User Program. System call stubs kernel instrumentation. Operating System Kernel. Network monitoring. RPC Device Driver XDR UDP/TCP IP

Size: px
Start display at page:

Download "User Program. System call stubs kernel instrumentation. Operating System Kernel. Network monitoring. RPC Device Driver XDR UDP/TCP IP"

Transcription

1 Acomparisonofsystemmonitoringmethods,passivenetwork monitoringandkernelinstrumentation A.W.Moore,A.J.McGregory&J.W.Breenz Abstract Thispaperpresentsthecomparisonoftwomethodsof systemmonitoring,passivenetworkmonitoringand kernelinstrumentation.thecomparisonismadeon thebasisofpassivenetworkmonitoringbeingused asareplacementforkernelinstrumentationinsome situations.despitethefactthatthepassivenetwork monitoringtechniqueisshowntoperformpoorlyas adirectreplacementforkernelinstrumentation,this paperindicatestheareaswherepassivenetworkmonitoringcouldbeusedtothegreatestadvantageand presentsmethodsbywhichthediscrepanciesbetween resultsofthetwotechniquescouldbeminimised. 1 Introduction Theuseoflesystemmonitoringingeneral,and comprehensivekernelmonitoringtechniquesinparticular,havelaidthecriticalgroundworkforthedevelopmentandrenementformanyoperatingsystems.kernelinstrumentationhasthepotentialto giveanexactrecordofwhatoccurredinthekernel ofasystemand,asaresult,iscommonlyusedwhen highprecisionisrequired. Ithasbeenused,instudiessuchasOusterhoutet al.[20],smith[28],mummertandsatyanarayanan[17,29]andbakeretal.[2],torecordinformation aboutanoperatingsystemanditslesystems.the resultsandconclusionsofthesestudieshavethen beenusedforstudiesoftopicssuchascacheissues DepartmentofRoboticsandDigitalTechnology,MonashUniversity,Clayton,Victoria3168,Australia(andrew.moore@rdt.monash.edu.au). ydepartment of ComputerScience,WaikatoUniversity,PrivateBag3105,Hamilton,NewZealand(T.McGregor@cs.waikato.ac.nz). zdepartmentofroboticsanddigitaltechnology,monashuniversity,clayton,victoria3168,australia(j.breen@rdt.monash.edu.au). andsimulationmodels[32,7,8,33],andinthedesignprocessofnewsystems[11,19,13,10,21]. However,whilethereisalargevarietyofsystemsincommonuse,asimilarlywidevarietyofcomprehensivestudiesisnotevident,whichcanbeattributedtothedicultiesinperformingsuchstudies. Comprehensivestudiesusingkernelinstrumentation haveanumberofdrawbacks,asseeninthefollowing list(adaptedfrommoguletal.[16]): codewhichistoresideinthekernelisdicult towriteanddebug, kernelsource-codeisnotalwaysavailable, thekernelmustberecompiledandthemachine rebootedeachtimeanerrorisfound, errorsinthekernelcodearelikelytocause systemcrashes, functionally-independentkernelmodulesmay havecomplexinteractionsoversharedresources, kernel-codedebuggingcannotbedoneduring normalmachineoperation;specicdevelopmenttimemustbescheduled,resultingininconvenienceforuserssharingthesystemand oddworkhoursforsystemprogrammers, commonlyadditionalloadisintroducedonto themonitoredsystem, sophisticateddebuggingandmonitoringfacilitiessuchasthoseavailablefordevelopinguserlevelprogramsmaynotbeavailableforkernel code. Kernelinstrumentationforle-systemmonitoringtakestheformofcodeinsertedatthesystemcallinterfaceorattheinternalinterfacebetween

2 system-callandle-systemoperations.suchmethodssuggestanalternativetechniqueformonitoring acomputer'sle-systemactivitieswherethecommunicationschannelbetweenamachineanditsdisk drives,andinparticularbetweenadisklessclient anditsdiskserver,ispassivelymonitored.blaze usedthistechniquewithhissnooper/rpcspysoftware[3],passivelymonitoringtracbetweennetworkfilesystem(nfs)[24]clientsandservers,and predictingtheoperationstheclientsperformedto causethoseoperations. Fullkernelinstrumentationisusedcommonlyin systemmonitoringbut,bydenition,itinvolvesthe modicationoftheoperating-systemsource-codefor themachineinquestion.passivenetworkmonitoring canbeapreferredchoiceoverkernelinstrumentationforcertainsystem-monitoringwork,particularly ifthesource-codeisnotavailable.passivenetwork monitoringalsohasotheradvantages,including: resultsfromthemachinesbeingmonitoredcan becollectedindependentlyofthosemachines, nomodicationsarerequiredtotheoperation ofthemonitoredsystems, thecollectionofdatawithpassivenetwork monitoringdoesnotimpactonthemachines beingmonitored,and theabilityexiststomonitormultiplemachines simultaneouslyonanetwork. Thisnalpointisimportantbecausedistributed systemsaregrowinginpopularityandasignicant numberofcomputersincommonusearepartofa distributedsystem,ifonlythroughthedistribution andsharingofles.comprehensivestudiesofdistributedsystemsingeneralanddistributedlesystemsinparticulararerelativelyrare.themainreasonforthisisthatthecomplexityofcollectingdata isgreatlyexacerbatedbytheneedtocollectitsimultaneouslyfromalargenumberofmachines.kernel instrumentationwouldrequiremodicationofany numberofdierentcomputerswithdierentoperatingsystemsrunningondierenthardware.there wouldalsobetheissuesoftheloadimposedinthe actualcollectionofdataonorfromeachclientand theimmensetaskofpost-processingthedatafrom thedierentmachines. Thesedisadvantagesdonotexistwhenusingpassivenetworkmonitoringofthedatachannelbetween clientsandaserver.dataaboutallactiveclientscan becollectedsimultaneouslyand,ifadistributedle systemssuchasnfsisinuse,thedatacollected fromthenetworkisindependentoftheoperating systemormachinearchitecture[15,14]. 2 rpcspy/nfstrace Ifrpcspy/nfstracearetobeusedasareplacement forkernelinstrumentation,thetechniquemustbe abletodelivertoaresearcherdatasimilartothat generatedbythekernelinstrumentationtechniques. rpcspy/nfstracehastwodistinctcomponentsfor achievingthis. rpcspyinteractswiththeethernet-interfacefacilitiesofthemonitoringmachineandcollectspackets traversingthenetworktowhichitisconnected.the packetsareconvertedintotherequestorreplypart ofannfsremoteprocedurecall(rpc).eachrequestandreplyisthenmatchedtogether,dataofinterestareextractedandatransactionrecordismade alongwithatimestampofwhenthetransactionwas completed. Thesecondcomponent,nfstrace,usesanheuristicbasedontheoperationofNFStomakean estimationofthedurationofale'sopen-closesession(thetimebetweenwhenaleisrstopened, readfromand/orwrittentoandthenclosed)which causedthenfstransactionsrecordedbyrpcspyto occur.nfstracecreatesrecordsofleopen-close sessionsitestimateshaveoccurred(and,thus,to havegeneratedthenfstransactionsseen).this estimationrelies,inpart,onconsistencyinnfsimplementations. Forexample,foreveryopensystemcall(independentofwhethertheleistobereadtoand/orwrittenfromorjustaccessed)anNFSgetattr transactionisgenerated.however,open-closesessionstoreadorwritedatahandletheactualdata insignicantlydierentwaysalthoughitshouldbe notedthatthewritetransactioncaseiseasierto handlebecausethecachedoesnothaveasdominant eectonthewriteoperations.asaresult,muchof thespecial-casehandlingnfstracemustdoapplies onlytonfsreadtransactions. rpcspy/nfstracetogethergenerateanestimationoftheopen-closesessionsthatakernelinstrumentationsystemcouldrecorddirectly.figure1

3 User Program System call stubs kernel instrumentation Local Filesystem Block Cache NFS Filesystem Figure1:Thedataowbetweenauserprogramand RPC annfslesystem.instrumentationpointsforker- Device Driver XDR nelinstrumentation(snooper)andnetworkmonitor- ing(rpcspy)areindicated.thisdiagramcompares UDP/TCP IP Operating System Kernel thedierenceintheinformationavailabletoeach network system.inparticular,oneinstrumentationpoint, Network monitoring snooper,isbeforethecacheandtheother,rpcspy, isafterthecache. showshowtheinstrumentationpointsforeachofthe twosystemsdierinthecomponentsofthesystem availabletothemand,thus,theinformationaccessibletothem. suchasthesystemcallsoccurringonthecomputer, whilepassivenetworkmonitoringmustinterpretthe whichsystemoperationshaveoccurred.rpcspy transactionsbetweenclientandservertoestimate Kernelinstrumentationisabletorecordevents curredbetweenclientandserver. serversideoftheclientcache-thetracthatoc- /nfstraceresultsrecordwhathappenedonthe 3 Previousworkusingrpcspy hasbeenusedinseveraldierentworkstoaidinthe Therpcspy/nfstraceimplementationbyBlaze rpcspy/nfstracetoanalyseclient-serverlesystem tracandmadeuseofinformationaboutthetrac congurationofexistingsystems.anderson[1]used developmentofnewsystemsandasanaidtothe Regularly-read,static,read-onlylesweremovedto tobetterutiliselocaldisksintheclientsthemselves. thelocaldisk,onapartiallyautomaticbasis,takingintoaccounteachle'sutilisationbyapartic- ularworkstation.blazeusesresultscollectedusing rpcspy/nfstraceinanumberofworkstojustify versionofnfstracetocollectresultsusedinapaper thedesignofawidearealesystem[4,5].finally, tojustifyaparticularlesystemdesign[34]. Dahlinetal.[9]usesrpcspyandapartially-modied sumptionthatcomplicationsintroducedbythere- sultsofrpcspy/nfstracearenegligible.thisis validforstudiesbaseduponthetracbetweena clientandserverwhichtakeintoaccounttheeects Eachofthesestudieshasbeenmadewiththeas- oftheclientcachesuchasdahlinetal.[9].however,otherstudiescanbeatriskforassumingthat rpcspy/nfstraceissuchaperfectreplacementfor traditionaltechniques. softwarethattheeectsofpacketlossshouldbe oftherpcspy/nfstracesoftwarethatpeculiarities quantied.additionally,henotesinhisdescription oftheheuristicsofnfstrace(anditsoriginalimplementation)needtobeevaluatedmorecompletely. beenwithoutanyharddataontheaccuracyofthe implementationandonlyapassingappreciationof areaswheretheimplementationisinaccurateand thereasonsforthoseinaccuracies.thefollowingsec- Previously,theuseofrpcspy/nfstracehas Blaze[4]notesinhisdescriptionoftherpcspy datafromthesamesourceandthendiscusstheresultstionspresentacomparisonoftwosystemsrecording Therpcspy/nfstracetoolsdependheavilyonthe 4abilityofthenetworkinterfaceofthemachineon Systematicerrorinrpcspy whichtheyarebeingruntocapturealltracpass- notlosedatawhenutilisationislowbutdataloss withnetworkutilisation.thenetworkinterfacewill ingthroughthenetwork.packet-lossbythenet- workinterfacedoesnothavealinearrelationship willincreaseasutilisationincreasestoapointbeyondwhichitwillbeunabletoacceptanyfurther dataitcanprocesswillattenoutnomatterwhat theutilisationbeyondthatpoint. datalossofrpcspyandtocalibratethenetworkinterfacerpcspyuses.toperformthesetestssatisfactorily,anetworkanalysercapableoffull-utilisation increaseinthedata-transferrate.theamountof Astudywasperformedtoquantifythepotential

4 measurementsonethernetwasrequired.ahewlett PackardInternetAdvisorModelJ2522Aswasused bothtomakemeasurementsandtogeneratearticialloadsonthenetwork.thepacketfiltermech- operatingsystem. anismusedwasinadecstation3100runningul- trix4.3aandthenitmechanismusedwasinasol- bournesc2000(amachinecompatiblewiththesun Sparcstation2)runningaSunOS4.1.2compatible articially,usedthetracbreakdownintable1 whichwasbasedonananalysisofthenetwork'sregulartraccontentcollectedoverseveral24-hourperiods. Testsofrpcspy,wherethenetworkwasloaded congurationoptions.inparticular,thesizeofthe canbeset.thenitmechanisminsunosdoesnot packetbuer,wherepacketsprocessedbypacket filterareplacedforcollectionbytheuserprocess, ThepacketfilterfacilityofUltrixoerssome oerthiscongurability.thedefaultconguration Ethernetnetworkutilisation.Itisapparentthatnot percentageofunprocessedethernetpacketsversus arecomparedinfigure2.thisgureshowsthe packetfilterinadditiontothenitmechanisms andanoptimum(largestcongurablebuersize)for onlyarethecharacteristicsofthenitmechanism packetfiltermechanismshowednolossuntilover 15%utilisation,astagebywhichNITmechanismloss poorbeyond10%utilisationbutthatthepacket leveloflossuntilutilisationwascloseto50%.the wascloseto25%. filtermechanismdidnotdemonstratethesame ofprocessingoverheadontheclient,whichisimposedbytheneedofrpcspytomatchrpctransactions,andthepacket-losscharacteristicsoftheethernetinterfacewhichrpcspyisusing.figure3shows Asignicantissueinrpcspyisthecombination thenumberofnfstransactionsversusethernetutilisation.theethernetutilisationinthesetestsisal- processinagiventimeperiod.thehewlettpackard mostpurelynfstrac.byusingnfstracexclu- sivelyweareabletoestablishthemaximumnumber ofnfstransactionseachrpcspysystemisableto guration. testthepacketfilterwasleftinthedefaultcon- transactionsthatoccurredoverthistime.forthis testequipmentrecordedtheactualnumberofnfs mumnumberofpacketsitcanprocess.thenit- Thetestshowsthateachsystemhasamaxi- Total packets unprocessed (%) Packetfilter (default) Packetfilter (optim.) NIT suspacketlossforvariousworkstationethernetin- terfaces.packetfilterdefaultandoptim(um)are Figure2:AcomparisonofEthernetutilisationver twocongurationsoftheethernetpacketcapturefacilityofthedigitaldecstation,nitistheethernet 10 capturefacilityinsunmicrosystem'ssunos Utilization (%) urationpacketfilter-ultrixcombinationappears tobelimitedtoprocessingapproximately260nfs NFStransactionspersecond.Thedefaultcong- transactionspersecond.itisimportanttonote SunOSsystemislimitedtoprocessingabout175 thiswasastress-testingofrpcspyandthatsuch NFSloadswerenotacharacteristicofthenetwork guresintable1wecanseethat36%ofthetotalethernettracisfromnfs.however,itwould notbetruetosayofthis36%thathalfthenumber ofnfsethernetpacketsisanapproximatecount ofcompletenfstransactions.suchasimplicationwouldnotallowfortherebeingincompletenfs transactions(thelossoftherequestorreplyina transaction),norwoulditallowfornfstransactions (transactionswherethedatapayloadrequiredtwo thatrequiredmorethanonepairofnetworkpackets towhichthesemachineswereconnected.fromthe thetestnetworkoperatingat12%utilisationcould meanlessthan72transactionspersecondinamixed rpcspydoesnotneedasmuchprocessortimeasif ithadhadacompletenfstransaction.asaresult, ormoreethernetpackets).ineachofthesecases loadwithavarietyofnfstracratherthanthe200 indicates. transactionspersecondthatthefigure3stress-test forcertainbutitcouldresultfromlimitationsin thehardwareofthenetworkinterfaceand/orinthe Theexactcauseofsuchdatalossisnotknown

5 InternetProtocol(IP)67UDP Protocoltype Sub-protocolTypesofpacketPacketsize(avg.) TCP NFS (all) % NovellNetware(IPX) Table1:AbreakdownofthetracmixtureusedfortestingrpcspyresponsetoEthernetutilisation areactuallyclosetojust5%ofthenetworkcapacity) supportsthisobservationwithamaximumloadover andthenetworkonwhichmeasurementsweretaken thatmostethernetloadsarewellbelow50%(and isationover24hoursofcloserto1.1%. 24hoursofnogreaterthan18%andanaverageutil- Figure3:ThenumberofNFStransactionsversus yserrecordingnopacketlossisalsogiven. EthernetutilisationfortheNITandpacketfilterrpcspy/nfstraceandakernelinstrumentation 5Thefollowingresultspresentacomparisonbetween Comparison softwareofthepacketcollectionandlteringmechanism.thischaracteristicisunfortunate.itisduringsnooperpackage.itwasimplementedoriginallyby asubstituteforkernelinstrumentation. sumptionthatrpcspy/nfstracewouldbeusedas capturemechanisms.resultsfromanetworkanal-technique.intheseresultstherehasbeenanas- acrossadistributedlesystemwillpotentiallybe highest.becausethereispotentialforrpcspybased thetimewhenthenetworkisbusiestthatutilisation SiebenmannandZhou[27]forUltrixversion3.3. Snooperisasetofkernelinstrumentationroutines Thekernelinstrumentationthispaperusedisthe toolstolosedataabouttransactionsatbusytimes, studiessuchaslesharing,asituationthatwouldblockoperations,processexecutionandtermination, functionsincludinglogicalleoperations,physical- bemorelikelytooccuratbusiertimes,wouldbeetc.thesnooperpackageisbaseduponthepackage forrecordinginformationaboutanumberofkernel aectedadversely. inturn,sharesitsancestrywiththepackageusedby ofthesamenamedescribedinzhouetal.[35]which, offasterworkstationswithfasterhardwarenetwork implementationperformanceineitherthenetwork interfaces.however,thismaynotbesolvedaseasily iftheproblemisdueprincipallytopoorsoftware SuchdrawbackscouldbeovercomebytheuseOusterhoutetal.[20]toperformtheirstudyofthe UNIX4.2BSDlesystem. nicantonlyaboveabout10%utilisationforthe packetcapturemechanism(nit/packetfilter)or packetfiltermechanism.boggsetal.[6]comment rpcspy. ditionalpost-processingcodewasrequiredforthe dedbyanopenandaclosesystemcall.nfstrace open-closesessions,i.e.setsofletransactionsboun- performsthatfunctionforrpcspy/nfstracebutad- Theresultsfromeachsystemwereprocessedinto Whilethischaracteristiclossdoesexist,itissig-dataproducedbysnoopetracehavebeendonebyusingsimultaneoustraces ofasinglemachineovera24-hourperiod.thetrace ofthismachinewasperformedfrom11:00a.m.monday,12thofdecember,1994,until11:00a.m.thefol- Thecomparisonsofsnooperandrpcspy/nfs- NFS transactions recorded per second NFS transactions recorded versus ethernet utilization packetfilter NIT Hardware Monitor Ethernet utilization (%)

6 lowingday.themachinetracedwasadigitaldecstation3100conguredwith20mbytesofmemory, runningultrix4.3a.thismachinewascongured withalocaldiskforvirtualmemoryswapactivities. Therpcspytracewasrecordedtoanadditionallocal disksoasnottoperturbtheresultswithextraneousnetworkactivity.duringthe24-hourperiod,a lossof1.5%oftotalethernettracwasrecorded. Basedonthegraphsofpacketlossversusutilization (gure2)andupontheaverageethernetpacketutilization(table1)thisgivesanapproximatelossof 0.6%ofNFStransactionsfromthetotalrecorded trace. Thenfstracepost-processingtoolusesaheuristicwhichincorporatesatimeouttodeterminehow longanopen-closesessionwilllast.thevalueisuserselectablebutthedefaultvalueof135secondswas usedthroughouttheanalysisdescribedherein. 5.1Excludeddata Alltransactionsassociatedwiththereadingofexecutablelesrecordedbyeitherthesnooperorrpc spysystemswereremovedfromthetracedatabefore processing.thiswasdonetoavoidproblemsassociatedwithashortcominginthesnooperinstrumentation,nottherpcspy/nfstracesystem.records pertainingtothesnoopertraceleitselfwereremovedfromtheoutputrecordsduringtheprocessing stage. Whiletheremovalofallexecutiontransactions mayseemtochangetheresultspresented,theremainingdatastillpermitasatisfactorycomparison ofthetwomonitoringsystems.theamountofpotentialcomparison-errorwhichwouldbeintroduced duetotheinclusionofincompleteexecutionrecords bysnooperwasnotjustied.additionally,lesystemtracresultingfromtheloadingofexecutable leswasexcludedfrompreviousstudiessuchas Ousterhoutetal.[20]andBakeretal.[2]duetosimilarproblemsintheloggingofexecutableletrac. 5.2Systemtrac Thecharacteristicsofthetotalle-systemcommunicationstracarecommonly-usedmeasurements.In thecaseofdisklessworkstations,themeasurements areimportantforinsuringthatthenetworkshave adequatetransportcapacityandthattheserversof disklessworkstationshaveadequateservicecapacity. Inanysortofworkstationsuchvaluesdenetherequiredcapacityfordiskinterfaces,aswellasbeing usedincacheandbusdesign[35,21,20,2,23]. Acomparisonofcommunicationstractoand fromthelesystematthelogicallevelandofthe communicationstracattherpcspynetworklevel arenotstrictlycomparablebecauseeachsetofmeasurementswasmadeonadierentsideofthecache. However,oneoftheobjectivesofnfstracewasto estimateoperationsthatoccurredattheuserlevelby analysingthedatacommunicationstracbetween clientandserverandthetransactionsusedbythe clienttoensurethecontentsofthecacheareup todate.asaresult,whilerpcspy/nfstracecannotgenerateinformationonexactlywhatdatawere transferredbetweentheuserprogramsandthele system(includingthenfsle-systemroutinesand theblockcache),itcancalculatetheexactamount ofdatatransferredbythenfslesystembetween NFSclientandserver. Table2givesasummaryofresultsforthecomparisonperiod.Itisapparentimmediatelythatthere isamajordierenceinthevaluenfstraceestimates forthetotaldatatransferredwhencomparedwith snooper.theydierbyafactorof1:7.fromthese resultsitisequallyapparentthatoverthecourseof along-termanalysis(24hours)theresultsforpeak valuesandwritedataarecomparableforthetwo systems. Peakvaluesdisplaythischaracteristicbecause theytypicallyinvolveamountsofdatathataretoo largeortoovolatiletobesuitableforlongtermstorageinthecache[20,2,28]-thischaracteristicis independentoftheparticularloadamachineisunder[18].asaresult,thesimilaritybetweentransferreddata,particularlypeakvalues,wouldremain acrossanysampletaken.incomparison,valuesfor thetotalquantityofdatatransferredovertimeis notsimilar.thedierencebetweensnooperread averagesandnfstracevaluesisnotsurprising.the clientcachewilleliminatesuccessivenfstransactionsforreadingdatafromthenfsserverand,as aresult,nfstracecannotrecordthedatatransfer thatoccurredatthelogicallevel. Figure4showsplotsofdatatransferredovertime asrecordedbysnooperandrpcspy/nfstrace. Higherlevelsofdatatransfer,particularlysignicantwritingactivity,between7a.m.and11a.m.

7 Totaldatatransferred Averagedatatransferred measurement Particular interval length 86,644,53046,967,724 snooper (bytes) nfstrace Peakdatatransferred 10seconds 10,028 (bytes) Averagedataread Peakdataread Averagedatawritten 7,468 5,048,320 3,914,935 5,436 Peakdatawritten 2,560 2,590 Averagedatatransferred Peakdatatransferred 10minutes19,028,55017,015,414 5,120, ,698 5,048, ,165 2,846 Averagedataread Peakdataread Averagedatawritten 10,427, , ,595 7,144, ,387 Table2:Thetotaldatatransferredforthesystem.Peakandaveragevaluesfor10secondand10minute intervalsarealsogiven. Peakdatawritten 8,600,705 9,289, ,777 thereadingandwritingoflargeimageles. (byanotherresearcher)onthismachinerequiring isduetothetestingofimageencodingalgorithms mentationandthatavailabletonfstrace.peri- dierencebetweendatagainedfromsnooperinstruodicaccessesbyautomaticjobsaccountfortheregularcommunicationstracloggedduringthe19:00 Thegraphofread-datashowsanexampleoftheble3liststhedierentlesystemstheclientaccessed lesystemcontainsexecutablelesforthesystem, to07:00period.becausethiscommunicationstraf-overthetraceperiodandthetaskseachlesystem storetracedatalocally,andalocal,swapdisk.ta- etc.thedecstationanalysedinthisstudydidnot cinvolvestheregularexecutionofprograms,com-servedmonlywithlittleotherle-systemactivity,thecacheandfromeachlesystemcanbeusedtoassistin makingle-system-congurationdecisions.suchde- haveanylocallesystems,apartfromthatusedto oftheclientholdsallthenecessarysoftwareandassociateddatales.theresultisthatapproximately 300Kbytesoflogicaldataarereadeach30minutes period. read-activitybetweenclientandserveroverthesame atthesnooperlevelbutrpcspyrecordsnegligiblecisionscanincludewhichlesystemsgenerateso Abreakdownofthetypeofdatatransferredto ordsofrawdatatransferisbecausenfstransactions donotcontainsignicantinformationaboutblocks readdataavailabletorpcspyaboutdatatransfers readfromthecacheoftheclient.theonlyspecic Thereasonnfstraceisnotasaccurateforrec-ble4. muchservertracthatitwouldbebetterforthem tobeattachedlocallytothemachineandhowwidely lesystem'scommunicationstracisgiveninta- aparticularlesystemisused.abreakdownofeach theserver'sdisks. 5.3Filesystemtransactions thatoccuriswhendataarereadbytheclientfromnoteisaverylargepercentageofoperationsasso- ciatedwiththe/partition.thelargenumberof Itisimportanttonotethatatthesystem-call isticbreakdownofthesetransactions.ofparticular level,asrecordedbysnooper,thereisacharacter- transactionsonthispartitionwillhavebeenpotentiallycompoundedbecausethe/tmpand/var/tmp directoriesresidedonthe/lesystems./tmpand typicallyforaparticularpurpose.forexample,one Aswithmostunixsystems,eachlesystemisused/var/tmpcanpotentiallycarryalargepercentageof operationsbecausetemporarylesaretraditionally lesystemcontainstheusers'directories,anothercreatedinthisdirectorystructure[31,22]. resultsfromthetwomonitoringmethods.notable exceptionsaretracinvolvingthe/partitionand Table4showsamoderatesimilaritybetweenthe

8 Read data transferred over day (10 minute samples) Bytes transferred 10 Mbyte 8 Mbyte 6 Mbyte 4 Mbyte 2 Mbyte snooper read nfstrace read 0 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day 10 Mbyte snooper write nfstrace write 8 Mbyte 6 Mbyte Figure4:ReadandWritetransfersasrecordedbykernelinstrumentation(snooper)andnetworkmonitoring(nfstrace).Aquiescentsystemfrom19:00until7:00,themachineisbusyduringthedaylight 4 Mbyte hours. 2 Mbyte 0 Mbyte 11:00 13:00 15:00 17:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day FileSystem FunctionandContents Bytes transferred Write data transferred over day (10 minute samples) / /var/spool/mailcontainseachusers'maille. rootlesystem,alsoincludes/varand/tmp.top-levellesystem /usr/local containsstandardsoftwaredistribution,inadditiontolibrariesandincludelesforthecurrentsystem. containingtemporarydirectoriesandloggingdirectories. containslocallyinstalledsoftware. /usr2 /packages Table3:Abreakdownofthelesystemsofthestudyandtheirrespectivefunctions. homedirectoriesforagroupofusers. containscommercialsoftwarepackagesandcollectionsofprojectspecic data(inthiscaseimagedata).

9 FileSystem/31,736,478(36.63) snooper total rpcspy/nfstrace /var/spool/mail /usr/local 2,941,480(03.39) 4,385,788(05.06) 5,863,351(11.59) /packages /usr238,660,513(44.62)35,251,413(69.66) 1,455,692(01.68) 7,464,579(08.62) 1,446,003(02.86) 3,142,239(06.21) read 3,934,663(07.78) 965,364(01.91) /var/spool/mail /usr/local /27,267,823(42.26) 2,941,480(04.56) 3,836,074(05.94) 2,853,302(12.73) /packages /usr221,561,247(33.41)10,895,621(48.63) 1,455,692(02.26) 7,464,579(11.57) 1,446,003(06.45) 2,311,208(10.32) write 3,934,663(17.56) 965,364(04.31) Table4:Totaldata,readdataandwritedatatransferredperlesystemasmeasuredbysnooperand /var/spool/mail /usr217,099,266(77.31)24,355,792(86.38) / 4,468,655(20.20) 549,714(02.49) 3,010,049(10.68) rpcspy/nfstrace. 831,031(02.95) read-tracingeneral.whiledierencesbetween valuesforreadbetweensnoopermeasurementsand particularlypronounced.thisdierenceislikelyto thoseofrpcspycanbeexplainedasresultingfrom clientandserver,thereadtracforthe/partitionis thecachemechanismlteringreadrequestsbetween resultfromahighusageofsystemleslocatedinthe ofsuchlesinclude/etc/passwd:thelistofusers spondingcacheentriesalwaysbeingvalid.examples /etcdirectorybeingaccessed,resultinginthecorre-fromtheserverandthenmayremaininthelocal cachewhilebeingusedrepeatedly.finally,during thesource-codeles,librarieswillbereadonlyonce server(andseenbyrpcspy)butnotnecessarilyread fromthenfsserver.duringstage2,inadditionto onthisclient. lelistingthelesystemsthatshouldbemounted thesystemsknowntothisclientand/etc/mount:a abletouseasystem,/etc/hosts:astatictableofrunstherawimagestreamcouldhaveremainedin stage3,whileletransactionsrelatingtotheloadingoftheexecutableleitselfhavebeenremoved, thisprogramtakesasinputarawimagestreamand outputsanencodedimagestream.onconsecutive ofreadandwritedatafor/usr2isareectionof thevolatilenatureoflesonthislesystem.in particular,softwareforimageencodingwasbeing developedandacycleof Thenotabledierenceintherecordedquantities/usr2asmeasuredwiththesnoopersystembutthe tracalreadygreatlyfavoursthewrite-tracfor localcache. Itshouldbenotedthattheratioofread-to-write 1.editprogram forboththe/usr2and/var/spool/maillesystemscanbeattributedtotheblockcacheneeding writetracrecordedbyeachmonitoringsystem Signicantdierencesbetweentheamountof cacheactivities,lteringtrac,increasethisratio. existed.thisdevelopmentcycle,duringstage1,resultedinsource-codelesbeingwrittentothenfs 3.runprogram totransferdatatoandfromthelesysteminblocksizedpieces.theresultofthisisthatamodication wholeblock(8kbytesfortheselesystems). ofonebyteinalewillresultinthewritingofa 2.compileprogram percentageoflogicalletrac,blockcachingseems itiesonthe/lesystemareresponsibleforalarge Fromthisbreakdownitisclearthat,whileactiv-

10 toreducethequantityofdatatransferredbyafactorofupto6.bycomparison,the/usr2lesystem isresponsibleforahigherquantityofdatatransfer and,inthedevelopmentandbalancingoflesystems,itwouldbeimportanttoestablishwhether thisisatransientconditionoraregulartrendfor communicationstracforthatparticularlesystem. 5.4Systemusers Table5presentsseveralvaluesrelatedtothenumber ofactiveusersonthesystemandtheamountoftraf- cgeneratedbythem.suchtabulationshavebeen madeinanumberofpreviousstudiesandareuseful intheestimationoftheloadausermayimposeon asystemaswellastheworst-casescenariosforthis loadṫhedierencesintable5forthenumberofusers aremostlikelytheresultofsnooperrecordingthe realuserid(uid)associatedwitheachlogicaloperationandrpcspyrecordingtheeectiveuserid associatedeachnfstransaction.thisdierence comesaboutbecauseprogramssuchasinetd(the internetservicedaemon)performoperationsasone userandspawnprogramsthatwillrunasanother user.theresultisthatcountsofactiveusersmade throughrpcspy/nfstraceusuallydierbyavalue ofonewhencomparedwiththeactiveusercount fromsnooper. Average-data-utilisedperuserindicatesthat cache-hitratesare,onceagain,absorbingasubstantialquantityofcommunicationsthatwouldhaveoccurredbetweeneachuserandthelesystem.itis interestingtonotethatthemaximumvaluesrecordedbyeachsystemarealmostidentical.thisis mostlikelyduetothetransferoflargeamountsof data,causingtheclient'scachetobequicklyoverrun withnewdata.asaresult,onlyaminimalamount ofdataiscachedduringthistime. 5.5Files Aslesarethecommonunitofdataaccessedon alesystem,informationabouttherangeofles accessed,aswellastheworkingsizeofthoseles, enablesdeveloperstodeterminethenecessarysize oflecaches,toestablishcommonworking-setsizes andtoquantifyotherrelatedmeasurements. Ashasbeenmentionedearlier,thedierencein theaveragelesizeforthe/lesystemwaspredictable.thiswillprincipallybearesultofalarge numberofsmall,system-relatedlesnotrequiring accessfromthenfssystem.thedierencesinother valueswillhaveresultedfromthecachingof,andrepeatedaccessesto,activeles(eveniftheseleswere activeforonlyashortperiodoftime).inthiscontext,anactiveleisonewhichisaccessedoneor moretimes. Table7liststhenumberofdierentlesrecorded atthesnooper,rpcspyandnfstracelevels.atthe rpcspylevel,thisisacountofeverylethathada readorwritenfsoperationperformedonit.the lteringcharacteristicofthecacheisobviouswhen comparingthenumberoflesthathadlogicaloperationsperformedonthematthesnooperlevelwith thenumberoflesforwhichdatawasreadfromor writtentoattherpcspylevel.largerdierencesfor the/lesystemwillhavebeenasaresultofaccesses tothelargenumberofregularly-accessedsystemles locatedthere.theseleswouldbeaccessedoften andbemodiedinfrequentlyandwould,asaresult, havealongcachelife. Theresultsinthistableshowanareawhere theestimationmethodusedbynfstracecangeneratediscrepancies.nfstracemustestimatetrac toandfromlesthathavenotcausedanyrpcspy readorwritetransactions.withtheexception of/var/spool/mail,nfstracemustestimateadditionaloperationsforlesoneachofthevele systems.nfstracehasestimatedextraneousoperationsonlesof/usr2andunderestimatedthese operationsfortheotherlesystems,inparticular the/lesystem. Therulebaseunderwhichnfstraceoperates estimatesoperationsonlesfromacombination ofnfsread,write,setattrandgetattrtransactions.theestimatesofleswhichdidnotinvolvenfsreadorwritetransactionswouldhave resultedfromsetattrorgetattroperations.by usinggetattrtransactionsalone,thereispotential fornfstracetoconfusegetattrtransactionscaused bysuchoperationsasgettingadirectorylistingwith thosetransactionsbeingusedtovalidatethecontentsoftheclientcache. Incomparison,thegraphofFigure5,anormalisedcumulativedistributionofthenumberofles ofeachsize,showsthattheestimationcalculatedby

11 intervallength Numberofactiveusers 10minute snooper 4 rpcspy 10second Totalbytestransferredperactiveuser 10minute6,342,8505,477, Maximum Average 10second5,120,0005,048, ,535 11, ,820 datatransferredperactiveuserinthoseintervals. Table5:Themaximumandaveragenumberofactiveusersovergivenintervalsandthetotalquantityof 18,404 /var/spool/mail Filesystem/ snoopernfstrace /usr/local 267, ,123 43,378 10, , , ,417 Table6:Acomparisonoftheaveragesizeforles /packages1,316,180 /usr2 42, ,371 46,067 12,310 nfstracecompareswellwiththeresultsofsnooper. Thetwosignicantdierencesbetweentheresults accessedoneachparticularlesystem. ofnfstraceandthoseofsnooperwhichleadto disparitiesinthegraphareforthenumberofzerolengthlesandthenumberofleswhichwereapproximately700bytesinlength. Figure5:Cumulativedistributionofnumberofdifferentlesaccessedversuslesize.Fromthisgraph thanagivensizehavebeenaccessed.forexample cessedare1kbytesinsizeorsmaller.note:thele ateaccurateestimationsofaccessestovariouszero- lengthlesandcreatesrecordsofmanymoreac- cessesthanactuallyhappened.thismaymostlikely beduetonfstracebeingunabletodierentiatebetweengetattrtransactionsfordirectoriesandthosesizeaxisislogarithmic. resultingfromtheopeningofazero-lengthle.in Intherstcase,nfstraceisnotabletogener-bothtechniquessuggestthatover150ofthelesac- wecandeducethenumberoftimesdierentlesless evaluatesmanyofthe700-byteleaccessesasbeing thesecond,relatedcase,nfstracehasunderestimatedthenumberofaccessestovariousleswhichenoughlife-spanbetweenlecreation,thewriting absorbingthesmall-letransactions. wereapproximately700bytesinlength.inadditionandreadingofdata,andledeletion,nonfsread orwritetransactionsmayoccurduringtheopenclosesession.asaresultnfstraceisnoteasily ashortlife-span. abletorecorddatatransferoperationsonleswith zero-bytelesaccessesbecauseoftheblockcache tothereasonsabove,itispossiblethatnfstrace problemtonfstrace.thisisbecausegivenashort Fileswithashortlife-spancanalsopresentanumberofdierentlesaccessedbythesystemdur- sistentwiththehypothesisthatnfstracewasun- abletoevaluatecorrectlythenumberofaccessesto Thefollowingtable,7,givesabreakdownofthe ingthemeasurementperiod.thesevaluesarecon- zerolengthles.theaveragelesizefor/would Number of files Cumulative distribution of the number of files of each file size snooper nfstrace K 10K 100K 1M Size of file (bytes)

12 stronglyconrmthis,althoughthe/packagesresultsruncountertothis.thisstrongcounter-examplecouldbeduetotheunusualnatureofleson thatparticularlesystem.wenotealsothatnfstraceresultscountonelessleforthatlesystem; asinglelargelewouldhavemodiedthisaverage considerably. Whiletherearenotabledierencesineachof Tables6and7,theresultsfromthem,inadditiontothoseofFigure5showthatnfstracewas abletogiveresultsbroadlycomparablewiththose ofsnooper. 5.6Fileopen-closesessions Theopen-closesessionofaparticularleisaconcept aroundwhichanumberofmeasurementsarebased. Anumberofstudieshaveusedsuchmeasurements; examplesincludelesharing,leutilisationandvariouscachestudies[20,2,12,13,25]. Suchopen-closesessionmeasurementsincludethe lengthoftimeaparticularleisopen,theamount ofdataaccessedinthattime,theamountofdatapotentiallyaccessed(thesizeoftheleopened),what sortofopen-closesessionwasinvolved,whetherthe lewasopenedforreadand/orwriteoperations,etc. Thenumberofopen-closesessionsaswellasa breakdownoftherelativetypes,aretabulatedin Table8.TheimplementationofNFSunderUltrix includesthesynchronouswritingofmodieddata blockstothelesystematthecloseofale.this meansthatnfstracecanpotentiallymisswriteoperationsonlesthatultimatelyleavethelewith zerolength,forexamplesomesortoftemporaryle. nfstracewillnotbeabletogenerateresultsfor readsonlesthatoccurinclosesuccession(where thecachecontentsarestillvalid).additionally, nfstracemaynotcorrectlyinterpretgetattrnfs transactionsusedtovalidatethecache.theresult isnfstracewilleithermisssomeopen-closesessions altogether,incorrectlyinterpretnfstransactionsas notbeinganopen-closesession,orincorrectlyconsiderthatthenfstransactionsfromtwoormore separateopen-closesessionarefromthesameopenclosesession. Thelargernumberofwritesrecordedbynfstracewillcertainlyincludetheread-writeoperations snooperrecorded.nfstraceisunabletodetect read-writesessionsandwouldconsidereachofsuch operationsasaseparatereadandwritesession.null open-closesessions,wherenodataaretransferred andtheleissimplyclosed,wouldnotbeableto bedetectedbynfstrace.instead,nfstraceinterpretsanyleopen,ifthatweretheonlyoperation onaparticularle,tobeareadingofanunknown amountofdatafromtheclientcache. Becausethebordersbetweenreadandwriteoperationscannotbedeterminedaccurately,nfstrace willtendtocollectsuccessiveopen-closesessionstogether,interpretingthemasone,longer,open-close session.asaresultofthis,theaveragedurationof theopen-closesessionsreportedbynfstracemay behigherthanthedurationsreportedbysnooper. Tables9and10,recordtheopen-closesessions onatypeofopen-closeoperationperlesystembasis,andbylesystemperoperation.firstly,table9showsthefulleectofthecacheltering,combinedwithnfstraceincorrectlyinterpretinginformationavailable,causingopen-closesessionstobe removed.thisisespeciallythecaseforthe/lesystem.theresultsfor/var/spool/mailareagood exampleofwherenfstracehasmisinterpretedthe NFSgetattrtransactionsasopen-closesessionsbecaus lesareoftencheckedfornewmailresultingingetattrtransactions.Bywayofcomparison, abetterresultisgivenforthe/packageslesystem.filesfromthislesystemareunlikelytobe abletobekeptincacheforlongperiods.theresult isthatnfstraceisabletogiveabetterresultfor open-closesessionsbecausethenfstransactionsfor thislesystemweremorecomplete. Becausethecacheisremovingtheneedforalarge numberofthereadoperationstoresultinnfstransactions,theread:writeratioisclosertounityfor theresultsofnfstracethantheresultsofsnooper. Whilethisratioisexpected,evendesirable,forthe measurementsofdatatransferred,thesevaluesare incorrectforopen-closesessionsresultinginhigher guresforaveragedatatransferredpersessionand incorrectinformationaboutthecharacteristicsofthe sessions. However,whiletheratiosofthevarioustypesof open-closesessionsproducedbynfstracearenot particularlyclosetothoseofrecordedbysnooper, addingtheguresfornullsessionstothereadopenclosesessionsimprovesthecomparisonforalllesystemsexceptfor/. ForTable10,allwritevaluesareincreasedby

13 /var/spool/mail FileSystem /111(24.89) 10(02.24) snooper 68(17.13) 8(02.02) rpcspy 98(22.37) nfstrace /usr/local /packages /usr2269(60.31)269(67,76)278(63.47) 49(10.99) 3(00.67) 4(00.90) 46(11.59) 3(00.76) 48(10.96) 8(01.83) Table7:Abreakdownperle-systemofthetotalnumberofdierentlesaccessedduringthetraceperiod. Total (00.68) Thevaluesinparenthesesareeachcountasapercentageofthetotalnumberofles. read-writeentries readentries7442(88.07)1749(68.51) 557(06.59) 35(00.41) snooper 804(31.49) nfstrace nullentries 416(04.92) - Table8:Thecountofopen-closesessionseachmonitoringsysteminterprets.Additionally,abreakdown Total oftheseopen-closesessionsintoread-only,write-only,read-writeandnullopen-closesessionsisshown.a nullsessioniswherenodataarereadfromorwrittentothele(althoughthelewasopened).valuesin parenthesesarethepercentageofthetotalnumberofleseachtyperepresents. FileSystemsessiontype /read read-write snooper (90.33)818 (04.98)476 nfstrace 298 (00.49) (04.20) (63.21) (36.79) /var/spool/mailread /usrread (73.21) (26.79) 61(100.00) write null (40.91) (50.00) (09.09) 75 7 (91.46) (08.54) /usr/localread /usr2read write 146(100.00)100(100.00) (74.52)686 (20.29)321 (68.12) (31.88) Table9:Abreakdownoftheopen-closesessionsoneachlesystembytypeofopen-closesession.Values /packagesread null 51 9(100.00) (05.20) 9(100.00) - - inparenthesesareeachtypeofoperationasapercentageoftheopen-closesessionsonthatlesystem.

14 errorwillpartlybebecausenfstraceinterpretsthe thatleastwoseparatewriteevents.additionally, nfstracecanincorrectlyinterpretmultiplewrites creationofanyleandanysubsequentwritingto nfstrace,particularlyinthecaseof/usr2.this nfstracecaninterpretmultiplewritesintothesame locationinaleasmultipleopen-closesessionson Becausenfstraceinterpretsanaccesstotherst tothesameleasconsecutiveopen-closesessions. thevieditor.viusesloglesthatcheck-pointthe thatle.asanexample,thissituationcanarisewith byteofaleasthestartofanewopen-closesession, ofwritesmadetotherstblock,therstblockmay editoperationsastheyoccuronthele,sovican becontinuallywritingsmallchangestothelogle. beingwrittentotheserverandifthereareanumber bewrittentotheserverseveraltimes.eachtimethe Thesecollectionsofsmallwriteswillresultinblocks rstblockiswrittennfstracecouldpotentiallymisinterpretthewritingofdataasseparateopen-close willbeoverwhelmedbythequantityofotheropenclosesessions(readsessionsinparticular).however, foropen-closesessionswritingtoale,theseextra incomparisonwithvaluesforallopen-closesessions, actualnumberofextrasessionsisquitesmalland, sessionsonthelogle.itisworthnotingthatthe open-closesessionscanbesignicant. havebeenmadebynfstracesoastoproducean rithmsusedbynfstrace.whilesomeassumptions open-closesessionrecord,thisparticularsituation mayberesolvedwithamoresophisticatednfstrace Someoftheseproblemsarearesultofthealgo- algorithm. leisinuse.this,inturn,isimportantincalculatingtheamountoftimelesaresharedbetween usersand,inadistributedlesystem,betweensystantindeterminingtheamountoftimeaparticular Thedurationofanopen-closesessionisimportems.Figure7showsthatdurationofopen-closesessionsrecordedbyrpcspywillbelongerthanthose recordedbysnooper.thelongeropen-closesessions thatcausethedierencesinaveragedurationsare ofseparateopen-closesessionsbeinginterpretedas likelytobearesultoftransactionsthatarepart partofthesameopen-closesession. session.thesesituationsarerepresentedgraphically bedierentfromtheaveragelengthoftheopen-close NFStracmeansthatleadandlagtimes(timesin whichtheleisopenbutnooperationoccurs)will Additionally,thecalculationofdurationfrom % of open-close operations Cumulative percentage of open-close operations against duration snooper nfstrace 60 Figure7:Normalisedcumulativedistributionofthe 50 numberofopen-closesessionsversustheduration open-closesessionsforagivennumberofthosesessions.forexample,thesnoopertechniquerecords 20 that70%ofthesessionshaveadurationofabout Fromthisgraphwecandeducethelongestofthe 10 1ms 10ms 100ms 1s 10s 1min 10min 1Hr 10Hr Duration logarithmic. infigure6.theguresshowthattheblockoperationsuponwhichnfstrace'srecordwillbebased operationsinanopen-closesession. sferrateasmeasuredbysnooper,asperfigure4, withtheamountofdatanfstraceestimateswaspotentiallyavailabletothesystem(thesumofthesizes oflesaccessed).whilenotdirectlycomparable,it Figure8graphesacomparisonofthedata-tran- 100millisecondsorless.Note:thedurationaxisis maynotcorrespondwiththelogicalopenandclose andserver. accuracythetrendsofdatatransferbetweenclient isworthnotingthatthesumofthesizesoflesis abletogiveenoughinformationtoestimatewithfair ferred.itisimportanttonotethatonereasonthat open-closesessionsversustheamountofdatatrans- nfstracedierssosignicantlywithsnooperisthat nfstracewasunabletodetectthelargepercentage Figure9showsacumulativedistributionof 1Kbytewastransferred.Additionally,snooperresultsestimatethatfewerthan500oftheopen-close sessionstransferredoneorzerobytes,whereasnfstraceresultsestimatethosecircumstancesexisted ofopen-closesessionsduringwhichapproximately 80,750,900and1,100bytesisbecausethoseles largenumberofsessionstransferringapproximately formorethan1,000ofthesessionsitrecorded. Aprimaryreasonnfstracedoesnotrecordthe

15 FileSystem read /var/spool/mail sessiontype / snooper (00.24) (86.20)818(46.77) (01.65) 75(04.29) 61(03.49) nfstrace /usr/local /packages /usr (00.12) (01.96)100(05.72) /var/spool/mail 354 (63.55)476(59.20) (09.82)686(39.22) /usr (00.72) (35.73)321(39.93) 7(00.87) 9(00.51) read-write null / (100.00) 45 (10.82) (71.63) Table10:Abreakdownoftheopen-closesessionsofeachtype,breakdownisbythelesystemofthele. /var/spool/mail /usr (05.29) (12.26) - Valuesinparenthesesareeachlesystem'soperationsasapercentageoftheopen-closesessionsofthat type. - Open Open Open Read Read Block Read Block Read Block Read Read Close Block Read Read Open Write Block Write Read Close Block Read Write Close Close Block Write transactioneachblockaccesswillinvoke. Figure6:Severalopen-closesessionsasgeneratedbynfstracearecomparedwiththeactualopen-close sessionthatoccurred.theopen-closesessiongeneratedbynfstracedependsheavilyonthetypeofnfs Case 1 Case 2 Case 3 real nfstrace

16 Bytes transferred 20 Mbyte 15 Mbyte 10 Mbyte 5 Mbyte Data over day (10 minute samples) snooper read (data transfered) nfstrace read (filesize) 0 Mbyte 12 Mbyte 10 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day 8 Mbyte 6 Mbyte Figure8:Thesegraphscomparethetransferratemeasuredwithsnooper,tothetotalamountofdata 4 Mbyte 2 Mbyte ofthetrace. nfstracehascalculatedtheclienthashadaccesstoineachlefromwhichithasreaddata.asalow-order approximation,thesevaluesarecomparablegivingthesamecharacteristicsfordatautilisationovertime 0 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day Bytes transferred Data over day (10 minute samples) snooper write (data transferred) nfstrace write (filesize)

17 Cumulative number of open-close operations against data transferred snooper nfstrace Cumulative number of open-close operations against file size snooper nfstrace Number of open-close operations Figure9:Cumulativedistributionofthenumberof eachopen-closesession.fromthisgraphwecandeducetheamountofdatatransferredperopen-close open-closesessionsversusthedatatransferredfor sessionforagivennumberofthosesessions.for example,thesnoopertechniquerecordsthatover K 10K 100K 1M Data transferred (bytes) areinthecacheandnodataaretransferredbetween Note:thedatatransferredaxisislogarithmic. 7,000sessionstransferabout1,100bytesofdata. tualnumberofsessionsisgreatlyreduced). ofsnooperforothertransfervalues(eveniftheac- serverandclient.thisreasoningisstrengthenedby thefactthatnfstracegivestrendssimilartothose infigure10haveresultedfromnfstracebeingunabletointerpretfrequentaccessestolesofacertain Thedierencesbetweensnooperandnfstrace 1,100bytesinsize.Accessesofsuchlesaccount length,inparticular,leswhichare80,750,900and recordinganopen-closesessionforthem.thisresultsinanexaggerationinthegraphsforthenumberofopen-closesessionsforcommondata-transfeerbatedbytheinabilityofnfstracetorecordmany oftheopen-closesessionsinwhichnodatatransfer ismade. 5.7Lossesduetorpcspy Duringthisstudy,therecordingofallEthernettraf- ifweassumearatioofnfstonon-nfstracat cbytherpcspymachinewasnotpossible(aloss thetotalnfstransactionsfromtherecordedtrace, sionsforregularly-accessedlesbutnfstraceisnot foralargepercentageoftheoverallopen-closeses- andle-sizevalues.thissituationisprobablyexac- of1.5%wasrecorded).thisimpliesalossof0.6%of Number of open-close operations Figure10:Cumulativedistributionofthenumberof 4000 open-closesessionsversusthesizeoftheleaccessed 3000 ineachopen-closesession.fromthisgraphwecan sions.forexample,thesnoopertechniquerecords deducethemaximumsizeoflesopenedforeach open-closesessionforagivennumberofthoseses K 10K 100K 1M File (bytes) thatover7,000ofthesessionsaccesslescontaining islogarithmic. thesameratioaswasrecordedduringthetestingof lessthan1,100bytesofdata.note:thelesizeaxis sourceofpotentialerror,thisdatalossisovershadowedbytheerrorsintroducedbycertainaspectsof theoperationofnfstrace.whilethiserrorshould notbediscounted,itcanbeconsideredtohavelow 6overallsignicanceintheresults. Theprecedingresultsshowthat,whilethetwosets ofresultsarenotdirectlycomparable,nfstraceis ComparisonSummary rpcspynetworkpacketcapturemechanism.whilea abletomakearstorderapproximationofanumberofvaluestraditionallymeasuredbysystemssuch machineorthequantityofdatawritten.additionciselybynfstraceinthecurrentversion,couldpotentiallygiveaccurateenoughresultstobeabletberofcircumstancesincludingmeasuringthenum- replacesystemssuchassnooperoutrightinanum- assnoopersuchasthetotali/otransferredbya ally,otherestimatedvalues,whileestimatedimpre- comparedwithresultsfromsnooperrelatetothe crepanciesintheinterpretationbynfstracewhen oflesizecomparedwithlesaccessed.mostdisberofactiveuserspermachineorthedistribution

18 identicationofopen-closesessions.minimisation oftheseerrorswouldimprovetheestimationofboth open-closesessiondurationanddata-sizeresults. Anumberoftheresultscollectedbynfstrace arenotcomparablewiththosecollectedbysnooper, e.g.theamountofdatatransferred.whilevalues forthemaximumdatatransferredandwriteoperationscanbecomparable,valuesaectedbysignicantcaching(e.g.readingofdata,particularlysmall amountsrepeatedlyfromthesamele)willdiersignicantly. Inadditiontomeasurementswhichcanbecompared,theuniquenatureofbothsnooperandrpcspymeansthateachhasaccesstodierenttypes ofinformation.snooperisideallysuitedtorecordinginformationaboutprocesses,anareafromwhich networkmonitorsareunabletoretrieveinformation. Ontheotherhand,nfstraceisideallysuitedtocollectinginformationaboutallmachinesonaparticularnetworkincluding,forexample,allthetrac foraparticularserver.thesedierencesmeaneach techniquehasaroletofullbutthereiscertainly potentialfornetworkmonitoringtobeabletomake measurementsforwhichkernelinstrumentationhas traditionallybeenusedinthepast. Additionally,itisworthpointingoutthatthe informationrpcspygeneratesandthatnfstracein turnuses,isnotinerror.thedierencesbetween nfstraceoutputandthatofsnooperoccurbecause nfstraceattemptstoestimatetheoperationsonthe usersideofthecachefromtheoperationsthatoccur onthelesystemsideofthecache.improvements intheperformanceofnfstracewouldcomeabout fromimprovementsinthisestimationprocess. 7 rpcspy/nfstraceproblems Fornfstracetobeamoreusefultool,theaccuracy ofitsestimationsneedstobeimproved.therearea numberofareaswherenfstraceeithermakeserrors ordoesnothaveenoughinformationwithwhichto work. nfstraceproblemstobeaddressed: 1.nfstracetreatsthecreationofaleastwo separateopen-closesessions. 2.Underestimationofthenumberofopen-close sessions.thisalsomeansnfstracecanoverestimatethedatatransferredperopen-close session,particularlyinthecaseofwrites. 3.nfstraceisunabletoobservelogicaldata transfer. 4.nfstracehasnorecordofopen-closesessions thattransfernodataatthelogicallevel. 5.nfstracehasnorecordofopen-closesessions thatbothreadandwritedata. 6.Thenfstracemethodusedforsummationof readoperationsandwriteoperationscanresult intransferreddatanotbeingcounted. 7.Themethodusedforestimatingthepurposeof annfsgetattrtransactionissimplistic. 8.nfstracedoesnotestimatethecontentsofa clientcache.asaresultnfstracewillassume lesincachearebeingaccessedwhenthisis notthecase. 9.nfstraceisunabletodetectshortopen-close sessions. Toalargeextenttheseproblemsarealsoaresult ofnfsnotmakingenoughinformationavailablefor nfstracetobeabletoestimatetheoperationsthat areoccurring.thelackofdatasuppliedbynfsalso meansnfstraceactsasalterremovingshort,consecutive,open-closereadsessions.suchoperations areabsorbedbythecacheandasaresultne-grain sporadicoperationsaremissed. 8 Improvingrpcspyandnfstrace Improvementstorpcspywillbeachievedbyusingahigh-speedmachinewithahigh-speed,lowlossnetworkinterfacetobededicatedtothetaskof datacollection.theimprovementstonfstracecan notbestatedquiteasconcisely.smallerchangesto nfstraceinclude: addingtheabilitytointerpretothersignicant NFStransactionssuchascreate, usingasimpleratiomultipliertoobtainanestimateofdatatransfersatthelogicallevel,

19 modicationofnfstracetokeepinformation aboutletruncationgivingtheabilitytointerpretlere-writeevents separatelyrecordingdatareadfromandwrittentotheserverforallopen-closesessions, recordinginformationonwhichblocksofale havebeenaccessed,and interpretingnfsgetattrtransactionsthat immediatelyfollowalebeingreadorwritten asanotheropen-closesession. Whilesomeofthesechanges,suchasthelast itemlisted,wouldneedtobetestedtoensurethe resultingextrarecordswerecorrect,othersinthelist wouldgiveimmediateimprovementintheabilitiesof nfstrace. Moresignicantchangestonfstraceinclude pre-loadinginformationaboutprogramsthat causestatsystemcallssuchasls, buildablockcachesimulatorintonfstrace Inordertopre-loadinformationaboutcommonly-usedprogramsthatcausestatsystemcalls,it maybenecessarytoprolethesystempriortoany signicanttracingactivity.inmostsystems,commonly-usedprogramssuchaslscouldbeexpected togeneratepotentialproblemsandcouldbeadded bydefault.however,theneedtodoaprolingoperationwouldnotonlyincreasethecomplexityof passivenetworkmonitoringbutmightalsonegate anyadvantageofnetworkmonitoringbypotentially requiringaccesstothemachinebeingmonitored. Anotheralternative,oraddition,topre-loadedcon- gurationinformationisfornfstracetocharacteriseprogramssuchaslsasitprocessesthenfstransactiondata.nfstracewouldlocatelstype programsbynotingprogramswhich,onceexecuted, causedclustersofnfslookupandgetattrtransactions,typicallyforlessharingthesamesubdirectory.inthisway,nfstracewouldbesimultaneouslyprocessingthedataandgainingenough informationtolocateprogramscausingextraneous NFSgetattrtransactionsthusimprovingthepredictionoflstypeprogramsduringthecourseofthe runṫheincorporationofablock-cachesimulator intonfstraceoersthebestpotentialforincreasing theaccuracyofnfstrace.unfortunately,several signicantitemsofinformationwouldbeneededto recreateaccuratelytheblockcacheofaclient.these wouldincludethecachesizeontheclient,thenumberofcacheentriesandthesizeofthedatablocksbeingtransferredbetweenclientandserver.additionally,theprogrammingandtestingofacachesimulatorisnotasimpletaskandbecauseofresourcesused (memory,etc.)wouldpotentiallymeannfstrace couldnotberunsimultaneouslywithrpcspywhich isapreferredoperatingmode(inordertoreduce outputdata). Theadditionofthesimulatorwouldmeanthat nfstracewouldbeattemptingtomodelaparticulartypeofblockcache.whilethereisacommonancestryforthemethodusedbyblockcaches inunixanditsderivatives,therearenotabledifferences.theintroductionofsuchfacilitiesasthe demand-pagingofexecutablesaswellassubtlechangesinthecachesystemmeansthebehaviourofthe cachesofsystemsbeingmonitoredwilldier,sometimesdramatically.theresultisthatnfstracemay berequiredtoincorporatemodelsforseveraldierentblock-cachesystems.whilethiswouldaddto thecomplexityofnfstrace,thecommonancestry ofblockcachesmeansmuchofthecodeusedineach simulatorwouldbecommontoall.itisconceivable thatsuchannfstracecouldreadaconguration lecontaininginformationonwhichcachemethod eachclientwasusing.withoutappropriatecongurationinformation,nfstracecouldassumeaparticularmodel,perhapsthemostcommoncachemethod usedortheworst-casesimulatormodel. Suchapre-loadedcongurationlewouldalso containinformationaboutnfsparameterssuchas cacheandattributetimeouts,therebyincreasingthe accuracyofthesimulator.thisinformation,ona le-systembyle-systembasis,couldalsogiveinformationaboutthecharacteristicsofaccesstoale system,e.g.maillesystemscanpotentiallycause open-closesessionstobegeneratedwhennonewas, andsoon. Ablock-cachesimulatorwouldincreasetheaccuracyoftheopen-closesessionpredictionsnfstrace makesandallownfstracetobeusedforotherpurposes.nfstracehasthepotentialtosimultaneously simulatethecachesofallthemachinesonanetwork soitcouldbeusedtostudyinteractionsbetweenthe cachesofdierentmachines.forexample,suchafacilitywouldenableacomprehensivestudyofblock

20 sharingamongnfsclients. Anextensiontonfstracewouldenableittokeep trackofinformationaboutthedirectorysystemsin adistributedlesystem.modicationstodirectory informationarewrittensynchronouslybacktothe serverasthemodicationstakeplacebutthedirectoryinformationitselfiscachedontheclients.becausechangesarewrittensynchronously,itispossiblefornfstracetomaintainanaccuratesimulationofthestateofthelesystem.additionally, nfstracecouldincorporateadirectory-namecache simulatorinthesamestyleasablock-cachesimulatorandbeabletosimulatethecontentsofthiscache amongmanyclients.asinthecaseofablock-cache simulator,adirectory-namecachesimulatorwould enablenfstracetobeusedtostudyinteractionsbetweenthecachesoftheclientsandtrackthehistory ofchangestothelesystem.theuseofsuchamodi- cationmayenableafollow-upstudytoshirriand Ousterhout'sworkonnameandattributecaching ([26]). Manyofthelimitationsinnfstrace,indeed,the veryneedfornfstracetohavetoestimateopenclosesessions,arecausedbythefactthatthisinformationaboutopenorcloseisnottransmittedinthe NFSprotocol.Otherdistributed-systemprotocols, suchassprite[19]andtheandrewfilesystem[12], transmitinformationrelatedtothestateoflesin thedistributedlesystem.ifnfstracewasmodi- edtoworkwithsuchastate-orientateddistributed system,theaccuracyofnfstraceoutputcouldpotentiallybeashighasafullkernelinstrumentation trace.thepotentialforaccuraterpcspy/nfstrace analysisofdistributedsystemsshouldalsoholdtrue foranydistributedlesystemthattransmitsenough stateinformationacrossthenetwork.thismethod evenhasthepotentialtoworkontheoreticaldistributedlesystems,suchasxfs[36,9],whichdepartfromacentralleservermodelcompletely.it isconceivablethatduringthedevelopmentofsuch monitoringsystems,methodsbasedonthepassive monitoringofnetworktracwouldbecomeaprimarytoolforassistinginthedevelopmentandultimatelythemanagementofsuchsystems. Anothertechniqueforincreasingtheaccuracyof nfstraceistoaddsimulatedstateoperationsto NFS.Thiswouldinvolvemodifyingthekernelof eachclienttooutputextranfstransactionsforsystemcallssuchasopen,closeandseek.itwould notbenecessaryfortheservertoactonoreven acknowledgethesecallsbutthetransmissionofthe extrainformationthroughthenetworkwouldpotentiallygivenfstraceenoughinformationtobeable toestablishwhenleswereopenedandclosed.of course,suchmodicationsarecontrarytomanyof theconceptsofpassivenetworkmonitoring,requiringmodicationstoperhapsmanyclientmachines. However,thistechniquewouldmaintainthebenet thatthecollectionofthetracedatawouldbeindependentoftheserverandclients.itwouldimpose noextraworkloaddirectlyuponthem.thismethod ofaddingadditionalinformationtothecommunicationstracbetweenclientandserver,forthepurposesofmonitoring,wasusedinbakeretal.[2]as oneofanumberofmodicationstheymadetocollectdatafortheirwork. Distributedcomputersystemsdonotconsist solelyofdistributedlesystems.systemsinthe styleofsprite[19]andamoeba[30]enablethemigrationofprocessesamongcpuelements(typically acpuelementisacomputerworkstation).amonitoringmethodforsuchasystemmightinvolvemonitoringthenetwork'sinterconnectingprocessingelementsandtrackingthemovementoftheprocessesin thesamewaythatnfstracemonitorsthemovement ofledataamongworkstations.inthisway,passive networkmonitoringhaspossibleapplicationsinareasotherthanjustthemonitoringofdistributedle systems. 9 Summarycomments Systemmonitoringhasasignicantroleinthedevelopmentofcomputersystems. Acommonmethodofmonitoringsystemsisto usefullkernelinstrumentation,involvingthemodi- cationofthesource-codefortheoperatingsystem ofthemachine.passivenetworkmonitoringcanbea preferredchoiceoverkernelinstrumentationforcertainsystemmonitoringwork,particularlywherethe source-codeoftheoperatingsystemisnotavailable. Additionally,otheradvantagesofpassivenetwork monitoringinclude: anindependenceofthecollectionofresults fromthemachinesbeingmonitoredonthenetwork, theabilitytomonitorsimultaneouslymultiple machinesonanetwork;thepassivenetwork

athesissubmittedinfulfillmentofthe requirementsforthedegreeof

athesissubmittedinfulfillmentofthe requirementsforthedegreeof AComparisonofPassiveNetworkMonitoringwithFull OperatingSystemandFileSystemMonitoring: KernelInstrumentationTechniques AndrewW.Moore by athesissubmittedinfulfillmentofthe requirementsforthedegreeof departmentofroboticsanddigitaltechnology

More information

short introduction to linux high availability description of problem and solution possibilities linux tools

short introduction to linux high availability description of problem and solution possibilities linux tools High Availability with Linux / Hepix October 2004 Karin Miers 1 High Availability with Linux Using DRBD and Heartbeat short introduction to linux high availability description of problem and solution possibilities

More information

CS 416: Opera-ng Systems Design

CS 416: Opera-ng Systems Design Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Chapter 11 Distributed File Systems. Distributed File Systems

Chapter 11 Distributed File Systems. Distributed File Systems Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file

More information

Binding IP Addresses To Physical Hardware Addresses

Binding IP Addresses To Physical Hardware Addresses Binding IP Addresses To Physical Hardware Addresses Must use physical addresses to send and receive packets Therefore, must map IP addresses to physical addresses Particular method depends on underlying

More information

How To Write A Boot(Ing) Protocol On A Microsoft Ipnet (Net) (Netnet) On A Network (Ipnet) With A Network Address) (Ip Address) On An Ip Address (Ipaddress) On Your Ip

How To Write A Boot(Ing) Protocol On A Microsoft Ipnet (Net) (Netnet) On A Network (Ipnet) With A Network Address) (Ip Address) On An Ip Address (Ipaddress) On Your Ip Boot(ing) protocols From (R)ARP to BSDP dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 12, 2008 dr. C. P. J. Koymans (UvA) Boot(ing) protocols September 12, 2008 1 / 25 ARP

More information

New OBD Smart PC Tool User Manual

New OBD Smart PC Tool User Manual New OBD Smart PC Tool User Manual V0.6 2013-07-30 1 / 16 Catalogue I Installation... 3 II Configuration... 3 2.1 Main interface... 4 2.2 Alarms... 6 2.3 Network... 8 2.4 Regular Report... 9 2.5 Others...

More information

Flexi Soft Ethernet IP: Implicit Messaging with a Omron PLC

Flexi Soft Ethernet IP: Implicit Messaging with a Omron PLC O N L I N E - H E L P Flexi Soft Ethernet IP: Implicit Messaging with a Omron PLC s GB Online Help This document is protected by the law of copyright, whereby all rights established therein remain with

More information

We mean.network File System

We mean.network File System We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine

More information

KVM PERFORMANCE IMPROVEMENTS AND OPTIMIZATIONS. Mark Wagner Principal SW Engineer, Red Hat August 14, 2011

KVM PERFORMANCE IMPROVEMENTS AND OPTIMIZATIONS. Mark Wagner Principal SW Engineer, Red Hat August 14, 2011 KVM PERFORMANCE IMPROVEMENTS AND OPTIMIZATIONS Mark Wagner Principal SW Engineer, Red Hat August 14, 2011 1 Overview Discuss a range of topics about KVM performance How to improve out of the box experience

More information

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation

More information

NFS Tracing By Passive Network Monitoring

NFS Tracing By Passive Network Monitoring NFS Tracing By Passive Network Monitoring Matt Blaze Department of Computer Science Princeton University mab@cs.princeton.edu ABSTRACT Traces of filesystem activity have proven to be useful for a wide

More information

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls Last Class: Communication in Distributed Systems Structured or unstructured? Addressing? Blocking/non-blocking? Buffered or unbuffered? Reliable or unreliable? Server architecture Scalability Push or pull?

More information

Computer Networking LAB 2 HTTP

Computer Networking LAB 2 HTTP Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security

More information

Secure Web. Hardware Sizing Guide

Secure Web. Hardware Sizing Guide Secure Web Hardware Sizing Guide Table of Contents 1. Introduction... 1 2. Sizing Guide... 2 3. CPU... 3 3.1. Measurement... 3 4. RAM... 5 4.1. Measurement... 6 5. Harddisk... 7 5.1. Mesurement of disk

More information

Configuring Simulator 3 for IP

Configuring Simulator 3 for IP Configuring Simulator 3 for IP Application Note AN405 Revision v1.0 August 2012 AN405 Configuring Simulator 3 for IP 1 Overview This Application Note is designed to help to configure a Sim 3 to run in

More information

Distributed File Systems

Distributed File Systems Distributed File Systems 1 Topics Introduction File Service Architecture DFS: Case Studies Case Study: Sun NFS Case Study: Hadoop HDFS 2 Introduction File system were originally developed for centralized

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

What TCP/IP Protocol Headers Can Tell Us About the Web

What TCP/IP Protocol Headers Can Tell Us About the Web at Chapel Hill What TCP/IP Protocol Headers Can Tell Us About the Web Félix Hernández Campos F. Donelson Smith Kevin Jeffay David Ott SIGMETRICS, June 2001 Motivation Traffic Modeling and Characterization

More information

Large Scale Storage. Orlando Richards, Information Services orlando.richards@ed.ac.uk. LCFG Users Day, University of Edinburgh 18 th January 2013

Large Scale Storage. Orlando Richards, Information Services orlando.richards@ed.ac.uk. LCFG Users Day, University of Edinburgh 18 th January 2013 Large Scale Storage Orlando Richards, Information Services orlando.richards@ed.ac.uk LCFG Users Day, University of Edinburgh 18 th January 2013 Overview My history of storage services What is (and is not)

More information

20 Command Line Tools to Monitor Linux Performance

20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System

More information

eztcp Technical Document Modbus/TCP of eztcp Caution: Specifications of this document may be changed without prior notice for improvement.

eztcp Technical Document Modbus/TCP of eztcp Caution: Specifications of this document may be changed without prior notice for improvement. eztcp Technical Document Modbus/TCP of eztcp Version 1.3 Caution: Specifications of this document may be changed without prior notice for improvement. Sollae Systems Co., Ltd. http://www.sollae.co.kr Contents

More information

Midterm II SOLUTIONS December 4 th, 2006 CS162: Operating Systems and Systems Programming

Midterm II SOLUTIONS December 4 th, 2006 CS162: Operating Systems and Systems Programming Fall 2006 University of California, Berkeley College of Engineering Computer Science Division EECS Midterm II SOLUTIONS December 4 th, 2006 CS162: Operating Systems and Systems Programming John Kubiatowicz

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security threats and network. Software firewall. Hardware firewall. Firewalls Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of

More information

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant Laurak@aesclever.com Applied Expert Systems, Inc. 2011 1 Background

More information

Presentation of Diagnosing performance overheads in the Xen virtual machine environment

Presentation of Diagnosing performance overheads in the Xen virtual machine environment Presentation of Diagnosing performance overheads in the Xen virtual machine environment September 26, 2005 Framework Using to fix the Network Anomaly Xen Network Performance Test Using Outline 1 Introduction

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the

More information

Small is Better: Avoiding Latency Traps in Virtualized DataCenters

Small is Better: Avoiding Latency Traps in Virtualized DataCenters Small is Better: Avoiding Latency Traps in Virtualized DataCenters SOCC 2013 Yunjing Xu, Michael Bailey, Brian Noble, Farnam Jahanian University of Michigan 1 Outline Introduction Related Work Source of

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network

More information

Digi Cellular Application Guide Using Digi Surelink

Digi Cellular Application Guide Using Digi Surelink Introduction Digi s SureLink is a mechanism to help maintain persistent wireless connections. It contains four main components: 1. Mobile Link Rx Inactivity Timer 2. SureLink Settings - Hardware Reset

More information

Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)

Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.edu Lab Jaringan Komputer (C-307) Table of

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

AnalysisofTCPPerformanceoverMobileAdHocNetworks. fgholland,vaidyag@cs.tamu.edu. OurresearchisfocusedontheperformanceofTCP. overmobileadhocnetworks.

AnalysisofTCPPerformanceoverMobileAdHocNetworks. fgholland,vaidyag@cs.tamu.edu. OurresearchisfocusedontheperformanceofTCP. overmobileadhocnetworks. AnalysisofTCPPerformanceoverMobileAdHocNetworks GavinHollandandNitinVaidya DepartmentofComputerScience TexasA&MUniversity,CollegeStation,TX77843-3112 fgholland,vaidyag@cs.tamu.edu Abstract Mobileadhocnetworkshavegainedalotofattention

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Configuring IP to Serial with Auto Answer and Serial to IP

Configuring IP to Serial with Auto Answer and Serial to IP Configuring IP to Serial with Auto Answer and Serial to IP You can configure the AirLink device to: Auto answer incoming TCP/IP or UDP/IP connections and send the packet payload out the AirLink device

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

2 Purpose. 3 Hardware enablement 4 System tools 5 General features. www.redhat.com

2 Purpose. 3 Hardware enablement 4 System tools 5 General features. www.redhat.com A Technical Introduction to Red Hat Enterprise Linux 5.4 The Enterprise LINUX Team 2 Purpose 3 Systems Enablement 3 Hardware enablement 4 System tools 5 General features 6 Virtualization 7 Conclusion www.redhat.com

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps

More information

MONITORING PERFORMANCE IN WINDOWS 7

MONITORING PERFORMANCE IN WINDOWS 7 MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance

More information

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: meeran@tlu.ee February 2014 What is wireless mesh networks?

More information

TSX ETY 110 Module 8

TSX ETY 110 Module 8 Module 8 Introduction Subject of this chapter What s in this Chapter? This chapter describes the implementation of a TSX ETY 110 module. This chapter contains the following sections: Section Topic Page

More information

Load Balancing - Single Multipath Route HOWTO

Load Balancing - Single Multipath Route HOWTO Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing

More information

i.mx28 Ethernet Performance on Linux

i.mx28 Ethernet Performance on Linux Freescale Semiconductor Document Number:AN4544 Application Note Rev. 0, 6/2012 i.mx28 Ethernet Performance on Linux 1 Introduction The aim of this document is to show how to measure the ENET "Ethernet

More information

Stateful Inspection Technology

Stateful Inspection Technology White Paper Stateful Inspection Technology The industry standard for enterprise-class network security solutions Check Point protects every part of your network perimeter, internal, Web to keep your information

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

The Performance Analysis of Linux Networking Packet Receiving

The Performance Analysis of Linux Networking Packet Receiving The Performance Analysis of Linux Networking Packet Receiving Wenji Wu, Matt Crawford Fermilab CHEP 2006 wenji@fnal.gov, crawdad@fnal.gov Topics Background Problems Linux Packet Receiving Process NIC &

More information

PrintFleet Enterprise Security Overview

PrintFleet Enterprise Security Overview PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary

More information

PERFORMANCE TUNING ORACLE RAC ON LINUX

PERFORMANCE TUNING ORACLE RAC ON LINUX PERFORMANCE TUNING ORACLE RAC ON LINUX By: Edward Whalen Performance Tuning Corporation INTRODUCTION Performance tuning is an integral part of the maintenance and administration of the Oracle database

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

AIX NFS Client Performance Improvements for Databases on NAS

AIX NFS Client Performance Improvements for Databases on NAS AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. gulabani@netapp.com Diane Flemming Advisory Software Engineer

More information

Local Storage for Video Archives Using iscsi

Local Storage for Video Archives Using iscsi Contents Disk Space Requirements 2 Archive Retention and Storage Requirements 2 VMSS Network Module 3 Deployment Topology 4 Installation and Configuration of iscsi Server 5 Sample Branch Router iscsi Configuration

More information

White Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2

White Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2 White Paper Fabasoft Folio Environment Variables Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered

More information

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents

More information

Building a Linux Cluster

Building a Linux Cluster Building a Linux Cluster CUG Conference May 21-25, 2001 by Cary Whitney Clwhitney@lbl.gov Outline What is PDSF and a little about its history. Growth problems and solutions. Storage Network Hardware Administration

More information

Stateless Packet Filtering Firewall on the NIC & Address Based Filtering

Stateless Packet Filtering Firewall on the NIC & Address Based Filtering Since the days of medieval castle design, architects have cleverly engineered concentric defensive layers along with traps, to thwart attackers, and protect the strong hold. Today many people still believe

More information

Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols!

Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols! Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols! Focus & contents of this talk Why SMB 3? How SMB 3? Implementing an SMB 3 Server on Linux/UNIX

More information

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

SPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks

SPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks SPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks Xiaonan Ma Texas A & M University xiaonan@ee.tamu.edu A. L. Narasimha Reddy Texas A & M University reddy@ee.tamu.edu

More information

Policy Based Forwarding

Policy Based Forwarding Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Effects of Interrupt Coalescence on Network Measurements

Effects of Interrupt Coalescence on Network Measurements Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,dovrolis@cc.gatech.edu Abstract. Several

More information

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Red Hat Linux Internals

Red Hat Linux Internals Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Performance and Bandwidth Testing for Data Circuits

Performance and Bandwidth Testing for Data Circuits Performance and Bandwidth Testing for Data Circuits In some cases, customers report that they are experiencing slower than expected data connections. These can be caused by any number of factors, including

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

Lab 8.3.2 Conducting a Network Capture with Wireshark

Lab 8.3.2 Conducting a Network Capture with Wireshark Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web

More information

The Performance of a Linux NFS Implementation. Christopher M. Boumenot

The Performance of a Linux NFS Implementation. Christopher M. Boumenot The Performance of a Linux NFS Implementation by Christopher M. Boumenot A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree

More information

Network Monitoring Tool to Identify Malware Infected Computers

Network Monitoring Tool to Identify Malware Infected Computers Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India navi@iitk.ac.in Megha Jain, Payas

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Monitoring Quality Virtual Desktop

Monitoring Quality Virtual Desktop Monitoring Quality Virtual Desktop eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Separating Data and Control Transfer in Distributed Operating Systems

Separating Data and Control Transfer in Distributed Operating Systems Separating Data and Control Transfer in Distributed Operating Systems Chandramohan A. Thekkath, Henry M. Levy, and Edward D. Lazowska Department of Computer Science and Engineering University of Washington

More information

Network-based Modeling of Assets and Malicious Actors

Network-based Modeling of Assets and Malicious Actors Network-based Modeling of Assets and Malicious Actors Christopher Kruegel Computer Security Group MURI Meeting Santa Barbara, August 23-24, 2010 Motivation Thrust I: Obtaining an up-to-date view of the

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of

More information

Using a Generic Plug and Play Performance Monitor for SoC Verification

Using a Generic Plug and Play Performance Monitor for SoC Verification Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why

More information

Configuring Secure Linux Hosts

Configuring Secure Linux Hosts A Perspective on Practical Security 2005 by Landon Curt Noll BOSTON NEW YORK SAN FRANCISCO SACRAMENTO CHARLOTTE WASHINGTON DC Introduction Congratulations! You have just installed Linux; an Open Source

More information

Storage benchmarking cookbook

Storage benchmarking cookbook Storage benchmarking cookbook How to perform solid storage performance measurements Stijn Eeckhaut Stijn De Smet, Brecht Vermeulen, Piet Demeester The situation today: storage systems can be very complex

More information

December 1998 Part Number: AR-400-AGV2-01.PDF

December 1998 Part Number: AR-400-AGV2-01.PDF December 1998 Part Number: AR-400-AGV2-01.PDF 1991 1998 by Remedy Corporation. All rights reserved. This documentation may not be copied in whole or in part without the prior written consent of Remedy

More information

Chapter 7 Troubleshooting

Chapter 7 Troubleshooting Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and

More information

ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER

ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER User s Guide PMCM-ETHCC-0208 2/2008 ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER TABLE OF CONTENTS INTRODUCTION... 2 Supported Ethernet Protocols... 2 Hardware... 2 Meter Firmware...

More information

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty

More information