Web Application Scalability: A Model-Based Approach
|
|
- Augusta Stanley
- 8 years ago
- Views:
Transcription
1 Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research 264 Ridgeview Lane Boulder, Colorado 832 (33) boulderlgw@aol.com Connie U. Smith, Ph.D. Performance Engineering Services PO Box 264 Santa Fe, New Mexico, (55) htt:// Scalability is one of the most imortant quality attributes of today s software systems. Yet, desite its imortance, scalability in alications is oorly understood. This aer resents a model-based view of scalability in Web and other distributed alications that is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. We review four models of scalability and show how they relate to Web and other distributed alications. The alicability of these models is demonstrated with a case study. INTRODUCTION Web and other distributed software systems are increasingly being deloyed to suort key asects of businesses including sales, customer relationshi management (CRM), and data rocessing. Examles include: online shoing, rocessing insurance claims, and rocessing financial trades. Many of these systems are deloyed on the Web or on dedicated networks using Web technologies such as J2EE. As these businesses grow, the systems thauort their functions also need to grow to suort more users, rocess more data, or both. As they grow, it is imortant to maintain their erformance (resonsiveness or throughut) [Smith and Williams 22]. Poor erformance in these alications often translates into substantial costs. Customers will often sho elsewhere rather than endure long waits. Slow resonses in CRM alications mean that more customer-service reresentatives are needed. And, failure to rocess financial trades in a timely fashion can result in statutory enalties as well as lost customers. These forces combine to make scalability one of the most imortant quality attributes of today s software systems. Yet, desite its imortance, scalability in alications is oorly understood and there is no generally acceted definition of scalability. In this aer, we will use the following definition: Scalability is a measure of an alication system s ability to without modification cost-effectively rovide increased throughut, reduced resonse time and/or suort more users when hardware resources are added. Scalability is a system roerty. The software architecture is a key factor in determining scalability. For examle, if the software architecture is not able to use additional resources to increase throughut the system will not be scalable. The choice of execution environment is also very imortant. As we will see, the same workload executed on two different latforms can exhibiignificantly differencalability roerties. Scalability in Web and other distributed systems is a comlex roblem. Removing a bottleneck changes the dynamics of the system and a different bottleneck may emerge to imose new limitations on the scalability. Thus, it is necessary to reevaluate the behavior of the system after making changes. This aer resents a model-based view of scalability in Web and other distributed alications. It is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. It reviews revious work on scalability and shows how it relates to distributed Web alications. This aer also rovides a simle demonstration that extraolations of near-linear results are likely to overestimate scalability. Finally, it offers a reformulation of Gustafson s Law that is more aroriate for evaluating Web alication scalability and demonstrates that this law is alicable to some Web alications. The analyses described here are art of the PASA SM aroach to the erformance assessment of software architectures [Williams and Smith 22]. They are emloyed in situations where scalability is a concern
2 and where the required measurements can be obtained. We begin with a motivating examle followed by a review of scalability measures and models. A simle case study then illustrates how these models aly to Web alications. MOTIVATION Consider the following data (ublished on the Web) for horizontal scalability of a samle alication develoed using commercial Web server software. Table : Horizontal Scaling Data Number of Nodes Transactions er Second The reort also contains the statement: Multile Web servers scale near-linearly (8 9%) at this level using [Product X]. While this statement is, at a casual glance, true it is also otentially dangerously misleading. A straightforward extraolation to higher numbers of rocessors would give the scalability shown by the dashed line in Figure. Throughut 2,,5, Number of Nodes Figure : Extraolated Scaling This tye of extraolation is all too common in our exerience. However, as we will see, the actual scalability of this system is more likely to follow the solid curve. The difference between these two redictions is significant. It could mean the difference between successful deloyment of the alication and financial disaster. This examle underscores the imortance of obtaining a thorough understanding of the scalability characteristics of a system before committing resources to its exansion. One way to accomlish this is to determine through analysis of measured data whether the behavior of the system fits that of a known model of scalability. Once there is a degree of confidence in how well a model describes the system, extraolations such as the one above become less risky. SPEEDUP AND SCALEUP Seedu is a measure of the reduction in time required to execute a fixed workload as a result of adding resources such as rocessors or disks. Seedu is the most common metric for evaluating arallel algorithms and architectures. Scaleu, on the other hand, is a measure of the increase in the amount of work that can be done in a fixed time as a result of adding resources. Scaleu is a more relevant metric for Web alications where the rincial concern is whether we can rocess more transactions or suort more users as we add resources. Although they might aear to be very different metrics, seedu and scaleu are really two sides of the same coin. Clearly, if we can execute a transaction more quickly, we can execute more transactions in a given amount of time. More formally, the seedu is given by: S ( ) T = T ( ) where T() is the time required to erform the work with one rocessor and T() is the time required to erform the same amount of work with rocessors. Scaleu may be exressed as a ratio of the caacity with rocessors to the caacity with one rocessor. This ratio is sometimes known as the scaling factor. It has also been called the relative caacity, C() [Gunther 2]. If we use the maximum throughut as a measure of the caacity, we can exress the scaling factor or relative caacity as: C ( ) = where () is the maximum caacity with one rocessor and () is the maximum caacity with rocessors. Since the maximum throughut of a system is equal to the inverse of the demand at the bottleneck resource [Jain 99], we have: C ( ) D b = = D b The demand at a resource is the total time t b required to execute the workload at that resource (i.e., visits x service time). Thus, if we aroximate the behavior of 2
3 the system by a single queue/server reresenting the bottleneck device, we can write: global state. These factors cause the relative caacity to increase more slowly than linearly. C ( ) D b t b = = = S ( ) D b t b While this aroximation should be verified (see the case study below), it is a good one in most cases. We will use C() as a measure of the scalability of the system. Once the function (model) describing C() has been determined, the throughut of the system with rocessors can be obtained by multilying () by C(). CATEGORIES OF SCALABILITY We will categorize the scalability of a system based on the behavior of C(). This classification scheme is similar to that roosed by Alba for seedu in arallel evolutionary algorithms [Alba 22]. The categories are: Linear the relative caacity is equal to the number of rocessors,, i.e., C() =. Sub-linear the relative caacity with rocessors is less than, i.e., C() <. Suer-linear the relative caacity with rocessors is greater than, i.e., C() >. Linear Scalability Linear scalability can occur if the degree of arallelism in the alication is such that it can make full use of the additional resources rovided by scaling. For examle, if the alication is a data acquisition system that receives data from multile sources, rocesses it and reares it for additional downstream rocessing, it may be ossible to run multile streams in arallel to increase caacity. In order for this alication to scale linearly, the streams must not interfere with each other (for examle via contention for database or other shared resources) or require a shared state. Either of these conditions will reduce the scalability below linear. Sub-Linear Scalability Sub-linear scalability occurs when the system is unable to make full use of the additional resources. This may be due to roerties of the alication software, for examle if delays waiting for a software resource such as a database lock revent the software from making use of additional rocessors. It may also be due to roerties of the execution environment that reduce the rocessing ower of additional rocessors, for examle overhead for scheduling, contention among rocessors for shared resources such as the system bus or communication among rocessors to maintain a 3 Suer-Linear Scalability At first glance, suer-linear scalability would seem to be imossible a violation of the laws of thermodynamics. After all, isn t it imossible to get more out of a machine than you ut in? If so, how can we more than double the throughut of a comuter system by doubling the number of rocessors? The fact is, however, thauer-linear scalability is a real henomenon. The easiest way to see how this comes about is to recognize that, when we add a rocessor to a system, we are sometimes adding more than just a CPU. We often also add additional memory, disks, network interconnects, and so on. This is esecially true when exanding clusters. Thus, we are adding more than just rocessing ower and this is why we may realize more than linear scaleu. For examle, if we also add memory when we add a rocessor, it may be ossible to cache data in main memory and eliminate database queries to retrieve it. This will reduce the demand on the rocessors, resulting in a scaleu that is more than can be accounted for by the additional rocessing ower alone. The nexection discusses several models that exhibit these categories of behavior. MODELS OF SCALABILITY This section discusses four models of scalability:. Linear scalability 2. Amdahl s law 3. Suer-Serial Model 4. Gustafson s Law The Suer-Serial Model is an extension of Amdahl s Law and has aeared in the context of on-line transaction rocessing (OLTP) systems [Gunther 2], in beowulf-style clusters of comuters [Brown 23] and others. The other three were develoed in the context of seedu for arallel algorithms and architectures. Amdahl s Law and the Suer-Serial Model, describe sub-linear scalability. Gustafson s Law, describes suer-linear scalability. These models were develoed in a different context, but as we illustrate they aly to Web alications. Other models of scalability, such as memory-bounded seedu [Sun and Ni 993], are available but are beyond the scoe of this aer. Linear Scalability With linear scalability the relative caacity, C(), is equal to the number of rocessors,.
4 C L = For a system thacales linearly, a grah of C() versus is a straight line with a sloe of one and a y-intercet of zero [C()=]. Figure 2 shows a grah of Equation. Seedu = S T A = = T ( ) S A = t s t = t t + t t σ + π Relative Caacity (C ( )) Number of Processors ( ) Here, σ is the fraction of the time sent on the sequential arts of the rogram and π is the fraction of time sent on the arts of the rogram that can be executed in arallel. Since π = σ: S A = σ( ) Or, using the equivalence between seedu and scaleu, Figure 2: Linear Scalability Note that our definition of C() does not allow for linear scalability with a sloe that is not equal to one, i.e. C() = k where k. If this were ossible, C() could be different from one. But, since C = = C A = σ( ) If σ = (i.e., no ortion of the workload is executed sequentially), Amdahl s Law redicts unlimited linear scaleu (i.e., C A () = ). For non-zero values of σ, the scaleu will be less than linear. Figure 3 shows a comarison of linear scalability with Amdahl s Law scalability for σ =.2. 2 k must be equal to one. This means that both sub-linear and suer-linear scalability must, in fact, be described by non-linear functions. While measurements amall numbers of rocessors may aear to be linear, measurements at higher numbers of rocessors will reveal the non-linearity. This also means that linear extraolations of near-linear results, such as that in our oening examle, can be misleading. Since the actual function is necessarily non-linear, these extraolations will overestimate the scalability of the system if the sloe of the extraolated line is less than one and underestimate it if the sloe is greater than one. Amdahl s Law Amdahl s Law [Amdahl 967] states that the maximum seedu obtainable from an infinite number of rocessors is /σ where σ is the fraction of the work that must be erformed sequentially. If is the number of rocessors, is the time sent by a sequential rocessor on the sequential arts of the rogram, and t is the time sent by a sequential rocessor on the arts of the rogram that can be executed in arallel, we can write the Seedu for Amdahl s Law, S A : Relative Caacity (C ( )) Number of Processors ( ) Linear Amdahl's Law σ =.2 Figure 3: Amdahl s Law versus Linear Scalability The maximum seedu that can be obtained, even using an infinite number of rocessors is: lim S A This means that, if the serial fraction of the workload is.2, the maximum seedu that can be achieved is 5 and it will take an infinite number of rocessors to achieve that! Amdahl s argument was that, given this limitation, a fasingle-rocessor machine is more cost-effective than a multirocessor machine. As Figure 3 shows, there are diminishing returns for adding more rocessors. The enalty increases as σ = -- σ 4
5 increases. For σ=.2, Amdahl s Law redicts that adding a second rocessor will yield a relative caacity of.67. That is, the maximum throughut with two rocessors will be.67 times that with one rocessor. If, instead of adding a second rocessor, we relace the single rocessor with one twice as fast, the throughut will then be exactly twice that with the slower rocessor. This is because the faster rocessor reduces the time required for both the serial and arallel ortions of the workload. Because of this, it is generally more costeffective to use a faster single rocessor than to add rocessors to achieve increased throughut in cases where Amdahl s Law alies. Suer-Serial Model Gunther [Gunther 2] oints out that Amdahl s Law may be otimistic in cases where there is interrocessor communication, for examle to maintain cache consistency among rocessors. In these cases if, when an udate is needed, a rocessor sequentially sends udates to each of the other rocessors and the time required to rocess and send a message is t c, we have the suer-serial caacity for rocessors, C S (): C S = T = T ( ) Or, after some algebra: C S where γ is the fraction of the serial work that is used for interrocessor communication. This result is identical to the Amdahl s Law result with an extra term in the denominator for overhead due to interrocessor communication. Gunther has called Equation 3 the Suer- Serial Model [Gunther 2]. The term in Equation 3 that contains γ grows as the square of the number of rocessors. This means that, even if the overhead for interrocessor communication is small, as the number of rocessors increases, the communication overhead will eventually cause C() to reach a maximum and then decrease. Figure 4 shows a comarison of Equation 3 for σ =.2 and various values of γ with linear scalability and Amdahl s Law. Gustafson s Law For certain alications, it was found thaeedus greater than that redicted by Amdahl s Law are ossible. For examle, some scientific alications were found to undergo a seedu of more than, on a,24 rocessor hyercube. Gustafson [Gustafson 988] noted that Amdahl s Law assumes that the arallel fraction of the alication (π = σ) is constant, i.e., indeendent of the number of rocessors. Yet, in many + t t + t c ( ) = σ[ ( ) + γ ( ) ] 3 5 Relative Caacity (C ( )) Number of Processors ( ) Figure 4: Suer-Serial Model σ =.2, γ = σ =.2, γ =. σ =.2, γ =.5 σ =.2, γ =. cases, the amount of arallel work increases in resonse to the resence of additional comutational resources but the amount of serial work remains constant. For examle, with more comuting ower, matrix maniulations can be erformed on larger matrices in the same amount of time. In these cases, π (and, therefore, σ) is actually a function of the number of rocessors. If and t are the times required to execute the serial and arallel ortions of the workload on a arallel system with rocessors, a sequential rocessor would require a time of + (t x ) to erform the same work. Gustafson termed this scaled seedu which is described in the following equations: t Scaled Seedu S s + ( t ) = G = S G = + σ ( ) where σ is the serial fraction of the work erformed on rocessors. Equation 4 is known as Gustafson s Law or the Gustafson-Barsis Law. Gustafson s Law describes fixed-time seedu while Amdahl s Law describes fixed-size seedu. As with Amdahl s Law, Gustafson s Law also alies to scalability. We can not use the formulation in Equation 4 directly, however. Equation 4 describes the seedu as the ratio of the time required to execute the workload on a system with rocessors to that required to execute the same amount of work on a single rocessor. This is not a ratio that is likely to be measured, however. We are more likely to have measurements of the maximum throughut at various numbers of rocessors. Thus, to use Gustafson s Law for web alication scalability, we need to exress it in terms of C(), the ratio of the maximum throughut with rocessors to the maximum throughut with one rocessor. t 4
6 The demand with one rocessor is () + t () and the maximum throughut is therefore: = t Gustafson s Law assumes that the arallel ortion of the workload increases as the number of rocessors. Thus, the total demand with rocessors is () +(t () x ). However, this demand is sread over rocessors, so the average demand er rocessor is: D b + ( t ) = Note that the average demand er rocessor is a decreasing function of. This is because only one rocessor can execute the serial ortion of the workload. If the degree of arallelism is such that the alication is able to make use of this additional caacity, each rocessor beyond one will be able to execute more arallel work than t(), resulting in suer-linear scaling. This can occur in Web alications when loading a age results in multile concurrent requests from the client to retrieve information, such as gifs and other age elements. Additional rocessors enable those requests to execute in arallel. Under these conditions, the average maximum throughut er rocessor is: = = D b ( t ) and the maximum throughut for rocessors is: Using these results, we can write the relative caacity for Gustafson s Law as: C G where σ () is the serial fraction of the work with one rocessor. As the value of σ () aroaches zero, this function aroaches linear scalability. In fact, for small values of σ (), Equation 5 is difficult to distinguish from linear scalability. With non-zero values of σ (), the second term in the denominator is negative for values of greater than one, however. This means that C() will increase faster than giving suer-linear scalability. 2 = ( t ) 2 = σ ( ) 5 Figure 5 shows a grah of C() versus for Gustafson s Law with two values of σ (). As the figure shows, amall values of σ () (e.g.,.) Gustafson s Law is difficult to distinguish from linear scalability. At higher values of σ (), however, the curve definitely shows its non-linearity. Relative Caacity (C ( )) The nexection illustrates the alicability of these models with a case study. CASE STUDY σ () = Number of Processors ( ) Figure 5: Gustafson s Law σ () =. This case study is based on the Avitek Medical Records (MedRec) samle alication develoed by BEA Systems, Inc. [BEA 23a]. This alication is an educational tool that is intended to illustrate best ractices for designing and imlementing J2EE alications. It has also been used to demonstrate the scalability of BEA s WebLogic Server [BEA 23b]. MedRec is a three-tier alication that consists of the following layers [BEA 23a]: Presentation layer The resentation layer is resonsible for all user interaction with MedRec. It accets user inut for forwarding to the alication layer and dislays alication data to the user. Alication layer The alication layer encasulates MedRec s business logic. It receives user requests from the resentation layer or from external clients via Web Services and may interact with the database layer in resonse to those requests. Database layer The database layer stores and retrieves atient data. Users interact with MedRec via a browser using HTTP requests and resonses. External clients may also use MedRec as a Web Service. The resentation and alication layers reside on one or more alication serv-. WebLogic Server is a trademark of BEA Systems, Inc. 6
7 ers. The database layer resides on a searate database server. Figure 6 shows a schematic view of the MedRec alication. Client Figure 6: MedRec Alication Configuration This case study is based on measurements of this alication ublished by BEA Systems, Inc. [BEA 23b]. These measurements were made to demonstrate the scalability of BEA s WebLogic Server. Because of this, no secific erformance requirements were secified. Table 2 shows the demand for each of the resources in the system. The alication server CPU has the highest demand and is therefore the bottleneck resource. Table 2: Resource Demand Resource Alication Server Alication Server CPU.227 Database Server CPU.68 Disk.38 Database Server Demand We begin by examining the validity of the single-queue aroximation for describing the behavior of the system. The following sections then exlore vertical and horizontal scaling characteristics of this alication. Single Queue Aroximation This analysis is based on measured data for an alication server with a single 75 MHz rocessor. The database server was an 8-rocessor (75 MHz) machine with RAID disks. The measurements aear in Table 3. Note that the high number of transactions er second for a single client is due to using a think time of zero for these measurements. We recommend a more realistic think time for your measurementudies. There are a few other asects of the measurements that we question, but we are unable to confirm their validity because we did not conduct these measurement studies. From the maximum throughut and the throughut with one client, we can calculate the demand at the bottleneck resource, D b and the total demand, D T [Jain 99]. D b = = =.227 sec Table 3: Measured Throughut versus Number of Clients Number of Clients Transactions er Second Max TPS Aserver CPU Utilization 98% DB Server CPU Utilization <% DB Server Disk Utilization 6% D T = = =.242 sec X 4.39 Note that the total demand with one user is the sum of the demands in Table 2,.242 sec. Also note that the bottleneck demand is 93.8% of the total demand. With such a large ercent of the overall demand attributable to the bottleneck resource, the single-queue aroximation is a good one. Throughut (TPS) Number of Clients Measured Modeled Figure 7: Measured versus Modeled Data Using the results for D b and D T, we can construct a simle system model using a single queue/server that reresents the bottleneck resource in this case, the alication server CPU. Figure 7 shows a ortion of the measured data for the MedRec alication on the single-rocessor server along with the modeled curve for a QNM solution using a single queue/server reresenting the bottleneck resource. The model was constructed and solved using SPE ED. As the figure indicates, the single queue aroximation is a good one for this system (because the Alication Server CPU dominates the demand).
8 Vertical Scalability To demonstrate the vertical scaling characteristics of this alication, throughut versus number of simulated clients was measured for -, 2-, 4-, and 8 rocessor alication server configurations. The alication server is a 75 MHz latform caable of holding u to 24 rocessors. Utilizations for the alication and database server CPUs as well as the database server disk were also measured. Table 4 shows the results of these measurements. Table 4: Measured Throughut for Vertical Scaling Number of Processors Max TPS Number of Clients at Max TPS Aserver CPU Utilization 98% 97% 95% 9% DB Server CPU Utilization <%.3% 2.25% 3.9% DB Server Disk Utilization 6% 2% 9% 28.24% Note that the number of clients decreases at 4 rocessors. This is one of the questionable measurements that we found. You can see in Table 3 that the maximum transactions er second fluctuates between 4 and 8 clients, but remains close to 43 transactions er second. Amdahl s Law Regression analysis determines that Amdahl s Law rovides a good fit to this data with a σ of.88 (r 2 =.992). This value of s indicates that 8.8% of the workload must be erformed sequentially. The maximum number of rocessors that can be installed in this server is 24. Thus the maximum value of C() that can be obtained is: C( 24) = = 24 + σ( ) = +.88( 24 ) 7.93 The maximum throughut with one rocessor, (), is transactions er second so the maximum throughut with 24 rocessors would be: ( 24) = C( 24) = 348 ts. SPE ED is a trademark of Performance Engineering Services Division, L&S Comuter Technology, Inc. 8 The limit on C() for Amdahl s Law is /σ. Thus, even with an infinite number of rocessors, the maximum value of C() that could be obtained is.4 for a maximum throughut of 5 transactions er second. Suer-Serial Model Regression analysis determines that the Suer-Serial Model also rovides a good fit to this data. This is nourrising since the Suer-Serial Model is an extension of Amdahl s Law with an extra term for interrocessor communication. The values of the suer-serial arameters obtained from a regression analysis are: σ =.787 and γ =.64 (r 2 =.993). This indicates that, according to the Suer-Serial Model, 7.9% of the work must be erformed sequentially. Aroximately.6% of that sequential work is used for interrocessor communication. The value of C() redicted by the Suer-Serial Model at 24 rocessors is: C( 24) = = +.787[ ] 6.82 which gives a maximum throughut of 299 transactions er second. Overall Evaluation Figure 8 summarizes the measured data as well as the maximum throughut versus number of rocessors redicted by both Amdahl s Law and the Suer-Serial Model. Xmax (ts) Number of Processors Measured Amdahl's Law Suer-Serial Model Figure 8: Summary of Modeled and Measured Data As Figure 8 shows, there is little difference between Amdahl s Law and the Suer-Serial Model in the region covered by the measured data and both models rovide a reasonable fit. The values of r-squared from the regression analysis indicate a slightly better fit for the Suer-Serial Model (r 2 =.993) than Amdahl s Law (r 2 =.992).The difference is small, however, and the increase in r 2 may be due to the extra degree of freedom introduced by the additional arameter in the Suer-Serial Model rather than an imroved fit.
9 Without additional information, it is not ossible to say which model fits the data better. Measurements at higher numbers of rocessors would hel resolve the ambiguity. Knowledge of the software architecture could also hel select the most aroriate model. For examle, if we know that there is a shared state that must be maintained among the rocessors, the Suer- Serial model would be the most likely choice. In view of this, we consider the Amdahl s Law result of 348 transactions er second to be uer limit on the caacity that can be obtained by scaling this system vertically and the Suer-Serial result of 299 transactions er second to be a lower bound. Horizontal Scalability In this section, we exlore the horizontal scaling characteristics of the MedRec alication. In this study, each node contains four 4 MHz rocessors. Rather than adding more rocessors to a node, additional nodes are added to scale the system. Measurements of throughut versus number of simulated clients were made for -, 2-, 3-, and 4-node configurations. The database and network configurations were the same as those used for the vertical scaling study. Table 5 shows the results of these measurements. Gustafson s Law Regression analysis indicates that Gustafson s Law rovides an excellent fit to the horizontal scaling measurements with σ ()=.477 (r 2 =.9999). This indicates that aroximately 4.8% of the work with one rocessor is erformed sequentially. Since this amount of work is constant, as more rocessors are added, this fraction decreases. Linear Scalability The linear model also rovided an excellent fit to the horizontal scaling measurements (r 2 =.9997). The sloe of the regression line is.39. Table 6 shows the measured values of maximum throughut along with the values redicted by Gustafson s Law and the linear model. Table 6: Measured Versus Modeled Throughut Number of Nodes Measured Gustafson s Law Linear Note that, as discussed earlier, for linear scalability the sloe must be one. Thus, a sloe of one was used to calculate the linear redictions in Table 6. Figure 9 shows a grahical comarison of the measured and modeled throughut for u to ten rocessors. Table 5: Measured Throughut for Horizontal Scaling Number of Nodes 2 3 4,2, Max TPS Number of Clients at Max TPS Aserver CPU Utilization 95.9% 95.58% 95.35% 95.22% DB Server CPU Utilization.7% 3.64% 6.2% 9.7% DB Server Disk Utilization 3.94% 27.79% 4.58% 53.25% Regression analysis shows that both Gustafson s Law and the linear model rovide good fits to the measured data. Regression analysis based on Amdahl s Law and the Suer-Serial model do not yield good fits to the exerimental data. In addition, both analyses give negative values for the serial arameters. Thus, Amdahl s Law and the Suer-Serial model are not aroriate for this data. Xmax (ts) Measured Gustafson's Law 2 Linear Number of Nodes (n ) Figure 9: Measured versus Modeled Data As Table 6 and Figure 9 indicate, the Gustafson s Law estimates more nearly match the measured values. However, an additional measurement at a higher number of rocessors would hel distinguish between these two models. Secondary Bottlenecks Both models redict that we can exect considerably more throughut from the horizontal scaling strategy than from the vertical. However, it is still imortant to be careful when extraolating. For examle, if our erformance requirement is, transactions er second, Gustafson s Law redicts that using ten nodes will give a maximum throughut of,5 transactions er second and the linear model 9
10 redicts a maximum throughut of,5 transactions er second. These rojections assume that no other bottleneck resource will limit our ability to achieve the required throughut with ten nodes, however. Looking at Table 5, we see that removing the alication server CPU bottleneck leaves the database server disk as the resource with the highest utilization. The demand at this resource is.32 seconds which agrees with the value of.38 obtained in the vertical scalability measurements to within exerimental error. This corresonds to a maximum throughut of 757 transactions er second. Therefore, to achieve the erformance requirement of, transactions er second, it will be necessary to either ugrade to faster disks or add a second disk to the database server. Of course, adding only ten nodes will mean that we are oerating at near one-hundred ercent utilization on the alication server CPU. This will result in unaccetably long resonse times, so additional nodes should be added to reduce the CPU utilization to a more reasonable number. Case Study Discussion The results of the analysis indicate a significant difference in the behavior of the system for vertical versus horizontal scaling. Since the alication software is the same in both cases, the difference must be due to the latforms. The most likely exlanation for this difference is the resence of the MP Effect when scaling vertically. The MP Effect is a loss of comuting caacity that occurs when adding rocessors to a single latform. This loss of caacity is due to additional overhead and/or contention between rocessors for shared system resources (e.g., the system bus) [Artis 99], [Gunther 996]. Gunther has shown that Amdahl s Law and the Suer-Serial Model aly to SMP scaling with suer-serial effects becoming more significant as the amount of interrocessor communication increases [Gunther 993]. It is temting to generalize this result and conclude that horizontal scaling is suerior to vertical scaling in all cases. However, the scalability of a system deends on the characteristics of both the alication and the execution environment. In this case, it aears that the software was structured into units that could execute indeendently in arallel. If a larger ercent of the workload were serial, both the vertical and horizontal scalability would have followed Amdahl s Law or the Suer-Serial model. In addition, the good horizontal scalability indicates that back-end database interactions were effectively arallelized so that there was little or no serial contention there either. This will not be true of all alications. In articular, for distributed alications that must maintain a common state (e.g., databases) there will be overhead to maintain coherence. In these cases, interrocessor communication will be a significant factor. For such alications, the enhanced communication efficiency of a bus versus a network may favor vertical scaling on a single latform. Each alication/latform combination should be evaluated individually. This case study also emhasizes the imortance of thoroughly understanding the system before committing to a scaling strategy. Secondary bottlenecks (such as the database disk here) are a fact of life. It is imortant to know what they are, how they imact the scalability of the system, and how costly they are to remove before undertaking exensive system ugrades. Finally, ihould be noted that the data ublished by BEA Systems, Inc. rovides a good examle of the tye of information that is useful for understanding and evaluating scalability. ECONOMICS OF SCALABILITY Scalability is an economic as well as a technical issue. In many cases there are alternative scaling strategies that will meet erformance requirements. The choice among them should then be based on cost. The imortance of cost in meeting erformance requirements is imlicit in the inclusion of cost figures in many benchmark reorts (see, e.g., [TPC]). These costs are rarely simle, one-time costs. Adding more hardware means that there will be costs for urchase or lease, software licenses, maintenance contracts, additional system administration, facilities, and so on. The timing of these exenditures is likely to be highly deendent on the scaling strategy. For examle, one strategy may require frequent, small ugrades while another may require fewer, more exensive ones. In order to make an unbiased comarison of the alternatives, it may be necessary to convert the costs to current dollars. Techniques for this are discussed in many laces, including [Reifer 22] and [Williams and Smith 23]. It is imortant to consider all costs associated with the scaling strategy. In some cases, hardware exenditures may be dwarfed by costs for suoroftware and middleware [Mohr 23]. Costs of ugrading are also subject to discontinuities as the amount of hardware is increased. For examle, aome oint adding a server may require hiring an additional system administrator or exanding the facility to accommodate the additional footrint.
11 Don t forget thacalability isn t just a hardware issue. It is often easy to increase scalability with a different (initial) software architecture [Williams and Smith 23]. In this case study, a design alternative that reduces the CPU consumtion of the alication could also imrove scalability. The modification would roduce a new version of the alication with new scalability characteristics. Note that the most cost-effective choice for meeting a given erformance requirement might not be the one with the highest overall scalability. SUMMARY AND CONCLUSIONS Scalability is one of the most imortant quality attributes of today s distributed software systems. Yet, desite its imortance, scalability in these alications is oorly understood. This aer has resented a model-based view of scalability in Web and other distributed alications that is aimed at removing some of the myth and mystery surrounding this imortanoftware quality. We use the relative caacity or scalability factor C ( ) = as a measure of the scalability of a system. Scalability is classified according to the behavior of C() as: Linear the relative caacity is equal to the number of rocessors,, i.e., C() =. Sub-linear the relative caacity is less than, i.e., C() <. Suer-linear the relative caacity is greater than, i.e., C() >. A key consequence of using C() as the metric for scalability is that for linear scalability, the sloe of the line must be equal to one. This means that both sub-linear and suer-linear scalability must, in fact, be described by non-linear functions. While measurements amall numbers of rocessors may aear to be linear, measurements at higher numbers of rocessors will reveal the non-linearity. This also means that linear extraolations of near-linear results, such as that in our oening examle, can be misleading. Since the actual function is necessarily non-linear, these extraolations will overestimate the scalability of the system if the sloe of the extraolated line is less than one and underestimate it if the sloe is greater than one. This aer has reviewed four models of scalability that are alicable to Web and other distributed alications. These are summarized in Table 7. We have also demonstrated the alicability of these models to Web alications via a case study of a simle Web alication. Analysis of measured data for the case study system indicates that its vertical scalability is best described by either Amdahl s Law or the Suer- Serial Model while its horizontal scalability is best described by either Gustafson s Law or linear scalability. Linear Model Amdahl s Law Suer-Serial Model Gustafson s Law The case study also demonstrates thacalability is a system roerty. In this case, the same alication exhibits differencalability roerties when scaling vertically or horizontally. As this aer demonstrates, these models are alicable to Web and other distributed systems. However, due to the comlexity of such systems, it is likely that some systems will not conform to any of these models. It is therefore imortant to determine, via analysis of measured data, that a given system follows a known model before making decisions based on redicted scalability. Scalability is also affected by software resource constraints such as a One Lane Bridge Performance Antiattern [Smith and Williams 22]. This aer addressed only hardware bottlenecks. This aer also considered only a single dominant workload. These techniques can be adated to cover these other asects of the roblem. REFERENCES Table 7: Scalability Models C S C A C() C L = = σ( ) = σ[ ( ) + γ ( ) ] C G [Alba 22] E. Alba, Parallel Evolutionary Algorithms Can Achieve Suer-Linear Performance, Information Processing Letters, vol. 82,. 7-3, = σ ( )
12 [Amdahl 967] G. M. Amdahl, Validity of the Single- Processor Aroach To Achieving Large Scale Comuting Caabilities, Proceedings of AFIPS, Atlantic City, NJ, AFIPS Press, Aril, 967, [Artis 99] H. P. Artis, Quantifying MultiProcessor Overheads, Proceedings of CMG '9, December, 99, [BEA 23a] BEA Systems, Inc., Avitek Medical Records. Architecture Guide, htt:// edocs.bea.com/wls/docs8/medrec_arch/ index.html. Journal of Parallel and Distributed Comuting, vol. 9, no., , 993. [TPC] Transaction Processing Council, [Williams and Smith 23] L. G. Williams and C. U. Smith, Making the Business Case for Software Performance Engineering, Proceedings of CMG, Dallas, December, 23. [Williams and Smith 22] L. G. Williams and C. U. Smith, PASA SM : An Architectural Aroach to Fixing Software Problems, Proc. CMG, Reno, December, 22 [BEA 23b] BEA Systems, Inc. BEA WebLogic Server: Caacity Planning, htt://edocs.bea.com/wls/docs8/calan/. [Brown 23] R. G. Brown, Engineering a Beowulfstyle Comute Cluster, Duke University, 23, beowulf_book/. [Gunther 2] N. J. Gunther, The Practical Performance Analyst, iuniverse.com, 2. [Gunther 996] N. J. Gunther, Understanding the MP Effect: Multirocessing in Pictures, Proceedings of CMG '96, December, 996. [Gunther 993] N. J. Gunther, A Simle Caacity Model for Massively Parallel Transaction Systems, Proceedings of CMG 93, San Diego, December, 993, [Gustafson 988] J. L. Gustafson, Reevaluating Amdahl's Law, Communications of the ACM, vol. 3, no. 5, , 988. [Jain 99] R. Jain, The Art of Comuter Systems Performance Analysis: Techniques for Exerimental Design, Measurement, Simulation, and Modeling, New York, NY, John Wiley, 99. [Mohr 23] J. Mohr, SPE on IRS Business Systems Modernization, Panel: The Economics of SPE, CMG, Dallas, 23. [Reifer 22] D. J. Reifer, Making the Software Business Case: Imrovement by the Numbers, Boston, Addison-Wesley, 22. [Smith and Williams 22] C. U. Smith and L. G. Williams, Performance Solutions: A Practical Guide to Creating Resonsive, Scalable Software, Boston, MA, Addison-Wesley, 22. [Sun and Ni 993] X.-H. H. Sun and L. M. Ni, Scalable Problems and Memory-Bounded Seedu, 2
QSEM SM : Quantitative Scalability Evaluation Method
Copyright 2005, PerfX and Performance Engineering Services. All rights reserved. QSEM SM : Quantitative Scalability Evaluation Method Lloyd G. Williams, Ph.D. PerfX 2345 Dogwood Circle Louisville, Colorado
More informationINFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1
RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul
More informationAn Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems
The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco
More informationMonitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More informationFrom Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University
More informationRummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
More informationStorage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
More informationA MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationA Multivariate Statistical Analysis of Stock Trends. Abstract
A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine
More informationENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationA Novel Architecture Style: Diffused Cloud for Virtual Computing Lab
A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud
More informationEffect Sizes Based on Means
CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationLoad Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
More informationProject Management and. Scheduling CHAPTER CONTENTS
6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method
More informationMemory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
More informationC-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
More informationThe impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
More informationManaging specific risk in property portfolios
Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading
More informationBuffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
More informationEvaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk
More informationMulti-Channel Opportunistic Routing in Multi-Hop Wireless Networks
Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de
More informationCompensating Fund Managers for Risk-Adjusted Performance
Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast
More informationFranck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr
MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
More informationDrinking water systems are vulnerable to
34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental
More informationDAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
More informationFree Software Development. 2. Chemical Database Management
Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN
More informationSecure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
More informationMultiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei
More informationAn Introduction to Risk Parity Hossein Kazemi
An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation
More informationMachine Learning with Operational Costs
Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and
More informationSoftmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting
Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar
More informationFailure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
More informationTime-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
More informationBranch-and-Price for Service Network Design with Asset Management Constraints
Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price
More informationSynopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
More informationComparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
More informationFDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
More informationElectronic Commerce Research and Applications
Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra
More informationTitle: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,
More informationBeyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis
Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationLarge-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationOn the predictive content of the PPI on CPI inflation: the case of Mexico
On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to
More informationWeb Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State
Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation
More informationTwo-resource stochastic capacity planning employing a Bayesian methodology
Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning
More informationPrinciples of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow.
Princiles of Hydrology Unit Hydrograh Runoff hydrograh usually consists of a fairly regular lower ortion that changes slowly throughout the year and a raidly fluctuating comonent that reresents the immediate
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationSimulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
More informationGAS TURBINE PERFORMANCE WHAT MAKES THE MAP?
GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? by Rainer Kurz Manager of Systems Analysis and Field Testing and Klaus Brun Senior Sales Engineer Solar Turbines Incororated San Diego, California Rainer Kurz
More informationMoving Objects Tracking in Video by Graph Cuts and Parameter Motion Model
International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir
More informationSage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist
I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence
More informationRisk in Revenue Management and Dynamic Pricing
OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri
More informationCABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION
XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical
More informationOn the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks
On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington
More informationLearning Human Behavior from Analyzing Activities in Virtual Environments
Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,
More informationThe fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
More informationForensic Science International
Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection
More informationA Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
More informationTOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
More informationCOST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
More informationInteraction Expressions A Powerful Formalism for Describing Inter-Workflow Dependencies
Interaction Exressions A Powerful Formalism for Describing Inter-Workflow Deendencies Christian Heinlein, Peter Dadam Det. Databases and Information Systems University of Ulm, Germany {heinlein,dadam}@informatik.uni-ulm.de
More informationOn Software Piracy when Piracy is Costly
Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of
More informationThe Competitiveness Impacts of Climate Change Mitigation Policies
The Cometitiveness Imacts of Climate Change Mitigation Policies Joseh E. Aldy William A. Pizer 2011 RPP-2011-08 Regulatory Policy Program Mossavar-Rahmani Center for Business and Government Harvard Kennedy
More informationRed vs. Blue - Aneue of TCP congestion Control Model
In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6
More informationResponse-Time Control of a Processor-Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders
Resonse-ime Control of a -Sharing System Using Virtualized Server Environments Kjaer, Martin Ansbjerg; Kihl, Maria; Robertsson, Anders Published in: Proc. of the 7th IFAC World Congress Published: 8--
More informationDynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing
Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile rsolar@yahoo-inc.com Veronica Gil-Costa Universidad Nacional de San Luis, Argentina
More informationPartial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo
Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter
More informationSage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
More informationBravo Software Group e.commerce enablers... 2 RemoteDesk... 4
Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk
More informationThe Fundamental Incompatibility of Scalable Hamiltonian Monte Carlo and Naive Data Subsampling
The Fundamental Incomatibility of Scalable Hamiltonian Monte Carlo and Naive Data Subsamling Michael Betancourt Deartment of Statistics, University of Warwick, Coventry, UK CV4 7A BETANAPHA@GMAI.COM Abstract
More informationJoint Production and Financing Decisions: Modeling and Analysis
Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290
2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba
More informationTHE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari
More informationSage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
More informationRisk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7
Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk
More informationOptional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR
Otional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Esilon_ AUTHOR Len Schwer Schwer Engineering & Consulting Services CORRESPONDENCE Len Schwer Schwer Engineering
More informationThe Economics of the Cloud: Price Competition and Congestion
Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di
More informationDesign of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross
More informationSage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
More informationF inding the optimal, or value-maximizing, capital
Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital
More informationCharacterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
More informationWhere you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies
Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you
More informationhttp://www.ualberta.ca/~mlipsett/engm541/engm541.htm
ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm
More informationAn Associative Memory Readout in ESN for Neural Action Potential Detection
g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks
More informationMigration to Object Oriented Platforms: A State Transformation Approach
Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationAn inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods
An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,
More informationSage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
More informationSang Hoo Bae Department of Economics Clark University 950 Main Street Worcester, MA 01610-1477 508.793.7101 sbae@clarku.edu
Outsourcing with Quality Cometition: Insights from a Three Stage Game Theoretic Model Sang Hoo ae Deartment of Economics Clark University 950 Main Street Worcester, M 01610-1477 508.793.7101 sbae@clarku.edu
More informationFIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012
FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012
More informationJena Research Papers in Business and Economics
Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion
More information