2020 IEEE 13th International Conference on Cloud Computing (CLOUD) 2020
DOI: 10.1109/cloud49709.2020.00091
|View full text |Cite
|
Sign up to set email alerts
|

TOPOSCH: Latency-Aware Scheduling Based on Critical Path Analysis on Shared YARN Clusters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Thus, unawareness of application-level QoS at runtime could lead to host resource uneven or over-saturation-intrusive applications consume too many resources-making neighbor protected workloads experience performance outliers. 14,16 As shown in Figure 1A,B, we observed the JCT of the Spark Kmeans job co-located with stream 17 and the JCT of the Mapreduce Terasort job co-located with fio. 18 With the increase in the concurrency of the co-located intrusive workloads, the JCT of spark and Mapreduce jobs continue to grow, and the growth has gone from initially flat to relatively sharp as intrusive workloads steal more and more resources.…”
Section: Performance Interferencementioning
confidence: 73%
See 2 more Smart Citations
“…Thus, unawareness of application-level QoS at runtime could lead to host resource uneven or over-saturation-intrusive applications consume too many resources-making neighbor protected workloads experience performance outliers. 14,16 As shown in Figure 1A,B, we observed the JCT of the Spark Kmeans job co-located with stream 17 and the JCT of the Mapreduce Terasort job co-located with fio. 18 With the increase in the concurrency of the co-located intrusive workloads, the JCT of spark and Mapreduce jobs continue to grow, and the growth has gone from initially flat to relatively sharp as intrusive workloads steal more and more resources.…”
Section: Performance Interferencementioning
confidence: 73%
“…Many studies also improve the effectiveness of performance isolation through intrusive instrumentation and modification at application-level. 1,14 Unfortunately, existing research is not suitable for performance isolation in large-scale shared clusters with scale-out workloads.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, a work named ABS-YARN [16] uses a state-ofthe-art resource negotiator to quickly make decisions at the modeling level and reduce unneeded costs. Lastly in the topic of resource management, by harvesting run time latency, Toposch [17] can co-locate batches and microservices.…”
Section: Related Workmentioning
confidence: 99%
“…Cluster-based method is a machine learning technique that involves grouping data points; the detailed description of the method is that given a set of data points, clustering algorithms can be used to divide each data point into a specific group [8]. In theory, data points in the same group should have similar properties, and data points in different groups should have highly different attributes.…”
Section: Introductionmentioning
confidence: 99%