Web Application Scalability: A Model-Based Approach

Size: px
Start display at page:

Download "Web Application Scalability: A Model-Based Approach"

Transcription

1 Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research 264 Ridgeview Lane Boulder, Colorado 832 (33) boulderlgw@aol.com Connie U. Smith, Ph.D. Performance Engineering Services PO Box 264 Santa Fe, New Mexico, (55) htt:// Scalability is one of the most imortant quality attributes of today s software systems. Yet, desite its imortance, scalability in alications is oorly understood. This aer resents a model-based view of scalability in Web and other distributed alications that is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. We review four models of scalability and show how they relate to Web and other distributed alications. The alicability of these models is demonstrated with a case study. INTRODUCTION Web and other distributed software systems are increasingly being deloyed to suort key asects of businesses including sales, customer relationshi management (CRM), and data rocessing. Examles include: online shoing, rocessing insurance claims, and rocessing financial trades. Many of these systems are deloyed on the Web or on dedicated networks using Web technologies such as J2EE. As these businesses grow, the systems thauort their functions also need to grow to suort more users, rocess more data, or both. As they grow, it is imortant to maintain their erformance (resonsiveness or throughut) [Smith and Williams 22]. Poor erformance in these alications often translates into substantial costs. Customers will often sho elsewhere rather than endure long waits. Slow resonses in CRM alications mean that more customer-service reresentatives are needed. And, failure to rocess financial trades in a timely fashion can result in statutory enalties as well as lost customers. These forces combine to make scalability one of the most imortant quality attributes of today s software systems. Yet, desite its imortance, scalability in alications is oorly understood and there is no generally acceted definition of scalability. In this aer, we will use the following definition: Scalability is a measure of an alication system s ability to without modification cost-effectively rovide increased throughut, reduced resonse time and/or suort more users when hardware resources are added. Scalability is a system roerty. The software architecture is a key factor in determining scalability. For examle, if the software architecture is not able to use additional resources to increase throughut the system will not be scalable. The choice of execution environment is also very imortant. As we will see, the same workload executed on two different latforms can exhibiignificantly differencalability roerties. Scalability in Web and other distributed systems is a comlex roblem. Removing a bottleneck changes the dynamics of the system and a different bottleneck may emerge to imose new limitations on the scalability. Thus, it is necessary to reevaluate the behavior of the system after making changes. This aer resents a model-based view of scalability in Web and other distributed alications. It is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. It reviews revious work on scalability and shows how it relates to distributed Web alications. This aer also rovides a simle demonstration that extraolations of near-linear results are likely to overestimate scalability. Finally, it offers a reformulation of Gustafson s Law that is more aroriate for evaluating Web alication scalability and demonstrates that this law is alicable to some Web alications. The analyses described here are art of the PASA SM aroach to the erformance assessment of software architectures [Williams and Smith 22]. They are emloyed in situations where scalability is a concern

2 and where the required measurements can be obtained. We begin with a motivating examle followed by a review of scalability measures and models. A simle case study then illustrates how these models aly to Web alications. MOTIVATION Consider the following data (ublished on the Web) for horizontal scalability of a samle alication develoed using commercial Web server software. Table : Horizontal Scaling Data Number of Nodes Transactions er Second The reort also contains the statement: Multile Web servers scale near-linearly (8 9%) at this level using [Product X]. While this statement is, at a casual glance, true it is also otentially dangerously misleading. A straightforward extraolation to higher numbers of rocessors would give the scalability shown by the dashed line in Figure. Throughut 2,,5, Number of Nodes Figure : Extraolated Scaling This tye of extraolation is all too common in our exerience. However, as we will see, the actual scalability of this system is more likely to follow the solid curve. The difference between these two redictions is significant. It could mean the difference between successful deloyment of the alication and financial disaster. This examle underscores the imortance of obtaining a thorough understanding of the scalability characteristics of a system before committing resources to its exansion. One way to accomlish this is to determine through analysis of measured data whether the behavior of the system fits that of a known model of scalability. Once there is a degree of confidence in how well a model describes the system, extraolations such as the one above become less risky. SPEEDUP AND SCALEUP Seedu is a measure of the reduction in time required to execute a fixed workload as a result of adding resources such as rocessors or disks. Seedu is the most common metric for evaluating arallel algorithms and architectures. Scaleu, on the other hand, is a measure of the increase in the amount of work that can be done in a fixed time as a result of adding resources. Scaleu is a more relevant metric for Web alications where the rincial concern is whether we can rocess more transactions or suort more users as we add resources. Although they might aear to be very different metrics, seedu and scaleu are really two sides of the same coin. Clearly, if we can execute a transaction more quickly, we can execute more transactions in a given amount of time. More formally, the seedu is given by: S ( ) T = T ( ) where T() is the time required to erform the work with one rocessor and T() is the time required to erform the same amount of work with rocessors. Scaleu may be exressed as a ratio of the caacity with rocessors to the caacity with one rocessor. This ratio is sometimes known as the scaling factor. It has also been called the relative caacity, C() [Gunther 2]. If we use the maximum throughut as a measure of the caacity, we can exress the scaling factor or relative caacity as: C ( ) = where () is the maximum caacity with one rocessor and () is the maximum caacity with rocessors. Since the maximum throughut of a system is equal to the inverse of the demand at the bottleneck resource [Jain 99], we have: C ( ) D b = = D b The demand at a resource is the total time t b required to execute the workload at that resource (i.e., visits x service time). Thus, if we aroximate the behavior of 2

3 the system by a single queue/server reresenting the bottleneck device, we can write: global state. These factors cause the relative caacity to increase more slowly than linearly. C ( ) D b t b = = = S ( ) D b t b While this aroximation should be verified (see the case study below), it is a good one in most cases. We will use C() as a measure of the scalability of the system. Once the function (model) describing C() has been determined, the throughut of the system with rocessors can be obtained by multilying () by C(). CATEGORIES OF SCALABILITY We will categorize the scalability of a system based on the behavior of C(). This classification scheme is similar to that roosed by Alba for seedu in arallel evolutionary algorithms [Alba 22]. The categories are: Linear the relative caacity is equal to the number of rocessors,, i.e., C() =. Sub-linear the relative caacity with rocessors is less than, i.e., C() <. Suer-linear the relative caacity with rocessors is greater than, i.e., C() >. Linear Scalability Linear scalability can occur if the degree of arallelism in the alication is such that it can make full use of the additional resources rovided by scaling. For examle, if the alication is a data acquisition system that receives data from multile sources, rocesses it and reares it for additional downstream rocessing, it may be ossible to run multile streams in arallel to increase caacity. In order for this alication to scale linearly, the streams must not interfere with each other (for examle via contention for database or other shared resources) or require a shared state. Either of these conditions will reduce the scalability below linear. Sub-Linear Scalability Sub-linear scalability occurs when the system is unable to make full use of the additional resources. This may be due to roerties of the alication software, for examle if delays waiting for a software resource such as a database lock revent the software from making use of additional rocessors. It may also be due to roerties of the execution environment that reduce the rocessing ower of additional rocessors, for examle overhead for scheduling, contention among rocessors for shared resources such as the system bus or communication among rocessors to maintain a 3 Suer-Linear Scalability At first glance, suer-linear scalability would seem to be imossible a violation of the laws of thermodynamics. After all, isn t it imossible to get more out of a machine than you ut in? If so, how can we more than double the throughut of a comuter system by doubling the number of rocessors? The fact is, however, thauer-linear scalability is a real henomenon. The easiest way to see how this comes about is to recognize that, when we add a rocessor to a system, we are sometimes adding more than just a CPU. We often also add additional memory, disks, network interconnects, and so on. This is esecially true when exanding clusters. Thus, we are adding more than just rocessing ower and this is why we may realize more than linear scaleu. For examle, if we also add memory when we add a rocessor, it may be ossible to cache data in main memory and eliminate database queries to retrieve it. This will reduce the demand on the rocessors, resulting in a scaleu that is more than can be accounted for by the additional rocessing ower alone. The nexection discusses several models that exhibit these categories of behavior. MODELS OF SCALABILITY This section discusses four models of scalability:. Linear scalability 2. Amdahl s law 3. Suer-Serial Model 4. Gustafson s Law The Suer-Serial Model is an extension of Amdahl s Law and has aeared in the context of on-line transaction rocessing (OLTP) systems [Gunther 2], in beowulf-style clusters of comuters [Brown 23] and others. The other three were develoed in the context of seedu for arallel algorithms and architectures. Amdahl s Law and the Suer-Serial Model, describe sub-linear scalability. Gustafson s Law, describes suer-linear scalability. These models were develoed in a different context, but as we illustrate they aly to Web alications. Other models of scalability, such as memory-bounded seedu [Sun and Ni 993], are available but are beyond the scoe of this aer. Linear Scalability With linear scalability the relative caacity, C(), is equal to the number of rocessors,.

4 C L = For a system thacales linearly, a grah of C() versus is a straight line with a sloe of one and a y-intercet of zero [C()=]. Figure 2 shows a grah of Equation. Seedu = S T A = = T ( ) S A = t s t = t t + t t σ + π Relative Caacity (C ( )) Number of Processors ( ) Here, σ is the fraction of the time sent on the sequential arts of the rogram and π is the fraction of time sent on the arts of the rogram that can be executed in arallel. Since π = σ: S A = σ( ) Or, using the equivalence between seedu and scaleu, Figure 2: Linear Scalability Note that our definition of C() does not allow for linear scalability with a sloe that is not equal to one, i.e. C() = k where k. If this were ossible, C() could be different from one. But, since C = = C A = σ( ) If σ = (i.e., no ortion of the workload is executed sequentially), Amdahl s Law redicts unlimited linear scaleu (i.e., C A () = ). For non-zero values of σ, the scaleu will be less than linear. Figure 3 shows a comarison of linear scalability with Amdahl s Law scalability for σ =.2. 2 k must be equal to one. This means that both sub-linear and suer-linear scalability must, in fact, be described by non-linear functions. While measurements amall numbers of rocessors may aear to be linear, measurements at higher numbers of rocessors will reveal the non-linearity. This also means that linear extraolations of near-linear results, such as that in our oening examle, can be misleading. Since the actual function is necessarily non-linear, these extraolations will overestimate the scalability of the system if the sloe of the extraolated line is less than one and underestimate it if the sloe is greater than one. Amdahl s Law Amdahl s Law [Amdahl 967] states that the maximum seedu obtainable from an infinite number of rocessors is /σ where σ is the fraction of the work that must be erformed sequentially. If is the number of rocessors, is the time sent by a sequential rocessor on the sequential arts of the rogram, and t is the time sent by a sequential rocessor on the arts of the rogram that can be executed in arallel, we can write the Seedu for Amdahl s Law, S A : Relative Caacity (C ( )) Number of Processors ( ) Linear Amdahl's Law σ =.2 Figure 3: Amdahl s Law versus Linear Scalability The maximum seedu that can be obtained, even using an infinite number of rocessors is: lim S A This means that, if the serial fraction of the workload is.2, the maximum seedu that can be achieved is 5 and it will take an infinite number of rocessors to achieve that! Amdahl s argument was that, given this limitation, a fasingle-rocessor machine is more cost-effective than a multirocessor machine. As Figure 3 shows, there are diminishing returns for adding more rocessors. The enalty increases as σ = -- σ 4

5 increases. For σ=.2, Amdahl s Law redicts that adding a second rocessor will yield a relative caacity of.67. That is, the maximum throughut with two rocessors will be.67 times that with one rocessor. If, instead of adding a second rocessor, we relace the single rocessor with one twice as fast, the throughut will then be exactly twice that with the slower rocessor. This is because the faster rocessor reduces the time required for both the serial and arallel ortions of the workload. Because of this, it is generally more costeffective to use a faster single rocessor than to add rocessors to achieve increased throughut in cases where Amdahl s Law alies. Suer-Serial Model Gunther [Gunther 2] oints out that Amdahl s Law may be otimistic in cases where there is interrocessor communication, for examle to maintain cache consistency among rocessors. In these cases if, when an udate is needed, a rocessor sequentially sends udates to each of the other rocessors and the time required to rocess and send a message is t c, we have the suer-serial caacity for rocessors, C S (): C S = T = T ( ) Or, after some algebra: C S where γ is the fraction of the serial work that is used for interrocessor communication. This result is identical to the Amdahl s Law result with an extra term in the denominator for overhead due to interrocessor communication. Gunther has called Equation 3 the Suer- Serial Model [Gunther 2]. The term in Equation 3 that contains γ grows as the square of the number of rocessors. This means that, even if the overhead for interrocessor communication is small, as the number of rocessors increases, the communication overhead will eventually cause C() to reach a maximum and then decrease. Figure 4 shows a comarison of Equation 3 for σ =.2 and various values of γ with linear scalability and Amdahl s Law. Gustafson s Law For certain alications, it was found thaeedus greater than that redicted by Amdahl s Law are ossible. For examle, some scientific alications were found to undergo a seedu of more than, on a,24 rocessor hyercube. Gustafson [Gustafson 988] noted that Amdahl s Law assumes that the arallel fraction of the alication (π = σ) is constant, i.e., indeendent of the number of rocessors. Yet, in many + t t + t c ( ) = σ[ ( ) + γ ( ) ] 3 5 Relative Caacity (C ( )) Number of Processors ( ) Figure 4: Suer-Serial Model σ =.2, γ = σ =.2, γ =. σ =.2, γ =.5 σ =.2, γ =. cases, the amount of arallel work increases in resonse to the resence of additional comutational resources but the amount of serial work remains constant. For examle, with more comuting ower, matrix maniulations can be erformed on larger matrices in the same amount of time. In these cases, π (and, therefore, σ) is actually a function of the number of rocessors. If and t are the times required to execute the serial and arallel ortions of the workload on a arallel system with rocessors, a sequential rocessor would require a time of + (t x ) to erform the same work. Gustafson termed this scaled seedu which is described in the following equations: t Scaled Seedu S s + ( t ) = G = S G = + σ ( ) where σ is the serial fraction of the work erformed on rocessors. Equation 4 is known as Gustafson s Law or the Gustafson-Barsis Law. Gustafson s Law describes fixed-time seedu while Amdahl s Law describes fixed-size seedu. As with Amdahl s Law, Gustafson s Law also alies to scalability. We can not use the formulation in Equation 4 directly, however. Equation 4 describes the seedu as the ratio of the time required to execute the workload on a system with rocessors to that required to execute the same amount of work on a single rocessor. This is not a ratio that is likely to be measured, however. We are more likely to have measurements of the maximum throughut at various numbers of rocessors. Thus, to use Gustafson s Law for web alication scalability, we need to exress it in terms of C(), the ratio of the maximum throughut with rocessors to the maximum throughut with one rocessor. t 4

6 The demand with one rocessor is () + t () and the maximum throughut is therefore: = t Gustafson s Law assumes that the arallel ortion of the workload increases as the number of rocessors. Thus, the total demand with rocessors is () +(t () x ). However, this demand is sread over rocessors, so the average demand er rocessor is: D b + ( t ) = Note that the average demand er rocessor is a decreasing function of. This is because only one rocessor can execute the serial ortion of the workload. If the degree of arallelism is such that the alication is able to make use of this additional caacity, each rocessor beyond one will be able to execute more arallel work than t(), resulting in suer-linear scaling. This can occur in Web alications when loading a age results in multile concurrent requests from the client to retrieve information, such as gifs and other age elements. Additional rocessors enable those requests to execute in arallel. Under these conditions, the average maximum throughut er rocessor is: = = D b ( t ) and the maximum throughut for rocessors is: Using these results, we can write the relative caacity for Gustafson s Law as: C G where σ () is the serial fraction of the work with one rocessor. As the value of σ () aroaches zero, this function aroaches linear scalability. In fact, for small values of σ (), Equation 5 is difficult to distinguish from linear scalability. With non-zero values of σ (), the second term in the denominator is negative for values of greater than one, however. This means that C() will increase faster than giving suer-linear scalability. 2 = ( t ) 2 = σ ( ) 5 Figure 5 shows a grah of C() versus for Gustafson s Law with two values of σ (). As the figure shows, amall values of σ () (e.g.,.) Gustafson s Law is difficult to distinguish from linear scalability. At higher values of σ (), however, the curve definitely shows its non-linearity. Relative Caacity (C ( )) The nexection illustrates the alicability of these models with a case study. CASE STUDY σ () = Number of Processors ( ) Figure 5: Gustafson s Law σ () =. This case study is based on the Avitek Medical Records (MedRec) samle alication develoed by BEA Systems, Inc. [BEA 23a]. This alication is an educational tool that is intended to illustrate best ractices for designing and imlementing J2EE alications. It has also been used to demonstrate the scalability of BEA s WebLogic Server [BEA 23b]. MedRec is a three-tier alication that consists of the following layers [BEA 23a]: Presentation layer The resentation layer is resonsible for all user interaction with MedRec. It accets user inut for forwarding to the alication layer and dislays alication data to the user. Alication layer The alication layer encasulates MedRec s business logic. It receives user requests from the resentation layer or from external clients via Web Services and may interact with the database layer in resonse to those requests. Database layer The database layer stores and retrieves atient data. Users interact with MedRec via a browser using HTTP requests and resonses. External clients may also use MedRec as a Web Service. The resentation and alication layers reside on one or more alication serv-. WebLogic Server is a trademark of BEA Systems, Inc. 6

7 ers. The database layer resides on a searate database server. Figure 6 shows a schematic view of the MedRec alication. Client Figure 6: MedRec Alication Configuration This case study is based on measurements of this alication ublished by BEA Systems, Inc. [BEA 23b]. These measurements were made to demonstrate the scalability of BEA s WebLogic Server. Because of this, no secific erformance requirements were secified. Table 2 shows the demand for each of the resources in the system. The alication server CPU has the highest demand and is therefore the bottleneck resource. Table 2: Resource Demand Resource Alication Server Alication Server CPU.227 Database Server CPU.68 Disk.38 Database Server Demand We begin by examining the validity of the single-queue aroximation for describing the behavior of the system. The following sections then exlore vertical and horizontal scaling characteristics of this alication. Single Queue Aroximation This analysis is based on measured data for an alication server with a single 75 MHz rocessor. The database server was an 8-rocessor (75 MHz) machine with RAID disks. The measurements aear in Table 3. Note that the high number of transactions er second for a single client is due to using a think time of zero for these measurements. We recommend a more realistic think time for your measurementudies. There are a few other asects of the measurements that we question, but we are unable to confirm their validity because we did not conduct these measurement studies. From the maximum throughut and the throughut with one client, we can calculate the demand at the bottleneck resource, D b and the total demand, D T [Jain 99]. D b = = =.227 sec Table 3: Measured Throughut versus Number of Clients Number of Clients Transactions er Second Max TPS Aserver CPU Utilization 98% DB Server CPU Utilization <% DB Server Disk Utilization 6% D T = = =.242 sec X 4.39 Note that the total demand with one user is the sum of the demands in Table 2,.242 sec. Also note that the bottleneck demand is 93.8% of the total demand. With such a large ercent of the overall demand attributable to the bottleneck resource, the single-queue aroximation is a good one. Throughut (TPS) Number of Clients Measured Modeled Figure 7: Measured versus Modeled Data Using the results for D b and D T, we can construct a simle system model using a single queue/server that reresents the bottleneck resource in this case, the alication server CPU. Figure 7 shows a ortion of the measured data for the MedRec alication on the single-rocessor server along with the modeled curve for a QNM solution using a single queue/server reresenting the bottleneck resource. The model was constructed and solved using SPE ED. As the figure indicates, the single queue aroximation is a good one for this system (because the Alication Server CPU dominates the demand).

8 Vertical Scalability To demonstrate the vertical scaling characteristics of this alication, throughut versus number of simulated clients was measured for -, 2-, 4-, and 8 rocessor alication server configurations. The alication server is a 75 MHz latform caable of holding u to 24 rocessors. Utilizations for the alication and database server CPUs as well as the database server disk were also measured. Table 4 shows the results of these measurements. Table 4: Measured Throughut for Vertical Scaling Number of Processors Max TPS Number of Clients at Max TPS Aserver CPU Utilization 98% 97% 95% 9% DB Server CPU Utilization <%.3% 2.25% 3.9% DB Server Disk Utilization 6% 2% 9% 28.24% Note that the number of clients decreases at 4 rocessors. This is one of the questionable measurements that we found. You can see in Table 3 that the maximum transactions er second fluctuates between 4 and 8 clients, but remains close to 43 transactions er second. Amdahl s Law Regression analysis determines that Amdahl s Law rovides a good fit to this data with a σ of.88 (r 2 =.992). This value of s indicates that 8.8% of the workload must be erformed sequentially. The maximum number of rocessors that can be installed in this server is 24. Thus the maximum value of C() that can be obtained is: C( 24) = = 24 + σ( ) = +.88( 24 ) 7.93 The maximum throughut with one rocessor, (), is transactions er second so the maximum throughut with 24 rocessors would be: ( 24) = C( 24) = 348 ts. SPE ED is a trademark of Performance Engineering Services Division, L&S Comuter Technology, Inc. 8 The limit on C() for Amdahl s Law is /σ. Thus, even with an infinite number of rocessors, the maximum value of C() that could be obtained is.4 for a maximum throughut of 5 transactions er second. Suer-Serial Model Regression analysis determines that the Suer-Serial Model also rovides a good fit to this data. This is nourrising since the Suer-Serial Model is an extension of Amdahl s Law with an extra term for interrocessor communication. The values of the suer-serial arameters obtained from a regression analysis are: σ =.787 and γ =.64 (r 2 =.993). This indicates that, according to the Suer-Serial Model, 7.9% of the work must be erformed sequentially. Aroximately.6% of that sequential work is used for interrocessor communication. The value of C() redicted by the Suer-Serial Model at 24 rocessors is: C( 24) = = +.787[ ] 6.82 which gives a maximum throughut of 299 transactions er second. Overall Evaluation Figure 8 summarizes the measured data as well as the maximum throughut versus number of rocessors redicted by both Amdahl s Law and the Suer-Serial Model. Xmax (ts) Number of Processors Measured Amdahl's Law Suer-Serial Model Figure 8: Summary of Modeled and Measured Data As Figure 8 shows, there is little difference between Amdahl s Law and the Suer-Serial Model in the region covered by the measured data and both models rovide a reasonable fit. The values of r-squared from the regression analysis indicate a slightly better fit for the Suer-Serial Model (r 2 =.993) than Amdahl s Law (r 2 =.992).The difference is small, however, and the increase in r 2 may be due to the extra degree of freedom introduced by the additional arameter in the Suer-Serial Model rather than an imroved fit.

9 Without additional information, it is not ossible to say which model fits the data better. Measurements at higher numbers of rocessors would hel resolve the ambiguity. Knowledge of the software architecture could also hel select the most aroriate model. For examle, if we know that there is a shared state that must be maintained among the rocessors, the Suer- Serial model would be the most likely choice. In view of this, we consider the Amdahl s Law result of 348 transactions er second to be uer limit on the caacity that can be obtained by scaling this system vertically and the Suer-Serial result of 299 transactions er second to be a lower bound. Horizontal Scalability In this section, we exlore the horizontal scaling characteristics of the MedRec alication. In this study, each node contains four 4 MHz rocessors. Rather than adding more rocessors to a node, additional nodes are added to scale the system. Measurements of throughut versus number of simulated clients were made for -, 2-, 3-, and 4-node configurations. The database and network configurations were the same as those used for the vertical scaling study. Table 5 shows the results of these measurements. Gustafson s Law Regression analysis indicates that Gustafson s Law rovides an excellent fit to the horizontal scaling measurements with σ ()=.477 (r 2 =.9999). This indicates that aroximately 4.8% of the work with one rocessor is erformed sequentially. Since this amount of work is constant, as more rocessors are added, this fraction decreases. Linear Scalability The linear model also rovided an excellent fit to the horizontal scaling measurements (r 2 =.9997). The sloe of the regression line is.39. Table 6 shows the measured values of maximum throughut along with the values redicted by Gustafson s Law and the linear model. Table 6: Measured Versus Modeled Throughut Number of Nodes Measured Gustafson s Law Linear Note that, as discussed earlier, for linear scalability the sloe must be one. Thus, a sloe of one was used to calculate the linear redictions in Table 6. Figure 9 shows a grahical comarison of the measured and modeled throughut for u to ten rocessors. Table 5: Measured Throughut for Horizontal Scaling Number of Nodes 2 3 4,2, Max TPS Number of Clients at Max TPS Aserver CPU Utilization 95.9% 95.58% 95.35% 95.22% DB Server CPU Utilization.7% 3.64% 6.2% 9.7% DB Server Disk Utilization 3.94% 27.79% 4.58% 53.25% Regression analysis shows that both Gustafson s Law and the linear model rovide good fits to the measured data. Regression analysis based on Amdahl s Law and the Suer-Serial model do not yield good fits to the exerimental data. In addition, both analyses give negative values for the serial arameters. Thus, Amdahl s Law and the Suer-Serial model are not aroriate for this data. Xmax (ts) Measured Gustafson's Law 2 Linear Number of Nodes (n ) Figure 9: Measured versus Modeled Data As Table 6 and Figure 9 indicate, the Gustafson s Law estimates more nearly match the measured values. However, an additional measurement at a higher number of rocessors would hel distinguish between these two models. Secondary Bottlenecks Both models redict that we can exect considerably more throughut from the horizontal scaling strategy than from the vertical. However, it is still imortant to be careful when extraolating. For examle, if our erformance requirement is, transactions er second, Gustafson s Law redicts that using ten nodes will give a maximum throughut of,5 transactions er second and the linear model 9

10 redicts a maximum throughut of,5 transactions er second. These rojections assume that no other bottleneck resource will limit our ability to achieve the required throughut with ten nodes, however. Looking at Table 5, we see that removing the alication server CPU bottleneck leaves the database server disk as the resource with the highest utilization. The demand at this resource is.32 seconds which agrees with the value of.38 obtained in the vertical scalability measurements to within exerimental error. This corresonds to a maximum throughut of 757 transactions er second. Therefore, to achieve the erformance requirement of, transactions er second, it will be necessary to either ugrade to faster disks or add a second disk to the database server. Of course, adding only ten nodes will mean that we are oerating at near one-hundred ercent utilization on the alication server CPU. This will result in unaccetably long resonse times, so additional nodes should be added to reduce the CPU utilization to a more reasonable number. Case Study Discussion The results of the analysis indicate a significant difference in the behavior of the system for vertical versus horizontal scaling. Since the alication software is the same in both cases, the difference must be due to the latforms. The most likely exlanation for this difference is the resence of the MP Effect when scaling vertically. The MP Effect is a loss of comuting caacity that occurs when adding rocessors to a single latform. This loss of caacity is due to additional overhead and/or contention between rocessors for shared system resources (e.g., the system bus) [Artis 99], [Gunther 996]. Gunther has shown that Amdahl s Law and the Suer-Serial Model aly to SMP scaling with suer-serial effects becoming more significant as the amount of interrocessor communication increases [Gunther 993]. It is temting to generalize this result and conclude that horizontal scaling is suerior to vertical scaling in all cases. However, the scalability of a system deends on the characteristics of both the alication and the execution environment. In this case, it aears that the software was structured into units that could execute indeendently in arallel. If a larger ercent of the workload were serial, both the vertical and horizontal scalability would have followed Amdahl s Law or the Suer-Serial model. In addition, the good horizontal scalability indicates that back-end database interactions were effectively arallelized so that there was little or no serial contention there either. This will not be true of all alications. In articular, for distributed alications that must maintain a common state (e.g., databases) there will be overhead to maintain coherence. In these cases, interrocessor communication will be a significant factor. For such alications, the enhanced communication efficiency of a bus versus a network may favor vertical scaling on a single latform. Each alication/latform combination should be evaluated individually. This case study also emhasizes the imortance of thoroughly understanding the system before committing to a scaling strategy. Secondary bottlenecks (such as the database disk here) are a fact of life. It is imortant to know what they are, how they imact the scalability of the system, and how costly they are to remove before undertaking exensive system ugrades. Finally, ihould be noted that the data ublished by BEA Systems, Inc. rovides a good examle of the tye of information that is useful for understanding and evaluating scalability. ECONOMICS OF SCALABILITY Scalability is an economic as well as a technical issue. In many cases there are alternative scaling strategies that will meet erformance requirements. The choice among them should then be based on cost. The imortance of cost in meeting erformance requirements is imlicit in the inclusion of cost figures in many benchmark reorts (see, e.g., [TPC]). These costs are rarely simle, one-time costs. Adding more hardware means that there will be costs for urchase or lease, software licenses, maintenance contracts, additional system administration, facilities, and so on. The timing of these exenditures is likely to be highly deendent on the scaling strategy. For examle, one strategy may require frequent, small ugrades while another may require fewer, more exensive ones. In order to make an unbiased comarison of the alternatives, it may be necessary to convert the costs to current dollars. Techniques for this are discussed in many laces, including [Reifer 22] and [Williams and Smith 23]. It is imortant to consider all costs associated with the scaling strategy. In some cases, hardware exenditures may be dwarfed by costs for suoroftware and middleware [Mohr 23]. Costs of ugrading are also subject to discontinuities as the amount of hardware is increased. For examle, aome oint adding a server may require hiring an additional system administrator or exanding the facility to accommodate the additional footrint.

11 Don t forget thacalability isn t just a hardware issue. It is often easy to increase scalability with a different (initial) software architecture [Williams and Smith 23]. In this case study, a design alternative that reduces the CPU consumtion of the alication could also imrove scalability. The modification would roduce a new version of the alication with new scalability characteristics. Note that the most cost-effective choice for meeting a given erformance requirement might not be the one with the highest overall scalability. SUMMARY AND CONCLUSIONS Scalability is one of the most imortant quality attributes of today s distributed software systems. Yet, desite its imortance, scalability in these alications is oorly understood. This aer has resented a model-based view of scalability in Web and other distributed alications that is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. We use the relative caacity or scalability factor C ( ) = as a measure of the scalability of a system. Scalability is classified according to the behavior of C() as: Linear the relative caacity is equal to the number of rocessors,, i.e., C() =. Sub-linear the relative caacity is less than, i.e., C() <. Suer-linear the relative caacity is greater than, i.e., C() >. A key consequence of using C() as the metric for scalability is that for linear scalability, the sloe of the line must be equal to one. This means that both sub-linear and suer-linear scalability must, in fact, be described by non-linear functions. While measurements amall numbers of rocessors may aear to be linear, measurements at higher numbers of rocessors will reveal the non-linearity. This also means that linear extraolations of near-linear results, such as that in our oening examle, can be misleading. Since the actual function is necessarily non-linear, these extraolations will overestimate the scalability of the system if the sloe of the extraolated line is less than one and underestimate it if the sloe is greater than one. This aer has reviewed four models of scalability that are alicable to Web and other distributed alications. These are summarized in Table 7. We have also demonstrated the alicability of these models to Web alications via a case study of a simle Web alication. Analysis of measured data for the case study system indicates that its vertical scalability is best described by either Amdahl s Law or the Suer- Serial Model while its horizontal scalability is best described by either Gustafson s Law or linear scalability. Linear Model Amdahl s Law Suer-Serial Model Gustafson s Law The case study also demonstrates thacalability is a system roerty. In this case, the same alication exhibits differencalability roerties when scaling vertically or horizontally. As this aer demonstrates, these models are alicable to Web and other distributed systems. However, due to the comlexity of such systems, it is likely that some systems will not conform to any of these models. It is therefore imortant to determine, via analysis of measured data, that a given system follows a known model before making decisions based on redicted scalability. Scalability is also affected by software resource constraints such as a One Lane Bridge Performance Antiattern [Smith and Williams 22]. This aer addressed only hardware bottlenecks. This aer also considered only a single dominant workload. These techniques can be adated to cover these other asects of the roblem. REFERENCES Table 7: Scalability Models C S C A C() C L = = σ( ) = σ[ ( ) + γ ( ) ] C G [Alba 22] E. Alba, Parallel Evolutionary Algorithms Can Achieve Suer-Linear Performance, Information Processing Letters, vol. 82,. 7-3, = σ ( )

12 [Amdahl 967] G. M. Amdahl, Validity of the Single- Processor Aroach To Achieving Large Scale Comuting Caabilities, Proceedings of AFIPS, Atlantic City, NJ, AFIPS Press, Aril, 967, [Artis 99] H. P. Artis, Quantifying MultiProcessor Overheads, Proceedings of CMG '9, December, 99, [BEA 23a] BEA Systems, Inc., Avitek Medical Records. Architecture Guide, htt:// edocs.bea.com/wls/docs8/medrec_arch/ index.html. Journal of Parallel and Distributed Comuting, vol. 9, no., , 993. [TPC] Transaction Processing Council, [Williams and Smith 23] L. G. Williams and C. U. Smith, Making the Business Case for Software Performance Engineering, Proceedings of CMG, Dallas, December, 23. [Williams and Smith 22] L. G. Williams and C. U. Smith, PASA SM : An Architectural Aroach to Fixing Software Problems, Proc. CMG, Reno, December, 22 [BEA 23b] BEA Systems, Inc. BEA WebLogic Server: Caacity Planning, htt://edocs.bea.com/wls/docs8/calan/. [Brown 23] R. G. Brown, Engineering a Beowulfstyle Comute Cluster, Duke University, 23, beowulf_book/. [Gunther 2] N. J. Gunther, The Practical Performance Analyst, iuniverse.com, 2. [Gunther 996] N. J. Gunther, Understanding the MP Effect: Multirocessing in Pictures, Proceedings of CMG '96, December, 996. [Gunther 993] N. J. Gunther, A Simle Caacity Model for Massively Parallel Transaction Systems, Proceedings of CMG 93, San Diego, December, 993, [Gustafson 988] J. L. Gustafson, Reevaluating Amdahl's Law, Communications of the ACM, vol. 3, no. 5, , 988. [Jain 99] R. Jain, The Art of Comuter Systems Performance Analysis: Techniques for Exerimental Design, Measurement, Simulation, and Modeling, New York, NY, John Wiley, 99. [Mohr 23] J. Mohr, SPE on IRS Business Systems Modernization, Panel: The Economics of SPE, CMG, Dallas, 23. [Reifer 22] D. J. Reifer, Making the Software Business Case: Imrovement by the Numbers, Boston, Addison-Wesley, 22. [Smith and Williams 22] C. U. Smith and L. G. Williams, Performance Solutions: A Practical Guide to Creating Resonsive, Scalable Software, Boston, MA, Addison-Wesley, 22. [Sun and Ni 993] X.-H. H. Sun and L. M. Ni, Scalable Problems and Memory-Bounded Seedu, 2

QSEM SM : Quantitative Scalability Evaluation Method

QSEM SM : Quantitative Scalability Evaluation Method Copyright 2005, PerfX and Performance Engineering Services. All rights reserved. QSEM SM : Quantitative Scalability Evaluation Method Lloyd G. Williams, Ph.D. PerfX 2345 Dogwood Circle Louisville, Colorado

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Free Software Development. 2. Chemical Database Management

Free Software Development. 2. Chemical Database Management Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow.

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow. Princiles of Hydrology Unit Hydrograh Runoff hydrograh usually consists of a fairly regular lower ortion that changes slowly throughout the year and a raidly fluctuating comonent that reresents the immediate

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

GAS TURBINE PERFORMANCE WHAT MAKES THE MAP?

GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? by Rainer Kurz Manager of Systems Analysis and Field Testing and Klaus Brun Senior Sales Engineer Solar Turbines Incororated San Diego, California Rainer Kurz

More information

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Interaction Expressions A Powerful Formalism for Describing Inter-Workflow Dependencies

Interaction Expressions A Powerful Formalism for Describing Inter-Workflow Dependencies Interaction Exressions A Powerful Formalism for Describing Inter-Workflow Deendencies Christian Heinlein, Peter Dadam Det. Databases and Information Systems University of Ulm, Germany {heinlein,dadam}@informatik.uni-ulm.de

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

The Competitiveness Impacts of Climate Change Mitigation Policies

The Competitiveness Impacts of Climate Change Mitigation Policies The Cometitiveness Imacts of Climate Change Mitigation Policies Joseh E. Aldy William A. Pizer 2011 RPP-2011-08 Regulatory Policy Program Mossavar-Rahmani Center for Business and Government Harvard Kennedy

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Response-Time Control of a Processor-Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders

Response-Time Control of a Processor-Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders Resonse-ime Control of a -Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders Published in: Proc. of the 7th IFAC World Congress Published: 8--

More information

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing

Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina

More information

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4 Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk

More information

The Fundamental Incompatibility of Scalable Hamiltonian Monte Carlo and Naive Data Subsampling

The Fundamental Incompatibility of Scalable Hamiltonian Monte Carlo and Naive Data Subsampling The Fundamental Incomatibility of Scalable Hamiltonian Monte Carlo and Naive Data Subsamling Michael Betancourt Deartment of Statistics, University of Warwick, Coventry, UK CV4 7A BETANAPHA@GMAI.COM Abstract

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Optional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR

Optional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR Otional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Esilon_ AUTHOR Len Schwer Schwer Engineering & Consulting Services CORRESPONDENCE Len Schwer Schwer Engineering

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

Sang Hoo Bae Department of Economics Clark University 950 Main Street Worcester, MA 01610-1477 508.793.7101 sbae@clarku.edu

Sang Hoo Bae Department of Economics Clark University 950 Main Street Worcester, MA 01610-1477 508.793.7101 sbae@clarku.edu Outsourcing with Quality Cometition: Insights from a Three Stage Game Theoretic Model Sang Hoo ae Deartment of Economics Clark University 950 Main Street Worcester, M 01610-1477 508.793.7101 sbae@clarku.edu

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information