时间:2024-07-28
Changming Zhao,Tiejun Wang and Alan Yang
Abstract:In the paper,we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment.In general,the different slices for different task scenarios exist in the same edge layer synchronously.A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity.In the condition,the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment.Based on the slicing and container concept,we propose the resource allocation scheme named Two-Dimension allocation and correlation placement Scheme(TDACP).The scheme divides the resource allocation and management work into three stages in this paper:In the first stage,it designs reasonably strategy to allocate resources to different task slices according to demand.In the second stage,it establishes an equivalent relationship between the virtual machine reserved resource capacity and the Service-Level Agreement(SLA)of the virtual machine in different slices.In the third stage,it designs a placement optimization strategy to schedule the equivalent virtual machines in the physical servers.Thus,it is able to establish a virtual machine placement strategy with high resource utilization efficiency and low time cost.The simulation results indicate that the proposed scheme is able to suppress the problem of uneven resource allocation which is caused by the pure preemptive scheduling strategy.It adjusts the number of equivalent virtual machines based on the SLA range of system parameter,and reduces the SLA probability of physical servers effectively based on resource utilization time sampling series linear.The scheme is able to guarantee resource allocation and management work orderly and efficiently in the edge datacenter slices.
Keywords:Heterogeneous virtual machine,resource allocation,edge computing,slicing.
In the new generation mobile communication system(5G)technology architecture,it is usually separating and offloading the computation-intensive and the energy-intensive segments of running tasks to the edge datacenter in the ultra-dense network[He,Ren,Yu et al.(2019)].Therefore,the resource allocation and management scheme become the key problem to limit the operation efficiency in the edge datacenter virtualization.The conventional virtual resource allocation and management strategies probably results in resource mismatch in the environment of multi-dimensional resources allocation independently.Network slicing is a new task-oriented concept introduced in 5G/B5G technology architecture for the domain of resource allocation and management[Ning,Wang,Huang et al.(2019)].In the concept,it aims to provide dedicated,isolated and reliable services to establish an integrated computing and communication resources at the task granularity.Therefore,it provides a new technical methodology for the virtual resource allocation and management in the edge datacenter[Cui,Gong,Ni et al.(2019);IMT 2020(5G)Promotion Group(2014);Hu,Patel and Sabella(2018)].
Basically,the novel task slicing technology possesses three main technical characteristics,such as virtualization,specialization and isolation.The virtualization refers that the task slices system is necessary to establish on the NFV/SDN infrastructure[Ma,Wen,Wang et al.(2018)].The specialization is implying that each slice is tailored for different service demands.Each slice is assigned for sufficient resources as virtual computing,network bandwidth and service quality[Richart,Baliosian,Serrat et al.(2016);Wen,Feng,Tang et al.(2019);Xiong,Leng,Hu et al.(2019)].The isolation means that arbitrary slices is independently in resource allocation and management operation[Sun,Peng,Mao et al.(2019);Rost,Breitbach,Roreger et al.(2018);Vo,Nguyen,Le et al.(2018)].Therefore,any probable failure in one slice shall be constricted inside itself and less impact for the other slices.
The traditional global resource allocation strategy is operating based on virtual machine granularity.In these allocation strategies,they set several classes of constant virtual machine resource granularities for allocation according to historical statistics and maps the entire tasks to the most appropriate matched virtual machine granularities.Abdullahi researches the allocation scheme with the parameter of virtual machine minimization completing time based on the Service-Level Agreement(SLA)levels[Abdullahi,Ngadi and Dishing(2017)].Garg designs a min-min compromise algorithm to minimize the weighted sum of utilization resources and execution time[Garg,Buyya and Siegel(2010)].Burger studies the virtual machine resource allocation scheme in heterogeneous environments that try to match the dedicated resources virtual machines with offloading tasks in a heterogeneous environment[Burge,Ranganathan and Wiener(2007)].These resource allocation strategies contain the advantage of low execution time cost.And the task resource allocation is independent for the entire virtual machines.In view of these,the resources match with less effectiveness at task granularity for the traditional strategies.Therefore,it is necessary to reconstruct the edge domain data services system by task slices to make the allocation operation task-oriented and logically.But from a global perspective,the resources granularity of virtual machine indicates more heterogeneous where it is deployed in different slices.Based on above,the existing virtual machine resource allocation system is necessary to be improved.
On the other hand,after the virtual machine granularity allocation,the task scheduling is based on the static placement strategy.For example,Tiwari proposes a new scheduling strategy on Rough Sets Theory(RST)[Tiwari,Nagaraju and Mahrishi(2010)].Shen provides a novel resource rent scheduling strategy to prove the resource utilization efficiency by resource reserved and on-demand simultaneously[Shen,Deng and Iosup(2013)].Breitgand formalizes the virtual machine scheduling process as a combination optimization problem[Breitgand,Kutiel and Raz(2010)].In the optimization problem,it takes the SLA parameter of the task as the core variable to structure equations.On the basis of the equations,Breitgand proposes a strategy to solve the minimum resource demand with a given SLA threshold by system.The above strategies take into the SLA factor in the scheduling process.However,the strategies still use the static parameter to establish the model.It might to cause scheduling in inefficiency with high likelihood.Therefore,the scheduling strategy is also necessary to be improved.
In this paper,we propose a novel heterogeneous virtual machines resource allocation scheme based on the virtualization and slicing technologies in the 5G technology architecture.The scheme is named Two-Dimension allocation and correlation placement Scheme(TDACP)and able to divide into three stages.In the first stage,it designs reasonably strategy to allocate resources to different task slices on demand.The strategy is able to constating the resource share of strong demand slices.In the second stage,it establishes an equivalent relationship between the virtual machine reserved resource capacity and the SLA of the virtual machine in different slices.In the proposed equivalent equation,it transforms the original virtual machines to the equivalent virtual machines with the SLA demand.In the third stage,it designs a placement optimization strategy to schedule the equivalent virtual machines in the physical servers.Thus,it is able to establish a virtual machine placement strategy with high resource utilization efficiency and low time cost.
This paper includes five chapters.In the first chapter,we provide the introduce for the research background and motivation.We also present the research object of this paper in the chapter.In the second chapter,we provide the theoretical fundamental of this paper.In the chapter,we present the details of related theories and formulation models.In the third chapter,the section demonstrates the three strategies pseudocode corresponding to the three stages of propose scheme.In the fourth chapter,we design four numerical simulations to verify the three strategies in proposed TDACP scheme.In the fifth chapter,it is the summary and future works about our researches.
In this chapter,we present two parts contents to research the theorical fundamental of the proposed scheme TDACP.The first part is the system model details and the illustration,and the second part is the theory analysis and the formulaic descriptions.
In this paper,the system model frame is also able to divide into three stages.The frame of the paper is illustrated as the Fig.1 in the follow.In the first and second stages,the system is summarized as a two-layer resource allocation process.And the role of third stage is to place the virtual machines into the physical servers of virtual edge data center.In addition,in order to simplify the description logic,the whole resource inside edge data center is virtualized as one type of normalized resource(NMR).The unit NMR is generated as the resource ratio of the local edge data center.The proposed resource allocation frame is design for the NMR.
Figure 1:The main frame of the TDACP Scheme
In the first stage,the resource allocation is processing in the granularity of slice class.It defines the NMR into private NMR and share NMR.In the statistic period,arbitrary slice is banned from employing the private NMR of other slices.However,the slice is able to rob the slice share NMR once the slice depletes the private NMR itself.Complete this stage,the whole NMR is assigned to the slices.
In the second stage,the resource allocation proceeds in the granularity of virtual machine class.In the stage,the primary task is for the risk-resource model.This model assumes that the peak resource usage of the virtual machine satisfies the normal distribution.Based on the hypothesis,the probability distribution model between peak resource quantity and service quality can be established.The system sets several classes in the slice according as the different service priority.Therefore,the system possesses the ability to calculate the specific resource peak of arbitrary class in one slice corresponding to service priority.Based on this,we can obtain a certain overcommit virtual machines in an acceptable and relatively low SLA.
In the third stage,the system should place all virtual machines manufactured in the first two stages placement in the physical servers.During the placement process,system should monitor the resource utilization sampling time sequence of each virtual machine filling in same physical servers to avoid match the relative virtual machines,which may result in a peak superposition.
Through the resource allocation and scheduling in the three stages,the scheme is able to guarantee the datacenter running under efficiency condition in the 5G edge layer.
In the first stage,when the terminal device connects with the system in the first time and requests resources from the system,the system could identify the type of task required of the device by the task plane of system.The task plane tests the correlation between the task and the whole existing standard network task slices.Once the task is able to match with one type of specific slice,all the class of devices should configure virtual machine resources with the standard of slice.
2.2.1 The analysis for slice class allocation
In the first stage,we design a strategy to complete the resource allocation in the slice class granularity.The process is illustrated in the Fig.2.
Figure 2:The two classes allocation plan
In the first stage,when the terminal device connects with the systemin the first time and requests resources from the system,the system could identify the type of task required of the device by the task plane of system.The task plane tests the correlation between the task and the whole existing standard network task slices.Once the task is able to match with one type of specific slice,all the class of devices should configure virtual machine resources with the standard of slice.
We set the total amount of resources in the system asUT,in which the private resource denoted asUPand the share resource denoted asUS.There is the following equation relative with the two parameters:
Letrepresent the total resources occupied by all slices in the system at timej,andrepresent the total resources occupied by sliceiat timej.
In general,is not a constant,and it is defined as follow:
In general,the slice does not start to run with heavy load simultaneously,the amount of resources available for each slice is always a gradual increment process.When the total amount of resource occupied by sliceiat momentj1is larger than the initial private resource amount for the first time,it starts to preempt resource from the shared resourceUS.For the resource amount,thestands for the resource occupied by sliceiat momentj1,andmeans the resource application increment by sliceiat moment.
However,in order to avoid few slices,occupy too much shared resource in a very short period.A slice should run the discount factor to modify its resource application value when its application accumulation over the threshold.Assume the sliceiapplyC1times share resource and applC2times after its value larger than threshold,we form relationship between original application valueand discount value.
When the system available resource is less than a given value,all the slice is banned to apply resource.The time point is denoted asj2.And we can obtain:
for the slicei,the maximum applied resource afterj2is.
And we define new parameter as resource equivalent demand as:
After above operations,all the resource is distributed in the slices.In the second stage,it will allocate the resource inside each slice.In this stage,it is necessary to establish a resource priority class allocation model based on risk aware.
2.2.2 The analysis for Virtual Machine class allocation
In the second stage,we design a strategy to complete the resource allocation in the virtual machine class granularity.The process is illustrated in the Fig.3.
Figure 3:Equivalent virtual machine based SLA easing
In general,the same slice fits to the same service.And inside one slice,we also define sever different classes within different SLA levels.After the first stage of scheme,we suppose the sliceialso records the peak demand of classkequivalent virtual machine,therefore the peak demand of classkequivalent virtual machine is:
By using the normal distribution model,the SLA of classkof sliceican be obtained:
If the SLA is available for the classkin the slicei,then
for slicei,there existD2classes virtual machines,then the number of the over commit virtual machines is:
We evaluate the risk of classkvirtual machines in the slicei.Assume threshold of virtual machine number over the peak limit is 10%,and the rated number of virtual machines isD1.The risk probability of threshold is defined as:
For the slice,if there is no obvious correlation between the running virtual machines,the risk probability is acceptable.The risk is defined as:
2.2.3 The analysis for virtual machine correlation placement
In the third stage,we design a strategy to place the virtual machines in physical servers based on linear correlation theory.The concept is indicated as the Fig.4.
Figure 4:Placement based on linear correlation
In the third stage,we should place the virtual machines,which are generated in the first stage and the second stage,into the physical servers.And we introduce the linear correlation coefficient to test the correlation of two virtual machines.The first task is to establish the virtual machine time sampling model.Assume the virtual machine sampling frequency is 10 times than slice sampling.Then for the two virtual machinesAandB,there are:
And we make use of the time series sampling to establish correlation analysis model.If the correlation coefficient is negative,it is able to define the two virtual machines as a uncorrelated pair.The linear correlation coefficient is defined as:
In theory,the linear dependent strictly refers to:
However,in actual environment,we can relax the restrict as:
It also to be defined as linear uncorrelated.Based on the Eq.(18),we proposed a new virtual machine placement algorithm based on linear uncorrelated test.
The traditional uncorrelated placement algorithm is prone to fail in linear correlation coefficient after several rounds of consolidation.In this situation,it proposes a novel multiround divide-and-conquer consolidation strategy in the paper.The strategy is described that making use of Eq.(16)to analyze the entire virtual machine in pairwise.If any virtual machine pair matches to the description in Eq.(18),the two-resource utilization time sampling serials are able to consolidate with each other by point to point superposition.
We name the consolidation result as combined virtual machine.If the peak of the resource utilization serial of combined virtual machine is not over the given threshold described in the Eq.(19),the combined virtual machine is able to repeat the process to improve resource utilization.We provide the strategy details in the next chapter.
In this chapter,we provide the strategies algorithm pseudocodes according to the three stages in the scheme.The first algorithm pseudocode is about the slice class resource allocation in dynamic scene.The second algorithm pseudocode is about the virtual machine class resource allocation in static scene.The third algorithm pseudocode is about the virtual machine correlated placement in physical server in in static scene.The scheme combines the dynamic and static resource allocation models into one whole unit.
The first part is the slice granularity class allocation strategy algorithm pseudocode.One slice is not able to allocate the share resource until the private resource of itselfis allocation out.We use a variable weighted factor to constraint the virtual resource allocation as Eq.(6).The pseudocode is described as following:
Table 1:The slice class resource allocation algorithm
The second part is the virtual machine granularity class allocation algorithm pseudocode.In the algorithm,it is possible to overcommit allocate virtual machines resource in one slice by SLA easing.Basically,this is a feasible method that reduce the SLA demand for more available resource as Eq.(11)and Eq.(12).The pseudocode is described as following:
Table 2:The virtual machine class resource allocation algorithm
The third part is the virtual machine correlated placement strategy algorithm pseudocode.In the algorithm,we make use of Eq.(16)and Eq.(18)to seek for the entire uncorrelated virtual machine pairs.The pseudocode is described as following:
Table 3:The virtual machine correlated placement algorithm
In this chapter,we verify the effectiveness of the resource allocation framework proposed in this paper.The simulations are divided into three parts,corresponding to the three stages in this paper.The first part of the simulation is for slice level resource allocation.We assume that the normalized resource in the system needs to be allocated to four slices.
In order to verify the concept of private resources and discount coefficient proposed in the first stage,two sets of simulations were set up for comparison.The first group used pure preemptive strategy for resource allocation,while the second group used the concept of private resources and discount coefficient.As shown in Fig.5,the demand for resources from slice 1 to slice 3 at the beginning of the statistical period was too strong,and the system did not limit the application of resources for slices.When the slice 4 of resource demand starts up gradually at the end of the statistical period,the allocable resources have been exhausted.Slice 4 cannot apply enough resources,it can only run at a low level of resource allocation for a long time,which seriously affects the performance of the slice.
Figure 5:Pure preemptive resource allocation strategy for slice class
Figure 6:Mix strategy with discount factor
In Fig.6,with the introduction of the concept of private resources and discount factor,the scheduling strategy possesses a good inhibition on the over-rapid rise of sliced resource applications.Therefore,in the middle of the statistical period,there is still a large amount of free resources in the system.And the system automatically closes the resource application for the slice after the total resource for the slice over 25%.Therefore,all slices in this framework are able to allocate up to 25% resource only.The simulation results show that the framework proposed in this paper is effective in the first stage.
In the simulation of the second stage,the system established the model relationship between the virtual machine resource supply and SLA of any kind within the slice through statistical regression.Based on this model,the number of slice-borne virtual machines can be increased with the permission of the task SLA.Fig.7 above is the virtual machine type managed by Section 3,which has 7 classes.
Figure 7:The relation between the number of virtual machine and SLA
The number of various virtual machines is distributed between 52 and 78,while the SLA is stable between 0.96 and 0.98.According to the requirements of service type,take Section 2 for example,where the SLA of classes 1 to 5 is able to relax to 0.95,and classes 6 and 7 need to be maintained at 0.98.
The Fig.7 shows the number of various virtual machines and the measured SLA of various virtual machines.It can be seen that the change of measured SLA is highly consistent with the change of theoretically predicted SLA.Shows that the model relationship between the virtual machine source supply and the SLA in the second phase is established and available.
In the third stage,it is necessary to verify the placement strategy of the virtual machine in the resource allocation framework.There are 3,861 virtual machines in the initial state,requiring 78 physical servers to be fully hosted.At this point,it takes 77 servers to load at 0.1 and 74 physical servers to load at 0.2,and when it is 0.25,only 72 physical servers are required to load.But at 0.3,you need 75 physical servers to load.It is able to see that the virtual machine placement strategy proposed in this paper plays an obvious role in selecting appropriate correlation threshold.However,when the correlation threshold is not properly selected,there may be side effects.If the selection is too small,it may cause too many uncorrelated virtual machines,which will make the final placement worse.On the contrary,once the selection is too large,the number of unaggregated virtual machines are increasing in the number of servers at the end.
Figure 8:The result of different
In this paper,we propose a novel scheme,which is named Two-Dimension allocation and correlation placement Scheme(TDACP),based on the slices and vitalization container technologies.The theoretical analysis and numerical simulation indicate that the proposed scheme is able to suppress the problem of uneven resource allocation which is caused by the pure preemptive scheduling strategy.It is able to adjust the number of equivalent virtual machines based on the SLA range of system parameter.It is also able to reduce the SLA probability of physical servers effectively based on resource utilization time sampling series linear.
In the future,the TDACP scheme will be researched in the environment of Ultra-Dense Networks,and verified in the Semi-physical simulation nodes.
Acknowledgement:This work was supported by Sichuan science and technology program(2019YFG0212)and China Postdoctoral Science Foundation(2019M653401).
我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自各大过期杂志,内容仅供学习参考,不准确地方联系删除处理!