Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing

Jihun Kang, Heonchang Yu

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

As the size of data increases and computation becomes complicated in fog computing environments, the need for highperformance computation is increasing. One of the most popular ways to improve the performance of a virtual machine (VM) is to allocate a graphic processing unit (GPU) to the VM for supporting general purpose computing on graphic processing unit (GPGPU) operations. The direct pass-through, often used for GPUs in VMs, is popular in the cloud because VMs can use the full functionality of the GPU and experience virtually no performance degradation owing to virtualization. Direct pass-through is very useful for improving the performance of VMs. However, since the GPU usage time is not considered in the VM scheduler that operates based on the central processing unit (CPU) usage time of the VM, the VM performing the GPGPU operation degrades the performance of other VMs. In this paper, we analyze the effect of the VM performing the GPGPU operation (GPGPU-intensive VM) on other VMs through experiments. Then, we propose a method to mitigate the performance degradation of other VMs by dynamically allocating the resource usage time of the VM and preventing the priority preemption of the GPGPU-intensive VM.

Original languageEnglish
Article number8437206
Pages (from-to)257-265
Number of pages9
JournalJournal of Communications and Networks
Volume20
Issue number3
DOIs
Publication statusPublished - 2018 Jun 1

Keywords

  • Fog computing
  • general purpose computing on graphic processing unit (GPGPU)
  • performance isolation
  • virtualization

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing'. Together they form a unique fingerprint.

  • Cite this