The present invention generally relates to assignment of memory resources, and more particularly to a method for coordinating cache and memory reservation in a computerized system to ensure quality of service (QoS) by avoiding interferences of applications on cache, memory and/or memory controller.
A cache is used to speed up data transfer and may be either temporary or permanent. Memory caches are in every computer to speed up instruction execution and data retrieval and updating. These temporary caches serve as staging areas, and their contents are constantly changing. A memory cache, or “CPU cache,” is a memory bank that bridges main memory and the central processing unit (CPU). A memory cache is faster than main memory and allows instructions to be executed and data to be read and written at higher speed. Instructions and data are transferred from main memory to the cache in fixed blocks, known as cache “lines.”
In one aspect, the present disclosure refers to a method for coordinating cache and memory reservation in a computerized system. The system includes a cache memory, a memory and a memory controller. A set of applications interacts with the memory through the cache memory and a plurality of memory channels. The method includes dynamically partitioning the cache memory and the memory channels in order to handle requests from said applications to said memory controller.
According to a further aspect, a computerized system including a cache memory, a memory and a memory controller is provided. The system is configured to enable a set of applications to interact with the memory through the cache memory and a plurality of memory channels, the system includes a control entity configured to dynamically partition the cache memory and the memory channels in order to handle requests from said applications to said memory controller.
According to a further aspect, a computer program product for coordinating cache and memory reservation in a computerized system is provided. The computer program product includes a computer readable storage medium having program instructions embodied therewith, the program instructions being executable by a processor to cause the processor to execute a method for coordinating cache and memory reservation as indicated above.
The following detailed description, given by way of example and not intended to limit the invention solely thereto, will best be appreciated in conjunction with the accompanying drawings, in which:
The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention. In the drawings, like numbering represents like elements.
Detailed embodiments of the claimed structures and methods are disclosed herein; however, it can be understood that the disclosed embodiments are merely illustrative of the claimed structures and methods that may be embodied in various forms. This invention may, however, be embodied in many different forms and should not be construed as limited to the exemplary embodiments set forth herein. In the description, details of well-known features and techniques may be omitted to avoid unnecessarily obscuring the presented embodiments.
In the interest of not obscuring the presentation of embodiments of the present invention, in the following detailed description, some processing steps or operations that are known in the art may have been combined together for presentation and for illustration purposes and in some instances, may have not been described in detail. In other instances, some processing steps or operations that are known in the art may not be described at all. It should be understood that the following description is rather focused on the distinctive features or elements of various embodiments of the present invention.
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
It is understood in advance that although this disclosure includes a detailed description on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed.
Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
Characteristics are as Follows:
On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
Service Models are as Follows:
Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
Deployment Models are as Follows:
Private cloud: the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises.
Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.
Referring now to
In cloud computing node 10 there is a computer system/server 12, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
Computer system/server 12 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
As shown in
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12, and it includes both volatile and non-volatile media, removable and non-removable media.
System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32. Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected to bus 18 by one or more data media interfaces. As will be further depicted and described below, memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
Program/utility 40, having a set (at least one) of program modules 42, may be stored in memory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
Computer system/server 12 may also communicate with one or more external devices 14 such as a keyboard, a pointing device, a display 24, etc.; one or more devices that enable a user to interact with computer system/server 12; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22. Still yet, computer system/server 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20. As depicted, network adapter 20 communicates with the other components of computer system/server 12 via bus 18. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12. Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
Referring now to
Referring now to
Hardware and software layer 60 includes hardware and software components. Examples of hardware components include mainframes, in one example IBM® zSeries® systems; RISC (Reduced Instruction Set Computer) architecture based servers, in one example IBM pSeries® systems; IBM xSeries® systems; IBM BladeCenter® systems; storage devices; networks and networking components. Examples of software components include network application server software, in one example IBM WebSphere® application server software; and database software, in one example IBM DB2® database software. (IBM, zSeries, pSeries, xSeries, BladeCenter, WebSphere, and DB2 are trademarks of International Business Machines Corporation registered in many jurisdictions worldwide).
Virtualization layer 62 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers; virtual storage; virtual networks, including virtual private networks; virtual applications and operating systems; and virtual clients.
In one example, management layer 64 may provide the functions described below. Resource provisioning provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering and Pricing provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources. User portal provides access to the cloud computing environment for consumers and system administrators. Service level management provides cloud computing resource allocation and management such that required service levels are met. Service Level Agreement (SLA) planning and fulfillment provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
Workloads layer 66 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation; software development and lifecycle management; virtual classroom education delivery; data analytics processing; transaction processing; and memory resource coordination.
Applications having a high demand for memory resources (e.g., in-memory analytics applications) are increasingly being hosted in cloud environments where such applications are executed by virtual machines (VMs). However, some of those applications are sensitive to interference on system resources, specifically cache, memory bandwidth, or both, meaning performance degrades when applications are co-located in the cloud.
Memory bandwidth may be limited because the memory controller or memory channels coupling the cache with memory (specifically RAM) form bottlenecks. Specifically, when applications are hosted in a cloud environment, such bottlenecks may occur because of contention of applications on cache space, memory bandwidth or both. So, sufficient cache space and memory bandwidth are key properties for such applications in order to guarantee quality of service (QoS).
Embodiments of the present invention relate to the field of computing, and more particularly to assignment of memory resources. The following described exemplary embodiments provide a system, method, and computer program product to, among other things, coordinate cache and memory reservation in a computerized system to ensure QoS by avoiding interferences of applications on cache, memory and/or memory controller. Therefore, the present embodiment has the capacity to improve the technical field of assignment of memory resources by introducing reservations to guarantee QoS for latency-critical applications.
The concept may include three levels of reservation which are based on current application usage. By appropriate coordination of such levels of reservation, improved performance for latency critical applications is achieved. The levels of reservation may include: memory channel partitioning, memory controller request scheduling (i.e. assigning different priorities to memory controller requests of applications) and cache partitioning, specifically last level cache (LLC) partitioning. The cache partitioning and memory controller request scheduling may be coordinated together, i.e. said LLC partitioning has direct influence on the memory controller request scheduling. For example, LLC partitioning has direct influence on the priorities assigned to the memory controller requests of the respective applications.
One embodiment by which reservations to guarantee QoS for latency-critical applications may be introduced is described in detailed below by referring to the accompanying drawings in
Referring now to
The system 200 comprises a host 210, on which multiple VMs 220, 221, 222, 223 are running on. However, the present invention should not be understood as only being applicable in virtualized computerized systems. The basic idea of the present invention may also be applicable on non-virtualized multi-processor environments where multiple different applications are using common memory resources (cache memory, memory channels, memory etc.).
In the present embodiment, on VMs 220, 221 (VM-1, VM-2) latency-critical services (applications) are running, whereas VMs 222, 223 (VM-3, VM-4) run non-critical services (applications). The VMs 220, 221, 222, 223 communicate with cache memory 230. The cache memory 230 may be LLC. In addition, multiple memory channels 240, 241, 242 are provided which enable the VMs 220, 221, 222, 223 to communicate with memory entities 250, 251, 252 (e.g. main memory entities). The system 200 may further include a memory controller 260 adapted to control memory access to the memory entities 250, 251, 252 based on memory requests provided from the VMs 220, 221, 222, 223 to the memory controller 260. In such system 200, different sources of contention may exist. On the one hand, LLC contention may occur, i.e. different applications use the same cache section thereby causing cache interference. Such applications may be referred to as “cache-bound”, i.e. cache is limiting the application's performance. On the other hand, memory bandwidth available for the respective application may be a limiting factor. Memory bandwidth may be limited because of memory channel contention or memory controller contention. Such applications may be referred to as “bandwidth-bound”, i.e. memory bandwidth is limiting the application's performance.
Referring now to
More specifically, the control entity 310 may receive information regarding cache misses (i.e. requests for data which are currently not included in the cache, respectively, unsuccessful cache references), cache access rate (i.e. cache accesses per time unit) and/or memory bandwidth usage of a certain application/VM. Based on said information it is possible for the control entity 310 to determine the current memory requirements of the respective application/VM and orchestrate the usage of memory resources of all applications/VMs depending on the current memory requirements in order to reduce application interferences due to memory resource bottlenecks.
Based on the received resource usage information, the control entity 310 is able to establish coordinating information which controls the usage of memory resources by the respective applications/VMs. By coordinating the information, the control entity 310 may control cache partitioning for the respective applications/VMs, define the size of cache partitions, define priorities for memory requests of the respective applications/VMs addressed to the memory controller 260 and control memory channel partitioning/grouping for the respective applications/VMs. The control entity may receive memory resource usage information in a continuous or intermittent way and may provide coordinating information to the system 300 in a continuous or intermittent way in order to change the usage of memory resources by the applications/VMs depending on the current application requirements, as will be described in detail below. In other words, the coordination of information by the control entity 310 may be time-variant information in order to adapt the memory resources reservations to the current application demands.
Referring now to
After partitioning the cache memory 230, the benefit of cache partitioning for the respective application/VM is checked. More specifically, it may be evaluated if the number of cache misses of a certain application/VM decreased because of assigning a cache partition to such application/VM. According to embodiments, it may be evaluated if due to cache partitioning, the cache misses decreased (compared to the situation without cache partitioning) by a certain amount. For example, a threshold value may be defined which is used to determine whether said cache partitioning seems to be reasonable. If the delta of cache misses before cache partitioning and cache misses after cache partitioning is above the threshold value, the application (which is running on VM 220, 221) may be classified as cache-bound, i.e. cache usage before cache partitioning was a limiting factor. Otherwise (i.e. delta of cache misses before cache partitioning and after cache partitioning is below said threshold), the application may be classified as bandwidth-bound, i.e. memory bandwidth is deemed to be the limiting factor.
With continued reference to
In step 3, reservations for memory channels 240, 241, 242 and prioritizations of memory controller requests are introduced. The prioritization may include a memory controller request schedule priority, i.e. the scheduling of memory controller requests is performed based on priorities. Such priorities may be assigned to the applications/VMs depending on the classification if an application/VM is cache-bound, bandwidth-bound or neither of them. Preferably, the highest priority level is assigned to applications/VMs being classified as bandwidth-bound. Thus, applications/VMs with a high memory bandwidth demand are privileged compared to other applications. A medium priority level may be assigned to applications/VMs being classified as cache-bound. The cache-bound applications/VMs may be less prioritized than bandwidth-bound applications/VMs because it is assumed that they will have a lower memory access rate because they benefit more from cache. The lowest priority level may be assigned to applications/VMs corresponding to services which are not critical in the sense of latency. Based on the priority scheme, requests addressed to the memory controller may be scheduled in order to privilege bandwidth-intensive applications/VMs.
In addition, latency critical applications/VMs may be distributed across different memory channels 240, 241, 242. So, in other words, also reservations for certain memory channels 240, 241, 242 may be introduced in order to enable latency critical applications/VMs an improved access to the memory. In a first step, an attempt is being made that a certain memory channel 240, 241, 242 is assigned to each latency critical application/VM (cache-bound and bandwidth-bound). In the present example, three memory channels 240, 241, 242 are available for two latency critical applications/VMs. VM 221 is deemed to be bandwidth-bound, i.e. it is assumed that it will have a higher memory bandwidth demand. Therefore, a higher number of memory channels may be reserved for VM 221 compared to VM 220. In case that the number of available memory channels 240, 241, 242 is lower than the number of latency critical applications/VMs, multiple latency critical applications/VMs have to use a certain memory channel. So, in other words, two or more latency critical applications/VMs are bound to one and the same memory channel. In order to further enhance the distribution of memory resources, a cache-bound and a bandwidth-bound application/VM may be grouped to the same memory channel. As mentioned above, it may be assumed that a bandwidth-bound application/VM may have a higher memory bandwidth demand than a cache-bound application/VM. By grouping cache-bound and bandwidth-bound applications/VMs together on a certain memory channel it may be avoided that multiple bandwidth-bound applications/VM are tied to a certain memory channel thereby causing a bottleneck at said memory channel. As such, in case that the number of available memory channels 240, 241, 242 exceed the number of latency-critical applications/VMs, it is attempted to avoid a grouping of two or more bandwidth-bound applications/VMs to one and the same memory channel, respectively, it is attempted to obtain a mixed grouping of bandwidth-bound and cache-bound applications/VMs at a certain memory channel in a combination such that the aggregate bandwidth usage is the lowest.
Referring now to
Subsequently, based on the classification of a latency-critical application/VM as being cache-bound or bandwidth-bound it is decided whether to retain or discard the cache partition for the respective latency-critical application/VM. The cache partitions may be maintained for the cache-bound applications/VMs and may be removed for the bandwidth-bound applications/VMs (S430). In the following step (S440), memory control request scheduling is introduced based on a priority regime. As mentioned above, different priorities based on which memory control requests are processed are assigned based on the classification of the applications/VMs as being cache-bound, bandwidth-bound or none. The highest priority level may be assigned to bandwidth-bound applications/VMs, a medium priority level may be provided to cache-bound applications/VMs and the lowest priority level may be provided to applications/VMs which are not latency-critical. Finally, latency-critical applications/VMs may be distributed across different memory channels in order to avoid bottlenecks at the memory channels (S450). As previously described, the distribution may be performed such that a memory access of multiple bandwidth-bound applications/VMs via a single memory channel is avoided even in cases when the number of latency-critical applications/VMs exceeds the number of available memory channels.
The previously described steps of forming a memory resource control cycle may be performed iteratively. The cycle may be steadily run through or iterated after termination of a certain time span, e.g. every n seconds, where n is a natural number. As such, the distribution of the memory resources may be dynamically adapted to the current requirements of latency-critical applications/VMs in order to guarantee a certain level of quality of service.
Referring now to
After assigning cache partitions to latency-critical applications/VMs, it is investigated whether the number of cache misses per time unit has been reduced or not (S515). As mentioned above, a threshold value may be defined in order to decide whether the improvement induced by the cache partitioning is significant. If the reduction of cache misses is above the defined threshold, the cache partition is retained (S520) because the application/VM is deemed to be cache-bound. Otherwise, the cache partition is removed (S525) because the application/VM is deemed to be bandwidth-bound.
Depending on retaining/removing the cache partition, the priority of scheduling memory requests is determined. In case of a cache-bound application/VM, the priority level is set to medium (S530), in case of a bandwidth-bound application/VM, the priority level is set to high (S535). After assignment of priorities, it is determined whether the application/VM is a new one or the application/VM has already been monitored in at least one previous cycle (S540). If the application/VM has already been monitored before, a memory channel assignment has already been performed and the current cycle ends for such application/VM. In case of a new application/VM, it is checked whether a free memory channel is available (S545). If so, a free memory channel is assigned to said application/VM in order to avoid memory channel contention (S550). If no free memory channels are available, in case of a cache-bound application/VM, memory accesses of a cache-bound application/VM are preferably handled via a memory channel in which memory accesses of another bandwidth-bound application/VM are transmitted (S555). On the other hand, memory accesses of a bandwidth-bound application/VM are preferably handled via a memory channel in which memory accesses of another cache-bound application/VM are transmitted (S560). Thus, preferably a bandwidth-bound application/VM and a cache-bound application are grouped together at a certain memory channel in order to reduce the risk of memory channel contention.
Therefore, by coordinating cache and memory reservation, available system resources, specifically available memory resources are used in a more effective manner thereby avoiding performance degrades in applications sensitive to interference on memory resources.
Stated differently, as the number of in-memory analytics applications hosted in cloud environments increases, sufficient cache space and memory bandwidth may be delivered by coordinating cache and memory reservation which prevents meaning performance of applications sensitive to interference on cache, memory bandwidth, or both, to be degraded as such applications are co-located in the cloud, thereby providing satisfactory QoS.
According to embodiments of the present disclosure, information regarding resource usage of applications may be gathered and the dynamic partitioning of cache memory and/or memory channels may be performed based on the resource usage information. Thereby, the distribution of system resources, specifically of memory resources may be performed based on current resource usage of applications.
The information regarding resource usage may include cache misses, cache access rate and/or memory bandwidth usage of a certain application. Based on said information, resource usage of a certain application may be investigated in closer detail and the distribution of system resources among multiple applications may be controlled according to the specific resource usage.
The cache memory may be dynamically partitioned based on information regarding cache misses and information regarding cache access rate. For example, based on information regarding the cache access rate of a certain application, the size of a cache memory partition may be determined. Information regarding cache misses, specifically information regarding cache misses before and after cache partitioning may be used to determine whether a certain cache partition should be maintained for a certain application or not.
The partition size of a cache memory partition associated with a certain application is dynamically adapted based on information regarding resource usage, specifically based on the cache access rate of said application. Thereby, the size of cache reserved for a certain application may be adapted according to the current cache usage.
Applications running on the computerized system are classified as being memory-resource sensitive or not memory-resource sensitive. The wording “memory-resource sensitive application” may generally be understood as an application which shows significant degradation of performance in case of limited memory resources. “Memory-resource sensitive application” may also be referred to as “latency-critical application” or “latency-critical service”.
A memory-resource sensitive application is classified as being cache-bound or as being memory bandwidth-bound. By means of said classification, different kinds of applications may be distinguished, namely a first kind of applications which are limited due to a bottleneck of cache space and a second kind of applications which are limited due to a bottleneck of memory bandwidth. The resource distribution may be performed based on said classification information.
The classification (cache-bound or bandwidth-bound) may be established based on a comparison of information indicating cache misses of a certain application before cache memory partitioning and information indicating cache misses of a certain application after cache memory partitioning. In case that cache misses are significantly reduced (e.g. at least by a certain threshold value) due to cache memory partitioning, it may be concluded that introducing cache memory partitioning shows a significant improvement in cache memory usage. Thus, the application seems to have been limited due to a bottleneck of cache space (cache-bound). Otherwise, the application is deemed to be limited due to a bottleneck of memory bandwidth (bandwidth-bound).
An application classified as being cache-bound is associated with a certain cache memory partition and a cache memory partition assigned to an application classified as being bandwidth-bound is discarded. Bandwidth-bound applications may not show a significantly improved performance due to introducing cache memory partitioning because the memory bandwidth forms a performance bottleneck which could not be addressed by cache memory partitioning. As such, a cache memory partition assigned to an application classified as being bandwidth-bound may be removed.
The classification of a memory-resource sensitive application as being cache-bound or bandwidth-bound is dynamically reviewed based on information indicating current cache misses of a certain application. More in detail, the number of cache misses may be monitored in certain intervals in order to decide whether the classification of a memory-resource sensitive application as being cache-bound or bandwidth-bound can uphold or has to be changed. Thereby a dynamic adaption to application requirements may be obtained.
Memory requests provided to the memory controller are prioritized based on the classification of the application as being cache-bound or bandwidth-bound. The classification information may also be indicative for an improved scheduling of controller requests provided to the memory controller. Thus, a prioritization regime may be obtained based on said classification information.
Memory requests of an application being classified as bandwidth-bound are higher prioritized than memory requests of an application being classified as cache-bound. Thereby, the bottleneck due to delayed handling of memory bandwidth intensive applications may be mitigated.
Memory accesses performed by multiple memory-resource sensitive applications are split across different memory channels. Thereby contention of applications due to joint usage of a single memory channel may be reduced.
At least one cache-bound and at least one bandwidth-bound application are associated with a certain memory channel if the number of applications identified as memory-resource sensitive exceed the number of available memory channels. Thereby, memory channel contention may be reduced by bounding memory bandwidth-intensive applications and cache-intensive applications together on a certain memory channel.
Memory resources are assigned to the respective applications based on memory resource usage of the respective application by dynamically assigning cache memory partitions to the respective applications, dynamically assigning memory channel partitions to the respective applications and dynamically assigning priorities to the requests of applications provided to the memory controller. Due to said three levels of reservations/assignments, the quality of service (QoS) of latency-sensitive applications could be guaranteed without unfairly impacting the overall system throughput.
Therefore, dynamically partitioning the cache memory and memory channels may be performed iteratively based on consecutive resource usage refinement loops/cycles. Each resource usage refinement loop comprises the steps of: proportionally allocating cache memory space for said memory-resource sensitive applications based on cache access rate of the respective application; classifying the respective application as cache-bound or bandwidth-bound; removing or retaining the cache memory partition of the respective application depending on the applications classification; assigning priorities to the requests of applications provided to the memory controller based on the applications classification; and distributing at least the memory accesses of bandwidth-bound applications across different memory channels.
In this manner the distribution of the system resources may be dynamically adapted to the current requirements of memory-resource sensitive, respectively latency sensitive applications.
In some embodiments, the applications are distributed across different virtual machines of a virtualized computerized system. Thus, system resources provided in a cloud environment and providing computational resources for multiple memory-resource sensitive, respectively latency sensitive applications can be distributed such that the applications may fulfill certain QoS-guarantees.
The descriptions of the various embodiments of the present invention have been presented for purposes of illustration but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Number | Name | Date | Kind |
---|---|---|---|
6865647 | Olarig | Mar 2005 | B2 |
8314807 | Biswas | Nov 2012 | B2 |
8739159 | Lin | May 2014 | B2 |
8745618 | Lin | Jun 2014 | B2 |
8819687 | Chung | Aug 2014 | B2 |
9336147 | Kotla | May 2016 | B2 |
9396135 | Kavi | Jul 2016 | B2 |
9507731 | Zheng | Nov 2016 | B1 |
9515899 | Vemuri | Dec 2016 | B2 |
10095621 | Birke | Oct 2018 | B1 |
20030196040 | Hosogi | Oct 2003 | A1 |
20110239220 | Gibson | Sep 2011 | A1 |
20110246688 | Vaz | Oct 2011 | A1 |
20160019158 | Palacharla | Jan 2016 | A1 |
20160055082 | Kim | Feb 2016 | A1 |
20160055086 | Fan | Feb 2016 | A1 |
20160342514 | Wang | Nov 2016 | A1 |
20190018774 | Birke | Jan 2019 | A1 |
Entry |
---|
Birke, et al., “Coordination of Cache and Memory Reservation”, U.S. Appl. No. 16/390,334, filed Apr. 22, 2019. |
Cheng et al., “LAP: Loop-Block Aware Inclusion Properties for Energy-Efficient Asymmetric Last Level Caches”, http://isca2016.eecs.umich.edu/wp-content/uploads/2016/07/2A-3.pdf, 49 pages, 2016. |
Disclosed Anonymously, “Dynamic Cache Reservation for Virtual Machine Applications in Cloud”, An IP.com Prior Art Database Technical Disclosure, IP.com No. IPCOM000233167D, IP.com Electronic Publication Date: Nov. 28, 2013, 7 pages. |
Gundu et al., “Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller”, HASP'14, Jun. 15, 2014, Minneapolis, MN, 5 pages. |
Hashemi et al., “Accelerating Dependent Cache Misses with an Enhanced Memory Controller”, Jun. 21, 2016, The University of Texas at Austin, Electrical and Computer Engineering, Cockrell School of Engineering, 15 pages. |
Intel, “Cache Monitoring Technology and Cache Allocation Technology”, Accessed on Jun. 8, 2017, 4 pages. |
Intel, “Intel® 64 and IA-32 Architectures Software Developer's Manual”, vol. 3 (3A, 3B, 3C & 3D): System Programming Guide, Order No. 325384-060US, Sep. 2016, Section 17.16, “Intel® Resource Director Technology (Intel® RDT) Monitoring Features”, pp. 17-42-17-43. |
Kanev et al., “Profiling a warehouse-scale computer”, ISCA'15, Jun. 13-17, 2015, Portland OR, 12 pages. |
Kim et al., “Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior”, Carnegie Mellon University, MICRO-43, 2010, pp. 1-12. |
List of IBM Patents and Patent Applications Treated as Related. Filed Apr. 22, 2019. 2 pages. |
Lo et al., “Heracles: Improving Resource Efficiency at Scale”, ISCA '15, Jun. 13-17, 2015, Portland, OR, USA, 13 pages. |
Mell et al., The NIST Definition of Cloud Computing, National Institute of Standards and Technology, U.S. Department of Commerce, Special Publication 800-145, Sep. 2011, 7 pages. |
Muralidhara et al., “Reducing Memory Interference in Multicore Systems via Application-Aware Memory Channel Partitioning”, MICRO'11 Dec. 3-7 2011, Porto Alegre, Brazil, pp. 1-12. |
Xen, “Intel Platform QoS Technologies”, https://wiki.xenproject.org/wiki/Intel_Platform_QoS_Technologies, Accessed on Jun. 8, 2017, 5 pages. |
Xenbits, “Intel Platform Shared Resource Monitoring/Control in xl”, http://xenbits.xen.org/docs/unstable/misc/xl-psr.html, Accessed on Jun. 8, 2017, 4 pages. |
Number | Date | Country | |
---|---|---|---|
20190243762 A1 | Aug 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15647301 | Jul 2017 | US |
Child | 16390307 | US |