簡易檢索 / 詳目顯示

研究生: 葉采千
Cai-Cian Ye
論文名稱: 應用啟發式演算法於Redfish之查詢優化
Applying a Heuristic Algorithm to the Query Optimization of Redfish
指導教授: 徐勝均
Sendren Sheng-Dong Xu
口試委員: 黃旭志
Hsu-Chih Huang
吳晉賢
Chin-Hsien Wu
柯正浩
Kevin Cheng-Hao Ko
徐勝均
Sendren Sheng-Dong Xu
學位類別: 碩士
Master
系所名稱: 工程學院 - 自動化及控制研究所
Graduate Institute of Automation and Control
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 74
中文關鍵詞: 資料中心基板管理控制器Redfish查詢優化啟發式演算法
外文關鍵詞: Data Center, Baseboard Management Controller (BMC), Redfish, query optimization, Heuristic Algorithm
相關次數: 點閱:300下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

隨著5G和物聯網時代的來臨,資料中心(Data Center)的規模和複雜度將會快速增長。為了更加有效率地管理資料中心,分佈式管理任務組(Distributed Management Task Force, DMTF)制定了Redfish標準,其已被視為下一代資料中心基礎設施管理標準。因其具有RESTful界面,能直接向現代工具鏈顯示訊息,所以,很適合廣泛地被應用於各種資料中心管理工具,以利於執行最佳化資源開發。
Redfish的資料模型可被視為一個關聯性資料模型(Relational Data Model),因此
,可以將Redfish服務視為一個關聯性資料庫管理系統(Relational Database Management System, RDBMS)。又因為Redfish服務中支援客戶端使用查詢字串來靈活地獲取資料是非常重要的功能,因此,我們將RDBMS中常被使用的「啟發式演算法」(Heuristic Algorithm)應用於Redfish查詢中,用以提升Redfish服務之效率,希望解決系統資源被長期佔據的問題。
最後,我們在 OpenBMC 伺服器上進行了實驗。實驗結果顯示:應用啟發式演算法於Redfish之查詢優化架構,總體提升處理時間平均達50%左右。其中包含減少了Redfish 服務的處理時間和增加其處理效能,也間接減少客戶端下載資料與處理資料等資源消耗。總體來說,這樣的方法將可大幅減少Redfish服務於面對現代化工具鏈的請求負載,同時亦可滿足客戶端請求內容之需求。


With the advent of the era of 5G and the Internet of Things (IoT), the scale and complexity of a Data Center will increase rapidly. In order to manage Data Centers more efficiently, the Distributed Management Task Force (DMTF) developed the Redfish standard, which has been regarded as the next-generation Data Center infrastructure management standard. Because Redfish has the RESTful interface, it can directly expose information to modern toolchains. Therefore, Redfish is suitable for being widely used in various Data Center management tools to facilitate the development of resource optimization.
The data model of Redfish can be regarded as a Relational Data Model is that the Redfish service can be regarded as a relational database management system (RDBMS). Because it is a very important function in Redfish service to flexibly support obtaining data by using a query string from the Client side, we apply a Heuristic Algorithm, commonly used in RDBMS, to the query of Redfish in order to improve the efficiency of Redfish service, hoping to solve the problem of system resources being occupied for a long time.
Finally, we conducted the experiment on an OpenBMC server. The experimental results show that the application of the Heuristic Algorithm to the query optimization framework of Redfish can improve the overall processing time by an average of about 50%. Therein, it includes reducing the processing time and increasing the performance of the Redfish service. Moreover, it indirectly reduces the resource consumption of the Client, including the downloading data and processing data. Overall, such an approach will greatly reduce the Request load of Redfish service facing modern toolchains, while also meets the needs of Client Request content.

致謝 I 摘要 II Abstract III 目錄 IV 圖目錄 VI 表目錄 VIII 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機 5 1.3 研究目的 8 1.4 研究貢獻 9 1.5 論文架構 9 第二章 預備知識 10 2.1 伺服器監控 10 2.2 BMC 11 2.3 Redfish技術分析 13 2.3.1 Redfish資料模型 13 2.3.2 RESTful介面 19 2.3.3 HTTP協議 21 2.3.4 OData協議 26 第三章 系統方法與架構 28 3.1 系統流程與架構 28 3.2 啟發式演算法 32 3.3 驗證資料選擇 34 第四章 實驗結果 42 4.1 TTFB (Time to First Byte) 42 4.2 研究數據分析 45 第五章 結論與未來展望 53 5.1 結論 53 5.2 未來展望 54 參考文獻 55

[1]J. Woods, “The evolution of the data center: Timeline from the Mainframe to the Cloud,” 2014. Accessed: July 15, 2022. [Online]. Available:http://www.siliconangle.com
[2]T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and challenges,” in Proc. IEEE International Conference on Advanced Information Networking and Applications, Perth, Australia, April 20-23, 2010, pp. 27-33.DOI: 10.1109/AINA.2010.187
[3]M. N. O. Sadiku, S. M. Musa, and O. D. Momoh., “Cloud Computing: Opportunities and challenges,” IEEE Potentials, vol. 33, no. 1, pp. 34-36, 2014. DOI: 10.1109/MPOT.2013.2279684
[4]L. Qian, Z. Luo, Y. Du, and L. Guo, “Cloud Computing: An overview,” in Proc. IEEE International Conference on Cloud Computing, Springer, Berlin, Heidelberg, Sep. 21-25, 2009, pp. 626-631. DOI: 10.1007/978-3-642-10665-1_63
[5]W. Kim, “Cloud Computing: Today and tomorrow,” The Journal of Object Technology, vol. 8, no. 1, pp. 65-72, 2009. DOI:10.5381/jot.2009.8
[6]Intel, Hewlett-Packard, NEC, and Dell, “Intelligent platform management interface specification, second generation,” 2015. Accessed: July 15, 2022. [Online]. Available: https://www.intel.com/content/www/us/en/servers/ipmi/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.html
[7]M. N. Rahman and A. Esmailpour, “A hybrid data center architecture for big data,” Big Data Research, vol. 3, pp. 29-40, April 2016. DOI: 10.1016/j.bdr.2016.02.001
[8]B. G. Chun, G. Iannaccone, G. Iannaccone, R. Katz, G. Lee, and L. Niccolini, “An energy case for hybrid datacenters,” ACM SIGOPS Operating Systems Review, vol. 44, pp. 76-80, 2010. DOI: 10.1145/1740390.1740408
[9]L. Liu, C. Li, H. Sun, Y. Hu, J. Gu, T. Li, J. Xin, and N. Zheng, “HEB: Deploying and managing hybrid energy buffers for improving datacenter efficiency and economy,” ACM SIGARCH Computer Architecture News, vol. 43, pp. 463-475, Jun. 2015. DOI: 10.1145/2749469.2750384
[10]D. Cole, Data Center Management – Searching for the Optimum Solution, No Limits Software White Paper #1, 2010.
[11]A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, and A. Rindos, “SDDC: A software defined datacenter experimental framework,” in Proc. 3rd International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, Aug. 24-26, 2015, pp. 189-194. DOI: 10.1109/FiCloud.2015.127
[12]O. Cherkaoui, R. Menon, and H. Geng, “Virtualization, Cloud, SDN, and SDDC in Data Centers,” in Data Center Handbook, edited by H. Geng, pp. 389-400, 2014. DOI: 10.1002/9781118937563.ch20
[13]Y. Wan, C. Luo, and Z. Liu, “Reliability analysis of multi-node SDDC using fault tree,” in Proc. International Industrial Informatics and Computer Engineering Conference, Shaanxi, China, Jan. 10-11, 2015, p. 1155-1158. DOI: 10.2991/iiicec-15.2015.256
[14]W. Fischer, “Hello Redfish, goodbye IPMI – The future of system management in the Data Center,” in Proc. Open Source Data Center Conference, Berlin, Germany, April 26-28, 2016.
[15]S. El-Haj-Mahmoud, “Firmware in the datacenter: Goodbye PXE and IPMI. Welcome HTTP Boot and Redfish,” in Unified Extensible Firmware Interface (UEFI) Forum, Spring 2015 UEFI Plugfest, Seattle, WA, USA, May 19-21, 2015.
[16]DMTF: Home, Accessed: July 15, 2022. [Online]. Available: https://www.dmtf.org
[17]Redfish Specification, Document Identifier: DSP0266, Date: 2022-04-07, Version: 1.15.1, Accessed: July 15, 2022. [Online]. Available: https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.15.1.pdf
[18]G. Gonçalves, D. Rosendo, L. Ferreira, G. L. Santos, D. Gomes, A. Moreira, J. Kelner, D. Sadok, M. Wildeman, and P. T. Endo, “A standard to rule them all: Redfish,” IEEE Communications Standards Magazine, vol. 3, no. 2, pp. 36-43, Jun. 2019. DOI: 10.1109/MCOMSTD.2019.1800045
[19]M. R. Chengappa, J. Arndt, M. Halstead, and A. Thulasi, “Open distributed infrastructure management – ODIM,” in Proc. IEEE Infrastructure Conference, San Francisco, CA, USA, Sep. 26-27, 2020, pp. 1-3.DOI: 10.1109/IEEECONF47748.2020.9377625
[20]A. Oleksiak, M. Kierzynka, W. Piatek, M. vor dem Berge, W. Christmann, S. Krupop, M. Porrmann, J. Hagemeyer, R. Griessl, M. Peykanu, L. Tigges, S. Rosinger, D. Schlitt, C. Pieper, U. Janssen, H. Rauchfuss, G. Agosta, A. Barenghi, C. Brandolese, W. Fornaciari, G. Pelosi, J. P. Costa, M. Cecowski, R. Plestenjak, J. Cinkelj, L. Cudennec, T. Goubier, J.-M. Philippe, C. Adeniyi-Jones, J. Setoain, and L. Ceva, “M2DC - A novel heterogeneous hyperscale microserver platform,” in Hardware Accelerators in Data Centers, edited by C. Kachris, B. Falsafi, and D. Soudris, Springer, Cham, 2019, pp. 109-128. DOI: 10.1007/978-3-319-92792-3_6
[21]OData Common Schema Definition Language (CSDL) JSON Representation Version 4.01, OASIS, Tech. Rep., May 11, 2020.
[22]GitHub - openbmc/webui-vue: Web-based user interface built on Vue.js for managing OpenBMC systems. Accessed: July 15, 2022. [Online]. Available: https://github.com/openbmc/webui-vue
[23]GitHub - openbmc/phosphor-webui: Web-based user interface for managing OpenBMC systems. Accessed: July 15, 2022. [Online]. Available: https://github.com/openbmc/phosphor-webui
[24]E. Hojati, J. Hass, A. Sill, and Y. Chen, “Redfish Green500 Benchmarker (RGB): Towards automation of the Green500 process for Data Centers,” in Proc. IEEE Green Technologies Conference (GreenTech), Oklahoma City, OK, USA, pp. 47-52, April 1-3, 2020. DOI: 10.1109/GreenTech46478.2020.9289729
[25]J. Li, G. Ali, N. Nguyen, J. Hass, A. Sill, T. Dang, and Y. Chen, “Monster: An out-of-the-box monitoring tool for high performance computing systems,” in Proc. IEEE International Conference on Cluster Computing (CLUSTER), Kobe, Japan, 2020, pp. 119-129. DOI: 10.1109/CLUSTER49012.2020.00022
[26]Intel Rack Scale Design (RSD). Accessed: July 15, 2022. [Online]. Available: https://www.intel.co.uk/content/www/uk/en/architecture-and-technology/rack-scale-design-overview.html
[27]M. Fowler, Richardson Maturity Model. Accessed: July 15, 2022. [Online]. Available: http://martinfowler.com/articles/richardsonMaturityModel.html
[28]Redfish Schema Supplement, Document Identifier: DSP0268, Version: 2022.1, Date: 2022-04-07. Accessed: July 15, 2022. [Online]. Available: https://www.dmtf.org/sites/default/files/standards/documents/DSP0268_2022.1.pdf
[29]J. Frazelle, “Opening up the baseboard management controller,” Communications of the ACM, vol. 63, no. 2, pp. 38-40, 2020. DOI: 10.1145/3369758
[30]Supermicro, SMT IPMI User’s Guide, Manual Revision 2.3, Release Date: Nov. 19, 2014. Accessed: July 15, 2022. [Online]. Available:http://specs.buho.ch/Server/Supermicro/Supermicro%20IPMI/SMT_IPMI_Manual.pdf
[31]R. Libby, “Effective HPC hardware management and Failure prediction strategy using IPMI,” in Proc. the Linux Symposium, Ottawa, Ontario, Canada, July 23-26, 2003. DOI: 10.1.1.1.7621
[32]J. H. An, Y. Kim, and C. W. Park, “Design of framework supporting IPMI and DCMI based on Open BMC,” in Proc. International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, Sep 20-23, 2017, pp. 298-299. DOI: 10.1145/3129676.3129706
[33]Z. Rongqiang, Bringing the OpenBMC for Platform Management System in Telco Cloud, Master Thesis, Information Technology, Helsinki Metropolia University of Applied Sciences, April 2019.
[34]Y. Jo, C. Park, and K. Kang, “Implementation of next-generation Data Center management standard Redfish,” in Proc. the Korean Society of Computer Information Conference, Korean Society of Computer Information, Jeju, Korea, Dec. 14-16, 2020, pp. 5-6.
[35]P. Palsodkar, M. Wankhede, C. Borkute, A. Chaudhari, B. Waghwani, and P. Palsodkar, “Yocto based home automation using Open BMC platform and RestAPI,” in Proc. IEEE Delhi Section Conference (DELCON), New Delhi, India, Feb. 11-13, 2022, pp. 1-3. DOI: 10.1109/DELCON54057.2022.9753045
[36]O. Salvador and D. Angolini, Embedded Linux Development with Yocto Project, Packt Publishing Ltd., 2014.
[37]A. González, Embedded Linux Projects Using Yocto Project Cookbook, Packt Publishing Ltd., 2015.
[38]A. Vaduva, Learning Embedded Linux Using the Yocto Project, Packt Publishing Ltd., 2015.
[39]O. Salvador and D. Angolini, Embedded Linux Development using Yocto Projects: Learn to Leverage the Power of Yocto Project to Build Efficient Linux-based Products, Packt Publishing Ltd., 2017.
[40]C. Charreyre, “Using Yocto project to build rich and reliable embedded Linux distributions,” in Proc. Embedded Real Time Software (ERTS), Toulouse, France, Feb 5-7. 2014, pp. 1-10.
[41]B. Lin, Y. Chen, X. Chen, and Y. Yu, “Comparison between JSON and XML in applications based on AJAX,” in Proc. International Conference on Computer Science and Service System, Nanjing, China, Aug. 11-13, 2012, pp. 1174-1177. DOI: 10.1109/CSSS.2012.297
[42]A. El-Aziz and A. Kannan, “JSON encryption,” in Proc. International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, INDIA, Jan. 03-05, 2014, pp.1-6. DOI: 10.1109/ICCCI.2014.6921719
[43]JSON, Accessed: July 15, 2022. [Online]. Available: http://www.json.org
[44]N. Nurseitov, M. Paulson, R. Reynolds, and C. Izurieta, “Comparison of JSON and XML data interchange formats: A case study,” in Proc. International Conference on Computer Applications in Industry and Engineering (CAINE), San Francisco, California, USA, Nov. 4-6, 2009.
[45]P. P. S. Chen, “The Entity-Relationship model – toward a unified view of data,” ACM Transactions on Database Systems (TODS), vol. 1, no. 1, March 1976, pp 9-36. DOI: 10.1145/320434.320440
[46]T. J. Teorey, G. Wei, D. L. Bolton, and J. A. Koenig, “ER model clustering as an aid for user communication and documentation in database design,” Communications of the ACM, vol. 32, no. 8, Aug. 1989, pp. 975-987. DOI: 10.1145/65971.65976
[47]A. P. G. Brown, “Modelling a real-world system and designing a schema to represent It,” in Proc. IFIP TC-2 Special Working Conference on Data Base Description, Jan. 13-17, 1975, pp. 339-348.
[48]R. T. Fielding, Architectural Styles and the Design of Network-based Software Architectures, Ph.D. dissertation, Information and Computer Science, University of California, Irvine, CA, USA, 2000.
[49]R. T. Fielding, J. Gettys, J. C. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 2616: Hypertext transfer protocol – HTTP/1.1, June 1999. Status: Standards Track.
[50]L. Dusseault and J. Snell, PATCH Method for HTTP, Internet Engineering Task Force (IETF), Tech. Rep., 2010.
[51]Y. Sheffer and R. Holz, Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), Internet Engineering Task Force (IETF), Tech. Rep., 2015.
[52]E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.3, Internet Engineering Task Force (IETF), Tech. Rep., 2016.
[53]E. Rescorla. “HTTP over TLS,” Internet Engineering Task Force (IETF), Tech. Rep., 2000.
[54]US CERT (2013), Alert TA13-207A, The Risks of Using the Intelligent Platform Management Interface (IPMI), US CERT, July 26, 2013. Accessed: July 15, 2022. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA13-207A
[55]OData – The Best Way to REST. Accessed: July 15, 2022. [Online]. Available: http://www.odata.org/
[56]OASIS Open Data Protocol (OData) TC. Accessed: July 15, 2022. [Online]. Available: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=odata
[57]M. Thoma, T. Kakantousis, and T. Braun, “Rest-based sensor networks with OData,” in Proc. Wireless On-demand Network Systems and Services (WONS), Obergurgl, Austria, April 2-4, 2014, pp. 33-40. DOI: 10.1109/WONS.2014.6814719
[58]D. Chappell, Introducing OData: Data Access for the Web, Cloud, Devices, and More, May 2011, Chappell & Associates. Accessed: July 15, 2022. [Online]. Available: http://www.davidchappell.com/writing/white_papers/Introducing_OData_v1.0--Chappell.pdf
[59]R. Cupek and L. Huczala, “OData for service-oriented business applications: Comparative analysis of communication technologies for flexible Service-Oriented IT architectures,” in Proc. IEEE International Conference on Industrial Technology (ICIT), Seville, Spain, March 17-19, 2015, pp. 1538-1543.DOI: 10.1109/ICIT.2015.7125315
[60]OData Version 4.01. Part 1: Protocol, OASIS, Tech. Rep., April 23, 2020.
[61]P. Kumari, F. Saleem, A. Sill and Y. Chen, “Validation of redfish: the scalable platform management standard,” in Proc. International Conference on Utility and Cloud Computing, Austin Texas, USA, Dec. 5-8, 2017, pp. 113-117.DOI: 10.1145/3147234.3148136
[62]DMTF/Redfish-Service-Validator – GitHub. Accessed: July 15, 2022. [Online]. Available: https://github.com/DMTF/Redfish-Service-Validator
[63]K. Shim, T. K. Sellis, and D. Nau, “Improvements on a heuristic algorithm for multiple-query optimization,” Data & Knowledge Engineering, vol. 12, no. 2, March 1994, pp.197-222. DOI: 10.1016/0169-023X(94)90014-0
[64]M. K. Alsmadi, “Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm,” Journal of King Saud University – Computer and Information Sciences, vol. 30, no. 3, pp. 373-381, 2018.DOI: 10.1016/j.jksuci.2017.05.002
[65]J. M. Chang, “A heuristic approach to distributed query processing,” in Proc. International Conference on Very Large Data Bases, 1982, pp. 54-61.DOI: 10.5555/645910.673452
[66]H. Ma, K. D. Schewe, and M. Kirchberg, “A heuristic approach to vertical fragmentation incorporating query information,” in Proc. International Baltic Conference on Databases and Information Systems (DB&IS), Vilnius, Lithuania, July 3-6, 2006, pp. 69-76. DOI: 10.1109/DBIS.2006.1678477
[67]Z. Qin, L. Liu, and S. Zhang, “Mining term association rules for heuristic query construction,” in Proc. Advances in Knowledge Discovery and Data Mining, Sydney, Australia, pp. 145-154, May. 26-28, 2004. DOI: 10.1007/978-3-540-24775-3_18
[68]R. Elmasri and S. B. Navathe, Fundamentals of Database Systems, 5th Edition, Addison Wesley, 2007.

無法下載圖示 全文公開日期 2024/08/25 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE