Automated Control of Internet Services
|
|
- Lucy Simmons
- 5 years ago
- Views:
Transcription
1 Automated Control of Internet Services Jean Arnaud IRIA Grenoble, France ABSTRACT Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending on workload evolution. In this paper, we address both problems by dynamically calculating an optimal configuration for multi-tier Internet services and applying this configuration to the managed application. Our approach is based on two main components. A model of the underlying application, and a controller using this model to find the optimal configuration according current environment and performance objectives. We evaluate the model accuracy and the controller efficiency. Experiments show that our solution improves resource consumption, and may lead to significant energy savings, besides matching the performance objectives even with a dynamic workload. Keywords Multi-tier applications, Cost, Availability, Performance, SLA, Modeling, Capacity planning Categories and Subject Descriptors C.2.4 [Distributed Systems]: Client/server, Distributed applications; C.4 [Performance of Systems]: Performance attributes, Reliability, availability, and service ability; D.4.8 [Performance]: Modeling and prediction General Terms Algorithms, Performance 1. ITRODUCTIO As multi-tier architectures become the most used design for Internet services, their configuration poses some significant challenges, in terms of performance, reliability and cost. Performance and reliability are important for the quality of service that clients experience, while cost is important for Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. FeBid 1, april 13, 21, Paris, France Copyright c 21 ACM /1/4...$1.. the application hoster. Finding a configuration that matches all this conflicting objectives could be very difficult. Moreover, the amount of clients concurrently accessing the service is not constant across time, nor the kind of requests they send. Thus, monitoring the client interactions and adapting the service to their needs are real challenges in such dynamic systems. Some multi-tiered Internet services faces large amount of request at the same time. Clusters are used to run Internet services, providing the ability to add or remove resources to the service when load evolves. More client requests, or increased requests heaviness will leads to increased resources consumption. On the opposite, when load decreases, we can save costly resources. Properly adding and removing resources when needed will leads to cost-efficient Internet services. Each server of the application has also several configuration parameters that impact global system performance. As we can see, finding the most efficient configuration could be a very difficult to impossible task to do for a human administrator. Our approach aims to provide a tool for dynamically adapting multi-tier Internet services configuration, through an autonomic controller that handles all tasks from monitoring to applying new configuration. This paper describes the two main components of our approach. First, a model to predict a system performance depending on entering workload and its configuration. Second, a capacity planning algorithm that, given high level performance objectives, uses this model to find an optimal configuration. The remainder of this paper is organized as follows. Section 2 presents the context of multi-tiered Internet services. We introduce our model in section 3. The design principles of our control approach is detailled in section 4. Section 5 provides a brief overview of the related work, and section 6 draws our conclusion. 2. DEFIITIOS 2.1 Multi-tier Internet services A multi-tier system is composed of a series of M tiers T 1, T 2,..., T M. Each tier is tasked with a specific concern. For instance, a three-tier system could consists of tier T 1 responsible of processing the application web content, tier T 2 responsible of the application business logic, and tier T 3 responsible of the storage of non-ephemeral data of the application. When a client issues a request to a multi-tier system, the request first accesses tier T 1, and then may flow through successive tiers T 2, T 3,..., T M. More precisely, when
2 a request is processed by tier T i either a response is returned to tier T i 1 (or to the client if i = 1), or a subsequent request is sent to tier T i+1 (if i < M). Multiple clients may concurrently access a multi-tier system. In its basic form, each tier consists of a single server. To prevent a server from thrashing when the number of concurrent clients grows, a classically used technique is admission control [7]. It consists in fixing a limit for the maximum number of clients allowed to concurrently access a server also known as the Multi-Programming Level (MPL) configuration parameter of servers. Above this limit, incoming clients are abandoned (i.e. rejected). Thus, a client request processed by a multi-tier system either terminates successfully with a response to the client, or is abandoned because of a server s concurrency limit. Moreover, a multi-tier application may face a varying workload amount and a varying workload mix over time. The workload amount denoted is the number of clients that try to concurrently access a multi-tier application. And the workload mix denoted X corresponds to the distribution of different types of interactions issued by clients. Application workload variation reflects different client behaviors at different times; for instance, an service is likely to face a higher workload amount in the morning than in the rest of day. X is a structure containing visit ratio V i which concerns load repartition on each tier and Z, the average client think time between interactions. Multi-tier servers are hosted by machines (i.e. computing units), and a machine is exclusively owned by a server. However, for scalability purposes, a tier is usually provisioned with multiple servers in a cluster built atop replication, partitioning and load balancing techniques. In the following, we consider fair load balancing techniques. If not provisioned adequately, cluster-based multi-tier applications may face a bottleneck on one of the tiers; and bottleneck may occur at most on one tier at a given time [2]. We consider that adding more machines to an overloaded tier reduces load amount on each machine of the tier, thus improving overall performances. We also made the assumption that machines are homogeneous inside each tier of the application, as it is typically the case in computer clusters of that size [1]. 2.2 Quality of Internet services SLA Service Level Agreement is a contract negotiated between clients and their service provider [8]. It specifies service level objectives (SLOs) that the application must guarantee in the form of constraints on performance and availability. Among the key metrics of interest for quantifying the performance and availability of multi-tier applications, we can cite client request latency and client request abandon rate used in the following. The latency of a client request is the necessary time for a multi-tier application to process that request. The average client request latency (or latency, for short) of a multi-tier application is denoted as l. A low latency is a desirable behavior which reflects a reactive application. The abandon rate of client requests is the ratio of requests that are rejected by a multi-tier application compared to the total number of requests issued by clients to that application. It is denoted as α. A low client request abandon rate (or abandon rate, for short) is a desirable behavior which reflects the level of availability of a multi-tier application. Besides performance and availability metrics, the cost of a multi-tier application is another aspect that is taken into account when optimizing application provisioning. The cost of a multi-tier system refers to the economical and energetical costs of this system. Here, cost is defined as the total number of machines that host a cluster-based multi-tier application, and is denoted as ω. Saving energy from running servers is always a good point, even if machines amount are not limited, then a low cost always preferable. 2.3 Configuration of Internet services We define the configuration κ of a cluster-based multitier application with a triplet κ(m, AC, LC), where M is the fixed number of tiers of the multi-tier application, and AC and LC are respectively the architectural configuration and local configuration of the application. We define the architectural configuration of a cluster-based multi-tier application as the distributed setting of the application in the form of the number of replica servers at each tier. It is conceptualized as an array AC < AC 1, AC 2,..., AC M >, where AC i is the number of machines at tier T i of the multi-tier application. We define the local configuration of a multitier application as the local tuning parameter(s) applied on servers at tier T i. Local configuration is conceptualized as an array LC < LC 1, LC 2,..., LC M >; and in the following, LC i represents servers MPL (multi-programmig level) at tier T i of the multi-tier system. 3. MODEL OF ITERET SERVICES 3.1 Model definition We propose a queuing network model of Internet services based on the Mean Value Analysis algorithm [12]. Roughly speaking, we model each server as queue, and requests are going from one queue to another, representing the processing time required on each tier. Figure 1 summarizes the model inputs, outputs and state parameters. Figure 1: Model parameters The model inputs variables are the configuration κ of the system, the workload mix X and amount. The initial κ < M, AC,LC > is provided to the controller at its startup, then maintained until the controller stops. Workload amount is probed on the first tier of the real system. The visit ratios V i from workload mix X < V i, Z > are processed by the controller using relative throughput on each tier. The average client think time Z is measured on the first tier of the application. In addition to input variables, the model has two state variables, called service times S i and communication delays D i.
3 Service time S i is the average incompressible time necessary to process a request on tier T i. Communication delay D i is the average incompressible network communication time between tier T i 1 and tier T i. D 1 is always equal to, since T 1 is the first tier of the application. The internal state variables are calculated using the measured latency and abort rates. We search for the S i and D i values that minimize the deviation between model prediction and current measurements. We used gradient descent algorithm to efficiently find the best internal state parameters. Indeed, preliminary experiments have shown that the space of internal state variables has no local optimal. For example, figure 2 plots the model deviation according to S 1 and S 2 state parameters values (D 2 is not represented) Model prediction deviation (latency) 2 S1 parameter (ms) 3 4 Deviation with 5 clients (%) S2 parameter (ms) Figure 2: Model deviation depending on internal state parameters The proposed model has also 3 output variables, which are the latency l, abort rate α and cost w of the considered application. The output processing is detailed in algorithm 1. We begin by using the local configuration to calculate the admitted clients. Then we process the latency l, injecting admitted clients one by one into the queuing network. Little s law is used to calculate the queue length on each tier. The ratio between rejected request throughput and total request throughput determines the abort rate. The cost of the multi-tier application is the total amount of allocated machines. 3.2 Model validation Experimental setup Model and utility-aware capacity planning and provisioning evaluations have been conducted using the TPC-W benchmark [13], that models a realistic web bookstore. TPC-W comes with a client emulator which generates a set of concurrent clients issuing requests for browsing the content of the bookstore, consulting the best-sellers, etc. The client emulator generates a tunable workload; this allows us to vary the workload amount and workload mix during the experiments. In our experiments, the on-line bookstore was deployed as a cluster-based two-tier system, consisting of a cluster of replicated web/business servers as a front-end and a cluster of replicated database servers as a backend. Our experiments have been conducted on a set of computers organized as follows: a first computer dedicated to the 1 Input: : workload amount X < V i, Z >: workload mix κ < M, AC, LC >: multi tier system configuration Output: l: latency α: abort rate ω: cost R = Z; τ = ; ω= ; 2 /* abort rate (first part) */ 3 for m = 1;m M;i + + do 4 MPL m = AC m LC m 5 ar m = Max(,1 MPLm V m ) 6 α= Max(ar 1...ar M) 7 = (1 α); /* admitted clients */ 8 /* latency */ 9 for m = 1;m M;m + + do 1 Ql m = ; 11 for n = 1;n ;n + + do 12 for m = 1;m M;m + + do 13 R m = Max(V m S m, 14 (1+Ql m) (V m S m V m D m)/ac m)+v m D m n τ = ( R + P M ); /* throughput */ m=1 R m for m = 1;m < M;m + + do Ql m = τ R m; /* Little s law */ l= P 18 M m=1 Rm; /* latency */ 19 /* cost */ 2 for m = 1;m M;m + + do 21 ω=ω+ac m; /* total #resources */ 22 /* abort rate (second part) */ 23 τ failed = α /Z 24 τ success = /(Z + l) τ α= failed 25 τ failed +τ success Algorithm 1: Modeling multi-tier systems client emulator, a second one for our controller, a front-end cluster of replicated servers running Apache Tomcat 5.5 web and application server, and a back-end cluster of replicated servers running MySQL 5. database server. A proxy-based approach was followed in order to implement admission control, and load balancing among the replicas of a tier. Here, load balancing is able to dynamically integrate/remove replicas upon server (un-)provisioning. The experiments were conducted on a cluster of machines with bi-2.33 GHz Intel Xeon CPUs and 4 GB RAM, connected via a 1 Gb/s Ethernet LA Model validation Scenario. To test model accuracy, we consider an experiment with varying workload amount and mix. The workload amount evolves between 25 and 125 clients, with irregular steps to simulate load peaks. The workload mix changes from mix 1 to mix 2 at the middle of the experiment. Mix 2 has more heterogeneous client interactions than Mix 1. Figure 3 presents the workload mix and amount as measured by the controller. We used for our model validation experiments
4 two configurations κ1 and κ2 defined as follow: κ1 : AC =< 1, 1 >, LC =< 5, 5 >: a low-cost configuration, where capacity is increased through high local configuration. κ2 : AC =< 3,6 >, LC =< 2, 1 >: a large configuration where capacity is increased through high architectural configuration, with default values for local configuration, since Tomcat default MPL is 2 and MySQL one is 1. not test a larger configuration). The capacity planning algorithm uses the model to get the performance predictions for a configuration. On a second step, the capacity planning algorithm performs a dichotomic search into this configuration space to find the optimal configuration. The optimal configuration is the less costly configuration that matches the SLA. The capacity planning is automatically triggered when the SLA is not matched by the currently applied configuration. For example, this can happen after the workload amount has increased. The controller also regularly calls the capacity planning algorithm, to check if the configuration is still the optimal one, i.e. if some resources can be saved. Workload amount Workload amount Workload mix Figure 3: Workload variation Figure 4 compares the real latency measured on the system, and the model prediction for the first configuration κ1. The average latency deviation is 1ms, which represents less than 1% of the average measured latency. Figure 5 compares real and measured abort rates for this configuration. The relative average deviation of the abort rate is 1%. As we can see, the model is close to the real system for both latency and abort rate criteria. Figure 6 compares the real latency measured on the system, and the model prediction for the first configuration κ2. The relative deviation between average latencies is under 1%. Figure 7 compares real and measured abort rates for this configuration. The relative average deviation of the abort rate is under 2%. As we can see, the model is close to the real system for both latency and abort rate criteria. 4. AUTOMATED COTROL 4.1 Controller presentation We designed a controller, responsible of monitoring the system, processing the optimal configuration, and applying this configuration to the controlled Internet service. The controller has only two inputs, the Service Level Agreement and a list of available resources. Capacity Planning. We provide a capacity planning algorithm to find the optimal configuration of a multi-tier Internet service. This algorithm has two main steps. Firstly, it bounds the set of all possible configurations, by rejecting the useless ones. There is no need to add some resources to a configuration that already matches the SLA, so an acceptable configuration defines a bound for the configuration space (we will Workload mix Enforcing Optimal Configuration. Once the optimal configuration has been calculated, we have to apply this configuration to the real system. The architectural configuration is applied by adding and/or removing resources from the Internet service tiers. We apply the local configuration by modifying admission control on each tier. The controller provides actuators for the aforementionned operations. Since all the steps from monitoring to configurations are performed automatically, the controller can adapt the system to varying workload without any human intervention. 4.2 Control evaluation We compared three configurations, two of them being static (κ1 and κ2 we defined in section 3.2.2), and a third one κ3 dynamically configured by our controller. For each configuration, we runned the same experiment, consisting in several steps of varying workload, with peaks and drops. The SLA we specified to the controller is requiring a latency under 7 seconds, and an abort rate under 5%. As we can see on figure 9, κ3 is the only configuration to match the SLA requirement concerning abort rates. Both κ1 and κ2 imply large abort rates when workload amount is too high. This is due to a low architectural configuration for κ1, and a low local configuration for κ2. Figure 8 represents the system latency with each configuration. κ1 latency is above SLA objective most of the time, because this configuration allow a lot of requests to run simultaneously on the same server. This induces trashing and high latency for κ1. The latency objective is matched by κ2 and κ3. We can check system cost on figure 1. κ1 is the most economical configuration, but respects neither latency nor abort rate objectives. The controlled system (κ3) achieves to be more economical than κ2, although it is the only configuration to match both latency and abort rate criteria. Figure 11 represents the architectural and the local configurations of the controlled system (κ3). The controller dynamically adapt configuration to the current workload to match SLA constraints. As we can see, even with high load variations, our approach leads to fast system adaptation and preserves quality of service. 5. RELATED WORK Internet services configuration poses significant challenges in terms of performance, availability and cost [9, 3]. Admission control (i.e. MPL control) and server provisionning are used to improve these criteria. Elnikety et. al. apply admission control at the level of a web server [5], Milan- Franco et. al. use it in database servers [11], whereas Menascé et. al. study it at each tier of a multi-tier system [1]. Some ad-
5 14 12 k1 - Real system k1 - Modeled system k1 - Real system k1 - Modeled system Latency (ms) Abandon rate (%) Figure 4: κ1 Latency with workload variation Figure 5: κ1 Abort rates with workload variation 2 k2 - Real system k2 - Modeled system 15 1 k2 - Real system k2 - Modeled system Latency (ms) Abandon rate (%) Figure 6: κ2 Latency with workload variation Figure 7: κ2 Abort rates with workload variation mission control solutions are proposed in the form of heuristics such as the well-known hill-climbing heuristic [6]. Some approches provide quality of service guarantees through application modeling. Diao et. al. use an analytic model to control MPL in multi-tier systems [4]. Zhang et. al. propose a regression-based modeling of multi-tier applications in order to predict the capacity of applications in terms of allowed concurrent clients [16]. Other approaches control the dynamic provisioning of servers in cluster-based systems. Villela et. al. follow a model-based approach for provisioning the business tier in a multi-tier system [15]. Urgaonkar et. al. apply an analytic model calibrated for the underlying workload mix in order to plan the capacity of multi-tier systems in terms of the number of servers to provision at each tier [14]. Both approaches are motivated by performance objectives; however they require calibrating the model with appropriate parameters. Our present work provides a self-calibrating model for multi-tier Internet services. This model is used to dynamically provision the service and adapt admission control on each of its tier. 6. COCLUSIO In this paper, we present an autonomic Internet services controller, for adapting the configuration of a multi-tier application facing a dynamic workload. The controller goal is to match quality of service objectives while reducing the amount of resources allocated to the application. Our approach is based on two main components: A queuing theory based model of the underlying application, capable of predicting the application performance, and a controller which monitors the system, calculates the optimal configuration, and apply this configuration to the system. The experiments conducted on an online multi-tier application show that our solution may improve quality of service while reducing running costs of the application. 7. REFERECES [1] R. Buyya. High Performance Cluster Computing - Volume 1. Prentice Hall, [2] E. Cecchet, A. Chanda, S. Elnikety, J. Marguerite, and W. Zwaenepoel. Performance Comparison of Middleware Architectures for Generating Dynamic Web Content. In ACM/IFIP/USEIX International Middleware Conference, Rio de Janeiro, Brazil, June 23. [3] D. A. Menascé and V. A. F. Almeida. Capacity Planning for Web Services: Metrics, Models, and Methods. Prentice Hall, 21. [4] Y. Diao, J. L. Hellerstein, S. Parekh, H. Shaikh, and M. Surendra. Controlling Quality of Service in Multi-Tier Web Applications. In 26th International Conference on Distributed Computing Systems (ICDCS 26), Lisbon, Portugal, July 26.
6 12 1 SLA k1 k2 k SLA k1 k2 k3 8 7 Latency (ms) 6 Abandon rate (%) Figure 8: Latency with and without control Figure 9: Abort rate with and without control 12 1 k1 k2 k3 1 8 k3 - AC on tier 1 k3 - AC on tier 2 k3 - LC on tier 1 k3 - LC on tier Cost (# resources) Architectural configuration Local configuration Figure 1: System cost with and without control Figure 11: Controlled system configuration [5] S. Elnikety, J. Tracey, E. ahum, and W. Zwaenepoel. A method for transparent admission control and request scheduling in e-commerce web sites. In The 13th international conference on World Wide Web, 24. [6] H.-U. Heiss and R. Wagner. Adaptive load control in transaction processing systems. In VLDB, [7] J. Hyman, A. A. Lazar, and G. Pacifici. Joint Scheduling and Admission Control for ATS-based Switching odes. In The ACM Conference on Communications Architecture and Protocols (SIGCOMM 92), Baltimore, MA, Aug [8] J. Lee and R. Ben-atan. Integrating Service Level Agreements. Wiley, 22. [9] C. Loosley, F. Douglas, and A. Mimo. High-Performance Client/Server. John Wiley & Sons, ov [1] D. A. Menascé, D. Barbara, and R. Dodge. Preserving QoS of E-Commerce Sites Through Self-Tuning: A Performance Model Approach. In ACM Conference on Electronic Commerce (EC 1), Tampa, FL, Oct. 21. [11] J. Milan-Franco, R. Jimenez-Peris, M. Patino-Martinez, and B. Kemme. Adaptive middleware for data replication. In Middleware 4: Proceedings of the 5th ACM/IFIP/USEIX international conference on Middleware, 24. [12] M. Reiser and S. S. Lavenberg. Mean-value analysis of closed multichain queuing networks. J. ACM, 27(2), 198. [13] TPC. [14] B. Urgaonkar, G. Pacifici, P. Shenoy, M. Spreitzer, and A. Tantawi. Analytic modeling of multitier internet applications. ACM Transactions on the Web (ACM TWEB), 1(1):2, 27. [15] D. Villela, P. Pradhan, and D. Rubenstein. Provisioning Servers in the Application Tier for E-Commerce Systems. ACM Trans. Interet Technol., 7(1), 27. [16] Q. Zhang, L. Cherkasova, and. Mi. A Regression-Based Analytic Model for Capacity Planning of Multi-Tier Applications. Journal of Cluster Computing, 11(3), 28.
CoSAC: Coordinated Session-based Admission Control for Multi-tier Internet Applications
: Coordinated Session-based Admission Control for Multi-tier Internet Applications Sireesha Muppala and Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs, CO 918, USA
More informationHybrid Auto-scaling of Multi-tier Web Applications: A Case of Using Amazon Public Cloud
Hybrid Auto-scaling of Multi-tier Web Applications: A Case of Using Amazon Public Cloud Abid Nisar, Waheed Iqbal, Fawaz S. Bokhari, and Faisal Bukhari Punjab University College of Information and Technology,Lahore
More informationSelf-Sizing of Clustered Databases
Self-Sizing of Clustered Databases Christophe Taton 1, Sara Bouchenak 2, Noël De Palma 1, Daniel Hagimont 3, Sylvain Sicard 2 (1) Institut National Polytechnique de Grenoble, France (2) Université Joseph
More informationMoKa: A System for Modeling and Capacity Planning of Multi-Tier Systems
MoKa: A System for Modeling and Capacity Planning of Multi-Tier Systems Jean Arnaud, Sara Bouchenak To cite this version: Jean Arnaud, Sara Bouchenak. MoKa: A System for Modeling and Capacity Planning
More informationR-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads
R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads Qi Zhang, Lucy Cherkasova, Guy Matthews, Wayne Greene, Evgenia Smirni Enterprise Systems and Software
More informationON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS
2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé
More informationTowards Autonomic Hosting of Multi-tier Internet Applications
Towards Autonomic Hosting of Multi-tier Internet lications Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen Dept. of Computer Science, Vrije Universiteit, Amsterdam, The Netherlands Email:
More informationPerformance Assurance in Virtualized Data Centers
Autonomic Provisioning with Self-Adaptive Neural Fuzzy Control for End-to-end Delay Guarantee Palden Lama Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs Performance
More informationDynamic control and Resource management for Mission Critical Multi-tier Applications in Cloud Data Center
Institute Institute of of Advanced Advanced Engineering Engineering and and Science Science International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 3, June 206, pp. 023 030 ISSN:
More informationDatabase Replication in Tashkent. CSEP 545 Transaction Processing Sameh Elnikety
Database Replication in Tashkent CSEP 545 Transaction Processing Sameh Elnikety Replication for Performance Expensive Limited scalability DB Replication is Challenging Single database system Large, persistent
More informationOn the Use of Performance Models in Autonomic Computing
On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle
More informationA Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications
A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications Qi Zhang College of William and Mary Williamsburg, VA 23187, USA Ludmila Cherkasova Hewlett-Packard Labs Palo
More informationA Capacity Planning Methodology for Distributed E-Commerce Applications
A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The
More informationQuantifying Load Imbalance on Virtualized Enterprise Servers
Quantifying Load Imbalance on Virtualized Enterprise Servers Emmanuel Arzuaga and David Kaeli Department of Electrical and Computer Engineering Northeastern University Boston MA 1 Traditional Data Centers
More informationElastic Resource Provisioning for Cloud Data Center
Elastic Resource Provisioning for Cloud Data Center Thant Zin Tun, and Thandar Thein Abstract Cloud data centers promises flexible, scalable, powerful and cost-effective executing environment to users.
More informationA Quantitative Model for Capacity Estimation of Products
A Quantitative Model for Capacity Estimation of Products RAJESHWARI G., RENUKA S.R. Software Engineering and Technology Laboratories Infosys Technologies Limited Bangalore 560 100 INDIA Abstract: - Sizing
More informationSLA Decomposition: Translating Service Level Objectives to System Level Thresholds
SLA Decomposition: Translating Service Level Objectives to System Level Thresholds Yuan Chen, Subu Iyer, Xue Liu, Dejan Milojicic, Akhil Sahai Enterprise Systems and Software Laboratory HP Laboratories
More informationQoS-aware resource allocation and load-balancing in enterprise Grids using online simulation
QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation * Universität Karlsruhe (TH) Technical University of Catalonia (UPC) Barcelona Supercomputing Center (BSC) Samuel
More informationA regression-based analytic model for capacity planning of multi-tier applications
Cluster Comput (2008) 11: 197 211 DOI 10.1007/s10586-008-0052-0 A regression-based analytic model for capacity planning of multi-tier applications Qi Zhang Ludmila Cherkasova Ningfang Mi Evgenia Smirni
More informationMigration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM
Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,
More informationAdapting Mixed Workloads to Meet SLOs in Autonomic DBMSs
Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca
More informationRegulating workload in J2EE Application Servers
Regulating workload in J2EE Application Servers Wei Xu Zhangxi Tan Armando Fox David Patterson {xuw, xtan, fox, patterson}@cs.berkeley.edu Abstract In this project, we design and implement flow control
More informationReactive Provisioning of Backend Databases in Shared Dynamic Content Server Clusters
Reactive Provisioning of Backend Databases in Shared Dynamic Content Server Clusters GOKUL SOUNDARARAJAN University of Toronto and CRISTIANA AMZA University of Toronto This paper introduces a self-configuring
More informationREGULATING RESPONSE TIME IN AN AUTONOMIC COMPUTING SYSTEM: A COMPARISON OF PROPORTIONAL CONTROL AND FUZZY CONTROL APPROACHES
REGULATING RESPONSE TIME IN AN AUTONOMIC COMPUTING SYSTEM: A COMPARISON OF PROPORTIONAL CONTROL AND FUZZY CONTROL APPROACHES Harish S. Venkatarama 1 and Kandasamy Chandra Sekaran 2 1 Reader, Computer Science
More informationFuture-ready IT Systems with Performance Prediction using Analytical Models
Future-ready IT Systems with Performance Prediction using Analytical Models Madhu Tanikella Infosys Abstract Large and complex distributed software systems can impact overall software cost and risk for
More informationControlling the Behaviour of Database Servers with 2PAC and DiffServ
Controlling the Behaviour of Database Servers with 2PAC and DiffServ Luís Fernando Orleans 1, Geraldo Zimbrão 1, and Pedro Furtado 2 1 COPPE/UFRJ - Computer Science Department - Graduate School and Research
More informationDynamic Resource Allocation on Virtual Machines
Dynamic Resource Allocation on Virtual Machines Naveena Anumala VIT University, Chennai 600048 anumala.naveena2015@vit.ac.in Guide: Dr. R. Kumar VIT University, Chennai -600048 kumar.rangasamy@vit.ac.in
More informationSEDA: An Architecture for Well-Conditioned, Scalable Internet Services
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles
More informationPerformance Extrapolation for Load Testing Results of Mixture of Applications
Performance Extrapolation for Load Testing Results of Mixture of Applications Subhasri Duttagupta, Manoj Nambiar Tata Innovation Labs, Performance Engineering Research Center Tata Consulting Services Mumbai,
More informationEstimate performance and capacity requirements for InfoPath Forms Services 2010
Estimate performance and capacity requirements for InfoPath Forms Services 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
More informationIBM Research Report. Managing the Response Time for Multi-tiered Web Applications
RC23651 (W57-29) July 5, 25 Computer Science IM Research Report Managing the Response Time for Multi-tiered Web pplications Giovanni Pacifici, Wolfgang Segmuller, Mike Spreitzer, Malgorzata Steinder, sser
More informationWhen Average is Not Average: Large Response Time Fluctuations in n-tier Applications. Qingyang Wang, Yasuhiko Kanemasa, Calton Pu, Motoyuki Kawaba
When Average is Not Average: Large Response Time Fluctuations in n-tier Applications Qingyang Wang, Yasuhiko Kanemasa, Calton Pu, Motoyuki Kawaba Background & Motivation Analysis of the Large Response
More informationAutomated Control for Elastic Storage
Automated Control for Elastic Storage Summarized by Matthew Jablonski George Mason University mjablons@gmu.edu October 26, 2015 Lim, H. C. and Babu, S. and Chase, J. S. (2010) Automated Control for Elastic
More informationAn Admission Control Mechanism for Web Servers using Neural Network
An Admission Control Mechanism for Web Servers using Neural Network Lahcene AID Department of Computer Science University of Tiaret, Algeria Laboratoire de Communication dans les Systèmes Informatiques
More informationA Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis.
A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis. Arnaud Defrance, Stéphane Vialle, Morgann Wauquier Firstname.Lastname@supelec.fr Supelec, 2 rue Edouard
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationExtrapolation Tool for Load Testing Results
Extrapolation Tool for Load Testing Results Subhasri Duttagupta, Rajesh Mansharamani Performance Engineering Lab Tata Consulting Services Mumbai, India subhasri.duttagupta@tcs.com, rajesh.mansharamani@tcs.com
More informationA Disk Head Scheduling Simulator
A Disk Head Scheduling Simulator Steven Robbins Department of Computer Science University of Texas at San Antonio srobbins@cs.utsa.edu Abstract Disk head scheduling is a standard topic in undergraduate
More informationCHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE
143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability
More informationDynamic VM Migration: Assessing Its Risks & Rewards Using a Benchmark
Dynamic VM Migration: Assessing Its Risks & Rewards Using a Benchmark Krishnamurthy Srinivasan Intel Corporation 5000 W Chandler Blvd Chandler, AZ krishnamurthy.srinivasan@intel.com Sterlan Yuuw Intel
More informationAutomated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University
D u k e S y s t e m s Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University Motivation We address challenges for controlling elastic applications, specifically storage.
More informationDeadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen
Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,
More informationWhitepaper / Benchmark
Whitepaper / Benchmark Web applications on LAMP run up to 8X faster with Dolphin Express DOLPHIN DELIVERS UNPRECEDENTED PERFORMANCE TO THE LAMP-STACK MARKET Marianne Ronström Open Source Consultant iclaustron
More informationModeling VM Performance Interference with Fuzzy MIMO Model
Modeling VM Performance Interference with Fuzzy MIMO Model ABSTRACT Virtual machines (VM) can be a powerful platform for multiplexing resources for applications workloads on demand in datacenters and cloud
More informationModel-Driven Geo-Elasticity In Database Clouds
Model-Driven Geo-Elasticity In Database Clouds Tian Guo, Prashant Shenoy College of Information and Computer Sciences University of Massachusetts, Amherst This work is supported by NSF grant 1345300, 1229059
More informationScalability of Heterogeneous Computing
Scalability of Heterogeneous Computing Xian-He Sun, Yong Chen, Ming u Department of Computer Science Illinois Institute of Technology {sun, chenyon1, wuming}@iit.edu Abstract Scalability is a key factor
More informationQuality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation
Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation Lin Xing, Wei Wang, Gensheng Zhang Electrical Engineering and Computer Science, South
More informationTowards Autonomic Detection of SLA Violations in Cloud Infrastructures
Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Vincent C. Emeakaroha a, Marco A. S. Netto b, Rodrigo N. Calheiros c, Ivona Brandic a, Rajkumar Buyya c, César A. F. De Rose b a Vienna
More informationA Controller Based Approach for Web Services Virtualized Instance Allocation
A Controller Based Approach for Web Services Virtualized Allocation Sandesh Tripathi, S Q Abbas, Rizwan Beg 1,2,3 CSE Department, Integral university, Lucknow Abstract Few Service providers provide compute
More informationV-Cache: Towards Flexible Resource Provisioning for Multi-tier Applications in IaaS Clouds
: Towards Flexible Resource Provisioning for Multi-tier Applications in IaaS Clouds Yanfei Guo, Palden Lama, Jia Rao and Xiaobo Zhou Department of Computer Science University of Colorado, Colorado Springs,
More informationENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING
ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,
More informationVerification and Validation of X-Sim: A Trace-Based Simulator
http://www.cse.wustl.edu/~jain/cse567-06/ftp/xsim/index.html 1 of 11 Verification and Validation of X-Sim: A Trace-Based Simulator Saurabh Gayen, sg3@wustl.edu Abstract X-Sim is a trace-based simulator
More informationWhite Paper. Major Performance Tuning Considerations for Weblogic Server
White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance
More informationCataclysm: Policing Extreme Overloads in Internet Applications
Cataclysm: Policing Extreme Overloads in Internet Applications Bhuvan Urgaonkar Dept. of Computer Science University of Massachusetts Amehrst, MA bhuvan@cs.umass.edu Prashant Shenoy Dept. of Computer Science
More informationDaniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University
Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University menasce@cs.gmu.edu www.cs.gmu.edu/faculty/menasce.html D. Menascé. All Rights Reserved. 1 Benchmark System Under Test (SUT) SPEC
More informationSANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION
SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif * University of Massachusetts Amherst * Intel, Portland Data
More informationIndex. ADEPT (tool for modelling proposed systerns),
Index A, see Arrivals Abstraction in modelling, 20-22, 217 Accumulated time in system ( w), 42 Accuracy of models, 14, 16, see also Separable models, robustness Active customer (memory constrained system),
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationMulti-tier Service Differentiation: Coordinated Resource Provisioning and Admission Control
22 IEEE 8th International Conference on Parallel and Distributed Systems Multi-tier Service Differentiation: Coordinated Resource Provisioning and Admission Control Sireesha Muppala and Xiaobo Zhou Department
More informationDynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,
More informationOn load balancing and resource allocation in cloud services
On load balancing and resource allocation in cloud services Leontiou, N., Dechouniotis, D., Athanasopoulos, N., & Denazis, S. (24). On load balancing and resource allocation in cloud services. In Proceedings
More informationA Survey on Auto Scaling of Internet Application in a Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA Model-based Application Autonomic Manager with Fine Granular Bandwidth Control
A Model-based Application Autonomic Manager with Fine Granular Bandwidth Control Nasim Beigi-Mohammadi, Mark Shtern, and Marin Litoiu Department of Computer Science, York University, Canada Email: {nbm,
More informationA Predictive Load Balancing Service for Cloud-Replicated Databases
paper:174094 A Predictive Load Balancing for Cloud-Replicated Databases Carlos S. S. Marinho 1,2, Emanuel F. Coutinho 1, José S. Costa Filho 2, Leonardo O. Moreira 1,2, Flávio R. C. Sousa 2, Javam C. Machado
More informationCoordinated carrier aggregation for campus of home base stations
2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations
More informationmanagement systems Elena Baralis, Silvia Chiusano Politecnico di Torino Pag. 1 Distributed architectures Distributed Database Management Systems
atabase Management Systems istributed database istributed architectures atabase Management Systems istributed atabase Management Systems ata and computation are distributed over different machines ifferent
More informationDistributed Database Management Systems. Data and computation are distributed over different machines Different levels of complexity
atabase Management Systems istributed database atabase Management Systems istributed atabase Management Systems B M G 1 istributed architectures ata and computation are distributed over different machines
More informationPerformance Evaluation of Virtualization Technologies
Performance Evaluation of Virtualization Technologies Saad Arif Dept. of Electrical Engineering and Computer Science University of Central Florida - Orlando, FL September 19, 2013 1 Introduction 1 Introduction
More informationCataclysm: Policing Extreme Overloads in Internet Applications
Cataclysm: Policing Extreme Overloads in Internet Applications Bhuvan Urgaonkar a, Prashant Shenoy b a Department of CSE, The Pennsylvania State University, University Park, PA, 1682. Tel: +1 814 865 956
More informationTransparent Resource Management with Java RM API
Transparent Resource Management with Java RM API Arkadiusz Janik and Krzysztof Zieliński Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059 Kraków, Poland Abstract. The Multitasking Virtual
More informationIntegrating Network QoS and Web QoS to Provide End-to-End QoS
Integrating Network QoS and Web QoS to Provide End-to-End QoS Wang Fei Wang Wen-dong Li Yu-hong Chen Shan-zhi State Key Lab of Networking and Switching, Beijing University of Posts & Telecommunications,
More informationMicroFuge: A Middleware Approach to Providing Performance Isolation in Cloud Storage Systems
1 MicroFuge: A Middleware Approach to Providing Performance Isolation in Cloud Storage Systems Akshay Singh, Xu Cui, Benjamin Cassell, Bernard Wong and Khuzaima Daudjee July 3, 2014 2 Storage Resources
More informationAdaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning
Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning Saeed Ghanbari, Gokul Soundararajan, Jin Chen, Cristiana Amza Department of Electrical and Computer Engineering Department
More informationA Control-based Load Balancing Algorithm with Flow Control for Dynamic and Heterogeneous Servers
A Control-based Load Balancing Algorithm with Flow Control for Dynamic and Heterogeneous Servers Rodolpho G. de Siqueira 1, Daniel R. Figueiredo 1 1 Programa de Engenharia de Sistemas e Computação Universidade
More informationIn the world of networks, control techniques
NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation
More informationTwo-Level Cooperation in Autonomic Cloud Resource Management
Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran a, Alain Tchana b, Laurent Broto a, Daniel Hagimont a a ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran,
More informationSharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment
SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment This document is provided as-is. Information and views expressed in this document, including
More informationOracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0
Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle
More informationQLIKVIEW SCALABILITY BENCHMARK WHITE PAPER
QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER Hardware Sizing Using Amazon EC2 A QlikView Scalability Center Technical White Paper June 2013 qlikview.com Table of Contents Executive Summary 3 A Challenge
More informationStudy of Load Balancing Schemes over a Video on Demand System
Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video
More informationProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System
ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System Ying Liu, Navaneeth Rameshan, Enric Monte, Vladimir Vlassov, and Leandro Navarro Ying Liu; Rameshan, N.; Monte, E.; Vlassov,
More informationA business-oriented load dispatching framework for online auction sites
A business-oriented load dispatching framework for online auction sites Daniel A Menascé Department of Computer Science George Mason University Fairfax, VA 22030, USA menasce@csgmuedu Vasudeva Akula School
More informationPivot3 Acuity with Microsoft SQL Server Reference Architecture
Pivot3 Acuity with Microsoft SQL Server 2014 Reference Architecture How to Contact Pivot3 Pivot3, Inc. General Information: info@pivot3.com 221 West 6 th St., Suite 750 Sales: sales@pivot3.com Austin,
More informationOracle Database 12c: JMS Sharded Queues
Oracle Database 12c: JMS Sharded Queues For high performance, scalable Advanced Queuing ORACLE WHITE PAPER MARCH 2015 Table of Contents Introduction 2 Architecture 3 PERFORMANCE OF AQ-JMS QUEUES 4 PERFORMANCE
More informationWide Area Redirection of Dynamic Content by Internet Data Centers
Wide Area Redirection of Dynamic Content by Internet Data Centers S. Ranjan, R. Karrer and E. Knightly Department of Electrical and Computer Engineering Rice University Houston, TX 775, USA Abstract Traditional
More informationEnhancements to Linux I/O Scheduling
Enhancements to Linux I/O Scheduling Seetharami R. Seelam, UTEP Rodrigo Romero, UTEP Patricia J. Teller, UTEP William Buros, IBM-Austin 21 July 2005 Linux Symposium 2005 1 Introduction Dynamic Adaptability
More informationC3PO: Computation Congestion Control (PrOactive)
C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,
More informationComputational performance and scalability of large distributed enterprise-wide systems supporting engineering, manufacturing and business applications
Computational performance and scalability of large distributed enterprise-wide systems supporting engineering, manufacturing and business applications Janusz S. Kowalik Mathematics and Computing Technology
More informationAnálise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems
Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science
More informationCOMPARISON ON EFFICIENCY AND SPEED OF 2-TIER AND 3-TIER OLTP SYSTEMS
Media Informatika, Vol. 2, No. 2, Desember 2004, 23-31 ISSN: 0854-4743 COMPARISON ON EFFICIENCY AND SPEED OF 2-TIER AND 3-TIER OLTP SYSTEMS Teduh Dirgahayu, Muhammad Indra Utama Department of Informatics,
More informationDistributed Versioning: Consistent Replication for Scaling Back-end Databases of Dynamic Content Web Sites
Distributed Versioning: Consistent Replication for Scaling Back-end Databases of Dynamic Content Web Sites Cristiana Amza, Alan L. Cox and Willy Zwaenepoel Department of Computer Science, Rice University,
More informationSCALING UP VS. SCALING OUT IN A QLIKVIEW ENVIRONMENT
SCALING UP VS. SCALING OUT IN A QLIKVIEW ENVIRONMENT QlikView Technical Brief February 2012 qlikview.com Introduction When it comes to the enterprise Business Discovery environments, the ability of the
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More informationVirtual Batching for Performance Improvement and Energy Efficiency
Virtual Batching for Performance Improvement and Energy Efficiency Dazhao Cheng Department of Computer Science University of Colorado, Colorado Springs, USA Email addresses: {dcheng}@uccsedu Abstract Performance
More informationChapter 3 Virtualization Model for Cloud Computing Environment
Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics
More informationEvaluating Unstructured Peer-to-Peer Lookup Overlays
Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead
More informationResource Allocation Strategies for Multiple Job Classes
Resource Allocation Strategies for Multiple Job Classes by Ye Hu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer
More informationContents Overview of the Performance and Sizing Guide... 5 Architecture Overview... 7 Performance and Scalability Considerations...
Unifier Performance and Sizing Guide for On-Premises Version 17 July 2017 Contents Overview of the Performance and Sizing Guide... 5 Architecture Overview... 7 Performance and Scalability Considerations...
More informationE-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems
E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems Rebecca Taft, Essam Mansour, Marco Serafini, Jennie Duggan, Aaron J. Elmore, Ashraf Aboulnaga, Andrew Pavlo, Michael
More informationAn Autonomic Approach for Replication of Internet-based Services
An Autonomic Approach for Replication of Internet-based Services D. Serrano, M. Patiño-Martinez, R. Jimenez-Peris Universidad Politenica de Madrid (UPM), Spain {dserrano,mpatino,rjimenez}@fi.upm.es B.
More information