WWW 2012 – Poster Presentation

April 16–20, 2012, Lyon, France

Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-based Web Applications Qiang He, Jun Han, Yun Yang Hai Jin Services Computing Technology and and Jean-Guy Schneider Faculty of Information and Communication Technologies Swinburne University of Technology Melbourne, Australia 3122

{qhe, jhan, yyang, jschneider}@swin.edu.au

System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan, China 430074

Steve Versteeg CA Labs Melbourne, Australia 3122

[email protected]

[email protected] cloud service provider may maintain up to hundreds of thousands of services for their clients [3]. It is to the cloud service providers’ best benefits to maintain the monitoring cost at a reasonable and affordable level while being able to guarantee the response time of their applications. The key to cost-effective monitoring for a service-based Web application is the identification and monitoring of its critical path (i.e., the execution path with the maximum execution time) because the runtime anomalies that occur on the critical path will cause delays that directly impact the response time of the Web application. However, the volatility of the operating environments makes the critical path of a Web application probabilistic - every execution path can be critical with certain probabilities. Thus, identifying the critical path turns into calculating those probabilities which represent their criticalities in the service composition. Our approach, namely Probabilistic Critical Path for Servicebased Web Applications (PCP-SWA), uses a novel timing model to capture the probabilistic nature of the service-based Web applications. This model allows developers to evaluate and analyse service-based Web applications in a more realistic way. PCP-SWA also provides a method that helps developers calculate the criticalities of different execution paths of service-based Web applications.

ABSTRACT The critical path of a composite Web application operating in volatile environments, i.e., the execution path in the service composition with the maximum execution time, should be prioritised in cost-effective monitoring as it determines the response time of the Web application. In volatile operating environments, the critical path of a Web application is probabilistic. As such, it is important to estimate the criticalities of the execution paths, i.e., the probabilities that they are critical, to decide which parts of the system to monitor. We propose a novel approach to the identification of Probabilistic Critical Path for Service-based Web Applications (PCP-SWA), which calculates the criticalities of different execution paths in the context of service composition. We evaluate PCP-SWA experimentally using an example Web application. Compared to random monitoring, PCP-SWA based monitoring is 55.67% more cost-effective on average.

Categories and Subject Descriptors H.3.5 [Online Information Services]: Web-based services; H.3.4 [Systems and Software]: Distributed systems

Keywords Web application, service composition, Web service, monitoring, critical path.

2. CRITICALITY EVALUATION We model the response time of a BC Si in the standard form as:

1. INTRODUCTION

n

The response time, among various QoS properties, is of particular significance and challenge in QoS management for service-based Web applications built through dynamic compositions of loosely coupled component services. During the execution of a Web application, runtime anomalies may occur and jeopardise the quality of the Web application [2]. In order to detect and predict runtime anomalies timely, we need to monitor the execution of the basic components (BCs) that compose a Web application, i.e., the component services and the data transmissions between the component services. However, monitoring consumes resources, including software, hardware and sometimes human resources. In large-scale environments, the issue of monitoring cost, i.e., the cost of monitoring in terms of monitoring resources, is particularly critical. For example, in the cloud environments, a

TR ( S i ) = t 0 +

∑ w ⋅ ΔX i =1

i

i

(1)

where t0 is the mean value of TR(Si); ΔXi, i=1, 2, …, n, represent the variation of n sources of anomaly Xi, i=1, 2, …, n, from their mean values; wi, i=1, 2, …, n, represent the sensitivities of TR(Si) to each of the sources of anomaly. t0, wi and the distributions of ΔXi can be evaluated by inspecting Si’s past executions, service consumers’ feedbacks, service providers’ profiles, etc. Given the response times of the BCs in a service composition, we can calculate their start times, denoted by TS, and finish times, denoted by TF. Next, we analyse the timing dependencies between those BCs by calculating their dominance probabilities, i.e., the probability that they solely determine the start time of their succeeding BC(s). For example, given two BCs Si and Sj in a sequence structure where Sj is activated when Si is finished, the dominance probability of Si, denoted by D(Si), is 1.0 because the start time of Sj is always solely determined by the finish time of Si. In a parallel structure where edges E1, …, En merge into an

Copyright is held by the author/owner(s). WWW 2012 Companion, April 16–20, 2012, Lyon, France. ACM 978-1-4503-1230-1/12/04.

523

WWW 2012 – Poster Presentation 40

25 No Monitoring 20 20

30

40

50

60

70

80

90

100

25

No Monitoring Random Monitoring PCP‐SWA based Monitoring

20 0

10

20

Monitoring    Coverage (%)

1.8

PCP-SWA based Monitoring

0.8 0.6

0.4 0.2 0

Response Time Improvement (Seconds) per Monitor

Response Time Improvement (Seconds) per Monitor

50

60

70

80

90

100

30

20

20

30

40

50

60

70

80

0

10

20

30

90

50

60

70

80

90

100

30 No Monitoring Random Monitoring PCP‐SWA based Monitoring

25 20 0

10

20

30

PCP-SWA based Monitoring

1.4 1.2 1 0.8 0.6 0.4 0.2

100

20

30

40

50

60

70

80

90

3.5

Random Monitoring 2

PCP-SWA based Monitoring

1.5

1 0.5

70

80

90

100

Random Monitoring

3

PCP-SWA based Monitoring

2.5 2

1.5 1 0.5

2

3

4

5

6

7

8

9

10

Monitoring Coverage (%)

(b) fault rate=0.2 (c) fault rate=0.3 Figure 2. Response time improvement per monitor.

10

20

30

40

50

60

70

80

90 100

Monitoring Coverage (%)

(d) fault rate=0.4

Figure 1 demonstrates the average response time of OnlineLive obtained in different volatile environments. As the fault rate increases, the average response time increases because more anomalies cause longer total delay. Random monitoring and PCPSWA based monitoring improved the response time of OnlineLive by an average of 17.87% and 27.80% respectively across all experimental cases. Figure 1 also shows how much monitoring resource is needed to meet different levels of response time requirements. Take Figure 1(d) for example, to guarantee that the average response time is below 30 seconds, random monitoring requires at least 80% monitoring coverage while the number for PCP-SWA based monitoring is only 40%. Figure 2 compares the response time improvement per monitor obtained by random monitoring and PCP-SWA based monitoring. As illustrated, PCP-SWA based monitoring demonstrates significant advantage over random monitoring by an average margin of 55.67%. This observation indicates much higher costeffectiveness of PCP-SWA than random monitoring. Moreover, the cost-effectiveness of PCP-SWA increases as the monitoring coverage decreases, which shows that PCP-SWA is particularly cost-effective when the monitoring resources are relatively limited.

succeeding edge Es, let Z max(TF(E1), …, TF(Ei-1), TF(Ei+1), …, TF(En)), the dominance probability of Ei (1≤i≤n) is calculated as: (2) D(Ei)=P(TF(Ei)≥Z)=P(Z-TF(Ei)≤0)= FZ −T ( E ) (0) F

60

0

1

100

Monitoring Coverage (%)

50

(d) fault rate=0.4

0 10

40

Monitoring Coverage (%)

2.5

Random Monitoring

1.6

Monitoring Coverage (%)

(a) fault rate=0.1

40

35

Monitoring Coverage (%)

0

10

No Monitoring Random Monitoring PCP‐SWA based Monitoring

25

40

(b) fault rate=0.2 (c) fault rate=0.3 Figure 1. Average response time.

Random Monitoring

1

40

35

Monitoring Coverage (%)

(a) fault rate=0.1 1.2

30

40

45

Response Time Improvement (Seconds) per Monitor

10

30

Response Time Improvement (Seconds) per Monitor

0

35

45

Average Reponse Time (in seconds)

30

50

50

Average Reponse Time (in seconds)

35

Average Reponse Time (in seconds)

40

Average Reponse Time (in seconds)

April 16–20, 2012, Lyon, France

i

where FZ −T ( E ) is the cumulative probability function of Z-TF(Ei). F i In order to perform criticality calculation, we need to identify all possible execution scenarios that do not contain branch or loop structures from the service composition. Based on the BCs’ dominance probabilities, the criticalities of different execution paths can be evaluated in each of the identified execution scenario following a certain rule: the criticality of an execution path in an execution scenario is the product of the dominance probabilities of all the edges that belong to the execution path. Then, the criticality of an execution path in the service composition can be computed by a weighted average over its criticalities obtained in all the execution scenarios using the execution scenarios’ execution probabilities as weights.

3. EXPERIMENTS We developed a prototype of PCP-SWA and experimented on OnlineLive, a live-on-demand Web application that converts, subtitles and transmit various live video streams. To simulate a distributed operating environment, we generated the response times of the BCs of OnlineLive based on a publicly available Web service dataset QWS [1], which comprises measurements of nine QoS parameters (including response time) of over 2500 realworld Web services. During the execution of OnlineLive, a certain number of anomalies were generated based on the fault rate and randomly introduced to the BCs. We increased the fault rate from 10% to 40% in steps of 10% to simulate increasing levels of volatility in the operating environment. When anomalies occurred to unmonitored BCs, randomly generated delays were applied to corresponding BCs. If a BC was being monitored, the delay was avoided (representing the fact that the anomalies were detected or predicted and adaptation actions were taken on time to fix the anomalies). Three sets of experiments were conducted in each volatile environment. In set #1, no monitors were allocated. In set #2, the monitors were randomly allocated to the BCs. In set #3, the monitors were allocated according to the criticalities of the execution paths from high to low.

ACKNOWLEDGMENTS This work is partly funded by the Australian Research Council in collaboration with CA Labs.

4. REFERENCES [1] Al-Masri, E. and Mahmoud, Q. H. Investigating Web Services on the World Wide Web. In Proceedings of the 17th International Conference on World Wide Web (WWW2008). pages 795-804, 2008. [2] Baresi, L. and Guinea, S. Self-Supervising BPEL Processes. IEEE Transactions on Software Engineering, 37, 2, 2011, 247-263. [3] Candan, K. S., Li, W.-S., Phan, T., and Zhou, M. Frontiers in Information and Software as Services. In Proceedings of the 25th International Conference on Data Engineering (ICDE2009). pages 1761-1768, 2009.

524

Probabilistic Critical Path Identification for Cost ...

Apr 16, 2012 - Services Computing Technology and. System Lab. Cluster and ... ABSTRACT. The critical path of a composite Web application operating in ... cloud service provider may maintain up to hundreds of thousands of services for ...

737KB Sizes 1 Downloads 227 Views

Recommend Documents

Probabilistic Critical Path Identification for Cost-Effective ... - IEEE Xplore
School of Computer Science and. Technology. Huazhong University of Science and Technology. Wuhan, China 430074 [email protected]. Steve Versteeg.

Probabilistic Critical Path Identification for Cost-Effective Monitoring of ...
ALBERT is proposed to specify both functional and non- functional properties of Web service compositions. At runtime, the assertions are checked by Dynamo ...

Community Structure Identification: A Probabilistic ...
models have been successfully used in many data mining tasks such text clustering, .... generative of the training data only and are unable to generate new data.

Critical Path Method.pdf
According to PMBOK every. scheduled task ... Free Float: Amount of time a single task can be delayed without delaying the early start of. any successor ... Six Sigma: Reduce Variations. CCPM helps to ... Critical Path Method.pdf. Critical Path ...

Critical Path Method.pdf
Page 1. Whoops! There was a problem loading more pages. Critical Path Method.pdf. Critical Path Method.pdf. Open. Extract. Open with. Sign In. Main menu.

Identification and conservation of critical habitat for sea ...
4 Aug 2014 - morphometric data [i.e. length, width, weight, tail length (as a proxy to estimate gender in adults)], evaluated body condition, and collected skin samples (for future genetic and stable isotope analysis). All turtles were marked with ex

Critical Path Timeline (4).pdf
Page 1 of 1. Critical Path Timeline (4).pdf. Critical Path Timeline (4).pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Critical Path Timeline (4).pdf.

Probabilistic Model of Payment Cost Minimization ... - UTK-EECS
and ancillary services. A settlement mechanism is ... Color versions of one or more of the figures in this paper are available online ..... ering network model as well as the probabilistic characteristics .... 950010R1_V90-GeneralSpecification.pdf.

Theta* Path Planning with Averaged Cost on Non ...
Institute of Industrial Technology (KEIT). (2008-S-031-01, Hybrid u-Robot. Service System Technology Development for Ubiquitous City). (a) A*. (b) Theta*. Fig.

Theta* Path Planning with Averaged Cost on Non-uniform Cost Maps
non-uniform cost map because it calculates a path-cost using. Euclidean distance ... This work was supported partly by the R&D program of the Korea. Ministry of ...