Loading…

RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments

Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling sho...

Full description

Saved in:
Bibliographic Details
Published in:Journal of network and computer applications 2021-12, Vol.196, p.103233, Article 103233
Main Authors: Zhang, Fan, Tang, Yazhe, Shan, Danfeng, Wang, Huanzhao, Hu, Chengchen
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993
cites cdi_FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993
container_end_page
container_issue
container_start_page 103233
container_title Journal of network and computer applications
container_volume 196
creator Zhang, Fan
Tang, Yazhe
Shan, Danfeng
Wang, Huanzhao
Hu, Chengchen
description Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling should be strategy-proof; otherwise, some tenants could unfairly acquire more resources by cheating the scheduler. As minimizing coflow completion time (CCT) must prioritize coflows based on some specific rules (e.g., shortest-coflow-first, smallest-effective-bottleneck-first), tenants can raise the priority of their coflows by lying about the coflow information. Thus, it is a common belief that optimizing coflow performance can inevitably violate strategy-proofness. In this paper, we argue that the average CCT can be reduced without violating strategy-proofness. Our key insight is that prioritization can inherently achieve better CCT even without those specific rules such as smallest-effective-bottleneck-first. We propose RICH, a coflow scheduler in non-cooperative environments. At its heart, RICH splits the time into multiple rounds. In each round, RICH ensures that the total data transmitted by each tenant can provide optimal isolation guarantee. Among different rounds, RICH prioritizes coflow transmission among tenants in a round-robin manner. In this way, all tenants are fairly prioritized, and tenants do not necessarily gain more bandwidth by cheating. Extensive simulations show that RICH outperforms other strategy-proof mechanisms by up to 39.3% in terms of average CCT.
doi_str_mv 10.1016/j.jnca.2021.103233
format article
fullrecord <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_jnca_2021_103233</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1084804521002319</els_id><sourcerecordid>S1084804521002319</sourcerecordid><originalsourceid>FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993</originalsourceid><addsrcrecordid>eNp9kN1KAzEQRoMoWKsv4FVeYGt-NruJeCNFrVAQtF6HNJnULG1SkrXSt3eXeu3VDANn-L6D0C0lM0poc9fNumjNjBFGhwNnnJ-hCSVKVFIodj7usq4kqcUluiqlI4Q0teITtHp_nS_u8UefTQ-bY7XPKXlsosPgfbABYo9t8tv0g4v9Ave9DXGDQ8QxxcqmtIcBDAfAEA8hp7gbgHKNLrzZFrj5m1P0-fy0mi-q5dvL6_xxWVlOSF8J1QogklnF1tw0rBWSUeEUk41rjWs8b-Sa16LhnrVgW06dNDXlLWMAoBSfInb6a3MqJYPX-xx2Jh81JXr0ojs9etGjF33yMkAPJwiGZIcAWZexpgUXMtheuxT-w38BWr5rlw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments</title><source>ScienceDirect Journals</source><creator>Zhang, Fan ; Tang, Yazhe ; Shan, Danfeng ; Wang, Huanzhao ; Hu, Chengchen</creator><creatorcontrib>Zhang, Fan ; Tang, Yazhe ; Shan, Danfeng ; Wang, Huanzhao ; Hu, Chengchen</creatorcontrib><description>Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling should be strategy-proof; otherwise, some tenants could unfairly acquire more resources by cheating the scheduler. As minimizing coflow completion time (CCT) must prioritize coflows based on some specific rules (e.g., shortest-coflow-first, smallest-effective-bottleneck-first), tenants can raise the priority of their coflows by lying about the coflow information. Thus, it is a common belief that optimizing coflow performance can inevitably violate strategy-proofness. In this paper, we argue that the average CCT can be reduced without violating strategy-proofness. Our key insight is that prioritization can inherently achieve better CCT even without those specific rules such as smallest-effective-bottleneck-first. We propose RICH, a coflow scheduler in non-cooperative environments. At its heart, RICH splits the time into multiple rounds. In each round, RICH ensures that the total data transmitted by each tenant can provide optimal isolation guarantee. Among different rounds, RICH prioritizes coflow transmission among tenants in a round-robin manner. In this way, all tenants are fairly prioritized, and tenants do not necessarily gain more bandwidth by cheating. Extensive simulations show that RICH outperforms other strategy-proof mechanisms by up to 39.3% in terms of average CCT.</description><identifier>ISSN: 1084-8045</identifier><identifier>EISSN: 1095-8592</identifier><identifier>DOI: 10.1016/j.jnca.2021.103233</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Coflow scheduling ; Data-intensive applications ; Datacenter networks</subject><ispartof>Journal of network and computer applications, 2021-12, Vol.196, p.103233, Article 103233</ispartof><rights>2021 Elsevier Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993</citedby><cites>FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993</cites><orcidid>0000-0002-9443-8577</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Zhang, Fan</creatorcontrib><creatorcontrib>Tang, Yazhe</creatorcontrib><creatorcontrib>Shan, Danfeng</creatorcontrib><creatorcontrib>Wang, Huanzhao</creatorcontrib><creatorcontrib>Hu, Chengchen</creatorcontrib><title>RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments</title><title>Journal of network and computer applications</title><description>Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling should be strategy-proof; otherwise, some tenants could unfairly acquire more resources by cheating the scheduler. As minimizing coflow completion time (CCT) must prioritize coflows based on some specific rules (e.g., shortest-coflow-first, smallest-effective-bottleneck-first), tenants can raise the priority of their coflows by lying about the coflow information. Thus, it is a common belief that optimizing coflow performance can inevitably violate strategy-proofness. In this paper, we argue that the average CCT can be reduced without violating strategy-proofness. Our key insight is that prioritization can inherently achieve better CCT even without those specific rules such as smallest-effective-bottleneck-first. We propose RICH, a coflow scheduler in non-cooperative environments. At its heart, RICH splits the time into multiple rounds. In each round, RICH ensures that the total data transmitted by each tenant can provide optimal isolation guarantee. Among different rounds, RICH prioritizes coflow transmission among tenants in a round-robin manner. In this way, all tenants are fairly prioritized, and tenants do not necessarily gain more bandwidth by cheating. Extensive simulations show that RICH outperforms other strategy-proof mechanisms by up to 39.3% in terms of average CCT.</description><subject>Coflow scheduling</subject><subject>Data-intensive applications</subject><subject>Datacenter networks</subject><issn>1084-8045</issn><issn>1095-8592</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kN1KAzEQRoMoWKsv4FVeYGt-NruJeCNFrVAQtF6HNJnULG1SkrXSt3eXeu3VDANn-L6D0C0lM0poc9fNumjNjBFGhwNnnJ-hCSVKVFIodj7usq4kqcUluiqlI4Q0teITtHp_nS_u8UefTQ-bY7XPKXlsosPgfbABYo9t8tv0g4v9Ave9DXGDQ8QxxcqmtIcBDAfAEA8hp7gbgHKNLrzZFrj5m1P0-fy0mi-q5dvL6_xxWVlOSF8J1QogklnF1tw0rBWSUeEUk41rjWs8b-Sa16LhnrVgW06dNDXlLWMAoBSfInb6a3MqJYPX-xx2Jh81JXr0ojs9etGjF33yMkAPJwiGZIcAWZexpgUXMtheuxT-w38BWr5rlw</recordid><startdate>20211215</startdate><enddate>20211215</enddate><creator>Zhang, Fan</creator><creator>Tang, Yazhe</creator><creator>Shan, Danfeng</creator><creator>Wang, Huanzhao</creator><creator>Hu, Chengchen</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9443-8577</orcidid></search><sort><creationdate>20211215</creationdate><title>RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments</title><author>Zhang, Fan ; Tang, Yazhe ; Shan, Danfeng ; Wang, Huanzhao ; Hu, Chengchen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Coflow scheduling</topic><topic>Data-intensive applications</topic><topic>Datacenter networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Fan</creatorcontrib><creatorcontrib>Tang, Yazhe</creatorcontrib><creatorcontrib>Shan, Danfeng</creatorcontrib><creatorcontrib>Wang, Huanzhao</creatorcontrib><creatorcontrib>Hu, Chengchen</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of network and computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Fan</au><au>Tang, Yazhe</au><au>Shan, Danfeng</au><au>Wang, Huanzhao</au><au>Hu, Chengchen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments</atitle><jtitle>Journal of network and computer applications</jtitle><date>2021-12-15</date><risdate>2021</risdate><volume>196</volume><spage>103233</spage><pages>103233-</pages><artnum>103233</artnum><issn>1084-8045</issn><eissn>1095-8592</eissn><abstract>Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling should be strategy-proof; otherwise, some tenants could unfairly acquire more resources by cheating the scheduler. As minimizing coflow completion time (CCT) must prioritize coflows based on some specific rules (e.g., shortest-coflow-first, smallest-effective-bottleneck-first), tenants can raise the priority of their coflows by lying about the coflow information. Thus, it is a common belief that optimizing coflow performance can inevitably violate strategy-proofness. In this paper, we argue that the average CCT can be reduced without violating strategy-proofness. Our key insight is that prioritization can inherently achieve better CCT even without those specific rules such as smallest-effective-bottleneck-first. We propose RICH, a coflow scheduler in non-cooperative environments. At its heart, RICH splits the time into multiple rounds. In each round, RICH ensures that the total data transmitted by each tenant can provide optimal isolation guarantee. Among different rounds, RICH prioritizes coflow transmission among tenants in a round-robin manner. In this way, all tenants are fairly prioritized, and tenants do not necessarily gain more bandwidth by cheating. Extensive simulations show that RICH outperforms other strategy-proof mechanisms by up to 39.3% in terms of average CCT.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.jnca.2021.103233</doi><orcidid>https://orcid.org/0000-0002-9443-8577</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1084-8045
ispartof Journal of network and computer applications, 2021-12, Vol.196, p.103233, Article 103233
issn 1084-8045
1095-8592
language eng
recordid cdi_crossref_primary_10_1016_j_jnca_2021_103233
source ScienceDirect Journals
subjects Coflow scheduling
Data-intensive applications
Datacenter networks
title RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T21%3A18%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RICH:%20Strategy-proof%20and%20efficient%20coflow%20scheduling%20in%20non-cooperative%20environments&rft.jtitle=Journal%20of%20network%20and%20computer%20applications&rft.au=Zhang,%20Fan&rft.date=2021-12-15&rft.volume=196&rft.spage=103233&rft.pages=103233-&rft.artnum=103233&rft.issn=1084-8045&rft.eissn=1095-8592&rft_id=info:doi/10.1016/j.jnca.2021.103233&rft_dat=%3Celsevier_cross%3ES1084804521002319%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c300t-5975e082c92b3a62758215d9286d7ad6f368b34563f27ec731d8a413722eee993%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true