On Optimal Strategies for Stealing Cycles in Clusters of Workstations
نویسندگان
چکیده
We study aspects of the parallel scheduling problem for a new modality of parallel computing: having one workstation “steal cycles” from another. We focus on a draconian mode of cycle-stealing, in which the owner of workstation B allows workstation A to take control of B’s processor whenever it is idle, with the promise of relinquishing control immediately upon demand. The costs for such cycle-stealing reside in the (typically high) communication overhead for supplying workstation B with work and receiving its results, coupled with the risk that work in progress when the owner of B reclaims the workstation is lost to the owner of A. The first of these costs militates toward supplying B with a large amount of work at once; the second of these costs militates toward repeatedly supplying B with many small packets of work. The challege is to find balance these two pressures in a way that maximizes the amount of work accomplished. We formulate two models of cycle-stealing. The first attempts to maximize the work accomplished during a single episode, when one knows the probability distribution of the return of B’s owner. The second attempts to match the productivity of an omniscient cycle-stealer, when one knows how much work the stealer can accomplish. We study cycle-stealing scenarios within each of these models, deriving optimal scheduling strategies for each studied scenario. We uncover an as-yet unexplained coincidence, two quite distinct scenarios which lead to almost identical unique optimizing schedules. The first of these scenarios falls within our first model: it assumes that the probability of the return of B’s owner is distributed uniformly across the lifespan of the episode. The second of these scenarios falls within our second model: it assumes that B’s owner will interrupt our cycle-stealing at most once during the lifespan of the opportunity.
منابع مشابه
On Optimal Strategies for Stealing Cycles?
The growing importance of networked workstations as a computing milieu has created a new modality of parallel computing, namely, the possibility of having one workstation \steal cycles" from another. In a typical episode of cycle-stealing, the owner of workstation B allows the owner of workstation A to take control of B's processor whenever it is idle, with the promise of relinquishing control ...
متن کاملLimitations of Cycle Stealing for Parallel Processing on a Network of Homogeneous Workstations
The low cost and availability of clusters of workstations have lead researchers to re-explore distributed computing using independent workstations. This approach may provide better cost/ performance than tightly coupled multiprocessors. In practice, this approach often utilizes wasted cycles to run parallel jobs. In this paper we address the feasibility and limitation of such a nondedicated par...
متن کاملA Comparison of Two Java Runtime Systems for Parallel Execution of ultithreaded Java Applications on Networks of Workstations
This paper assesses the performance of two Java frameworks for high performance computing (HPC) on networks of workstations (NOWs). The lottery-based work stealing algorithm is intrinsically distributed, and consequetly scalable to an extremely large number of participant workstations. Although proved to be near optimal for the distribution of well-structured multithreaded computations across l...
متن کاملTitle of dissertation : EXPLOITING IDLE CYCLES IN NETWORS OF WORKSTATIONS
Title of dissertation: EXPLOITING IDLE CYCLES IN NETWORS OF WORKSTATIONS Kyung Dong Ryu, Doctor of Philosophy, 2001 Dissertation directed by: Associate Professor Jeffrey K. Hollingsworth Department of Computer Science Studies have shown that workstations are idle a significant fraction of the time. Traditional idle resource harvesting systems define a social contract that permits guest jobs to ...
متن کاملStealing cycles: Can we get along?
The exploitation of networked workstations as a set of under-util ized computational resources is an attractive idea for cost effective parallel computing. The use of these resources, however, raises a number of interesting policy and performance questions (e.g, what impact will a parallel application have on the normal workstation user, what performance levels can be expected when many users a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005