Understanding and Managing IT Power Consumption: A Measurement-Based Approach

  • Ada Gavrilovska
  • Karsten Schwan
  • Hrishikesh Amur
  • Bhavani Krishnan
  • Jhenkar Vidyashankar
  • Chengwei Wang
  • Matt Wolf


The continuing, unsustainable increase in datacenter power consumption is causing researchers in industry and academia to be heavily invested in addressing power management challenges. This chapter presents the basic elements of a measurement-based approach toward managing distributed datacenter and cloud computing systems to meet both application and end-user needs and to obtain improved efficiency and sustainability in their operation. The main components of the approach presented include (1) continuous online monitoring, measurement and assessment of systems and applications behaviors and power consumption, including for online estimation of the power usage of virtual machines running application components in these virtualized systems; (2) the ability to perform these tasks efficiently at scale, so as to deal with the ever-increasing sizes and complexity of modern datacenter infrastructures; and (3) the importance of “coordinated” management methods that operate across multiple levels of abstraction and multiple layers of the management stack in an orchestrated manner.


Virtual Machine Power Usage Virtual Machine Migration Cloud Computing System Simple Network Management Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kansal A, Kothari N, Bhattacharya A (2010) Virtual machine power metering and provisioning. In: ACM symposium on cloud computing SOCC, 2010Google Scholar
  2. 2.
    Bohra A, Chaudhary V (2010) VMeter: power modelling for virtualized clouds. In: Workshop on high-performance, power-aware computing (HPPAC), in conjunction with the international parallel and distributed processing symposium, 2010Google Scholar
  3. 3.
    Nathuji R, Somani A, Schwan K, Joshi Y (2008) CoolIT: coordinating facility and IT management for efficient datacenters. In: HotPower, in conjunction with the USENIX annual technical conference, 2008Google Scholar
  4. 4.
    IBM, Syracuse University New York State to build one of the world’s most energy-efficient datacenters,, 2009
  5. 5.
    Das R, Kephart JO, Lenchner J, Hamann H (2010) Utility-function-driven energy-efficient cooling in datacenters. In: International conference on autonomic computing, June, 2010Google Scholar
  6. 6.
    HP datacenter management solution reduces costs by 34 percent,, 2007
  7. 7.
    IBM helps clients “meter” datacenter power usage to help lower energy costs,, 2006
  8. 8.
    Nathuji R, Schwan K (2008) VPM tokens: virtual machine-aware power budgeting in datacenters. In: Proceedings of high performance and distributed computing HPDC, 2008Google Scholar
  9. 9.
    Samadiani E, Amur H, Krishnan B, and Schwan K. Coordinated Optimization of Cooling and IT Power in Datacenters. ASME Journal of Electronics Packaging, 2010Google Scholar
  10. 10.
    Kumar S, Talwar V, Kumar V, Ranganathan P, Schwan K (2009) vManage: loosely-coupled platform and virtualization management in datacenters. In: International conference on autonomic computing ICAC, 2009Google Scholar
  11. 11.
    Kusic D, Kephart J, Hanson J, Kandasamy N, Jiang G (2008) Power and performance management of virtualized computing environments via lookahead control. In: International conference on autonomic computing ICAC, 2008Google Scholar
  12. 12.
    Agarwala S, Routray R, Uttamchandani S (2008) ChargeView: an integrated tool for implementing chargeback in IT systems. In: Network operations and management symposium NOMS, 2008Google Scholar
  13. 13.
    Corrigan K, Shah A, Patel C (2010). Estimating environmental costs. In: SustainIT – workshop on sustainable information technology, 2010Google Scholar
  14. 14.
    Ferrero RW, Shahidehpour SM, Ramesh VC (1997) Transactional analysis in deregulated power systems using game theory. IEEE Transactions on power systems 12(3):1340–1347CrossRefGoogle Scholar
  15. 15.
    Clark C, Fraser K, Hand S, Hasen JG, Jul E, Limpach C, Pratt I, Warfield A (2005). Live migration of virtual machines. In: Proceedings of the symposium on networked systems design and implementation (NSDI), May 2005Google Scholar
  16. 16.
    The VMware ESX Server.
  17. 17.
    Microsoft Hyper-V Server.
  18. 18.
    Xen Open Source Hypervisor.
  19. 19.
  20. 20.
    Amazon Elastic Compute Cloud (EC2).
  21. 21.
    Open Cirrus HP/Intel/Yahoo open cloud computing research testbed,
  22. 22.
    Apte R, Hu L, Schwan K, Ghosh A (2010) Look who’s talking: discovering dependencies between virtual machines using CPU utilization. In: HotCloud, in conjunction with USENIX annual technical conference, 2010Google Scholar
  23. 23.
    Carter J (2010) Looming challenges in server and datacenter energy efficiency. One researcher’s perspective. In: CERCS energy workshop, 2010Google Scholar
  24. 24.
    Koller R, Verma A, Neogi A (2010) WattApp: an application aware power meter for shared datacenters. In: International conference on autonomic computing, 2010Google Scholar
  25. 25.
    Menon A, Santos JR, Turner Y, Janakiraman G, Zwaenepoel W (2005) Diagnosing performance overheads in the Xen virtual machine environment. In: USENIX annual technical conference, 2005Google Scholar
  26. 26.
    Mahadevan P, Sharma P, Banerjee S, Ranganathan P (2009) A power benchmarking framework for network devices. In: Networking, 2009Google Scholar
  27. 27.
    Krishnan B, Amur H, Gavrilovska A, Schwan K (2010) VM power metering: feasibility and challenges. In: GreenMetrics, 2010Google Scholar
  28. 28.
    Lim MY, Porterfield A, Fowler R (2010) SoftPower: fine-grain power estimation using performance counter. In: High performance and distributed computing HPDC, 2010Google Scholar
  29. 29.
    Common information model distributed management task force CIM-DMTF.
  30. 30.
    Massie ML, Chun BN, Culler DE (2004) The ganglia distributed monitoring system: design, implementation and experience. Parallel Computing 30:817–840CrossRefGoogle Scholar
  31. 31.
    Renesse RV, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management and data mining. ACM Transactions on Computer Systems 21(2):164–206CrossRefGoogle Scholar
  32. 32.
    Strom R, Banavar G, Chandra T, Kaplan M, Miller K, Mukherjee B, Sturman D, Ward M (1998) Gryphon: an information flow based approach to message brokering. In: International symposium on software reliability engineering, 1998Google Scholar
  33. 33.
    Wang C, Talwar V, Schwan K, Ranganathan P (2010) Online detection of utility cloud anomalies using metric distributions. In: Network operations and management symposium NOMS, 2010Google Scholar
  34. 34.
    Liang J, Ko SY, Gupta I, Nahrstedt K (2005) MON: on-demand overlays for distributed systems management. In: Workshop on real, large distributed sytems, 2005Google Scholar
  35. 35.
    Boulon J, Konwinski A, Qi R, Rabkin A, Yang E, Yang M (2008) Chukwa: a large scale monitoring system. In: Cloud computing and its applications, 2008Google Scholar
  36. 36.
    Ko SY, Yalagandula P, Gupta I, Talwar V, Milojicic D, Iyer S (2008) Moara: flexible and scalable group based querying systems. In: International conference on middleware, 2008Google Scholar
  37. 37.
    Druschel P, Rowstron A (2001) Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. In: International conference on distributed systems platforms (Middleware), 2001Google Scholar
  38. 38.
    Rowstron A, Kermarrec A.-M, Castro M, Druschel P (2001) SCRIBE: the design of a large-scale event notification infrastructure. In: International workshop on networked group communication, 2001Google Scholar
  39. 39.
    HP integrated lights out (iLO).
  40. 40.
    Cecchet E, Marguerite J, Zwaenepoel W (2002) Performance and scalability of EJB applications. In: International symposium on object oriented programming, systems, languages and applications OOPSLA, 2002Google Scholar
  41. 41.
    HP systems insight manager,
  42. 42.
  43. 43.
    Nagios – industry standard in open source monitoring,
  44. 44.
  45. 45.
    Candea G, Kawamoto S, Fujiki Y, Friedman G, Fox A (2004) Microreboot – a technique for cheap recovery. In: Symposium on operating systems design and implementation OSDI, 2004Google Scholar
  46. 46.
    Cohen I, Goldszmidt M, Kelly T, Symons J, Chase JS (2004) Correlating instrumentation data to system states: a building block for automated diagnosis and control. In: Symposium on operating systems design and implementation OSDI, 2004Google Scholar
  47. 47.
    Aguilera MK, Mogul JC, Wiener JL, Reynolds P, Muthitacharoen A (2003) Performance debugging for distributed systems of black boxes. In: Symposium on operating systems principles SOSP’03, 2003Google Scholar
  48. 48.
    Chen MY, Kiciman E, Fratkin E, Fox A, Brewer E (2002) Pinpoint: problem determination in large, dynamic internet services. In: Dependable systems and networks DSN, 2002Google Scholar
  49. 49.
    Barham P, Donnelly A, Isaacs R, Mortier R (2004) Using magpie for request extraction and workload modelling. In: Symposium on operating systems design and implementation OSDI’04, 2004Google Scholar
  50. 50.
    Kumar V, Schwan K, Iyer S, Chen Y, Sahai A (2008) A state-space approach to SLA-based management. In: Network operations and management symposium NOMS, 2008Google Scholar
  51. 51.
    Agarwala S, Alegre F, Schwan K, Mehalingham J (2007) E2EProf: automated end-to-end performance management for enterprise systems. In: Dependable systems and network DSN, 2007Google Scholar
  52. 52.
    Agarwala S, Schwan K (2006) SysProf: online distributed behavior diagnosis through fine-grain system monitoring. In: International conference on distributed computing systems ICDCS, 2006Google Scholar
  53. 53.
    Bahl P, Chandra R, Greenberg A, Kandula S, Maltz DA, Zhang M (2007) Towards highly reliable enterprise network services via inference of multi-level dependencies. In: SIGCOMM, 2007Google Scholar
  54. 54.
    Arpaci-Dusseau AC, Arpaci-Dusseau RH (2001) Information and control in gray-box systems. In: Symposium on operating systems principles SOSP, 2001Google Scholar
  55. 55.
    Nugent JA, Arpaci-Dusseau AC, Arpaci-Dusseau RH (2003) Controlling your place in the file system with gray-box techniques. In: USENIX annual technical conference, general track, 2003, pp. 311–323Google Scholar
  56. 56.
    Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. In: SIGCOMM, 2005Google Scholar
  57. 57.
    Lakhina A, Crovella M, Diot C (2004) Diagnosing network-wide traffic anomalies, In: SIGCOMM, 2004Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Ada Gavrilovska
    • 1
  • Karsten Schwan
    • 1
  • Hrishikesh Amur
    • 1
  • Bhavani Krishnan
    • 1
  • Jhenkar Vidyashankar
    • 1
  • Chengwei Wang
    • 1
  • Matt Wolf
    • 1
  1. 1.Center for Experimental Research in Computer Systems, School of Computer Science, College of ComputingGeorgia Institute of TechnologyAtlantaUSA

Personalised recommendations