Welcome!

Mobile IoT Authors: Elizabeth White, Zakia Bouachraoui, Yeshim Deniz, Pat Romanski, Liz McMillan

Related Topics: Mobile IoT, Containers Expo Blog

Mobile IoT: Article

Virtualization Economics: Balancing Efficiency and Risk

Virtualization significantly changes the economics of constructing and operating IT environments

The fact that virtualization can have a positive impact on total cost of ownership is not new to those familiar with designing and managing IT environments. Many of the contributors to these cost savings, such as reduction in physical hardware and the corresponding savings in power and cooling, are key drivers for virtualization initiatives, and feature prominently in many ROI models. But these factors are just the beginning when it comes to the savings that can be realized with virtualization - having highly efficient assets provides the "first wave" of efficiency, but being extremely clever about how those assets are used is where the next wave of savings can be found.

Making Clever Use of Assets
To illustrate this it is useful to look to other industries that make clever use of assets. In the early days of shipping and logistics the time to deliver goods was measured in weeks, as ships plied the world's oceans to enable global trade. With the advent of the airplane it became possible to move goods much more quickly, reducing the end-to-end time to deliver some items (such as airmail) to days. But the use of these revolutionary assets alone was not enough to enable overnight delivery - sheer speed would not help you if there was not an airplane going in the right direction at the right time. To achieve the modern notion of overnight delivery it was necessary to introduce planning models that make extremely clever use of these assets, allowing their speed and agility to be leveraged to the benefit of end customers. The very same is true of the data center, where the use of virtualization must be combined with the right planning models in order to reach the highest levels of efficiency.

Although there is a direct analogy between this example and the data center, there is another element that must be considered in data center management: risk.  To illustrate how risk factors into the equation there is another analogy that also provides useful insight into the dynamics of virtualization, and it too involves airplanes.  When commercial airlines strive to make the best use of their assets they invariably employ a technique referred to as "overbooking", where they essentially sell more tickets than there are seats on a plane.  They do this because they know that a certain percentage of passengers will typically not show up, and it is in their interest to make efficient use of their aircraft by filling all the seats.  But by doing so they are assuming a certain amount of risk; if more passengers show up than is typical they end up angering customers and footing the bill for hotel rooms.  In other words, this is actually a way of balancing the efficiency associated with full aircraft and the risk associated with customer satisfaction and financial penalties, and clearly illustrates the potentially inverse relationship between the two.

Workload Placements and Allocations
Turning our attention back to the data center, these two analogies provide some very useful insights into the economics of virtualization. First, by making clever use of virtualized environments, a second wave of efficiency can be achieved beyond the initial consolidation benefits. Second, to reach this optimal level of efficiency it is necessary to understand the tradeoff between efficiency and risk and to start asking some tough questions, such as how much operational risk is acceptable to achieve a certain gain in efficiency within a specific business service (see Figure 1).

In virtual environments the main mechanism to achieving these goals is through the proper management of placements and allocations. Placements define where virtual workloads are running at a given point in time (i.e., which VMs are on which physical host) and allocations define what share of the physical resources that workload is entitled to (e.g., CPU limits, memory reservations). These two capabilities are at the core of capacity management in virtual environments and enable accurate alignment of supply and demand that is simply not possible in physical environments.

This leads to one of the greatest challenges currently facing capacity management in the data center. Because the ability to continuously align supply and demand is new, capacity management solutions rooted in the physical world are ill-equipped to deal with these new management challenges. Because proper capacity management is now critical to achieving high efficiency and realizing the corresponding financial savings, a lot of potential savings are lost as virtual environments are left to run in sub-optimal states. Applying too much supply to a given demand (overprovisioning) is extremely common and wastes valuable resources. Less common but perhaps more dangerous - applying too little supply to a given demand (underprovisioning) runs the risk of performance degradation and even failure, potentially incurring financial penalties (see Figure 2). Without the proper techniques to strike the right balance, the true benefits of virtualization often go unrealized.

Properly Aligning Supply and Demand
There are several factors that govern where workloads should be placed and how they will interact with each other. By properly considering all of these factors, it is possible to actively manage virtual environments in a way that is both safe and highly efficient. It should be noted that the terms "safe" and "highly efficient" are purely subjective, and part of the challenge in aligning supply and demand is determining what constitutes "safe" for a given application or business service, which is turn dictates what can be considered "efficient" in that particular case.

The following areas hold the key to unlocking efficiency and managing risk in virtual environments:

What Constraints Affect Workload Placement?
Under ideal circumstances, virtual environments allow workloads to be placed on any physical host. Unfortunately, data centers and production environments rarely provide ideal circumstances, and there are typically a series of constraints that limit the free movement of workloads. These will in turn impact efficiency, as it places limitations on placements that may in turn limit efficiency. These constraints generally fall into three categories: Technical Constraints, Business Constraints and Resource Constraints.

Technical Constraints typically arise from compatibilities between technologies, connectivity between systems or other technical requirements, and limitations impacting the particular IT environment and the virtualization technology deployed. For example, VLAN or storage connectivity may impact which VMs can go on which servers, thus constraining the solution. Business (or Non-Technical) Constraints often stem from organizational, regulatory, security, process and even political requirements. Some of these are non-negotiable, such as limitations on the mobility of customer data, while others can be analyzed to determine if greater efficiency can be achieved by challenging certain business assumptions and lifting certain constraints. Finally, Resource Constraints arise from the fact that physical hosts can only perform a finite amount of work, and placing more workloads on a system than it can handle is generally not advised. This, however, is an oversimplification, as different workloads have different requirements when it comes to performance and availability, thus providing a number of potential opportunities to drive higher efficiency.

What Are the Application Performance Requirements?
The level of performance required by an application or business service is also a critical factor when striving for high efficiency, as it tends to limit the density of workloads. Certain workloads follow predictable, repeatable patterns and can be combined to a higher density than unpredictable, more "random" workloads can. Also, many workloads exhibit peak activity levels that are different from their "sustained" activity, creating a situation where capacity may go unused during periods of low activity. How these situations are dealt with when virtualizing systems is largely dependent on how well the applications in question need to perform.

For applications that don't need to perform well, such as low priority batch jobs and many dev/test applications, sustained levels of utilization can often be used as the determining factor when "stacking" workloads. The resulting virtual environments will be sized to handle the majority of the activity occurring on the VMs, but will likely become saturated when peak activity levels occur. This is not necessarily a problem - it simply means that the applications will perform very poorly at certain times of day, which may be a worthwhile tradeoff given the efficiency that higher VM densities creates.

For applications where performance is a concern, using peak utilization levels (or a weighted scorecard of peak and sustained activity) is advisable as it provides some level of assurance that applications will get the resources they need when they need them. This approach, however, raises a new question: How much assurance is necessary for a given environment? Just as it is wasteful to run applications at 99.999% availability if they don't need it, it is also wasteful to design virtual environments to unnecessarily low "risk tolerances" as it lowers VM densities. Finding the balance between efficiency and risk in this case requires analysis of Contention Probability, or the probability of two or more workloads contending for resources at the busiest times of the operational cycle. Determining what level of contention risk is appropriate for a given environment involves making some difficult decisions, but can have tremendous impact on efficiency (see Figure 3). For example, rather than being completely risk averse, in some environments it is possible to double virtualization ratios by simply assuming a 1% risk tolerance. In other words, being overly safe has a significant price tag that may not be justifiable for a given application or business service.

Conclusion
Virtualization significantly changes the economics of constructing and operating IT environments. But the gains in efficiency that lead to greatest cost savings don't come easily. To realize these gains it's necessary to take a careful look at risk and specifically at how much operational risk, if any, can be tolerated in the name of efficiency. By considering this as an input to the planning process, it is possible to safely walk the line between overprovisioning and underprovisioning, striking a balance between efficiency and risk that unlocks the next wave of efficiency in IT environments.

More Stories By Andrew Hillier

Andrew Hillier is CTO and co-founder of CiRBA, Inc., a data center intelligence analytics software provider that determines optimal workload placements and resource allocations required to safely maximize the efficiency of Cloud, virtual and physical infrastructure. Reach Andrew at [email protected]

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
SYS-CON Events announced today that IoT Global Network has been named “Media Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. The IoT Global Network is a platform where you can connect with industry experts and network across the IoT community to build the successful IoT business of the future.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...