Magpie: Distributed request tracking for realistic performance modelling
|
|
- Geraldine Webster
- 6 years ago
- Views:
Transcription
1 Magpie: Distributed request tracking for realistic performance modelling Rebecca Isaacs Paul Barham Richard Mortier Dushyanth Narayanan Microsoft Research Cambridge James Bulpin University of Cambridge
2 Performance in distributed systems Faults in distributed systems are notoriously hard to diagnose Performance problems are even more subtle to debug Often transient or affect only a subset of requests / users Frequently involve complex interactions between multiple machines Aggregate statistics (e.g. utilization) may look perfectly normal
3 Magpie Approach Track individual requests end to end Observe control flow (causality) Monitor resource consumption: CPU, bandwidth, disk Debug performance in the small Build a probabilistic workload model from the aggregate requests Cluster similar requests according to their observed behaviour Debug performance in the large
4 How do we use this information? Performance debugging Why did this request take much longer than that request? Fault detection Configuration and management Performance prediction Realistic workload models for capacity planning Obtain automatically on a live system
5 Magpie components Instrumentation System activity recorded to logs Generic request parser Extract individual requests from logs according to an event schema Model construction Behavioural clusters Probabilistic state machine
6 Outline Introduction What is a request? Instrumentation Request extraction Modelling Current status
7 What is a request? System activity which takes place in response to an action initiated by the application being traced HTTP request Database query File open request We describe a request as The sequence of application components involved in its processing The resource consumed at each stage CPU, bandwidth, disk transfer size, (latency)
8 A typical e-commerce site (1) Internet SQL Servers Storage Web Front Ends
9 A typical e-commerce site (2) Web Server SQL Server IIS Filter Static Content CLR Application Logic Stored procedures ASP.NET ADO.NET Data http.sys Kernel WinSock2 API WinSock2 API Kernel
10 HTTP request: detailed view WEB.eec ! IIS worker thread picks up request from http.sys Sync WinSock send to SQL Server ASP.NET thread blocks after RPC to database IIS worker thread wakes up to write log WEB.398 HTTP request Disk packet Net RX Net TX ASP.NET worker thread takes over TDS request and reply packets sent and received HTTP response packets sent back to client s s s Net TX Net RX Disk SQL.9c4 SQL thread unblocks s s s KEY: Blocked IIS ASP.NET SQL Disk Other
11 Why is request tracking hard? Many components, multiple machines Must track control flow across machines No globally unique request ID Components are developed independently Multiple thread pools Many threads participate in processing a request Asynchronous communication Must match send/recvs between threads/machines Hand-rolled synchronization primitives SQL server has user-mode scheduler
12 Outline Introduction What is a request? Instrumentation Request extraction Modelling Current status
13 Event Tracing for Windows Low-overhead event mechanism Events timestamped with cycle counter Global ordering on events on a single machine Can enable/disable sets of events at runtime Using ETW in Magpie Each instrumentation point posts an event Events are logged to disk Logs are post-processed to extract requests Can also consume events in real time
14 Instrumentation points Existing ETW event providers IIS, kernel App-specific hooks IIS, ASP.NET, SQL Server Detours Wrap dlls to trap Win32 and WinSock2 calls WinPcap Capture packets on the wire
15 CPU usage from kernel events The ETW kernel logger records every context switch How do we know which cycles are used for which request? We can attribute cycles to a request by An application-specific event which occurs within a delimited sector of CPU time, or The current context of execution, eg thread id
16 Example: protocol processing in a DPC Events: cswitch DPC start pkt recv DPC end cswitch Request 1 cycle count time Request 2 cycle count
17 Application and middleware events Cover points where flow of control moves between components Cover points where resources are multiplexed and demultiplexed E.g. user-level scheduling primitives Propagation of a global request id is not required! Magpie used to do this but not any more
18 Instrumenting a web service Web Server SQL Server IIS Filter Static Content CLR HTTPModule Application Logic Wrappers Stored procedures Extended SPs ISAPI Filter ASP.NET CLR profiler ADO.NET Data http.sys Kernel Intercept WinSock2 API Intercept WinSock2 API Kernel Packet capture Event Tracing for Windows Packet capture Event Tracing for Windows
19 Outline Introduction What is a request? Instrumentation Request extraction Modelling Current status
20 Generic request extraction No inbuilt assumptions about the system or the application No common unique identifier Schema specifies semantics of events Easy to add new event types Parser stitches events into requests based on event semantics
21 Terminology Namespace Event parameter which references an entity in the system, eg thread id Timeline Instantiation of a namespace with a unique value, eg thread id = 0xa Events bind or unbind requests to timelines Bindings capture the semantics of each event for a particular request type
22 Example: connecting events Cpuid=0 cswitch DPC end TCP pkt DPC start cswitch Enter Recv Recv returns Tid=0xa Tid=0xb Connid=0xd Request 1 Request 2
23 End-to-end request extraction An instance of the request parser runs on each machine in the distributed system Online or offline mode Offline post-processing connects request fragments from each node according to a globally unique namespace, e.g. packet IP identifier
24 Outline Introduction What is a request? Instrumentation Request extraction Modelling Current status
25 Clustering for workload generation Target the Indy performance modelling tool Calculates throughput, bottlenecks Needs transaction mix, resource consumption Previously: microbenchmark approach Run of each transaction type (URL) Divide aggregate resource usage by Aim: provide realistic workload models From real, mixed workloads Derive transaction types automatically
26 Single request: cartoon view Partial ordering of events Annotated with resource usage 1k 12k 5ms 6ms 3ms 24k 6ms 1ms read 6ms 1k 6k 2ms 192k read 3ms IIS CPU ASP.NET CPU SQL Server CPU Network Disk
27 Behavioural clustering of requests Represent requests as event strings Flatten out any concurrency Use Levenshtein string edit distance Modified to factor in resource usage vectors Cluster requests based on this distance Linear-time algorithm Each cluster is a request type Select representative from near centroid
28 Build a workload model by clustering similar requests Requests in the same cluster often have different URLs, and one URL may appear in many clusters E 1k 30k A 2ms 10ms 5ms 14ms 24ms 1ms 5ms 0.2k 0.2k 0.2k 0.1k 6k 2k 5ms 11ms 5ms 7% A B C D B 10% D 5% 1k 11k 14ms 27ms 2ms 1ms 2ms 7ms C 15% 1k 2ms 13ms 0.3k 1k 12k 5ms 6ms 3ms 24k 6ms 1ms read 1k 6k 5ms 2ms 192k 3ms read 11k 11ms 3ms 2ms 5ms 0.3k 6ms E 63% 0.6k 1k 5ms 11ms
29 Taking it further: work-inprogress Online and incremental modelling: Detect component failure Detect sudden shifts in workload More sophisticated models Learn the probabilistic state machine for each request c.f. flowcharts annotated with performance information Bayesian watchdogs Compute the likelihood of a request s behaviour as it moves through the system Deal with unlikely requests appropriately
30 Outline Introduction What is a request? Instrumentation Request extraction Modelling Current status
31 Current status Recent focus has been developing a generic request extraction scheme Prototype for 2-machine e-commerce site TPC-W style workload Prototype for single machine SQL Server 2000 Challenge is user mode scheduler TPC-C workload Other applications on the way Large-scale Real systems with real performance problems
32 Conclusion Magpie is a tool for performance analysis in a distributed system Bottom up, per-request approach Complementary to existing techniques: Performance counters Program profiling Feeds into performance debugging and prediction tools
33 Work-in-progress: learning the probabilistic state machine Infer a stochastic context free grammar from a sample set of strings Each state transition emits a character and has an associated probability Use the Alergia algorithm (Carrasco & Oncina 94) Construct a prefix tree from the sample set Merge similar subtrees Apply to Magpie requests Just event strings
34 Ongoing work with Alergia Tuning the similarity criterion Factoring in resource usage information Can we identify event sequences with suspiciously low probability Run online for anomaly detection?
Learning Communication Patterns in Singularity
Learning Communication Patterns in Singularity Paul Barham, Rebecca Isaacs, Richard Mortier and Tim Harris {pbar,risaacs,mort,tharris@microsoft.com Microsoft Research, Cambridge, UK. 1 Introduction Modern
More informationDiscussion of various models related to cloud performance
Discussion of various models related to cloud performance Chaitanya Krishna Kande Computer science department Ohio State University Columbus, Ohio, US Kande.2@osu.edu I. INTRODUCTION Knowing the metrics
More informationCauseway: Operating System Support For Controlling And Analyzing The Execution Of Distributed Programs
Causeway: Operating System Support For Controlling And Analyzing The Execution Of Distributed Programs Anupam Chanda, Khaled Elmeleegy, and Alan L. Cox Department of Computer Science Rice University, Houston,
More informationCauseway: Operating System Support For Controlling And Analyzing The Execution Of Distributed Programs
Causeway: Operating System Support For Controlling And Analyzing The Execution Of Distributed Programs Anupam Chanda, Khaled Elmeleegy, and Alan L. Cox Department of Computer Science Rice University, Houston,
More informationCapriccio: Scalable Threads for Internet Services
Capriccio: Scalable Threads for Internet Services Rob von Behren, Jeremy Condit, Feng Zhou, Geroge Necula and Eric Brewer University of California at Berkeley Presenter: Cong Lin Outline Part I Motivation
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationNetworks and distributed computing
Networks and distributed computing Abstractions provided for networks network card has fixed MAC address -> deliver message to computer on LAN -> machine-to-machine communication -> unordered messages
More informationMuch Faster Networking
Much Faster Networking David Riddoch driddoch@solarflare.com Copyright 2016 Solarflare Communications, Inc. All rights reserved. What is kernel bypass? The standard receive path The standard receive path
More informationDOT NET Syllabus (6 Months)
DOT NET Syllabus (6 Months) THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate Language (IL) Just- In- Time Compilation and CLS Disassembling.Net Application to IL
More informationFlash: an efficient and portable web server
Flash: an efficient and portable web server High Level Ideas Server performance has several dimensions Lots of different choices on how to express and effect concurrency in a program Paper argues that
More informationPaxos Replicated State Machines as the Basis of a High- Performance Data Store
Paxos Replicated State Machines as the Basis of a High- Performance Data Store William J. Bolosky, Dexter Bradshaw, Randolph B. Haagens, Norbert P. Kusters and Peng Li March 30, 2011 Q: How to build a
More informationLearn Well Technocraft
Getting Started with ASP.NET This module explains how to build and configure a simple ASP.NET application. Introduction to ASP.NET Web Applications Features of ASP.NET Configuring ASP.NET Applications
More informationMarkLogic Server. Database Replication Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 9 May, 2017 Last Revised: 9.0-3, September, 2017 Copyright 2017 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication
More informationAdvanced WCF 4.0 .NET. Web Services. Contents for.net Professionals. Learn new and stay updated. Design Patterns, OOPS Principles, WCF, WPF, MVC &LINQ
Serialization PLINQ WPF LINQ SOA Design Patterns Web Services 4.0.NET Reflection Reflection WCF MVC Microsoft Visual Studio 2010 Advanced Contents for.net Professionals Learn new and stay updated Design
More informationDistributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems Pre-Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2015 October 2, 2015 CS 417 - Paul Krzyzanowski 1 Selected Questions From Past Exams October 2, 2015 CS 417 - Paul Krzyzanowski
More information--Microsoft-- --Windows Phone--
--Microsoft-- --Windows Phone-- Microsoft Windows Phone Course 10553A: Fundamentals of XAML and Microsoft Expression Blend Course Outline Module 1: Binding in XAML This module familiarizes the students
More informationSEER: LEVERAGING BIG DATA TO NAVIGATE THE COMPLEXITY OF PERFORMANCE DEBUGGING IN CLOUD MICROSERVICES
SEER: LEVERAGING BIG DATA TO NAVIGATE THE COMPLEXITY OF PERFORMANCE DEBUGGING IN CLOUD MICROSERVICES Yu Gan, Yanqi Zhang, Kelvin Hu, Dailun Cheng, Yuan He, Meghna Pancholi, and Christina Delimitrou Cornell
More informationChallenges in building a DBMS Resource Advisor
Challenges in building a DBMS Resource Advisor Dushyanth Narayanan Microsoft Research Cambridge, UK dnarayan@microsoft.com Eno Thereska Carnegie Mellon University Pittsburgh, PA enothereska@cmu.edu Anastassia
More informationDeveloping Data Access Solutions with Microsoft Visual Studio 2010
Developing Data Access Solutions with Microsoft Visual Studio 2010 Course Code: 10265A; Five days; Instructor-Led About this Course In this course, experienced developers who know the basics of data access
More informationSTARCOUNTER. Technical Overview
STARCOUNTER Technical Overview Summary 3 Introduction 4 Scope 5 Audience 5 Prerequisite Knowledge 5 Virtual Machine Database Management System 6 Weaver 7 Shared Memory 8 Atomicity 8 Consistency 9 Isolation
More informationPERFORMANCE INVESTIGATION TOOLS & TECHNIQUES. 7C Matthew Morris Desynit
PERFORMANCE INVESTIGATION TOOLS & TECHNIQUES 7C Matthew Morris Desynit Desynit > Founded in 2001 > Based in Bristol, U.K > Customers worldwide > Technology Mix 2E/Plex Java &.Net Web & mobile applications
More informationIIS Installation for.net Application. Md. Saifullah Al Azad
IIS Installation for.net Application Md. Saifullah Al Azad Contents 1 Mimimal... 2 1.1 Common HTTP Features... 2 1.1.1 Static Content... 2 1.1.2 Default Document... 2 1.2 Application Development... 2 1.2.1
More informationShadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Shadow: Real Applications, Simulated Networks Dr. Rob Jansen Center for High Assurance Computer Systems Cyber Modeling and Simulation Technical Working Group Mark Center, Alexandria, VA October 25 th,
More informationDistributed traces modeling and critical path analysis
Distributed traces modeling and critical path analysis Progress Report Meeting December 6 th 2012 Francis Giraldeau francis.giraldeau@polymtl.ca Under the direction of Michel Dagenais DORSAL Lab, École
More informationReducing Network Contention with Mixed Workloads on Modern Multicore Clusters
Reducing Network Contention with Mixed Workloads on Modern Multicore Clusters Matthew Koop 1 Miao Luo D. K. Panda matthew.koop@nasa.gov {luom, panda}@cse.ohio-state.edu 1 NASA Center for Computational
More informationUsing the SDACK Architecture to Build a Big Data Product. Yu-hsin Yeh (Evans Ye) Apache Big Data NA 2016 Vancouver
Using the SDACK Architecture to Build a Big Data Product Yu-hsin Yeh (Evans Ye) Apache Big Data NA 2016 Vancouver Outline A Threat Analytic Big Data product The SDACK Architecture Akka Streams and data
More informationExokernel: An Operating System Architecture for Application Level Resource Management
Exokernel: An Operating System Architecture for Application Level Resource Management Dawson R. Engler, M. Frans Kaashoek, and James O'Tool Jr. M.I.T Laboratory for Computer Science Cambridge, MA 02139,
More informationMarkLogic Server. Database Replication Guide. MarkLogic 6 September, Copyright 2012 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 6 September, 2012 Last Revised: 6.0-1, September, 2012 Copyright 2012 MarkLogic Corporation. All rights reserved. Database Replication Guide 1.0 Database Replication
More informationLightstreamer. The Streaming-Ajax Revolution. Product Insight
Lightstreamer The Streaming-Ajax Revolution Product Insight 1 Agenda Paradigms for the Real-Time Web (four models explained) Requirements for a Good Comet Solution Introduction to Lightstreamer Lightstreamer
More informationSQL Replication Project Update. Presented by Steve Ives
SQL Replication Project Update Presented by Steve Ives SQL Replication Project Update Basic principles What, why, and how Project update What s new since the last conference Synergy App Reporting Analysis
More informationSlides on cross- domain call and Remote Procedure Call (RPC)
Slides on cross- domain call and Remote Procedure Call (RPC) This classic paper is a good example of a microbenchmarking study. It also explains the RPC abstraction and serves as a case study of the nuts-and-bolts
More informationRecovering Disk Storage Metrics from low level Trace events
Recovering Disk Storage Metrics from low level Trace events Progress Report Meeting May 05, 2016 Houssem Daoud Michel Dagenais École Polytechnique de Montréal Laboratoire DORSAL Agenda Introduction and
More informationVlad Vinogradsky
Vlad Vinogradsky vladvino@microsoft.com http://twitter.com/vladvino Commercially available cloud platform offering Billing starts on 02/01/2010 A set of cloud computing services Services can be used together
More informationCSE 544: Principles of Database Systems
CSE 544: Principles of Database Systems Anatomy of a DBMS, Parallel Databases 1 Announcements Lecture on Thursday, May 2nd: Moved to 9am-10:30am, CSE 403 Paper reviews: Anatomy paper was due yesterday;
More informationA Tracing Technique for Understanding the Behavior of Large-Scale Distributed Systems
A Tracing Technique for Understanding the Behavior of Large-Scale Distributed Systems Yuichi Bando NTT Software Innovation Center Who am I? Research engineer at NTT Software Innovation Center (SIC) SIC
More informationDeveloping Microsoft.NET Applications for Windows (Visual Basic.NET)
Developing Microsoft.NET Applications for Windows (Visual Basic.NET) Course Number: 2565 Length: 5 Day(s) Certification Exam This course will help you prepare for the following Microsoft Certified Professional
More informationReal-time for Windows NT
Real-time for Windows NT Myron Zimmerman, Ph.D. Chief Technology Officer, Inc. Cambridge, Massachusetts (617) 661-1230 www.vci.com Slide 1 Agenda Background on, Inc. Intelligent Connected Equipment Trends
More informationLight & NOS. Dan Li Tsinghua University
Light & NOS Dan Li Tsinghua University Performance gain The Power of DPDK As claimed: 80 CPU cycles per packet Significant gain compared with Kernel! What we care more How to leverage the performance gain
More informationWhite Paper. Major Performance Tuning Considerations for Weblogic Server
White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance
More informationPredictable Interrupt Management and Scheduling in the Composite Component-based System
Predictable Interrupt Management and Scheduling in the Composite Component-based System Gabriel Parmer and Richard West Computer Science Department Boston University Boston, MA 02215 {gabep1, richwest}@cs.bu.edu
More informationDistributed File Systems II
Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation
More informationMicrosoft_PrepKing_70-583_v _85q_By-Cath. if u wana pass the exam with good percentage dn follow this dump
Microsoft_PrepKing_70-583_v2011-11-25_85q_By-Cath Number: 70-583 Passing Score: 800 Time Limit: 120 min File Version: 2011-11-25 http://www.gratisexam.com/ Exam : Microsoft_PrepKing_70-583 Ver :2011-11-25
More information"Charting the Course... MOC A Developing Data Access Solutions with Microsoft Visual Studio Course Summary
Description Course Summary In this course, experienced developers who know the basics of data access (CRUD) in Windows client and Web application environments will learn to optimize their designs and develop
More informationCOURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES
ABOUT THIS COURSE In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students will also learn how to develop and deploy
More informationCourse Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services.
Course Outline Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your cloud applications. Lesson 1, Azure Services,
More informationPREDICTIVE DATACENTER ANALYTICS WITH STRYMON
PREDICTIVE DATACENTER ANALYTICS WITH STRYMON Vasia Kalavri kalavriv@inf.ethz.ch QCon San Francisco 14 November 2017 Support: ABOUT ME Postdoc at ETH Zürich Systems Group: https://www.systems.ethz.ch/ PMC
More informationOracle Database 11g: Real Application Testing & Manageability Overview
Oracle Database 11g: Real Application Testing & Manageability Overview Top 3 DBA Activities Performance Management Challenge: Sustain Optimal Performance Change Management Challenge: Preserve Order amid
More informationIsoStack Highly Efficient Network Processing on Dedicated Cores
IsoStack Highly Efficient Network Processing on Dedicated Cores Leah Shalev Eran Borovik, Julian Satran, Muli Ben-Yehuda Outline Motivation IsoStack architecture Prototype TCP/IP over 10GE on a single
More informationStateful Detection in High Throughput Distributed Systems
Stateful Detection in High Throughput Distributed Systems Gunjan Khanna, Ignacio Laguna, Fahad A. Arshad, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue
More informationInside Broker How Broker Leverages the C++ Actor Framework (CAF)
Inside Broker How Broker Leverages the C++ Actor Framework (CAF) Dominik Charousset inet RG, Department of Computer Science Hamburg University of Applied Sciences Bro4Pros, February 2017 1 What was Broker
More informationCourse Outline. Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led
Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led About this Course In this course, experienced developers who know the basics of data access (CRUD)
More informationAdvanced Computer Networks. End Host Optimization
Oriana Riva, Department of Computer Science ETH Zürich 263 3501 00 End Host Optimization Patrick Stuedi Spring Semester 2017 1 Today End-host optimizations: NUMA-aware networking Kernel-bypass Remote Direct
More informationRuntime Application Self-Protection (RASP) Performance Metrics
Product Analysis June 2016 Runtime Application Self-Protection (RASP) Performance Metrics Virtualization Provides Improved Security Without Increased Overhead Highly accurate. Easy to install. Simple to
More informationIOS: A Middleware for Decentralized Distributed Computing
IOS: A Middleware for Decentralized Distributed Computing Boleslaw Szymanski Kaoutar El Maghraoui, Carlos Varela Department of Computer Science Rensselaer Polytechnic Institute http://www.cs.rpi.edu/wwc
More informationReliable Computing I
Instructor: Mehdi Tahoori Reliable Computing I Lecture 9: Concurrent Error Detection INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the
More informationBarrelfish Project ETH Zurich. Message Notifications
Barrelfish Project ETH Zurich Message Notifications Barrelfish Technical Note 9 Barrelfish project 16.06.2010 Systems Group Department of Computer Science ETH Zurich CAB F.79, Universitätstrasse 6, Zurich
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More information10265: Developing Data Access Solutions with Microsoft Visual Studio 2010 Duration: 5 Days Method: Instructor-Led
10265: Developing Data Access Solutions with Microsoft Visual Studio 2010 Duration: 5 Days Method: Instructor-Led Course Description In this course, experienced developers who know the basics of data access
More informationProfiling of Data-Parallel Processors
Profiling of Data-Parallel Processors Daniel Kruck 09/02/2014 09/02/2014 Profiling Daniel Kruck 1 / 41 Outline 1 Motivation 2 Background - GPUs 3 Profiler NVIDIA Tools Lynx 4 Optimizations 5 Conclusion
More information[MS20487]: Developing Windows Azure and Web Services
[MS20487]: Developing Windows Azure and Web Services Length : 5 Days Audience(s) : Developers Level : 300 Technology : Cross-Platform Development Delivery Method : Instructor-led (Classroom) Course Overview
More informationMethod-Level Phase Behavior in Java Workloads
Method-Level Phase Behavior in Java Workloads Andy Georges, Dries Buytaert, Lieven Eeckhout and Koen De Bosschere Ghent University Presented by Bruno Dufour dufour@cs.rutgers.edu Rutgers University DCS
More informationSELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN
SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN Agenda Motivation Hierarchy of self-monitoring CPU profiling GC monitoring Heap analysis Deadlock detection 2 Agenda Motivation Hierarchy
More informationParallel Computing Trends: from MPPs to NoWs
Parallel Computing Trends: from MPPs to NoWs (from Massively Parallel Processors to Networks of Workstations) Fall Research Forum Oct 18th, 1994 Thorsten von Eicken Department of Computer Science Cornell
More informationIntel Threading Tools
Intel Threading Tools Paul Petersen, Intel -1- INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS,
More informationMastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500
Mastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500 Summary Each day there will be a combination of presentations, code walk-throughs, and handson projects. The final project
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Google* 정학수, 최주영 1 Outline Introduction Design Overview System Interactions Master Operation Fault Tolerance and Diagnosis Conclusions
More informationPath-based Macroanalysis for Large Distributed Systems
Path-based Macroanalysis for Large Distributed Systems 1, Anthony Accardi 2, Emre Kiciman 3 Dave Patterson 1, Armando Fox 3, Eric Brewer 1 mikechen@cs.berkeley.edu UC Berkeley 1, Tellme Networks 2, Stanford
More informationMySQL Performance Optimization and Troubleshooting with PMM. Peter Zaitsev, CEO, Percona
MySQL Performance Optimization and Troubleshooting with PMM Peter Zaitsev, CEO, Percona In the Presentation Practical approach to deal with some of the common MySQL Issues 2 Assumptions You re looking
More informationAdvanced Network Design
Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course
More informationExploring Alternative Routes Using Multipath TCP
Exploring Alternative Routes Using Multipath TCP 1/51 Exploring Alternative Routes Using Multipath TCP Stephen Brennan Case Western Reserve University June 5, 2017 Exploring Alternative Routes Using Multipath
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung ACM SIGOPS 2003 {Google Research} Vaibhav Bajpai NDS Seminar 2011 Looking Back time Classics Sun NFS (1985) CMU Andrew FS (1988) Fault
More informationNightStar. NightView Source Level Debugger. Real-Time Linux Debugging and Analysis Tools BROCHURE
NightStar Real-Time Linux Debugging and Analysis Tools Concurrent s NightStar is a powerful, integrated tool set for debugging and analyzing time-critical Linux applications. NightStar tools run with minimal
More informationImprove Web Application Performance with Zend Platform
Improve Web Application Performance with Zend Platform Shahar Evron Zend Sr. PHP Specialist Copyright 2007, Zend Technologies Inc. Agenda Benchmark Setup Comprehensive Performance Multilayered Caching
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung SOSP 2003 presented by Kun Suo Outline GFS Background, Concepts and Key words Example of GFS Operations Some optimizations in
More informationArchitectural Styles. Software Architecture Lecture 5. Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved.
Architectural Styles Software Architecture Lecture 5 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Object-Oriented Style Components are objects Data and associated
More informationSparrow. Distributed Low-Latency Spark Scheduling. Kay Ousterhout, Patrick Wendell, Matei Zaharia, Ion Stoica
Sparrow Distributed Low-Latency Spark Scheduling Kay Ousterhout, Patrick Wendell, Matei Zaharia, Ion Stoica Outline The Spark scheduling bottleneck Sparrow s fully distributed, fault-tolerant technique
More informationC# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop Spis treści
C# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop. 2016 Spis treści Preface xi 1. Introducing C# and the.net Framework 1 Object Orientation 1 Type Safety 2 Memory Management
More informationJava Performance: The Definitive Guide
Java Performance: The Definitive Guide Scott Oaks Beijing Cambridge Farnham Kbln Sebastopol Tokyo O'REILLY Table of Contents Preface ix 1. Introduction 1 A Brief Outline 2 Platforms and Conventions 2 JVM
More informationCopyright 2018, Oracle and/or its affiliates. All rights reserved.
Beyond SQL Tuning: Insider's Guide to Maximizing SQL Performance Monday, Oct 22 10:30 a.m. - 11:15 a.m. Marriott Marquis (Golden Gate Level) - Golden Gate A Ashish Agrawal Group Product Manager Oracle
More informationProcess Description and Control
Process Description and Control 1 Process:the concept Process = a program in execution Example processes: OS kernel OS shell Program executing after compilation www-browser Process management by OS : Allocate
More informationCS533 Modeling and Performance Evaluation of Network and Computer Systems
CS533 Modeling and Performance Evaluation of Network and Computer Systems Monitors (Chapter 7) 1 Monitors That which is monitored improves. Source unknown A monitor is a tool used to observe system Observe
More informationConcept: Traffic Flow. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig
Concept: Traffic Flow Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig 1 Passive measurement capabilities: Packet monitors Available data: All protocol information All content Possible analysis: Application
More informationClearSpeed Visual Profiler
ClearSpeed Visual Profiler Copyright 2007 ClearSpeed Technology plc. All rights reserved. 12 November 2007 www.clearspeed.com 1 Profiling Application Code Why use a profiler? Program analysis tools are
More informationSEDA: An Architecture for Well-Conditioned, Scalable Internet Services
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles
More informationWindows History 2009 Windows 7 2
Example: Windows 1 Windows History 2009 Windows 7 2 Features added Windows2000 additions Plug-and-play Network directory service New GUI Vista additions New GUI More focus on security clean-up the code
More informationFrom an open storage solution to a clustered NAS appliance
From an open storage solution to a clustered NAS appliance Dr.-Ing. Jens-Peter Akelbein Manager Storage Systems Architecture IBM Deutschland R&D GmbH 1 IBM SONAS Overview Enterprise class network attached
More informationDesigning Next Generation Data-Centers with Advanced Communication Protocols and Systems Services
Designing Next Generation Data-Centers with Advanced Communication Protocols and Systems Services P. Balaji, K. Vaidyanathan, S. Narravula, H. W. Jin and D. K. Panda Network Based Computing Laboratory
More informationASP.NET Using C# (VS2017)
ASP.NET Using C# (VS 2017) This five-day course provides a comprehensive and practical hands-on introduction to developing Web applications using ASP.NET and Visual Studio 2017. It includes an introduction
More informationBUILDING A SCALABLE MOBILE GAME BACKEND IN ELIXIR. Petri Kero CTO / Ministry of Games
BUILDING A SCALABLE MOBILE GAME BACKEND IN ELIXIR Petri Kero CTO / Ministry of Games MOBILE GAME BACKEND CHALLENGES Lots of concurrent users Complex interactions between players Persistent world with frequent
More informationArachne. Core Aware Thread Management Henry Qin Jacqueline Speiser John Ousterhout
Arachne Core Aware Thread Management Henry Qin Jacqueline Speiser John Ousterhout Granular Computing Platform Zaharia Winstein Levis Applications Kozyrakis Cluster Scheduling Ousterhout Low-Latency RPC
More informationPerformance Optimization for Informatica Data Services ( Hotfix 3)
Performance Optimization for Informatica Data Services (9.5.0-9.6.1 Hotfix 3) 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,
More informationDistributed Systems Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 2016 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 Question 1 Why does it not make sense to use TCP (Transmission Control Protocol) for the Network Time Protocol (NTP)?
More informationCh. 13: Measuring Performance
Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction
More informationCritically Missing Pieces on Accelerators: A Performance Tools Perspective
Critically Missing Pieces on Accelerators: A Performance Tools Perspective, Karthik Murthy, Mike Fagan, and John Mellor-Crummey Rice University SC 2013 Denver, CO November 20, 2013 What Is Missing in GPUs?
More informationLecture 5: Process Description and Control Multithreading Basics in Interprocess communication Introduction to multiprocessors
Lecture 5: Process Description and Control Multithreading Basics in Interprocess communication Introduction to multiprocessors 1 Process:the concept Process = a program in execution Example processes:
More informationINTRODUCTION TO.NET. Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.)
INTRODUCTION TO.NET Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate Language (IL) Just- In-
More informationHeckaton. SQL Server's Memory Optimized OLTP Engine
Heckaton SQL Server's Memory Optimized OLTP Engine Agenda Introduction to Hekaton Design Consideration High Level Architecture Storage and Indexing Query Processing Transaction Management Transaction Durability
More informationXen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila
Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation
More informationCloud Programming. Programming Environment Oct 29, 2015 Osamu Tatebe
Cloud Programming Programming Environment Oct 29, 2015 Osamu Tatebe Cloud Computing Only required amount of CPU and storage can be used anytime from anywhere via network Availability, throughput, reliability
More informationBig and Fast. Anti-Caching in OLTP Systems. Justin DeBrabant
Big and Fast Anti-Caching in OLTP Systems Justin DeBrabant Online Transaction Processing transaction-oriented small footprint write-intensive 2 A bit of history 3 OLTP Through the Years relational model
More information