2012 IEEE International Symposium on Workload Characterization (IISWC) 2012
DOI: 10.1109/iiswc.2012.6402896
|View full text |Cite
|
Sign up to set email alerts
|

ECHO: Recreating network traffic maps for datacenters with tens of thousands of servers

Abstract: Abstract-Large-scale datacenters now host a large part of the world's data and computation, which makes their design a crucial architectural challenge. Datacenter (DC) applications, unlike traditional workloads, are dominated by user patterns that only emerge in the large-scale. This creates the need for concise, accurate and scalable analytical models that capture both their temporal and spatial features and can be used to create representative activity patterns. Unfortunately, previous work lacks the ability… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
32
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(33 citation statements)
references
References 17 publications
1
32
0
Order By: Relevance
“…Lacking concrete data, researchers often design for the worst case, namely an all-to-all traffic matrix in which each host communicates with every other host with equal frequency and intensity [4]. Such an assumption leads to the goal of delivering maximum bisection bandwidth [4,23,36], which may be overkill when demand exhibits significant locality [17].…”
Section: Introductionmentioning
confidence: 99%
“…Lacking concrete data, researchers often design for the worst case, namely an all-to-all traffic matrix in which each host communicates with every other host with equal frequency and intensity [4]. Such an assumption leads to the goal of delivering maximum bisection bandwidth [4,23,36], which may be overkill when demand exhibits significant locality [17].…”
Section: Introductionmentioning
confidence: 99%
“…The background hotspot traffic can also represent the collection of intermediate web search results using parts of the search index, performed by numerous leaf nodes and sent to few front end web server nodes, or reduction operations with constructs such as MPI [33]. The benign foreground intra-cluster UR pattern represents multi-purpose traffic that is confined within the same or consecutive clusters or racks [13]. It is this traffic that should remain unaffected by the ill-behaved hotspot traffic.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…In this traffic pattern we collect statistics for benign foreground intra-cluster UR traffic where every source (including the ones participating in the hotspot pattern) transmits at a variable rate only to destinations in the same cluster. The hotspot traffic represents the small number of nodes that communicate with most of the machines in the system (and across clusters), because they are running the task scheduler, aggregators or monitoring systems [13]. The background hotspot traffic can also represent the collection of intermediate web search results using parts of the search index, performed by numerous leaf nodes and sent to few front end web server nodes, or reduction operations with constructs such as MPI [33].…”
Section: Evaluation Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Given this challenge, there is extensive work on characterization and modeling of DC applications [5], [14], [15], [16], [25], [38] that leads to generated workloads with characteristics that closely resemble those of the original application. The generated workloads can then be used in system studies without the limitation of needing access to real DC workloads.…”
Section: Related Workmentioning
confidence: 99%