Methods and systems for energy management in a virtualized data center
First Claim
1. A method for provisioning a plurality of resources of a data center, the method comprising:
- computing a violation risk factor for a set of low priority requests, wherein the violation risk factor is a risk of violating a maximum average waiting time for the set of low priority requests;
evaluating a utilization factor of an activated set of the plurality of resources of the data center; and
provisioning, according to a predefined rule base comprising a plurality of rules that incorporate the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center, one or more of the plurality of resources for a high priority request, wherein the predefined rule base switches among (a), (b), (c), and one or more combinations thereof based on the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center;
a) preempting one or more virtual machines of a set of virtual machines, wherein the one or more virtual machines are utilizing a subset of the activated set of the plurality of resources of the data center, wherein the one or more virtual machines are associated with the set of low priority requests;
b) activating a new set of the plurality of resources of the data center;
c) consolidating two or more virtual machines of the set of virtual machines;
wherein the provisioning is based on the computed violation risk factor for the set of low priority requests and the evaluated utilization factor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system provisions a plurality of resources of a data center. A violation risk factor for a set of low priority requests can be computed. A utilization factor of a set of activated resources of the data center shall be evaluated. According to a predefined rule base, one or more of the plurality of resources, shall be provisioned for a received high priority request, whereby the predefined rule base defines performing one or more of; a) preempting a set of virtual machines utilizing a subset of the set of activated resources, whereby the set of virtual machines is associated with the set of low priority requests; b) activating a new set of resources; and c) consolidating a plurality of virtual machines, based on the computed violation risk factor and the evaluated utilization factor.
13 Citations
29 Claims
-
1. A method for provisioning a plurality of resources of a data center, the method comprising:
-
computing a violation risk factor for a set of low priority requests, wherein the violation risk factor is a risk of violating a maximum average waiting time for the set of low priority requests; evaluating a utilization factor of an activated set of the plurality of resources of the data center; and provisioning, according to a predefined rule base comprising a plurality of rules that incorporate the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center, one or more of the plurality of resources for a high priority request, wherein the predefined rule base switches among (a), (b), (c), and one or more combinations thereof based on the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center; a) preempting one or more virtual machines of a set of virtual machines, wherein the one or more virtual machines are utilizing a subset of the activated set of the plurality of resources of the data center, wherein the one or more virtual machines are associated with the set of low priority requests; b) activating a new set of the plurality of resources of the data center; c) consolidating two or more virtual machines of the set of virtual machines; wherein the provisioning is based on the computed violation risk factor for the set of low priority requests and the evaluated utilization factor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for provisioning a plurality of resources of a data center, the system comprising:
-
one or more processors; a computing engine, configured to compute a violation risk factor of a set of low priority requests, wherein the violation risk factor is a risk of violating a maximum average waiting time for the set of low priority requests; an energy utilization engine, configured to evaluate a utilization factor of an activated set of the plurality of resources of the data center; and a fuzzy engine configured to provision, according to a predefined rule base comprising a plurality of rules that incorporate the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center, one or more of the plurality of resources for a high priority request, the predefined rule base switching among (a), (b), (c), and one or more combinations thereof based on the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center; a) preempting one or more virtual machines of a set of virtual machines, wherein the one or more virtual machines are utilizing a subset of the activated set of the plurality of resources of the data center, wherein the one or more virtual machines are associated with the set of low priority requests; b) activating a new set of the plurality of resources of the data center; and c) consolidating two or more of the set of virtual machines; wherein the provisioning is based on the computed violation risk factor and the evaluated utilization factor. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer program product comprising a plurality of program instructions stored on a non-transitory computer-readable medium that, when executed by a computing device, performs a method for provisioning a plurality of resources of a data center, the method comprising:
-
computing a violation risk factor for a set of low priority requests, wherein the violation risk factor comprises a risk of violating a maximum average waiting time for the set of low priority requests; evaluating a utilization factor of an activated set of the plurality of resources of the data center; and provisioning, according to a predefined rule base comprising a plurality of rules that incorporate the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center, wherein the predefined rule base switches among (a), (b), (c), and one or more combinations thereof based on the violation risk factor for the set of low priority requests and the utilization factor of the activated set of the plurality of resources of the data center; performing a first provisioning of one or more of the plurality of resources of the data center for a first high priority request according to a predefined rule base, wherein the first provisioning comprises preempting one or more virtual machines of a set of virtual machines, wherein the one or more virtual machines are utilizing a subset of the activated set of the plurality of resources of the data center, wherein the one or more virtual machines are associated with the set of low priority requests, further wherein the first provisioning is based on the computed violation risk factor and the evaluated utilization factor; (b) performing a second provisioning of one or more of the plurality of resources of the data center for a second high priority request according to the predefined rule base, wherein the second provisioning comprises activating a new set of the plurality of resources of the data center, further wherein the second provisioning is based on the computed violation risk factor and the evaluated utilization factor; and (c) performing a third provisioning of one or more of the plurality of resources of the data center for a third high priority request according to the predefined rule base, wherein the third provisioning comprises consolidating two or more of the set of virtual machines, further wherein the third provisioning is based on the computed violation risk factor and the evaluated utilization factor.
-
-
28. A method for provisioning a plurality of resources of a data center, the method comprising:
-
computing a violation risk factor for a set of low priority requests, wherein a value of the violation risk factor ranges from a zero value to a positive value, wherein the zero value indicates a low risk of violating the maximum average waiting time and a value equal to and greater than one indicates a high risk of violating the maximum average waiting time, wherein the value of the violation risk factor is classified into one selected from the group consisting of;
a low risk range, a medium risk range, a high risk range and a very high risk range, further wherein the low risk range varies from 0 to 0.25, the medium risk range varies from 0.25 to 0.5, the high risk range varies from 0.5 to 0.75 and the very high risk range includes a value greater than 0.75;evaluating a utilization factor of an activated set of the plurality of resources of the data center, wherein a value of the utilization factor ranges from a zero value to one, wherein the zero value indicates an under-utilization of the activated set of the plurality of resources of the data center, and the one indicates an over utilization of the activated set of the plurality of resources of the data center, wherein the value of the utilization factor is classified into one selected from the group consisting of;
a very low, a low, a medium, a high and a very high; andprovisioning, according to a predefined rule base, one or more of the plurality of resources for a high priority request, whereby the predefined rule base defines performing one or more of; a) preempting one or more virtual machines of a set of virtual machines, wherein the one or more virtual machines are utilizing a subset of the activated set of the plurality of resources of the data center, whereby the one or more virtual machines are associated with the set of low priority requests; b) activating a new set of the plurality of resources of the data center;
orc) consolidating two or more of the set of virtual machines, based on the computed violation risk factor and the evaluated utilization factor. - View Dependent Claims (29)
-
Specification