Scaling for E-Business. Chapter 11 Characterizing E-Business Workloads

Size: px
Start display at page:

Download "Scaling for E-Business. Chapter 11 Characterizing E-Business Workloads"

Transcription

1 Scaling for E-Business Chapter 11 Characterizing E-Business Workloads

2 Overview Introduction Workload Characterization of Web Traffic Characterizing Customer Behavior From HTTP Logs to CBMGs GetSessions Algorithm GetCBMGs Algorithm How Many Clusters to Choose? From HTTP Logs to CVMs Resource Level Workload Characterization E-Business Benchmarks: TPC-W Concluding Remarks 2

3 Introduction Two models for customer behavior characterization are discussed in Chapter 2 Customer Behavior Model Graph (CBMG) Captures the navigational pattern of a customer during a visit to the site Customer Visit Model (CVM) Captures only the number of times a customer executes each of the e-business functions per session (less detailed) 3

4 Introduction (Cont) In this chapter, we show how CBMGs and CVMs can be obtained from HTTP logs methods, based on clustering analysis, to derive small groups of CBMGs or CVMs that accurately represent the workload how the parameters for the resource models (e.g., queuing network models) can be derived from customer behavior models 4

5 Workload Characterization of Web Traffic 5 Workload characterization studies suggested to detect invariants, i.e., regular and predictable patterns, of Web traffic from measurements taken at clients, proxy servers, servers, and the Web as a whole The focus of this chapter is on workload characterization for e-commerce, but it is important to review some of analysis results obtained from information retrieval Web servers

6 Workload Characterization of Web Traffic (Cont) The rank of the most popular document is one, the second most popular is two, and so on and so forth The file popularity was shown to follow a Zipf distribution, which means that the number of accesses, P, to a document is inversely proportional to the document rank r.so, P = k / r where k is a constant 6

7 Example 1 Workload Characterization of Web Traffic Question: The HTTP log of a Web site shows 1,800 requests for files during a five minute period. These requests are directed to 12 unique files. Assuming Zipf s Law, what is the estimated number of accesses to each of the 12 files? Solution: Let us number the files from 1 to 12 according to their rank (file 1: most popular; file 12: least popular) Let the number of accesses to file r is k / r 7

8 Example 1 (Cont) Workload Characterization of Web Traffic The total number of accesses can then be written as k (... ) 1, k ,800 8 Therefore, k = So, the estimated number of accesses to the most popular file is k/1 = 580 The estimated number of accesses to the least popular file is k/12 = /12 = 48

9 Example 1 (Cont) Workload Characterization of Web Traffic This figure shows how the number of references varies from the most to the least popular file 9

10 Workload Characterization of Web Traffic (Cont) 10 A heavy-tailed distribution for a random variable X is one in which the tail of the distribution, i.e., the probability that X >x, decreases with x -α for large value of x and for 0 < α < 2 Several empirical studies have found that many of the distributions related to Web traffic (e.g. distribution of file sizes retrieved from a Web server, reading time per page) are heavily-tailed

11 Workload Characterization of Web Traffic (Cont) 11 For these distributions, the probability that a large value occurs is small but non-negligible A good example of a heavy-tailed distribution is the Pareto distribution The cumulative distribution function (CDF) for the Pareto distribution is given by F( x) P[ X x] 1 ( ), k 0 And the tail of the distribution is given by P[ X x] k ( x ) k x

12 Workload Characterization of Web Traffic (Cont) On the Web, while most files retrieved from a Web server are small, there is a nonnegligible probability of large files (e.g., images and video clips) being retrieved The next example illustrates the properties of heavy-tailed distributions 12

13 Example 2 Workload Characterization of Web Traffic Suppose the HTTP log for a website was analyzed to estimate the distribution of the sizes of the files retrieved from the site Suppose that the file size X is distributed according to a Pareto distribution If we plot the logarithm of the tail of the distribution, i.e., log P [X > x], versus the logarithm of the file size, we obtain the straight line log P[ X x] log x log k 13

14 Example 2 (Cont) Workload Characterization of Web Traffic This figure shows such a log-log plot for α = 0.5 and k = 1 for a Pareto distribution 14

15 Example 2 (Cont) Workload Characterization of Web Traffic So, the logarithm of the tail of the distribution decreases linearly with the logarithm of the file size with a slope of -α This is a simple test for verifying that a distribution has heavy tail. If we get a straight line for large values of x, then we are dealing with a heavy-tailed distribution 15

16 Workload Characterization of Web Traffic (Cont) Some Web traffic features that were found to heavytailed include: the size of files requested from Web servers and from the entire Web the number of pages requested per site the reading time per page In many empirical studies, it has been demonstrated that small images account for the majority of the traffic and that document size is inversely related to request frequency 16

17 Workload Characterization of Web Traffic (Cont) HTTP traffic was shown to be self-similar, i.e., it exhibits similar patterns of burstiness across several time scales ranging from microseconds to minutes A summary of WWW characterization showed that 99% of the queries did not use any Boolean or other advanced operators 17

18 Workload Characterization of Web Traffic (Cont) A study looks at proxy server workloads in a cable modem environment 40% of the total size of the unique HTTP files retrieved is due to the presence of a few very large file types (e.g. audio, video, compressed, and executable) Due to the higher bandwidth of cable modems, users become more willing to download larger files. This poses additional stress on server resources 18

19 Workload Characterization of Web Traffic (Cont) The basic component for workloads of information retrieval websites is an individual HTTP request The remainder of this chapter deals with workload characterization methods for e- commerce sites. In this case, the basic component is a session 19

20 Characterizing Customer Behavior This navigational pattern includes 2 aspects: transitional: It determines how a customer moves from one state (i.e., an e-business function) to the next. This is represented by the matrix of transition probabilities temporal: It has to do with the time it takes for a customer to move from one state to the next. This time is measured from the server s perspective and is called server-perceived think time or just think time 20

21 Characterizing Customer Behavior (Cont) Server-perceived think time or just think time is defined as the average time elapsed since the server completes a request for a customer until it receives the next request from the same customer during the same session The server-side think time = t 3 - t 2 = 2 x nt + Z b, where nt represents the network time and Z b is the browser-side think time. A think time can be associated with each transition in the CBMB 21

22 Characterizing Customer Behavior (Cont) So, a CBMG can be defined by a pair (P,Z) where: P = [p i, j ] is an n x n matrix of transition probabilities between the n states of the CBMG Z = [z i, j ] is an n x n matrix that represents the average think times between the states of the CBMG Recall that state 1 is the Entry state and n is the Exit state 22

23 From HTTP Logs to CBMGs Each customer session can be represented by a CBMG We show here how: we can obtain the CBMGs that characterize customer sessions from HTTP logs we can group CBMGs that originate from similar sessions and represent each group by a CBMG The goal is to characterize the workload by a relatively small and representative number of CBMGs as opposed to having to deals with thousands of CBMGs 23

24 From HTTP Logs to CBMGs (Cont) Step 1 merge and filter HTTP logs from the various HTTP servers of the e-commerce site Step 3 takes as input the session log S and performs a clustering analysis that results in a set of CBMGs that can be used as a compact representation of the sessions in the log S Step 2 takes as input the request log and generates a session log S 24

25 From HTTP Logs to CBMGs (Cont) Step 1: Merge and filter HTTP logs from the various HTTP servers of the e-commerce site to discard irrelevant entries such as image requests, errors and others These logs can be merged into a single log using the timestamp. Clock synchronization services such as the ones available in Linux and NT can be used to facilitate merging of distributed logs. This step generates a request log L. 25

26 From HTTP Logs to CBMGs (Cont) The request log L is represented by a fourtuple (u,r,t,x) : UserID (u): identification of the customer submitting the request. Cookies, dynamic URLs, or even authentication mechanisms can be used to uniquely identifying requests as coming from the same browser during a session RequestTime (t): time at which the request arrived at the site 26

27 From HTTP Logs to CBMGs (Cont) ExecTime (x): execution time of the request. Even through this value is not normally recorded in the HTTP log, servers can be configured and/or modified to record this information RequestType (r): indicates the type of request. Examples include a GET on the home page, a browse request, a request to execute a search, a selection of one of results of a search and etc. It is assumed that requests to execute CGI scripts or other types of server applications can be easily mapped into request types, i.e., states of the CBMG 27

28 28 From HTTP Logs to CBMGs - GetSessions Algorithm Before describing the step GetSessions, we need to describe the session log S The k-th entry in this log is composed of two-tuple (C k,w k ) where C k = [c i,j ] is an n x n matrix of transition counts between state i and j of the CBMG for one session and W k = [w i,j ] is an n x n matrix fo accumulated think times between state i and j of the CBMG for one session Consider that for a given session, there were 3 transitions between state s and t and the think times for each of the transitions were 20 sec, 45 sec, and 38 sec, respectively. Then, c s,t = 3 and w i,j = = 103 sec

29 Building a CBMG Matrix P for the CBMG of the Bookstore Example A CBMG can be more formally characterized by a set of states, a set of transitions between states, and by an n x n matrix, P = [ p i,j ], of transition probabilities between the n states of the CBMG Note that elements of the first column and the last row for any CBMG are all zero since, by definition, there are no transitions back to the Entry state from any state nor any transition out of the Exit state 29

30 From HTTP Logs to CBMGs - GetSessions Algorithm (Cont) 1 Sort the request log L by UserID and then by RequestTime to generate a sorted log L s composed of subsequences, one per UserID, of the form: 2 Each subsequence may represent one or more sessions. For example, a customer may generate a sequence of requests and return to the site one hour later for another session. Thus, subsequences need to be broken into session using a time threshold T (e.g. 30 mins). 30

31 From HTTP Logs to CBMGs - GetSessions Algorithm (Cont) 2 If the time between 2 consecutive requests R 1 and R 2 in a subsequence exceed T, R 1 is considered to be the last request of a session and R 2 is the first of the following session 3 Subsequences are now broken down into sessions and requests within sessions are in chronological order. Let Q be the number of requests in a given session for UserID u and let (u,r 1,t 1,x 1 ),, (u,r Q,t Q,x Q ) be the requests of this session as they appear in the sorted log L s. 31

32 From HTTP Logs to CBMGs - GetSessions Algorithm (Cont) 3 Repeat the following procedure for each session 32

33 From HTTP Logs to CBMGs - GetSessions Algorithm (Cont) Some precautions in using HTTP logs: Recording request times with millisecond accuracy may not be sufficient as processors and networks become faster. For this reason, a higher precision timestamp was recorded in Apache s HTTP log in a capacity planning study You may want to clean the log from crawler activity. Having the browser identification recorded in the log is useful in this case Most proxy and origin servers record, by default, only a small portion of each HTTP request and/or response. However, most support an extend log format and can be configured to provide more information 33

34 From HTTP Logs to CBMGs - GetCBMGs Algorithm Once the session log S is generated, we need to perform a clustering analysis on it to generate a synthetic workload composed of a relatively small number of CBMGs The centroid of a cluster determines the characteristics of the CBMG Any type of clustering algorithms can be used An example of such an algorithm is the k- means clustering algorithm 34

35 From HTTP Logs to CBMGs - GetCBMGs Algorithm (Cont) The k-means clustering algorithm It begins by selecting k points in the space of points, which act as initial estimate of the centroids of the k clusters The remaining points are then allocated to the cluster with the nearest centroid The allocation procedure iterates several times over the input points until no point switches cluster assignment or a maximum number of iteration is performed 35

36 From HTTP Logs to CBMGs - GetCBMGs Algorithm (Cont) Clustering algorithms require a definition of a distance metric to be used in the computation of the distance between a point and a centroid Assume that the session log is composed of M points X m = (C m, W m ), m = 1, 2,, M where C m and W m are the transition count and accumulated think time matrices defined previously Our definition of distance is based on the transition count matrix only since this is a factor that more clearly defines the interaction between a customer and an e-commerce site 36

37 From HTTP Logs to CBMGs - GetCBMGs Algorithm (Cont) We define the distance d Xa, Xb between two points X a and X b in the session log as the Euclidean distance 37 d X a n n, X ( Ca[ i, j] Cb[ i, j]) b i 1 j 1 At any point during the execution of the k- means clustering algorithm we have k centroids The clustering algorithm needs to keep track of the number of points, s(k), represented by centroid k 2

38 From HTTP Logs to CBMGs - GetCBMGs Algorithm (Cont) 38 We show how the coordinates of a new centroid, i.e. the new values of the matrices C and W, are obtained when a new point is added to a cluster Suppose that point X m = (C m, W m ) is to be added to centroid k represented by point (C, W) The new centroid will be represented by the point (C,W ), where the elements of the matrices C and W are computed as 1 ) ( ], [ ], [ ) ( ], [ 1 ) ( ], [ ], [ ) ( ], [ k s j i W j W i k s j i W k s j i C j C i k s j i C m m

39 From HTTP Logs to CBMGs - GetCBMGs Algorithm (Cont) Normalizing: Once all the clusters have been obtained, we can derive the matrices P and Z, which characterize the CBMG associated with each cluster, as p z i, j i, j C[ i, W[ i, j]/ j]/ C[ i, C[ i, k] The arrival rate, ks, of sessions represented by the CBMG of cluster k is given by ks = s(k)/t, where T is the time interval during which the request log L was obtained Once we have the matrices P and Z for each cluster, we can obtain the metrics we discussed previously for each type of session n k 1 j] 39

40 Example 4 - From HTTP Logs to CBMGs Consider that an HTTP log was analyzed for an e- commerce site that has the following static CBMG The GetSessions algorithm generated 20,000 sessions out of the 340,000 lines in the request log 40

41 Example 4 (Cont) - From HTTP Logs to CBMGs After running the k-means clustering algorithm on the session log using k=6, we obtained the following six clusters It shows the buy to visit ratio (BV),which represents the percentage of customers who buys from the Web store It indicates the average number of shopper operations requested by a customer for each visit to the electronic store This row shows the percentage of sessions that fall into each cluster 41 The Add to Shopping Cart Visit Ratio (V a ), represents the average number of times per session that a customer adds an item to the shopping cart. The last row indicates the number of browse and search operations associated with customers of each cluster

42 Example 4 (Cont) - From HTTP Logs to CBMGs Two very different behavior patterns are noted from the above characterization of the e- commerce workload Cluster 1, which represents the majority of the sessions (44.28%), has a very short average session length (5.6) and the highest percentage of customers that buy from the store Cluster 6, which represents a small portion of the customers, exhibits the longest session length and the smallest buying ratio 42

43 Example 4 (Cont) - From HTTP Logs to CBMGs We plot the percentage of customers who buy as a function of the average session length For this example, we observe that the longer the session, the less likely it is for a customer to buy an item from the Web store. Moreover, the buy to visit decreases, in a quadratic fashion,with the session length 43

44 Example 4 (Cont) - From HTTP Logs to CBMGs An alternative approach to the one discussed previously is first partition the workload and then apply clustering techniques E.g., we may partition the HTTP log into sessions that resulted in sales and those that did not Then, we can apply clustering techniques to analyze separately the behavior of buyers and non-buyers This approach would have the advantage of giving a special treatment to buyers who typically constitute a small percentage of the sessions 44

45 How Many Clusters to Choosse? This question can be answered by examining the variation of two metrics: the average distance between points of a cluster and its centroid (the intracluster distance) the average distance between centroids (the intercluster distance) This variation can be characterized by the coefficient of variation (CV), i.e., the ratio between the average and the standard deviation Purpose: minimize the intracluster CV while maximize the intercluster CV 45

46 How Many Clusters to Choose? (Cont) 46 If the number of clusters is made equal to the number of points, we will have achieved the goal However, we want a compact representation of the workload. So, we need to select a relatively small number of clusters such that the intracluster variance is small and the intercluster variance is large The ratio between the intracluster and intercluster CV, denoted CV, is a useful guide in determining the quality of a clustering process

47 How Many Clusters to Choose? (Cont) Here plots the intercluster and intracluster coefficient of variation as well as CV versus the number of cluster k CV intra does not vary much with the number of clusters. On the other hand, CV inter increases with k CV drops significantly from k =3 to k =6 and then exhibits a much slower rate of decrease. 47

48 From HTTP Logs to CVMs Sessions represented by a CVM instead of a CBMG can be obtained from an HTTP log through the algorithm GetCVMSessions shown in next slide 48

49 From HTTP Logs to CVMs - GetCVMSessions algorithm 1 Execute steps 1 and 2 of the algorithm GetSessions 2 At this point, subsequences are broken down into sessions and requests within sessions are in chronological order. Let Q be the number of requests in a given session for UserID u and let (u,r 1,t 1,x 1 ),, (u,r Q,t Q,x Q ) be the requests of this session as they appear in the sorted log L s. Repeat the following procedure for each session V i V,V 1 0 For k 1 to Q do V n for all i 1; V r k r k 1; 2,...,n

50 From HTTP Logs to CVMs (Cont) 50 Again, as in the case of sessions characterized by CBMGs, we need to group sessions in smaller and representative groups Clustering techniques can also be applied here The distance metric is the distance between to visit ratio vectors Consider sessions a and b characterized by the visit ratio vectors V a =(V 2a,, V n-1a ) and V b =(V 2b,, V n-1b ). Note that we left out the visit ratios for states 1 and n. The distance between sessions A and B is d V a n 1 a b 2, V ( Vi Vi ) b i 2

51 From HTTP Logs to CVMs (Cont) Here shows the results of applying the k-means clustering algorithm for k = 2, 3 and 4 51 Cluster 4 in the k = 4 case captures the customers who do not buy anything from the site while cluster 1 represents people who always buy

52 Characterizing the Workload at the Resource Level To perform capacity planning and sizing studies of an e-commerce site, we need to map each CBMG resulting from the workload characterization process described above to IT resources With each server in the CSID, we associate service demands at the various components (e.g. CPU and disks) of the server An e-business function search is mapped to a CSID 52 To each arc of the CSID, we associate service demands for the networks involved in the exchange of messages represented by the arc

53 Example 5 - Characterizing the Workload at the Resource Level 53 The characterization of the customer behavior for an e-commerce site generated 2 CBMGs one characterizes heavy buyers, i.e., customers who will buy from the site with higher probability the other characterizes occasional buyers who tend to search more than heavy buyers and buy less Let us focus on the e-business function Search, which represents a state of the CBMG Assume that the database server (DS) has 1 CPU and 2 disks with service demands sec, sec, and sec, respectively, for one execution of the search transaction

54 Example 5 (Cont) - Characterizing the Workload at the Resource Level Here displays the session arrival rate for each of the two CBMGs and the average number of visits to the state Search for each one 54

55 Example 5 (Cont) - Characterizing the Workload at the Resource Level 55 Question: What is the service demand per session for Search functions at each component of the DS for each CBMG? What is the utilization of each resource of the database server due to the Search function? Solution: For occasional buyers, each session executes 6.7 searches on the average Each search uses sec of CPU at the database server

56 Example 5 (Cont) - Characterizing the Workload at the Resource Level So, the CPU service demand due to Search functions executed during sessions from occasional buyers is D CPU,OccasionalBuyers (Search) = 6.76 x = sec In general, the service demand at a resource i (e.g., CPU or disk) due to sessions of type r (e.g., heavy buyers, occasional buyers) for all executions of the e-business function f (e.g., Search, Browse) is D i,r (f) = V f,r x D i (f) the service demand of a single execution of function f at resource i 56 the average number of executions of function f per session of type r

57 Example 5 (Cont) - Characterizing the Workload at the Resource Level Let us now compute the utilizations. The utilization of a resource is equal of the product of the service demand at that resource multiplied by the throughput (or arrival rate in equilibrium) U i,r (f) = D i,r (f) x r (f) 57 The utilization of resource i due to the execution of function f for session of type r r (f) = r s x V f,r is the rate of execution of function f due to sessions of type r and in which rs is the arrival rate of sessions of type r

58 Example 5 (Cont) - Characterizing the Workload at the Resource Level OccasionalBuyers (Search) = 0.8 x 6.76 = searches/sec U CPU,OccasionalBuyers (Search) = x = = 21.93% The previous table shows the service demands and utilization for all resources and for the two types of CBMGs due to the execution of the Search It also presents the total utilization of each resource due to the Search function 58

59 E-Business Benchmarks: TPC-W 59 Accurate workload characterizations can be used to build benchmark suites that can be used to evaluate and compare competing systems Several workload generators exist for Web servers: Mindcraft s Webstone, SPEC s SPECWeb96 and SPECWeb99, and SURGE The Transaction Processing Performance Council (TPC) has just released TPC-W, the first benchmark aimed at evaluating sites that support e-business activities

60 TPC-W s Business Model A B2C e-tailer that sells products and services over the Internet The site provides e-business functions that: allow customers to browse through selected products (e.g.,best sellers or new products) search information on existing products see product detail place an order check the status of a previous order 60

61 TPC-W s Business Model (Cont) Interactions related to placing an order are encrypted through SSL with RSA, RC4 and MD5 as the cipher suites Customers need to register with the site before they are allowed to buy The site maintains a catalog of items that can be searched by a customer Each item has a description and a 5K-byte thumbnail image associated with it 61

62 TPC-W s Business Model (Cont) The site maintains a database with information about customers, items in the catalog, orders, and credit card transactions All database updates much have the ACID (Atomicity, Consistency, Isolation and Durability) property The size of the catalog is the major scalability parameter for TPC-W. The number of items in the catalog may be 1,000, 10,000, 100,000, 1,000,000, or 10,000,000 62

63 TPC-W s Customer Behavior Model TPC-W specifies that the activity with the site being benchmarked is driven by emulated browsers (EBs) These EBs generate Web interactions, which represents a complete cycle that starts when the EB selects a navigation option from the previously displayed page and ends when the request page has been completely received by the EB EBs engage in user sessions, i.e., sequences of Web interactions that start with an interaction to the home page 63

64 Customer Behavior Model Graph (CBMG) for TPC-W Notes: Interactions to inquire about the status of previous orders and site administrative interactions are left out. Also, the transitions to the Exit state are not shown explicitly Two types of browse interactions are grouped into the Browse state: - requests for best sellers - requests for new product information 64 The Entry state can only lead to the Home state, which can be reached from any other state Customers have to go through the Login state before they can the Buy Request state, in which a customer provides billing information (e.g. credit card and billing address information) and shipping address From the Buy Request state a customer can move to the Buy Confirm state which completes the buying process

65 TPC-W s Customer Behavior Model (Cont) TPC-W classifies Web interactions into 2 broad categories: Browse interactions involve browsing and searching but no product ordering activity. States of the CBMG that fall in this category are Home, Browse, Select, Product Detail, and Search Order interactions involve product ordering activities only and include the following states of the CBMG: Shopping Cart, Login, Buy Request, and Buy Confirm 65

66 TPC-W s Customer Behavior Model (Cont) 66 TPC-W specifies 3 different types of sessions according to the percentage of Browse and Order Web interactions found in each session Browsing mix: 95% of Browse Web interaction and 5% of Order Web interaction. The buy to visit ratio in these sessions is 0.69% Shopping mix: 80% of Browse Web interaction and 20% of Order Web interaction. The buy to visit ratio in these sessions is 1.2% Ordering mix: 50% of Browse Web interaction and 50% of Order Web interaction. The buy to visit ratio in these sessions is 10.18%

67 TPC-W Performance Metrics Two types of performance metrics for TPC-W: Throughput metric The main throughput metric is called WIPS (Web Interactions Per Second) and measures the average number of Web Interactions completed per second during an interval in which all the sessions are of the shopping type Another, called WIPSb, measures the average number of Web Interaction per second completed during an interval in which all sessions are of the browsing type Another, called WIPSo, measures the average number of Web Interaction per second completed during an interval in which all sessions are of the ordering type 67

68 TPC-W Performance Metrics (Cont) Cost / throughput metric The metric is $/WIPS and indicates the ratio between the total cost of the system under test and the number of WIPS measured during a shopping interval. Total cost includes purchase and maintenance costs for all hardware and software components for the system under test 68

69 Concluding Remarks 69 Workload characterization is the process of describing a workload by means of quantitative parameters in a way that captures the most important features of the workload A workload characterization can be static: describes the consumption of hardware and software resource or dynamic: consists of parameters related to the behavior of user requests We described dynamic workload models, in the form of CMBGs and CVMs, as well as the processes used to obtain these characterizations from HTTP logs

70 Concluding Remarks (Cont) These dynamic characterizations need to be mapped to resources at the IT level to generate a static workload description This is achieved by mapping customer behavior models to client/server interaction diagram (CSIDs) and obtaining the service demands at each of the servers and networks of the CSID Accurate workload characterization can be used to build benchmark suites that can be used to evaluate and compare competing systems 70

71 Concluding Remarks (Cont) The Transaction Processing Council (TPC) has released recently TPC-W, a benchmark for e- commerce sites engaged in B2C activities This benchmark is designed to mimic operations of an e-business site and it measures Web Interactions Per Second (WIPS) and cost/performance The transactions of the benchmark are designed to reproduce 5 types of operations: Browse, Shopping Cart, Buy (using SSL), Register, and Search 71

72 The End

TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2

TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2 TPC-W * : Benchmarking An Ecommerce Solution By Wayne D. Smith, Intel Corporation Revision 1.2 1 INTRODUCTION How does one determine server performance and price/performance for an Internet commerce, Ecommerce,

More information

Ranking Configuration Parameters in Multi-Tiered E-Commerce Sites

Ranking Configuration Parameters in Multi-Tiered E-Commerce Sites Ranking Configuration Parameters in Multi-Tiered E-Commerce Sites Monchai Sopitkamol 1 Abstract E-commerce systems are composed of many components with several configurable parameters that, if properly

More information

Server. Browser. rtt

Server. Browser. rtt A Methodology for Workload Characterization of E-commerce Sites Daniel A. Menascb Dept. of Computer Science George Mason University Fairfax, VA 22030 USA menasce@cs.gmu.edu Rodrigo Fonseca Dept. of Computer

More information

Capacity Planning: an Essential Tool for Managing Web Services

Capacity Planning: an Essential Tool for Managing Web Services Capacity Planning: an Essential Tool for Managing Web Services Virgílio Almeida i and Daniel Menascé ii Speed, around-the-clock availability, and security are the most common indicators of quality of service

More information

A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS

A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS 382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:

More information

TESTING E-COMMERCE SITE SCALABILITY WITH TPC-W

TESTING E-COMMERCE SITE SCALABILITY WITH TPC-W TESTIG E-COMMERCE SITE SCALABILITY WITH TPC-W Ronald C Dodge JR Daniel A. Menascé Daniel Barbará United States Army Dept. of Computer Science Dept. of Information and Software Engineering Fort Leavenworth,

More information

A Statistically Customisable Web Benchmarking Tool

A Statistically Customisable Web Benchmarking Tool Electronic Notes in Theoretical Computer Science 232 (29) 89 99 www.elsevier.com/locate/entcs A Statistically Customisable Web Benchmarking Tool Katja Gilly a,, Carlos Quesada-Granja a,2, Salvador Alcaraz

More information

Efficient Capacity Building and Network Marketing - A Regression Approach

Efficient Capacity Building and Network Marketing - A Regression Approach A Regression-Based Analytic Model for Capacity Planning of Multi-Tier Applications Qi Zhang 1 Ludmila Cherkasova 2 Ningfang Mi 3 Evgenia Smirni 3 1 Microsoft, One Microsoft Way, Redmond, WA 9852, USA 2

More information

AUTONOMIC MIX-AWARE PROVISIONING FOR NON- STATIONARY DATA CENTER WORKLOADS. Derek Bender

AUTONOMIC MIX-AWARE PROVISIONING FOR NON- STATIONARY DATA CENTER WORKLOADS. Derek Bender AUTONOMIC MIX-AWARE PROVISIONING FOR NON- STATIONARY DATA CENTER WORKLOADS Derek Bender PROBLEM Internet applications face spikes in varying types of workloads Flash crowds SLA violations due to under-provisioning

More information

Case Study I: A Database Service

Case Study I: A Database Service Case Study I: A Database Service Prof. Daniel A. Menascé Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html 1 Copyright Notice Most of the figures in this set of

More information

Network Performance Measurement and Analysis

Network Performance Measurement and Analysis Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview

More information

Predicting the QoS of an Electronic Commerce Server: Those Mean Percentiles

Predicting the QoS of an Electronic Commerce Server: Those Mean Percentiles Predicting the QoS of an Electronic Commerce Server: Those Mean Percentiles Diwakar Krishnamurthy and Jerome Rolia Systems and Computer Engineering, Carleton University, Ottawa, Canada, K1S 5B6 {diwa,jar}@sce.carleton.ca

More information

Benchmarks and Performance Tests

Benchmarks and Performance Tests Chapter 7 Benchmarks and Performance Tests 7.1 Introduction It s common sense everyone agrees that the best way to study the performance of a given system is to run the actual workload on the hardware

More information

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3 Table of Contents INTRODUCTION... 3 Prerequisites... 3 Audience... 3 Report Metrics... 3 IS MY TEST CONFIGURATION (DURATION / ITERATIONS SETTING ) APPROPRIATE?... 4 Request / Response Status Summary...

More information

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Business Application Services Testing

Business Application Services Testing Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load

More information

Improving the Performance of Online Auctions Through Server-side Activity-Based Caching

Improving the Performance of Online Auctions Through Server-side Activity-Based Caching Improving the Performance of Online Auctions Through Server-side Activity-Based Caching Daniel A. Menascé 1 and Vasudeva Akula 2 1 Department of Computer Science, George Mason University Fairfax, VA 22030,

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

Speed, around-the-clock availability, and

Speed, around-the-clock availability, and Capacity planning addresses the unpredictable workload of an e-business to produce a competitive and cost-effective architecture and system. Virgílio A.F. Almeida and Daniel A. Menascé Capacity Planning:

More information

Web Servers Outline. Chris Chin, Gregory Seidman, Denise Tso. March 19, 2001

Web Servers Outline. Chris Chin, Gregory Seidman, Denise Tso. March 19, 2001 Web Servers Outline Chris Chin, Gregory Seidman, Denise Tso March 19, 2001 I. Introduction A. What is a web server? 1. is it anything that can be retrieved with an URL? 2. (web service architecture diagram)

More information

Performance evaluation of Web Information Retrieval Systems and its application to e-business

Performance evaluation of Web Information Retrieval Systems and its application to e-business Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,

More information

Web Server Software Architectures

Web Server Software Architectures Web Server Software Architectures Author: Daniel A. Menascé Presenter: Noshaba Bakht Web Site performance and scalability 1.workload characteristics. 2.security mechanisms. 3. Web cluster architectures.

More information

Specification and Implementation of Dynamic Web Site Benchmarks. Sameh Elnikety Department of Computer Science Rice University

Specification and Implementation of Dynamic Web Site Benchmarks. Sameh Elnikety Department of Computer Science Rice University Specification and Implementation of Dynamic Web Site Benchmarks Sameh Elnikety Department of Computer Science Rice University 1 Dynamic Content Is Common 1 2 3 2 Generating Dynamic Content http Web Server

More information

Multimedia Caching Strategies for Heterogeneous Application and Server Environments

Multimedia Caching Strategies for Heterogeneous Application and Server Environments Multimedia Tools and Applications 4, 279 312 (1997) c 1997 Kluwer Academic Publishers. Manufactured in The Netherlands. Multimedia Caching Strategies for Heterogeneous Application and Server Environments

More information

Performance Testing Process A Whitepaper

Performance Testing Process A Whitepaper Process A Whitepaper Copyright 2006. Technologies Pvt. Ltd. All Rights Reserved. is a registered trademark of, Inc. All other trademarks are owned by the respective owners. Proprietary Table of Contents

More information

Energy Efficient MapReduce

Energy Efficient MapReduce Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

The Importance of Load Testing For Web Sites

The Importance of Load Testing For Web Sites of Web Sites Daniel A. Menascé George Mason University menasce@cs.gmu.edu Developers typically measure a Web application s quality of service in terms of response time, throughput, and availability. Poor

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

Jean Arnaud, Sara Bouchenak. Performance, Availability and Cost of Self-Adaptive Internet Services

Jean Arnaud, Sara Bouchenak. Performance, Availability and Cost of Self-Adaptive Internet Services Jean Arnaud, Sara Bouchenak Performance, Availability and Cost of Self-Adaptive Internet Services Chapter of Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions

More information

Test Run Analysis Interpretation (AI) Made Easy with OpenLoad

Test Run Analysis Interpretation (AI) Made Easy with OpenLoad Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult

More information

WebSphere Commerce V7.0

WebSphere Commerce V7.0 IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version

More information

Performance Issues of a Web Database

Performance Issues of a Web Database Performance Issues of a Web Database Yi Li, Kevin Lü School of Computing, Information Systems and Mathematics South Bank University 103 Borough Road, London SE1 0AA {liy, lukj}@sbu.ac.uk Abstract. Web

More information

CA Nimsoft Monitor. Probe Guide for Apache HTTP Server Monitoring. apache v1.5 series

CA Nimsoft Monitor. Probe Guide for Apache HTTP Server Monitoring. apache v1.5 series CA Nimsoft Monitor Probe Guide for Apache HTTP Server Monitoring apache v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information

R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads

R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads Qi Zhang 1, Ludmila Cherkasova 2, Guy Mathews 2, Wayne Greene 2, and Evgenia Smirni 1 1 College of

More information

ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS

ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS DATABASE MARKETING Fall 2015, max 24 credits Dead line 15.10. ASSIGNMENT 4 PREDICTIVE MODELING AND GAINS CHARTS PART A Gains chart with excel Prepare a gains chart from the data in \\work\courses\e\27\e20100\ass4b.xls.

More information

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject

More information

Characterizing Task Usage Shapes in Google s Compute Clusters

Characterizing Task Usage Shapes in Google s Compute Clusters Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang University of Waterloo qzhang@uwaterloo.ca Joseph L. Hellerstein Google Inc. jlh@google.com Raouf Boutaba University of Waterloo rboutaba@uwaterloo.ca

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Performance Analysis: Benchmarking Public Clouds

Performance Analysis: Benchmarking Public Clouds Performance Analysis: Benchmarking Public Clouds Performance comparison of web server and database VMs on Internap AgileCLOUD and Amazon Web Services By Cloud Spectator March 215 PERFORMANCE REPORT WEB

More information

A Task-Based Adaptive-TTL approach for Web Server Load Balancing *

A Task-Based Adaptive-TTL approach for Web Server Load Balancing * A Task-Based Adaptive-TTL approach for Web Server Load Balancing * Devarshi Chatterjee Zahir Tari RMIT University School of Computer Science and IT Melbourne, Australia zahirt@cs cs.rmit.edu.au * Supported

More information

Providing TPC-W with web user dynamic behavior

Providing TPC-W with web user dynamic behavior Providing TPC-W with web user dynamic behavior Raúl Peña-Ortiz, José A. Gil, Julio Sahuquillo, Ana Pont Departament d Informàtica de Sistemes i Computadors (DISCA) Universitat Politècnica de València Valencia,

More information

Electronic Commerce Engineering

Electronic Commerce Engineering 219322 Electronic Commerce Engineering Lecture 4 Laudon & Traver: Chapter 4 Building an E-commerce Web Site Copyright 2007 Pearson Education, Inc. Slide 4-1 Building an E-commerce Site: A Systematic Approach

More information

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved. Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication

More information

Ready Time Observations

Ready Time Observations VMWARE PERFORMANCE STUDY VMware ESX Server 3 Ready Time Observations VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified

More information

WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance

WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance G. Ruffo, R. Schifanella, and M. Sereno Dipartimento di Informatica Università degli Studi di Torino Corso Svizzera, 185-10149

More information

How To Model A System

How To Model A System Web Applications Engineering: Performance Analysis: Operational Laws Service Oriented Computing Group, CSE, UNSW Week 11 Material in these Lecture Notes is derived from: Performance by Design: Computer

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Measurement and Modelling of Internet Traffic at Access Networks

Measurement and Modelling of Internet Traffic at Access Networks Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,

More information

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012 Load Test Results for Submit and Approval Phases of Request Life Cycle Table of Contents Executive Summary 3 Test Environment 4 Server

More information

CS 147: Computer Systems Performance Analysis

CS 147: Computer Systems Performance Analysis CS 147: Computer Systems Performance Analysis CS 147: Computer Systems Performance Analysis 1 / 39 Overview Overview Overview What is a Workload? Instruction Workloads Synthetic Workloads Exercisers and

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Association of System Performance Professionals The Computer Measurement Group, commonly called CMG, is a not for profit, worldwide organization of data processing professionals committed to the measurement

More information

Clustering UE 141 Spring 2013

Clustering UE 141 Spring 2013 Clustering UE 141 Spring 013 Jing Gao SUNY Buffalo 1 Definition of Clustering Finding groups of obects such that the obects in a group will be similar (or related) to one another and different from (or

More information

PERFORMANCE ANALYSIS OF WEB SERVERS Apache and Microsoft IIS

PERFORMANCE ANALYSIS OF WEB SERVERS Apache and Microsoft IIS PERFORMANCE ANALYSIS OF WEB SERVERS Apache and Microsoft IIS Andrew J. Kornecki, Nick Brixius Embry Riddle Aeronautical University, Daytona Beach, FL 32114 Email: kornecka@erau.edu, brixiusn@erau.edu Ozeas

More information

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1 Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System

More information

Improving Scalability for Citrix Presentation Server

Improving Scalability for Citrix Presentation Server VMWARE PERFORMANCE STUDY VMware ESX Server 3. Improving Scalability for Citrix Presentation Server Citrix Presentation Server administrators have often opted for many small servers (with one or two CPUs)

More information

Load Testing and Monitoring Web Applications in a Windows Environment

Load Testing and Monitoring Web Applications in a Windows Environment OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows

More information

Autonomic Mix-Aware Provisioning for Non-Stationary Data Center Workloads

Autonomic Mix-Aware Provisioning for Non-Stationary Data Center Workloads Autonomic Mix-Aware Provisioning for Non-Stationary Data Center Workloads Rahul Singh, Upendra Sharma, Emmanuel Cecchet, Prashant Shenoy Department of Computer Science, University of Massachusetts Amherst

More information

Web Application s Performance Testing

Web Application s Performance Testing Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing

More information

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

More information

Web Performance Modeling Issues

Web Performance Modeling Issues Web Performance Modeling Issues Daniel A. Menascé Department of Computer Science, MS 4A5 George Mason University Fairfax, VA 22030-4444 USA http://www.cs.gmu.edu/faculty/menasce.html Abstract The web has

More information

UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE INSTITUTE OF COMPUTER SCIENCE

UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE INSTITUTE OF COMPUTER SCIENCE UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE INSTITUTE OF COMPUTER SCIENCE Yuliya Brynzak Probabilistic Performance Testing of Web Applications Master s Thesis (30 EAP) Supervisor: Dr.

More information

The PageRank Citation Ranking: Bring Order to the Web

The PageRank Citation Ranking: Bring Order to the Web The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized

More information

Cumulative Diagrams: An Example

Cumulative Diagrams: An Example Cumulative Diagrams: An Example Consider Figure 1 in which the functions (t) and (t) denote, respectively, the demand rate and the service rate (or capacity ) over time at the runway system of an airport

More information

Fixed Price Website Load Testing

Fixed Price Website Load Testing Fixed Price Website Load Testing Can your website handle the load? Don t be the last one to know. For as low as $4,500, and in many cases within one week, we can remotely load test your website and report

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

Characterization of E-Commerce Traffic

Characterization of E-Commerce Traffic Characterization of E-Commerce Traffic Udaykiran Vallamsetty Advanced Micro Devices Sunnyvale, CA 9486 uday.vallamsetty@amd.com Krishna Kant Intel Corporation Hillsboro, OR 97124 krishna.kant@intel.com

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998 Oracle Applications Release 10.7 NCA Network Performance for the Enterprise An Oracle White Paper January 1998 INTRODUCTION Oracle has quickly integrated web technologies into business applications, becoming

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...

More information

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet

More information

Storage I/O Control: Proportional Allocation of Shared Storage Resources

Storage I/O Control: Proportional Allocation of Shared Storage Resources Storage I/O Control: Proportional Allocation of Shared Storage Resources Chethan Kumar Sr. Member of Technical Staff, R&D VMware, Inc. Outline The Problem Storage IO Control (SIOC) overview Technical Details

More information

Medical Information Management & Mining. You Chen Jan,15, 2013 You.chen@vanderbilt.edu

Medical Information Management & Mining. You Chen Jan,15, 2013 You.chen@vanderbilt.edu Medical Information Management & Mining You Chen Jan,15, 2013 You.chen@vanderbilt.edu 1 Trees Building Materials Trees cannot be used to build a house directly. How can we transform trees to building materials?

More information

Recommendations for Performance Benchmarking

Recommendations for Performance Benchmarking Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best

More information

Using Simulation Modeling to Predict Scalability of an E-commerce Website

Using Simulation Modeling to Predict Scalability of an E-commerce Website Using Simulation Modeling to Predict Scalability of an E-commerce Website Rebeca Sandino Ronald Giachetti Department of Industrial and Systems Engineering Florida International University Miami, FL 33174

More information

MS SQL Performance (Tuning) Best Practices:

MS SQL Performance (Tuning) Best Practices: MS SQL Performance (Tuning) Best Practices: 1. Don t share the SQL server hardware with other services If other workloads are running on the same server where SQL Server is running, memory and other hardware

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Data Mining Clustering (2) Sheets are based on the those provided by Tan, Steinbach, and Kumar. Introduction to Data Mining

Data Mining Clustering (2) Sheets are based on the those provided by Tan, Steinbach, and Kumar. Introduction to Data Mining Data Mining Clustering (2) Toon Calders Sheets are based on the those provided by Tan, Steinbach, and Kumar. Introduction to Data Mining Outline Partitional Clustering Distance-based K-means, K-medoids,

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Load balancing as a strategy learning task

Load balancing as a strategy learning task Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load

More information

Profiling services for resource optimization and capacity planning in distributed systems

Profiling services for resource optimization and capacity planning in distributed systems Cluster Comput (2008) 11: 313 329 DOI 10.1007/s10586-008-0063-x Profiling services for resource optimization and capacity planning in distributed systems Guofei Jiang Haifeng Chen Kenji Yoshihira Received:

More information

Summary of Results. NGINX SSL Performance

Summary of Results. NGINX SSL Performance NGINX SSL NGINX is commonly used to terminate encrypted SSL and TLS connections on behalf of upstream web and application servers. SSL termination at the edge of an application reduces the load on internal

More information

InfiniteGraph: The Distributed Graph Database

InfiniteGraph: The Distributed Graph Database A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086

More information

Procedure for Marine Traffic Simulation with AIS Data

Procedure for Marine Traffic Simulation with AIS Data http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 9 Number 1 March 2015 DOI: 10.12716/1001.09.01.07 Procedure for Marine Traffic Simulation with

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Virtuoso and Database Scalability

Virtuoso and Database Scalability Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect of

More information

A Web Performance Testing Model based on Accessing Characteristics

A Web Performance Testing Model based on Accessing Characteristics Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore A Web Performance Testing Model based on Accessing Characteristics

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html

Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Performance And Scalability In Oracle9i And SQL Server 2000

Performance And Scalability In Oracle9i And SQL Server 2000 Performance And Scalability In Oracle9i And SQL Server 2000 Presented By : Phathisile Sibanda Supervisor : John Ebden 1 Presentation Overview Project Objectives Motivation -Why performance & Scalability

More information

Serving 4 million page requests an hour with Magento Enterprise

Serving 4 million page requests an hour with Magento Enterprise 1 Serving 4 million page requests an hour with Magento Enterprise Introduction In order to better understand Magento Enterprise s capacity to serve the needs of some of our larger clients, Session Digital

More information