skip to main content
10.1145/1807128.1807166acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Characterizing, modeling, and generating workload spikes for stateful services

Published:10 June 2010Publication History

ABSTRACT

Evaluating the resiliency of stateful Internet services to significant workload spikes and data hotspots requires realistic workload traces that are usually very difficult to obtain. A popular approach is to create a workload model and generate synthetic workload, however, there exists no characterization and model of stateful spikes. In this paper we analyze five workload and data spikes and find that they vary significantly in many important aspects such as steepness, magnitude, duration, and spatial locality. We propose and validate a model of stateful spikes that allows us to synthesize volume and data spikes and could thus be used by both cloud computing users and providers to stress-test their infrastructure.

References

  1. Faban project web site. http://faban.sunsource.net/.Google ScholarGoogle Scholar
  2. Httperf project web site. http://code.google.com/p/httperf/.Google ScholarGoogle Scholar
  3. Inauguration Day on Twitter. http://blog.twitter.com/2009/01/inauguration-day-on-twitter.html.Google ScholarGoogle Scholar
  4. Jmeter project web site. http://jakarta.apache.org/jmeter/.Google ScholarGoogle Scholar
  5. Outpouring of searches for the late Michael Jackson. http://googleblog.blogspot.com/2009/06/outpouring-of-searches-for-late-%michael.html.Google ScholarGoogle Scholar
  6. Rubis project web site. http://rubis.ow2.org/.Google ScholarGoogle Scholar
  7. Top 20 Twitter trends in 2009. http://trendistic.com/_top-twenty-trending-topics-2009/.Google ScholarGoogle Scholar
  8. Wikipedia page counters. http://mituzas.lt/2007/12/10/wikipedia-page-counters/.Google ScholarGoogle Scholar
  9. D. Aldous. Exchangeability and related topics. In Ecole d'Ete de Probabilities de Saint-Flour XIII 1983, pages 1--198. Springer, 1985.Google ScholarGoogle Scholar
  10. M. Arlitt and T. Jin. Workload characterization of the 1998 World Cup Web site. Technical Report HPL-1999-35R1, HP Labs, 1999.Google ScholarGoogle Scholar
  11. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A Berkeley view of Cloud Computing. Technical Report UCB/EECS-2009-28, UC Berkeley, Feb 2009.Google ScholarGoogle Scholar
  12. M. Armbrust, A. Fox, D. Patterson, N. Lanham, H. Oh, B. Trushkowsky, and J. Trutna. SCADS: Scale-independent storage for social computing applications. In CIDR, 2009.Google ScholarGoogle Scholar
  13. P. Barford and M. Crovella. Generating representative web workloads for network and server performance evaluation. In SIGMETRICS, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Bod'ík, G. Friedman, L. Biewald, H. Levine, G. Candea, K. Patel, G. Tolle, J. Hui, A. Fox, M. I. Jordan, and D. Patterson. Combining visualization and statistical analysis to improve operator confidence and efficiency for failure detection and localization. In ICAC, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. X. Chen and X. Zhang. A popularity-based prediction model for web prefetching. IEEE Computer, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. E. Crovella and A. Bestavros. Self-similarity in World Wide Web traffic evidence and possible causes. IEEE/ACM Transactions on Networking, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon's highly available key-value store. In SOSP 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Gulati, C. Kumar, and I. Ahmad. Storage workload characterization and consolidation in virtualized environments. In VPACT, 2009.Google ScholarGoogle Scholar
  19. J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites. In WWW, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Kavalanekar, B. Worthington, Q. Zhang, and V. Sharda. Characterization of storage workload traces from production windows servers. In ISWC, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  21. A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. Mi, G. Casale, L. Cherkasova, and E. Smirni. Injecting realistic burstiness to a traditional client-server benchmark. In ICAC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. N. Padmanabhan and L. Qiu. The content and access dynamics of a busy web server: Findings and implications. In SIGCOMM, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Pitman and M. Yor. The two-parameter Poisson-Dirichlet distribution derived from a stable subordinator. Ann. Probab., 25(2):855--900, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  25. B. Schroeder and M. Harchol-Balter. Web servers under overload: How scheduling can help. ACM Trans. Internet Technol., 6(1):20--52, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Urgaonkar, P. Shenoy, A. Chandra, and P. Goyal. Dynamic provisioning of multi-tier Internet applications. In ICAC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Wolman, M. Voelker, N. Sharma, N. Cardwell, A. Karlin, and H. M. Levy. On the scale and performance of cooperative web proxy caching. In SOSP, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Characterizing, modeling, and generating workload spikes for stateful services

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SoCC '10: Proceedings of the 1st ACM symposium on Cloud computing
        June 2010
        264 pages
        ISBN:9781450300360
        DOI:10.1145/1807128

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 10 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate169of722submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader