Smart Thin Client Operation and Performance Considerations

Size: px
Start display at page:

Download "Smart Thin Client Operation and Performance Considerations"

Transcription

1 Development Centre Smart Thin Client Operation and Performance Considerations In this paper... SMART THIN CLIENT OPERATION AND PERFORMANCE CONSIDERATIONS 1 INTRODUCTION 1 SMART THIN CLIENT OPERATION 2 SECURITY CONSIDERATIONS 5 PERFORMANCE CONSIDERATIONS 6 PERFORMANCE RECOMMENDATIONS 7 Introduction The Smart Thin Client provides the ability for users to run applications that use the full capabilities of the Microsoft Windows GUI operations over virtually any kind of network, including the Internet. The user s Presentation Client runs the GUI part of the process and is connected to an Application Server where the logic execution and the database access is performed. This separation also provides an extra level of security so that the database is separated from the user s PC and no database data is ever directly accessible from that PC. Any application executes over the Smart Thin Client. The issue is how fast that system performs. This paper describes the operation of thin client processing and the issues that should be considered when designing and coding such a system. Jade Software Corporation Limited believes that the information furnished herein is accurate and reliable and has been prepared with care. However, no responsibility, financial or otherwise, can be accepted for any consequences arising out of the use of this material, including loss of profit, indirect, special or consequential losses or damages. - 1-

2 Smart Thin Client Operation The Thin Client is made up of: Presentation Client (Jade.exe) that runs on the user s PC and is responsible for the GUI presentation and operation of the forms available to the user. Application Server (Jadapp.exe or Jadappb.exe) that executes the logic associated with the application. The Application Server can handle many Presentation Client connections, each of which runs as a separate asynchronous thread. The Application Server in turn is connected to the database server and is a normal database client. When the user initiates Jade.exe in thin client mode, the Presentation Client establishes a TCP connection to the running Application Server requested. The Application Server signs the user onto the database and runs the initialisation logic associated with the requested application. This normally results in a request to the Presentation Client to display a form. The Presentation Client builds the form based on the information received and presents it to the user. The user then interacts with that form as required. The Presentation Client reacts to the user s actions by sending appropriate requests to the Application Server for it to execute the defined methods associated with those actions. When that logic is executed, the logic may generate additional instructions that are sent back to the Presentation Client to alter the information displayed, and so on. Thin Client Caches The Presentation Client retains a cache file of form definitions it has received (as they were constructed in the painter). When the Presentation Client is initiated, it reads the cache file and sends a list of those forms and their versions to the Application Server. When logic creates a form, the Application Server determines whether the Presentation Client is aware of the current definition of that form. If the Presentation Client does not have the current version of that form, the complete definition must be sent. The Presentation Client then stores that form definition in its cache file. If the Presentation Client does have that current form definition, only a short request to reuse that definition from the cache file is sent. The Application Server also has a cache file that contains any picture images set by logic. This cache file holds only one copy of that image and assigns it an internal identifier. That identifier is sent to the Presentation Client instead of the image data (picture images are usually very large). If the Presentation Client already has that image in its cache file, the image data is obtained from there. If the image is new, a request is sent back to the Application Server to obtain that actual image and then store it in the cache file for future use. Entries in the Presentation Client s cache file are discarded after 30 days of nonuse, by default. The CacheEntryTimeout parameter in the JadeThinClient section of the user s Presentation Client controls that timeout period. - 2-

3 Buffering Processes To achieve suitable performance, where possible the Application Server buffers changes made by logic that affect the Presentation Client (actions that alter some aspect of the GUI presentation in most cases). The Application Server carries a copy of the state of each form, control and menu running on the Presentation Client. Most GUI changes made by logic update the copy of the state of the entity held by the Application Server and adds that request to a buffer that is eventually sent to the Presentation Client. Subsequent logic then interacts with those states as though they were already in effect. The Application Server only sends the buffered requests when it completes the original action initiated by the Presentation Client or when logic requests an action that must wait for the Presentation Client to complete before it can continue. When the Presentation Client receives the list of requests, it processes them one at a time in the order that they were received. The Presentation Client also buffers state changes made by user actions. For example, when the user clicks a list box, this could result in the current active control changing and a different entry in the list box being selected. These state changes must be sent to the Application Server to synchronize its states. These changes are buffered and sent with the next event method request. When the application receives this buffer, it updates its copy of those states and then executes the event method requested. Method Analysis When a form is created by logic, the Application Server determines which of the events actually have a method implemented. This is done for the form and its controls and menus. This information is passed to the Presentation Client. As a result, the Presentation Client only sends event method execution requests for those events that actually have logic associated with them. Note that not all events are analyzed because of the cost of performing that analysis for all possible combinations. Non-analyzed events are always sent. These events are usually those that do not occur frequently. External Function Execution By default, all external function calls are passed to the Presentation Client for execution. Adding applicationserverexecution to the end of the external function definition controls causes the external function call to be executed on the Application Server. If the external function has usage io or output parameters or returns a function value, the Application Server must wait for this external function call to complete before continuing execution. If there is no data to be returned, the external function call is queued and executed when the next buffer of information is sent to the Presentation Client. Printing Printing is also achieved by passing all printer requests to the Presentation Client for execution. This provides the ability to use local printer definitions for all printing. The Application Server buffers all Printer.print method calls to reduce the number of messages sent to the Presentation Client. - 3-

4 File Handling By default, file and file folder handling performed by logic refers to files and folders on the Presentation Client. Setting the property usepresentationfilesystem on a File or FileFolder object controls whether the file is accessed on the Application Server or the Presentation Client. Accessing a file on the Presentation Client is achieved by passing all of the file requests to the Presentation Client for processing. Timers and Notifications Timers and notifications are queued on the Application Server for processing. To execute them directly on the Application Server would potentially create the situation where the application issues requests to the Presentation Client at the same time that the user performs a conflicting action. As a result, the presence of a timer or notification is passed to the Presentation Client and an entry is posted into the Presentation Client Windows message queue. When this queued entry is processed, a request is sent to the Application Server to process the outstanding timer and notifications. - 4-

5 Security Considerations There are three issues where security is a concern for an Application Server: 1. Who is able to connect to the Application Server? 2. Is the information being sent encrypted? 3. What application can a user execute? By default, the Application Server allows a connection from any user, provided that they have the Smart Thin Client software. The only way to control who may connect to the Application Server is to implement an SSL TCP network connection. The user must then have the appropriate certificate by which they are authenticated before the connection succeeds. Three types of encryption can be requested by settings in the Presentation Client or Application Server s initialization file. Turning encryption on for the Application Server overrules the Presentation Client setting. To enable encryption, set the RPCEncryptionEnabled to true. Then set the RPCEncryptionHookDLL option to one of the following: Internal which uses Windows 40 bit encryption (Application Server must be running Microsoft Windows) <dll library name> - you can implement your own encryption in an external dll and that library must be present on both PCs SSL_TLS, which is the supplied SSL TCP connection library To control what application can be run on the Application Server: Use the Application Server initialization file parameter AllowSchemaAndApp<n> to define the specific list of application and schemas that are only available from this Application Server The application must implement its own logon security Supplying your own security library that controls what functions a user may access can control access to the development environment. See the Installation and Administration Guide for details. - 5-

6 Performance Considerations The performance of the Jade Smart Thin Client over use of a normal client will depend on: The size of the messages sent The number of messages being sent between the Application Server and the Presentation Client The speed of the network in use Generally the number of messages sent is the determining factor when the speed of the network is slow due to the TCP message turn-around time. Factors determining the size of the messages sent It is normally recommended that the UseCompression initialization file parameter is set to true even if using an SSL type connection (true is the default). Compression obviously uses processor time at each end of the connection but the decrease in network time is usually more significant. The size of the messages depends on: The number of forms in use. Obviously the more forms, the more controlling requests are required to build and manage those forms The number of controls on each form. Obviously the more controls, the more requests are required to build and manage those controls The amount of GUI logic processed. Each change to a form, control or menu requires a request to be sent to the Presentation Client. While most of these requests will be buffered, each change increases the amount of information that must be sent and processed Factors determining the number of messages sent Messages result from the following: The user performs some action that requires the associated event method or methods to be executed. Obviously the more event methods the more messages that can result Logic that performs a GUI function for which the Application Server must wait for completion. Examples are creating a form, showing a form, setting focus, unloading a form, an external function call that returns information, app.dowindowevents and Window.refreshNow - 6-

7 Performance Recommendations The following recommendations should be considered when implementing an application that will use the Jade Smart Thin Client: Define as much as possible in the painter. The form definition is cached on the Presentation Client after the first create of that form and does not need to be present for future creates. The more controls created or changed at run time the larger the number of requests passed to the Presentation Client and the more chance that additional messages will result. Keep the forms simple. The more controls, the longer the form creation and initialisation overheads and the longer it takes to paint. Avoid defining logic for mousemove events where possible. Mouse move events arrive at a fearsome rate. The Presentation Client actually discards these events based on the initialization option MouseMoveTime in order to limit the interval between such events. Use mouseenter and mouseleave events where possible instead. Avoid defining logic for the keydown, keypress, keyup and change events on controls where possible, especially text box or rich text controls. The time taken to process even one of these events could mean that the user suffers lag behind when entering text. Use the firstchange event if the text box only needs to know whether the text has been changed. For automatic tabbing when the text box becomes full, set the text box autotab property to true. If the logic only applies to certain key types, use the Control.registerKeys method to define the set of keys for which these events will be called. Avoid defining logic for the keydown, keypress and keyup events on forms. The time taken to process even one of these events could mean that the user suffers lag behind when entering text in a text box. If these events are required, use the Form.registerFormKeys method to define the set of keys that the form logic is only interested in. Avoid defining logic for paint events (even though these events are buffered). Paint events occur so often that they can be a significant cause of messages being sent from the Presentation Client. Instead of defining paint events, set autoredraw to true and draw the requirement. The Presentation Client then has all the information locally for redrawing the image. Consider dynamically disabling and enabling events via logic using the enableevent method. An example of this would be that the mousemove event might only be relevant after the user clicks on that window. Be careful with the use of the methods app.dowindowevents and Window.doWindowEvents. These methods cause a message to be sent to the Presentation Client. If logic is repeatedly calling these methods to refresh a display or wait for a button click, for example, the process can end up spending 99 percent of its time doing the dowindowevents calls because of the time it takes to process send and receive the message. - 7-

8 Use Window.refreshNow sparingly, as this method causes a message to be sent to the Presentation Client. It is common for many systems to use refreshnow lavishly for no obvious reason, resulting in poor performance. Sparingly use the other methods as listed in the Installation and Administration guide Thin Client Performance Considerations section that require a message to be sent to the Presentation Client immediately. Most of these are self-evident by definition as they are requesting information specific to the Presentation Client. Sparingly use external function calls that are executed on the Presentation Client. Each such call that returns data causes a message to be sent to the Presentation Client. Use ActiveX and DotNet controls only when absolutely necessary. Accessing many of these controls is essentially no different to calling a series of external function calls that result in an immediate message being sent to the Presentation Client for each access to the control. Note however, that each non- specific event defined for the control is only sent when that event has logic defined. When reading files from a Presentation Client, if the file is opened for input only and sharemode is read only or exclusive (that is the file is static), file operations read data from the presentation client in large chunks and the processing of read request is mostly performed on the app server such that the performance of File.readLine, File.readBinary and File.readString will be comparable. Otherwise, File.readLine is much more expensive than File.readBinary or File.readString. The File.readLine requires multiple messages per line read to reposition the file at the end of each logical line. In addition the larger the size of data read with when using readstring or readbinary, the fewer messages required. Avoid logic that concatenates multiple times onto a window text or caption property. Each time the property is set, a value is passed to the Presentation Client. The logic would be much more efficient if it built the text into a local variable and set the window property on completion. Rather than unload a large form that may be recalled later, consider hiding it instead and reusing it when it is required. This technique could save having to completely rebuild and initialise the form. Use the Control.automaticCellControl feature where possible so that logic is not required to set the contents into a table cellcontrol when the cell becomes active or to set the cell contents when the cellcontrol data is changed by the user. Every picture set at run time is saved in the cache files. To avoid this for temporary pictures, set the Picture.cachePictures property to false. An example of where you might wish to do this, for example, is when createpicture is used to construct an image for a one-off print or display. - 8-

9 Avoid the use of timers of short duration. Each timer execution must be routed through the Presentation Client in order to synchronise its execution with any user activity. Minimize the occurrence of notifications where possible, as notifications must be routed through the Presentation Client in order to synchronize its execution with any user activity Load pictures as png or jpg types rather than type bmp. The png and jpg type files are usually significantly smaller and therefore the transmission time of these types of images is considerably reduced. Consider running the Application Server in single user mode. This can provide significant performance gains by the elimination of the database server node. The downsides of this are that all access to the database must then be performed through the same Application Server. To analyse the thin client traffic generated by the application, set Trace=all in the [JadeThinClient] section of initialization file on the Presentation Client. Initiating the thin client and perform the application actions that you wish to consider. During these actions, a trace file is generated that contains each action sent and received by the Presentation Client. This trace file can then be used to assess the cause of any performance issues. Alternately, consider using multiple Application Servers to share the load of Presentation Clients when there are a significant number of users. When there is a high level of activity on an Application Server, contention for resources and the overheads of thread switching can become significant. To avoid the initial download of forms, the cache file could be generated on a local PC and then distributed to all users. When multiple Application Servers are used, consider using the Automatic Connection Balancing feature. - 9-

Asynchronous Method Calls White Paper VERSION Copyright 2014 Jade Software Corporation Limited. All rights reserved.

Asynchronous Method Calls White Paper VERSION Copyright 2014 Jade Software Corporation Limited. All rights reserved. VERSION 7.0.10 Copyright 2014 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your

More information

Thin Client Guide V E R S I O N Copyright 2018 Jade Software Corporation Limited. All rights reserved.

Thin Client Guide V E R S I O N Copyright 2018 Jade Software Corporation Limited. All rights reserved. V E R S I O N 2018.0.01 Copyright 2018 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

Proficy* Workflow. Powered by Proficy SOA BEST PRACTICES

Proficy* Workflow. Powered by Proficy SOA BEST PRACTICES Proficy* Workflow Powered by Proficy SOA BEST PRACTICES Version 1.1 May 2011 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical means, including

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Log Server Configuration Utility

Log Server Configuration Utility Email Log Server Configuration Utility Email Log Server is the component that receives log records and processes them into the Log Database. During installation, you configure certain aspects of Log Server

More information

10 MONITORING AND OPTIMIZING

10 MONITORING AND OPTIMIZING MONITORING AND OPTIMIZING.1 Introduction Objectives.2 Windows XP Task Manager.2.1 Monitor Running Programs.2.2 Monitor Processes.2.3 Monitor System Performance.2.4 Monitor Networking.2.5 Monitor Users.3

More information

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change. RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go

More information

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0 Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product

More information

SysGauge SYSTEM MONITOR. User Manual. Version 3.8. Oct Flexense Ltd.

SysGauge SYSTEM MONITOR. User Manual. Version 3.8. Oct Flexense Ltd. SysGauge SYSTEM MONITOR User Manual Version 3.8 Oct 2017 www.sysgauge.com info@flexense.com 1 1 SysGauge Product Overview SysGauge is a system and performance monitoring utility allowing one to monitor

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

Deploying the BIG-IP System for LDAP Traffic Management

Deploying the BIG-IP System for LDAP Traffic Management Deploying the BIG-IP System for LDAP Traffic Management Welcome to the F5 deployment guide for LDAP traffic management. This document provides guidance for configuring the BIG-IP system version 11.4 and

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Chapter 1 CONCEPTS AND FACILITIES. SYS-ED/ Computer Education Techniques, Inc.

Chapter 1 CONCEPTS AND FACILITIES. SYS-ED/ Computer Education Techniques, Inc. Chapter 1 CONCEPTS AND FACILITIES SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Objects of MQ. Features and benefits. Purpose of utilities. Architecture of the MQ system. Queue

More information

CONTENTS. ROGUE WAVE HOSTACCESS 7.40j RELEASE NOTES. Page 1. Copyright Rogue Wave Software, Inc. All Rights Reserved.

CONTENTS. ROGUE WAVE HOSTACCESS 7.40j RELEASE NOTES. Page 1. Copyright Rogue Wave Software, Inc. All Rights Reserved. CONTENTS 1 INTRODUCTION... 3 2 HOST32.EXE PROGRAM... 3 2.1 New Features and Enhancements... 3 2.1.1 (HA-282) New Support for Windows 8 Added... 3 2.1.2 (HA-120) Updated System Menu Options... 3 2.1.3 (HA-124)

More information

CA Single Sign-On. Performance Test Report R12

CA Single Sign-On. Performance Test Report R12 CA Single Sign-On Performance Test Report R12 Contents CHAPTER 1: OVERVIEW INTRODUCTION SUMMARY METHODOLOGY GLOSSARY CHAPTER 2: TESTING METHOD TEST ENVIRONMENT DATA MODEL CONNECTION PROCESSING SYSTEM PARAMETERS

More information

PowerLink Host Data Manager User Guide

PowerLink Host Data Manager User Guide PowerLink Host Data Manager User Guide Last Updated: July 2009 Version: 2.06014 Contents Contents... 2 Introduction... 4 Quick Start... 5 Enable File Monitoring... 7 Enabling Attaché 7 File Monitoring

More information

QOS Section 6. Weighted Random Early Detection (WRED)

QOS Section 6. Weighted Random Early Detection (WRED) QOS Section 6 Weighted Random Early Detection (WRED) The previous section addressed queuing, which is a congestionmanagement QoS mechanism. However, this section focuses on congestion avoidance. Specifically,

More information

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic)

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic) I/O Systems Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) I/O Systems 1393/9/15 1 / 57 Motivation Amir H. Payberah (Tehran

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Double-Take vs. Steeleye DataKeeper Cluster Edition

Double-Take vs. Steeleye DataKeeper Cluster Edition Double-Take vs. Steeleye DataKeeper Cluster Edition A Competitive Analysis July 2012 Double- Take from Vision Solutions is compared to Steeleye DataKeeper Cluster Edition. A summary of the performance

More information

SYNTHESYS.NET PORTAL WEB BROWSER

SYNTHESYS.NET PORTAL WEB BROWSER SYNTHESYS.NET PORTAL WEB BROWSER Synthesys.Net Portal Taking Calls 1 All rights reserved The contents of this documentation (and other documentation and training materials provided), is the property of

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

10ZiG Manager Cloud Setup Guide

10ZiG Manager Cloud Setup Guide 10ZiG Manager Cloud Setup Guide Welcome to the 10ZiG Manager Cloud Setup guide. This guide will help you install all of the components within the 10ZiG Management suite. Please take note of the following

More information

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3 PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000 User Manual Version 1.3 Promise Array Management Copyright 2003 Promise Technology, Inc. All Rights Reserved. Copyright by

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

METADATA FRAMEWORK 6.3. Probe Configuration

METADATA FRAMEWORK 6.3. Probe Configuration METADATA FRAMEWORK 6.3 Probe Configuration Publishing Information Software version 6.3.160 Document version 34 Publication date May 22, 2017 Copyright 2005-2017 Varonis Systems Inc. All rights reserved.

More information

Performance and Optimization Issues in Multicore Computing

Performance and Optimization Issues in Multicore Computing Performance and Optimization Issues in Multicore Computing Minsoo Ryu Department of Computer Science and Engineering 2 Multicore Computing Challenges It is not easy to develop an efficient multicore program

More information

Title Page. Working with Task Workflows

Title Page. Working with Task Workflows Title Page Working with Task Workflows April 2013 Copyright & Document ID Copyright 2012-2013 Software AG USA, Inc. All rights reserved. The webmethods logo, Get There Faster, Smart Services and Smart

More information

EMC Disk Library Automated Tape Caching Feature

EMC Disk Library Automated Tape Caching Feature EMC Disk Library Automated Tape Caching Feature A Detailed Review Abstract This white paper details the EMC Disk Library configuration and best practices when using the EMC Disk Library Automated Tape

More information

Chapter 3: Process Concept

Chapter 3: Process Concept Chapter 3: Process Concept Chapter 3: Process Concept Process Concept Process Scheduling Operations on Processes Inter-Process Communication (IPC) Communication in Client-Server Systems Objectives 3.2

More information

CHAPTER 3 - PROCESS CONCEPT

CHAPTER 3 - PROCESS CONCEPT CHAPTER 3 - PROCESS CONCEPT 1 OBJECTIVES Introduce a process a program in execution basis of all computation Describe features of processes: scheduling, creation, termination, communication Explore interprocess

More information

Chapter 3: Process Concept

Chapter 3: Process Concept Chapter 3: Process Concept Chapter 3: Process Concept Process Concept Process Scheduling Operations on Processes Inter-Process Communication (IPC) Communication in Client-Server Systems Objectives 3.2

More information

Operating Systems. Lecture 09: Input/Output Management. Elvis C. Foster

Operating Systems. Lecture 09: Input/Output Management. Elvis C. Foster Operating Systems 141 Lecture 09: Input/Output Management Despite all the considerations that have discussed so far, the work of an operating system can be summarized in two main activities input/output

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

Multiprocessor and Real- Time Scheduling. Chapter 10

Multiprocessor and Real- Time Scheduling. Chapter 10 Multiprocessor and Real- Time Scheduling Chapter 10 Classifications of Multiprocessor Loosely coupled multiprocessor each processor has its own memory and I/O channels Functionally specialized processors

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Optimizing Performance: Intel Network Adapters User Guide

Optimizing Performance: Intel Network Adapters User Guide Optimizing Performance: Intel Network Adapters User Guide Network Optimization Types When optimizing network adapter parameters (NIC), the user typically considers one of the following three conditions

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Universal Printing Best Practices v16.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

Unexpected Power Loss Protection

Unexpected Power Loss Protection White Paper SanDisk Corporation Corporate Headquarters 951 SanDisk Drive Milpitas, CA 95035, U.S.A. Phone +1.408.801.1000 Fax +1.408.801.8657 www.sandisk.com Table of Contents Executive Summary 3 Overview

More information

OPC XML-DA Client Driver PTC Inc. All Rights Reserved.

OPC XML-DA Client Driver PTC Inc. All Rights Reserved. 2018 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 Project Architecture 5 Setup 6 Channel Properties General 6 Channel Properties Write Optimizations 7 Channel Properties

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

JADE Installation and Administration Course VERSION Copyright 2018 Jade Software Corporation Limited. All rights reserved.

JADE Installation and Administration Course VERSION Copyright 2018 Jade Software Corporation Limited. All rights reserved. JADE Installation and Administration Course VERSION 2016 Copyright 2018 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

Higher National Unit specification. General information for centres. Unit title: Internet: Web Server Management. Unit code: D76D 35

Higher National Unit specification. General information for centres. Unit title: Internet: Web Server Management. Unit code: D76D 35 Higher National Unit specification General information for centres Unit code: D76D 35 Unit purpose: This Unit is designed to introduce candidates to the topics required for successful installation and

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Client Setup (.NET, Internet Explorer)

Client Setup (.NET, Internet Explorer) Powered By: Version 2.0 Created December, 2008 .NET & Internet Explorer Setup Client Setup (.NET, Internet Explorer) The WebTMS application itself is a windows executable program. In order to run WebTMS,

More information

OPC UA Client Driver PTC Inc. All Rights Reserved.

OPC UA Client Driver PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 5 Overview 6 Profiles 6 Supported OPC UA Server Profiles 6 Tunneling 7 Re-establishing Connections 7 Setup 9 Channel Properties

More information

hp l1619a smart attachment module

hp l1619a smart attachment module hp l1619a smart attachment module user s guide Smart Attachment Module 1 Notice This manual and any examples contained herein are provided as is and are subject to change without notice. Hewlett-Packard

More information

Relational Queries Using ODBC

Relational Queries Using ODBC Relational Queries Using ODBC Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your use of this information or software material, including

More information

One Identity Manager User Guide for One Identity Manager Tools User Interface and Default Functions

One Identity Manager User Guide for One Identity Manager Tools User Interface and Default Functions One Identity Manager 8.0.1 User Guide for One Identity Manager Tools User Interface and Default Functions Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information

More information

EasiShare ios User Guide

EasiShare ios User Guide Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties

More information

Performance Monitor. Version: 16.0

Performance Monitor. Version: 16.0 Performance Monitor Version: 16.0 Copyright 2018 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived from,

More information

FlexBulk: Intelligently Forming Atomic Blocks in Blocked-Execution Multiprocessors to Minimize Squashes

FlexBulk: Intelligently Forming Atomic Blocks in Blocked-Execution Multiprocessors to Minimize Squashes FlexBulk: Intelligently Forming Atomic Blocks in Blocked-Execution Multiprocessors to Minimize Squashes Rishi Agarwal and Josep Torrellas University of Illinois at Urbana-Champaign http://iacoma.cs.uiuc.edu

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Scannex Collector Manual

Scannex Collector Manual Scannex Collector Manual Thursday, 28 th August 2008 Issue 3 Document History Issue Date Comments 01 08-Oct-2004 Initial Release. 02 19-Nov-2004 General update. 03 28-Aug-2008 Update for ip.buffer Copyright

More information

Processes. CS 475, Spring 2018 Concurrent & Distributed Systems

Processes. CS 475, Spring 2018 Concurrent & Distributed Systems Processes CS 475, Spring 2018 Concurrent & Distributed Systems Review: Abstractions 2 Review: Concurrency & Parallelism 4 different things: T1 T2 T3 T4 Concurrency: (1 processor) Time T1 T2 T3 T4 T1 T1

More information

LOCQuickLinesTrader Expert Advisor user s manual.

LOCQuickLinesTrader Expert Advisor user s manual. LOCQuickLinesTrader Expert Advisor user s manual. Contents LOCQuickLinesTrader Expert Advisor user s manual.... 1 Contents... 1 Overview... 1 Features.... 1 Installation... 1 Input parameters and default

More information

What is Network Acceleration?

What is Network Acceleration? What is Network Acceleration? How do WAN Optimization, Network Acceleration, and Protocol Streamlining work, and what can they do for your network? Contents Introduction Availability Improvement Data Reduction

More information

Server Memory Allocation White Paper VERSION 7.1. Copyright 2016 Jade Software Corporation Limited. All rights reserved.

Server Memory Allocation White Paper VERSION 7.1. Copyright 2016 Jade Software Corporation Limited. All rights reserved. VERSION 7.1 Copyright 2016 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your

More information

sflow Agent Contents 14-1

sflow Agent Contents 14-1 14 sflow Agent Contents Overview..................................................... 14-2 Flow Sampling by the sflow Agent........................... 14-2 Counter Polling by the sflow Agent...........................

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information

Using the JADE Report Writer

Using the JADE Report Writer Using the JADE Report Writer Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your use of this information or software material, including

More information

TAX REPORTING SUITE MODULE IDES VERSION 1712

TAX REPORTING SUITE MODULE IDES VERSION 1712 TAX REPORTING SUITE MODULE IDES VERSION 1712 USERS S MANUAL Published: Jan 2018 For the latest information and to leave feedback, please visit Vogele IT-Services at http://www.section11.ch. 2 The information

More information

Compacting Ratio Calculations for Design of Power Cables. Version Jun-2014

Compacting Ratio Calculations for Design of Power Cables. Version Jun-2014 Compacting Ratio Calculations for Design of Power Cables Version 2.0 01-Jun-2014 A Microsoft Windows program from Nano-Diamond America, Inc. Contents Compacting Ratio Definition... 1 Introduction - The

More information

Software Description Application Software OTT Hydras 3 net

Software Description Application Software OTT Hydras 3 net English Software Description Application Software OTT Hydras 3 net We reserve the right to make technical changes and improvements without notice! Table of contents 1 Overview of OTT Hydras 3 net 5 2 Data

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. E Release Date July 2015 Applicability This version of the SAS

More information

[08] IO SUBSYSTEM 1. 1

[08] IO SUBSYSTEM 1. 1 [08] IO SUBSYSTEM 1. 1 OUTLINE Input/Output (IO) Hardware Device Classes OS Interfaces Performing IO Polled Mode Interrupt Driven Blocking vs Non-blocking Handling IO Buffering & Strategies Other Issues

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

Mobile Banking Frequently Asked Questions

Mobile Banking Frequently Asked Questions Mobile Banking Frequently Asked Questions What types of Mobile Banking does Midwest BankCentre offer? We offer three types of Mobile Banking: Mobile Apps allows you to easily connect to Midwest BankCentre

More information

Dump and Load Utility User s Guide

Dump and Load Utility User s Guide Dump and Load Utility VERSION 6.3 Copyright 2009 Jade Software Corporation Limited All rights reserved Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

Chapter 13: I/O Systems. Operating System Concepts 9 th Edition

Chapter 13: I/O Systems. Operating System Concepts 9 th Edition Chapter 13: I/O Systems Silberschatz, Galvin and Gagne 2013 Chapter 13: I/O Systems Overview I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations

More information

Wired Network Summary Data Overview

Wired Network Summary Data Overview Wired Network Summary Data Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE.

More information

Basic System. Tutorial Guide API PRO. Open.7

Basic System. Tutorial Guide API PRO. Open.7 Tutorial Guide API PRO Basic System Open.7 The Basic system, or module 2.1 is the backbone in API PRO and it is an absolute pre-condition to run any of the other modules in API PRO that the basic system

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

20480C: Programming in HTML5 with JavaScript and CSS3. Course Code: 20480C; Duration: 5 days; Instructor-led. JavaScript code.

20480C: Programming in HTML5 with JavaScript and CSS3. Course Code: 20480C; Duration: 5 days; Instructor-led. JavaScript code. 20480C: Programming in HTML5 with JavaScript and CSS3 Course Code: 20480C; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides an introduction to HTML5, CSS3, and JavaScript. This

More information

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution CERN-ACC-2013-0237 Wojciech.Sliwinski@cern.ch Report Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution W. Sliwinski, I. Yastrebov, A. Dworak CERN, Geneva, Switzerland

More information

Assurance Features and Navigation

Assurance Features and Navigation Assurance Features and Navigation Cisco DNA Center 1.1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Snapt Accelerator Manual

Snapt Accelerator Manual Snapt Accelerator Manual Version 2.0 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 3 Accelerator Dashboard... 4 Standard Configuration Default Settings... 5 Standard Configuration

More information

Performance Monitor. Version: 7.3

Performance Monitor. Version: 7.3 Performance Monitor Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived from,

More information

PERFORMANCE. Rene Damm Kim Steen Riber COPYRIGHT UNITY TECHNOLOGIES

PERFORMANCE. Rene Damm Kim Steen Riber COPYRIGHT UNITY TECHNOLOGIES PERFORMANCE Rene Damm Kim Steen Riber WHO WE ARE René Damm Core engine developer @ Unity Kim Steen Riber Core engine lead developer @ Unity OPTIMIZING YOUR GAME FPS CPU (Gamecode, Physics, Skinning, Particles,

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

BIG-IP Analytics: Implementations. Version 12.1

BIG-IP Analytics: Implementations. Version 12.1 BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting

More information

Student Guide INTRODUCTION TO ONLINE RESOURCES

Student Guide INTRODUCTION TO ONLINE RESOURCES Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 12. March. 2018 By: Technical Support Team Table of Contents 1) Introduction 3 2) Student Panel (SIS) 3 2.1) Student Panel (SIS) Login 3 2.1.1) Definitions

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Oracle Berkeley DB. 12c Release 1

Oracle Berkeley DB. 12c Release 1 Oracle Berkeley DB Writing In-Memory Applications 12c Release 1 (Library Version 12.1.6.2) Legal Notice This documentation is distributed under an open source license. You may review the terms of this

More information

G Robert Grimm New York University

G Robert Grimm New York University G22.3250-001 Receiver Livelock Robert Grimm New York University Altogether Now: The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Motivation

More information

Universal Communication Component on Symbian Series60 Platform

Universal Communication Component on Symbian Series60 Platform Universal Communication Component on Symbian Series60 Platform Róbert Kereskényi, Bertalan Forstner, Hassan Charaf Department of Automation and Applied Informatics Budapest University of Technology and

More information

Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0

Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0 White Paper Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0 EdgeSight Archtectural Overview EdgeSight for XenApp is implemented as an agent based solution for

More information