Automated Control of Internet Services

Size: px
Start display at page:

Download "Automated Control of Internet Services"

Transcription

1 Automated Control of Internet Services Jean Arnaud IRIA Grenoble, France ABSTRACT Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending on workload evolution. In this paper, we address both problems by dynamically calculating an optimal configuration for multi-tier Internet services and applying this configuration to the managed application. Our approach is based on two main components. A model of the underlying application, and a controller using this model to find the optimal configuration according current environment and performance objectives. We evaluate the model accuracy and the controller efficiency. Experiments show that our solution improves resource consumption, and may lead to significant energy savings, besides matching the performance objectives even with a dynamic workload. Keywords Multi-tier applications, Cost, Availability, Performance, SLA, Modeling, Capacity planning Categories and Subject Descriptors C.2.4 [Distributed Systems]: Client/server, Distributed applications; C.4 [Performance of Systems]: Performance attributes, Reliability, availability, and service ability; D.4.8 [Performance]: Modeling and prediction General Terms Algorithms, Performance 1. ITRODUCTIO As multi-tier architectures become the most used design for Internet services, their configuration poses some significant challenges, in terms of performance, reliability and cost. Performance and reliability are important for the quality of service that clients experience, while cost is important for Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. FeBid 1, april 13, 21, Paris, France Copyright c 21 ACM /1/4...$1.. the application hoster. Finding a configuration that matches all this conflicting objectives could be very difficult. Moreover, the amount of clients concurrently accessing the service is not constant across time, nor the kind of requests they send. Thus, monitoring the client interactions and adapting the service to their needs are real challenges in such dynamic systems. Some multi-tiered Internet services faces large amount of request at the same time. Clusters are used to run Internet services, providing the ability to add or remove resources to the service when load evolves. More client requests, or increased requests heaviness will leads to increased resources consumption. On the opposite, when load decreases, we can save costly resources. Properly adding and removing resources when needed will leads to cost-efficient Internet services. Each server of the application has also several configuration parameters that impact global system performance. As we can see, finding the most efficient configuration could be a very difficult to impossible task to do for a human administrator. Our approach aims to provide a tool for dynamically adapting multi-tier Internet services configuration, through an autonomic controller that handles all tasks from monitoring to applying new configuration. This paper describes the two main components of our approach. First, a model to predict a system performance depending on entering workload and its configuration. Second, a capacity planning algorithm that, given high level performance objectives, uses this model to find an optimal configuration. The remainder of this paper is organized as follows. Section 2 presents the context of multi-tiered Internet services. We introduce our model in section 3. The design principles of our control approach is detailled in section 4. Section 5 provides a brief overview of the related work, and section 6 draws our conclusion. 2. DEFIITIOS 2.1 Multi-tier Internet services A multi-tier system is composed of a series of M tiers T 1, T 2,..., T M. Each tier is tasked with a specific concern. For instance, a three-tier system could consists of tier T 1 responsible of processing the application web content, tier T 2 responsible of the application business logic, and tier T 3 responsible of the storage of non-ephemeral data of the application. When a client issues a request to a multi-tier system, the request first accesses tier T 1, and then may flow through successive tiers T 2, T 3,..., T M. More precisely, when

2 a request is processed by tier T i either a response is returned to tier T i 1 (or to the client if i = 1), or a subsequent request is sent to tier T i+1 (if i < M). Multiple clients may concurrently access a multi-tier system. In its basic form, each tier consists of a single server. To prevent a server from thrashing when the number of concurrent clients grows, a classically used technique is admission control [7]. It consists in fixing a limit for the maximum number of clients allowed to concurrently access a server also known as the Multi-Programming Level (MPL) configuration parameter of servers. Above this limit, incoming clients are abandoned (i.e. rejected). Thus, a client request processed by a multi-tier system either terminates successfully with a response to the client, or is abandoned because of a server s concurrency limit. Moreover, a multi-tier application may face a varying workload amount and a varying workload mix over time. The workload amount denoted is the number of clients that try to concurrently access a multi-tier application. And the workload mix denoted X corresponds to the distribution of different types of interactions issued by clients. Application workload variation reflects different client behaviors at different times; for instance, an service is likely to face a higher workload amount in the morning than in the rest of day. X is a structure containing visit ratio V i which concerns load repartition on each tier and Z, the average client think time between interactions. Multi-tier servers are hosted by machines (i.e. computing units), and a machine is exclusively owned by a server. However, for scalability purposes, a tier is usually provisioned with multiple servers in a cluster built atop replication, partitioning and load balancing techniques. In the following, we consider fair load balancing techniques. If not provisioned adequately, cluster-based multi-tier applications may face a bottleneck on one of the tiers; and bottleneck may occur at most on one tier at a given time [2]. We consider that adding more machines to an overloaded tier reduces load amount on each machine of the tier, thus improving overall performances. We also made the assumption that machines are homogeneous inside each tier of the application, as it is typically the case in computer clusters of that size [1]. 2.2 Quality of Internet services SLA Service Level Agreement is a contract negotiated between clients and their service provider [8]. It specifies service level objectives (SLOs) that the application must guarantee in the form of constraints on performance and availability. Among the key metrics of interest for quantifying the performance and availability of multi-tier applications, we can cite client request latency and client request abandon rate used in the following. The latency of a client request is the necessary time for a multi-tier application to process that request. The average client request latency (or latency, for short) of a multi-tier application is denoted as l. A low latency is a desirable behavior which reflects a reactive application. The abandon rate of client requests is the ratio of requests that are rejected by a multi-tier application compared to the total number of requests issued by clients to that application. It is denoted as α. A low client request abandon rate (or abandon rate, for short) is a desirable behavior which reflects the level of availability of a multi-tier application. Besides performance and availability metrics, the cost of a multi-tier application is another aspect that is taken into account when optimizing application provisioning. The cost of a multi-tier system refers to the economical and energetical costs of this system. Here, cost is defined as the total number of machines that host a cluster-based multi-tier application, and is denoted as ω. Saving energy from running servers is always a good point, even if machines amount are not limited, then a low cost always preferable. 2.3 Configuration of Internet services We define the configuration κ of a cluster-based multitier application with a triplet κ(m, AC, LC), where M is the fixed number of tiers of the multi-tier application, and AC and LC are respectively the architectural configuration and local configuration of the application. We define the architectural configuration of a cluster-based multi-tier application as the distributed setting of the application in the form of the number of replica servers at each tier. It is conceptualized as an array AC < AC 1, AC 2,..., AC M >, where AC i is the number of machines at tier T i of the multi-tier application. We define the local configuration of a multitier application as the local tuning parameter(s) applied on servers at tier T i. Local configuration is conceptualized as an array LC < LC 1, LC 2,..., LC M >; and in the following, LC i represents servers MPL (multi-programmig level) at tier T i of the multi-tier system. 3. MODEL OF ITERET SERVICES 3.1 Model definition We propose a queuing network model of Internet services based on the Mean Value Analysis algorithm [12]. Roughly speaking, we model each server as queue, and requests are going from one queue to another, representing the processing time required on each tier. Figure 1 summarizes the model inputs, outputs and state parameters. Figure 1: Model parameters The model inputs variables are the configuration κ of the system, the workload mix X and amount. The initial κ < M, AC,LC > is provided to the controller at its startup, then maintained until the controller stops. Workload amount is probed on the first tier of the real system. The visit ratios V i from workload mix X < V i, Z > are processed by the controller using relative throughput on each tier. The average client think time Z is measured on the first tier of the application. In addition to input variables, the model has two state variables, called service times S i and communication delays D i.

3 Service time S i is the average incompressible time necessary to process a request on tier T i. Communication delay D i is the average incompressible network communication time between tier T i 1 and tier T i. D 1 is always equal to, since T 1 is the first tier of the application. The internal state variables are calculated using the measured latency and abort rates. We search for the S i and D i values that minimize the deviation between model prediction and current measurements. We used gradient descent algorithm to efficiently find the best internal state parameters. Indeed, preliminary experiments have shown that the space of internal state variables has no local optimal. For example, figure 2 plots the model deviation according to S 1 and S 2 state parameters values (D 2 is not represented) Model prediction deviation (latency) 2 S1 parameter (ms) 3 4 Deviation with 5 clients (%) S2 parameter (ms) Figure 2: Model deviation depending on internal state parameters The proposed model has also 3 output variables, which are the latency l, abort rate α and cost w of the considered application. The output processing is detailed in algorithm 1. We begin by using the local configuration to calculate the admitted clients. Then we process the latency l, injecting admitted clients one by one into the queuing network. Little s law is used to calculate the queue length on each tier. The ratio between rejected request throughput and total request throughput determines the abort rate. The cost of the multi-tier application is the total amount of allocated machines. 3.2 Model validation Experimental setup Model and utility-aware capacity planning and provisioning evaluations have been conducted using the TPC-W benchmark [13], that models a realistic web bookstore. TPC-W comes with a client emulator which generates a set of concurrent clients issuing requests for browsing the content of the bookstore, consulting the best-sellers, etc. The client emulator generates a tunable workload; this allows us to vary the workload amount and workload mix during the experiments. In our experiments, the on-line bookstore was deployed as a cluster-based two-tier system, consisting of a cluster of replicated web/business servers as a front-end and a cluster of replicated database servers as a backend. Our experiments have been conducted on a set of computers organized as follows: a first computer dedicated to the 1 Input: : workload amount X < V i, Z >: workload mix κ < M, AC, LC >: multi tier system configuration Output: l: latency α: abort rate ω: cost R = Z; τ = ; ω= ; 2 /* abort rate (first part) */ 3 for m = 1;m M;i + + do 4 MPL m = AC m LC m 5 ar m = Max(,1 MPLm V m ) 6 α= Max(ar 1...ar M) 7 = (1 α); /* admitted clients */ 8 /* latency */ 9 for m = 1;m M;m + + do 1 Ql m = ; 11 for n = 1;n ;n + + do 12 for m = 1;m M;m + + do 13 R m = Max(V m S m, 14 (1+Ql m) (V m S m V m D m)/ac m)+v m D m n τ = ( R + P M ); /* throughput */ m=1 R m for m = 1;m < M;m + + do Ql m = τ R m; /* Little s law */ l= P 18 M m=1 Rm; /* latency */ 19 /* cost */ 2 for m = 1;m M;m + + do 21 ω=ω+ac m; /* total #resources */ 22 /* abort rate (second part) */ 23 τ failed = α /Z 24 τ success = /(Z + l) τ α= failed 25 τ failed +τ success Algorithm 1: Modeling multi-tier systems client emulator, a second one for our controller, a front-end cluster of replicated servers running Apache Tomcat 5.5 web and application server, and a back-end cluster of replicated servers running MySQL 5. database server. A proxy-based approach was followed in order to implement admission control, and load balancing among the replicas of a tier. Here, load balancing is able to dynamically integrate/remove replicas upon server (un-)provisioning. The experiments were conducted on a cluster of machines with bi-2.33 GHz Intel Xeon CPUs and 4 GB RAM, connected via a 1 Gb/s Ethernet LA Model validation Scenario. To test model accuracy, we consider an experiment with varying workload amount and mix. The workload amount evolves between 25 and 125 clients, with irregular steps to simulate load peaks. The workload mix changes from mix 1 to mix 2 at the middle of the experiment. Mix 2 has more heterogeneous client interactions than Mix 1. Figure 3 presents the workload mix and amount as measured by the controller. We used for our model validation experiments

4 two configurations κ1 and κ2 defined as follow: κ1 : AC =< 1, 1 >, LC =< 5, 5 >: a low-cost configuration, where capacity is increased through high local configuration. κ2 : AC =< 3,6 >, LC =< 2, 1 >: a large configuration where capacity is increased through high architectural configuration, with default values for local configuration, since Tomcat default MPL is 2 and MySQL one is 1. not test a larger configuration). The capacity planning algorithm uses the model to get the performance predictions for a configuration. On a second step, the capacity planning algorithm performs a dichotomic search into this configuration space to find the optimal configuration. The optimal configuration is the less costly configuration that matches the SLA. The capacity planning is automatically triggered when the SLA is not matched by the currently applied configuration. For example, this can happen after the workload amount has increased. The controller also regularly calls the capacity planning algorithm, to check if the configuration is still the optimal one, i.e. if some resources can be saved. Workload amount Workload amount Workload mix Figure 3: Workload variation Figure 4 compares the real latency measured on the system, and the model prediction for the first configuration κ1. The average latency deviation is 1ms, which represents less than 1% of the average measured latency. Figure 5 compares real and measured abort rates for this configuration. The relative average deviation of the abort rate is 1%. As we can see, the model is close to the real system for both latency and abort rate criteria. Figure 6 compares the real latency measured on the system, and the model prediction for the first configuration κ2. The relative deviation between average latencies is under 1%. Figure 7 compares real and measured abort rates for this configuration. The relative average deviation of the abort rate is under 2%. As we can see, the model is close to the real system for both latency and abort rate criteria. 4. AUTOMATED COTROL 4.1 Controller presentation We designed a controller, responsible of monitoring the system, processing the optimal configuration, and applying this configuration to the controlled Internet service. The controller has only two inputs, the Service Level Agreement and a list of available resources. Capacity Planning. We provide a capacity planning algorithm to find the optimal configuration of a multi-tier Internet service. This algorithm has two main steps. Firstly, it bounds the set of all possible configurations, by rejecting the useless ones. There is no need to add some resources to a configuration that already matches the SLA, so an acceptable configuration defines a bound for the configuration space (we will Workload mix Enforcing Optimal Configuration. Once the optimal configuration has been calculated, we have to apply this configuration to the real system. The architectural configuration is applied by adding and/or removing resources from the Internet service tiers. We apply the local configuration by modifying admission control on each tier. The controller provides actuators for the aforementionned operations. Since all the steps from monitoring to configurations are performed automatically, the controller can adapt the system to varying workload without any human intervention. 4.2 Control evaluation We compared three configurations, two of them being static (κ1 and κ2 we defined in section 3.2.2), and a third one κ3 dynamically configured by our controller. For each configuration, we runned the same experiment, consisting in several steps of varying workload, with peaks and drops. The SLA we specified to the controller is requiring a latency under 7 seconds, and an abort rate under 5%. As we can see on figure 9, κ3 is the only configuration to match the SLA requirement concerning abort rates. Both κ1 and κ2 imply large abort rates when workload amount is too high. This is due to a low architectural configuration for κ1, and a low local configuration for κ2. Figure 8 represents the system latency with each configuration. κ1 latency is above SLA objective most of the time, because this configuration allow a lot of requests to run simultaneously on the same server. This induces trashing and high latency for κ1. The latency objective is matched by κ2 and κ3. We can check system cost on figure 1. κ1 is the most economical configuration, but respects neither latency nor abort rate objectives. The controlled system (κ3) achieves to be more economical than κ2, although it is the only configuration to match both latency and abort rate criteria. Figure 11 represents the architectural and the local configurations of the controlled system (κ3). The controller dynamically adapt configuration to the current workload to match SLA constraints. As we can see, even with high load variations, our approach leads to fast system adaptation and preserves quality of service. 5. RELATED WORK Internet services configuration poses significant challenges in terms of performance, availability and cost [9, 3]. Admission control (i.e. MPL control) and server provisionning are used to improve these criteria. Elnikety et. al. apply admission control at the level of a web server [5], Milan- Franco et. al. use it in database servers [11], whereas Menascé et. al. study it at each tier of a multi-tier system [1]. Some ad-

5 14 12 k1 - Real system k1 - Modeled system k1 - Real system k1 - Modeled system Latency (ms) Abandon rate (%) Figure 4: κ1 Latency with workload variation Figure 5: κ1 Abort rates with workload variation 2 k2 - Real system k2 - Modeled system 15 1 k2 - Real system k2 - Modeled system Latency (ms) Abandon rate (%) Figure 6: κ2 Latency with workload variation Figure 7: κ2 Abort rates with workload variation mission control solutions are proposed in the form of heuristics such as the well-known hill-climbing heuristic [6]. Some approches provide quality of service guarantees through application modeling. Diao et. al. use an analytic model to control MPL in multi-tier systems [4]. Zhang et. al. propose a regression-based modeling of multi-tier applications in order to predict the capacity of applications in terms of allowed concurrent clients [16]. Other approaches control the dynamic provisioning of servers in cluster-based systems. Villela et. al. follow a model-based approach for provisioning the business tier in a multi-tier system [15]. Urgaonkar et. al. apply an analytic model calibrated for the underlying workload mix in order to plan the capacity of multi-tier systems in terms of the number of servers to provision at each tier [14]. Both approaches are motivated by performance objectives; however they require calibrating the model with appropriate parameters. Our present work provides a self-calibrating model for multi-tier Internet services. This model is used to dynamically provision the service and adapt admission control on each of its tier. 6. COCLUSIO In this paper, we present an autonomic Internet services controller, for adapting the configuration of a multi-tier application facing a dynamic workload. The controller goal is to match quality of service objectives while reducing the amount of resources allocated to the application. Our approach is based on two main components: A queuing theory based model of the underlying application, capable of predicting the application performance, and a controller which monitors the system, calculates the optimal configuration, and apply this configuration to the system. The experiments conducted on an online multi-tier application show that our solution may improve quality of service while reducing running costs of the application. 7. REFERECES [1] R. Buyya. High Performance Cluster Computing - Volume 1. Prentice Hall, [2] E. Cecchet, A. Chanda, S. Elnikety, J. Marguerite, and W. Zwaenepoel. Performance Comparison of Middleware Architectures for Generating Dynamic Web Content. In ACM/IFIP/USEIX International Middleware Conference, Rio de Janeiro, Brazil, June 23. [3] D. A. Menascé and V. A. F. Almeida. Capacity Planning for Web Services: Metrics, Models, and Methods. Prentice Hall, 21. [4] Y. Diao, J. L. Hellerstein, S. Parekh, H. Shaikh, and M. Surendra. Controlling Quality of Service in Multi-Tier Web Applications. In 26th International Conference on Distributed Computing Systems (ICDCS 26), Lisbon, Portugal, July 26.

6 12 1 SLA k1 k2 k SLA k1 k2 k3 8 7 Latency (ms) 6 Abandon rate (%) Figure 8: Latency with and without control Figure 9: Abort rate with and without control 12 1 k1 k2 k3 1 8 k3 - AC on tier 1 k3 - AC on tier 2 k3 - LC on tier 1 k3 - LC on tier Cost (# resources) Architectural configuration Local configuration Figure 1: System cost with and without control Figure 11: Controlled system configuration [5] S. Elnikety, J. Tracey, E. ahum, and W. Zwaenepoel. A method for transparent admission control and request scheduling in e-commerce web sites. In The 13th international conference on World Wide Web, 24. [6] H.-U. Heiss and R. Wagner. Adaptive load control in transaction processing systems. In VLDB, [7] J. Hyman, A. A. Lazar, and G. Pacifici. Joint Scheduling and Admission Control for ATS-based Switching odes. In The ACM Conference on Communications Architecture and Protocols (SIGCOMM 92), Baltimore, MA, Aug [8] J. Lee and R. Ben-atan. Integrating Service Level Agreements. Wiley, 22. [9] C. Loosley, F. Douglas, and A. Mimo. High-Performance Client/Server. John Wiley & Sons, ov [1] D. A. Menascé, D. Barbara, and R. Dodge. Preserving QoS of E-Commerce Sites Through Self-Tuning: A Performance Model Approach. In ACM Conference on Electronic Commerce (EC 1), Tampa, FL, Oct. 21. [11] J. Milan-Franco, R. Jimenez-Peris, M. Patino-Martinez, and B. Kemme. Adaptive middleware for data replication. In Middleware 4: Proceedings of the 5th ACM/IFIP/USEIX international conference on Middleware, 24. [12] M. Reiser and S. S. Lavenberg. Mean-value analysis of closed multichain queuing networks. J. ACM, 27(2), 198. [13] TPC. [14] B. Urgaonkar, G. Pacifici, P. Shenoy, M. Spreitzer, and A. Tantawi. Analytic modeling of multitier internet applications. ACM Transactions on the Web (ACM TWEB), 1(1):2, 27. [15] D. Villela, P. Pradhan, and D. Rubenstein. Provisioning Servers in the Application Tier for E-Commerce Systems. ACM Trans. Interet Technol., 7(1), 27. [16] Q. Zhang, L. Cherkasova, and. Mi. A Regression-Based Analytic Model for Capacity Planning of Multi-Tier Applications. Journal of Cluster Computing, 11(3), 28.

CoSAC: Coordinated Session-based Admission Control for Multi-tier Internet Applications

CoSAC: Coordinated Session-based Admission Control for Multi-tier Internet Applications : Coordinated Session-based Admission Control for Multi-tier Internet Applications Sireesha Muppala and Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs, CO 918, USA

More information

Hybrid Auto-scaling of Multi-tier Web Applications: A Case of Using Amazon Public Cloud

Hybrid Auto-scaling of Multi-tier Web Applications: A Case of Using Amazon Public Cloud Hybrid Auto-scaling of Multi-tier Web Applications: A Case of Using Amazon Public Cloud Abid Nisar, Waheed Iqbal, Fawaz S. Bokhari, and Faisal Bukhari Punjab University College of Information and Technology,Lahore

More information

Self-Sizing of Clustered Databases

Self-Sizing of Clustered Databases Self-Sizing of Clustered Databases Christophe Taton 1, Sara Bouchenak 2, Noël De Palma 1, Daniel Hagimont 3, Sylvain Sicard 2 (1) Institut National Polytechnique de Grenoble, France (2) Université Joseph

More information

MoKa: A System for Modeling and Capacity Planning of Multi-Tier Systems

MoKa: A System for Modeling and Capacity Planning of Multi-Tier Systems MoKa: A System for Modeling and Capacity Planning of Multi-Tier Systems Jean Arnaud, Sara Bouchenak To cite this version: Jean Arnaud, Sara Bouchenak. MoKa: A System for Modeling and Capacity Planning

More information

R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads

R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads Qi Zhang, Lucy Cherkasova, Guy Matthews, Wayne Greene, Evgenia Smirni Enterprise Systems and Software

More information

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS 2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé

More information

Towards Autonomic Hosting of Multi-tier Internet Applications

Towards Autonomic Hosting of Multi-tier Internet Applications Towards Autonomic Hosting of Multi-tier Internet lications Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen Dept. of Computer Science, Vrije Universiteit, Amsterdam, The Netherlands Email:

More information

Performance Assurance in Virtualized Data Centers

Performance Assurance in Virtualized Data Centers Autonomic Provisioning with Self-Adaptive Neural Fuzzy Control for End-to-end Delay Guarantee Palden Lama Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs Performance

More information

Dynamic control and Resource management for Mission Critical Multi-tier Applications in Cloud Data Center

Dynamic control and Resource management for Mission Critical Multi-tier Applications in Cloud Data Center Institute Institute of of Advanced Advanced Engineering Engineering and and Science Science International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 3, June 206, pp. 023 030 ISSN:

More information

Database Replication in Tashkent. CSEP 545 Transaction Processing Sameh Elnikety

Database Replication in Tashkent. CSEP 545 Transaction Processing Sameh Elnikety Database Replication in Tashkent CSEP 545 Transaction Processing Sameh Elnikety Replication for Performance Expensive Limited scalability DB Replication is Challenging Single database system Large, persistent

More information

On the Use of Performance Models in Autonomic Computing

On the Use of Performance Models in Autonomic Computing On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle

More information

A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications

A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications Qi Zhang College of William and Mary Williamsburg, VA 23187, USA Ludmila Cherkasova Hewlett-Packard Labs Palo

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

Quantifying Load Imbalance on Virtualized Enterprise Servers

Quantifying Load Imbalance on Virtualized Enterprise Servers Quantifying Load Imbalance on Virtualized Enterprise Servers Emmanuel Arzuaga and David Kaeli Department of Electrical and Computer Engineering Northeastern University Boston MA 1 Traditional Data Centers

More information

Elastic Resource Provisioning for Cloud Data Center

Elastic Resource Provisioning for Cloud Data Center Elastic Resource Provisioning for Cloud Data Center Thant Zin Tun, and Thandar Thein Abstract Cloud data centers promises flexible, scalable, powerful and cost-effective executing environment to users.

More information

A Quantitative Model for Capacity Estimation of Products

A Quantitative Model for Capacity Estimation of Products A Quantitative Model for Capacity Estimation of Products RAJESHWARI G., RENUKA S.R. Software Engineering and Technology Laboratories Infosys Technologies Limited Bangalore 560 100 INDIA Abstract: - Sizing

More information

SLA Decomposition: Translating Service Level Objectives to System Level Thresholds

SLA Decomposition: Translating Service Level Objectives to System Level Thresholds SLA Decomposition: Translating Service Level Objectives to System Level Thresholds Yuan Chen, Subu Iyer, Xue Liu, Dejan Milojicic, Akhil Sahai Enterprise Systems and Software Laboratory HP Laboratories

More information

QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation

QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation * Universität Karlsruhe (TH) Technical University of Catalonia (UPC) Barcelona Supercomputing Center (BSC) Samuel

More information

A regression-based analytic model for capacity planning of multi-tier applications

A regression-based analytic model for capacity planning of multi-tier applications Cluster Comput (2008) 11: 197 211 DOI 10.1007/s10586-008-0052-0 A regression-based analytic model for capacity planning of multi-tier applications Qi Zhang Ludmila Cherkasova Ningfang Mi Evgenia Smirni

More information

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,

More information

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca

More information

Regulating workload in J2EE Application Servers

Regulating workload in J2EE Application Servers Regulating workload in J2EE Application Servers Wei Xu Zhangxi Tan Armando Fox David Patterson {xuw, xtan, fox, patterson}@cs.berkeley.edu Abstract In this project, we design and implement flow control

More information

Reactive Provisioning of Backend Databases in Shared Dynamic Content Server Clusters

Reactive Provisioning of Backend Databases in Shared Dynamic Content Server Clusters Reactive Provisioning of Backend Databases in Shared Dynamic Content Server Clusters GOKUL SOUNDARARAJAN University of Toronto and CRISTIANA AMZA University of Toronto This paper introduces a self-configuring

More information

REGULATING RESPONSE TIME IN AN AUTONOMIC COMPUTING SYSTEM: A COMPARISON OF PROPORTIONAL CONTROL AND FUZZY CONTROL APPROACHES

REGULATING RESPONSE TIME IN AN AUTONOMIC COMPUTING SYSTEM: A COMPARISON OF PROPORTIONAL CONTROL AND FUZZY CONTROL APPROACHES REGULATING RESPONSE TIME IN AN AUTONOMIC COMPUTING SYSTEM: A COMPARISON OF PROPORTIONAL CONTROL AND FUZZY CONTROL APPROACHES Harish S. Venkatarama 1 and Kandasamy Chandra Sekaran 2 1 Reader, Computer Science

More information

Future-ready IT Systems with Performance Prediction using Analytical Models

Future-ready IT Systems with Performance Prediction using Analytical Models Future-ready IT Systems with Performance Prediction using Analytical Models Madhu Tanikella Infosys Abstract Large and complex distributed software systems can impact overall software cost and risk for

More information

Controlling the Behaviour of Database Servers with 2PAC and DiffServ

Controlling the Behaviour of Database Servers with 2PAC and DiffServ Controlling the Behaviour of Database Servers with 2PAC and DiffServ Luís Fernando Orleans 1, Geraldo Zimbrão 1, and Pedro Furtado 2 1 COPPE/UFRJ - Computer Science Department - Graduate School and Research

More information

Dynamic Resource Allocation on Virtual Machines

Dynamic Resource Allocation on Virtual Machines Dynamic Resource Allocation on Virtual Machines Naveena Anumala VIT University, Chennai 600048 anumala.naveena2015@vit.ac.in Guide: Dr. R. Kumar VIT University, Chennai -600048 kumar.rangasamy@vit.ac.in

More information

SEDA: An Architecture for Well-Conditioned, Scalable Internet Services

SEDA: An Architecture for Well-Conditioned, Scalable Internet Services SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles

More information

Performance Extrapolation for Load Testing Results of Mixture of Applications

Performance Extrapolation for Load Testing Results of Mixture of Applications Performance Extrapolation for Load Testing Results of Mixture of Applications Subhasri Duttagupta, Manoj Nambiar Tata Innovation Labs, Performance Engineering Research Center Tata Consulting Services Mumbai,

More information

Estimate performance and capacity requirements for InfoPath Forms Services 2010

Estimate performance and capacity requirements for InfoPath Forms Services 2010 Estimate performance and capacity requirements for InfoPath Forms Services 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site

More information

IBM Research Report. Managing the Response Time for Multi-tiered Web Applications

IBM Research Report. Managing the Response Time for Multi-tiered Web Applications RC23651 (W57-29) July 5, 25 Computer Science IM Research Report Managing the Response Time for Multi-tiered Web pplications Giovanni Pacifici, Wolfgang Segmuller, Mike Spreitzer, Malgorzata Steinder, sser

More information

When Average is Not Average: Large Response Time Fluctuations in n-tier Applications. Qingyang Wang, Yasuhiko Kanemasa, Calton Pu, Motoyuki Kawaba

When Average is Not Average: Large Response Time Fluctuations in n-tier Applications. Qingyang Wang, Yasuhiko Kanemasa, Calton Pu, Motoyuki Kawaba When Average is Not Average: Large Response Time Fluctuations in n-tier Applications Qingyang Wang, Yasuhiko Kanemasa, Calton Pu, Motoyuki Kawaba Background & Motivation Analysis of the Large Response

More information

Automated Control for Elastic Storage

Automated Control for Elastic Storage Automated Control for Elastic Storage Summarized by Matthew Jablonski George Mason University mjablons@gmu.edu October 26, 2015 Lim, H. C. and Babu, S. and Chase, J. S. (2010) Automated Control for Elastic

More information

An Admission Control Mechanism for Web Servers using Neural Network

An Admission Control Mechanism for Web Servers using Neural Network An Admission Control Mechanism for Web Servers using Neural Network Lahcene AID Department of Computer Science University of Tiaret, Algeria Laboratoire de Communication dans les Systèmes Informatiques

More information

A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis.

A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis. A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis. Arnaud Defrance, Stéphane Vialle, Morgann Wauquier Firstname.Lastname@supelec.fr Supelec, 2 rue Edouard

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Extrapolation Tool for Load Testing Results

Extrapolation Tool for Load Testing Results Extrapolation Tool for Load Testing Results Subhasri Duttagupta, Rajesh Mansharamani Performance Engineering Lab Tata Consulting Services Mumbai, India subhasri.duttagupta@tcs.com, rajesh.mansharamani@tcs.com

More information

A Disk Head Scheduling Simulator

A Disk Head Scheduling Simulator A Disk Head Scheduling Simulator Steven Robbins Department of Computer Science University of Texas at San Antonio srobbins@cs.utsa.edu Abstract Disk head scheduling is a standard topic in undergraduate

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

Dynamic VM Migration: Assessing Its Risks & Rewards Using a Benchmark

Dynamic VM Migration: Assessing Its Risks & Rewards Using a Benchmark Dynamic VM Migration: Assessing Its Risks & Rewards Using a Benchmark Krishnamurthy Srinivasan Intel Corporation 5000 W Chandler Blvd Chandler, AZ krishnamurthy.srinivasan@intel.com Sterlan Yuuw Intel

More information

Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University

Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University D u k e S y s t e m s Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University Motivation We address challenges for controlling elastic applications, specifically storage.

More information

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,

More information

Whitepaper / Benchmark

Whitepaper / Benchmark Whitepaper / Benchmark Web applications on LAMP run up to 8X faster with Dolphin Express DOLPHIN DELIVERS UNPRECEDENTED PERFORMANCE TO THE LAMP-STACK MARKET Marianne Ronström Open Source Consultant iclaustron

More information

Modeling VM Performance Interference with Fuzzy MIMO Model

Modeling VM Performance Interference with Fuzzy MIMO Model Modeling VM Performance Interference with Fuzzy MIMO Model ABSTRACT Virtual machines (VM) can be a powerful platform for multiplexing resources for applications workloads on demand in datacenters and cloud

More information

Model-Driven Geo-Elasticity In Database Clouds

Model-Driven Geo-Elasticity In Database Clouds Model-Driven Geo-Elasticity In Database Clouds Tian Guo, Prashant Shenoy College of Information and Computer Sciences University of Massachusetts, Amherst This work is supported by NSF grant 1345300, 1229059

More information

Scalability of Heterogeneous Computing

Scalability of Heterogeneous Computing Scalability of Heterogeneous Computing Xian-He Sun, Yong Chen, Ming u Department of Computer Science Illinois Institute of Technology {sun, chenyon1, wuming}@iit.edu Abstract Scalability is a key factor

More information

Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation

Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation Lin Xing, Wei Wang, Gensheng Zhang Electrical Engineering and Computer Science, South

More information

Towards Autonomic Detection of SLA Violations in Cloud Infrastructures

Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Vincent C. Emeakaroha a, Marco A. S. Netto b, Rodrigo N. Calheiros c, Ivona Brandic a, Rajkumar Buyya c, César A. F. De Rose b a Vienna

More information

A Controller Based Approach for Web Services Virtualized Instance Allocation

A Controller Based Approach for Web Services Virtualized Instance Allocation A Controller Based Approach for Web Services Virtualized Allocation Sandesh Tripathi, S Q Abbas, Rizwan Beg 1,2,3 CSE Department, Integral university, Lucknow Abstract Few Service providers provide compute

More information

V-Cache: Towards Flexible Resource Provisioning for Multi-tier Applications in IaaS Clouds

V-Cache: Towards Flexible Resource Provisioning for Multi-tier Applications in IaaS Clouds : Towards Flexible Resource Provisioning for Multi-tier Applications in IaaS Clouds Yanfei Guo, Palden Lama, Jia Rao and Xiaobo Zhou Department of Computer Science University of Colorado, Colorado Springs,

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

Verification and Validation of X-Sim: A Trace-Based Simulator

Verification and Validation of X-Sim: A Trace-Based Simulator http://www.cse.wustl.edu/~jain/cse567-06/ftp/xsim/index.html 1 of 11 Verification and Validation of X-Sim: A Trace-Based Simulator Saurabh Gayen, sg3@wustl.edu Abstract X-Sim is a trace-based simulator

More information

White Paper. Major Performance Tuning Considerations for Weblogic Server

White Paper. Major Performance Tuning Considerations for Weblogic Server White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance

More information

Cataclysm: Policing Extreme Overloads in Internet Applications

Cataclysm: Policing Extreme Overloads in Internet Applications Cataclysm: Policing Extreme Overloads in Internet Applications Bhuvan Urgaonkar Dept. of Computer Science University of Massachusetts Amehrst, MA bhuvan@cs.umass.edu Prashant Shenoy Dept. of Computer Science

More information

Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University

Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University menasce@cs.gmu.edu www.cs.gmu.edu/faculty/menasce.html D. Menascé. All Rights Reserved. 1 Benchmark System Under Test (SUT) SPEC

More information

SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION

SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif * University of Massachusetts Amherst * Intel, Portland Data

More information

Index. ADEPT (tool for modelling proposed systerns),

Index. ADEPT (tool for modelling proposed systerns), Index A, see Arrivals Abstraction in modelling, 20-22, 217 Accumulated time in system ( w), 42 Accuracy of models, 14, 16, see also Separable models, robustness Active customer (memory constrained system),

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Multi-tier Service Differentiation: Coordinated Resource Provisioning and Admission Control

Multi-tier Service Differentiation: Coordinated Resource Provisioning and Admission Control 22 IEEE 8th International Conference on Parallel and Distributed Systems Multi-tier Service Differentiation: Coordinated Resource Provisioning and Admission Control Sireesha Muppala and Xiaobo Zhou Department

More information

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,

More information

On load balancing and resource allocation in cloud services

On load balancing and resource allocation in cloud services On load balancing and resource allocation in cloud services Leontiou, N., Dechouniotis, D., Athanasopoulos, N., & Denazis, S. (24). On load balancing and resource allocation in cloud services. In Proceedings

More information

A Survey on Auto Scaling of Internet Application in a Cloud Environment

A Survey on Auto Scaling of Internet Application in a Cloud Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Model-based Application Autonomic Manager with Fine Granular Bandwidth Control

A Model-based Application Autonomic Manager with Fine Granular Bandwidth Control A Model-based Application Autonomic Manager with Fine Granular Bandwidth Control Nasim Beigi-Mohammadi, Mark Shtern, and Marin Litoiu Department of Computer Science, York University, Canada Email: {nbm,

More information

A Predictive Load Balancing Service for Cloud-Replicated Databases

A Predictive Load Balancing Service for Cloud-Replicated Databases paper:174094 A Predictive Load Balancing for Cloud-Replicated Databases Carlos S. S. Marinho 1,2, Emanuel F. Coutinho 1, José S. Costa Filho 2, Leonardo O. Moreira 1,2, Flávio R. C. Sousa 2, Javam C. Machado

More information

Coordinated carrier aggregation for campus of home base stations

Coordinated carrier aggregation for campus of home base stations 2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations

More information

management systems Elena Baralis, Silvia Chiusano Politecnico di Torino Pag. 1 Distributed architectures Distributed Database Management Systems

management systems Elena Baralis, Silvia Chiusano Politecnico di Torino Pag. 1 Distributed architectures Distributed Database Management Systems atabase Management Systems istributed database istributed architectures atabase Management Systems istributed atabase Management Systems ata and computation are distributed over different machines ifferent

More information

Distributed Database Management Systems. Data and computation are distributed over different machines Different levels of complexity

Distributed Database Management Systems. Data and computation are distributed over different machines Different levels of complexity atabase Management Systems istributed database atabase Management Systems istributed atabase Management Systems B M G 1 istributed architectures ata and computation are distributed over different machines

More information

Performance Evaluation of Virtualization Technologies

Performance Evaluation of Virtualization Technologies Performance Evaluation of Virtualization Technologies Saad Arif Dept. of Electrical Engineering and Computer Science University of Central Florida - Orlando, FL September 19, 2013 1 Introduction 1 Introduction

More information

Cataclysm: Policing Extreme Overloads in Internet Applications

Cataclysm: Policing Extreme Overloads in Internet Applications Cataclysm: Policing Extreme Overloads in Internet Applications Bhuvan Urgaonkar a, Prashant Shenoy b a Department of CSE, The Pennsylvania State University, University Park, PA, 1682. Tel: +1 814 865 956

More information

Transparent Resource Management with Java RM API

Transparent Resource Management with Java RM API Transparent Resource Management with Java RM API Arkadiusz Janik and Krzysztof Zieliński Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059 Kraków, Poland Abstract. The Multitasking Virtual

More information

Integrating Network QoS and Web QoS to Provide End-to-End QoS

Integrating Network QoS and Web QoS to Provide End-to-End QoS Integrating Network QoS and Web QoS to Provide End-to-End QoS Wang Fei Wang Wen-dong Li Yu-hong Chen Shan-zhi State Key Lab of Networking and Switching, Beijing University of Posts & Telecommunications,

More information

MicroFuge: A Middleware Approach to Providing Performance Isolation in Cloud Storage Systems

MicroFuge: A Middleware Approach to Providing Performance Isolation in Cloud Storage Systems 1 MicroFuge: A Middleware Approach to Providing Performance Isolation in Cloud Storage Systems Akshay Singh, Xu Cui, Benjamin Cassell, Bernard Wong and Khuzaima Daudjee July 3, 2014 2 Storage Resources

More information

Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning

Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning Saeed Ghanbari, Gokul Soundararajan, Jin Chen, Cristiana Amza Department of Electrical and Computer Engineering Department

More information

A Control-based Load Balancing Algorithm with Flow Control for Dynamic and Heterogeneous Servers

A Control-based Load Balancing Algorithm with Flow Control for Dynamic and Heterogeneous Servers A Control-based Load Balancing Algorithm with Flow Control for Dynamic and Heterogeneous Servers Rodolpho G. de Siqueira 1, Daniel R. Figueiredo 1 1 Programa de Engenharia de Sistemas e Computação Universidade

More information

In the world of networks, control techniques

In the world of networks, control techniques NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation

More information

Two-Level Cooperation in Autonomic Cloud Resource Management

Two-Level Cooperation in Autonomic Cloud Resource Management Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran a, Alain Tchana b, Laurent Broto a, Daniel Hagimont a a ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran,

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment This document is provided as-is. Information and views expressed in this document, including

More information

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle

More information

QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER

QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER Hardware Sizing Using Amazon EC2 A QlikView Scalability Center Technical White Paper June 2013 qlikview.com Table of Contents Executive Summary 3 A Challenge

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System

ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System Ying Liu, Navaneeth Rameshan, Enric Monte, Vladimir Vlassov, and Leandro Navarro Ying Liu; Rameshan, N.; Monte, E.; Vlassov,

More information

A business-oriented load dispatching framework for online auction sites

A business-oriented load dispatching framework for online auction sites A business-oriented load dispatching framework for online auction sites Daniel A Menascé Department of Computer Science George Mason University Fairfax, VA 22030, USA menasce@csgmuedu Vasudeva Akula School

More information

Pivot3 Acuity with Microsoft SQL Server Reference Architecture

Pivot3 Acuity with Microsoft SQL Server Reference Architecture Pivot3 Acuity with Microsoft SQL Server 2014 Reference Architecture How to Contact Pivot3 Pivot3, Inc. General Information: info@pivot3.com 221 West 6 th St., Suite 750 Sales: sales@pivot3.com Austin,

More information

Oracle Database 12c: JMS Sharded Queues

Oracle Database 12c: JMS Sharded Queues Oracle Database 12c: JMS Sharded Queues For high performance, scalable Advanced Queuing ORACLE WHITE PAPER MARCH 2015 Table of Contents Introduction 2 Architecture 3 PERFORMANCE OF AQ-JMS QUEUES 4 PERFORMANCE

More information

Wide Area Redirection of Dynamic Content by Internet Data Centers

Wide Area Redirection of Dynamic Content by Internet Data Centers Wide Area Redirection of Dynamic Content by Internet Data Centers S. Ranjan, R. Karrer and E. Knightly Department of Electrical and Computer Engineering Rice University Houston, TX 775, USA Abstract Traditional

More information

Enhancements to Linux I/O Scheduling

Enhancements to Linux I/O Scheduling Enhancements to Linux I/O Scheduling Seetharami R. Seelam, UTEP Rodrigo Romero, UTEP Patricia J. Teller, UTEP William Buros, IBM-Austin 21 July 2005 Linux Symposium 2005 1 Introduction Dynamic Adaptability

More information

C3PO: Computation Congestion Control (PrOactive)

C3PO: Computation Congestion Control (PrOactive) C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,

More information

Computational performance and scalability of large distributed enterprise-wide systems supporting engineering, manufacturing and business applications

Computational performance and scalability of large distributed enterprise-wide systems supporting engineering, manufacturing and business applications Computational performance and scalability of large distributed enterprise-wide systems supporting engineering, manufacturing and business applications Janusz S. Kowalik Mathematics and Computing Technology

More information

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science

More information

COMPARISON ON EFFICIENCY AND SPEED OF 2-TIER AND 3-TIER OLTP SYSTEMS

COMPARISON ON EFFICIENCY AND SPEED OF 2-TIER AND 3-TIER OLTP SYSTEMS Media Informatika, Vol. 2, No. 2, Desember 2004, 23-31 ISSN: 0854-4743 COMPARISON ON EFFICIENCY AND SPEED OF 2-TIER AND 3-TIER OLTP SYSTEMS Teduh Dirgahayu, Muhammad Indra Utama Department of Informatics,

More information

Distributed Versioning: Consistent Replication for Scaling Back-end Databases of Dynamic Content Web Sites

Distributed Versioning: Consistent Replication for Scaling Back-end Databases of Dynamic Content Web Sites Distributed Versioning: Consistent Replication for Scaling Back-end Databases of Dynamic Content Web Sites Cristiana Amza, Alan L. Cox and Willy Zwaenepoel Department of Computer Science, Rice University,

More information

SCALING UP VS. SCALING OUT IN A QLIKVIEW ENVIRONMENT

SCALING UP VS. SCALING OUT IN A QLIKVIEW ENVIRONMENT SCALING UP VS. SCALING OUT IN A QLIKVIEW ENVIRONMENT QlikView Technical Brief February 2012 qlikview.com Introduction When it comes to the enterprise Business Discovery environments, the ability of the

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Virtual Batching for Performance Improvement and Energy Efficiency

Virtual Batching for Performance Improvement and Energy Efficiency Virtual Batching for Performance Improvement and Energy Efficiency Dazhao Cheng Department of Computer Science University of Colorado, Colorado Springs, USA Email addresses: {dcheng}@uccsedu Abstract Performance

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

Resource Allocation Strategies for Multiple Job Classes

Resource Allocation Strategies for Multiple Job Classes Resource Allocation Strategies for Multiple Job Classes by Ye Hu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer

More information

Contents Overview of the Performance and Sizing Guide... 5 Architecture Overview... 7 Performance and Scalability Considerations...

Contents Overview of the Performance and Sizing Guide... 5 Architecture Overview... 7 Performance and Scalability Considerations... Unifier Performance and Sizing Guide for On-Premises Version 17 July 2017 Contents Overview of the Performance and Sizing Guide... 5 Architecture Overview... 7 Performance and Scalability Considerations...

More information

E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems

E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems Rebecca Taft, Essam Mansour, Marco Serafini, Jennie Duggan, Aaron J. Elmore, Ashraf Aboulnaga, Andrew Pavlo, Michael

More information

An Autonomic Approach for Replication of Internet-based Services

An Autonomic Approach for Replication of Internet-based Services An Autonomic Approach for Replication of Internet-based Services D. Serrano, M. Patiño-Martinez, R. Jimenez-Peris Universidad Politenica de Madrid (UPM), Spain {dserrano,mpatino,rjimenez}@fi.upm.es B.

More information