Staying Out of the Swamp

Size: px
Start display at page:

Download "Staying Out of the Swamp"

Transcription

1 Staying Out of the Swamp Perforce User Conference 2001 Richard E. Baum

2 Introduction Perforce runs well when given proper resources. CPU requirements are quite small. A server s I/O bandwidth is generally the major performance limitation. A server that is responding poorly may in fact be swamped with requests.

3 What We Will Cover How to tell if your server is swamped Tools you can use to evaluate system performance External factors that cause swamp How Perforce can cause swamp

4 How Do I Tell If I m in the Swamp?

5 How Do I Tell If I m in the Swamp? Check for obvious signs of a problem. Excessive CPU utilization Abnormal memory usage I/O bandwidth problems Use available operating system tools to analyze system status. Standard OS tools provide most of the functionality required.

6 CPU Bottlenecks Check to see if there are any free processor cycles. If there are no free cycles see what is using the CPU time. It may not be perforce. Unix: use ps ef or ps axl Windows: Programs-> Administrative tools-> Performance monitor

7 CPU Bottlenecks See what Perforce process are running Note the parent/child relationships Abbreviated process table output (Unix): chinadoll:reb reb% ps -ef UID PID PPID C STIME TTY TIME CMD perforce :38:39 pts/4 0:00./p4d -p r. perforce :59:25 pts/4 0:33./p4d -p r. perforce :59:41 pts/4 0:09./p4d -p r.

8 Memory Bottlenecks How much RAM is in the system? How much swap space is defined? How much of these is available? Unix: use vmstat,, swap s, dmesg Windows: Use the task manager. (Ctl-Alt-Del)->Task Manager

9 vmstat: Memory Bottlenecks Swap column - free pages of swap Free column - free pages of RAM swap s: How much swap is configured?

10 Memory Bottlenecks Is the system swapping? swap -s output of a Solaris system: chinadoll:reb reb% % swap -s total: 22232k bytes allocated k reserved = 26752k used, k available vmstat output of a Solaris system: chinadoll:reb reb% vmstat 3 procs memory page disk faults cpu r b w swap free re mf pi po fr de sr dd dd f0 s0 in sy cs us sy id

11 Memory Bottlenecks How much memory is in the system? Partial dmesg output of a Solaris system: Sep 9 21:45:42 chinadoll unix: : [ID kern.info] mem = K (0x ) Sep 9 21:45:42 chinadoll unix: : [ID kern.info] avail mem =

12 What We Know About the System System has 640MB of RAM (655360kb) Between kb and kb of free memory. Percentage of user, system, and idle CPU time during vmstat run Use OS tools to establish a baseline of what normal values are.

13 Detecting Problems on Unix vmstat output of a Solaris system that is swapping: procs memory page disk faults cpu r b w swap free re mf pi po fr de sr s1 s2 s3 in sy cs us sy id

14 Detecting Problems on Unix Over 100mb of swap space in use CPU utilization peaks when system starts to swap, with zero idle cycles CPU utilization lower later, when paging memory in/out

15 Windows Task Manager Performance screen is most useful overall. Beware of deceptive information! CPU utilization is displayed as a percentage of total.

16 Windows Task Manager 256mb (262000kb) RAM Windows shows RAM + swap As total RAM kb in use This system is swapping!

17 Windows Task Manager Perforce server is using 11% of CPU Under 2mb of RAM

18 I/O Problems Perforce can only move data as fast as the slowest point in the data path Two main areas for problems: Disk Network

19 I/O Problems Disk access: Fast SCSI drives can transfer 45mb/sec RAID arrays can increase performance Multiple conflicting requests Disk errors

20 I/O Problems vmstat shows number of disk operations per second vmstat output of a Solaris system that is swapping: procs memory page disk faults cpu r b w swap free re mf pi po fr de sr s1 s2 s3 in sy cs us sy id

21 I/O Problems For more I/O detail try iostat Network: Network is not as fast as you think (10mb/100mb/1gb) Use of a hub on 100mb network (half duplex) Single network interface Same interface for NAS and users Physical problem (loose cable)

22 I/O Problems Network problems netstat output during large file transfer. netstat output of a Solaris system: chinadoll:reb reb% netstat -i -I le0 3 input le0 output input (Total) output packets errs packets errs colls packets errs packets errs colls

23 Windows Performance Monitor Allows monitoring of almost any part of the system. Monitor performance as it relates to: A particular process A particular thread The whole system

24 Windows Performance Monitor Example A Perforce operation that submitted a large binary file to the depot A scripted Perforce operation that performed many small submit operations. From the chart we can see that the network traffic is off the scale during the large submit. During the numerous small operations, the perforce process itself is performing much more work.

25 Windows Performance Monitor Number of bytes/sec processed by p4s Example Number of bytes written to/from the disk/sec Number of bytes/sec handled by the network card.

26 How Can Perforce Cause Server Swamp? There are many reasons your system can become overwhelmed Not all of these have to do with Perforce Your system may be used for other tasks as well.

27 Network Attached Storage Can allow faster disk access if properly configured Involves more complex configuration than local drives Opens additional areas for configuration problems

28 NAS Performance Issues Permission/locking problems NT service local user network access changed permissions Locking across the network can be slow Network topology problems Lack of adequate NAS server bandwidth Saturated network Improperly configured connection

29 Confusing / Complex Client Maps Confusing client maps may generate unexpected results. Perforce tries to do what you ve asked. In general, the last mapping wins. //depot1/... //client_name/... //depot2/... //client_name/subpath/...

30 Confusing / Complex Client Maps Client mappings do not use much memory unless multiple wildcards are used. Such views cause the server to do a lot of extra work mapping all combinations. //depot/.../subdir/... //client_name/.../subdir/...

31 Confusing / Complex Client Maps Mappings without a 1-to-1 relationship between client and server can be confusing. They can, given the proper conditions, also be harmful to Perforce servers.

32 Confusing / Complex Client Maps Example: With a new server create a new client with a default view and submit this file: //depot/subdir subdir/file Change the client view to this: //depot/... //client/... //depot/subdir/... //client/a/subdirectory/...

33 Confusing / Complex Client Maps Example: This command will then cause pre servers enter an infinite loop: p4 dirs //client/* displays this message instead: Operation: user-dirs Operation 'user-dirs' failed. Client map too twisted for directory list.

34 Confusing / Complex Client Maps Perforce can not check your client specifications for confusing, complex, or ambiguous mappings. You must do so by hand.

35 Confusing / Complex Client Maps Some ways to address these issues: Upgrade your server to release Use the server debug flags. Carefully analyze each client specification in your system. Educate your users.

36 Background Processes Other processes can consume resources even on dedicated Perforce servers. Backup utilities Virus scanners Don t run these on db.* metadata files!

37 Backup Utilities Saturate disk and/or network access Compression uses a lot of CPU time Lock db.* which causes server to fail or Can back up inconsistent metadata files.

38 Virus Scanners Can cause problems even when not run on depot metadata. Many sites require scanning of versioned file tree. Monitor CPU utilization.

39 The Perforce Error Log The default error log messages help determine that client connections have failed. Default messages do not show what clients were doing or which clients had problems. Perforce server error: Date 2001/08/27 11:17:32: TCP send failed. write: socket: WSAECONNRESET

40 The Perforce Error Log The server flag server=1 adds: Date and time Process ID of the server process Perforce user ID Client specification name IP address of the client The operation that the client invoked

41 The Perforce Error Log Sample output with server=1 set: Perforce server info: 2001/08/26 16:20:16 pid 'user-opened' Perforce server info: 2001/08/26 16:20:16 pid 'user-resolve -n' Perforce server info: 2001/08/26 16:20:16 pid 'user-resolved'

42 The Perforce Error Log server flag server=2 adds an additional completed message: Perforce server info: 2001/08/26 16:50:16 pid 'user-changes -l -s submitted' Perforce server info: 2001/08/26 16:50:16 pid 1460 completed Perforce server info: 2001/08/26 16:50:25 pid 'user-dirs -C -D //depot/*' Perforce server info: 2001/08/26 16:50:58 pid 'user-files //...' Perforce server info: 2001/08/26 16:51:10 pid 'user-verify //...' Perforce server error: Date 2001/08/26 16:52:34: TCP send failed. write: socket: WSAECONNRESET Can't invoke remote operation 'client-outputdata'. TCP send failed. write: socket: WSAECONNRESET Perforce server info: 2001/08/26 16:58:36 pid 1500 completed

43 The Perforce Error Log Some errors point directly at server problems. Librarian errors indicate that the server can not read/write the versioned file tree. Perforce server error: Date 2001/08/27 08:52:55: Operation: lbr-submitfile Operation 'lbr-submitfile' failed. Librarian checkin depot/file.txt failed. lock on depot/file.txt,v failed open for write: depot/,file.txt,: Access is denied.

44 Gigantic Operations User requests may seem innocuous but have large costs of execution. Cause disk, RAM, I/O strain Block other operations

45 Gigantic Operations Example: p4 submit Sends data to the server. Data is stored in a temporary location. Once data is on server, compute phase begins and appropriate locks are taken. Submit writes to number of tables. During write, a lock will block access to other operations that access these tables.

46 Gigantic Operations Imprecise operations with wildcards can use a lot of resources. Example: p4 files //depot/ /file.txt Causes a full table scan of db.rev Locks other users out of operations using db.rev while this occurs.

47 Gigantic Operations Most large operations can be prevented from overwhelming your server with maxresults. Set on group level. Restricts the maximum number of results returned by a query. Queries have interim steps.

48 Gigantic Operations Requests triggering maxresults show: Request too large (over 10000); see 'p4 help maxresults'. Large operations can usually be easily broken up into smaller ones: p4 sync //depot/... Becomes: p4 sync //depot/dir1/... p4 sync //depot/dir2/... p4 sync //depot/dir3/...

49 Gigantic Operations Use of p4 verify is quite CPU intensive. Checks/generates MD5 checksum of each revision of each file. Degrades performance.

50 Conclusions Perforce runs well when given proper resources Generate a baseline you can use evaluating server performance Use available tools Educate users Call support!

Performance and Database Locking at Large Perforce Sites

Performance and Database Locking at Large Perforce Sites Performance and Database Locking at Large Perforce Sites Dan Bloch Sep. 19, 2006 Google Google's mission: Organize the world's information and make it universally accessible and useful. The world's premier

More information

Performance Analysis

Performance Analysis Performance Analysis Help! My system is slow! http://people.freebsd.org/~kris/scaling/help_my_system_is_ slow.pdf What you can do to improve performance Memory size has a major influence on performance

More information

Better Living Through New Releases

Better Living Through New Releases Better Living Through New Releases by Richard E. Baum Overview Server performance-related functionality Upgrades contain much more than bug fixes This is a high level view Close to chronological order

More information

Life on the Edge: Monitoring and Running A Very Large Perforce Installation

Life on the Edge: Monitoring and Running A Very Large Perforce Installation Life on the Edge: Monitoring and Running A Very Large Perforce Installation Dan Bloch May 10, 2007 Google Google's mission: Organize the world's information and make it universally accessible and useful.

More information

Managing the Analyzer

Managing the Analyzer CHAPTER 4 This chapter, which provides information about managing the Analyzer, contains the following sections: Accessing NetFlow Data Files Explains why data stored on nonlocal file systems can be inaccessible

More information

Help! My system is slow!, meetbsd, 2008, Kris Kennaway

Help! My system is slow!, meetbsd, 2008, Kris Kennaway Performance is a meaningless concept in isolation It only makes sense to talk about performance of a particular workload, and according to a particular set of metrics The first step is to characterize

More information

Perforce Tunables. Michael Shields Performance Lab Manager Perforce Software. March, Abstract

Perforce Tunables. Michael Shields Performance Lab Manager Perforce Software. March, Abstract Perforce Tunables Michael Shields Performance Lab Manager Perforce Software March, 2010 Abstract Tunables have been available in Perforce since the 2008.2 release. With help from Perforce, tunables can

More information

The former pager tasks have been replaced in 7.9 by the special savepoint tasks.

The former pager tasks have been replaced in 7.9 by the special savepoint tasks. 1 2 3 4 With version 7.7 the I/O interface to the operating system has been reimplemented. As of version 7.7 different parameters than in version 7.6 are used. The improved I/O system has the following

More information

Sistemi in Tempo Reale

Sistemi in Tempo Reale Laurea Specialistica in Ingegneria dell'automazione Sistemi in Tempo Reale Giuseppe Lipari Introduzione alla concorrenza Fundamentals Algorithm: It is the logical procedure to solve a certain problem It

More information

Still All on One Server: Perforce at Scale

Still All on One Server: Perforce at Scale Still All on One Server: Perforce at Scale Dan Bloch Senior Site Reliability Engineer Google Inc. June 3, 2011 GOOGLE Google's mission: Organize the world's information and make it universally accessible

More information

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017 ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 The Operating System (OS) Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke)

More information

Perforce Performance. Michael Shields Performance Lab Manager Perforce Software

Perforce Performance. Michael Shields Performance Lab Manager Perforce Software Perforce Performance Michael Shields Performance Lab Manager Perforce Software (in the spirit of www.snopes.com) www.snopes.com Research validity of outrageous claims for those emails that "just don't

More information

Performance Tuning. Chapter 25

Performance Tuning. Chapter 25 Chapter 25 Performance Tuning This chapter covers the following topics: Overview, 618 Identifying the Performance Bottleneck, 619 Optimizing the Target Database, 624 Optimizing the Source Database, 627

More information

OpenEdge 12.0 Database Performance and Server Side Joins. Richard Banville Fellow, OpenEdge Development October 12, 2018

OpenEdge 12.0 Database Performance and Server Side Joins. Richard Banville Fellow, OpenEdge Development October 12, 2018 OpenEdge 12.0 Database Performance and Server Side Joins Richard Banville Fellow, OpenEdge Development October 12, 2018 Data Access Performance Enhancements Increasing overall throughput Provide more concurrency

More information

Distributed File Systems Part II. Distributed File System Implementation

Distributed File Systems Part II. Distributed File System Implementation s Part II Daniel A. Menascé Implementation File Usage Patterns File System Structure Caching Replication Example: NFS 1 Implementation: File Usage Patterns Static Measurements: - distribution of file size,

More information

Introduction to Process in Computing Systems SEEM

Introduction to Process in Computing Systems SEEM Introduction to Process in Computing Systems SEEM 3460 1 Programs and Processes One way to describe the hardware of a computer system is to say that it provides a framework for executing programs and storing

More information

2

2 1 2 3 4 5 All resources: how fast, how many? If all the CPUs are pegged, that s as fast as you can go. CPUs have followed Moore s law, the rest of the system hasn t. Not everything can be made threaded,

More information

Tivoli Storage Manager Technical Exchange. Performance Diagnosis. Dave Daun, IBM Advanced Technical Support, IBM Software Group

Tivoli Storage Manager Technical Exchange. Performance Diagnosis. Dave Daun, IBM Advanced Technical Support, IBM Software Group IBM Software Group Tivoli Storage Manager Technical Exchange Performance Diagnosis Dave Daun, IBM Advanced Technical Support, djdaun@us.ibm.com November, 2003 Advanced Technical Support Agenda Performance

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Parallels Virtuozzo Containers for Windows Capacity and Scaling www.parallels.com Version 1.0 Table of Contents Introduction... 3 Resources and bottlenecks...

More information

Performance issues in Cerm What to check first?

Performance issues in Cerm What to check first? Performance issues in Cerm What to check first? The Cerm software is built as a client server model. This means the client and the server need the correct specifications, but also the network in between

More information

Estimate performance and capacity requirements for InfoPath Forms Services 2010

Estimate performance and capacity requirements for InfoPath Forms Services 2010 Estimate performance and capacity requirements for InfoPath Forms Services 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site

More information

System recommendations for version 17.1

System recommendations for version 17.1 System recommendations for version 17.1 This article contains information about recommended hardware resources and network environments for version 17.1 of Sage 300 Construction and Real Estate. NOTE:

More information

Voldemort. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation

Voldemort. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation Voldemort Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/29 Outline 1 2 3 Smruti R. Sarangi Leader Election 2/29 Data

More information

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM CPSC 457 OPERATING SYSTEMS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 9, 2010 This is a CLOSED BOOK exam. Textbooks, notes, laptops, calculators,

More information

A Scalable Event Dispatching Library for Linux Network Servers

A Scalable Event Dispatching Library for Linux Network Servers A Scalable Event Dispatching Library for Linux Network Servers Hao-Ran Liu and Tien-Fu Chen Dept. of CSIE National Chung Cheng University Traditional server: Multiple Process (MP) server A dedicated process

More information

Final Examination CS 111, Fall 2016 UCLA. Name:

Final Examination CS 111, Fall 2016 UCLA. Name: Final Examination CS 111, Fall 2016 UCLA Name: This is an open book, open note test. You may use electronic devices to take the test, but may not access the network during the test. You have three hours

More information

Part 2 (Disk Pane, Network Pane, Process Details & Troubleshooting)

Part 2 (Disk Pane, Network Pane, Process Details & Troubleshooting) Note: This discussion is based on MacOS, 10.12.5 (Sierra). Some illustrations may differ when using other versions of macos or OS X. Credits: See the list at the end of this presentation Part 2 (Disk Pane,

More information

Unix Processes. What is a Process?

Unix Processes. What is a Process? Unix Processes Process -- program in execution shell spawns a process for each command and terminates it when the command completes Many processes all multiplexed to a single processor (or a small number

More information

ENGR 3950U / CSCI 3020U Midterm Exam SOLUTIONS, Fall 2012 SOLUTIONS

ENGR 3950U / CSCI 3020U Midterm Exam SOLUTIONS, Fall 2012 SOLUTIONS SOLUTIONS ENGR 3950U / CSCI 3020U (Operating Systems) Midterm Exam October 23, 2012, Duration: 80 Minutes (10 pages, 12 questions, 100 Marks) Instructor: Dr. Kamran Sartipi Question 1 (Computer Systgem)

More information

Lesson 1: Using Task Manager

Lesson 1: Using Task Manager 19-2 Chapter 19 Monitoring and Optimizing System Performance Lesson 1: Using Task Manager Task Manager provides information about the programs and processes running on your computer and the performance

More information

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 23

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 23 CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 205 Lecture 23 LAST TIME: VIRTUAL MEMORY! Began to focus on how to virtualize memory! Instead of directly addressing physical memory, introduce a level of

More information

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents File Server Comparison: Microsoft Windows NT Server 4.0 and Novell NetWare 5 Contents Executive Summary Updated: October 7, 1998 (PDF version 240 KB) Executive Summary Performance Analysis Price/Performance

More information

-Device. -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, device)

-Device. -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, device) Devices -Host -CPU -Device -Controller device) +memory +OS -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, Communication -Registers -Control

More information

COSC 6385 Computer Architecture. Storage Systems

COSC 6385 Computer Architecture. Storage Systems COSC 6385 Computer Architecture Storage Systems Spring 2012 I/O problem Current processor performance: e.g. Pentium 4 3 GHz ~ 6GFLOPS Memory Bandwidth: 133 MHz * 4 * 64Bit ~ 4.26 GB/s Current network performance:

More information

Notices Carbonite Availability for Linux User's Guide Version 8.1.1, Thursday, April 5, 2018 If you need technical assistance, you can contact

Notices Carbonite Availability for Linux User's Guide Version 8.1.1, Thursday, April 5, 2018 If you need technical assistance, you can contact Notices Carbonite Availability for Linux User's Guide Version 8.1.1, Thursday, April 5, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online

More information

DupScout DUPLICATE FILES FINDER

DupScout DUPLICATE FILES FINDER DupScout DUPLICATE FILES FINDER User Manual Version 10.3 Dec 2017 www.dupscout.com info@flexense.com 1 1 Product Overview...3 2 DupScout Product Versions...7 3 Using Desktop Product Versions...8 3.1 Product

More information

Operating Systems, Unix Files and Commands SEEM

Operating Systems, Unix Files and Commands SEEM Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs

More information

Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition. Eugene Gonzalez Support Enablement Manager, Informatica

Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition. Eugene Gonzalez Support Enablement Manager, Informatica Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition Eugene Gonzalez Support Enablement Manager, Informatica 1 Agenda Troubleshooting PowerCenter issues require a

More information

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24 FILE SYSTEMS, PART 2 CS124 Operating Systems Fall 2017-2018, Lecture 24 2 Last Time: File Systems Introduced the concept of file systems Explored several ways of managing the contents of files Contiguous

More information

Version Double-Take Availability for Linux User's Guide

Version Double-Take Availability for Linux User's Guide Version 8.0.0 Double-Take Availability for Linux User's Guide Notices Double-Take Availability for Linux User's Guide Version 8.0, Check your service agreement to determine which updates and new releases

More information

Binghamton University. CS-220 Spring Sharing Resources. Computer Systems Chapter 8.2, 8.4

Binghamton University. CS-220 Spring Sharing Resources. Computer Systems Chapter 8.2, 8.4 Sharing Resources Computer Systems Chapter 8.2, 8.4 Abstract View When I run my program, it has access to the entire computer, including the processor, memory, keyboard, display, disk drives, network connections,

More information

CIT 470: Advanced Network and System Administration. Topics. What is performance testing? Performance Monitoring

CIT 470: Advanced Network and System Administration. Topics. What is performance testing? Performance Monitoring CIT 470: Advanced Network and System Administration Performance Monitoring CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Performance testing 2. Performance tuning. 3. CPU 4. Memory

More information

IBM V7000 Unified R1.4.2 Asynchronous Replication Performance Reference Guide

IBM V7000 Unified R1.4.2 Asynchronous Replication Performance Reference Guide V7 Unified Asynchronous Replication Performance Reference Guide IBM V7 Unified R1.4.2 Asynchronous Replication Performance Reference Guide Document Version 1. SONAS / V7 Unified Asynchronous Replication

More information

Monitoring and Trouble Shooting on BioHPC

Monitoring and Trouble Shooting on BioHPC Monitoring and Trouble Shooting on BioHPC [web] [email] portal.biohpc.swmed.edu biohpc-help@utsouthwestern.edu 1 Updated for 2017-03-15 Why Monitoring & Troubleshooting data code Monitoring jobs running

More information

Forget IOPS: A Proper Way to Characterize & Test Storage Performance Peter Murray SwiftTest

Forget IOPS: A Proper Way to Characterize & Test Storage Performance Peter Murray SwiftTest Forget IOPS: A Proper Way to Characterize & Test Storage Performance Peter Murray peter@swifttest.com SwiftTest Storage Performance Validation Rely on vendor IOPS claims Test in production and pray Validate

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

Process States. Controlling processes. Process states. PID and PPID UID and EUID GID and EGID Niceness Control terminal. Runnable. Sleeping.

Process States. Controlling processes. Process states. PID and PPID UID and EUID GID and EGID Niceness Control terminal. Runnable. Sleeping. Controlling processes PID and PPID UID and EUID GID and EGID Niceness Control terminal 1 Process States Process states Runnable The process can be executed Waiting for CPU Sleeping The process is waiting

More information

Lesson 2: Using the Performance Console

Lesson 2: Using the Performance Console Lesson 2 Lesson 2: Using the Performance Console Using the Performance Console 19-13 Windows XP Professional provides two tools for monitoring resource usage: the System Monitor snap-in and the Performance

More information

Quest Central for DB2

Quest Central for DB2 Quest Central for DB2 INTEGRATED DATABASE MANAGEMENT TOOLS Supports DB2 running on Windows, Unix, OS/2, OS/390 and z/os Integrated database management components are designed for superior functionality

More information

Installing Prime Optical

Installing Prime Optical 5 CHAPTER This section describes how to install Cisco Prime Optical 9.8 with an Oracle 11g database. To ensure a successful installation, use the checklist provided in the Installation Scenarios and Checklists,

More information

Overcoming Obstacles to Petabyte Archives

Overcoming Obstacles to Petabyte Archives Overcoming Obstacles to Petabyte Archives Mike Holland Grau Data Storage, Inc. 609 S. Taylor Ave., Unit E, Louisville CO 80027-3091 Phone: +1-303-664-0060 FAX: +1-303-664-1680 E-mail: Mike@GrauData.com

More information

COMP 3361: Operating Systems 1 Final Exam Winter 2009

COMP 3361: Operating Systems 1 Final Exam Winter 2009 COMP 3361: Operating Systems 1 Final Exam Winter 2009 Name: Instructions This is an open book exam. The exam is worth 100 points, and each question indicates how many points it is worth. Read the exam

More information

SysGauge SYSTEM MONITOR. User Manual. Version 3.8. Oct Flexense Ltd.

SysGauge SYSTEM MONITOR. User Manual. Version 3.8. Oct Flexense Ltd. SysGauge SYSTEM MONITOR User Manual Version 3.8 Oct 2017 www.sysgauge.com info@flexense.com 1 1 SysGauge Product Overview SysGauge is a system and performance monitoring utility allowing one to monitor

More information

Operating Systems. Operating Systems Professor Sina Meraji U of T

Operating Systems. Operating Systems Professor Sina Meraji U of T Operating Systems Operating Systems Professor Sina Meraji U of T How are file systems implemented? File system implementation Files and directories live on secondary storage Anything outside of primary

More information

PROCESS VIRTUAL MEMORY PART 2. CS124 Operating Systems Winter , Lecture 19

PROCESS VIRTUAL MEMORY PART 2. CS124 Operating Systems Winter , Lecture 19 PROCESS VIRTUAL MEMORY PART 2 CS24 Operating Systems Winter 25-26, Lecture 9 2 Virtual Memory Abstraction Last time, officially introduced concept of virtual memory Programs use virtual addresses to refer

More information

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2018 Lecture 23

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2018 Lecture 23 CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 208 Lecture 23 LAST TIME: VIRTUAL MEMORY Began to focus on how to virtualize memory Instead of directly addressing physical memory, introduce a level of indirection

More information

! Design constraints. " Component failures are the norm. " Files are huge by traditional standards. ! POSIX-like

! Design constraints.  Component failures are the norm.  Files are huge by traditional standards. ! POSIX-like Cloud background Google File System! Warehouse scale systems " 10K-100K nodes " 50MW (1 MW = 1,000 houses) " Power efficient! Located near cheap power! Passive cooling! Power Usage Effectiveness = Total

More information

Virtual Memory #2 Feb. 21, 2018

Virtual Memory #2 Feb. 21, 2018 15-410...The mysterious TLB... Virtual Memory #2 Feb. 21, 2018 Dave Eckhardt Brian Railing 1 L16_VM2 Last Time Mapping problem: logical vs. physical addresses Contiguous memory mapping (base, limit) Swapping

More information

NetVault Backup Client and Server Sizing Guide 3.0

NetVault Backup Client and Server Sizing Guide 3.0 NetVault Backup Client and Server Sizing Guide 3.0 Recommended hardware and storage configurations for NetVault Backup 12.x September 2018 Page 1 Table of Contents 1. Abstract... 3 2. Introduction... 3

More information

Practical 5. Linux Commands: Working with Files

Practical 5. Linux Commands: Working with Files Practical 5 Linux Commands: Working with Files 1. Ps The ps command on linux is one of the most basic commands for viewing the processes running on the system. It provides a snapshot of the current processes

More information

Monitoring NT Performance

Monitoring NT Performance Monitoring NT Performance Jerry L. Rosenberg SRM Associates, Ltd. CMG 2002 e-mail: Jerry@SRMAssoc.com http://www.srmassoc.com Capacity and Performance Performance tuning Identify bottlenecks and take immediate

More information

Computer Organization and Structure. Bing-Yu Chen National Taiwan University

Computer Organization and Structure. Bing-Yu Chen National Taiwan University Computer Organization and Structure Bing-Yu Chen National Taiwan University Storage and Other I/O Topics I/O Performance Measures Types and Characteristics of I/O Devices Buses Interfacing I/O Devices

More information

rsync link-dest Local, rotated, quick and useful backups!

rsync link-dest Local, rotated, quick and useful backups! rsync link-dest Local, rotated, quick and useful backups! Scope No complete scripts will be presented Just enough so that a competent scripter will be able to build what they need Unixes used: OpenBSD,

More information

Lab 2: Threads and Processes

Lab 2: Threads and Processes CS333: Operating Systems Lab Lab 2: Threads and Processes Goal The goal of this lab is to get you comfortable with writing basic multi-process / multi-threaded applications, and understanding their performance.

More information

Lecture 08: When disaster strikes and all else fails

Lecture 08: When disaster strikes and all else fails Lecture 08: When disaster strikes and all else fails Hands-on Unix system administration DeCal 2012-10-22 1 / 27 Projects groups of four people submit one form per group with proposed project ideas and

More information

Introduction to parallel Computing

Introduction to parallel Computing Introduction to parallel Computing VI-SEEM Training Paschalis Paschalis Korosoglou Korosoglou (pkoro@.gr) (pkoro@.gr) Outline Serial vs Parallel programming Hardware trends Why HPC matters HPC Concepts

More information

CS 537 Fall 2017 Review Session

CS 537 Fall 2017 Review Session CS 537 Fall 2017 Review Session Deadlock Conditions for deadlock: Hold and wait No preemption Circular wait Mutual exclusion QUESTION: Fix code List_insert(struct list * head, struc node * node List_move(struct

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

Distributed Filesystem

Distributed Filesystem Distributed Filesystem 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributing Code! Don t move data to workers move workers to the data! - Store data on the local disks of nodes in the

More information

Improving Perforce Performance At Research In Motion (RIM)

Improving Perforce Performance At Research In Motion (RIM) Improving Perforce Performance At Research In Motion (RIM) Perforce User Conference il 2008 Tim Barrett 1 Agenda RIM s Environment RIM s Perforce performance problems Project approach and major initiatives

More information

Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc.

Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc. An Operating System (OS) is an interface between computer user and computer hardware. An operating system is software which performs all the basic tasks like file management, memory management, process

More information

Storage. Hwansoo Han

Storage. Hwansoo Han Storage Hwansoo Han I/O Devices I/O devices can be characterized by Behavior: input, out, storage Partner: human or machine Data rate: bytes/sec, transfers/sec I/O bus connections 2 I/O System Characteristics

More information

Unix Tools and Scripts to Monitor Informix IDS

Unix Tools and Scripts to Monitor Informix IDS Unix Tools and Scripts to Monitor Informix IDS Lester Knutsen Advanced DataTools Corporation Background Lester Knutsen has been developing database applications with Informix databases since 1983. He is

More information

Section 9: Cache, Clock Algorithm, Banker s Algorithm and Demand Paging

Section 9: Cache, Clock Algorithm, Banker s Algorithm and Demand Paging Section 9: Cache, Clock Algorithm, Banker s Algorithm and Demand Paging CS162 March 16, 2018 Contents 1 Vocabulary 2 2 Problems 3 2.1 Caching.............................................. 3 2.2 Clock Algorithm.........................................

More information

BASIC OPERATIONS. Managing System Resources

BASIC OPERATIONS. Managing System Resources 48 PART 2 BASIC OPERATIONS C H A P T E R 5 Managing System Resources CHAPTER 5 MANAGING SYSTEM RESOURCES 49 THE part of Windows Vista that you see the Vista desktop is just part of the operating system.

More information

CS2506 Quick Revision

CS2506 Quick Revision CS2506 Quick Revision OS Structure / Layer Kernel Structure Enter Kernel / Trap Instruction Classification of OS Process Definition Process Context Operations Process Management Child Process Thread Process

More information

Repository Structure Considerations for Performance

Repository Structure Considerations for Performance Repository Structure Considerations for Performance Perforce Software Performance Lab Michael Shields, Manager Tim Brazil, Engineer Introduction Two of many repository structure decisions path length placement

More information

Chapter 11: File System Implementation. Objectives

Chapter 11: File System Implementation. Objectives Chapter 11: File System Implementation Objectives To describe the details of implementing local file systems and directory structures To describe the implementation of remote file systems To discuss block

More information

Monitoring Agent for Unix OS Version Reference IBM

Monitoring Agent for Unix OS Version Reference IBM Monitoring Agent for Unix OS Version 6.3.5 Reference IBM Monitoring Agent for Unix OS Version 6.3.5 Reference IBM Note Before using this information and the product it supports, read the information in

More information

CIS Operating Systems Memory Management Address Translation for Paging. Professor Qiang Zeng Spring 2018

CIS Operating Systems Memory Management Address Translation for Paging. Professor Qiang Zeng Spring 2018 CIS 3207 - Operating Systems Memory Management Address Translation for Paging Professor Qiang Zeng Spring 2018 Previous class What is logical address? Who use it? Describes a location in the logical memory

More information

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE RAID SEMINAR REPORT 2004 Submitted on: Submitted by: 24/09/2004 Asha.P.M NO: 612 S7 ECE CONTENTS 1. Introduction 1 2. The array and RAID controller concept 2 2.1. Mirroring 3 2.2. Parity 5 2.3. Error correcting

More information

GFS: The Google File System

GFS: The Google File System GFS: The Google File System Brad Karp UCL Computer Science CS GZ03 / M030 24 th October 2014 Motivating Application: Google Crawl the whole web Store it all on one big disk Process users searches on one

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Synchronization Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

Let s Tune Oracle8 for NT

Let s Tune Oracle8 for NT Let s Tune Oracle8 for NT ECO March 20, 2000 Marlene Theriault Cahill Agenda Scope A Look at the Windows NT system About Oracle Services The NT Registry About CPUs, Memory, and Disks Configuring NT as

More information

Section 1: Tools. Contents CS162. January 19, Make More details about Make Git Commands to know... 3

Section 1: Tools. Contents CS162. January 19, Make More details about Make Git Commands to know... 3 CS162 January 19, 2017 Contents 1 Make 2 1.1 More details about Make.................................... 2 2 Git 3 2.1 Commands to know....................................... 3 3 GDB: The GNU Debugger

More information

CS 3733 Operating Systems:

CS 3733 Operating Systems: CS 3733 Operating Systems: Topics: Memory Management (SGG, Chapter 08) Instructor: Dr Dakai Zhu Department of Computer Science @ UTSA 1 Reminders Assignment 2: extended to Monday (March 5th) midnight:

More information

NetVault Backup Client and Server Sizing Guide 2.1

NetVault Backup Client and Server Sizing Guide 2.1 NetVault Backup Client and Server Sizing Guide 2.1 Recommended hardware and storage configurations for NetVault Backup 10.x and 11.x September, 2017 Page 1 Table of Contents 1. Abstract... 3 2. Introduction...

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 11: File System Implementation Prof. Alan Mislove (amislove@ccs.neu.edu) File-System Structure File structure Logical storage unit Collection

More information

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0; How will execution time grow with SIZE? int array[size]; int A = ; for (int i = ; i < ; i++) { for (int j = ; j < SIZE ; j++) { A += array[j]; } TIME } Plot SIZE Actual Data 45 4 5 5 Series 5 5 4 6 8 Memory

More information

CS-537: Midterm Exam (Spring 2009) The Future of Processors, Operating Systems, and You

CS-537: Midterm Exam (Spring 2009) The Future of Processors, Operating Systems, and You CS-537: Midterm Exam (Spring 2009) The Future of Processors, Operating Systems, and You Please Read All Questions Carefully! There are 15 total numbered pages. Please put your NAME and student ID on THIS

More information

Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0

Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0 White Paper Key Performance Metrics Exposed in EdgeSight for XenApp 5.0 and EdgeSight for Endpoints 5.0 EdgeSight Archtectural Overview EdgeSight for XenApp is implemented as an agent based solution for

More information

Unity 1.0 Troubleshooting Guide

Unity 1.0 Troubleshooting Guide Unity 1.0 Troubleshooting Guide Troubleshooting Utilities MediaNet Analyzer Version 1.0 runs only on the Macintosh and does not ship with Unity 1.0. It is available on the Knowledge Center Website. It

More information

Chapter 8. Virtual Memory

Chapter 8. Virtual Memory Operating System Chapter 8. Virtual Memory Lynn Choi School of Electrical Engineering Motivated by Memory Hierarchy Principles of Locality Speed vs. size vs. cost tradeoff Locality principle Spatial Locality:

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

Input/Output. Today. Next. Principles of I/O hardware & software I/O software layers Disks. Protection & Security

Input/Output. Today. Next. Principles of I/O hardware & software I/O software layers Disks. Protection & Security Input/Output Today Principles of I/O hardware & software I/O software layers Disks Next Protection & Security Operating Systems and I/O Two key operating system goals Control I/O devices Provide a simple,

More information

Voxco Command Center, Voxco Online, and Voxco Dialer - Technical specifications & Recommendations

Voxco Command Center, Voxco Online, and Voxco Dialer - Technical specifications & Recommendations Voxco Command Center, Voxco Online, and Voxco Dialer - Technical specifications & Recommendations Recommended server specification: Specification for SQL server The SQL server is used to provide shared

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

Modern RAID Technology. RAID Primer A Configuration Guide

Modern RAID Technology. RAID Primer A Configuration Guide Modern RAID Technology RAID Primer A Configuration Guide E x c e l l e n c e i n C o n t r o l l e r s Modern RAID Technology RAID Primer A Configuration Guide 6th Edition Copyright 1997-2003 ICP vortex

More information

Ch. 13: Measuring Performance

Ch. 13: Measuring Performance Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction

More information

Jyotheswar Kuricheti

Jyotheswar Kuricheti Jyotheswar Kuricheti 1 Agenda: 1. Performance Tuning Overview 2. Identify Bottlenecks 3. Optimizing at different levels : Target Source Mapping Session System 2 3 Performance Tuning Overview: 4 What is

More information