Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control(System Programs)
スポンサーリンク
概要
- 論文の詳細を見る
Polling I/O mechanisms on the Unix platform such as select() and poll() cause high processing overhead when they are used in a heavily-loaded network server with many concurrent open sockets. Large waste of processing power incurs not only service degradation but also various troubles such as high electronic power consumption and worsened MTBF of server hosts. It is thus a serious issue especially in large-scale service providers such as an Internet data center (iDC) where a great number of heavily-loaded network servers are operated. As a solution of this problem, we propose a technique of fine-grained control on the invocation intervals of the polling I/O function. The uniqueness of this study is the utilization of POSIX real-time scheduling to enable the fine-grained execution control. Although earlier solutions such as an explicit event delivery mechanism also addressed the problem, they require major modification in the OS kernel and transition from the traditional polling I/O model to the new explicit event-notification model. On the other hand, our technique can be implemented with low cost because it just inserts a few small blocks of codes into the server program and does not require any modification in the OS kernel.
- 社団法人電子情報通信学会の論文
- 2005-06-01
著者
-
Kawai Eiji
Nara Institute Of Science And Technology
-
KADOBAYASHI Youki
Nara Institute of Science and Technology
-
YAMAGUCHI Suguru
Nara Institute of Science and Technology
-
Yamaguchi Suguru
Graduate School Of Information Science Nara Institute Of Science And Technology
-
Kadobayashi Youki
Nara Inst. Sci. And Technol. Ikoma‐shi Jpn
-
Yamaguchi Suguru
Nara Inst. Of Sci. And Technol. Nara Jpn
関連論文
- Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control(System Programs)
- Basic Trust Calculation to Prevent Spam in VoIP Network based on Call Duration : Single Hop Consideration
- Performance Study and Deployment Strategies on the Sender-Initiated Multicast(Internet Technology V)
- Multi-Path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks(Mobile Networking)(Internet Technology IV)
- Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks(Switching for Communications)
- Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries
- Preliminary Field-Trial for QoS Routing and Dynamic SLA (Special Issue on Internet Technology)
- Special Issue on Internet Technology III
- Proactive AP Selection Method Considering the Radio Interference Environment
- Improvement of Consistency among AS Policies in IRR Databases(Distributed System Operation and Management)
- LI_015 Region Extraction with Cooperative Active Contours
- Expediting Experiments across Testbeds with AnyBed : A Testbed-Independent Topology Configuration System and Its Tool Set
- A benchmark tool for network I/O management architectures (特集:新しいパラダイムの中での分散システム/インターネット運用・管理)
- The Effects of Server Placement and Server Selection for Internet Services
- Delegated Validation System for Secure Authentication in WLAN Roaming
- Delegated Validation System for Secure Authentication in WLAN Roaming
- Cached Shortest-Path Tree : An Approach to Reduce the Influence of Intra-Domain Routing Instability(Network)
- Cached Shortest-Path Tree : An Approach to Reduced the Influence of Intra-Domain Routing Instability
- SB-9-8 An Analysis on Intra-Domain Routing Instability
- USB/IP : A Transparent Device Sharing Technology over IP Network(Network)
- AI^3 Satellite Internet Infrastructure and the Deployment in Asia (Special Issue on Internet Technology)
- Design and implementation of an inter-device authentication framework guaranteeing explicit ownership (特集:情報洪水時代のネットワークサービス)
- A Self-Confirming Engine for Preventing Man-in-the-Middle Attack(Security)(Internet Technology IV)
- Lightweight Vulnerability Management System
- Lightweight Vulnerability Management System
- Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs
- An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- USB/IP: A Transparent Device Sharing Technology over IP Network
- Improvement of Consistency among AS Policies in IRR Databases
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- A Benchmark Tool for Network I/O Management Architectures
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- USB/IP: A Transparent Device Sharing Technology over IP Network
- A Benchmark Tool for Network I/O Management Architectures
- Measurement Results of IEEE802.11a WiFi Signal Attenuation Under Different Rain Conditions