You are on page 1of 3

news

Technology | DOI:10.1145/3005680 Chris Edwards

Containers Push Toward


the Mayfly Server
The container revolution represents a large-scale shift
in thinking about multitasking systems.

T
H E D RI VE FO Refficiency in
servers is changing the way
applications and operating
systems interact. The proc- Container Service Container
ess has accelerated in just
the past five years, as server-farm op-
Container Mounted
erators have moved on from virtual-
machine technology as a way of improv-
ing hardware utilization toward even Container Volume
more streamlined options. The work
has led as far as the operating system
and application being compiled into Host node Host node
one block of software and stripping
out any unused services to reduce both Link
memory footprint and startup times.
Speaking about a project he and
fellow researcher Anil Madhavapeddy Container Container
worked on to pursue more efficient
server software, Richard Mortier, Uni- Container Container
versity Lecturer in the University of
Cambridges Computer Laboratory, Service
says: The original motivation that Anil
and I had was that you should be able Volume
to write software for the cloud, particu-
larly for network-connected services. Host node Host node
But if we were to do that, what would
it look like? Related to that was the
idea that it should be possible to build
Cluster
software without having to worry about A container-based virtualization architecture.
what platform it was targeted for.
To a limited extent, the move to vir- Docker, removes a lot of this overhead ating system running on bare metal.
tualization provided an answer for the by sharing one operating system im- Virtualized installations imposed a
second problem. Virtualization lets age among multiple partitions. Each performance penalty for I/O-intensive
completely different operating systems container only stores the additional applications, although improvements
CHA RT BY CL AUS PAH L, F ROM CONTA INERIZATION A ND T H E PA AS CLO UD

and their associated applications share services and tasks required by the ap- in hardware support for virtualization
the same processors on a server blade. plications they hold, which can greatly have narrowed the performance gap.
A hypervisor manages and schedules reduce the memory footprint. Runtime Even as the performance gap has re-
the operating systems running within also improves because full virtualiza- duced, the growing base of support soft-
each virtual machine (VM). tion demands multiple context switch- ware that has emerged around Docker
The problem with virtualization is es whenever I/O calls are made. Not and its competitors has bolstered mar-
that each VM partition calls for a com- only does the operating system need to ket acceptance of containers. Orches-
plete installation of the operating sys- switch into a supervisor mode to handle tration software, such as Googles Ku-
tem and its support software, even if I/O, the hypervisor itself forces a switch bernetes or Apaches Mesos, has given
those partitions run the same versions to a more heavily protected mode in large users of server farms the ability to
and differ only terms of the applica- order to service the I/O request. quickly start containers and to delete
tions they or the users who own them Studies by Ericsson and IBM have them just as rapidly. Chris Aniszczyk,
utilize. The container, an approach found containers to have little more interim executive director of the Cloud
popularized by companies such as overhead than a conventional oper- Native Computing Foundation and for-

24 COMM UNICATIO NS O F THE ACM | D EC EM BER 201 6 | VO L . 5 9 | N O. 1 2


news

mer engineering manager at Twitter, for something that potentially can re-
a major user of Mesos, says the aver- shape how server-based computing is
age container-based workload at the Mortier says done. Docker has signaled its willing-
social-media company ran for just 10 the rapid creation ness to investigate the wider adoption
minutes of execution time. of unikernels through its purchase of
A variety of open source projects and deletion of Unikernel Systems, a spinout from re-
have emerged that build on top of or- unikernal-based search at the University of Cambridge.
chestration. Services will find the best Mortier says unikernels are unlike-
mixture of hardware for a given group systems could ly to be used in isolation, but will be
of containers and link them to data enhance security aimed at particular jobs where security
stores. Monitoring and logging servic- or performance are most important.
es ensure the containers run correctly by moving resources There is an assumption here that ev-
and trigger remedial action if things around the network. erything is networked, he adds.
go wrong. But as the layers of software An experimental installation at
around orchestration build up, they the university is divided into micro-
cause a divergence between develop- services provided by a group of net-
ment and deployment. worked processors. Conventional con-
Casey Bisson, director of product tainers host services such as Media-
management at cloud computing tem that are needed are incorporated Wiki, with unikernels used to handle
service provider Joyent, says it has into the image. Mortier says the model redirection to HTTPS addresses and the
become more difficult for develop- provides better security because the transaction-layer security (TLS) protocol
ers to emulate an orchestration envi- unikernel has a much smaller attack itself. The relatively low overhead of the
ronment that can greatly affect how surface than a full operating system unikernel software makes it possible to
containerized applications run when and its attendant libraries. create them for single transactions.
deployed to servers. We have to make Although in many cases the uniker- One 2015 experiment on a system
the orchestration software laptop nel will run on directly on the host pro- called Jitsu reduced boot time to 20ms
more friendly, he says. cessor with no intervening software, on an Intel server processor, compared
The unikernel architecture devel- proponents envision implementations to five seconds for a conventional web-
oped at the University of Cambridge where multiple unikernels share one server running on a VM. Mortier says the
aims to help solve the problem of processor using hardware-assisted vir- rapid creation and deletion of uniker-
achieving platform independence. tualization. The lack of layering and nel-based services could enhance secu-
Today, we write software that em- software duplication should make the rity by moving resources around the net-
beds assumptions about the execution installation more efficient than tradi- work. There is no stable machine that
platform. If you need to change the tional techniques. can be targeted, he claims.
platform, at best you need to recom- Bryan Cantrill, chief technology of- The rapid movement of software and
pile; worst case, it calls for a rewrite, ficer of Joyent, argues the restrictions microservices around the network cre-
Mortier says. One of the concepts be- of unikernels are too great to bear, ates its own problems. Midokura sys-
hind unikernels is that you are pushing decrying the idea as a move back to tems engineer Cynthia Thomas points
these things into the toolchain. the days of single-tasking operat- to issues such as traffic trombon-
Mortier says the unikernel borrows ing systems such as DOS. The lack of ing, in which traffic between micro-
from the library operating system and multitasking within the unikernel services and their data stores crisscross
exokernel research of the 1990s. It makes it difficult to run standard de- the network many times, making the
should be possible to do better than we bug tools, he says. Mortier points out connections look like the folded pipes
are now. If you look at how hardware it is possible to link debug and trace in a brass instrument.
resources are handled today, you have libraries into the executable, and ad- The tromboning effect not only in-
hardware thats abstracted through ditional tooling is likely to develop to creases the response time as perceived
a virtual-machine hypervisor. Then it support unikernels. by the user, but can cause the address
goes through the operating system ker- A further apparent downside of the tables in networking equipment to
nel, the language runtime, and then first generation of unikernels is that run out of space because of the larger
more libraries on top. You have four or they are designed for single languages number of live connections they need
five layers of scheduling all trying to do that use strong typing, such as Haskell to maintain between services that pre-
the same thing. It seems a bit ridicu- and OCaml. Yet unikernel projects viously would have been hosted on a
lous, he argues. such as RumpRun have opened the single machine. The support software
The unikernel bakes the applica- field to a wider range of languages and for orchestration software is evolving
tion and the operating system into one software by supporting software that hand-in-hand with virtual networking
executable image, removing most of uses the same Posix interfaces as those software to create dynamic clusters of
the layers between them. To prepare provided by operating systems such microservices that make better use of
the unikernel, a compiler analyzes the as BSD. The Cambridge group favored the underlying network hardware.
application for its dependencies so OCaml because it made sense to them Although unikernels could be im-
only those parts of the operating sys- to focus on more modern languages prove security at several levels, one po-

DEC E MB E R 2 0 1 6 | VO L. 59 | N O. 1 2 | C OM M U N IC AT ION S OF T HE ACM 25


news

tential disadvantage of the containers in 2014 monitored contention in the


that continue to run alongside those cache to listen in on applications run- Further Reading
unikernels is the weakening of security ning in other containers. Morabito, R.
compared to traditional VM environ- The Cloud Native Computing Foun- Power Consumption of Virtualization
ments. Most container platforms today dations Aniszczyk points out that the Technologies: An Empirical Investigation,
use only software protection for isola- rapid creation and deletion of ser- Proceedings of the 8th IEEE/ACM
International Conference on Utility and
tion, and do not have recourse to the vices containers encourage makes it Cloud Computing (2015).
hardware enforcement available with a more feasible to run them exclusively
Madhavapeddy, A., et al
hypervisor-based VM environment. on their target hardware. As a result, Jitsu: Just-in-Time Summoning of
Environments such as Docker use timeslicing moves from being per- Unikernels, 12th USENIX Symposium
kernel-provided namespaces to pro- formed on the order of tens of milli- of Networked System Design and
vide software in each container with seconds to that of minutes. It supports Implementation (NSDI15), 559-573
the illusion it is the sole inhabitant a model where server-farm operators Engler, D.R., Kaashoek, M. F., and OToole, Jr., J.
of the Linux system it sees. In princi- can dynamically allocate entire blades Exokernel: An Operating System
ple, and as long there are no security to an application for the seconds or Architecture for Application-Level Resource
Management, Proceedings of the fifteenth
vulnerabilities in the underlying con- minutes it needs to run. ACM Symposium on Operating Systems
tainer software or operating system With availability comes flexibil- Principles: 25166 (1995).
to exploit, the containerized applica- ity and dynamism, says Mortier. You
Zhang, Y., Juels, A., Reiter, M., and Ristenpart, T.
tion has no way to alter data in other can scale up and down quickly. Cross-Tenant Side-Channel Attacks in PaaS
containers running alongside it on the In this way, the container revolu- Clouds, Proceedings of CCS14, 990
processor blade. However, researchers tion represents a large-scale shift
have published proof-of-concept at- in thinking about multitasking sys- Chris Edwards is a Surrey, U.K.-based writer who reports
on electronics, IT, and synthetic biology.
tacks that use side-channel techniques temsone that treats compute as a
to eavesdrop on neighboring contain- resource made abundant by Moores
ers. An attack published by research- Law, rather than the traditional view
ers at the University of North Carolina that processor capacity is scarce. 2016 ACM 0001-0782/16/12 $15.00

Milestones

Computer Science Awards, Appointments


ACM, IEEE RECOGNIZE in computations. His work science by individuals for communities in the developing
NISAN WITH KNUTH PRIZE designing pseudorandom their overall impact in the world. Thies has used affordable
The 2016 Donald E. Knuth Prize number generators has offered field over an extended period, mobile phone technology to
recently was awarded to Noam many insights on whether, and includes a $5,000 award. connect people in rural India,
Nisan of the Hebrew University and in what settings, the use It is jointly bestowed by giving them a way to consume
of Jerusalem for fundamental of randomization in efficient the ACM Special Interest and create digital content
and lasting contributions algorithms can be reduced. Group on Algorithms and through simple phone calls.
to theoretical computer Nisan has been a major player Computation Theory (SIGACT) His work has had wide-
science in areas including in Algorithmic Game Theory and the IEEE Computer Society ranging impacts in areas of
communication complexity, and laid the foundation of Technical Committee on the citizen journalism, mobile
pseudorandom number Algorithmic Mechanism Design Mathematical Foundations of health applications, and
generators, interactive proofs, (a mechanism is an algorithm Computing (TCMF). higher education.
and algorithmic game theory. or protocol designed so rational Khot, Silver Professor
The work of Nisan, a participants, motivated purely 2 COMPUTER SCIENTISTS of Computer Science at
professor of computer science by self-interest, will achieve the AMONG NEWEST the Courant Institute of
in the School of Engineering designers goals). He designed MACARTHUR GENIUSES Mathematical Sciences of New
and Computer Science of the some of the most effective The MacArthur Foundations York University, is a theoretical
Hebrew University of Jerusalem, mechanisms by providing the recent announcement of its 2016 computer scientist and the
has had a fundamental impact right incentives to the players, MacArthur Fellows, commonly architect of the Unique Games
on complexity theory, which and has shown that in a variety of known as the genius grants, Conjecture, which Khot and
examines which problems environments, there is a trade-off included computer scientists other researchers have used to
could conceivably be solved between economic efficiency and Subhash Khot and Bill Thies. make enduring discoveries in
by a computer under limits on algorithmic efficiency. All of the Fellows receive a seemingly unrelated areas, such
its resources, whether it is on He is also a leading authority no-strings-attached $625,000 as electoral stability and the
its computation time, space in communication complexity, an grant for their exceptional structure of foams.
used, amount of randomness, area of research that examines the creativity and potential for future The MacArthur Fellows
or parallelism. One way in amount of information that needs contributions to their fields. Program awards unrestricted
which computer scientists have to be transferred between parties Thies, a computer scientist fellowships to talented
explored complexity limits is for computational problems. at Microsoft Research India individuals who have shown
through the use of randomized The annual Donald E. in Bangalore, India, works to extraordinary originality and
algorithms; Nisan has made Knuth Prize recognizes create innovative solutions dedication in their creative
major contributions exploring outstanding contributions to to a host of socioeconomic pursuits and a marked capacity
the power of randomness the foundations of computer challenges facing low-income for self-direction.

26 COM MUNICATIO NS O F TH E AC M | D EC EM BER 201 6 | VO L . 5 9 | N O. 1 2

You might also like