RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments

被引:0
|
作者
Zhang, Fan [1 ,2 ]
Tang, Yazhe [1 ,2 ]
Shan, Danfeng [1 ,2 ]
Wang, Huanzhao [1 ,2 ]
Hu, Chengchen [3 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Network & Network Secur, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[3] NIO Inc, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Coflow scheduling; Datacenter networks; Data-intensive applications;
D O I
10.1016/j.jnca.2021.103233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Coflow scheduling can effectively improve the application performance and has been studied a lot in cooperative environments (e.g., private datacenter networks), where fairness is not the primary concern. In non-cooperative environments (e.g., multi-tenant datacenter networks), coflow scheduling should be strategy proof; otherwise, some tenants could unfairly acquire more resources by cheating the scheduler. As minimizing coflow completion time (CCT) must prioritize coflows based on some specific rules (e.g., shortest-coflowfirst, smallest-effective-bottleneck-first), tenants can raise the priority of their coflows by lying about the coflow information. Thus, it is a common belief that optimizing coflow performance can inevitably violate strategy-proofness. In this paper, we argue that the average CCT can be reduced without violating strategy-proofness. Our key insight is that prioritization can inherently achieve better CCT even without those specific rules such as smallest-effective-bottleneck-first. We propose RICH, a coflow scheduler in non-cooperative environments. At its heart, RICH splits the time into multiple rounds. In each round, RICH ensures that the total data transmitted by each tenant can provide optimal isolation guarantee. Among different rounds, RICH prioritizes coflow transmission among tenants in a round-robin manner. In this way, all tenants are fairly prioritized, and tenants do not necessarily gain more bandwidth by cheating. Extensive simulations show that RICH outperforms other strategy-proof mechanisms by up to 39.3% in terms of average CCT.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] An Optimal, Strategy-Proof Scheme for Multi-Path Traffic Assignment in Non-Cooperative Networks
    Wu, Fan
    Zhong, Sheng
    Liu, Jiqiang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (03) : 1012 - 1021
  • [2] SAIL: A Strategy-Proof Auction Mechanism for Cooperative Communication
    Zheng, Zhenzhe
    Wang, Juntao
    Wu, Fan
    Chen, Guihai
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2013), 2013, : 380 - 387
  • [3] Strategy-proof, efficient, and nonbossy quota allocations
    John William Hatfield
    Social Choice and Welfare, 2009, 33 : 505 - 515
  • [4] Efficient and strategy-proof voting rules: A characterization
    Nehring, Klaus
    Puppe, Clemens
    GAMES AND ECONOMIC BEHAVIOR, 2007, 59 (01) : 132 - 153
  • [5] Strategy-proof, efficient, and nonbossy quota allocations
    Hatfield, John William
    SOCIAL CHOICE AND WELFARE, 2009, 33 (03) : 505 - 515
  • [6] A Strategy-proof Trust Mechanism for Pervasive Computing Environments
    Wei, Zhiqiang
    Zhou, Wei
    Kang, Mijun
    Collins, Michael
    Nixon, Paddy
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 959 - 964
  • [7] DDoS mitigation in non-cooperative environments
    Yan, Guanhua
    Eidenbenz, Stephan
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 599 - 611
  • [8] Efficient strategy-proof exchange and minimum consumption guarantees
    Serizawa, S
    Weymark, JA
    JOURNAL OF ECONOMIC THEORY, 2003, 109 (02) : 246 - 263
  • [9] Cooperative and non-cooperative algorithms for distributed parallel jobs scheduling
    Javad Behnamian
    Flexible Services and Manufacturing Journal, 2024, 36 : 151 - 174
  • [10] Internet pricing: non-cooperative user environments
    Abhishek
    Santosh
    Prasad, M.S.
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 2000, 17 (01): : 9 - 14