Hotspot Detection in a Service Oriented Architecture Pranay Anchuri,

Slides:



Advertisements
Similar presentations
Inner Architecture of a Social Networking System Petr Kunc, Jaroslav Škrabálek, Tomáš Pitner.
Advertisements

Google News Personalization: Scalable Online Collaborative Filtering
Adam Jorgensen Pragmatic Works Performance Optimization in SQL Server Analysis Services 2008.
Fast algorithm for detecting community structure in networks M. E. J. Newman Department of Physics and Center for the Study of Complex Systems, University.
Suleyman Cetintas 1, Monica Rogati 2, Luo Si 1, Yi Fang 1 Identifying Similar People in Professional Social Networks with Discriminative Probabilistic.
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Efficient summarization framework for multi-attribute uncertain data Jie Xu, Dmitri V. Kalashnikov, Sharad Mehrotra 1.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Spread of Influence through a Social Network Adapted from :
Trace Analysis Chunxu Tang. The Mystery Machine: End-to-end performance analysis of large-scale Internet services.
Community Detection Algorithm and Community Quality Metric Mingming Chen & Boleslaw K. Szymanski Department of Computer Science Rensselaer Polytechnic.
Experiments on Query Expansion for Internet Yellow Page Services Using Log Mining Summarized by Dongmin Shin Presented by Dongmin Shin User Log Analysis.
Peter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav Cheriton School of Computer Science University of Waterloo August 15,
11Sahalu JunaiduICS 573: High Performance Computing5.1 Analytical Modeling of Parallel Programs Sources of Overhead in Parallel Programs Performance Metrics.
Copyright 2004 David J. Lilja1 What Do All of These Means Mean? Indices of central tendency Sample mean Median Mode Other means Arithmetic Harmonic Geometric.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Johannes Schneider Transactional Memory: How to Perform Load Adaption in a Simple And Distributed Manner Johannes Schneider David Hasenfratz Roger Wattenhofer.
1 Modeling and Taming Parallel TCP on the Wide Area Network Dong Lu,Yi Qiao Peter Dinda, Fabian Bustamante Department of Computer Science Northwestern.
Jierui Xie, Boleslaw Szymanski, Mohammed J. Zaki Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180, USA {xiej2, szymansk,
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
1 Drafting Behind Akamai (Travelocity-Based Detouring) AoJan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante Department of Electrical.
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
Network A/B Testing: From Sampling to Estimation
Models of Influence in Online Social Networks
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Navigating and Browsing 3D Models in 3DLIB Hesham Anan, Kurt Maly, Mohammad Zubair Computer Science Dept. Old Dominion University, Norfolk, VA, (anan,
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Network Aware Resource Allocation in Distributed Clouds.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
« Performance of Compressed Inverted List Caching in Search Engines » Proceedings of the International World Wide Web Conference Commitee, Beijing 2008)
CS453 Lecture 3.  A sequential algorithm is evaluated by its runtime (in general, asymptotic runtime as a function of input size).  The asymptotic runtime.
Scientific Writing Abstract Writing. Why ? Most important part of the paper Number of Readers ! Make people read your work. Sell your work. Make your.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Qingqing Gan Torsten Suel CSE Department Polytechnic Institute of NYU Improved Techniques for Result Caching in Web Search Engines.
Performance Prediction for Random Write Reductions: A Case Study in Modelling Shared Memory Programs Ruoming Jin Gagan Agrawal Department of Computer and.
Contextual Ranking of Keywords Using Click Data Utku Irmak, Vadim von Brzeski, Reiner Kraft Yahoo! Inc ICDE 09’ Datamining session Summarized.
Computer Science and Engineering Predicting Performance for Grid-Based P. 1 IPDPS’07 A Performance Prediction Framework.
PREDIcT: Towards Predicting the Runtime of Iterative Analytics Adrian Popescu 1, Andrey Balmin 2, Vuk Ercegovac 3, Anastasia Ailamaki
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Finding Top-k Shortest Path Distance Changes in an Evolutionary Network SSTD th August 2011 Manish Gupta UIUC Charu Aggarwal IBM Jiawei Han UIUC.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Paired Sampling in Density-Sensitive Active Learning Pinar Donmez joint work with Jaime G. Carbonell Language Technologies Institute School of Computer.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Data Mining, ICDM '08. Eighth IEEE International Conference on Duy-Dinh Le National Institute of Informatics Hitotsubashi, Chiyoda-ku Tokyo,
Data Structures and Algorithms in Parallel Computing Lecture 7.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Large-Scale Matrix Factorization with Missing Data under Additional Constraints Kaushik Mitra University of Maryland, College Park, MD Sameer Sheoreyy.
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
KAIST TS & IS Lab. CS710 Know your Neighbors: Web Spam Detection using the Web Topology SIGIR 2007, Carlos Castillo et al., Yahoo! 이 승 민.
Author Utility-Based Scheduling for Bulk Data Transfers between Distributed Computing Facilities Xin Wang, Wei Tang, Raj Kettimuthu,
03/02/20061 Evaluating Top-k Queries Over Web-Accessible Databases Amelie Marian Nicolas Bruno Luis Gravano Presented By: Archana and Muhammed.
C OMMUNITIES AND B ALANCE IN S IGNED N ETWORKS : S PECTRAL A PPROACH -Pranay Anchuri*, Malik Magdon Ismail Rensselaer Polytechnic Institute, NY.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
A Stable Broadcast Algorithm Kei Takahashi Hideo Saito Takeshi Shibata Kenjiro Taura (The University of Tokyo, Japan) 1 CCGrid Lyon, France.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Introduction to Performance Tuning Chia-heng Tu PAS Lab Summer Workshop 2009 June 30,
Chenning Xie+, Rong Chen+, Haibing Guan*, Binyu Zang+ and Haibo Chen+
Data Center Network Architectures
Sathya Ronak Alisha Zach Devin Josh
High Performance Computing on an IBM Cell Processor --- Bioinformatics
Summary Presented by : Aishwarya Deep Shukla
TexPoint fonts used in EMF.
Yiyu Shi*, Wei Yao*, Jinjun Xiong+ and Lei He*
Modeling and Taming Parallel TCP on the Wide Area Network
Presentation transcript:

Hotspot Detection in a Service Oriented Architecture Pranay Anchuri, Rensselaer Polytechnic Institute, Troy, NY Roshan Sumbaly, Coursera, Mountain View, CA Sam Shah, LinkedIn, Mountain View, CA

Introduction

 Largest professional network.  300M members from 200 countries.  2 new members per second.

 Largest professional network.  300M members from 200 countries.  2 new members per second.

Service Oriented Architecture

What is a Hotspot  Hotspot : Service responsible for suboptimal performance of a user facing functionality.

What is a Hotspot  Hotspot : Service responsible for suboptimal performance of a user facing functionality.  Performance measures:  Latency  Cost to serve  Error rate

Who uses hotspot detection ?  Engineering teams :  Minimize latency for the user.  Increase the throughput of the servers.  Operations teams :  Reduce the cost of serving user requests.

Goal

Data - Service Call Graphs  Service call metrics logged into a central system.  Call graph structure re-constructed from random trace id.

Example of Service Call Graph Read profile Content Service Context Service Content Service EntitlementsVisibility

Example of Service Call Graph Read profile Content Service Context Service Content Service EntitlementsVisibility

Example of Service Call Graph Read profile Content Service Context Service Content Service EntitlementsVisibility

Example of Service Call Graph Read profile Content Service Context Service Content Service EntitlementsVisibility

Challenges in mining hotspots

Structure of call graphs  Structure of call graphs change rapidly across requests.  Depends on member’s attributes.  A/B testing.  Changes to code base.  Over 90% unique structures for most requested services.

Asynchronous service calls  Calls A  B, A  C are  Serial : C is called after B returns to A.  Parallel : B and C are called at same time or in a brief time span.  Parallel service calls are particularly difficult to handle.  Degree of parallelism ~ 20 for some services.

Related Work  Hu et. al [SIGCOMM 04, INFOCOMM 05]  Tools to detect bottlenecks along network paths.  Mann et. al [USENIX 11]  Models to estimate latency as a function of RPC’s latencies.

Why existing methods don’t work ?  Metric cannot be controlled as in bottleneck detection algorithms.  Analyzing millions of small networks.  Parallel service calls.

Our approach

● Given call graphs Optimize and summarize approach

● Given call graphs ● Hotspots in each call graph Optimize and summarize approach

● Given call graphs ● Hotspots in each call graph ● Ranking hotspots Optimize and summarize approach

What are the top-k hotspots in a call graph ?  Hotspots in a specific call graph irrespective of other call graphs for the same type of request.

Key Idea What are the k services, if already optimized, that would have lead to maximum reduction in the latency of request ? (Specific to a particular call graph)

Quantifying impact of a service  What if a service was optimized by θ ? (think after the fact)

Quantifying impact of a service  What if a service was optimized by θ ? (think after the fact) Its internal computations are θ times faster. No effect on the overall latency if its parent is waiting on other service call to return.

Example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8]

Example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8]

Example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8] 2x faster

Example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8] 2x faster

Example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8] 2x faster Effect of 2x speedup

Local effect of optimization

Negative example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8]

Negative example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8]

Negative example [0,11] [0,3] [1,2] [1.3, 1.6] [2.1, 2.5] [4,11] [6,9] [7,8]

Effect propagation ABC  Optimizing C  Reduces run time of C  C returns to B earlier.  B might return earlier.  A might return earlier…

Propagation Assumption A service propagates the effects to its parent only if doing so doesn’t change the order of service calls (by parent).

Example

Example After optimization

Example

Under the propagation assumption

Relaxation  Variation of the propagation assumption that allows for a service to propagate fractional effects to its parent.  Leads to a greedy algorithm.

Greedy algorithm to compute top-k hotspots  Given an optimization factor θ,  Repeatedly select a service that has maximum impact on frontend service.  Update the times after each selection.  Stop after k iterations.

Ranking hotspots

Rest of the paper  Similar approach applied to cost of request metric.  Generalized framework for optimizing arbitrary metrics.  Other ranking schemes.

Results

Dataset Request type Avg # of call graphs per day* Avg # of service call per request Avg # of subcalls per service Max # of parallel subcalls Home10.2 M Mailbox3.33 M Profile3.14 M Feed1.75 M * Scaled down by a constant factor

vs Baseline algorithm

User of the system

Impact of improvement factor

Consistency over a time period

Conclusion

Conclusions  Defined hotspots in service oriented architectures.  Framework to mine hotspots w.r.t various performance metrics.  Experiments on real world large scale datasets.

Thanks Questions ?