Energy Efficiency Evaluation of Local
and Offloaded Data Processing
Victor Prokhorenko, Muhammad Ali Babar
Cyber-foraging
• Borrow and utilise resources more efficiently
– CPU
– Storage
• Latency considerations
• Privacy considerations
• Energy considerations
– Send
– Wait for processing to complete
– Receive
Databases
• MongoDB
– JSON-like document oriented
• Redis
– In-memory key-value storage
• Cassandra
– Wide-column store
• MySQL
– Traditional relational SQL database
YCSB - Yahoo! Cloud Serving Benchmark
• Java-based extensible workload generator
• Multiple database plugins
– Over 40 NoSQL, SQL and JDBC-enabled databases
• Multiple parameters
– Number of records
– Number of operations
– Data distribution
– Record size
– Record contents
Core Workloads
• Workload A - Update heavy workload
●
50% read, 50% write
• Workload B - Read mostly workload
●
95% read, 5% write
• Workload C - Read only
• Workload D - Read latest workload
• Workload E - Short ranges
• Workload F - Read-modify-write
Core Workloads - Sequence
• Generate and load data into the database
• Workload A
• Workload B
• Workload C
• Workload F
• Workload D (Changes number of records in the database)
• Flush database contents
• Load generated data into the database
• Workload F
Energy measurement
• CPU on the client side
• Server side energy is considered “unlimited”
• RAPL technology
• Software model developed by Intel
• High precision
• Provides readings in Joules
Experimental Setup: Hardware
• Regular laptop (Mid-range CPU)
• Powerful node (High-end CPU)
• Cloud infrastructure
Experiment setup: scenarios
• Close proximity – 1.5ms
• Long distance – 50ms
Local processing
Close proximity processing
Local vs. close-proximity offloading (mid-range CPU)
Local vs. close-proximity offloading (high-end CPU)
Power consumption for workload A vs. threads
Conclusion and lessons learnt
• Redis is very intolerant to high latency
• Redis is unsuitable for workload E (short ranges)
• Data offloading only makes sense under two conditions
• Weak local CPU and significantly more powerful remote CPU
• Low network latency
• RAPL readings may overflow quickly on powerful CPUs (~20 minutes)
• 100% CPU utilisation is not achieved by all databases
• Network transmission and encryption overheads are negligible (~2%)
Future work directions and enhancements
• Other CPU architectures and types (AMD, ARM)
• Fine-grained measurements Rest of system energy usage tracking
– RAM
– Disk
– Rest of the system
• Consider other Operating Systems
– OS-specific configuration tweaking
• Tweaking databases configuration parameters
CRICOS 00123M

More Related Content

PPTX
Hadoop Distributed File System
PDF
NoSQL – Data Center Centric Application Enablement
PPTX
Capacity Planning
PPTX
MongoDB Capacity Planning
PPTX
Hadoop ppt on the basics and architecture
PDF
TechTarget Event - Storage Architectures for the Modern Data Center - Howard ...
PPTX
The Evolution of the Oracle Database - Then, Now and Later (Fontys Hogeschool...
PPTX
AWS re:Invent 2013 Recap
Hadoop Distributed File System
NoSQL – Data Center Centric Application Enablement
Capacity Planning
MongoDB Capacity Planning
Hadoop ppt on the basics and architecture
TechTarget Event - Storage Architectures for the Modern Data Center - Howard ...
The Evolution of the Oracle Database - Then, Now and Later (Fontys Hogeschool...
AWS re:Invent 2013 Recap

Similar to Energy Efficiency Evaluation of Local and Offloaded Data Processing (20)

PPTX
PEARC 17: Spark On the ARC
PPT
PDF
Tuning Linux Windows and Firebird for Heavy Workload
PDF
Cassandra Core Concepts
PPTX
Bigdata workshop february 2015
PDF
(ATS6-PLAT06) Maximizing AEP Performance
PPTX
Big data talk barcelona - jsr - jc
PPTX
Pascal benois performance_troubleshooting-spsbe18
PDF
Drill architecture 20120913
PPTX
Webinar: Capacity Planning
PDF
Gruter TECHDAY 2014 Realtime Processing in Telco
PPTX
High Performance Computing Presentation
PPTX
Architectural tricks to maximize memory bandwidth
PPTX
Apache Tez : Accelerating Hadoop Query Processing
PDF
OSDC 2010 | MySQL and InnoDB Performance - what we know, what we don't by Ba...
PDF
MySQL 和 InnoDB 性能
PPT
HDFS_architecture.ppt
PDF
MongoDB Capacity Planning
PPT
Speeding Up The Snail
PDF
Distributed Computing with Apache Hadoop: Technology Overview
PEARC 17: Spark On the ARC
Tuning Linux Windows and Firebird for Heavy Workload
Cassandra Core Concepts
Bigdata workshop february 2015
(ATS6-PLAT06) Maximizing AEP Performance
Big data talk barcelona - jsr - jc
Pascal benois performance_troubleshooting-spsbe18
Drill architecture 20120913
Webinar: Capacity Planning
Gruter TECHDAY 2014 Realtime Processing in Telco
High Performance Computing Presentation
Architectural tricks to maximize memory bandwidth
Apache Tez : Accelerating Hadoop Query Processing
OSDC 2010 | MySQL and InnoDB Performance - what we know, what we don't by Ba...
MySQL 和 InnoDB 性能
HDFS_architecture.ppt
MongoDB Capacity Planning
Speeding Up The Snail
Distributed Computing with Apache Hadoop: Technology Overview
Ad

More from CREST (20)

PDF
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
PPTX
Making Software and Software Engineering visible
PPTX
Understanding and Addressing Architectural Challenges of Cloud- Based Systems
PPTX
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
PPTX
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
PPTX
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
PPTX
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
PPTX
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
PPTX
Falling for Phishing: An Empirical Investigation into People's Email Response...
PPTX
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
PPTX
Gazealytics: A Unified and Flexible Visual Toolkit for Exploratory and Compar...
PPTX
Detecting Misuses of Security APIs: A Systematic Review
PPTX
Chen_Reading Strategies for Graph Visualizations that Wrap Around in Torus To...
PPTX
Data Quality for Software Vulnerability Dataset
PPTX
Mod2Dash Presentation
PDF
Run-time Patching and updating Impact Estimation
PDF
ECSA 2023 Ubuntu Case Study
PPTX
Designing Quality-Driven Blockchain Networks
PPTX
Privacy Engineering in the Wild
PPTX
Security Data Quality Challenges
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Making Software and Software Engineering visible
Understanding and Addressing Architectural Challenges of Cloud- Based Systems
DevSecOps: Continuous Engineering with Security by Design: Challenges and Sol...
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Falling for Phishing: An Empirical Investigation into People's Email Response...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
Gazealytics: A Unified and Flexible Visual Toolkit for Exploratory and Compar...
Detecting Misuses of Security APIs: A Systematic Review
Chen_Reading Strategies for Graph Visualizations that Wrap Around in Torus To...
Data Quality for Software Vulnerability Dataset
Mod2Dash Presentation
Run-time Patching and updating Impact Estimation
ECSA 2023 Ubuntu Case Study
Designing Quality-Driven Blockchain Networks
Privacy Engineering in the Wild
Security Data Quality Challenges
Ad

Recently uploaded (20)

PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
Introduction to Windows Operating System
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Time Tracking Features That Teams and Organizations Actually Need
PPTX
Cybersecurity: Protecting the Digital World
PPTX
GSA Content Generator Crack (2025 Latest)
PDF
Cost to Outsource Software Development in 2025
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Microsoft Office 365 Crack Download Free
PPTX
Tech Workshop Escape Room Tech Workshop
Patient Appointment Booking in Odoo with online payment
Introduction to Windows Operating System
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
DNT Brochure 2025 – ISV Solutions @ D365
"Secure File Sharing Solutions on AWS".pptx
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Computer Software and OS of computer science of grade 11.pptx
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Time Tracking Features That Teams and Organizations Actually Need
Cybersecurity: Protecting the Digital World
GSA Content Generator Crack (2025 Latest)
Cost to Outsource Software Development in 2025
Topaz Photo AI Crack New Download (Latest 2025)
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Microsoft Office 365 Crack Download Free
Tech Workshop Escape Room Tech Workshop

Energy Efficiency Evaluation of Local and Offloaded Data Processing

  • 1. Energy Efficiency Evaluation of Local and Offloaded Data Processing Victor Prokhorenko, Muhammad Ali Babar
  • 2. Cyber-foraging • Borrow and utilise resources more efficiently – CPU – Storage • Latency considerations • Privacy considerations • Energy considerations – Send – Wait for processing to complete – Receive
  • 3. Databases • MongoDB – JSON-like document oriented • Redis – In-memory key-value storage • Cassandra – Wide-column store • MySQL – Traditional relational SQL database
  • 4. YCSB - Yahoo! Cloud Serving Benchmark • Java-based extensible workload generator • Multiple database plugins – Over 40 NoSQL, SQL and JDBC-enabled databases • Multiple parameters – Number of records – Number of operations – Data distribution – Record size – Record contents
  • 5. Core Workloads • Workload A - Update heavy workload ● 50% read, 50% write • Workload B - Read mostly workload ● 95% read, 5% write • Workload C - Read only • Workload D - Read latest workload • Workload E - Short ranges • Workload F - Read-modify-write
  • 6. Core Workloads - Sequence • Generate and load data into the database • Workload A • Workload B • Workload C • Workload F • Workload D (Changes number of records in the database) • Flush database contents • Load generated data into the database • Workload F
  • 7. Energy measurement • CPU on the client side • Server side energy is considered “unlimited” • RAPL technology • Software model developed by Intel • High precision • Provides readings in Joules
  • 8. Experimental Setup: Hardware • Regular laptop (Mid-range CPU) • Powerful node (High-end CPU) • Cloud infrastructure
  • 9. Experiment setup: scenarios • Close proximity – 1.5ms • Long distance – 50ms
  • 12. Local vs. close-proximity offloading (mid-range CPU)
  • 13. Local vs. close-proximity offloading (high-end CPU)
  • 14. Power consumption for workload A vs. threads
  • 15. Conclusion and lessons learnt • Redis is very intolerant to high latency • Redis is unsuitable for workload E (short ranges) • Data offloading only makes sense under two conditions • Weak local CPU and significantly more powerful remote CPU • Low network latency • RAPL readings may overflow quickly on powerful CPUs (~20 minutes) • 100% CPU utilisation is not achieved by all databases • Network transmission and encryption overheads are negligible (~2%)
  • 16. Future work directions and enhancements • Other CPU architectures and types (AMD, ARM) • Fine-grained measurements Rest of system energy usage tracking – RAM – Disk – Rest of the system • Consider other Operating Systems – OS-specific configuration tweaking • Tweaking databases configuration parameters