Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data
|
|
- Vernon Phelps
- 6 years ago
- Views:
Transcription
1 Resource Usage Monitoring for Web Systems Using Real- Statistical Analysis of Log Data MATSUKI YOSHINO, ATSURO HANDA Software Division, Hitachi Ltd. 53, Totsuka-cho, Totsuka-ku, Yokohama, JAPAN {matsuki.yoshino.pw, NORIHISA KOMODA Graduate School of Information Science and Technology Osaka University 2-1 Yamadaoka, Suita, Osaka, JAPAN MICHIKO OBA The School of Systems Information Science Future University Hakodate Kamedanakano-cho, Hakodate, Hokkaido, JAPAN Abstract: - For Web-based systems accessible from the Internet, it is difficult to estimate workloads precisely. Precise estimation of resources necessary for the system is important for effective utilization of resources in a datacenter. Therefore, capacity planning to forecast the amount of IT resources necessary for a system is important. In capacity planning, the amount of resources necessary for a system is calculated based upon numbers determined by the architecture and business requirements of the system. An example of a number determined by the architecture is the amount of memory required by a single user. An example of a number determined by business requirements is the estimated maximum number of simultaneous users. By multiplying these two numbers, a maximum memory requirement can be calculated. Usually, system memory consumption and the number of simultaneous users are monitored during operation, and if either value exceeds a threshold, an alarm is sent to operators. The authors propose a method to monitor memory consumption per user from memory consumption data and the number of users, and perform statistical significance testing in real by applying a stream database. The window size used in a CQL statement for the test affects the precision of the test and memory consumption of the stream database. Through experimentation, the authors propose an optimal window size. Key-Words: - Web systems, Resource usage, Statistical testing, Real- analysis, Stream database, Capacity planning 1 Introduction Currently, most information systems provided to enterprises and by enterprises to customers and end users are Web based. For Web-based systems, it is common that the number of accesses varies dramatically and rapidly. To maintain stable system performance, it is necessary to prepare sufficient resources. Capacity planning is widely conducted in order to estimate the amount of resources necessary for information systems. A method for capacity planning applied in a real-world rapidly expanding service is published in [1]. Even with capacity planning, resource shortages can occur due to various reasons. Resource shortages occur if assumptions of capacity planning do not hold. There are two salient assumptions in capacity planning. One is the number of expected ISBN:
2 accesses, and the other is the amount of resources necessary for a single access. The total amount of resources is estimated by the product of these numbers. Traditionally, the amount of resources dedicated to a system is determined by the results of capacity planning that consider peak usage, or the system and safety coefficient based upon experience. Therefore, considering an entire enterprise, too many resources are deployed. To avoid this over-deployment of resources, cloud technologies have been introduced to assign resources to applications adequately in order to optimize resource usage. In a cloud environment, if a resource shortage occurs in a system, additional resources are deployed to the system from a resource pool. Nevertheless, because the additional resources are costly and may not available, monitoring the resource usage of systems is still very important, even in a cloud environment. In order to detect resource shortages in advance and prevent the system from going down, resource usage monitoring by using thresholds is widely implemented. Because monitoring the total amount resource usage means monitoring a product of two factors of capacity planning, it is difficult to analyze the real cause of unexpected usage of resources. The authors propose a method to monitor each factor by analyzing log data in real by using a stream database and to detect unexpected resource usage by applying statistical testing. 2 Limitations of Threshold Monitoring 2.1 Limitations of Total Resource Monitoring In capacity planning, the amount of resources necessary for processing a unit of work, such as a transaction or a user, is determined by considering the application framework used for the applications and experiences of similar applications. In this paper, this value is called the design base value. The total amount of resources is calculated by multiplying the design base values by the estimated number of maximum number of units of work to be processed simultaneously. Let r be the design base value, F be the amount of resources necessary without any work units, and q be the number of work units to be processed. The total amount of necessary resources R is thus given as follows: R F qr (1) It is common to set two levels of thresholds for monitoring total resource usage. The first threshold is a warning level, and the second one is an emergency level. Figure 1 shows an example of these two thresholds. In this case, the warning threshold is set to 5%, and the emergency threshold is set to 8%. Both graphs shown in Fig.1 and Fig.2 are example cases in which total resource monitoring does not work well. Fig.1 shows a case in which resource usage rises too rapidly, and there is little interval between exceeding the warning threshold and then exceeding the emergency threshold. Fig.2 shows a case where three incidents exceeded the warning threshold, but the system returns to normal status immediately; therefore, these warnings are false alarms. CPU Usage[%] emergency threshold warning 11:23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.1 An example of threshold monitoring (case 1) CPU Usage[%] emergency threshold warning threshold 11:26:2 11:52:4 12:19: 12:45:2 13:11:4 13:38: 14:4:2 14:3:4 14:57: 15:23:2 15:49:4 16:16: 16:42:2 17:8:4 17:35: Fig.2 An example of threshold monitoring (case 2) ISBN:
3 2.2 Method of Monitoring the Run Base Value, and Its Limitation In total resource monitoring, only the result of expression (1) is taken into account. In order to take account of the meaning of expression (1), by transforming expression (1), consider the following expression: R F r (2) q Obtaining total amount of resource usage R m and a number of units of work q for example, a number of simultaneous accesses from log data the amount of resources consumed by a unit of work during run r m can be calculated by following expression: Rm F rm (3) q The value calculated by expression (3) in run is called the run base value. By comparing the run base value and design base value during run, it is possible to verify whether the system consumes resources as planned in capacity planning. In preliminary experimentation, comparison between these two values is performed by evaluating the difference of these values by using a simple threshold. In a real Web system, the variance of the run base value is large. A threshold that is too large causes a delay in detecting abnormal behavior of the system, and a threshold that is too small causes too many false alarms. σ 2 /n. In large scale Web systems, the number of units of work for example, the number of users simultaneously accessing the system can be in the hundreds and regarded as large enough to apply the central limit theorem. Furthermore, the interval for calculating the run base value is larger than the duration of each transaction in the Web system, and each run base value has no correlation and can be considered independent. By these observations, the distribution of run base values can be assumed as a normal distribution, and a t-test can be applied. In the following discussion, let m be the design base value and consider the test of equivalence of m and the mean of the distribution of run base values. In this case, the variance of the distribution of run base values is unknown. Then, by a twosided t-test of significance level α, the condition to conclude that a mean of run base values is equivalent to m is as follows, where is a mean of run base values and n is the number of run base values to be tested: In expression (4), α (4) is an α/2 percentile of the t-distribution of degree of freedom n-1, and u 2 is an unbiased variance, which is given by the following expression, where x 1, x 2,..., x n are run base values: 3 Monitoring Resource Usage by Statistical Test In order to overcome the limitation shown above, the authors propose a method to evaluate the deviation of the run base value from the design base value quantitatively. Assuming that a distribution of population is normal, there are several statistical testing methods to test equivalence of means of populations with significance level α. In this paper, a t-test is applied. Because the run base value is calculated by expression (3), run base value is a mean of the amount of resources consumed by each unit of work. It is safe to assume that distributions of the amount of resources consumed by each unit of work are the same. Assuming that the mean of the distribution is m and the variance of that is σ 2, by the central limit theorem, if n is large enough, a mean of n probability distributions X i (i = 1, n) is approximated by a normal distribution of mean m and variance 4 An Implementation of Statistical Testing Using A Stream Database 4.1 Overview of Stream Databases A stream database is a CEP (complex event processing) tool and is used for analyzing continuously created data in real. A stream is defined as an infinite series data sequence, to which a datum is appended upon occurrence of some event. By applying some condition, a finite set of data can be extracted from a stream. The extracted finite set of data can be treated like a table in a relational database. In a stream database engine, CQL (Continuous Query Language) [2], which has similar syntax and semantics as SQL (Structured Query Language), can be used to perform queries to extracted finite sets of data. Among well known ISBN:
4 examples of stream databases, there are reports on monitoring packet traffic through networks [3] and monitoring messages issued in a large scale datacenter to detect abnormalities in the datacenter [4]. Data Input stream Sliding window: A CQL statement processes data within a sliding window. Output stream The window size is determined either by interval or number of data. In this case, the size is determined by the number of data. 4.2 Determining the Window Size for a CQL Statement for Statistical Testing In Chapter 3, it is assumed that the number of run base values used for a statistical test is sufficiently large. In a CQL statement for statistical testing, the number of run base values used for a statistical test is expressed as a window size of the CQL statement. A window size is the width of a sliding window to extract a finite set of data from a stream. The concept of sliding windows and window size is explained in Fig.3. A sliding window can be defined either by the number of data in a sliding window or by the amount of elapsed after data enters the window. For the purpose of statistical testing in this paper, the size of a sliding window is determined by the number of data. In order to realize real- processing, stream database engines handle all the data in memory. Therefore, to attain scalability of a stream database engine, it is important to reduce memory usage of the stream database engine. For example, in the stream database engine that the authors applied in the experiments mentioned in Chapter 5, 2sW + 1 (KB) of memory is consumed for each system to be monitored, where W is the window size of a CQL statement for statistical testing, and the data size of an element of the input stream is s. In the case of the authors' experiments, s is 1.25 KB. On the other hand, 2 MB of memory is consumed for registration of each CQL statement. For the experiment, 7 CQL statements have to be registered; therefore, 14 MB of memory is consumed by only the registration of CQL statements for statistical testing. In this situation, if W is less than 1, memory consumption proportional to window size is less than 2.5% of memory consumption used by registration of CQL statements, and can be considered negligible. However, if the window size is over 1,, then memory consumption proportional to window size is about 2% of memory consumption used by registration of CQL statements. This has a significant impact on overall memory usage of the stream database engine. In designing CQL statements for statistical testing, it is important to find an adequate window size to realize both early detection of abnormalities in resource Fig.3 Sliding window and window size usage and minimization of memory usage of a stream database engine used for statistical testing. 4.3 Determining the Significance Level of Statistical Testing Besides the window size for CQL statements, the significance level of statistical testing is also a critical parameter for checking conditions discussed in Chapter 3. From the definition of the significance level, it is obvious that the larger the significance level is set, the more false alarms occur, but the possibility of problems being detected increases. When an alarm is issued, it is necessary to examine whether some actions need to be taken, which causes an increase in operation costs. Balancing operation costs and the range of possible abnormal situations to detect in a datacenter can be quantitatively defined by the significance level of the statistical test. This quantification can be used as a parameter of a service level agreement with managed service providers or cloud service providers of PaaS (Platform as a Service). Service providers can demand more expensive service fees for monitoring services with larger significance levels for statistical testing. Therefore, it is important to determine an adequate significance level to set. 5 EXPERIMENTS 5.1 Environment of Experiments In order to determine the adequate window size setting and significance level, the authors conducted experiments using data simulating the environment shown in Fig.4. In the environment assumed, a Web application runs on three servers, and from each server, information about the number of users simultaneously accessing the server and the total CPU usage are periodically output to respective log files. Data that simulates typical problems in Web applications (discussed in document [5]) is created and used as test data in the experiment. ISBN:
5 Capacity planning tool Stream database Users Run environment Merged log info log info log info Load balancer log info Fig.4 Environment assumed in experiments Fig.5 shows the number of accesses for the situation shown in Fig.1. Both information shown in Fig.1 and Fig.5 are provided directly by the logs. Fig.6 shows information on CPU usage per access, that is, an example of run base values. The CQL statements used for statistical testing merge two pieces of log information, calculate the information shown in Fig.6, and perform statistical tests against the design base value, which is.1% in this test case. Fig.7 shows the number of simultaneous accesses, and Fig.8 shows run base values of the situation shown in Fig.2. Although there are three spikes in Fig.2, there are only two spikes in Fig.7. That means that only the spike around 13:3 in Fig.2 is caused by unexpected behavior of the system, and the other two spikes are due to an abrupt increase in the number of accesses and is considered to be normal behavior. Fig.8 shows the run base values for the data simulating a normal state. In all cases, the design base value is.1%. All the log data is read every 1 seconds, and new data is added to streams. Number of Access CPU Usage per Access[%] :24:5 11:49:4 12:14:3 12:39:2 13:4:1 13:29: 13:53:5 14:18:4 14:43:3 15:8:2 15:33:1 15:58: 16:22:5 16:47:4 17:12:3 17:37:2 Fig.5 Number of accesses (case 1) 11:23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.6 CPU usage per access (case 1) 5.2 Results of Experiments Experiments are performed by using CQL statements that issue an alarm when the condition discussed in Chapter 3 is not met, with various combinations of window size N and significance level α. Table 1 shows the s when deviations of a run base value from the design base value were detected. Compared with Fig.1, wherein a warning alarm is issued around 14:4, deviation of the run base values from the design base value, which causes unexpected resource usage behavior in the system, is detected well in advance. Table 2 shows the results of whether the spike at 13:3:3 is detected for the data of Fig.2 and Fig. 8. Table 3 shows number of false alarms for the norml case data shown in Fig. 9. Number of Access :22:1 11:44:2 12:6:3 12:28:4 12:5:5 13:13: 13:35:1 13:57:2 14:19:3 14:41:4 15:3:5 15:26: 15:48:1 16:1:2 16:32:3 16:54:4 17:16:5 17:39: Fig.7 Number of accesses (case 2) ISBN:
6 CPU Usage per Access[%] CPU Usage per Access[%] :23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.8 CPU usage per access (case 2) : 11:3 12: 12:3 13: 13:3 14: 14:3 15: 15:3 16: 16:3 17: 17:3 Time Fig.9 CPU usage per access (normal case) As shown in Table 1, the larger N and α are, the sooner the detection of deviations of run base values from the design base value. However, as shown in Table 3, the larger N is, the more false alarms occur. Considering the argument of memory consumption of the steam database engine in 4.2, an appropriate value of N is approximately 4, and an appropriate range of α is from.1 to.5. Compared with total resource monitoring shown in Fig.1, by using this proposed method, unexpected resource usage is detected sooner. Compared with the graph of Fig.2, by using this proposed method, false alarms can be avoided by properly setting parameters N and α. Table 1. Times of detection of abnormality α N :44:2 13:14: 13:7:1 13:5:5 13:6:1 13:6:.5 14:13:2 13:2: 13:8:5 13:7: 13:6:5 13:6: :33:2 13:26:3 13:11:1 13:8:1 13:7:2 13:7:2.1 13:35:3 13:13:1 13:1: 13:8:1 13:8:1.5 14:33: 13:49:4 13:27:4 13:8:5 13:14:5 Table 2. Detection of the spike at 13:3:3 α N Table 3. Number of false alarms α N CONCLUSION For detecting unexpected resource usage behavior of Web systems, the authors propose a method of monitoring deviations of run base values from the design base value using statistical testing. Effectiveness of the method is proven by experiment using the implementation of statistical testing using a stream database. References: [1] J. Allspaw. The Art of Capacity Planning: Scaling Web Resources, O'Reilly Media, 28. [2] A. Arasu, S. Babu, and J. Widom, The CQL Continuous Query Language: Semantic Foundations and Query Execution, Technical report, Stanford University ( 23. [3] C. Cranor, T. Johnson, O. Spataschek, and V. Shkapenyuk, Gigascope: A stream database for network applications, Proc. of the 23 ACM SIGMOD Intl. Conf. on Management of Data, 23, pp [4] M. Yoshino, M. Oba, N. Komoda, T. Yamade, and S. Nakamichi, Message analysis method based on a stream database for information system management, Proc. of the 4th International Conference on Research Challenges in Information Science 21 (RCIS 21), 21, pp [5] K. Kobori, S. Moro, M. Satou, H. Ishigaki, and T. Iiyama. Practical Debugging and Troubleshooting (Java Edition), Shoeisha, 21. (in Japanese) ISBN:
On a Method for Describing System Management Operations and its Use in Evaluating Energy Saving Operations
DVNCS in DT NTWORKS, COMMUNICTIONS, COMPUTRS On a Method for Describing System Management s and its Use in valuating nergy Saving s Matsuki Yoshino *, Norihisa Komoda**, Michiko Oba *** * Software Division
More informationAn Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems
An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationAn Efficient Execution Scheme for Designated Event-based Stream Processing
DEIM Forum 2014 D3-2 An Efficient Execution Scheme for Designated Event-based Stream Processing Yan Wang and Hiroyuki Kitagawa Graduate School of Systems and Information Engineering, University of Tsukuba
More informationLab 5 - Risk Analysis, Robustness, and Power
Type equation here.biology 458 Biometry Lab 5 - Risk Analysis, Robustness, and Power I. Risk Analysis The process of statistical hypothesis testing involves estimating the probability of making errors
More informationWiFi concierge at home network focusing on streaming traffic
WiFi concierge at home network focusing on streaming traffic Satoru Nishimaki a), Hiroshi Yamamoto, and Katsuyuki Yamazaki Nagaoka University of Technology, 1603 1 Kamitomioka, Nagaoka, Niigata 940 2188,
More informationAnalytical and Experimental Evaluation of Stream-Based Join
Analytical and Experimental Evaluation of Stream-Based Join Henry Kostowski Department of Computer Science, University of Massachusetts - Lowell Lowell, MA 01854 Email: hkostows@cs.uml.edu Kajal T. Claypool
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationQuick Note 044. Estimating Cellular Data Overhead When Using TransPort Enterprise Routers and Digi Remote Manager SM 2.0
Quick Note 044 Estimating Cellular Data Overhead When Using TransPort Enterprise Routers and Digi Remote Manager SM 2.0 Digi Technical Support February 2014 Contents 1 Document Version...2 2 Abstract...3
More informationLoad Shedding for Aggregation Queries over Data Streams
Load Shedding for Aggregation Queries over Data Streams Brian Babcock Mayur Datar Rajeev Motwani Department of Computer Science Stanford University, Stanford, CA 94305 {babcock, datar, rajeev}@cs.stanford.edu
More informationKEMP 360 Vision. KEMP 360 Vision. Product Overview
KEMP 360 Vision Product Overview VERSION: 1.0 UPDATED: SEPTEMBER 2016 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 2 Architecture... 4 3 Sample Scenarios...
More informationAutomated Control for Elastic Storage
Automated Control for Elastic Storage Summarized by Matthew Jablonski George Mason University mjablons@gmu.edu October 26, 2015 Lim, H. C. and Babu, S. and Chase, J. S. (2010) Automated Control for Elastic
More informationDesign, Implementation and Evaluation of. Resource Management System for Internet Servers
Design, Implementation and Evaluation of Resource Management System for Internet Servers Kazuhiro Azuma, Takuya Okamoto, Go Hasegawa and Masayuki Murata Graduate School of Information Science and Technology,
More informationAdaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network
Contemporary Engineering Sciences, Vol. 7, 2014, no. 14, 725-730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4681 Adaptive Aggregation Scheduling Using Aggregation-degree Control in
More informationEcon 3790: Business and Economics Statistics. Instructor: Yogesh Uppal
Econ 3790: Business and Economics Statistics Instructor: Yogesh Uppal Email: yuppal@ysu.edu Chapter 8: Interval Estimation Population Mean: Known Population Mean: Unknown Margin of Error and the Interval
More informationMark Sandstrom ThroughPuter, Inc.
Hardware Implemented Scheduler, Placer, Inter-Task Communications and IO System Functions for Many Processors Dynamically Shared among Multiple Applications Mark Sandstrom ThroughPuter, Inc mark@throughputercom
More informationAnti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationPerformance Modeling and Evaluation of Web Systems with Proxy Caching
Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering
More informationRemote Health Monitoring for an Embedded System
July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction
More informationAN INFORMATION FILTERING SYSTEM THAT OPTIMIZES THE PROCESSING METHOD BASED ON MATHEMATICAL PROPERTIES
AN INFORMATION FILTERING SYSTEM THAT OPTIMIZES THE PROCESSING METHOD BASED ON MATHEMATICAL PROPERTIES Takuya Kodera Rie Sawai Tsutomu Terada Masahiko Tsukamoto Shojiro Nishio Graduate School of Information
More informationCase Study II: A Web Server
Case Study II: A Web Server Prof. Daniel A. Menascé Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html 1 Copyright Notice Most of the figures in this set of slides
More informationEvaluating Auto Scalable Application on Cloud
Evaluating Auto Scalable Application on Cloud Takashi Okamoto Abstract Cloud computing enables dynamic scaling out of system resources, depending on workloads and data volume. In addition to the conventional
More informationQUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,
More informationHow To Keep Your Head Above Water While Detecting Errors
USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing
More informationExploiting Predicate-window Semantics over Data Streams
Exploiting Predicate-window Semantics over Data Streams Thanaa M. Ghanem Walid G. Aref Ahmed K. Elmagarmid Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398 {ghanemtm,aref,ake}@cs.purdue.edu
More informationDISTRIBUTED computing, in which large-scale computing
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 475 48 ISBN 978-83-681-14-9 IN 1896-794 On the Robustness of the Soft State for Task Scheduling in Large-scale
More informationIntroduction to Queueing Theory for Computer Scientists
Introduction to Queueing Theory for Computer Scientists Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These
More informationDesign of an IP Flow Record Query Language
Design of an IP Flow Record Query Language Vladislav Marinov and Jürgen Schönwälder Computer Science, Jacobs University Bremen, Germany {v.marinov,j.schoenwaelder}@jacobs-university.de Abstract. Internet
More informationLog System Based on Software Testing System Design And Implementation
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Log System Based on Software Testing System Design And Implementation Yan Liu1, a, Dahai Jin1,
More informationStatic Compaction Techniques to Control Scan Vector Power Dissipation
Static Compaction Techniques to Control Scan Vector Power Dissipation Ranganathan Sankaralingam, Rama Rao Oruganti, and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer
More informationTUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS
TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3
More informationCh. 13: Measuring Performance
Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction
More informationMulti-Model Based Optimization for Stream Query Processing
Multi-Model Based Optimization for Stream Query Processing Ying Liu and Beth Plale Computer Science Department Indiana University {yingliu, plale}@cs.indiana.edu Abstract With recent explosive growth of
More informationDynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems
Dynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems Ahmad Bilal, Taleb Tarik, Andras Vajda and Bagaa Miloud Ericsson, Finland Aalto University, Finland bilal.x.ahmad@ericsson.com, talebtarik@ieee.org,
More informationIntegrated Usage of Heterogeneous Databases for Novice Users
International Journal of Networked and Distributed Computing, Vol. 3, No. 2 (April 2015), 109-118 Integrated Usage of Heterogeneous Databases for Novice Users Ayano Terakawa Dept. of Information Science,
More informationTechnical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog)
Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog) Huawei Technologies Co., Ltd. All rights reserved. Contents 1 Videoconferencing Network Conditions... 3 2 Overall Description...
More informationMcPAD and HMM-Web: two different approaches for the detection of attacks against Web applications
McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and
More informationUDP Packet Monitoring with Stanford Data Stream Manager
UDP Packet Monitoring with Stanford Data Stream Manager Nadeem Akhtar #1, Faridul Haque Siddiqui #2 # Department of Computer Engineering, Aligarh Muslim University Aligarh, India 1 nadeemalakhtar@gmail.com
More informationWHITE PAPER Hybrid Approach to DDoS Mitigation
WHITE PAPER Hybrid Approach to DDoS Mitigation FIRST LINE OF DEFENSE Executive Summary As organizations consider options for DDoS mitigation, it is important to realize that the optimal solution is a hybrid
More informationThe concept of a storage-centric network which is safe and secure anywhere jointly developed
November 20, 2003 Nippon Telegraph and Telephone Corporation Hitachi, Ltd. The concept of a storage-centric network which is safe and secure anywhere jointly developed Nippon Telegraph and Telephone Corporation
More informationFile Reputation Filtering and File Analysis
This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action
More informationNetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst
ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can
More informationAdvancing AiHD Cloud Solution
NEW Advancing AiHD Cloud Solution Ai Holdings Corporation (parent company to Graphtec) created the "" cloud system by consolidating resources from group companies to provide advanced IoT platform with
More informationInterstage Big Data Complex Event Processing Server V1.0.0
Interstage Big Data Complex Event Processing Server V1.0.0 User's Guide Linux(64) J2UL-1665-01ENZ0(00) October 2012 PRIMERGY Preface Purpose This manual provides an overview of the features of Interstage
More informationSystem Monitor - Performance Monitoring Services 5.8 User's Guide
System Monitor - Performance Monitoring Services 5.8 User's Guide - First Edition - Copyright (C) NEC Corporation 2004-2017. Disclaimer of Warranty All the information, text, graphics, links or other items
More informationEvent-Driven Virtual Machine for Business Integration Middleware
Event-Driven Virtual Machine for Business Integration Middleware Joachim H. Frank 1, Liangzhao Zeng 2, and Henry Chang 2 1 IBM Software Group jhfrank@us.ibm.com 2 IBM T.J. Watson Research Center {lzeng,hychang}@us.ibm.com
More informationA Robust Wipe Detection Algorithm
A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationHP ProLiant BladeSystem Gen9 vs Gen8 and G7 Server Blades on Data Warehouse Workloads
HP ProLiant BladeSystem Gen9 vs Gen8 and G7 Server Blades on Data Warehouse Workloads Gen9 server blades give more performance per dollar for your investment. Executive Summary Information Technology (IT)
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationData Stream Mining. Tore Risch Dept. of information technology Uppsala University Sweden
Data Stream Mining Tore Risch Dept. of information technology Uppsala University Sweden 2016-02-25 Enormous data growth Read landmark article in Economist 2010-02-27: http://www.economist.com/node/15557443/
More informationHosted Microsoft Exchange Server 2003 Deployment Utilizing Network Appliance Storage Solutions
Hosted Microsoft Exchange Server 23 Deployment Utilizing Network Appliance Storage Solutions Large-Scale, 68,-Mailbox Exchange Server Proof of Concept Lee Dorrier, Network Appliance, Inc. Eric Johnson,
More informationMultiDSLA. Measuring Network Performance. Malden Electronics Ltd
MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission
More informationCES: A FRAMEWORK FOR EFFICIENT INFRASTRUCTURE UTILIZATION THROUGH CLOUD ELASTICITY AS A SERVICE (CES)
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 8, Aug 2015, pp. 24-30, Article ID: IJCET_06_08_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtypeijcet&vtype=6&itype=8
More informationCongestion Propagation among Routers in the Internet
Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,
More informationSLiM : Scalable Live Media Streaming Framework for a U-City
SLiM : Scalable Live Media Streaming Framework for a U-City Eun-Seok Ryu, Chuck Yoo 236, Department of Computer Science and Engineering, Korea University, Anam-Dong, Seongbuk-Gu, Seoul, Korea { esryu,
More informationWhite Paper. Major Performance Tuning Considerations for Weblogic Server
White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance
More informationOracle Event Processing Extreme Performance on Sparc T5
Oracle Event Processing Extreme Performance on Sparc T5 An Oracle Event Processing (OEP) Whitepaper ORACLE WHITE PAPER AUGUST 2014 Table of Contents Introduction 2 OEP Architecture 2 Server Architecture
More informationTowards Energy Efficient Change Management in a Cloud Computing Environment
Towards Energy Efficient Change Management in a Cloud Computing Environment Hady AbdelSalam 1,KurtMaly 1,RaviMukkamala 1, Mohammad Zubair 1, and David Kaminsky 2 1 Computer Science Department, Old Dominion
More informationCloud Monitoring as a Service. Built On Machine Learning
Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms
More informationNetwork Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM
Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers
More informationRediffmail Enterprise High Availability Architecture
Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of
More informationSec 6.3. Bluman, Chapter 6 1
Sec 6.3 Bluman, Chapter 6 1 Bluman, Chapter 6 2 Review: Find the z values; the graph is symmetrical. z = ±1. 96 z 0 z the total area of the shaded regions=5% Bluman, Chapter 6 3 Review: Find the z values;
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationReusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview
Reusing Reused Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan {t-ishihr,
More informationAn introductory look. cloud computing in education
An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With
More informationReal-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH
2011 International Conference on Document Analysis and Recognition Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH Kazutaka Takeda,
More informationImproved Load Balancing in Distributed Service Architectures
Improved Load Balancing in Distributed Service Architectures LI-CHOO CHEN, JASVAN LOGESWAN, AND AZIAH ALI Faculty of Engineering, Multimedia University, 631 Cyberjaya, MALAYSIA. Abstract: - The advancement
More informationExtending a Method of Describing System Management Operations to Energy-Saving Operations in Data Centers
INTRNTIONL JOURNL OF COMPUTRS xtending a Method of Describing System Management Operations to nergy-saving Operations in Data Centers Matsuki Yoshino, Michiko Oba, Norihisa Komoda bstract The authors propose
More informationEvaluation of a Business Application Framework Using Complexity and Functionality Metrics
Evaluation of a Business Application Framework Using Complexity and Functionality Metrics Hikaru Fujiwara 1, Shinji Kusumoto 1, Katsuro Inoue 1, Toshifusa Ootsubo 2 and Katsuhiko Yuura 2 1 Graduate School
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationA Low-Latency DMR Architecture with Efficient Recovering Scheme Exploiting Simultaneously Copiable SRAM
A Low-Latency DMR Architecture with Efficient Recovering Scheme Exploiting Simultaneously Copiable SRAM Go Matsukawa 1, Yohei Nakata 1, Yuta Kimi 1, Yasuo Sugure 2, Masafumi Shimozawa 3, Shigeru Oho 4,
More informationASSURING PERFORMANCE IN VDI DEPLOYMENTS
ASSURING PERFORMANCE IN VDI DEPLOYMENTS EXECUTIVE SUMMARY Virtual Desktop Infrastructure (VDI) holds great promise for end-user computing teams to centralize management and maintenance, lower operational
More informationVMware vcloud Architecture Toolkit Cloud Bursting
VMware vcloud Architecture Toolkit VMware vcloud Architecture Toolkit Version 3.0 September 2012 Version 2.0.1 This product is protected by U.S. and international copyright and intellectual property laws.
More informationMOC 20463C: Implementing a Data Warehouse with Microsoft SQL Server
MOC 20463C: Implementing a Data Warehouse with Microsoft SQL Server Course Overview This course provides students with the knowledge and skills to implement a data warehouse with Microsoft SQL Server.
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More information5th World Congress for Software Quality Shanghai, China November 2011
Yoshihiro Kita University of Miyazaki Miyazaki, Japan kita@earth.cs.miyazaki-u.ac.jp Proposal of Execution Paths Indication Method for Integration Testing by Using an Automatic Visualization Tool Avis
More informationVANS: Visual Ad hoc Network Simulator
VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,
More informationIBM InfoSphere Streams v4.0 Performance Best Practices
Henry May IBM InfoSphere Streams v4.0 Performance Best Practices Abstract Streams v4.0 introduces powerful high availability features. Leveraging these requires careful consideration of performance related
More informationA proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing
A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School
More informationContents Overview of the Compression Server White Paper... 5 Business Problem... 7
P6 Professional Compression Server White Paper for On-Premises Version 17 July 2017 Contents Overview of the Compression Server White Paper... 5 Business Problem... 7 P6 Compression Server vs. Citrix...
More informationAnti-DDoS. User Guide. Issue 05 Date
Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use
More informationMonitoring Agent for Microsoft Hyper-V Server Fix Pack 12. Reference IBM
Monitoring Agent for Microsoft Hyper-V Server 6.3.1 Fix Pack 12 Reference IBM Monitoring Agent for Microsoft Hyper-V Server 6.3.1 Fix Pack 12 Reference IBM Note Before using this information and the product
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationNOISE SOURCE DETECTION USING NON-ORTHOGONAL MICROPHONE ARRAY
NOISE SOURCE DETECTION USING NON-ORTHOGONAL MICROPHONE ARRAY..YW INSTRUMENTATION AND TECHIQUES FOR NOISE MEASUREMENT AND ANALYSIS Fujita, Hajime ; Fuma, Hidenori ; Katoh, Yuhichi ; and Nobuhiro Nagasawa
More informationAn Approach To ANOM Chart. Muhammad Riaz
An Approach To ANOM Chart Muhammad Riaz Department of tatistics, Quaid-i-Azam University, Islamabad, Pakistan E-mail: riaz76qau@yahoo.com Abstract The study proposes a scheme for the structure of Analysis
More informationA Cost Model for Adaptive Resource Management in Data Stream Systems
A Cost Model for Adaptive Resource Management in Data Stream Systems Michael Cammert, Jürgen Krämer, Bernhard Seeger, Sonny Vaupel Department of Mathematics and Computer Science University of Marburg 35032
More informationAn Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks
An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn
More informationOcclusion Detection of Real Objects using Contour Based Stereo Matching
Occlusion Detection of Real Objects using Contour Based Stereo Matching Kenichi Hayashi, Hirokazu Kato, Shogo Nishida Graduate School of Engineering Science, Osaka University,1-3 Machikaneyama-cho, Toyonaka,
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (December 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationEvent Object Boundaries in RDF Streams A Position Paper
Event Object Boundaries in RDF Streams A Position Paper Robin Keskisärkkä and Eva Blomqvist Department of Computer and Information Science Linköping University, Sweden {robin.keskisarkka eva.blomqvist}@liu.se
More informationIdentifying and Preventing Distributed-Denial-Of-Service Attacks
CHAPTER 11 Identifying and Preventing Distributed-Denial-Of-Service Attacks This module describes the ability of the SCE platform to identify and prevent DDoS attacks, and the various procedures for configuring
More informationConstruction and Application of Cloud Data Center in University
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,
More informationA Framework for Securing Databases from Intrusion Threats
A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:
More informationDesign, Implementation and Evaluation of Resource Management System for Internet Servers
Design, Implementation and Evaluation of Resource Management System for Internet Servers Paper ID: 193 Total number of pages: 14 Abstract A great deal of research has been devoted to solving the problem
More informationP6 Compression Server White Paper Release 8.2 December 2011 Copyright Oracle Primavera P6 Compression Server White Paper Copyright 2005, 2011, Oracle and/or its affiliates. All rights reserved. Oracle
More informationWe have seen that as n increases, the length of our confidence interval decreases, the confidence interval will be more narrow.
{Confidence Intervals for Population Means} Now we will discuss a few loose ends. Before moving into our final discussion of confidence intervals for one population mean, let s review a few important results
More informationMHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture
1 MHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture HIROYASU ISHIGAKI *1 SATORU MOURI *2 DAISUKE GOTO *3 NAOYUKI NAGAFUCHI *2 To increase the efficiency
More informationMonitoring & Tuning Azure SQL Database
Monitoring & Tuning Azure SQL Database Dustin Ryan, Data Platform Solution Architect, Microsoft Moderated By: Paresh Motiwala Presenting Sponsors Thank You to Our Presenting Sponsors Empower users with
More information