Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2661829.2661991acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Hotspot Detection in a Service-Oriented Architecture

Published: 03 November 2014 Publication History

Abstract

Large-scale websites are predominantly built as a service-oriented architecture. Here, services are specialized for a certain task, run on multiple machines, and communicate with each other to serve a user's request. Reducing latency and improving the cost to serve is quite important, but optimizing this service call graph is particularly challenging due to the volume of data and the graph's non-uniform and dynamic nature.
In this paper, we present a framework to detect hotspots in a service-oriented architecture. The framework is general, in that it can handle arbitrary objective functions. We show that finding the optimal set of hotspots for a metric, such as latency, is NP-complete and propose a greedy algorithm by relaxing some constraints. We use a pattern mining algorithm to rank hotspots based on the impact and consistency. Experiments on real world service call graphs from LinkedIn, the largest online professional social network, show that our algorithm consistently outperforms baseline methods.

References

[1]
A. Akella, S. Seshan, and A. Shaikh. An empirical evaluation of wide-area internet bottlenecks. In IMC, pages 101--114, 2003.
[2]
N. Amenta, F. Clarke, and K. S. John. A linear-time majority tree algorithm. In Algorithms in Bioinformatics, volume 2812 of Lecture Notes in Computer Science, pages 216--227. Springer Berlin Heidelberg, 2003.
[3]
C. Borgelt. Efficient implementations of apriori and eclat. In Proc. 1st IEEE ICDM Workshop on Frequent Item Set Mining Implementations (FIMI 2003), page 90, 2003.
[4]
U. Brandes. On variants of shortest-path betweenness centrality and their generic computation. Social Networks, 30(2), 2008.
[5]
A. Cuzzocrea, D. Katsaros, Y. Manolopoulos, and A. Papadimitriou. EBC: A topology control algorithm for achieving high qos in sensor networks. In QSHINE, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 613--626, 2009.
[6]
U. Feige. A threshold of Ln N for approximating set cover. J. ACM, 45(4):634--652, July 1998.
[7]
R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-trace: A pervasive network tracing framework. In NSDI, pages 20--20, Berkeley, CA, USA, 2007. USENIX Association.
[8]
M. Girvan and M. E. J. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821--7826, 2002.
[9]
B. Goethals. Survey on frequent pattern mining. Technical report, 2003.
[10]
H. Gou and Y. Yoo. Distributed bottleneck node detection in wireless sensor network. In CIT, pages 218--224. IEEE Computer Society, 2010.
[11]
J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: Current status and future directions. Data Mining and Knowledge Discovery, 15(1):55--86, Aug. 2007.
[12]
K. Harfoush, A. Bestavros, and J. W. Byers. Measuring bottleneck bandwidth of targeted path segments. In INFOCOM, 2003.
[13]
N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang. Locating internet bottlenecks: Algorithms, measurements, and implications. In SIGCOMM, pages 41--54, New York, NY, USA, 2004. ACM.
[14]
N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang. A measurement study of internet bottlenecks. In INFOCOM, pages 1689--1700. IEEE, 2005.
[15]
R. Karp. Reducibility among combinatorial problems. In R. Miller and J. Thatcher, editors, Complexity of Computer Computations, pages 85--103. Plenum Press, 1972.
[16]
G. Mann, M. Sandler, D. Krushevskaja, S. Guha, and E. Even-Dar. Modeling the parallel execution of black-box services. In HotCloud, pages 20--20, Berkeley, CA, USA, 2011. USENIX Association.
[17]
M. Marzolla and R. Mirandola. Performance prediction of web service workflows. In S. Overhage, C. A. Szyperski, R. Reussner, and J. A. Stafford, editors, QoSA, volume 4880 of Lecture Notes in Computer Science, pages 127--144. Springer, 2007.
[18]
N. Moha, F. Palma, M. Nayrolles, B. J. Conseil, G. Yann-Gael, B. Baudry, and J.-M. Jézéquel. Specification and Detection of SOA Antipatterns. In F. T. Chengfei Liu, Heiko Ludwig, editor, Proccedings of the International Conference on Service Oriented Computing (ICSOC), Shanghai, China, Nov. 2012.
[19]
K. Ostrowski, G. Mann, and M. Sandler. Diagnosing latency in multi-tier black-box services. In LADIS, 2011.
[20]
V. J. Ribeiro, R. H. Riedi, and R. G. Baraniuk. Spatio-temporal available bandwidth estimation for high-speed networks. In In Proc. of the First Bandwidth Estimation Workshop, 2003.
[21]
R. R. Sambasivan, A. X. Zheng, M. D. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G. R. Ganger. Diagnosing performance changes by comparing request flows. In NSDI, 2011.
[22]
B. H. Sigelman, L. A. Barroso, M. Burrows, P. Stephenson, M. Plakal, D. Beaver, S. Jaspan, and C. Shanbhag. Dapper, a large-scale distributed systems tracing infrastructure. Technical report, Google, Inc., 2010.
[23]
S. Sul and T. L. Williams. Fast hashing algorithms to summarize large collections of evolutionary trees, 2008.
[24]
C. Wang, S. Wang, and Y. Wei. A coarse-grained bottleneck detection method with data buffer mechanism for wireless sensor networks. In 2nd International Conference on Computer Science and Network Technology (ICCSNT), pages 2015--2018, 2012.

Cited By

View all
  • (2022)Novel Workload-Aware Approach to Mobile User Reallocation in Crowded Mobile Edge Computing EnvironmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.308682723:7(8846-8856)Online publication date: 1-Jul-2022
  • (2021)Location-Aware Edge Service Migration for Mobile User Reallocation in Crowded ScenesCollaborative Computing: Networking, Applications and Worksharing10.1007/978-3-030-67537-0_27(441-457)Online publication date: 22-Jan-2021
  • (2019)UniDoSA: The Unified Specification and Detection of Service AntipatternsIEEE Transactions on Software Engineering10.1109/TSE.2018.281918045:10(1024-1053)Online publication date: 1-Oct-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management
November 2014
2152 pages
ISBN:9781450325981
DOI:10.1145/2661829
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. call graph
  2. hotspots
  3. monitoring
  4. service-oriented architecture

Qualifiers

  • Research-article

Conference

CIKM '14
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,466 of 6,316 submissions, 23%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Novel Workload-Aware Approach to Mobile User Reallocation in Crowded Mobile Edge Computing EnvironmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.308682723:7(8846-8856)Online publication date: 1-Jul-2022
  • (2021)Location-Aware Edge Service Migration for Mobile User Reallocation in Crowded ScenesCollaborative Computing: Networking, Applications and Worksharing10.1007/978-3-030-67537-0_27(441-457)Online publication date: 22-Jan-2021
  • (2019)UniDoSA: The Unified Specification and Detection of Service AntipatternsIEEE Transactions on Software Engineering10.1109/TSE.2018.281918045:10(1024-1053)Online publication date: 1-Oct-2019
  • (2016)Improving Testing in an Enterprise SOA with an Architecture-Based Approach2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)10.1109/WICSA.2016.24(231-240)Online publication date: Apr-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media