Hardware-based Load Generation for Testing Servers Lorenzo Orecchia Madhur Tulsiani CS 252 Spring 2006 Final Project Presentation May 1, 2006.

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

Web Server Benchmarking Using the Internet Protocol Traffic and Network Emulator Carey Williamson, Rob Simmonds, Martin Arlitt et al. University of Calgary.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
Caching and Virtual Memory. Main Points Cache concept – Hardware vs. software caches When caches work and when they don’t – Spatial/temporal locality.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Generative Models for the Web Graph José Rolim. Aim Reproduce emergent properties: –Distribution site size –Connectivity of the Web –Power law distriubutions.
Computer Science Generating Streaming Access Workload for Performance Evaluation Shudong Jin 3nd Year Ph.D. Student (Advisor: Azer Bestavros)
On Power-Law Relationships of the Internet Topology Michalis Faloutsos Petros Faloutsos Christos Faloutsos.
Adapted from Menascé & Almeida.1 Workload Characterization for the Web.
1 Web Server Performance in a WAN Environment Vincent W. Freeh Computer Science North Carolina State Vsevolod V. Panteleenko Computer Science & Engineering.
Characterization Presentation Neural Network Implementation On FPGA Supervisor: Chen Koren Maria Nemets Maxim Zavodchik
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Measuring the Web. What? Use, size –Of entire Web, of sites (popularity), of pages –Growth thereof Technologies in use (servers, media types) Properties.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Statistics & Modeling By Yan Gao. Terms of measured data Terms used in describing data –For example: “mean of a dataset” –An objectively measurable quantity.
Reduced TCP Window Size for Legacy LAN QoS II Niko Färber Sept. 20, 2000.
Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav D.R.Cheriton School of Computer Science University of Waterloo,
1 On Compressing Web Graphs Michael Mitzenmacher, Harvard Micah Adler, Univ. of Massachusetts.
Performance Evaluation
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Comparing the Accuracy of Network Simulators for Packet-Level Analysis using a Network Testbed Chaudhry Usman Ali UNB, Fredericton.
Network Simulation Internet Technologies and Applications.
Department of Computer Science Southern Illinois University Edwardsville Dr. Hiroshi Fujinoki and Kiran Gollamudi {hfujino,
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Information Networks Power Laws and Network Models Lecture 3.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Caching and Virtual Memory. Main Points Cache concept – Hardware vs. software caches When caches work and when they don’t – Spatial/temporal locality.
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
P2P Architecture Case Study: Gnutella Network
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
Windows 2000 Advanced Server and Clustering Prepared by: Tetsu Nagayama Russ Smith Dale Pena.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Author : Jing Lin, Xiaola Lin, Liang Tang Publish Journal of parallel and Distributed Computing MAKING-A-STOP: A NEW BUFFERLESS ROUTING ALGORITHM FOR ON-CHIP.
High-Level Interconnect Architectures for FPGAs Nick Barrow-Williams.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
The PageRank Citation Ranking: Bringing Order to the Web Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd Presented by Anca Leuca, Antonis Makropoulos.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
NA62 Trigger Algorithm Trigger and DAQ meeting, 8th September 2011 Cristiano Santoni Mauro Piccini (INFN – Sezione di Perugia) NA62 collaboration meeting,
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems with Multi-programming Chapter 4.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Doc.: IEEE /1317r0 Submission December 2009 Vinko Erceg, BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
1 An Analytical Model for the Dimensioning of a GPRS/EDGE Network with a Capacity Constraint on a Group of Cells r , r , r Nogueira,
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
Towards a Smart Workload Generator on RAMP Archana Ganapathi, David Patterson, Anthony Joseph {archanag, pattrsn, cs.berkeley.edu.
DDRIII BASED GENERAL PURPOSE FIFO ON VIRTEX-6 FPGA ML605 BOARD PART B PRESENTATION STUDENTS: OLEG KORENEV EUGENE REZNIK SUPERVISOR: ROLF HILGENDORF 1 Semester:
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Random Sampling Algorithms with Applications Kyomin Jung KAIST Aug ERC Workshop.
3.1 Types of Servers.
Memory Management for Scalable Web Data Servers
ECE 4450:427/527 - Computer Networks Spring 2017
Degree-aware Hybrid Graph Traversal on FPGA-HMC Platform
PRESENTATION COMPUTER NETWORKS
Lecture 2: Complex Networks
Network Traffic Modeling
Presentation transcript:

Hardware-based Load Generation for Testing Servers Lorenzo Orecchia Madhur Tulsiani CS 252 Spring 2006 Final Project Presentation May 1, 2006

The workload generation problem GOAL: Test how servers will behave on receiving large number of requests from multiple users CHALLENGES: –Workload generator should mimic the requests sent by real users –Should keep the server as busy as a large number of users would

Why use hardware? SPEED - Hardware is much faster than software MULTIPLE USERS - Can be simulated by multiple copies of circuit

Challenges in hardware implementation Distributions of web data are complex and diverse - different distributions for file sizes, request sizes, links per page, popularity etc. We require sampling from a combination of all these using only a small and fast circuit Implementing communication protocols in hardware (already available from companies like WizNet)

Approaches to workload generation Trace: Monitor web traffic and store trace – sample from trace to simulate real traffic. Difficult to generate new trace. Analytical models: Generate data according to distributions used to model data. Complex to implement in hardware. We combine the two! Generate the data-set using analytical models and sample from it in hardware

Overview of design Generate data-set using C code – outputs a graph of URLs as hex data Graph loaded in memory at start – memory is shared by multiple circuits (simulating multiple users) Each circuit simply performs a random walk on this graph – can also remember multiple URLs and switch between multiple walks (connections).

Distributions modeled - Pareto A Pareto distribution is given by the cumulative frequency function k is the minimum value X can take and t governs how fast the tail decays Its expectation is (if t > 1, infinite otherwise) The file-size and request size distributions are Pareto distributions File-size: k = 8 KB, t = 1.1 Request size: k = 8 KB, t = 0.6

Power Law and Zipf’s Law The number of links in a page (out-degree distribution) is a power law of the form (A = 1 ; t = 2.1 ) truncated at max degree = 31 Zipf’s law: The number of requests to a page is inversely proportional to its rank when pages are sorted by popularity

Combining the distributions Divide data-set into size bins and generate number of files in each according to file size distribution Determine popularity for each node Determine degree and sample neighbors according to request size distribution A simple random walk on this graph combines all distributions! CAVEAT LECTOR: this assumes independence between the properties

Implementation details Shared read-only memory used by multiple (8) copies of random walk circuit Each walk chooses between multiple (8) open connections At each clock cycle, a random walk: –w.p moves to a neighbor file – o.w. picks file at random uniformly

Sketch of Random Walk Module MEMORYMEMORY

Data-set parameters Graph Size Memory Usage Total data size Average file size KB2138 MB521 KB MB3121 MB47.6 KB MB21083 MB20.11 KB

Circuit properties Device : Virtex-E Maximum delay Walk Module: 3.99 ns Memory Module: 5.82 ns Estimated frequency = (1000/9.81) = MHz Number of LUTs per walk: 593 (out of 64,896) Number of slices per walk: 307 (out of 32,448)

Possible Improvements Implement memory using block-RAM instead of Verilog registers Add module for packaging URLs into HTTP packets, opening connections Implement timing distribution between requests

References 1.P. Bauford and M. Crovella, “Generating Representative Web Workloads for Network and Server Performance evaluation”, Proc. of ACM SIGMETRICS 1998, pp M. Arlitt and C. Williamson, “Web Server Workload Characterization: The Search for Invariants”, Proc. of ACM SIGMETRICS 1996, pp P. Baldi, P. Frasconi and P. Smyth, “Modelling the Internet and the Web: Probabilistic Methods and Algorithms”, Wiley 2003