Scalability of Push and Pull Based Event Notification

Total Page:16

File Type:pdf, Size:1020Kb

Scalability of Push and Pull Based Event Notification DEGREE PROJECT IN TECHNOLOGY, FIRST CYCLE, 15 CREDITS STOCKHOLM, SWEDEN 2020 Scalability of push and pull based event notification MARCUS NILSSON DANIEL DUNÉR KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Scalability of push and pull based event notification A comparison between webhooks and polling MARCUS NILSSON DANIEL DUNÉR Högskoleingenjör Datateknik Date: June 9, 2020 Supervisor: Peter Sjödin Examiner: Markus Hidell School of Electrical Engineering and Computer Science Swedish title: Skalbarhet hos push- och pullbaserad eventnotifikation Swedish subtitle: En jämförelse mellan webhooks och polling Scalability of push and pull based event notification / Skalbarhet hos push- och pullbaserad eventnotifikation © 2020 Marcus Nilsson and Daniel Dunér Abstract | i Abstract Today’s web applications make extensive use of APIs between server and client, or server to server in order to provide new information in the form of events. The question was whether the different methods of procuring events are different in how they scale. This study aims to compare performance between webhooks and polling, the two most commonly used pull and push based methods for event notification when scaling up traffic. The purpose is to create a basis for developers when choosing the method for event notification. The comparison has been developed through measurements of typical indicators of good performance for web applications: CPU usage, memory usage and response time. The tests gave indications that webhooks perform better in most circumstances, but further testing is needed in a more well-defined environment to draw a confident conclusion. Keywords Event notification, Webhooks, Polling, Scalability, Performance test, Web application ii | Abstract Sammanfattning | iii Sammanfattning Dagens webbapplikationer använder sig i stor utsträckning av API:er mellan server och klient, eller server till server för att inhämta ny information i form av events (händelser). Frågan är om de olika metoder som finns för att inhämta events skalar olika bra. Förevarande studie ämnar att jämföra prestanda mellan ”webhooks” och ”polling”, de två mest använda pull- och pushbaserade metoderna för eventnotifikation vid uppskalning av trafik. Syftet är att skapa ett underlag för utvecklare vid valet av metod för eventnotifikation. Jämförelsen har tagits fram genom mätningar av typiska indikatorer för god prestanda hos en webbapplikation: CPU-användning, minnesanvändning och svarstid. Testerna gav indikationer om att webhooks är bättre men det krävs vidare testning i en mer väldefinierad miljö för att dra en säkrare slutsats. Nyckelord Eventnotifikation, Webhooks, Polling, Skalbarhet, Prestandatest, Webbapplikation iv | Sammanfattning Acknowledgments | v Acknowledgments We want to thank our supervisor Peter Sjödin and our examiner Markus Hidell for their advice and contributions during this degree project. Stockholm, June 2020 Marcus Nilsson and Daniel Dunér vi | Acknowledgments CONTENTS | vii Contents 1 Introduction 1 1.1 Background ........................... 2 1.2 Problem ............................. 4 1.3 Goal ............................... 4 1.4 Benefits, Ethics and Sustainability ............... 5 1.5 Delimitations .......................... 6 1.6 Outline ............................. 6 2 Theoretical Background 7 2.1 Polling .............................. 8 2.2 Webhook ............................ 9 2.3 Performance criteria for web applications ........... 10 2.4 Testing scalability ........................ 10 2.4.1 Performance testing ................... 10 2.4.2 Core Performance Testing Activities .......... 11 2.4.3 Test Environment .................... 12 2.4.4 Identifying Acceptance Criteria ............ 12 2.4.5 Planning and Designing Tests ............. 13 2.4.6 Configuring the Test Environment ........... 13 2.4.7 Implementing the Designed Test ............ 13 2.4.8 Performing the Tests .................. 14 2.4.9 Analyze Results, Report, and Retest .......... 14 2.5 Related Work .......................... 15 3 Methodology and Methods 17 3.1 Research process ........................ 17 3.2 The model ............................ 17 3.3 Performance Testing ...................... 18 3.3.1 Identifying test environment .............. 18 viii | CONTENTS 3.3.2 Identifying performance Acceptance Criteria ..... 18 3.3.3 Planning and designing tests .............. 19 4 Implementation 21 4.1 The server ............................ 21 4.2 The client ............................ 21 4.3 Webhook ............................ 22 4.4 Polling .............................. 23 4.5 Implemented test design .................... 23 4.5.1 Load test ........................ 24 4.5.2 Stress test ........................ 24 4.5.3 Endurance test ..................... 24 4.6 Measurement Criteria ...................... 25 4.6.1 CPU and memory measurements ............ 25 4.6.2 Response time measurements ............. 25 4.7 Testbed ............................. 25 5 Results 27 5.1 Load test ............................. 27 5.1.1 CPU ........................... 28 5.1.2 Memory ......................... 30 5.2 Stress test ............................ 31 5.2.1 CPU ........................... 32 5.2.2 Memory ......................... 35 5.3 Endurance test .......................... 37 5.3.1 CPU ........................... 38 5.3.2 Memory ......................... 41 6 Discussion 45 6.1 Load test ............................. 45 6.2 Stress test ............................ 46 6.3 Endurance test .......................... 47 6.4 Evaluation against acceptance criteria ............. 48 6.5 Conclusion ........................... 49 6.6 Further Research ........................ 49 6.7 Reflections ........................... 50 References 51 Contents | ix A 55 A.1 Load Test Plots ......................... 56 A.1.1 CPU ........................... 56 A.1.2 Memory ......................... 57 x | Contents LIST OF FIGURES | xi List of Figures 4.1 Webhook model. ......................... 22 4.2 Polling model .......................... 23 5.1 Central Processing Unit (CPU) usage of one burst of 100 clients. 29 5.2 CPU usage of one burst of 1000 clients. ............ 29 5.3 Memory usage of one burst of 1000 clients. .......... 30 5.4 CPU usage of one burst of 10 000 clients. ........... 32 5.5 CPU usage of one burst of 11 000 clients. ........... 33 5.6 CPU usage of one burst of 12 000 clients. ........... 33 5.7 CPU usage of one burst of 13 000 clients. ........... 34 5.8 CPU usage of one burst of 14 000 clients. ........... 34 5.9 Memory usage of one burst of 11 000 clients. ......... 35 5.10 Memory usage of one burst of 12 000 clients. ......... 35 5.11 Memory usage of one burst of 13 000 clients. ......... 36 5.12 Memory usage of one burst of 14 000 clients. ......... 36 5.13 CPU usage of 300 bursts of 500 clients each .......... 38 5.14 CPU usage of 900 bursts of 500 clients each .......... 39 5.15 CPU usage of 1800 bursts of 500 clients each ......... 39 5.16 CPU usage of 300 burst of 100 clients each. .......... 40 5.17 CPU usage of 300 burst of 1000 clients each. ......... 40 5.18 Memory usage of 300 burst of 100 clients each. ........ 41 5.19 Memory usage of 300 burst of 1000 clients each. ....... 42 5.20 Memory usage of 300 burst of 500 clients each, using polling. 42 5.21 Memory usage of 900 burst of 500 clients each. ........ 43 5.22 Memory usage of 1800 burst of 500 clients each. ....... 43 A.1 CPU usage of one burst of 1 client using polling. ....... 56 A.2 CPU usage of one burst of 10 client using polling. ....... 56 A.3 Memory usage of one burst of 1 client using polling. ..... 57 A.4 Memory usage of one burst of 10 client using polling. ..... 57 xii | LIST OF FIGURES A.5 Memory usage of one burst of 100 client using polling. .... 58 A.6 Memory usage of one burst of 1000 client using polling. ... 58 LIST OF TABLES | xiii List of Tables 4.1 Testbed computer ........................ 25 5.1 Average response time measured during load testing. ..... 28 5.2 Total number of requests .................... 28 5.3 Average response time for stress test .............. 31 5.4 Total number of requests sent for stress test .......... 31 5.5 Average response time ..................... 37 5.6 Total number of requests sent .................. 37 xiv | LIST OF TABLES List of acronyms and abbreviations | xv List of acronyms and abbreviations API Application Programming Interface CPU Central Processing Unit DDoS Denial of Service Attack HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure NAT Network Address Translation RAM Random Access Memory REST Representational State Transfer SSL Secure Sockets Layer TCP Transmission Control Protocol URL Uniform Resource Locator xvi | List of acronyms and abbreviations Introduction | 1 Chapter 1 Introduction The development of connected devices, mobile phones, and personal computers has been rapid. This has been accompanied by an increase in the amount of people with access to the Internet. In 2019, more than half of the global population used the Internet, a rapid increase from 16% in 2002 [1]. As access to the Internet increases and more and more of our daily actions are digital, expectations on the speed at which new data can be delivered to applications (hereafter, apps) and devices are also increasing. Events, such as the arrival of email, news, and messages, are expected to be delivered instantly. As most apps and devices get their data from servers it becomes a problem for the server of how to best notify
Recommended publications
  • What's in the Cloud?
    WHAT’S IN THE CLOUD? PRODUCT GUIDE / MARCH 9, 2019 DISCLAIMER Oracle Commerce Cloud is a fully featured, extensible SaaS commerce solution, delivered in the Oracle Cloud, supporting B2C and B2B models in a single platform. Commerce Cloud grants greater agility and cost savings, with the extensibility and control required in the ultra-competitive digital commerce market. SIMPLIFY your technology footprint. INNOVATE to stay ahead of consumer demands and competitors in a low-risk way. DELIVER to every customer, every time to increase loyalty and revenue. Commerce Cloud has frequent releases. Please ensure you have the latest documentation. This content was updated for the 19A release (released in February 2019) 2 FEATURE GUIDE / WHAT’S IN THE CLOUD? Product Features Unified Admin ................................................................................................. 5 Core Platform and APIs ................................................................................. 5 Modular, Headless Options ............................................................................ 6 Responsive Storefront .................................................................................... 6 Guided Search................................................................................................ 7 SEO ................................................................................................................ 8 Drag-and-Drop Experience Creation ............................................................. 9 Catalog Management ..................................................................................
    [Show full text]
  • Voice.AI Gateway API Reference Guide Version
    Reference Guide AudioCodes Intuitive Human Communications for Chatbot Services Voice.AI Gateway API Version 2.2 Notice Voice.AI Gateway | API Reference Guide Notice Information contained in this document is believed to be accurate and reliable at the time of printing. However, due to ongoing product improvements and revisions, AudioCodes cannot guarantee accuracy of printed material after the Date Published nor can it accept responsibility for errors or omissions. Updates to this document can be downloaded from https://www.audiocodes.com/library/technical-documents. This document is subject to change without notice. Date Published: November-04-2020 WEEE EU Directive Pursuant to the WEEE EU Directive, electronic and electrical waste must not be disposed of with unsorted waste. Please contact your local recycling authority for disposal of this product. Customer Support Customer technical support and services are provided by AudioCodes or by an authorized AudioCodes Service Partner. For more information on how to buy technical support for AudioCodes products and for contact information, please visit our website at https://www.audiocodes.com/services-support/maintenance-and-support. Documentation Feedback AudioCodes continually strives to produce high quality documentation. If you have any comments (suggestions or errors) regarding this document, please fill out the Documentation Feedback form on our website at https://online.audiocodes.com/documentation-feedback. Stay in the Loop with AudioCodes - ii - Notice Voice.AI Gateway | API Reference Guide Notes and Warnings OPEN SOURCE SOFTWARE. Portions of the software may be open source software and may be governed by and distributed under open source licenses, such as the terms of the GNU General Public License (GPL), the terms of the Lesser General Public License (LGPL), BSD and LDAP, which terms are located at https://www.audiocodes.com/services-support/open-source/ and all are incorporated herein by reference.
    [Show full text]
  • Security and Privacy Issues in FHIR Subscription
    Security Working Group Security and Privacy Issues in FHIR Subscription Mohammad Jafari, Kathleen Connor, John M. Davis, Christopher Shawn Version 1.1 December 17 , 2019 (revised for publication on 1/20/2020) Security and Privacy Issues in FHIR Subscriptions December 17, 2019 Table of Contents 1 Introduction ................................................................................................................. 1 1.1 Related Technologies .................................................................................................... 2 2 Anatomy of a Subscription Service ............................................................................ 3 2.1 Subscription Topics ....................................................................................................... 3 2.2 Subscriptions Management ........................................................................................... 4 2.3 Event Monitor ................................................................................................................ 4 2.4 Notification Delivery ..................................................................................................... 4 2.5 Notification Processing ................................................................................................. 5 3 Security and Privacy Considerations ......................................................................... 6 3.1 Authorization for Subscription Management ................................................................ 6 3.2 Recipient’s Consent
    [Show full text]
  • Office365mon Subscription Management API
    Office365Mon Subscription Management API Office365Mon provides a set of APIs for managing subscriptions in our service. With it you can do things like create a subscription, change the details about the subscription, modify the list of administrators and notifications for a subscription, configure the resources being monitored for the subscription, and more. Using the subscription management API requires you to first create an application in your Azure Active Directory and add the Office365Mon applications to it. You’ll then reference your application information when requesting an access token that you can use to work with the subscription management API. This process is explained and illustrated in great detail in our API documentation for accessing report data, which you can download from https://www.office365mon.com/Office365Mon_AccessToken_And_API.pdf. It’s highly recommended to download that document first to ensure your environment is set up correctly before using this subscription management API. For resellers there are some special APIs just for you. You need to be registered with Office365Mon.Com to use the reseller APIs, which you can do by contacting us at [email protected]. Once you’re registered then you use the Reseller* APIs described at the end of this document to create new subscriptions and add and remove plans for those subscriptions. Once a subscription is actually created though, you can use the same Subscription Management APIs as everyone else to manage it – change the list of Admins, add or remove notification
    [Show full text]
  • Making Phone Calls from Blazor Webassembly with Twilio Voice
    © Niels Swimberghe https://swimburger.net - @RealSwimburger 1 About me • Niels Swimberghe aka Swimburger • Grew up in Belgium, working in USA • .NET Developer / Tech Content Creator • Blog at swimbuger.net • Twitter: @RealSwimburger • Company: 2 Programmatic communication using HTTP Webhooks Example TwiML Sample: https://demo.twilio.com/welcome/voice/ Based on in-depth guide on Twilio Blog Check out guide at Twilio Blog Application • Out of the box Blazor WebAssembly application • Phone dialer • Initiate phone calls from browser • Receive phone calls in browser Recommended architecture Demo architecture Demo architecture Auth flow 1. Ajax HTTP Request JWT token 2. Server generates JWT token and sends token in HTTP response 3. Twilio JavaScript SDK establishes bidirectional connection with Twilio over WebSocket Incoming call flow 1. Phone calls Twilio Phone Number 2. Twilio sends HTTP request to your webhook asking for instructions 3. Webhook responds with TwiML instructions Incoming call flow Webhook responds with TwiML instructions Incoming call flow 4. Twilio dials client 5. Client accepts incoming connection => VoIP established Outgoing call flow 1. Client connects to Twilio with To parameter 2. Twilio sends HTTP request to your webhook asking for instructions 3. Webhook responds with TwiML instructions Outgoing call flow Webhook responds with TwiML instructions Outgoing call flow 4. Twilio dials phone number 5. Phone accepts incoming connection => VoIP established Let’s see how its built Step 1: Create Twilio resources • You need to
    [Show full text]
  • What's in CX Commerce Cloud?
    What’s in CX Commerce Cloud? 20A release detail May 2020 | Version 1.00 Copyright © 2020, Oracle and/or its affiliates PURPOSE STATEMENT Oracle CX Commerce is a cloud-native, fully featured, extensible SaaS commerce solution, delivered in the Oracle Cloud, supporting B2C and B2B models in a single platform. CX Commerce grants greater agility and cost savings, with the extensibility and control required in the ultra-competitive digital commerce market. SIMPLIFY your technology footprint. INNOVATE to stay ahead of demands and competitors in a low-risk way. DELIVER to every customer, every time to increase loyalty and revenue. DISCLAIMER CX Commerce has frequent releases. Please ensure you have the latest documentation This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. This document is for informational purposes only and is intended solely to assist you in planning for the implementation and upgrade of the product features described. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions.
    [Show full text]
  • Alibaba Cloud
    AAlliibbaabbaa CClloouudd Alibaba Cloud AlAiblibaabbaa CClloouud dS eSrveicrev iMces hMesh DaDtaa Ptlaan Pelane Document Version: 20210809 Document Version: 20210809 Alibaba Cloud Service Mesh Dat a Plane·Legal disclaimer Legal disclaimer Alibaba Cloud reminds you t o carefully read and fully underst and t he t erms and condit ions of t his legal disclaimer before you read or use t his document . If you have read or used t his document , it shall be deemed as your t ot al accept ance of t his legal disclaimer. 1. You shall download and obt ain t his document from t he Alibaba Cloud websit e or ot her Alibaba Cloud- aut horized channels, and use t his document for your own legal business act ivit ies only. The cont ent of t his document is considered confident ial informat ion of Alibaba Cloud. You shall st rict ly abide by t he confident ialit y obligat ions. No part of t his document shall be disclosed or provided t o any t hird part y for use wit hout t he prior writ t en consent of Alibaba Cloud. 2. No part of t his document shall be excerpt ed, t ranslat ed, reproduced, t ransmit t ed, or disseminat ed by any organizat ion, company or individual in any form or by any means wit hout t he prior writ t en consent of Alibaba Cloud. 3. The cont ent of t his document may be changed because of product version upgrade, adjust ment , or ot her reasons. Alibaba Cloud reserves t he right t o modify t he cont ent of t his document wit hout not ice and an updat ed version of t his document will be released t hrough Alibaba Cloud-aut horized channels from t ime t o t ime.
    [Show full text]
  • Developer Guide Amazon Chime Developer Guide
    Amazon Chime Developer Guide Amazon Chime Developer Guide Amazon Chime: Developer Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Chime Developer Guide Table of Contents What is Amazon Chime? ..................................................................................................................... 1 Pricing ...................................................................................................................................... 1 Resources .................................................................................................................................. 1 Extending the Amazon Chime desktop client ......................................................................................... 2 User management ...................................................................................................................... 2 Invite multiple users ........................................................................................................... 2 Download user list ............................................................................................................
    [Show full text]
  • Micro Focus Fortify Software Security Center User Guide
    Micro Focus Fortify Software Security Center Software Version: 20.2.0 User Guide Document Release Date: Revision 2 - January 5, 2021 Software Release Date: November 2020 User Guide Legal Notices Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK https://www.microfocus.com Warranty The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2008 - 2021 Micro Focus or one of its affiliates Trademark Notices All trademarks, service marks, product names, and logos included in this document are the property of their respective owners. Documentation Updates The title page of this document contains the following identifying information: l Software Version number l Document Release Date, which changes each time the document is
    [Show full text]
  • Using Azure Services from Webassembly Modules
    Using Azure services from WebAssembly modules Radu Matei May 11, 2021 This article originally appeared on the Microsoft DeisLabs blog1 WAGI, the WebAssembly Gateway Interface2, is a simple way of writing and executing HTTP response handlers as WebAssembly modules. We recently added new features to WAGI3, such as pulling modules from OCI registries and outbound HTTP connections from guest modules, which opened the possibility of using Azure services from Wasm modules, and in this article we explore building and running such modules. WAGI provides a very simple application model for building server-side HTTP response handlers using WebAssembly. Theoretically, any language that compiles to WASI, WebAssembly System Interface4, can be used build a WAGI handler, since WAGI is modeled after the CGI specification5 – read the request body from the process’ standard input and environment variables and write the response to standard output. Since the request bodies can be read as byte arrays, modules can perform any computation on them, with the advantage of running the modules in the WASI isolation sandbox, together with an experimental HTTP library6 that allows modules to send outbound HTTP connections. But besides raw HTTP connections, most real-world scenarios will also regularly need to use external services such blob storage, databases, or message-passing systems, which is why we are experimenting with using a subset of the Azure SDK for Rust from WebAssembly modules – specifically, Azure Blob Storage (reading and writing blobs), Cosmos DB (reading
    [Show full text]
  • Webhooks Integration Guide
    Webhooks Integration Guide Version 2.1 Confidential Falconide Webhooks Integration Guide Version 2.1 Contents 1. Overview ................................................................................................................................................................................................................................................................ 3 2. How does Data transmission happen? .................................................................................................................................................................................................................. 4 3. How to Configure Webhooks ................................................................................................................................................................................................................................. 5 4. Events Data .......................................................................................................................................................................................................................................................... 12 5. How to collect the event data? ............................................................................................................................................................................................................................ 14 6. Track your Webhooks .........................................................................................................................................................................................................................................
    [Show full text]
  • Alerta Documentation Release 6.0
    alerta Documentation Release 6.0 Nick Satterly Oct 02, 2018 Contents 1 Demo Sites 3 1.1 Quickstart................................................3 1.2 Design Principles.............................................4 1.3 Server & API...............................................5 1.4 Alerta Web UI..............................................9 1.5 Alerta CLI................................................ 11 1.6 Integrations & Plugins.......................................... 19 1.7 Authentication.............................................. 23 1.8 Authorization............................................... 30 1.9 Configuration............................................... 31 1.10 Deployment............................................... 37 1.11 Customer Views............................................. 40 1.12 Conventions............................................... 41 1.13 Development............................................... 43 1.14 Getting Started.............................................. 44 1.15 Resources................................................. 45 1.16 API Reference.............................................. 46 1.17 Alert Format............................................... 77 1.18 Heartbeat Format............................................. 80 2 Contribute 81 3 Support 83 3.1 Frequently Asked Questions....................................... 83 4 License 87 4.1 Releases................................................. 87 4.2 About................................................... 91 5 Indices and tables
    [Show full text]