkeley, CA 94720-17762Goals and ApproachGoal: achieve “predicable” performance (service)Three steps:1) Estimate application’s resource needs (not in this lecture)2) Admission control3) Resource allocation3Type of ResourcesCPU Storage: memory, diskBandwidthDevices (e.g., vide camera, speakers)Others:-File descriptors-Locks -…4Allocation ModelsShared: multiple applications can share the resource -E.g., CPU, memory, bandwidthNon-shared: only one application can use the resource at a time-E.g., devices5Not in this Lecture…How application determine their resource needsHow users “pay” for resources and how they negotiate resourcesDynamic allocation, i.e., application allocates resources as it needs them6In this Lecture…Focus on bandwidth allocation -CPU similar-Storage allocation usually done in fixed chunksAssume application requests all resources at once7Two ModelsIntegrated Services-Fine grained allocation; per-flow allocationDifferentiated services (not in this lecture)-Coarse grained allocationFlow: a stream of packets between two applications or endpoints8Integrated Services Example SenderReceiverAchieve per-flow bandwidth and delay guarantees-Example: guarantee 1MBps and < 100 ms delay to a flow9Integrated Services Example SenderReceiverPerform per-flow admission control10Integrated Services Example SenderReceiverInstall per-flow state11 SenderReceiverInstall per flow stateIntegrated Services Example12Integrated Services Example: Data Path SenderReceiver Per-flow classification13Integrated Services Example: Data Path SenderReceiver Per-flow buffer management14Integrated Services Example SenderReceiver •Per-flow scheduling15Service ClassesMultiple service classesService: contract between network and communication client-End-to-end service-Other service scopes possibleThree common services-Best-effort (“elastic” applications)-Hard real-time (“real-time” applications)-Soft real-time (“tolerant” applications)16Hard Real Time: Guaranteed ServicesService contract-Network to client: guarantee a deterministic upper bound on delay for each packet in a session -Client to network: the session does not send more than it specifiesAlgorithm support-Admission control based on worst-case analysis-Per flow classification/scheduling at routers17Soft Real Time: Controlled Load ServiceService contract:-Network to client: similar performance as an unloaded best-effort network-Client to network: the session does not send more than it specifiesAlgorithm Support-Admission control based on measurement of aggregates-Scheduling for aggregate possible18Role of RSVP in the ArchitectureSignaling protocol for establishing per flow stateCarry resource requests from hosts to routersCollect needed information from routers to hostsAt each hop-Consult admission control and policy module-Set up admission state or informs the requester of failure19RSVP Design FeaturesIP Multicast centric design (not discussed here…)Receiver initiated reservationSoft state inside network20RSVP Basic OperationsSender: sends PATH message via the data delivery path-Set up the path state each router including the address of previous hopReceiver sends RESV message on the reverse path-Specifies the reservation style, QoS desired-Set up the reservation state at each routerThings to notice-Receiver initiated reservation-Decouple routing from reservation-Two types of state: path and reservation21RSVP Protocol Problem: asymmetric routes-You may reserve resources on RS3S5S4S1S, but data travels on SS1S2S3R !Solution: use PATH to remember direct path from S to R, i.e., perform route pinning S1S1S2S2S3S3SSRRS5S5S4S4PATHRESVIP routing22PATH and RESV messagesPATH also specifies -Source traffic characteristics•Use token bucket-Reservation style – specify whether a RESV message will be forwarded to this serverRESV specifies -Queueing delay and bandwidth requirements -Source traffic characteristics (from PATH)-Filter specification, i.e., what senders can use reservation-Based on these routers perform reservation23Token Bucket and Arrival CurveParameters-r – average rate, i.e., rate at which tokens fill the bucket-b – bucket depth-R – maximum link capacity or peak rate (optional parameter)A bit is transmitted only when there is an available tokenArrival curve – maximum number of bits transmitted within an interval of time of size tr bpsb bits <= R bpsregulatortimebitsb*R/(R-r)slope Rslope rArrival curve24How Is the Token Bucket Used?Can be enforced by -End-hosts (e.g., cable modems)-Routers (e.g., ingress routers in a Diffserv domain)Can be used to characterize the traffic sent by an end-host25Traffic Enforcement: Exampler = 100 Kbps; b = 3 Kb; R = 500 Kbps 3KbT = 0 : 1Kb packet arrives(a)2.2KbT = 2ms : packet transmitted b = 3Kb – 1Kb + 2ms*100Kbps = 2.2Kb(b)2.4KbT = 4ms : 3Kb packet arrives(c)3KbT = 10ms : packet needs to wait until enough tokens are in the bucket!(d)0.6KbT = 16ms : packet transmitted(e)26Source Traffic CharacterizationArrival curve – maximum


View Full Document

Berkeley COMPSCI 268 - Resource Allocation

Documents in this Course
Lecture 8

Lecture 8

33 pages

L-17 P2P

L-17 P2P

50 pages

Multicast

Multicast

54 pages

Load more
Download Resource Allocation
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Resource Allocation and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Resource Allocation 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?