skip to main content
10.1145/2661829.2661991acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Hotspot Detection in a Service-Oriented Architecture

Published:03 November 2014Publication History

ABSTRACT

Large-scale websites are predominantly built as a service-oriented architecture. Here, services are specialized for a certain task, run on multiple machines, and communicate with each other to serve a user's request. Reducing latency and improving the cost to serve is quite important, but optimizing this service call graph is particularly challenging due to the volume of data and the graph's non-uniform and dynamic nature.

In this paper, we present a framework to detect hotspots in a service-oriented architecture. The framework is general, in that it can handle arbitrary objective functions. We show that finding the optimal set of hotspots for a metric, such as latency, is NP-complete and propose a greedy algorithm by relaxing some constraints. We use a pattern mining algorithm to rank hotspots based on the impact and consistency. Experiments on real world service call graphs from LinkedIn, the largest online professional social network, show that our algorithm consistently outperforms baseline methods.

References

  1. A. Akella, S. Seshan, and A. Shaikh. An empirical evaluation of wide-area internet bottlenecks. In IMC, pages 101--114, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Amenta, F. Clarke, and K. S. John. A linear-time majority tree algorithm. In Algorithms in Bioinformatics, volume 2812 of Lecture Notes in Computer Science, pages 216--227. Springer Berlin Heidelberg, 2003.Google ScholarGoogle Scholar
  3. C. Borgelt. Efficient implementations of apriori and eclat. In Proc. 1st IEEE ICDM Workshop on Frequent Item Set Mining Implementations (FIMI 2003), page 90, 2003.Google ScholarGoogle Scholar
  4. U. Brandes. On variants of shortest-path betweenness centrality and their generic computation. Social Networks, 30(2), 2008.Google ScholarGoogle Scholar
  5. A. Cuzzocrea, D. Katsaros, Y. Manolopoulos, and A. Papadimitriou. EBC: A topology control algorithm for achieving high qos in sensor networks. In QSHINE, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 613--626, 2009.Google ScholarGoogle Scholar
  6. U. Feige. A threshold of Ln N for approximating set cover. J. ACM, 45(4):634--652, July 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-trace: A pervasive network tracing framework. In NSDI, pages 20--20, Berkeley, CA, USA, 2007. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Girvan and M. E. J. Newman. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821--7826, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  9. B. Goethals. Survey on frequent pattern mining. Technical report, 2003.Google ScholarGoogle Scholar
  10. H. Gou and Y. Yoo. Distributed bottleneck node detection in wireless sensor network. In CIT, pages 218--224. IEEE Computer Society, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: Current status and future directions. Data Mining and Knowledge Discovery, 15(1):55--86, Aug. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Harfoush, A. Bestavros, and J. W. Byers. Measuring bottleneck bandwidth of targeted path segments. In INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang. Locating internet bottlenecks: Algorithms, measurements, and implications. In SIGCOMM, pages 41--54, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang. A measurement study of internet bottlenecks. In INFOCOM, pages 1689--1700. IEEE, 2005.Google ScholarGoogle Scholar
  15. R. Karp. Reducibility among combinatorial problems. In R. Miller and J. Thatcher, editors, Complexity of Computer Computations, pages 85--103. Plenum Press, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  16. G. Mann, M. Sandler, D. Krushevskaja, S. Guha, and E. Even-Dar. Modeling the parallel execution of black-box services. In HotCloud, pages 20--20, Berkeley, CA, USA, 2011. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Marzolla and R. Mirandola. Performance prediction of web service workflows. In S. Overhage, C. A. Szyperski, R. Reussner, and J. A. Stafford, editors, QoSA, volume 4880 of Lecture Notes in Computer Science, pages 127--144. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Moha, F. Palma, M. Nayrolles, B. J. Conseil, G. Yann-Gael, B. Baudry, and J.-M. Jézéquel. Specification and Detection of SOA Antipatterns. In F. T. Chengfei Liu, Heiko Ludwig, editor, Proccedings of the International Conference on Service Oriented Computing (ICSOC), Shanghai, China, Nov. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. Ostrowski, G. Mann, and M. Sandler. Diagnosing latency in multi-tier black-box services. In LADIS, 2011.Google ScholarGoogle Scholar
  20. V. J. Ribeiro, R. H. Riedi, and R. G. Baraniuk. Spatio-temporal available bandwidth estimation for high-speed networks. In In Proc. of the First Bandwidth Estimation Workshop, 2003.Google ScholarGoogle Scholar
  21. R. R. Sambasivan, A. X. Zheng, M. D. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G. R. Ganger. Diagnosing performance changes by comparing request flows. In NSDI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. H. Sigelman, L. A. Barroso, M. Burrows, P. Stephenson, M. Plakal, D. Beaver, S. Jaspan, and C. Shanbhag. Dapper, a large-scale distributed systems tracing infrastructure. Technical report, Google, Inc., 2010.Google ScholarGoogle Scholar
  23. S. Sul and T. L. Williams. Fast hashing algorithms to summarize large collections of evolutionary trees, 2008.Google ScholarGoogle Scholar
  24. C. Wang, S. Wang, and Y. Wei. A coarse-grained bottleneck detection method with data buffer mechanism for wireless sensor networks. In 2nd International Conference on Computer Science and Network Technology (ICCSNT), pages 2015--2018, 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Hotspot Detection in a Service-Oriented Architecture

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management
          November 2014
          2152 pages
          ISBN:9781450325981
          DOI:10.1145/2661829

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 November 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CIKM '14 Paper Acceptance Rate175of838submissions,21%Overall Acceptance Rate1,861of8,427submissions,22%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader