Download presentation
Presentation is loading. Please wait.
Published bySamuel Fuhrmann Modified over 6 years ago
1
Evaluation of Load Balancing Algorithms and Internet Traffic Modeling for Performance Analysis
By Arthur L. Blais
2
Introduction Internet Traffic Modeling Load Balancing Algorithms
Conclusion
3
Internet Traffic Modeling
Why is the Internet hard to model? Internet Traffic Characteristics Internet Traffic Models
4
Why is the Internet hard to model?
It’s BIG January 2000: > 72 Million Hosts1 Growing Rapidly > 67% per year Constantly Changing Traffic patterns have high variability 1 Source:
5
Internet Traffic Patterns
Causes of High variability Client Request Rates Server Responses Network Topology
6
Characteristics of Client Request Rate1
Client Sleep Time Inactive Off Time Active Off Time Embedded References 1 Barford and Crovella, Generating Representative Web Workloads for Network and Server Performance Evaluation, Boston University, BU-CS , 1997
7
Client Sleep time
8
Inactive Off Time Time between requests (Think Time)
Uses a Pareto Distribution Shape parameter: a = 1.5 Lower bound: (k) = 1.0 To create a random variable x: u ~ U(0,1) x = k / (1.0-u)^1.0/ a
9
Inactive Off Time
10
Active Off Time Time between embedded references
Uses a Weibull Distribution alpha: a = 1.46 (scale parameter) beta: b = (shape parameter) To create a random variable x: u ~ U(0,1) x = a ( -ln( 1.0 – u ) ^ 1.0/b
11
Active Off Time
12
Embedded References Number of objects in the requested document
(text, audio, video, bit maps) Uses a Pareto Distribution Shape parameter: a = 2.43 Lower bound: (k) = 1.0 To create a random variable x: u ~ U(0,1) x = k / (1.0-u)^1.0/a
13
Example HTML Document with Embedded References
<html><head> <title>CS522 F99 Home Page</title> </head> <body background="marble1.jpg"> <BGSOUND SRC="rocky.mid"><embed src="rocky.mid" autostart=true hidden=true loop=false></embed> <td ALIGN=CENTER><img SRC="rainbowan.gif" height=15 width=100%></td>
14
Embedded References
15
Server Characteristics
File Size Distribution Body – Lognormal Distribution Tail – Pareto Distribution Cache Size Temporal Locality Number of Connections System Performance: CPU speed, disk access time, memory, network interface
16
File Size Distribution - Body
Lognormal Distribution Build table with 930 values Range: 92 <= x <= 9020 bytes To create a random variable x: u ~ U(0,1) if ( u <= 93% ) then look up value in table[ u * 1000 ] else use tail distribution
17
File Size Distribution - Body
18
File Size Distribution - Tail
Pareto Distribution Shape parameter: a = 1.5 Lower Bound: k = 9,020 To create a random variable x: u ~ U(0,1) x = k / (1.0 – u) ^ 1.0/a
19
File Size Distribution – Tail
20
Self-similarity Fractal-like characteristics: Fractals look the same at all size scales Statistical Self-similarity: Empirical data has similar variability over a wide range of time scales.
21
Verification of Self-similarity
Methods Observation Variance Time Plot R/S Plot Periodogram Whittle Estimator
22
Self-similarity - Observation
23
Variance Time Plot Hurst Parameter H = 1 – b / 2
b: inverse of the slope ½ < H < 1 H = 0.7
24
Load Balancing vs. Load Sharing
System avoids having idle processors by placing new processes on idle processors first Load Balancing System attempts to distribute the load equally across all processors based on some global average. Static Processes are placed and executed on only one processor. Dynamic Processes are initially placed on one processor but at some point in time the process may be migrated to another processor based upon some decision criteria.
25
Load Balancing Algorithms
Stateless Select a processor without consideration of the system state. Round Robin Random State-based Select a processor based upon some knowledge of the system state. Greedy Subset Stochastic
26
Simulation Entities Request Client Load Balance Manager Server
27
Request Event Loop
28
Experimental Design Cooperative Environment
For each algorithm (round robin, random, greedy, subset, stochastic) Eight Servers with 1, 4 Connections 8, 16, 32, 64, 128, 256,512 Clients 1, 2, 4 Load Balance Managers
29
Servers with One Connection
30
Global vs. Local Info.
31
Servers with Four Connections
32
Global vs. Local Info.
33
Experimental Design Adversarial Environment
For each algorithm (greedy, subset, stochastic) Eight Servers with 1, 4 Connections 8, 16, 32, 64, 128, 256,512 Clients 4 Load Balance Managers with 1, 2, 3 Random Load Balance Managers as adversaries
34
Servers with One Connection
35
LBM w/ Adversaries
36
Servers with Four Connection
37
LBM w/ Adversaries
38
Analysis of Experimental Results
Single Connection Global Greedy: x improvement in Response Time Subset: x Stochastic: x Local Greedy: x Subset: x Stochastic: x
39
Analysis of Experimental Results – cont.
Four Connections Global Greedy: x improvement in Response Time Subset: x Stochastic: x Local Greedy: x Subset: x Stochastic: x
40
Analysis of Experimental Results – cont.
Single Connection w/ Adversaries Greedy: x Subset: x Stochastic: x
41
Analysis of Experimental Results – cont.
Four Connection w/ Adversaries Greedy: x Subset: x Stochastic: x
42
Conclusions Researched and Developed a Framework for Modeling Internet Traffic for Simulation Experimental Design Analysis of Experimental Results Comparing Five Load Balancing Algorithms
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.