Ch. 13: Measuring Performance

Size: px
Start display at page:

Download "Ch. 13: Measuring Performance"

Transcription

1 Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3

2 Introduction Measuring performance is key in maintaining SLAs and preventing problems Input parameters describe system configuration, software environment, and workload of the system under study Representativeness of a model depends directly on the quality of the input data Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 2/3

3 Introduction Before one begins collecting data, three questions naturally arise: What are the information sources of performance data? What are the monitoring tools available for measuring response time and resource usage? What techniques are used to calculate model input parameters from typical performance data collected by standard measurement tools? Data are collected from different test points, carefully chosen Data will contain errors Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 3/3

4 Data Measurement data has 3 main uses: 1. Detection of operational problems such as high processor or link utilization, excessive paging activity, memory leaks, high error rates, high peak-to-average ration of number of concurrent users accessing the site etc. 2. Performance tuning such as optimizing OS performance or memory 3. Capacity planning to predict the performance of future systems Rely on runtime monitors Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 4/3

5 Measurement framework Framework depicted in Fig Two approaches to measuring a system Active measurement. Measurement agent uses the system and analyzes the performance Passive measurement. A device or an agent watches what the system does but does not add any requests to its workload. Measurements can be made at a single point or at many points Location of measurement agents should be carefully chosen and spread across the globe Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 5/3

6 Infrastructure measurement Measure resource utilization of servers and components of the site In Fig. 13.1, points E and F indicate data is being collected from the Web server and application layer Point G collects utilization data of the LAN segments Network sniffers can be located at point D (LAN to WAN) Operating system can be monitored at point E At point F a monitoring API can be embedded User perceived measurements can be collected at points A and B Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 6/3

7 Application Performance Measurement Quality of a web service is measured by the value of high-level application-oriented metrics Metrics are end-to-end response time, availability, and cost per application Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 7/3

8 Meaning of measurements Suppose you write an application that submits n = 100 requests to a search engine and records the response times The sample mean is defined as: R = 1 n i = 1 n R i The sample variance and standard deviation are: SR 2 = 1 n (R i n 1 R) 2 i=1 S R = 1 n (R i n 1 R) 2 i=1 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 8/3

9 Meaning of measurements Suppose we repeat the experiment m times and obtain m means. What is the true mean? We can make a probabilistic statement in the form of Pr[c 1 E( R) c 2 ] = 1 α E( R) is the population mean (c 1,c 2 ) is the confidence interval α is the significance level 100(1 α) is the confidence level (1 α) is the confidence coefficient Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 9/3

10 Meaning of measurements For small n we use the Students distribution For n > 30, a 100(1 α) confidence interval for E( R) can be computed as: ( R z 1 α/2 S R / n, R + z 1 α/2 S R / n) where R is the sample mean, S R the sample standard deviation, n the sample size, and z 1 α/2, the (1 α/2)-quantile of a unit normal variate z 1 α/2 = NORMSINV(1 α/2) Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 10/3

11 Meaning of measurements The minimum number of observations n to obtain an accuracy of r% on the estimate of the mean at a 100(1 α) confidence level is: ( ) 100 z1 α/2 S 2 R n = r R Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 11/3

12 Measurement Process What are the most used resources of a given system? Network bandwidth? Server I/O? Client desktop processor time? What is the average end-to-end response time of stock trading transactions? What does measuring really mean? Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 12/3

13 Measurement process measurement process involves 4 major steps: 1. Specify measurements: Decide on performance variables 2. Specify test points: Points from which performance data will be collected 3. Instrument and collect data: After selecting variables to be observed, one should deploy measurement tools to monitor the system 4. Analyze and transform data: Measurement tools gather large amounts of raw data. This must be distilled into meaningful information Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 13/3

14 Collection techniques and tools Event-driven: An interrupt that signals the arrival of a network packet can be viewed as an event that changes system state. At the OS level, the number of processes in the ready-queue, blocked-queue, and running can define the system. In event-mode, information is collected at the occurrence of certain events Event-handling overhead can be significant and create problems. Solution is to use dedicated hardware Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 14/3

15 Sampling Sampling is done at predefined instants Act of measuring can perturb the system based on number of variables sampled and the size of the sampling interval tradeoff between overhead and accuracy Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 15/3

16 Tools Monitors measure the level of activity in a system monitor must be an observer and not a participant Hardware monitor sensed predefined signals. Registers memory locations, I/O channels Software monitor consists of a set of routines embedded in the software with the aim of recording states and events in the system item Combination of hardware and software monitors is a hybrid monitor Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 16/3

17 Data Measurement data can be grouped into two categories: 1. System-level measurements: System wide resource statistics such as global CPU and disk utilization, total number of physical I/O operations, page fault rate, and total traffic through a router 2. Program-level measurements: Show program related information such as program identification, elapsed time, CPU time, number of I/O operations per execution, physical memory usage, and application traffic. Most information is from accounting systems Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 17/3

18 Accounting systems Collects information to be used as a means of apportioning charges to users of a system. Usually an integral part of multiuser operating systems Includes three groups of information: Identification (process, user, application), resource usage (CPU time, I/O operations, memory usage), and execution times DBMS and transaction processors may not be visible to accounting systems. So a special program may be needed to access Oracle Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 18/3

19 Program Analyzers Software tools especially designed to collect information about the execution of individual programs Can also be used as an optimization tool by pinpointing parts of a program that consume significant system resources For a transaction monitor can provide information on transaction count, mean number of I/O operations per transaction, and transaction mix Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 19/3

20 Logs Log files contain information about the services requested from a system, response provided and the origin of the requests. Web servers keep a log of their activities Numerous tools for analyzing Web server access logs Do not contain all information needed (i.e. transfer time) Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 20/3

21 Performance model parameters Parameters fall into 4 groups: Queues or devices, workload classes, workload intensity, service demands Step 1 is to define the queues that make up the model. Open or closed, component and system models Workloads are partitioned into classes. A class may be open or closed Workload intensity parameters give n indication of the number of transactions, requests, processes, or customers that contend for the resources of a network-based computing environment. λ for an open class and M and Z for a closed class Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 21/3

22 Model parameters Queueing models must take into account service demands that are not only hardware related Service demand includes time being serviced, but not waiting time D i = U i T /C 0 We have flexibility in interpreting U i Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 22/3

23 Example Suppose a system is monitored for a period of T = 10 minutes. The CPU is 90% busy. 80% by the OS kernel and 10% executing HTTP code. The number of HTTP requests during the measurement period was 30,000. What is the Demand on the CPU? D CPU = ( ) (10 60)/30, 000 = 0.018s Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 23/3

24 Parameter estimation Determining input parameters from measurement data There are 4 basic steps 1. Identify the type of execution environment. What are the software layers? 2. Specify the measurement process. Monitoring tools. Data to be obtained. Measurement interval 3. Monitor the system and collect performance data 4. Estimate input parameters. Calculate parameters Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 24/3

25 Parameter estimation cont. Service demands computed from measurement data Recall service demand law of a request of class r at resourcei D i,r = U i,r /X 0,r Need to determine utilization of each type of request Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 25/3

26 Parameter estimation cont. Ucpu,server os : utilization of the server process at the CPU measured by the operating system TotalCPUTime r : total CPU time for requests of class r measured by the operating system x 0,R : throughput of class r requests measured from a log generated by the server process or from a program analyzer at the server level Utilization of class r requests at the CPU Ucpu,r = U os cpu,server The service demand is: TotalCPUTime r r s=1 TotalCPUTime s Dcpu,r = Ucpu,r/X 0,r Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 26/3

27 Example Consider that an HTTP server received 21,600 requests during 1 hour as measured for the HTTP log. An analysis of this log places the requests in three categories according to file sizes: small (up to 20KB), medium (from 20 KB to 1 MB), and large (larger than 1 MB). Table 13.1 shows the total CPU time for each class of request as obtained form n=an instrumented HTTP server. It also shows the total number of requests processed in each category. If the overall utilization of the CPU measured by the OS was 86% and the machine was dedicated to being a Web server, what is the service demand at the CPU for each class of request? Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 27/3

28 Example Cont. Throughput per class are X small = 12, 960/3, 600 = 3.6 X medium = 6, 480/3, 600 = 1.8 X large = 2, 160/3, 600 = 0.6 The utilizations are U cpu,small = 0.86 U cpu,medium = 0.86 U cpu,large = , 555 1, = , = , = 0.11 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 28/3

29 Example Cont. The service demands per class of HTTP request are: D cpu,small = U cpu,small /X small = 0.46/3.60 = 0.13 D cpu,medium = U cpu,medium /X medium = 0.29/1.80 = 0 D cpu,large = U cpu,large /X large = 0.11/0.60 = 0.18 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 29/3

30 Obtaining model parameters Network management system SNMP SNMP consists of a manager and an agent Information is organized into a tree structure known as a management information based MIB Performance variables are logically grouped into branches. Interface, IP and TCP passive data collection: snoop, netramet, tcpdump, tcptrace, and libcoral active data collection: ping (RTT), timit (Web server) Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 30/3

31 Measurement tools LAN analyzers can only collect a few minutes of traffic remote monitoring MIB (RMON) Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 31/3

32 Servers Measurements can be collected at several layers (Fig. 13.5) Windows NT: NT performance monitor measures behavior of computer objects Counters organized for object type. Table 13.3 Unix: System activity reporting (SAR) records cumulative and average activity table ps, netstat, etc Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 32/3

33 Conclusion Performance models are useful for understanding and predicting the quantitative behavior of Web services Depends directly on quality of input parameters Performance measurement and parameter estimation Set of guidelines for converting performance measures into input parameters Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 33/3

Ch. 7: Benchmarks and Performance Tests

Ch. 7: Benchmarks and Performance Tests Ch. 7: Benchmarks and Performance Tests Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction

More information

Ch. 3 Cont.: Basic Performance Concepts

Ch. 3 Cont.: Basic Performance Concepts Ch. 3 Cont.: Basic Performance Concepts Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/1 Example

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer Systems Selection of Techniques and Metrics (Chapter 3) 1 Overview One or more systems, real or hypothetical You want to evaluate their

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer s Selection of Techniques and Metrics Overview One or more systems, real or hypothetical You want to evaluate their performance What technique

More information

SOFT 437. Software Performance Analysis. Ch 7&8:Software Measurement and Instrumentation

SOFT 437. Software Performance Analysis. Ch 7&8:Software Measurement and Instrumentation SOFT 437 Software Performance Analysis Ch 7&8: Why do we need data? Data is required to calculate: Software execution model System execution model We assumed that we have required data to calculate these

More information

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Real-Time

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Network Traffic Management

Network Traffic Management A Seminar report On Network Traffic Management Submitted in partial fulfillment of the requirement for the award of degree Of MBA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic

measurement goals why traffic measurement of Internet is so hard? measurement needs combined skills diverse traffic massive volume of traffic measurement goals Traffic Measurement and Analysis () SOI ASIA Lecture 22//26 Kenjiro Cho Sony Computer Science Labs, Inc. kjc@csl.sony.co.jp for operations trouble shooting diagnosis and tuning of performance,

More information

A New Approach To Manage a Best Effort IP WAN Services

A New Approach To Manage a Best Effort IP WAN Services A New Approach To Manage a Best Effort IP WAN Services Network Management Components Network Engineering Corporate Policy Traffic Engineering Network Planning Network Monitoring Network Forecasting 1 Network

More information

Lecture 4: Introduction to Computer Network Design

Lecture 4: Introduction to Computer Network Design Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION

CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION 31 CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION This chapter introduces the Grid monitoring with resource metrics and network metrics. This chapter also discusses various network monitoring tools and

More information

Predicting Web Service Levels During VM Live Migrations

Predicting Web Service Levels During VM Live Migrations Predicting Web Service Levels During VM Live Migrations 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud Helmut Hlavacs, Thomas Treutner

More information

Comprehensive Final Exam for Capacity Planning (CIS 4930/6930) Fall 2001 >>> SOLUTIONS <<<

Comprehensive Final Exam for Capacity Planning (CIS 4930/6930) Fall 2001 >>> SOLUTIONS <<< Comprehensive Final Exam for Capacity Planning (CIS 4930/6930) Fall 001 >>> SOLUTIONS

More information

please study up before presenting

please study up before presenting HIDDEN SLIDE Summary These slides are meant to be used as is to give an upper level view of perfsonar for an audience that is not familiar with the concept. You *ARE* allowed to delete things you don t

More information

CPU Scheduling. Daniel Mosse. (Most slides are from Sherif Khattab and Silberschatz, Galvin and Gagne 2013)

CPU Scheduling. Daniel Mosse. (Most slides are from Sherif Khattab and Silberschatz, Galvin and Gagne 2013) CPU Scheduling Daniel Mosse (Most slides are from Sherif Khattab and Silberschatz, Galvin and Gagne 2013) Basic Concepts Maximum CPU utilization obtained with multiprogramming CPU I/O Burst Cycle Process

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

White Paper. Altiris Design and Scalability Guide 10/7/2004

White Paper. Altiris Design and Scalability Guide 10/7/2004 White Paper Altiris Design and Scalability Guide 10/7/2004 Created by Altiris Product Management, Customer Services, Engineering, Professional Services, System Testing, and others 2004 Altiris, Inc. All

More information

Cisco IOS Embedded Event Manager

Cisco IOS Embedded Event Manager Data Sheet Cisco IOS Embedded Event Manager Last updated: November 2011 Product Overview Cisco IOS Embedded Event Manager (EEM) is a unique subsystem within Cisco IOS Software. EEM is a powerful and flexible

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

OPERATING SYSTEMS. Systems with Multi-programming. CS 3502 Spring Chapter 4

OPERATING SYSTEMS. Systems with Multi-programming. CS 3502 Spring Chapter 4 OPERATING SYSTEMS CS 3502 Spring 2018 Systems with Multi-programming Chapter 4 Multiprogramming - Review An operating system can support several processes in memory. While one process receives service

More information

Response-Time Technology

Response-Time Technology Packeteer Technical White Paper Series Response-Time Technology May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product

More information

Instruction Cycle. Computer-System Architecture. Computer-System Operation. Common Functions of Interrupts. Chapter 2: Computer-System Structures

Instruction Cycle. Computer-System Architecture. Computer-System Operation. Common Functions of Interrupts. Chapter 2: Computer-System Structures Summary Operating Systems evolved through stages Resident monitors Multiprogrammed batch systems Time-shared multiuser systems Desktop systems Specialized operating systems (real-time, handheld, parallel

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Flash: an efficient and portable web server

Flash: an efficient and portable web server Flash: an efficient and portable web server High Level Ideas Server performance has several dimensions Lots of different choices on how to express and effect concurrency in a program Paper argues that

More information

Desktop Central Managing Windows Computers in WAN

Desktop Central Managing Windows Computers in WAN Overview ManageEngine Desktop Central is Web-Based windows desktop administration software that helps administrators to effectively manage the desktops from a central point. It provides Software Deployment,

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

Case Study II: A Web Server

Case Study II: A Web Server Case Study II: A Web Server Prof. Daniel A. Menascé Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html 1 Copyright Notice Most of the figures in this set of slides

More information

ClientVantage Agentless What s New in Release 11.1

ClientVantage Agentless What s New in Release 11.1 ClientVantage Agentless What s New in Release 11.1 Release goals: Extend Vantage support for application and network monitoring. Content: Cisco NAM as the measurement data source for VAS... 1 End-User

More information

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor

More information

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli COMPUTER NETWORKS PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents of the

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Extracting Performance and Scalability Metrics From TCP. Baron Schwartz Postgres Open September 16, 2011

Extracting Performance and Scalability Metrics From TCP. Baron Schwartz Postgres Open September 16, 2011 Extracting Performance and Scalability Metrics From TCP Baron Schwartz Postgres Open September 16, 2011 Consulting Support Training Development For MySQL October 24-25, London /live Agenda Capturing TCP

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA Application Server CPU CPU Core Database Database Instance Entity File Submission Daily

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

A First Look at Traffic on Smartphones

A First Look at Traffic on Smartphones A First Look at Traffic on Smartphones by Falaki et al. Andrew Zafft CS Department Agenda Objective Study Structure Outcomes & Observations Future Work / Citations Conclusions 2 Objective Statistics Why

More information

Introducing Network Delays in a Distributed Real- Time Transaction Processing System

Introducing Network Delays in a Distributed Real- Time Transaction Processing System Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1996 Proceedings Americas Conference on Information Systems (AMCIS) 8-16-1996 Introducing Network Delays in a Distributed Real-

More information

White Paper. Major Performance Tuning Considerations for Weblogic Server

White Paper. Major Performance Tuning Considerations for Weblogic Server White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance

More information

by I.-C. Lin, Dept. CS, NCTU. Textbook: Operating System Concepts 8ed CHAPTER 13: I/O SYSTEMS

by I.-C. Lin, Dept. CS, NCTU. Textbook: Operating System Concepts 8ed CHAPTER 13: I/O SYSTEMS by I.-C. Lin, Dept. CS, NCTU. Textbook: Operating System Concepts 8ed CHAPTER 13: I/O SYSTEMS Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests

More information

Forecasting Oracle Performance

Forecasting Oracle Performance Forecasting Oracle Performance - Better than a Crystal Ball Yuri van Buren Senior Oracle DBA Specialist End-2-End Performance Management Engineer Yuri van Buren 17 Years with Logica which is now part of

More information

Batch Jobs Performance Testing

Batch Jobs Performance Testing Batch Jobs Performance Testing October 20, 2012 Author Rajesh Kurapati Introduction Batch Job A batch job is a scheduled program that runs without user intervention. Corporations use batch jobs to automate

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University

Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University Daniel A. Menascé, Ph. D. Dept. of Computer Science George Mason University menasce@cs.gmu.edu www.cs.gmu.edu/faculty/menasce.html D. Menascé. All Rights Reserved. 1 Benchmark System Under Test (SUT) SPEC

More information

10 Reasons your WAN is Broken

10 Reasons your WAN is Broken Lack of Visibility Most WAN performance problems are driven by underperforming connections or applications. It isn t uncommon to be paying for a 20 Mbps WAN link that performs at 10 Mbps. The root cause

More information

Reliable File Transfer

Reliable File Transfer Due date Wednesday, Mar 14, 11:59pm Reliable File Transfer CS 5565 Spring 2012, Project 2 This project is worth 100 points. You may form teams of up to two students for this project. You are not required

More information

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition

Chapter 6: CPU Scheduling. Operating System Concepts 9 th Edition Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Real-Time

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319 COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents

More information

BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes

BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines. AtHoc SMS Codes BlackBerry AtHoc Networked Crisis Communication Capacity Planning Guidelines AtHoc SMS Codes Version Version 7.5, May 1.0, November 2018 2016 1 Copyright 2010 2018 BlackBerry Limited. All Rights Reserved.

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

Processes. CS 475, Spring 2018 Concurrent & Distributed Systems

Processes. CS 475, Spring 2018 Concurrent & Distributed Systems Processes CS 475, Spring 2018 Concurrent & Distributed Systems Review: Abstractions 2 Review: Concurrency & Parallelism 4 different things: T1 T2 T3 T4 Concurrency: (1 processor) Time T1 T2 T3 T4 T1 T1

More information

Enhancing cloud energy models for optimizing datacenters efficiency.

Enhancing cloud energy models for optimizing datacenters efficiency. Outin, Edouard, et al. "Enhancing cloud energy models for optimizing datacenters efficiency." Cloud and Autonomic Computing (ICCAC), 2015 International Conference on. IEEE, 2015. Reviewed by Cristopher

More information

CPU Scheduling: Objectives

CPU Scheduling: Objectives CPU Scheduling: Objectives CPU scheduling, the basis for multiprogrammed operating systems CPU-scheduling algorithms Evaluation criteria for selecting a CPU-scheduling algorithm for a particular system

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer Systems Monitors (Chapter 7) 1 Monitors That which is monitored improves. Source unknown A monitor is a tool used to observe system Observe

More information

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

Performance Monitoring and SiteScope

Performance Monitoring and SiteScope Performance Monitoring and SiteScope Presented By Rupesh Garg & Naidu, Wipro Technologies. December 11, 2012 1 Abstract Monitoring the web environment refers to test or Check the systems and services in

More information

Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF)

Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF) Enterprise Edition Version 1.9 System Requirements and Technology Overview The Scholastic Achievement Manager (SAM) is the learning management system and technology platform for all Scholastic Enterprise

More information

PfR Voice Traffic Optimization Using Active Probes

PfR Voice Traffic Optimization Using Active Probes PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and

More information

G Robert Grimm New York University

G Robert Grimm New York University G22.3250-001 Receiver Livelock Robert Grimm New York University Altogether Now: The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Motivation

More information

Measuring VDI Fitness and User Experience Technical White Paper

Measuring VDI Fitness and User Experience Technical White Paper Measuring VDI Fitness and User Experience Technical White Paper 3600 Mansell Road Suite 200 Alpharetta, GA 30022 866.914.9665 main 678.397.0339 fax info@liquidwarelabs.com www.liquidwarelabs.com Table

More information

Scalability Engine Guidelines for SolarWinds Orion Products

Scalability Engine Guidelines for SolarWinds Orion Products Scalability Engine Guidelines for SolarWinds Orion Products Last Updated: March 7, 2017 For a PDF of this article, click the PDF icon under the Search bar at the top right of this page. Your Orion Platform

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms

More information

Lies, Damn Lies and Performance Metrics. PRESENTATION TITLE GOES HERE Barry Cooks Virtual Instruments

Lies, Damn Lies and Performance Metrics. PRESENTATION TITLE GOES HERE Barry Cooks Virtual Instruments Lies, Damn Lies and Performance Metrics PRESENTATION TITLE GOES HERE Barry Cooks Virtual Instruments Goal for This Talk Take away a sense of how to make the move from: Improving your mean time to innocence

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

Best Practices for Using the ehealth Discover Process

Best Practices for Using the ehealth Discover Process Best Practices for Using the ehealth Discover Process The ehealth discover process is a powerful tool that locates resources within your infrastructure so that ehealth can report on their performance and

More information

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song.   HUAWEI TECHNOLOGIES Co., Ltd. IQ for DNA Interactive Query for Dynamic Network Analytics Haoyu Song www.huawei.com Motivation Service Provider s pain point Lack of real-time and full visibility of networks, so the network monitoring

More information

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science

More information

Microsoft RemoteFX for Remote Desktop Virtualization Host Capacity Planning Guide for Windows Server 2008 R2 Service Pack 1

Microsoft RemoteFX for Remote Desktop Virtualization Host Capacity Planning Guide for Windows Server 2008 R2 Service Pack 1 Microsoft RemoteFX for Remote Desktop Virtualization Host Capacity Planning Guide for Windows Server 2008 R2 Service Pack 1 Microsoft Corporation Published: March 2011 Abstract Microsoft RemoteFX delivers

More information

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal

More information

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic)

I/O Systems. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic) I/O Systems Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) I/O Systems 1393/9/15 1 / 57 Motivation Amir H. Payberah (Tehran

More information

OPERATING SYSTEM. Chapter 9: Virtual Memory

OPERATING SYSTEM. Chapter 9: Virtual Memory OPERATING SYSTEM Chapter 9: Virtual Memory Chapter 9: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating Kernel Memory

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

VoIP and Network Quality Manager

VoIP and Network Quality Manager GETTING STARTED GUIDE VoIP and Network Quality Manager Version 4.4.1 Last Updated: Wednesday, August 9, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/voip_network_quality_manager_(vnqm)/vnqm_documentation

More information

WhatsUpGold. v14. Getting Started Guide

WhatsUpGold. v14. Getting Started Guide WhatsUpGold v14 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold About WhatsUp Gold Available editions WhatsUp Gold optional plug-ins... 3 CHAPTER 2 Deploying Deploying WhatsUp

More information

Implementing Probes for J2EE Cluster Monitoring

Implementing Probes for J2EE Cluster Monitoring Implementing s for J2EE Cluster Monitoring Emmanuel Cecchet, Hazem Elmeleegy, Oussama Layaida, Vivien Quéma LSR-IMAG Laboratory (CNRS, INPG, UJF) - INRIA INRIA Rhône-Alpes, 655 av. de l Europe, 38334 Saint-Ismier

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

SOFT 437 Quiz #2 February 26, 2015

SOFT 437 Quiz #2 February 26, 2015 SOFT 437 Quiz #2 February 26, 2015 Do not turn this page until the quiz officially begins. STUDENT NUMBER Please do not write your name anywhere on this quiz. I recommend writing your student number at

More information

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli

INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview Basic concepts Characterization of traffic properties that are important to measure

More information

Capacity and Performance Management: Best Practices White Paper

Capacity and Performance Management: Best Practices White Paper Capacity and Performance Management: Best Practices White Paper Contents Introduction Capacity and Performance Management Overview CPU Backplane or I/O Memory Interface and Pipe Sizes Queuing, Latency,

More information

Fit for Purpose Platform Positioning and Performance Architecture

Fit for Purpose Platform Positioning and Performance Architecture Fit for Purpose Platform Positioning and Performance Architecture Joe Temple IBM Monday, February 4, 11AM-12PM Session Number 12927 Insert Custom Session QR if Desired. Fit for Purpose Categorized Workload

More information

Black-box and Gray-box Strategies for Virtual Machine Migration

Black-box and Gray-box Strategies for Virtual Machine Migration Full Review On the paper Black-box and Gray-box Strategies for Virtual Machine Migration (Time required: 7 hours) By Nikhil Ramteke Sr. No. - 07125 1. Introduction Migration is transparent to application

More information

Index. ADEPT (tool for modelling proposed systerns),

Index. ADEPT (tool for modelling proposed systerns), Index A, see Arrivals Abstraction in modelling, 20-22, 217 Accumulated time in system ( w), 42 Accuracy of models, 14, 16, see also Separable models, robustness Active customer (memory constrained system),

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Computer-System Structures

Computer-System Structures Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection Network Structure 2.1 Sana a University, Dr aimen A Modern Computer System 2.2

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used

More information

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing 521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service

More information