Web Serving Architectures
|
|
- Kimberly Scott
- 5 years ago
- Views:
Transcription
1 Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited
2 Contents Defining the Problem e-business Solutions e-business Architectures Scaling Techniques How do we scale e-business Solutions?
3 Defining the Problem without the express written consent of the IBM Corporation is prohibited
4 Definitions Performance How long does it take to get a response to a request from the system Capacity How many transactions can a system completed in a specified unitoftime. Scalability The capability of a system to adapt readily to a greater or lesser intensity of use, volume, or demand while still meeting its business objectives (acceptable levels of performance, availability, manageability etc.)
5 Scalability, Performance and Capacity A truly scalable architecture will allow an IT System to provide an acceptable level of performance under increased loads Original Performance Curve Improved Performance Curve Response Time Acceptable Response Time Number of Operations Current Load Scaling Target
6 Resource Utilization vs.load A scalable architecture will allow an IT System to have performance characteristics like the blue or green line Resource Utilization Utilization increases faster than the load - Typical Utilization increase linearly with load - Good Situation Ideal - Gracefully degrade as load increases.seldom happens Bad situation - Think it's OK until load increases. Poor design Load
7 e-business Solutions without the express written consent of the IBM Corporation is prohibited
8 e-business Solutions e-business solutions allow an organization to leverage Network Computing technologies to re-engineer business processes, enhance communications and lower organizational boundaries with their customers and shareholders (across the Internet), employees and stakeholders (across the corporate Intranet) and its vendors, suppliers and partners (across its Extranet). While providing many benefits, these solutions present many unique challenges. This includes: since these solutions reach beyond the enterprise to users across the public Internet any failures or poor performance results in bad publicity for the organization require a higher amount of security than applications that existed within an enterprise have usage patterns, transaction volumes and transaction volume swings that cannot be predicted accurately.
9 Workload Characteristics To better understand the factors that influence the scalability of e-business solutions, we need to focus on the workload characteristics of these solutions. These fall into 3 major categories: Application functionality Types of Interaction - Inquiry (Static and Dynamic) vs.transactions Volume of Transactions Volume of User-Specific Responses (Personalization) Amount of Cross-Session Info Transaction Complexity Data Volatility Integration with legacy systems Usage Patterns Number of Unique Items Number of Page Views Volume of Dynamic Searches Transaction Volumes Swing Infrastructure Constraints % Secure Pages (privacy) Security: Authentication, Integrity, Non-repudiation, Regulations
10 Types of e-business Solutions To understand the implications of these workload characteristics let use consider four (4) specific types of e-business applications that have high transaction volumes. They are: Publish and Subscribe Shopping Customer Self Service Trading
11 Publish and Subscribe These applications publish different types of content on a regular basis and make this content available to the users of these applications. There are several applications that fall into this category. They include: Web Portals such as yahoo.com, excite.com Media Sites such as cnn.com, zdnet.com and Events such as
12 Shopping These applications allow users to browse or search through a catalog of items, select one or more items from the catalog, electronically pay for these items in a secure manner, fill the order and complete the transactions by having these items shipped to one or more addresses. There are several applications that fall into this category. They include: Exact Inventory Sites - Victoriassecret.com, Abercrombie.com Inexact Inventory Sites - buy.com, dvdexpress.com
13 Customer Self Service These applications empower customers of an organization to access information and perform operations that were traditionally performed by dedicated service professionals (agent, CSR etc.). These applications are available for access across the web on a 24x7 basis. There are several applications that fall into this category. They include: Home banking - bankone.com, wingspanbank.com Travel Sites - Travelocity Insurance - amica.com
14 Trading These applications allow users to access information and perform secure transactions across the web on highly reliable environment. They typically have high volume of transactions. There are several applications that fall into this category. They include: Online Brokerages - schwab.com, fidelity.com, etrade.com Auction Sites - ebay.com, priceline.com
15 Workload Characteristics of e-business Solutions System Workload Characteristics Transaction Volumes Dynamic Content Dynamic Searches User Specific Responses (Personalization) Publish & Subscribe Shopping Customer Self Svc. Trading Cross-session Information Transaction Complexity Legacy Integration Transaction Volume Swings Data Volatility Number of content Publishers/Sources Page Content Volatility Number of Unique Items per page Number of Page Views Percentage of Secure Pages Security, Authentication etc. Low Medium High
16 e-business Architecture without the express written consent of the IBM Corporation is prohibited
17 e-business Architecture The Thin-Client Reference Architecture provided by Enterprise Solutions Structure (ESS) provides a strong foundation for the operational model of an e-business architecture. The operational model consists of a logical view which describes the major components in the architecture and a description of the hardware nodes that support these components. For the sake of this presentation we have simplified some of the details of this model.
18 e-business Architecture Directory & Security Services Other Device Browser Internet Firewall HTTP HTTP Web Intranet Firewall Web App Connectors Enterprise Information Systems Business Partners and External Services Network Desktop Application UI Data Business Databases Systems Management Content Management
19 e-business Architectures The e-business Architecture described on the previous slide consists of a few major architectural components. They are: Web Web Application Security Services Business Databases Enterprise Information Systems Internet Firewall Intranet Firewall and the Network It is important to note again that this is a simplified version of an e-business Architecture. Each of these components are logical services provided by the architecture that can be deployed on one to many physical nodes. Let us now look at how the workload characteristics impact the individual components of this architecture
20 Impact of Workload Characteristics on Components System Workload Characteristics Web Web App s Network Security s Firewalls Ent.Inf. Systems Database Transaction Volumes Dynamic Content Dynamic Searches User Specific Responses (Personalization) Cross-session Information Transaction Complexity Legacy Integration Transaction Volume Swings Data Volatility Number of content Publishers/Sources Page Content Volatility Number of Unique Items per page Number of Page Views Percentage of Secure Pages Security, Authentication etc. Low Medium High
21 Scaling Techniques without the express written consent of the IBM Corporation is prohibited
22 Best Practices A look at the techniques used by the high volume web sites highlight best practices for achieving application scalability. These include: Faster Machines Replicated Machines Specialized Machines Segmented Workloads Request Batching User Data Aggregation Connection Management and Caching It is important to note again that a detailed understanding of the application is key to the successful implementation of these best practices on an architecture.
23 Faster Machines Scalability can be achieved through the use of faster machines. This technique can include: moving to hardware that is bigger than current environment. For example: moving a web server from and PC based server running NT to a UNIX based server using machines with more CPUs to leverage the operating system's multitasking and multiprocessing capabilities using machines that leverage other computing paradigms such as parallel computing using better software that is optimized for the CPU using faster hardware components such as memory, cache, disk and I/O devices etc.
24 Replicated Machines The application can also be scaled by adding more machines of the same type and load balancing processing requests across these machines. In order to implement this technique we have to implement additional components in the architecture such as: Dispatcher node that can monitor and load balance processing requests across the replicated machines A synchronization node that synchronizes the content and data across the machines A mechanism for managing sessions across replicated machines
25 Specialized Machines Individual components of the architecture can be scaled by using specialized machines that perform a certain function much faster. This technique is typically used in architectures to facilitate: intelligent routing of traffic and data across replicated machines dynamic caching, used extensively by event sites and other media sites to speed up access to frequently accessed content security and encryption, used by high volume sites to speed up the SSL encryption and decryption
26 Segmented Workload This is a technique that is typically used in conjunction with replicated machines. It involves the partitioning of the workload of an application to achieve optimum performance. There are several ways of implementing this technique, they vary from: URL references, which is the most simplistic form of segmenting the workload by analyzing the URL and directing the requests to appropriate servers Application Segmentation, which looks at the application and builds the partitioning of the workload in through custom programming Function 1 Function 2 Function 3
27 Request Batching Multi-tier communication places a large computational load on both the client-tier (requester) and the Client server-tier. It also introduces considerable latency. Furthermore, the overhead costs of virtually all cross-tier requests are equal, therefore it is much better to make fewer, but larger requests. The goal of this technique is to reduce the number of requests that are sent between requesters and responders (such as between tiers or processes) by allowing the requester to define new requests that combine multiple requests. Client Client Command Client
28 User Data Aggregation This technique aggregates most commonly accessed data from multiple backend systems to speed up the overall performance of the architecture. This technique is typically implemented using: Custom Programming Intelligent Middleware and Data replication Client Client Client Client
29 Connection Management This technique aims to achieve scalability by reducing the most expensive operations within an application's workflows. This includes connections to legacy systems, databases and other servers Client 1 WEB Application Servlet /App Connection 7 Incoming Request 2 3 Connection Manager Pool 1.WAS passes a user request to a servlet/app 2.The servlet requests a connection from the Mgr. 3.The Mgr get a connection from the pool and gives the servlet/app a connection. 4.The servlet uses the connection to the resource 5.The resource returns data back 6.The servlet return the connection to the Manager and the connection is returned to the pool 7.The servlet/app sends the response back A B Resource If a connection is not available A The CM requests a new connection B Adds the connection to the pool
30 Caching Caching is the most commonly used scaling technique. It can be described very simply as the ability to store most commonly accessed information and data so that it can be accessed and used by multiple users in a rapid and timely manner. This technique can include: caching static data such as images and pages for easy, rapid and repeated access and intelligent caching which looks at dynamic data and looks at how this data can be viewed as a set of static pages. For example, in a sports event web site a table of scores, which is typically generated dynamically, needs to be accessed frequently. Today these sites build these pages periodically and make them available on high speed caches on the web Client (Browser) Client (Browser) Client (Browser) Srv Cache Web
31 Caching Sources of Data Sinks of Data File System HTTP Trigger Monitor Socket Protocol 2216 Configuration Lotus Notes HTTP Object Store Assembly Object Dependency Graph Socket Protocol Cache Manager HTTP IBM DB2 Standard I/O File System
32 Dimensions of Scaling There are 3 primary dimensions for achieving the scalability techniques outlined in the previous slides. They are: 1. Increase the power of the node that supports the architecture component. For example increase the size of the server that supports the database. 2. Improve the efficiency of the component or the node that supports it and 3. Shift the load or reduce the load on the component
33 Dimensions of the Scaling Techniques Scaling Technique Increase Power Improve Efficiency Shift / Reduce Load Faster Machine X Replicate Machines X Specialized Machines X X Segmented Workload X X Request Batching User Data Aggregation Connection Management X X X Caching X X Note: all of these techniques are in use somewhere, yet our top customers are not using all of the techniques that would be useful.
34 Applying the scalability techniques to the architecture This diagram shows how the scalability techniques outlined earlier and apply to the individual components of the e-business architecture Directory & Security Services 1 8 HTML Client App Client 8 8 Internet Firewall Dispatcher/Router 2 3 HTTP HTTP UI Data UI Logic Intranet Firewall Business Logic Connectors 1 8 Existing Apps and Data Business Partners and External Services Business Data Techniques 1 Faster Machine 2 3 Replicate Machines Specialized Machines 4 5 User Data Aggregation 6 Segmented Workload Request Batching 7 8 Connection Management Caching
35 So how do we scale e-business Solutions? without the express written consent of the IBM Corporation is prohibited
36 Scaling the Application In order to develop a truly scalable architecture, it is extremely important to understand both the structure and the functionality of the application that will be supported by it. This includes: Identify all the component parts of the application Understand component interaction and placement Identify the application flows and understand what can and cannot be altered Understand the flow of data and control among the components of the application The application is key to the scalability of any solution, so a detailed understanding is mandatory to effectively scale any solution.
37 Plan for scalability True scalability can be achieved only when it has been planned and built into the architecture of the solution. To achieve this goal, an architect should: Use of standards and open technologies facilitates the portability of the solution to bigger and faster platforms Consider various architecture topologies and select the one that can adequately address the operational requirements of the solution Evaluate and select approaches to place data and functions across the nodes of the architecture Identify and understand the service level characteristics of external systems and the implications of these on the overall performance and scalability of the proposed solution One of the first steps in this process is the establishment of a Performance Budget for the solution.
38 "The Performance Budget" It is critical to establish a performance budget by measuring end user interactive response time 1. Divide into three major buckets time spent in client time spent in network time spent in servers Total X% or xmilliseconds Y% or y Milliseconds Z% or z Milliseconds 100% or Total Time Budget 2. Define Goal for response time/ scale - e.g. 2 seconds, 500 Users 3. Assign budget to each bucket e.g. - X% * goal or fraction of budget 4. Use as target for detailed data flow analysis some of the budget is fixed (e.g. network latency) the variable portion is your "opportunity"
39 Example Response Time Budget Client Response Processing 15% Client Request 5% Request Network Latency 5% Response Network Latency 20% Time 55%
40 Design the application for scalability It is critical to use sound application development practices and techniques to facilitate the overall scalability of the solution. These include the: Use of a layered architecture that encapsulates and isolates functions and provides the flexibility to place or relocate these functions on different nodes of the architecture Development of appropriate instrumentation (such as multithreading, automatic load balancing, fault-tolerance and automatic restart) in application components. These will allow the application to scale both vertically across the same node and horizontally across multiple nodes in the architecture Consider the use of appropriate data structures, access mechanisms and other application development techniques to achieve optimal performance of individual components of the architecture Understand and design the interfaces between the components to achieve maximum scalability. This includes determining the number, the frequency, and the size of these requests
41 Determine the optimum environment Once the application is designed with the scalability in mind it is then possible to determine the optimal scaling environment by: Deploying the application on the actual hardware nodes Tuning the individual hardware nodes to achieve the best performance from each component and Applying the scaling techniques and best practices identified earlier in this document. This process should be one of continuous improvement where the workload characteristics of the application are monitored and evaluated periodically and appropriate changes are made to the operational architecture of the overall solution.
Architecting the Right SOA Infrastructure
Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA
More informationBlueprinting Questionnaire Sample
Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationEtanova Enterprise Solutions
Etanova Enterprise Solutions Networking» 2018-02-24 http://www.etanova.com/technologies/networking Contents HTTP Web Servers... 6 Apache HTTPD Web Server... 6 Internet Information Services (IIS)... 6 Nginx
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationSystem Analysis & design
Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab 8 A n important component of the design phase is
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationExtending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E
Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,
More informationIntroduction to Virtualization
Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring
More informationCAS 703 Software Design
Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction
More informationDedicated Hosted Cloud with vcloud Director
VMware vcloud Architecture Toolkit for Service Providers Dedicated Hosted Cloud with vcloud Director Version 2.9 April 2018 Harold Simon 2017 VMware, Inc. All rights reserved. This product is protected
More informationOptimizing WebCenter Interaction Performance
Optimizing WebCenter Interaction Performance 1. Introduction... 3 Perception of Performance... 3 Definitions... 4 Performance... 4 Application Scalability... 4 Platform Scalability... 4 Page-Load Time...
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-401 Exam Name: Designing Citrix XenDesktop 7.6 Solutions Version: Demo DEMO QUESTION 1 Which option requires the fewest components to implement a fault-tolerant, load-balanced
More informationDATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz
Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure
More informationCaching patterns and extending mobile applications with elastic caching (With Demonstration)
Ready For Mobile Caching patterns and extending mobile applications with elastic caching (With Demonstration) The world is changing and each of these technology shifts has potential to make a significant
More informationTUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS
TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3
More informationDistribution and Integration Technologies
Distribution and Integration Technologies Distributed Architectures Patterns and Styles 1 Distributed applications infrastructure ISP intranet wireless backbone desktop computer: server: laptops: tablets:
More informationHow the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
More informationBackup Solution. User Guide. Issue 01 Date
Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3
More informationX100 ARCHITECTURE REFERENCES:
UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion
More informationTuning Cognos ReportNet for a High Performance Environment
Proven Practice Tuning Cognos ReportNet for a High Performance Environment Product(s): Cognos ReportNet Area of Interest: Performance Tuning Cognos ReportNet for a High Performance Environment 2 Copyright
More informationORACLE IDENTITY MANAGER SIZING GUIDE. An Oracle White Paper March 2007
ORACLE IDENTITY MANAGER SIZING GUIDE An Oracle White Paper March 2007 Note The following is intended to provide consideration guidelines for sizing Oracle Identity Manager. It is intended for information
More informationEdge Side Includes (ESI) Overview
Edge Side Includes (ESI) Overview Abstract: Edge Side Includes (ESI) accelerates dynamic Web-based applications by defining a simple markup language to describe cacheable and non-cacheable Web page components
More informationOracle and Tangosol Acquisition Announcement
Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationTechnical and Architectural Overview
100% Web-Based Time & Labor Management Technical and Architectural Overview Copyright 2007 Time America 15990 N. Greenway-Hayden Loop Suite D-500, Scottsdale, AZ (800) 227-9766 www.timeamerica.com Table
More informationOracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0
Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle
More informationTHE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION
THE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION Ramchandar Loganathan IBS Solution Architect Banks require application programming interface (API) capabilities to realize the significant benefits
More informationVMware vsphere 4.0 The best platform for building cloud infrastructures
VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationVMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case
VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents
More informationWelcome to the. Migrating SQL Server Databases to Azure
Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine
More informationACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019
ACS 3907 E-Commerce Instructor: Kerry Augustine February 7 th 2019 2014 Pearson Education, Inc. Publishing as Prentice Hall 1 E-Commerce Design Architecture Part 1 Client/server architecture Two-tier vs.
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationIBM Tivoli Directory Server
Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and
More informationvcloud Automation Center Reference Architecture vcloud Automation Center 5.2
vcloud Automation Center Reference Architecture vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationTN3270 AND TN5250 INTERNET STANDARDS
51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization
More informationThinAir Server Platform White Paper June 2000
ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationDistributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju
Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationBorland AppServer. Borland
Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationvsan 6.6 Performance Improvements First Published On: Last Updated On:
vsan 6.6 Performance Improvements First Published On: 07-24-2017 Last Updated On: 07-28-2017 1 Table of Contents 1. Overview 1.1.Executive Summary 1.2.Introduction 2. vsan Testing Configuration and Conditions
More informationCisco Virtualized Workload Mobility Introduction
CHAPTER 1 The ability to move workloads between physical locations within the virtualized Data Center (one or more physical Data Centers used to share IT assets and resources) has been a goal of progressive
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationPerformance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003
Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release
More informationLotus Sametime 3.x for iseries. Performance and Scaling
Lotus Sametime 3.x for iseries Performance and Scaling Contents Introduction... 1 Sametime Workloads... 2 Instant messaging and awareness.. 3 emeeting (Data only)... 4 emeeting (Data plus A/V)... 8 Sametime
More informationPlanning Resources. vrealize Automation 7.1
vrealize Automation 7.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to
More informationStarWind Virtual SAN. Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2. One Stop Virtualization Shop
One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind
More informationUse Case Brief BORDERLESS DATACENTERS
Use Case Brief BORDERLESS DATACENTERS Today s cloud service providers must maintain consistent levels of service for each end user or customer, independent of physical location and hardware. This brief
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationBest Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015
Best Practices of IBM Notes Traveler Deployment Date: 27 Aug 2015 Open Mic Team Sandip Singh - IBM ICS Support engineer Presenter Sukanya Yenneti - IBM ICS Support engineer Presenter Ranjit Rai - IBM ICS
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More informationDeltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide
Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
More informationWhite Paper. Major Performance Tuning Considerations for Weblogic Server
White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationUiB 1. april 04. Sun Microsystems
UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop
More informationContents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.
TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationMaximum Availability Architecture: Overview. An Oracle White Paper July 2002
Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network
More informationQuickSpecs. Compaq NonStop Transaction Server for Java Solution. Models. Introduction. Creating a state-of-the-art transactional Java environment
Models Bringing Compaq NonStop Himalaya server reliability and transactional power to enterprise Java environments Compaq enables companies to combine the strengths of Java technology with the reliability
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationLow Latency Data Grids in Finance
Low Latency Data Grids in Finance Jags Ramnarayan Chief Architect GemStone Systems jags.ramnarayan@gemstone.com Copyright 2006, GemStone Systems Inc. All Rights Reserved. Background on GemStone Systems
More informationARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS
ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI
More informationThe Magic of Microsoft Office SharePoint Services & Office 2007
The Magic of Microsoft Office SharePoint Services & Office 2007 Hans Demeyer CT Interactive hans@ct-interactive.net Session Objectives: What is SharePoint Technology Provide overview of the capabilities
More informationEnterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers
1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,
More informationPRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies
Object Storage 201 PRESENTATION TITLE GOES HERE Understanding Architectural Trade-offs in Object Storage Technologies SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
More informationDEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
More informationStarWind Virtual SAN Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016
One Stop Virtualization Shop Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind
More informationS1 Informatic Engineering
S1 Informatic Engineering Advanced Software Engineering Web App. Process and Architecture By: Egia Rosi Subhiyakto, M.Kom, M.CS Informatic Engineering Department egia@dsn.dinus.ac.id +6285640392988 SYLLABUS
More informationGoliath Technology Overview with MEDITECH Module
Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.
More informationCONFIGURING ftscalable STORAGE ARRAYS ON OpenVOS SYSTEMS
Best Practices CONFIGURING ftscalable STORAGE ARRAYS ON OpenVOS SYSTEMS Best Practices 2 Abstract ftscalable TM Storage G1, G2 and G3 arrays are highly flexible, scalable hardware storage subsystems that
More informationServices: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1
Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationService Manager. Installation and Deployment Guide
Service Manager powered by HEAT Installation and Deployment Guide 2017.2 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationIIS Installation for.net Application. Md. Saifullah Al Azad
IIS Installation for.net Application Md. Saifullah Al Azad Contents 1 Mimimal... 2 1.1 Common HTTP Features... 2 1.1.1 Static Content... 2 1.1.2 Default Document... 2 1.2 Application Development... 2 1.2.1
More informationStarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016
One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind
More informationStorage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0
Storage Considerations for VMware vcloud Director Version 1.0 T e c h n i c a l W H I T E P A P E R Introduction VMware vcloud Director is a new solution that addresses the challenge of rapidly provisioning
More informationSharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment
SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment This document is provided as-is. Information and views expressed in this document, including URL and other Internet
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationPerformance and Scalability with Griddable.io
Performance and Scalability with Griddable.io Executive summary Griddable.io is an industry-leading timeline-consistent synchronized data integration grid across a range of source and target data systems.
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationThe Collaboration Cornerstone
E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.
More informationJ2EE: Best Practices for Application Development and Achieving High-Volume Throughput. Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003
J2EE: Best Practices for Application Development and Achieving High-Volume Throughput Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003 Agenda Architecture Overview WebSphere Application Server
More informationXytech MediaPulse Equipment Guidelines (Version 8 and Sky)
Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) MediaPulse Architecture Xytech Systems MediaPulse solution utilizes a multitier architecture, requiring at minimum three server roles: a database
More informationAn introductory look. cloud computing in education
An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationIBM Tivoli Access Manager for e-business V6.1.1 Implementation
000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must
More informationIBM WebSphere Application Server V4.0. Performance. 10/02/01 Copyright 2001 IBM Corporation WS40ST11.prz Page 248 of of 28
IBM WebSphere Application Server V4.0 Performance Page 248 of 401 1 of 28 Performance Enhancements to WebSphere V4.0 Performance Enhancement Overview Dynamic Caching of Servlets/JSPs Performance Monitoring
More informationWhitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP
Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP
More informationOn the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery)
On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) George Candea and many others Stanford + Berkeley Outline J2EE and JBoss JBoss Additions JAGR µreboots Automatic Failure-Path Inference Self-Recovery
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More information