Web Serving Architectures

Size: px
Start display at page:

Download "Web Serving Architectures"

Transcription

1 Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited

2 Contents Defining the Problem e-business Solutions e-business Architectures Scaling Techniques How do we scale e-business Solutions?

3 Defining the Problem without the express written consent of the IBM Corporation is prohibited

4 Definitions Performance How long does it take to get a response to a request from the system Capacity How many transactions can a system completed in a specified unitoftime. Scalability The capability of a system to adapt readily to a greater or lesser intensity of use, volume, or demand while still meeting its business objectives (acceptable levels of performance, availability, manageability etc.)

5 Scalability, Performance and Capacity A truly scalable architecture will allow an IT System to provide an acceptable level of performance under increased loads Original Performance Curve Improved Performance Curve Response Time Acceptable Response Time Number of Operations Current Load Scaling Target

6 Resource Utilization vs.load A scalable architecture will allow an IT System to have performance characteristics like the blue or green line Resource Utilization Utilization increases faster than the load - Typical Utilization increase linearly with load - Good Situation Ideal - Gracefully degrade as load increases.seldom happens Bad situation - Think it's OK until load increases. Poor design Load

7 e-business Solutions without the express written consent of the IBM Corporation is prohibited

8 e-business Solutions e-business solutions allow an organization to leverage Network Computing technologies to re-engineer business processes, enhance communications and lower organizational boundaries with their customers and shareholders (across the Internet), employees and stakeholders (across the corporate Intranet) and its vendors, suppliers and partners (across its Extranet). While providing many benefits, these solutions present many unique challenges. This includes: since these solutions reach beyond the enterprise to users across the public Internet any failures or poor performance results in bad publicity for the organization require a higher amount of security than applications that existed within an enterprise have usage patterns, transaction volumes and transaction volume swings that cannot be predicted accurately.

9 Workload Characteristics To better understand the factors that influence the scalability of e-business solutions, we need to focus on the workload characteristics of these solutions. These fall into 3 major categories: Application functionality Types of Interaction - Inquiry (Static and Dynamic) vs.transactions Volume of Transactions Volume of User-Specific Responses (Personalization) Amount of Cross-Session Info Transaction Complexity Data Volatility Integration with legacy systems Usage Patterns Number of Unique Items Number of Page Views Volume of Dynamic Searches Transaction Volumes Swing Infrastructure Constraints % Secure Pages (privacy) Security: Authentication, Integrity, Non-repudiation, Regulations

10 Types of e-business Solutions To understand the implications of these workload characteristics let use consider four (4) specific types of e-business applications that have high transaction volumes. They are: Publish and Subscribe Shopping Customer Self Service Trading

11 Publish and Subscribe These applications publish different types of content on a regular basis and make this content available to the users of these applications. There are several applications that fall into this category. They include: Web Portals such as yahoo.com, excite.com Media Sites such as cnn.com, zdnet.com and Events such as

12 Shopping These applications allow users to browse or search through a catalog of items, select one or more items from the catalog, electronically pay for these items in a secure manner, fill the order and complete the transactions by having these items shipped to one or more addresses. There are several applications that fall into this category. They include: Exact Inventory Sites - Victoriassecret.com, Abercrombie.com Inexact Inventory Sites - buy.com, dvdexpress.com

13 Customer Self Service These applications empower customers of an organization to access information and perform operations that were traditionally performed by dedicated service professionals (agent, CSR etc.). These applications are available for access across the web on a 24x7 basis. There are several applications that fall into this category. They include: Home banking - bankone.com, wingspanbank.com Travel Sites - Travelocity Insurance - amica.com

14 Trading These applications allow users to access information and perform secure transactions across the web on highly reliable environment. They typically have high volume of transactions. There are several applications that fall into this category. They include: Online Brokerages - schwab.com, fidelity.com, etrade.com Auction Sites - ebay.com, priceline.com

15 Workload Characteristics of e-business Solutions System Workload Characteristics Transaction Volumes Dynamic Content Dynamic Searches User Specific Responses (Personalization) Publish & Subscribe Shopping Customer Self Svc. Trading Cross-session Information Transaction Complexity Legacy Integration Transaction Volume Swings Data Volatility Number of content Publishers/Sources Page Content Volatility Number of Unique Items per page Number of Page Views Percentage of Secure Pages Security, Authentication etc. Low Medium High

16 e-business Architecture without the express written consent of the IBM Corporation is prohibited

17 e-business Architecture The Thin-Client Reference Architecture provided by Enterprise Solutions Structure (ESS) provides a strong foundation for the operational model of an e-business architecture. The operational model consists of a logical view which describes the major components in the architecture and a description of the hardware nodes that support these components. For the sake of this presentation we have simplified some of the details of this model.

18 e-business Architecture Directory & Security Services Other Device Browser Internet Firewall HTTP HTTP Web Intranet Firewall Web App Connectors Enterprise Information Systems Business Partners and External Services Network Desktop Application UI Data Business Databases Systems Management Content Management

19 e-business Architectures The e-business Architecture described on the previous slide consists of a few major architectural components. They are: Web Web Application Security Services Business Databases Enterprise Information Systems Internet Firewall Intranet Firewall and the Network It is important to note again that this is a simplified version of an e-business Architecture. Each of these components are logical services provided by the architecture that can be deployed on one to many physical nodes. Let us now look at how the workload characteristics impact the individual components of this architecture

20 Impact of Workload Characteristics on Components System Workload Characteristics Web Web App s Network Security s Firewalls Ent.Inf. Systems Database Transaction Volumes Dynamic Content Dynamic Searches User Specific Responses (Personalization) Cross-session Information Transaction Complexity Legacy Integration Transaction Volume Swings Data Volatility Number of content Publishers/Sources Page Content Volatility Number of Unique Items per page Number of Page Views Percentage of Secure Pages Security, Authentication etc. Low Medium High

21 Scaling Techniques without the express written consent of the IBM Corporation is prohibited

22 Best Practices A look at the techniques used by the high volume web sites highlight best practices for achieving application scalability. These include: Faster Machines Replicated Machines Specialized Machines Segmented Workloads Request Batching User Data Aggregation Connection Management and Caching It is important to note again that a detailed understanding of the application is key to the successful implementation of these best practices on an architecture.

23 Faster Machines Scalability can be achieved through the use of faster machines. This technique can include: moving to hardware that is bigger than current environment. For example: moving a web server from and PC based server running NT to a UNIX based server using machines with more CPUs to leverage the operating system's multitasking and multiprocessing capabilities using machines that leverage other computing paradigms such as parallel computing using better software that is optimized for the CPU using faster hardware components such as memory, cache, disk and I/O devices etc.

24 Replicated Machines The application can also be scaled by adding more machines of the same type and load balancing processing requests across these machines. In order to implement this technique we have to implement additional components in the architecture such as: Dispatcher node that can monitor and load balance processing requests across the replicated machines A synchronization node that synchronizes the content and data across the machines A mechanism for managing sessions across replicated machines

25 Specialized Machines Individual components of the architecture can be scaled by using specialized machines that perform a certain function much faster. This technique is typically used in architectures to facilitate: intelligent routing of traffic and data across replicated machines dynamic caching, used extensively by event sites and other media sites to speed up access to frequently accessed content security and encryption, used by high volume sites to speed up the SSL encryption and decryption

26 Segmented Workload This is a technique that is typically used in conjunction with replicated machines. It involves the partitioning of the workload of an application to achieve optimum performance. There are several ways of implementing this technique, they vary from: URL references, which is the most simplistic form of segmenting the workload by analyzing the URL and directing the requests to appropriate servers Application Segmentation, which looks at the application and builds the partitioning of the workload in through custom programming Function 1 Function 2 Function 3

27 Request Batching Multi-tier communication places a large computational load on both the client-tier (requester) and the Client server-tier. It also introduces considerable latency. Furthermore, the overhead costs of virtually all cross-tier requests are equal, therefore it is much better to make fewer, but larger requests. The goal of this technique is to reduce the number of requests that are sent between requesters and responders (such as between tiers or processes) by allowing the requester to define new requests that combine multiple requests. Client Client Command Client

28 User Data Aggregation This technique aggregates most commonly accessed data from multiple backend systems to speed up the overall performance of the architecture. This technique is typically implemented using: Custom Programming Intelligent Middleware and Data replication Client Client Client Client

29 Connection Management This technique aims to achieve scalability by reducing the most expensive operations within an application's workflows. This includes connections to legacy systems, databases and other servers Client 1 WEB Application Servlet /App Connection 7 Incoming Request 2 3 Connection Manager Pool 1.WAS passes a user request to a servlet/app 2.The servlet requests a connection from the Mgr. 3.The Mgr get a connection from the pool and gives the servlet/app a connection. 4.The servlet uses the connection to the resource 5.The resource returns data back 6.The servlet return the connection to the Manager and the connection is returned to the pool 7.The servlet/app sends the response back A B Resource If a connection is not available A The CM requests a new connection B Adds the connection to the pool

30 Caching Caching is the most commonly used scaling technique. It can be described very simply as the ability to store most commonly accessed information and data so that it can be accessed and used by multiple users in a rapid and timely manner. This technique can include: caching static data such as images and pages for easy, rapid and repeated access and intelligent caching which looks at dynamic data and looks at how this data can be viewed as a set of static pages. For example, in a sports event web site a table of scores, which is typically generated dynamically, needs to be accessed frequently. Today these sites build these pages periodically and make them available on high speed caches on the web Client (Browser) Client (Browser) Client (Browser) Srv Cache Web

31 Caching Sources of Data Sinks of Data File System HTTP Trigger Monitor Socket Protocol 2216 Configuration Lotus Notes HTTP Object Store Assembly Object Dependency Graph Socket Protocol Cache Manager HTTP IBM DB2 Standard I/O File System

32 Dimensions of Scaling There are 3 primary dimensions for achieving the scalability techniques outlined in the previous slides. They are: 1. Increase the power of the node that supports the architecture component. For example increase the size of the server that supports the database. 2. Improve the efficiency of the component or the node that supports it and 3. Shift the load or reduce the load on the component

33 Dimensions of the Scaling Techniques Scaling Technique Increase Power Improve Efficiency Shift / Reduce Load Faster Machine X Replicate Machines X Specialized Machines X X Segmented Workload X X Request Batching User Data Aggregation Connection Management X X X Caching X X Note: all of these techniques are in use somewhere, yet our top customers are not using all of the techniques that would be useful.

34 Applying the scalability techniques to the architecture This diagram shows how the scalability techniques outlined earlier and apply to the individual components of the e-business architecture Directory & Security Services 1 8 HTML Client App Client 8 8 Internet Firewall Dispatcher/Router 2 3 HTTP HTTP UI Data UI Logic Intranet Firewall Business Logic Connectors 1 8 Existing Apps and Data Business Partners and External Services Business Data Techniques 1 Faster Machine 2 3 Replicate Machines Specialized Machines 4 5 User Data Aggregation 6 Segmented Workload Request Batching 7 8 Connection Management Caching

35 So how do we scale e-business Solutions? without the express written consent of the IBM Corporation is prohibited

36 Scaling the Application In order to develop a truly scalable architecture, it is extremely important to understand both the structure and the functionality of the application that will be supported by it. This includes: Identify all the component parts of the application Understand component interaction and placement Identify the application flows and understand what can and cannot be altered Understand the flow of data and control among the components of the application The application is key to the scalability of any solution, so a detailed understanding is mandatory to effectively scale any solution.

37 Plan for scalability True scalability can be achieved only when it has been planned and built into the architecture of the solution. To achieve this goal, an architect should: Use of standards and open technologies facilitates the portability of the solution to bigger and faster platforms Consider various architecture topologies and select the one that can adequately address the operational requirements of the solution Evaluate and select approaches to place data and functions across the nodes of the architecture Identify and understand the service level characteristics of external systems and the implications of these on the overall performance and scalability of the proposed solution One of the first steps in this process is the establishment of a Performance Budget for the solution.

38 "The Performance Budget" It is critical to establish a performance budget by measuring end user interactive response time 1. Divide into three major buckets time spent in client time spent in network time spent in servers Total X% or xmilliseconds Y% or y Milliseconds Z% or z Milliseconds 100% or Total Time Budget 2. Define Goal for response time/ scale - e.g. 2 seconds, 500 Users 3. Assign budget to each bucket e.g. - X% * goal or fraction of budget 4. Use as target for detailed data flow analysis some of the budget is fixed (e.g. network latency) the variable portion is your "opportunity"

39 Example Response Time Budget Client Response Processing 15% Client Request 5% Request Network Latency 5% Response Network Latency 20% Time 55%

40 Design the application for scalability It is critical to use sound application development practices and techniques to facilitate the overall scalability of the solution. These include the: Use of a layered architecture that encapsulates and isolates functions and provides the flexibility to place or relocate these functions on different nodes of the architecture Development of appropriate instrumentation (such as multithreading, automatic load balancing, fault-tolerance and automatic restart) in application components. These will allow the application to scale both vertically across the same node and horizontally across multiple nodes in the architecture Consider the use of appropriate data structures, access mechanisms and other application development techniques to achieve optimal performance of individual components of the architecture Understand and design the interfaces between the components to achieve maximum scalability. This includes determining the number, the frequency, and the size of these requests

41 Determine the optimum environment Once the application is designed with the scalability in mind it is then possible to determine the optimal scaling environment by: Deploying the application on the actual hardware nodes Tuning the individual hardware nodes to achieve the best performance from each component and Applying the scaling techniques and best practices identified earlier in this document. This process should be one of continuous improvement where the workload characteristics of the application are monitored and evaluated periodically and appropriate changes are made to the operational architecture of the overall solution.

Architecting the Right SOA Infrastructure

Architecting the Right SOA Infrastructure Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA

More information

Blueprinting Questionnaire Sample

Blueprinting Questionnaire Sample Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Etanova Enterprise Solutions

Etanova Enterprise Solutions Etanova Enterprise Solutions Networking» 2018-02-24 http://www.etanova.com/technologies/networking Contents HTTP Web Servers... 6 Apache HTTPD Web Server... 6 Internet Information Services (IIS)... 6 Nginx

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

System Analysis & design

System Analysis & design Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab 8 A n important component of the design phase is

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Brocade Virtual Traffic Manager and Parallels Remote Application Server

Brocade Virtual Traffic Manager and Parallels Remote Application Server White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring

More information

CAS 703 Software Design

CAS 703 Software Design Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction

More information

Dedicated Hosted Cloud with vcloud Director

Dedicated Hosted Cloud with vcloud Director VMware vcloud Architecture Toolkit for Service Providers Dedicated Hosted Cloud with vcloud Director Version 2.9 April 2018 Harold Simon 2017 VMware, Inc. All rights reserved. This product is protected

More information

Optimizing WebCenter Interaction Performance

Optimizing WebCenter Interaction Performance Optimizing WebCenter Interaction Performance 1. Introduction... 3 Perception of Performance... 3 Definitions... 4 Performance... 4 Application Scalability... 4 Platform Scalability... 4 Page-Load Time...

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-401 Exam Name: Designing Citrix XenDesktop 7.6 Solutions Version: Demo DEMO QUESTION 1 Which option requires the fewest components to implement a fault-tolerant, load-balanced

More information

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure

More information

Caching patterns and extending mobile applications with elastic caching (With Demonstration)

Caching patterns and extending mobile applications with elastic caching (With Demonstration) Ready For Mobile Caching patterns and extending mobile applications with elastic caching (With Demonstration) The world is changing and each of these technology shifts has potential to make a significant

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

Distribution and Integration Technologies

Distribution and Integration Technologies Distribution and Integration Technologies Distributed Architectures Patterns and Styles 1 Distributed applications infrastructure ISP intranet wireless backbone desktop computer: server: laptops: tablets:

More information

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

Tuning Cognos ReportNet for a High Performance Environment

Tuning Cognos ReportNet for a High Performance Environment Proven Practice Tuning Cognos ReportNet for a High Performance Environment Product(s): Cognos ReportNet Area of Interest: Performance Tuning Cognos ReportNet for a High Performance Environment 2 Copyright

More information

ORACLE IDENTITY MANAGER SIZING GUIDE. An Oracle White Paper March 2007

ORACLE IDENTITY MANAGER SIZING GUIDE. An Oracle White Paper March 2007 ORACLE IDENTITY MANAGER SIZING GUIDE An Oracle White Paper March 2007 Note The following is intended to provide consideration guidelines for sizing Oracle Identity Manager. It is intended for information

More information

Edge Side Includes (ESI) Overview

Edge Side Includes (ESI) Overview Edge Side Includes (ESI) Overview Abstract: Edge Side Includes (ESI) accelerates dynamic Web-based applications by defining a simple markup language to describe cacheable and non-cacheable Web page components

More information

Oracle and Tangosol Acquisition Announcement

Oracle and Tangosol Acquisition Announcement Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Technical and Architectural Overview

Technical and Architectural Overview 100% Web-Based Time & Labor Management Technical and Architectural Overview Copyright 2007 Time America 15990 N. Greenway-Hayden Loop Suite D-500, Scottsdale, AZ (800) 227-9766 www.timeamerica.com Table

More information

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle

More information

THE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION

THE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION THE API DEVELOPER EXPERIENCE ENABLING RAPID INTEGRATION Ramchandar Loganathan IBS Solution Architect Banks require application programming interface (API) capabilities to realize the significant benefits

More information

VMware vsphere 4.0 The best platform for building cloud infrastructures

VMware vsphere 4.0 The best platform for building cloud infrastructures VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents

More information

Welcome to the. Migrating SQL Server Databases to Azure

Welcome to the. Migrating SQL Server Databases to Azure Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine

More information

ACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019

ACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019 ACS 3907 E-Commerce Instructor: Kerry Augustine February 7 th 2019 2014 Pearson Education, Inc. Publishing as Prentice Hall 1 E-Commerce Design Architecture Part 1 Client/server architecture Two-tier vs.

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

vcloud Automation Center Reference Architecture vcloud Automation Center 5.2

vcloud Automation Center Reference Architecture vcloud Automation Center 5.2 vcloud Automation Center Reference Architecture vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Borland AppServer. Borland

Borland AppServer. Borland Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

vsan 6.6 Performance Improvements First Published On: Last Updated On:

vsan 6.6 Performance Improvements First Published On: Last Updated On: vsan 6.6 Performance Improvements First Published On: 07-24-2017 Last Updated On: 07-28-2017 1 Table of Contents 1. Overview 1.1.Executive Summary 1.2.Introduction 2. vsan Testing Configuration and Conditions

More information

Cisco Virtualized Workload Mobility Introduction

Cisco Virtualized Workload Mobility Introduction CHAPTER 1 The ability to move workloads between physical locations within the virtualized Data Center (one or more physical Data Centers used to share IT assets and resources) has been a goal of progressive

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003

Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release

More information

Lotus Sametime 3.x for iseries. Performance and Scaling

Lotus Sametime 3.x for iseries. Performance and Scaling Lotus Sametime 3.x for iseries Performance and Scaling Contents Introduction... 1 Sametime Workloads... 2 Instant messaging and awareness.. 3 emeeting (Data only)... 4 emeeting (Data plus A/V)... 8 Sametime

More information

Planning Resources. vrealize Automation 7.1

Planning Resources. vrealize Automation 7.1 vrealize Automation 7.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to

More information

StarWind Virtual SAN. Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2. One Stop Virtualization Shop

StarWind Virtual SAN. Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2. One Stop Virtualization Shop One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind

More information

Use Case Brief BORDERLESS DATACENTERS

Use Case Brief BORDERLESS DATACENTERS Use Case Brief BORDERLESS DATACENTERS Today s cloud service providers must maintain consistent levels of service for each end user or customer, independent of physical location and hardware. This brief

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Best Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015

Best Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015 Best Practices of IBM Notes Traveler Deployment Date: 27 Aug 2015 Open Mic Team Sandip Singh - IBM ICS Support engineer Presenter Sukanya Yenneti - IBM ICS Support engineer Presenter Ranjit Rai - IBM ICS

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information

White Paper. Major Performance Tuning Considerations for Weblogic Server

White Paper. Major Performance Tuning Considerations for Weblogic Server White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

UiB 1. april 04. Sun Microsystems

UiB 1. april 04. Sun Microsystems UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop

More information

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp. TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002 Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network

More information

QuickSpecs. Compaq NonStop Transaction Server for Java Solution. Models. Introduction. Creating a state-of-the-art transactional Java environment

QuickSpecs. Compaq NonStop Transaction Server for Java Solution. Models. Introduction. Creating a state-of-the-art transactional Java environment Models Bringing Compaq NonStop Himalaya server reliability and transactional power to enterprise Java environments Compaq enables companies to combine the strengths of Java technology with the reliability

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Low Latency Data Grids in Finance

Low Latency Data Grids in Finance Low Latency Data Grids in Finance Jags Ramnarayan Chief Architect GemStone Systems jags.ramnarayan@gemstone.com Copyright 2006, GemStone Systems Inc. All Rights Reserved. Background on GemStone Systems

More information

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI

More information

The Magic of Microsoft Office SharePoint Services & Office 2007

The Magic of Microsoft Office SharePoint Services & Office 2007 The Magic of Microsoft Office SharePoint Services & Office 2007 Hans Demeyer CT Interactive hans@ct-interactive.net Session Objectives: What is SharePoint Technology Provide overview of the capabilities

More information

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers 1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,

More information

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies Object Storage 201 PRESENTATION TITLE GOES HERE Understanding Architectural Trade-offs in Object Storage Technologies SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1

More information

StarWind Virtual SAN Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016

StarWind Virtual SAN Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016 One Stop Virtualization Shop Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind

More information

S1 Informatic Engineering

S1 Informatic Engineering S1 Informatic Engineering Advanced Software Engineering Web App. Process and Architecture By: Egia Rosi Subhiyakto, M.Kom, M.CS Informatic Engineering Department egia@dsn.dinus.ac.id +6285640392988 SYLLABUS

More information

Goliath Technology Overview with MEDITECH Module

Goliath Technology Overview with MEDITECH Module Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.

More information

CONFIGURING ftscalable STORAGE ARRAYS ON OpenVOS SYSTEMS

CONFIGURING ftscalable STORAGE ARRAYS ON OpenVOS SYSTEMS Best Practices CONFIGURING ftscalable STORAGE ARRAYS ON OpenVOS SYSTEMS Best Practices 2 Abstract ftscalable TM Storage G1, G2 and G3 arrays are highly flexible, scalable hardware storage subsystems that

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Service Manager. Installation and Deployment Guide

Service Manager. Installation and Deployment Guide Service Manager powered by HEAT Installation and Deployment Guide 2017.2 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

IIS Installation for.net Application. Md. Saifullah Al Azad

IIS Installation for.net Application. Md. Saifullah Al Azad IIS Installation for.net Application Md. Saifullah Al Azad Contents 1 Mimimal... 2 1.1 Common HTTP Features... 2 1.1.1 Static Content... 2 1.1.2 Default Document... 2 1.2 Application Development... 2 1.2.1

More information

StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016

StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016 One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind

More information

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0 Storage Considerations for VMware vcloud Director Version 1.0 T e c h n i c a l W H I T E P A P E R Introduction VMware vcloud Director is a new solution that addresses the challenge of rapidly provisioning

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment This document is provided as-is. Information and views expressed in this document, including URL and other Internet

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

Performance and Scalability with Griddable.io

Performance and Scalability with Griddable.io Performance and Scalability with Griddable.io Executive summary Griddable.io is an industry-leading timeline-consistent synchronized data integration grid across a range of source and target data systems.

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information

The Collaboration Cornerstone

The Collaboration Cornerstone E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.

More information

J2EE: Best Practices for Application Development and Achieving High-Volume Throughput. Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003

J2EE: Best Practices for Application Development and Achieving High-Volume Throughput. Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003 J2EE: Best Practices for Application Development and Achieving High-Volume Throughput Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003 Agenda Architecture Overview WebSphere Application Server

More information

Xytech MediaPulse Equipment Guidelines (Version 8 and Sky)

Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) MediaPulse Architecture Xytech Systems MediaPulse solution utilizes a multitier architecture, requiring at minimum three server roles: a database

More information

An introductory look. cloud computing in education

An introductory look. cloud computing in education An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

IBM Tivoli Access Manager for e-business V6.1.1 Implementation

IBM Tivoli Access Manager for e-business V6.1.1 Implementation 000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must

More information

IBM WebSphere Application Server V4.0. Performance. 10/02/01 Copyright 2001 IBM Corporation WS40ST11.prz Page 248 of of 28

IBM WebSphere Application Server V4.0. Performance. 10/02/01 Copyright 2001 IBM Corporation WS40ST11.prz Page 248 of of 28 IBM WebSphere Application Server V4.0 Performance Page 248 of 401 1 of 28 Performance Enhancements to WebSphere V4.0 Performance Enhancement Overview Dynamic Caching of Servlets/JSPs Performance Monitoring

More information

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam.  Copyright 2014 SEP Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP

More information

On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery)

On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) George Candea and many others Stanford + Berkeley Outline J2EE and JBoss JBoss Additions JAGR µreboots Automatic Failure-Path Inference Self-Recovery

More information

SIEM Solutions from McAfee

SIEM Solutions from McAfee SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an

More information