Supporting Overcommitted Virtual Machines through Hardware Spin Detection
#1

Abstract—Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gang scheduling a guest OS's virtual processors (VCPUs) to avoid OS synchronization overhead. However, gang scheduling is infeasible for some application domains, and is inflexible in other domains. In an overcommitted environment, an individual guest OS has more VCPUs than available physical processors (PCPUs), precluding the use of gang scheduling. In such an environment, we demonstrate a more than two-fold increase in application runtime when transparently virtualizing a chip-multiprocessor's cores. To combat this problem, we propose a hardware technique to detect when a VCPU is wasting CPU cycles, and preempt that VCPU to run a different, more productive VCPU. Our technique can dramatically reduce cycles wasted on OS synchronization, without requiring any semantic information from the software. We then present a server consolidation case study to demonstrate the potential of more flexible scheduling policies enabled by our technique. We propose one such policy that logically partitions the CMP cores between guest VMs. This policy increases throughput by 10-25 percent for consolidated server workloads due to improved cache locality and core utilization.
projects9.com
Phone : +91-9618855666
+91-8008855666
Email : projects[at]projects9.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: spin protocol, spin kkl**agement system with source code torrent vb6, spin securty protocol for sensor networks, mexican gang slang, presentation topics on virtual machines jailbreak, taylor gang, spin kkl,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,823 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  Reconfigurable Virtual Keyboard seminar class 5 2,071 30-11-2015, 02:30 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,129 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,971 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,718 27-01-2015, 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,661 04-09-2014, 11:31 PM
Last Post: Charlescic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,880 22-07-2013, 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 7,587 24-06-2013, 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,271 26-04-2013, 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,478 17-04-2013, 11:37 PM
Last Post: [email protected]

Forum Jump: