User Program. System call stubs kernel instrumentation. Operating System Kernel. Network monitoring. RPC Device Driver XDR UDP/TCP IP
|
|
- Gillian Fleming
- 8 years ago
- Views:
Transcription
1 Acomparisonofsystemmonitoringmethods,passivenetwork monitoringandkernelinstrumentation A.W.Moore,A.J.McGregory&J.W.Breenz Abstract Thispaperpresentsthecomparisonoftwomethodsof systemmonitoring,passivenetworkmonitoringand kernelinstrumentation.thecomparisonismadeon thebasisofpassivenetworkmonitoringbeingused asareplacementforkernelinstrumentationinsome situations.despitethefactthatthepassivenetwork monitoringtechniqueisshowntoperformpoorlyas adirectreplacementforkernelinstrumentation,this paperindicatestheareaswherepassivenetworkmonitoringcouldbeusedtothegreatestadvantageand presentsmethodsbywhichthediscrepanciesbetween resultsofthetwotechniquescouldbeminimised. 1 Introduction Theuseoflesystemmonitoringingeneral,and comprehensivekernelmonitoringtechniquesinparticular,havelaidthecriticalgroundworkforthedevelopmentandrenementformanyoperatingsystems.kernelinstrumentationhasthepotentialto giveanexactrecordofwhatoccurredinthekernel ofasystemand,asaresult,iscommonlyusedwhen highprecisionisrequired. Ithasbeenused,instudiessuchasOusterhoutet al.[20],smith[28],mummertandsatyanarayanan[17,29]andbakeretal.[2],torecordinformation aboutanoperatingsystemanditslesystems.the resultsandconclusionsofthesestudieshavethen beenusedforstudiesoftopicssuchascacheissues DepartmentofRoboticsandDigitalTechnology,MonashUniversity,Clayton,Victoria3168,Australia(andrew.moore@rdt.monash.edu.au). ydepartment of ComputerScience,WaikatoUniversity,PrivateBag3105,Hamilton,NewZealand(T.McGregor@cs.waikato.ac.nz). zdepartmentofroboticsanddigitaltechnology,monashuniversity,clayton,victoria3168,australia(j.breen@rdt.monash.edu.au). andsimulationmodels[32,7,8,33],andinthedesignprocessofnewsystems[11,19,13,10,21]. However,whilethereisalargevarietyofsystemsincommonuse,asimilarlywidevarietyofcomprehensivestudiesisnotevident,whichcanbeattributedtothedicultiesinperformingsuchstudies. Comprehensivestudiesusingkernelinstrumentation haveanumberofdrawbacks,asseeninthefollowing list(adaptedfrommoguletal.[16]): codewhichistoresideinthekernelisdicult towriteanddebug, kernelsource-codeisnotalwaysavailable, thekernelmustberecompiledandthemachine rebootedeachtimeanerrorisfound, errorsinthekernelcodearelikelytocause systemcrashes, functionally-independentkernelmodulesmay havecomplexinteractionsoversharedresources, kernel-codedebuggingcannotbedoneduring normalmachineoperation;specicdevelopmenttimemustbescheduled,resultingininconvenienceforuserssharingthesystemand oddworkhoursforsystemprogrammers, commonlyadditionalloadisintroducedonto themonitoredsystem, sophisticateddebuggingandmonitoringfacilitiessuchasthoseavailablefordevelopinguserlevelprogramsmaynotbeavailableforkernel code. Kernelinstrumentationforle-systemmonitoringtakestheformofcodeinsertedatthesystemcallinterfaceorattheinternalinterfacebetween
2 system-callandle-systemoperations.suchmethodssuggestanalternativetechniqueformonitoring acomputer'sle-systemactivitieswherethecommunicationschannelbetweenamachineanditsdisk drives,andinparticularbetweenadisklessclient anditsdiskserver,ispassivelymonitored.blaze usedthistechniquewithhissnooper/rpcspysoftware[3],passivelymonitoringtracbetweennetworkfilesystem(nfs)[24]clientsandservers,and predictingtheoperationstheclientsperformedto causethoseoperations. Fullkernelinstrumentationisusedcommonlyin systemmonitoringbut,bydenition,itinvolvesthe modicationoftheoperating-systemsource-codefor themachineinquestion.passivenetworkmonitoring canbeapreferredchoiceoverkernelinstrumentationforcertainsystem-monitoringwork,particularly ifthesource-codeisnotavailable.passivenetwork monitoringalsohasotheradvantages,including: resultsfromthemachinesbeingmonitoredcan becollectedindependentlyofthosemachines, nomodicationsarerequiredtotheoperation ofthemonitoredsystems, thecollectionofdatawithpassivenetwork monitoringdoesnotimpactonthemachines beingmonitored,and theabilityexiststomonitormultiplemachines simultaneouslyonanetwork. Thisnalpointisimportantbecausedistributed systemsaregrowinginpopularityandasignicant numberofcomputersincommonusearepartofa distributedsystem,ifonlythroughthedistribution andsharingofles.comprehensivestudiesofdistributedsystemsingeneralanddistributedlesystemsinparticulararerelativelyrare.themainreasonforthisisthatthecomplexityofcollectingdata isgreatlyexacerbatedbytheneedtocollectitsimultaneouslyfromalargenumberofmachines.kernel instrumentationwouldrequiremodicationofany numberofdierentcomputerswithdierentoperatingsystemsrunningondierenthardware.there wouldalsobetheissuesoftheloadimposedinthe actualcollectionofdataonorfromeachclientand theimmensetaskofpost-processingthedatafrom thedierentmachines. Thesedisadvantagesdonotexistwhenusingpassivenetworkmonitoringofthedatachannelbetween clientsandaserver.dataaboutallactiveclientscan becollectedsimultaneouslyand,ifadistributedle systemssuchasnfsisinuse,thedatacollected fromthenetworkisindependentoftheoperating systemormachinearchitecture[15,14]. 2 rpcspy/nfstrace Ifrpcspy/nfstracearetobeusedasareplacement forkernelinstrumentation,thetechniquemustbe abletodelivertoaresearcherdatasimilartothat generatedbythekernelinstrumentationtechniques. rpcspy/nfstracehastwodistinctcomponentsfor achievingthis. rpcspyinteractswiththeethernet-interfacefacilitiesofthemonitoringmachineandcollectspackets traversingthenetworktowhichitisconnected.the packetsareconvertedintotherequestorreplypart ofannfsremoteprocedurecall(rpc).eachrequestandreplyisthenmatchedtogether,dataofinterestareextractedandatransactionrecordismade alongwithatimestampofwhenthetransactionwas completed. Thesecondcomponent,nfstrace,usesanheuristicbasedontheoperationofNFStomakean estimationofthedurationofale'sopen-closesession(thetimebetweenwhenaleisrstopened, readfromand/orwrittentoandthenclosed)which causedthenfstransactionsrecordedbyrpcspyto occur.nfstracecreatesrecordsofleopen-close sessionsitestimateshaveoccurred(and,thus,to havegeneratedthenfstransactionsseen).this estimationrelies,inpart,onconsistencyinnfsimplementations. Forexample,foreveryopensystemcall(independentofwhethertheleistobereadtoand/orwrittenfromorjustaccessed)anNFSgetattr transactionisgenerated.however,open-closesessionstoreadorwritedatahandletheactualdata insignicantlydierentwaysalthoughitshouldbe notedthatthewritetransactioncaseiseasierto handlebecausethecachedoesnothaveasdominant eectonthewriteoperations.asaresult,muchof thespecial-casehandlingnfstracemustdoapplies onlytonfsreadtransactions. rpcspy/nfstracetogethergenerateanestimationoftheopen-closesessionsthatakernelinstrumentationsystemcouldrecorddirectly.figure1
3 User Program System call stubs kernel instrumentation Local Filesystem Block Cache NFS Filesystem Figure1:Thedataowbetweenauserprogramand RPC annfslesystem.instrumentationpointsforker- Device Driver XDR nelinstrumentation(snooper)andnetworkmonitor- ing(rpcspy)areindicated.thisdiagramcompares UDP/TCP IP Operating System Kernel thedierenceintheinformationavailabletoeach network system.inparticular,oneinstrumentationpoint, Network monitoring snooper,isbeforethecacheandtheother,rpcspy, isafterthecache. showshowtheinstrumentationpointsforeachofthe twosystemsdierinthecomponentsofthesystem availabletothemand,thus,theinformationaccessibletothem. suchasthesystemcallsoccurringonthecomputer, whilepassivenetworkmonitoringmustinterpretthe whichsystemoperationshaveoccurred.rpcspy transactionsbetweenclientandservertoestimate Kernelinstrumentationisabletorecordevents curredbetweenclientandserver. serversideoftheclientcache-thetracthatoc- /nfstraceresultsrecordwhathappenedonthe 3 Previousworkusingrpcspy hasbeenusedinseveraldierentworkstoaidinthe Therpcspy/nfstraceimplementationbyBlaze rpcspy/nfstracetoanalyseclient-serverlesystem tracandmadeuseofinformationaboutthetrac congurationofexistingsystems.anderson[1]used developmentofnewsystemsandasanaidtothe Regularly-read,static,read-onlylesweremovedto tobetterutiliselocaldisksintheclientsthemselves. thelocaldisk,onapartiallyautomaticbasis,takingintoaccounteachle'sutilisationbyapartic- ularworkstation.blazeusesresultscollectedusing rpcspy/nfstraceinanumberofworkstojustify versionofnfstracetocollectresultsusedinapaper thedesignofawidearealesystem[4,5].finally, tojustifyaparticularlesystemdesign[34]. Dahlinetal.[9]usesrpcspyandapartially-modied sumptionthatcomplicationsintroducedbythere- sultsofrpcspy/nfstracearenegligible.thisis validforstudiesbaseduponthetracbetweena clientandserverwhichtakeintoaccounttheeects Eachofthesestudieshasbeenmadewiththeas- oftheclientcachesuchasdahlinetal.[9].however,otherstudiescanbeatriskforassumingthat rpcspy/nfstraceissuchaperfectreplacementfor traditionaltechniques. softwarethattheeectsofpacketlossshouldbe oftherpcspy/nfstracesoftwarethatpeculiarities quantied.additionally,henotesinhisdescription oftheheuristicsofnfstrace(anditsoriginalimplementation)needtobeevaluatedmorecompletely. beenwithoutanyharddataontheaccuracyofthe implementationandonlyapassingappreciationof areaswheretheimplementationisinaccurateand thereasonsforthoseinaccuracies.thefollowingsec- Previously,theuseofrpcspy/nfstracehas Blaze[4]notesinhisdescriptionoftherpcspy datafromthesamesourceandthendiscusstheresultstionspresentacomparisonoftwosystemsrecording Therpcspy/nfstracetoolsdependheavilyonthe 4abilityofthenetworkinterfaceofthemachineon Systematicerrorinrpcspy whichtheyarebeingruntocapturealltracpass- notlosedatawhenutilisationislowbutdataloss withnetworkutilisation.thenetworkinterfacewill ingthroughthenetwork.packet-lossbythenet- workinterfacedoesnothavealinearrelationship willincreaseasutilisationincreasestoapointbeyondwhichitwillbeunabletoacceptanyfurther dataitcanprocesswillattenoutnomatterwhat theutilisationbeyondthatpoint. datalossofrpcspyandtocalibratethenetworkinterfacerpcspyuses.toperformthesetestssatisfactorily,anetworkanalysercapableoffull-utilisation increaseinthedata-transferrate.theamountof Astudywasperformedtoquantifythepotential
4 measurementsonethernetwasrequired.ahewlett PackardInternetAdvisorModelJ2522Aswasused bothtomakemeasurementsandtogeneratearticialloadsonthenetwork.thepacketfiltermech- operatingsystem. anismusedwasinadecstation3100runningul- trix4.3aandthenitmechanismusedwasinasol- bournesc2000(amachinecompatiblewiththesun Sparcstation2)runningaSunOS4.1.2compatible articially,usedthetracbreakdownintable1 whichwasbasedonananalysisofthenetwork'sregulartraccontentcollectedoverseveral24-hourperiods. Testsofrpcspy,wherethenetworkwasloaded congurationoptions.inparticular,thesizeofthe canbeset.thenitmechanisminsunosdoesnot packetbuer,wherepacketsprocessedbypacket filterareplacedforcollectionbytheuserprocess, ThepacketfilterfacilityofUltrixoerssome oerthiscongurability.thedefaultconguration Ethernetnetworkutilisation.Itisapparentthatnot percentageofunprocessedethernetpacketsversus arecomparedinfigure2.thisgureshowsthe packetfilterinadditiontothenitmechanisms andanoptimum(largestcongurablebuersize)for onlyarethecharacteristicsofthenitmechanism packetfiltermechanismshowednolossuntilover 15%utilisation,astagebywhichNITmechanismloss poorbeyond10%utilisationbutthatthepacket leveloflossuntilutilisationwascloseto50%.the wascloseto25%. filtermechanismdidnotdemonstratethesame ofprocessingoverheadontheclient,whichisimposedbytheneedofrpcspytomatchrpctransactions,andthepacket-losscharacteristicsoftheethernetinterfacewhichrpcspyisusing.figure3shows Asignicantissueinrpcspyisthecombination thenumberofnfstransactionsversusethernetutilisation.theethernetutilisationinthesetestsisal- processinagiventimeperiod.thehewlettpackard mostpurelynfstrac.byusingnfstracexclu- sivelyweareabletoestablishthemaximumnumber ofnfstransactionseachrpcspysystemisableto guration. testthepacketfilterwasleftinthedefaultcon- transactionsthatoccurredoverthistime.forthis testequipmentrecordedtheactualnumberofnfs mumnumberofpacketsitcanprocess.thenit- Thetestshowsthateachsystemhasamaxi- Total packets unprocessed (%) Packetfilter (default) Packetfilter (optim.) NIT suspacketlossforvariousworkstationethernetin- terfaces.packetfilterdefaultandoptim(um)are Figure2:AcomparisonofEthernetutilisationver twocongurationsoftheethernetpacketcapturefacilityofthedigitaldecstation,nitistheethernet 10 capturefacilityinsunmicrosystem'ssunos Utilization (%) urationpacketfilter-ultrixcombinationappears tobelimitedtoprocessingapproximately260nfs NFStransactionspersecond.Thedefaultcong- transactionspersecond.itisimportanttonote SunOSsystemislimitedtoprocessingabout175 thiswasastress-testingofrpcspyandthatsuch NFSloadswerenotacharacteristicofthenetwork guresintable1wecanseethat36%ofthetotalethernettracisfromnfs.however,itwould notbetruetosayofthis36%thathalfthenumber ofnfsethernetpacketsisanapproximatecount ofcompletenfstransactions.suchasimplicationwouldnotallowfortherebeingincompletenfs transactions(thelossoftherequestorreplyina transaction),norwoulditallowfornfstransactions (transactionswherethedatapayloadrequiredtwo thatrequiredmorethanonepairofnetworkpackets towhichthesemachineswereconnected.fromthe thetestnetworkoperatingat12%utilisationcould meanlessthan72transactionspersecondinamixed rpcspydoesnotneedasmuchprocessortimeasif ithadhadacompletenfstransaction.asaresult, ormoreethernetpackets).ineachofthesecases loadwithavarietyofnfstracratherthanthe200 indicates. transactionspersecondthatthefigure3stress-test forcertainbutitcouldresultfromlimitationsin thehardwareofthenetworkinterfaceand/orinthe Theexactcauseofsuchdatalossisnotknown
5 InternetProtocol(IP)67UDP Protocoltype Sub-protocolTypesofpacketPacketsize(avg.) TCP NFS (all) % NovellNetware(IPX) Table1:AbreakdownofthetracmixtureusedfortestingrpcspyresponsetoEthernetutilisation areactuallyclosetojust5%ofthenetworkcapacity) supportsthisobservationwithamaximumloadover andthenetworkonwhichmeasurementsweretaken thatmostethernetloadsarewellbelow50%(and isationover24hoursofcloserto1.1%. 24hoursofnogreaterthan18%andanaverageutil- Figure3:ThenumberofNFStransactionsversus yserrecordingnopacketlossisalsogiven. EthernetutilisationfortheNITandpacketfilterrpcspy/nfstraceandakernelinstrumentation 5Thefollowingresultspresentacomparisonbetween Comparison softwareofthepacketcollectionandlteringmechanism.thischaracteristicisunfortunate.itisduringsnooperpackage.itwasimplementedoriginallyby asubstituteforkernelinstrumentation. sumptionthatrpcspy/nfstracewouldbeusedas capturemechanisms.resultsfromanetworkanal-technique.intheseresultstherehasbeenanas- acrossadistributedlesystemwillpotentiallybe highest.becausethereispotentialforrpcspybased thetimewhenthenetworkisbusiestthatutilisation SiebenmannandZhou[27]forUltrixversion3.3. Snooperisasetofkernelinstrumentationroutines Thekernelinstrumentationthispaperusedisthe toolstolosedataabouttransactionsatbusytimes, studiessuchaslesharing,asituationthatwouldblockoperations,processexecutionandtermination, functionsincludinglogicalleoperations,physical- bemorelikelytooccuratbusiertimes,wouldbeetc.thesnooperpackageisbaseduponthepackage forrecordinginformationaboutanumberofkernel aectedadversely. inturn,sharesitsancestrywiththepackageusedby ofthesamenamedescribedinzhouetal.[35]which, offasterworkstationswithfasterhardwarenetwork implementationperformanceineitherthenetwork interfaces.however,thismaynotbesolvedaseasily iftheproblemisdueprincipallytopoorsoftware SuchdrawbackscouldbeovercomebytheuseOusterhoutetal.[20]toperformtheirstudyofthe UNIX4.2BSDlesystem. nicantonlyaboveabout10%utilisationforthe packetcapturemechanism(nit/packetfilter)or packetfiltermechanism.boggsetal.[6]comment rpcspy. ditionalpost-processingcodewasrequiredforthe dedbyanopenandaclosesystemcall.nfstrace open-closesessions,i.e.setsofletransactionsboun- performsthatfunctionforrpcspy/nfstracebutad- Theresultsfromeachsystemwereprocessedinto Whilethischaracteristiclossdoesexist,itissig-dataproducedbysnoopetracehavebeendonebyusingsimultaneoustraces ofasinglemachineovera24-hourperiod.thetrace ofthismachinewasperformedfrom11:00a.m.monday,12thofdecember,1994,until11:00a.m.thefol- Thecomparisonsofsnooperandrpcspy/nfs- NFS transactions recorded per second NFS transactions recorded versus ethernet utilization packetfilter NIT Hardware Monitor Ethernet utilization (%)
6 lowingday.themachinetracedwasadigitaldecstation3100conguredwith20mbytesofmemory, runningultrix4.3a.thismachinewascongured withalocaldiskforvirtualmemoryswapactivities. Therpcspytracewasrecordedtoanadditionallocal disksoasnottoperturbtheresultswithextraneousnetworkactivity.duringthe24-hourperiod,a lossof1.5%oftotalethernettracwasrecorded. Basedonthegraphsofpacketlossversusutilization (gure2)andupontheaverageethernetpacketutilization(table1)thisgivesanapproximatelossof 0.6%ofNFStransactionsfromthetotalrecorded trace. Thenfstracepost-processingtoolusesaheuristicwhichincorporatesatimeouttodeterminehow longanopen-closesessionwilllast.thevalueisuserselectablebutthedefaultvalueof135secondswas usedthroughouttheanalysisdescribedherein. 5.1Excludeddata Alltransactionsassociatedwiththereadingofexecutablelesrecordedbyeitherthesnooperorrpc spysystemswereremovedfromthetracedatabefore processing.thiswasdonetoavoidproblemsassociatedwithashortcominginthesnooperinstrumentation,nottherpcspy/nfstracesystem.records pertainingtothesnoopertraceleitselfwereremovedfromtheoutputrecordsduringtheprocessing stage. Whiletheremovalofallexecutiontransactions mayseemtochangetheresultspresented,theremainingdatastillpermitasatisfactorycomparison ofthetwomonitoringsystems.theamountofpotentialcomparison-errorwhichwouldbeintroduced duetotheinclusionofincompleteexecutionrecords bysnooperwasnotjustied.additionally,lesystemtracresultingfromtheloadingofexecutable leswasexcludedfrompreviousstudiessuchas Ousterhoutetal.[20]andBakeretal.[2]duetosimilarproblemsintheloggingofexecutableletrac. 5.2Systemtrac Thecharacteristicsofthetotalle-systemcommunicationstracarecommonly-usedmeasurements.In thecaseofdisklessworkstations,themeasurements areimportantforinsuringthatthenetworkshave adequatetransportcapacityandthattheserversof disklessworkstationshaveadequateservicecapacity. Inanysortofworkstationsuchvaluesdenetherequiredcapacityfordiskinterfaces,aswellasbeing usedincacheandbusdesign[35,21,20,2,23]. Acomparisonofcommunicationstractoand fromthelesystematthelogicallevelandofthe communicationstracattherpcspynetworklevel arenotstrictlycomparablebecauseeachsetofmeasurementswasmadeonadierentsideofthecache. However,oneoftheobjectivesofnfstracewasto estimateoperationsthatoccurredattheuserlevelby analysingthedatacommunicationstracbetween clientandserverandthetransactionsusedbythe clienttoensurethecontentsofthecacheareup todate.asaresult,whilerpcspy/nfstracecannotgenerateinformationonexactlywhatdatawere transferredbetweentheuserprogramsandthele system(includingthenfsle-systemroutinesand theblockcache),itcancalculatetheexactamount ofdatatransferredbythenfslesystembetween NFSclientandserver. Table2givesasummaryofresultsforthecomparisonperiod.Itisapparentimmediatelythatthere isamajordierenceinthevaluenfstraceestimates forthetotaldatatransferredwhencomparedwith snooper.theydierbyafactorof1:7.fromthese resultsitisequallyapparentthatoverthecourseof along-termanalysis(24hours)theresultsforpeak valuesandwritedataarecomparableforthetwo systems. Peakvaluesdisplaythischaracteristicbecause theytypicallyinvolveamountsofdatathataretoo largeortoovolatiletobesuitableforlongtermstorageinthecache[20,2,28]-thischaracteristicis independentoftheparticularloadamachineisunder[18].asaresult,thesimilaritybetweentransferreddata,particularlypeakvalues,wouldremain acrossanysampletaken.incomparison,valuesfor thetotalquantityofdatatransferredovertimeis notsimilar.thedierencebetweensnooperread averagesandnfstracevaluesisnotsurprising.the clientcachewilleliminatesuccessivenfstransactionsforreadingdatafromthenfsserverand,as aresult,nfstracecannotrecordthedatatransfer thatoccurredatthelogicallevel. Figure4showsplotsofdatatransferredovertime asrecordedbysnooperandrpcspy/nfstrace. Higherlevelsofdatatransfer,particularlysignicantwritingactivity,between7a.m.and11a.m.
7 Totaldatatransferred Averagedatatransferred measurement Particular interval length 86,644,53046,967,724 snooper (bytes) nfstrace Peakdatatransferred 10seconds 10,028 (bytes) Averagedataread Peakdataread Averagedatawritten 7,468 5,048,320 3,914,935 5,436 Peakdatawritten 2,560 2,590 Averagedatatransferred Peakdatatransferred 10minutes19,028,55017,015,414 5,120, ,698 5,048, ,165 2,846 Averagedataread Peakdataread Averagedatawritten 10,427, , ,595 7,144, ,387 Table2:Thetotaldatatransferredforthesystem.Peakandaveragevaluesfor10secondand10minute intervalsarealsogiven. Peakdatawritten 8,600,705 9,289, ,777 thereadingandwritingoflargeimageles. (byanotherresearcher)onthismachinerequiring isduetothetestingofimageencodingalgorithms mentationandthatavailabletonfstrace.peri- dierencebetweendatagainedfromsnooperinstruodicaccessesbyautomaticjobsaccountfortheregularcommunicationstracloggedduringthe19:00 Thegraphofread-datashowsanexampleoftheble3liststhedierentlesystemstheclientaccessed lesystemcontainsexecutablelesforthesystem, to07:00period.becausethiscommunicationstraf-overthetraceperiodandthetaskseachlesystem storetracedatalocally,andalocal,swapdisk.ta- etc.thedecstationanalysedinthisstudydidnot cinvolvestheregularexecutionofprograms,com-servedmonlywithlittleotherle-systemactivity,thecacheandfromeachlesystemcanbeusedtoassistin makingle-system-congurationdecisions.suchde- haveanylocallesystems,apartfromthatusedto oftheclientholdsallthenecessarysoftwareandassociateddatales.theresultisthatapproximately 300Kbytesoflogicaldataarereadeach30minutes period. read-activitybetweenclientandserveroverthesame atthesnooperlevelbutrpcspyrecordsnegligiblecisionscanincludewhichlesystemsgenerateso Abreakdownofthetypeofdatatransferredto ordsofrawdatatransferisbecausenfstransactions donotcontainsignicantinformationaboutblocks readdataavailabletorpcspyaboutdatatransfers readfromthecacheoftheclient.theonlyspecic Thereasonnfstraceisnotasaccurateforrec-ble4. muchservertracthatitwouldbebetterforthem tobeattachedlocallytothemachineandhowwidely lesystem'scommunicationstracisgiveninta- aparticularlesystemisused.abreakdownofeach theserver'sdisks. 5.3Filesystemtransactions thatoccuriswhendataarereadbytheclientfromnoteisaverylargepercentageofoperationsasso- ciatedwiththe/partition.thelargenumberof Itisimportanttonotethatatthesystem-call isticbreakdownofthesetransactions.ofparticular level,asrecordedbysnooper,thereisacharacter- transactionsonthispartitionwillhavebeenpotentiallycompoundedbecausethe/tmpand/var/tmp directoriesresidedonthe/lesystems./tmpand typicallyforaparticularpurpose.forexample,one Aswithmostunixsystems,eachlesystemisused/var/tmpcanpotentiallycarryalargepercentageof operationsbecausetemporarylesaretraditionally lesystemcontainstheusers'directories,anothercreatedinthisdirectorystructure[31,22]. resultsfromthetwomonitoringmethods.notable exceptionsaretracinvolvingthe/partitionand Table4showsamoderatesimilaritybetweenthe
8 Read data transferred over day (10 minute samples) Bytes transferred 10 Mbyte 8 Mbyte 6 Mbyte 4 Mbyte 2 Mbyte snooper read nfstrace read 0 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day 10 Mbyte snooper write nfstrace write 8 Mbyte 6 Mbyte Figure4:ReadandWritetransfersasrecordedbykernelinstrumentation(snooper)andnetworkmonitoring(nfstrace).Aquiescentsystemfrom19:00until7:00,themachineisbusyduringthedaylight 4 Mbyte hours. 2 Mbyte 0 Mbyte 11:00 13:00 15:00 17:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day FileSystem FunctionandContents Bytes transferred Write data transferred over day (10 minute samples) / /var/spool/mailcontainseachusers'maille. rootlesystem,alsoincludes/varand/tmp.top-levellesystem /usr/local containsstandardsoftwaredistribution,inadditiontolibrariesandincludelesforthecurrentsystem. containingtemporarydirectoriesandloggingdirectories. containslocallyinstalledsoftware. /usr2 /packages Table3:Abreakdownofthelesystemsofthestudyandtheirrespectivefunctions. homedirectoriesforagroupofusers. containscommercialsoftwarepackagesandcollectionsofprojectspecic data(inthiscaseimagedata).
9 FileSystem/31,736,478(36.63) snooper total rpcspy/nfstrace /var/spool/mail /usr/local 2,941,480(03.39) 4,385,788(05.06) 5,863,351(11.59) /packages /usr238,660,513(44.62)35,251,413(69.66) 1,455,692(01.68) 7,464,579(08.62) 1,446,003(02.86) 3,142,239(06.21) read 3,934,663(07.78) 965,364(01.91) /var/spool/mail /usr/local /27,267,823(42.26) 2,941,480(04.56) 3,836,074(05.94) 2,853,302(12.73) /packages /usr221,561,247(33.41)10,895,621(48.63) 1,455,692(02.26) 7,464,579(11.57) 1,446,003(06.45) 2,311,208(10.32) write 3,934,663(17.56) 965,364(04.31) Table4:Totaldata,readdataandwritedatatransferredperlesystemasmeasuredbysnooperand /var/spool/mail /usr217,099,266(77.31)24,355,792(86.38) / 4,468,655(20.20) 549,714(02.49) 3,010,049(10.68) rpcspy/nfstrace. 831,031(02.95) read-tracingeneral.whiledierencesbetween valuesforreadbetweensnoopermeasurementsand particularlypronounced.thisdierenceislikelyto thoseofrpcspycanbeexplainedasresultingfrom clientandserver,thereadtracforthe/partitionis thecachemechanismlteringreadrequestsbetween resultfromahighusageofsystemleslocatedinthe ofsuchlesinclude/etc/passwd:thelistofusers spondingcacheentriesalwaysbeingvalid.examples /etcdirectorybeingaccessed,resultinginthecorre-fromtheserverandthenmayremaininthelocal cachewhilebeingusedrepeatedly.finally,during thesource-codeles,librarieswillbereadonlyonce server(andseenbyrpcspy)butnotnecessarilyread fromthenfsserver.duringstage2,inadditionto onthisclient. lelistingthelesystemsthatshouldbemounted thesystemsknowntothisclientand/etc/mount:a abletouseasystem,/etc/hosts:astatictableofrunstherawimagestreamcouldhaveremainedin stage3,whileletransactionsrelatingtotheloadingoftheexecutableleitselfhavebeenremoved, thisprogramtakesasinputarawimagestreamand outputsanencodedimagestream.onconsecutive ofreadandwritedatafor/usr2isareectionof thevolatilenatureoflesonthislesystem.in particular,softwareforimageencodingwasbeing developedandacycleof Thenotabledierenceintherecordedquantities/usr2asmeasuredwiththesnoopersystembutthe tracalreadygreatlyfavoursthewrite-tracfor localcache. Itshouldbenotedthattheratioofread-to-write 1.editprogram forboththe/usr2and/var/spool/maillesystemscanbeattributedtotheblockcacheneeding writetracrecordedbyeachmonitoringsystem Signicantdierencesbetweentheamountof cacheactivities,lteringtrac,increasethisratio. existed.thisdevelopmentcycle,duringstage1,resultedinsource-codelesbeingwrittentothenfs 3.runprogram totransferdatatoandfromthelesysteminblocksizedpieces.theresultofthisisthatamodication wholeblock(8kbytesfortheselesystems). ofonebyteinalewillresultinthewritingofa 2.compileprogram percentageoflogicalletrac,blockcachingseems itiesonthe/lesystemareresponsibleforalarge Fromthisbreakdownitisclearthat,whileactiv-
10 toreducethequantityofdatatransferredbyafactorofupto6.bycomparison,the/usr2lesystem isresponsibleforahigherquantityofdatatransfer and,inthedevelopmentandbalancingoflesystems,itwouldbeimportanttoestablishwhether thisisatransientconditionoraregulartrendfor communicationstracforthatparticularlesystem. 5.4Systemusers Table5presentsseveralvaluesrelatedtothenumber ofactiveusersonthesystemandtheamountoftraf- cgeneratedbythem.suchtabulationshavebeen madeinanumberofpreviousstudiesandareuseful intheestimationoftheloadausermayimposeon asystemaswellastheworst-casescenariosforthis loadṫhedierencesintable5forthenumberofusers aremostlikelytheresultofsnooperrecordingthe realuserid(uid)associatedwitheachlogicaloperationandrpcspyrecordingtheeectiveuserid associatedeachnfstransaction.thisdierence comesaboutbecauseprogramssuchasinetd(the internetservicedaemon)performoperationsasone userandspawnprogramsthatwillrunasanother user.theresultisthatcountsofactiveusersmade throughrpcspy/nfstraceusuallydierbyavalue ofonewhencomparedwiththeactiveusercount fromsnooper. Average-data-utilisedperuserindicatesthat cache-hitratesare,onceagain,absorbingasubstantialquantityofcommunicationsthatwouldhaveoccurredbetweeneachuserandthelesystem.itis interestingtonotethatthemaximumvaluesrecordedbyeachsystemarealmostidentical.thisis mostlikelyduetothetransferoflargeamountsof data,causingtheclient'scachetobequicklyoverrun withnewdata.asaresult,onlyaminimalamount ofdataiscachedduringthistime. 5.5Files Aslesarethecommonunitofdataaccessedon alesystem,informationabouttherangeofles accessed,aswellastheworkingsizeofthoseles, enablesdeveloperstodeterminethenecessarysize oflecaches,toestablishcommonworking-setsizes andtoquantifyotherrelatedmeasurements. Ashasbeenmentionedearlier,thedierencein theaveragelesizeforthe/lesystemwaspredictable.thiswillprincipallybearesultofalarge numberofsmall,system-relatedlesnotrequiring accessfromthenfssystem.thedierencesinother valueswillhaveresultedfromthecachingof,andrepeatedaccessesto,activeles(eveniftheseleswere activeforonlyashortperiodoftime).inthiscontext,anactiveleisonewhichisaccessedoneor moretimes. Table7liststhenumberofdierentlesrecorded atthesnooper,rpcspyandnfstracelevels.atthe rpcspylevel,thisisacountofeverylethathada readorwritenfsoperationperformedonit.the lteringcharacteristicofthecacheisobviouswhen comparingthenumberoflesthathadlogicaloperationsperformedonthematthesnooperlevelwith thenumberoflesforwhichdatawasreadfromor writtentoattherpcspylevel.largerdierencesfor the/lesystemwillhavebeenasaresultofaccesses tothelargenumberofregularly-accessedsystemles locatedthere.theseleswouldbeaccessedoften andbemodiedinfrequentlyandwould,asaresult, havealongcachelife. Theresultsinthistableshowanareawhere theestimationmethodusedbynfstracecangeneratediscrepancies.nfstracemustestimatetrac toandfromlesthathavenotcausedanyrpcspy readorwritetransactions.withtheexception of/var/spool/mail,nfstracemustestimateadditionaloperationsforlesoneachofthevele systems.nfstracehasestimatedextraneousoperationsonlesof/usr2andunderestimatedthese operationsfortheotherlesystems,inparticular the/lesystem. Therulebaseunderwhichnfstraceoperates estimatesoperationsonlesfromacombination ofnfsread,write,setattrandgetattrtransactions.theestimatesofleswhichdidnotinvolvenfsreadorwritetransactionswouldhave resultedfromsetattrorgetattroperations.by usinggetattrtransactionsalone,thereispotential fornfstracetoconfusegetattrtransactionscaused bysuchoperationsasgettingadirectorylistingwith thosetransactionsbeingusedtovalidatethecontentsoftheclientcache. Incomparison,thegraphofFigure5,anormalisedcumulativedistributionofthenumberofles ofeachsize,showsthattheestimationcalculatedby
11 intervallength Numberofactiveusers 10minute snooper 4 rpcspy 10second Totalbytestransferredperactiveuser 10minute6,342,8505,477, Maximum Average 10second5,120,0005,048, ,535 11, ,820 datatransferredperactiveuserinthoseintervals. Table5:Themaximumandaveragenumberofactiveusersovergivenintervalsandthetotalquantityof 18,404 /var/spool/mail Filesystem/ snoopernfstrace /usr/local 267, ,123 43,378 10, , , ,417 Table6:Acomparisonoftheaveragesizeforles /packages1,316,180 /usr2 42, ,371 46,067 12,310 nfstracecompareswellwiththeresultsofsnooper. Thetwosignicantdierencesbetweentheresults accessedoneachparticularlesystem. ofnfstraceandthoseofsnooperwhichleadto disparitiesinthegraphareforthenumberofzerolengthlesandthenumberofleswhichwereapproximately700bytesinlength. Figure5:Cumulativedistributionofnumberofdifferentlesaccessedversuslesize.Fromthisgraph thanagivensizehavebeenaccessed.forexample cessedare1kbytesinsizeorsmaller.note:thele ateaccurateestimationsofaccessestovariouszero- lengthlesandcreatesrecordsofmanymoreac- cessesthanactuallyhappened.thismaymostlikely beduetonfstracebeingunabletodierentiatebetweengetattrtransactionsfordirectoriesandthosesizeaxisislogarithmic. resultingfromtheopeningofazero-lengthle.in Intherstcase,nfstraceisnotabletogener-bothtechniquessuggestthatover150ofthelesac- wecandeducethenumberoftimesdierentlesless evaluatesmanyofthe700-byteleaccessesasbeing thesecond,relatedcase,nfstracehasunderestimatedthenumberofaccessestovariousleswhichenoughlife-spanbetweenlecreation,thewriting absorbingthesmall-letransactions. wereapproximately700bytesinlength.inadditionandreadingofdata,andledeletion,nonfsread orwritetransactionsmayoccurduringtheopenclosesession.asaresultnfstraceisnoteasily ashortlife-span. abletorecorddatatransferoperationsonleswith zero-bytelesaccessesbecauseoftheblockcache tothereasonsabove,itispossiblethatnfstrace problemtonfstrace.thisisbecausegivenashort Fileswithashortlife-spancanalsopresentanumberofdierentlesaccessedbythesystemdur- sistentwiththehypothesisthatnfstracewasun- abletoevaluatecorrectlythenumberofaccessesto Thefollowingtable,7,givesabreakdownofthe ingthemeasurementperiod.thesevaluesarecon- zerolengthles.theaveragelesizefor/would Number of files Cumulative distribution of the number of files of each file size snooper nfstrace K 10K 100K 1M Size of file (bytes)
12 stronglyconrmthis,althoughthe/packagesresultsruncountertothis.thisstrongcounter-examplecouldbeduetotheunusualnatureofleson thatparticularlesystem.wenotealsothatnfstraceresultscountonelessleforthatlesystem; asinglelargelewouldhavemodiedthisaverage considerably. Whiletherearenotabledierencesineachof Tables6and7,theresultsfromthem,inadditiontothoseofFigure5showthatnfstracewas abletogiveresultsbroadlycomparablewiththose ofsnooper. 5.6Fileopen-closesessions Theopen-closesessionofaparticularleisaconcept aroundwhichanumberofmeasurementsarebased. Anumberofstudieshaveusedsuchmeasurements; examplesincludelesharing,leutilisationandvariouscachestudies[20,2,12,13,25]. Suchopen-closesessionmeasurementsincludethe lengthoftimeaparticularleisopen,theamount ofdataaccessedinthattime,theamountofdatapotentiallyaccessed(thesizeoftheleopened),what sortofopen-closesessionwasinvolved,whetherthe lewasopenedforreadand/orwriteoperations,etc. Thenumberofopen-closesessionsaswellasa breakdownoftherelativetypes,aretabulatedin Table8.TheimplementationofNFSunderUltrix includesthesynchronouswritingofmodieddata blockstothelesystematthecloseofale.this meansthatnfstracecanpotentiallymisswriteoperationsonlesthatultimatelyleavethelewith zerolength,forexamplesomesortoftemporaryle. nfstracewillnotbeabletogenerateresultsfor readsonlesthatoccurinclosesuccession(where thecachecontentsarestillvalid).additionally, nfstracemaynotcorrectlyinterpretgetattrnfs transactionsusedtovalidatethecache.theresult isnfstracewilleithermisssomeopen-closesessions altogether,incorrectlyinterpretnfstransactionsas notbeinganopen-closesession,orincorrectlyconsiderthatthenfstransactionsfromtwoormore separateopen-closesessionarefromthesameopenclosesession. Thelargernumberofwritesrecordedbynfstracewillcertainlyincludetheread-writeoperations snooperrecorded.nfstraceisunabletodetect read-writesessionsandwouldconsidereachofsuch operationsasaseparatereadandwritesession.null open-closesessions,wherenodataaretransferred andtheleissimplyclosed,wouldnotbeableto bedetectedbynfstrace.instead,nfstraceinterpretsanyleopen,ifthatweretheonlyoperation onaparticularle,tobeareadingofanunknown amountofdatafromtheclientcache. Becausethebordersbetweenreadandwriteoperationscannotbedeterminedaccurately,nfstrace willtendtocollectsuccessiveopen-closesessionstogether,interpretingthemasone,longer,open-close session.asaresultofthis,theaveragedurationof theopen-closesessionsreportedbynfstracemay behigherthanthedurationsreportedbysnooper. Tables9and10,recordtheopen-closesessions onatypeofopen-closeoperationperlesystembasis,andbylesystemperoperation.firstly,table9showsthefulleectofthecacheltering,combinedwithnfstraceincorrectlyinterpretinginformationavailable,causingopen-closesessionstobe removed.thisisespeciallythecaseforthe/lesystem.theresultsfor/var/spool/mailareagood exampleofwherenfstracehasmisinterpretedthe NFSgetattrtransactionsasopen-closesessionsbecaus lesareoftencheckedfornewmailresultingingetattrtransactions.Bywayofcomparison, abetterresultisgivenforthe/packageslesystem.filesfromthislesystemareunlikelytobe abletobekeptincacheforlongperiods.theresult isthatnfstraceisabletogiveabetterresultfor open-closesessionsbecausethenfstransactionsfor thislesystemweremorecomplete. Becausethecacheisremovingtheneedforalarge numberofthereadoperationstoresultinnfstransactions,theread:writeratioisclosertounityfor theresultsofnfstracethantheresultsofsnooper. Whilethisratioisexpected,evendesirable,forthe measurementsofdatatransferred,thesevaluesare incorrectforopen-closesessionsresultinginhigher guresforaveragedatatransferredpersessionand incorrectinformationaboutthecharacteristicsofthe sessions. However,whiletheratiosofthevarioustypesof open-closesessionsproducedbynfstracearenot particularlyclosetothoseofrecordedbysnooper, addingtheguresfornullsessionstothereadopenclosesessionsimprovesthecomparisonforalllesystemsexceptfor/. ForTable10,allwritevaluesareincreasedby
13 /var/spool/mail FileSystem /111(24.89) 10(02.24) snooper 68(17.13) 8(02.02) rpcspy 98(22.37) nfstrace /usr/local /packages /usr2269(60.31)269(67,76)278(63.47) 49(10.99) 3(00.67) 4(00.90) 46(11.59) 3(00.76) 48(10.96) 8(01.83) Table7:Abreakdownperle-systemofthetotalnumberofdierentlesaccessedduringthetraceperiod. Total (00.68) Thevaluesinparenthesesareeachcountasapercentageofthetotalnumberofles. read-writeentries readentries7442(88.07)1749(68.51) 557(06.59) 35(00.41) snooper 804(31.49) nfstrace nullentries 416(04.92) - Table8:Thecountofopen-closesessionseachmonitoringsysteminterprets.Additionally,abreakdown Total oftheseopen-closesessionsintoread-only,write-only,read-writeandnullopen-closesessionsisshown.a nullsessioniswherenodataarereadfromorwrittentothele(althoughthelewasopened).valuesin parenthesesarethepercentageofthetotalnumberofleseachtyperepresents. FileSystemsessiontype /read read-write snooper (90.33)818 (04.98)476 nfstrace 298 (00.49) (04.20) (63.21) (36.79) /var/spool/mailread /usrread (73.21) (26.79) 61(100.00) write null (40.91) (50.00) (09.09) 75 7 (91.46) (08.54) /usr/localread /usr2read write 146(100.00)100(100.00) (74.52)686 (20.29)321 (68.12) (31.88) Table9:Abreakdownoftheopen-closesessionsoneachlesystembytypeofopen-closesession.Values /packagesread null 51 9(100.00) (05.20) 9(100.00) - - inparenthesesareeachtypeofoperationasapercentageoftheopen-closesessionsonthatlesystem.
14 errorwillpartlybebecausenfstraceinterpretsthe thatleastwoseparatewriteevents.additionally, nfstracecanincorrectlyinterpretmultiplewrites creationofanyleandanysubsequentwritingto nfstrace,particularlyinthecaseof/usr2.this nfstracecaninterpretmultiplewritesintothesame locationinaleasmultipleopen-closesessionson Becausenfstraceinterpretsanaccesstotherst tothesameleasconsecutiveopen-closesessions. thevieditor.viusesloglesthatcheck-pointthe thatle.asanexample,thissituationcanarisewith byteofaleasthestartofanewopen-closesession, ofwritesmadetotherstblock,therstblockmay editoperationsastheyoccuronthele,sovican becontinuallywritingsmallchangestothelogle. beingwrittentotheserverandifthereareanumber bewrittentotheserverseveraltimes.eachtimethe Thesecollectionsofsmallwriteswillresultinblocks rstblockiswrittennfstracecouldpotentiallymisinterpretthewritingofdataasseparateopen-close willbeoverwhelmedbythequantityofotheropenclosesessions(readsessionsinparticular).however, foropen-closesessionswritingtoale,theseextra incomparisonwithvaluesforallopen-closesessions, actualnumberofextrasessionsisquitesmalland, sessionsonthelogle.itisworthnotingthatthe open-closesessionscanbesignicant. havebeenmadebynfstracesoastoproducean rithmsusedbynfstrace.whilesomeassumptions open-closesessionrecord,thisparticularsituation mayberesolvedwithamoresophisticatednfstrace Someoftheseproblemsarearesultofthealgo- algorithm. leisinuse.this,inturn,isimportantincalculatingtheamountoftimelesaresharedbetween usersand,inadistributedlesystem,betweensystantindeterminingtheamountoftimeaparticular Thedurationofanopen-closesessionisimportems.Figure7showsthatdurationofopen-closesessionsrecordedbyrpcspywillbelongerthanthose recordedbysnooper.thelongeropen-closesessions thatcausethedierencesinaveragedurationsare ofseparateopen-closesessionsbeinginterpretedas likelytobearesultoftransactionsthatarepart partofthesameopen-closesession. session.thesesituationsarerepresentedgraphically bedierentfromtheaveragelengthoftheopen-close NFStracmeansthatleadandlagtimes(timesin whichtheleisopenbutnooperationoccurs)will Additionally,thecalculationofdurationfrom % of open-close operations Cumulative percentage of open-close operations against duration snooper nfstrace 60 Figure7:Normalisedcumulativedistributionofthe 50 numberofopen-closesessionsversustheduration open-closesessionsforagivennumberofthosesessions.forexample,thesnoopertechniquerecords 20 that70%ofthesessionshaveadurationofabout Fromthisgraphwecandeducethelongestofthe 10 1ms 10ms 100ms 1s 10s 1min 10min 1Hr 10Hr Duration logarithmic. infigure6.theguresshowthattheblockoperationsuponwhichnfstrace'srecordwillbebased operationsinanopen-closesession. sferrateasmeasuredbysnooper,asperfigure4, withtheamountofdatanfstraceestimateswaspotentiallyavailabletothesystem(thesumofthesizes oflesaccessed).whilenotdirectlycomparable,it Figure8graphesacomparisonofthedata-tran- 100millisecondsorless.Note:thedurationaxisis maynotcorrespondwiththelogicalopenandclose andserver. accuracythetrendsofdatatransferbetweenclient isworthnotingthatthesumofthesizesoflesis abletogiveenoughinformationtoestimatewithfair ferred.itisimportanttonotethatonereasonthat open-closesessionsversustheamountofdatatrans- nfstracedierssosignicantlywithsnooperisthat nfstracewasunabletodetectthelargepercentage Figure9showsacumulativedistributionof 1Kbytewastransferred.Additionally,snooperresultsestimatethatfewerthan500oftheopen-close sessionstransferredoneorzerobytes,whereasnfstraceresultsestimatethosecircumstancesexisted ofopen-closesessionsduringwhichapproximately 80,750,900and1,100bytesisbecausethoseles largenumberofsessionstransferringapproximately formorethan1,000ofthesessionsitrecorded. Aprimaryreasonnfstracedoesnotrecordthe
15 FileSystem read /var/spool/mail sessiontype / snooper (00.24) (86.20)818(46.77) (01.65) 75(04.29) 61(03.49) nfstrace /usr/local /packages /usr (00.12) (01.96)100(05.72) /var/spool/mail 354 (63.55)476(59.20) (09.82)686(39.22) /usr (00.72) (35.73)321(39.93) 7(00.87) 9(00.51) read-write null / (100.00) 45 (10.82) (71.63) Table10:Abreakdownoftheopen-closesessionsofeachtype,breakdownisbythelesystemofthele. /var/spool/mail /usr (05.29) (12.26) - Valuesinparenthesesareeachlesystem'soperationsasapercentageoftheopen-closesessionsofthat type. - Open Open Open Read Read Block Read Block Read Block Read Read Close Block Read Read Open Write Block Write Read Close Block Read Write Close Close Block Write transactioneachblockaccesswillinvoke. Figure6:Severalopen-closesessionsasgeneratedbynfstracearecomparedwiththeactualopen-close sessionthatoccurred.theopen-closesessiongeneratedbynfstracedependsheavilyonthetypeofnfs Case 1 Case 2 Case 3 real nfstrace
16 Bytes transferred 20 Mbyte 15 Mbyte 10 Mbyte 5 Mbyte Data over day (10 minute samples) snooper read (data transfered) nfstrace read (filesize) 0 Mbyte 12 Mbyte 10 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day 8 Mbyte 6 Mbyte Figure8:Thesegraphscomparethetransferratemeasuredwithsnooper,tothetotalamountofdata 4 Mbyte 2 Mbyte ofthetrace. nfstracehascalculatedtheclienthashadaccesstoineachlefromwhichithasreaddata.asalow-order approximation,thesevaluesarecomparablegivingthesamecharacteristicsfordatautilisationovertime 0 Mbyte 11:00 13:00 15:00 17:00 19:00 21:00 23:00 01:00 03:00 05:00 07:00 09:00 11:00 Time of day Bytes transferred Data over day (10 minute samples) snooper write (data transferred) nfstrace write (filesize)
17 Cumulative number of open-close operations against data transferred snooper nfstrace Cumulative number of open-close operations against file size snooper nfstrace Number of open-close operations Figure9:Cumulativedistributionofthenumberof eachopen-closesession.fromthisgraphwecandeducetheamountofdatatransferredperopen-close open-closesessionsversusthedatatransferredfor sessionforagivennumberofthosesessions.for example,thesnoopertechniquerecordsthatover K 10K 100K 1M Data transferred (bytes) areinthecacheandnodataaretransferredbetween Note:thedatatransferredaxisislogarithmic. 7,000sessionstransferabout1,100bytesofdata. tualnumberofsessionsisgreatlyreduced). ofsnooperforothertransfervalues(eveniftheac- serverandclient.thisreasoningisstrengthenedby thefactthatnfstracegivestrendssimilartothose infigure10haveresultedfromnfstracebeingunabletointerpretfrequentaccessestolesofacertain Thedierencesbetweensnooperandnfstrace 1,100bytesinsize.Accessesofsuchlesaccount length,inparticular,leswhichare80,750,900and recordinganopen-closesessionforthem.thisresultsinanexaggerationinthegraphsforthenumberofopen-closesessionsforcommondata-transfeerbatedbytheinabilityofnfstracetorecordmany oftheopen-closesessionsinwhichnodatatransfer ismade. 5.7Lossesduetorpcspy Duringthisstudy,therecordingofallEthernettraf- ifweassumearatioofnfstonon-nfstracat cbytherpcspymachinewasnotpossible(aloss thetotalnfstransactionsfromtherecordedtrace, sionsforregularly-accessedlesbutnfstraceisnot foralargepercentageoftheoverallopen-closeses- andle-sizevalues.thissituationisprobablyexac- of1.5%wasrecorded).thisimpliesalossof0.6%of Number of open-close operations Figure10:Cumulativedistributionofthenumberof 4000 open-closesessionsversusthesizeoftheleaccessed 3000 ineachopen-closesession.fromthisgraphwecan sions.forexample,thesnoopertechniquerecords deducethemaximumsizeoflesopenedforeach open-closesessionforagivennumberofthoseses K 10K 100K 1M File (bytes) thatover7,000ofthesessionsaccesslescontaining islogarithmic. thesameratioaswasrecordedduringthetestingof lessthan1,100bytesofdata.note:thelesizeaxis sourceofpotentialerror,thisdatalossisovershadowedbytheerrorsintroducedbycertainaspectsof theoperationofnfstrace.whilethiserrorshould notbediscounted,itcanbeconsideredtohavelow 6overallsignicanceintheresults. Theprecedingresultsshowthat,whilethetwosets ofresultsarenotdirectlycomparable,nfstraceis ComparisonSummary rpcspynetworkpacketcapturemechanism.whilea abletomakearstorderapproximationofanumberofvaluestraditionallymeasuredbysystemssuch machineorthequantityofdatawritten.additionciselybynfstraceinthecurrentversion,couldpotentiallygiveaccurateenoughresultstobeabletberofcircumstancesincludingmeasuringthenum- replacesystemssuchassnooperoutrightinanum- assnoopersuchasthetotali/otransferredbya ally,otherestimatedvalues,whileestimatedimpre- comparedwithresultsfromsnooperrelatetothe crepanciesintheinterpretationbynfstracewhen oflesizecomparedwithlesaccessed.mostdisberofactiveuserspermachineorthedistribution
18 identicationofopen-closesessions.minimisation oftheseerrorswouldimprovetheestimationofboth open-closesessiondurationanddata-sizeresults. Anumberoftheresultscollectedbynfstrace arenotcomparablewiththosecollectedbysnooper, e.g.theamountofdatatransferred.whilevalues forthemaximumdatatransferredandwriteoperationscanbecomparable,valuesaectedbysignicantcaching(e.g.readingofdata,particularlysmall amountsrepeatedlyfromthesamele)willdiersignicantly. Inadditiontomeasurementswhichcanbecompared,theuniquenatureofbothsnooperandrpcspymeansthateachhasaccesstodierenttypes ofinformation.snooperisideallysuitedtorecordinginformationaboutprocesses,anareafromwhich networkmonitorsareunabletoretrieveinformation. Ontheotherhand,nfstraceisideallysuitedtocollectinginformationaboutallmachinesonaparticularnetworkincluding,forexample,allthetrac foraparticularserver.thesedierencesmeaneach techniquehasaroletofullbutthereiscertainly potentialfornetworkmonitoringtobeabletomake measurementsforwhichkernelinstrumentationhas traditionallybeenusedinthepast. Additionally,itisworthpointingoutthatthe informationrpcspygeneratesandthatnfstracein turnuses,isnotinerror.thedierencesbetween nfstraceoutputandthatofsnooperoccurbecause nfstraceattemptstoestimatetheoperationsonthe usersideofthecachefromtheoperationsthatoccur onthelesystemsideofthecache.improvements intheperformanceofnfstracewouldcomeabout fromimprovementsinthisestimationprocess. 7 rpcspy/nfstraceproblems Fornfstracetobeamoreusefultool,theaccuracy ofitsestimationsneedstobeimproved.therearea numberofareaswherenfstraceeithermakeserrors ordoesnothaveenoughinformationwithwhichto work. nfstraceproblemstobeaddressed: 1.nfstracetreatsthecreationofaleastwo separateopen-closesessions. 2.Underestimationofthenumberofopen-close sessions.thisalsomeansnfstracecanoverestimatethedatatransferredperopen-close session,particularlyinthecaseofwrites. 3.nfstraceisunabletoobservelogicaldata transfer. 4.nfstracehasnorecordofopen-closesessions thattransfernodataatthelogicallevel. 5.nfstracehasnorecordofopen-closesessions thatbothreadandwritedata. 6.Thenfstracemethodusedforsummationof readoperationsandwriteoperationscanresult intransferreddatanotbeingcounted. 7.Themethodusedforestimatingthepurposeof annfsgetattrtransactionissimplistic. 8.nfstracedoesnotestimatethecontentsofa clientcache.asaresultnfstracewillassume lesincachearebeingaccessedwhenthisis notthecase. 9.nfstraceisunabletodetectshortopen-close sessions. Toalargeextenttheseproblemsarealsoaresult ofnfsnotmakingenoughinformationavailablefor nfstracetobeabletoestimatetheoperationsthat areoccurring.thelackofdatasuppliedbynfsalso meansnfstraceactsasalterremovingshort,consecutive,open-closereadsessions.suchoperations areabsorbedbythecacheandasaresultne-grain sporadicoperationsaremissed. 8 Improvingrpcspyandnfstrace Improvementstorpcspywillbeachievedbyusingahigh-speedmachinewithahigh-speed,lowlossnetworkinterfacetobededicatedtothetaskof datacollection.theimprovementstonfstracecan notbestatedquiteasconcisely.smallerchangesto nfstraceinclude: addingtheabilitytointerpretothersignicant NFStransactionssuchascreate, usingasimpleratiomultipliertoobtainanestimateofdatatransfersatthelogicallevel,
19 modicationofnfstracetokeepinformation aboutletruncationgivingtheabilitytointerpretlere-writeevents separatelyrecordingdatareadfromandwrittentotheserverforallopen-closesessions, recordinginformationonwhichblocksofale havebeenaccessed,and interpretingnfsgetattrtransactionsthat immediatelyfollowalebeingreadorwritten asanotheropen-closesession. Whilesomeofthesechanges,suchasthelast itemlisted,wouldneedtobetestedtoensurethe resultingextrarecordswerecorrect,othersinthelist wouldgiveimmediateimprovementintheabilitiesof nfstrace. Moresignicantchangestonfstraceinclude pre-loadinginformationaboutprogramsthat causestatsystemcallssuchasls, buildablockcachesimulatorintonfstrace Inordertopre-loadinformationaboutcommonly-usedprogramsthatcausestatsystemcalls,it maybenecessarytoprolethesystempriortoany signicanttracingactivity.inmostsystems,commonly-usedprogramssuchaslscouldbeexpected togeneratepotentialproblemsandcouldbeadded bydefault.however,theneedtodoaprolingoperationwouldnotonlyincreasethecomplexityof passivenetworkmonitoringbutmightalsonegate anyadvantageofnetworkmonitoringbypotentially requiringaccesstothemachinebeingmonitored. Anotheralternative,oraddition,topre-loadedcon- gurationinformationisfornfstracetocharacteriseprogramssuchaslsasitprocessesthenfstransactiondata.nfstracewouldlocatelstype programsbynotingprogramswhich,onceexecuted, causedclustersofnfslookupandgetattrtransactions,typicallyforlessharingthesamesubdirectory.inthisway,nfstracewouldbesimultaneouslyprocessingthedataandgainingenough informationtolocateprogramscausingextraneous NFSgetattrtransactionsthusimprovingthepredictionoflstypeprogramsduringthecourseofthe runṫheincorporationofablock-cachesimulator intonfstraceoersthebestpotentialforincreasing theaccuracyofnfstrace.unfortunately,several signicantitemsofinformationwouldbeneededto recreateaccuratelytheblockcacheofaclient.these wouldincludethecachesizeontheclient,thenumberofcacheentriesandthesizeofthedatablocksbeingtransferredbetweenclientandserver.additionally,theprogrammingandtestingofacachesimulatorisnotasimpletaskandbecauseofresourcesused (memory,etc.)wouldpotentiallymeannfstrace couldnotberunsimultaneouslywithrpcspywhich isapreferredoperatingmode(inordertoreduce outputdata). Theadditionofthesimulatorwouldmeanthat nfstracewouldbeattemptingtomodelaparticulartypeofblockcache.whilethereisacommonancestryforthemethodusedbyblockcaches inunixanditsderivatives,therearenotabledifferences.theintroductionofsuchfacilitiesasthe demand-pagingofexecutablesaswellassubtlechangesinthecachesystemmeansthebehaviourofthe cachesofsystemsbeingmonitoredwilldier,sometimesdramatically.theresultisthatnfstracemay berequiredtoincorporatemodelsforseveraldierentblock-cachesystems.whilethiswouldaddto thecomplexityofnfstrace,thecommonancestry ofblockcachesmeansmuchofthecodeusedineach simulatorwouldbecommontoall.itisconceivable thatsuchannfstracecouldreadaconguration lecontaininginformationonwhichcachemethod eachclientwasusing.withoutappropriatecongurationinformation,nfstracecouldassumeaparticularmodel,perhapsthemostcommoncachemethod usedortheworst-casesimulatormodel. Suchapre-loadedcongurationlewouldalso containinformationaboutnfsparameterssuchas cacheandattributetimeouts,therebyincreasingthe accuracyofthesimulator.thisinformation,ona le-systembyle-systembasis,couldalsogiveinformationaboutthecharacteristicsofaccesstoale system,e.g.maillesystemscanpotentiallycause open-closesessionstobegeneratedwhennonewas, andsoon. Ablock-cachesimulatorwouldincreasetheaccuracyoftheopen-closesessionpredictionsnfstrace makesandallownfstracetobeusedforotherpurposes.nfstracehasthepotentialtosimultaneously simulatethecachesofallthemachinesonanetwork soitcouldbeusedtostudyinteractionsbetweenthe cachesofdierentmachines.forexample,suchafacilitywouldenableacomprehensivestudyofblock
20 sharingamongnfsclients. Anextensiontonfstracewouldenableittokeep trackofinformationaboutthedirectorysystemsin adistributedlesystem.modicationstodirectory informationarewrittensynchronouslybacktothe serverasthemodicationstakeplacebutthedirectoryinformationitselfiscachedontheclients.becausechangesarewrittensynchronously,itispossiblefornfstracetomaintainanaccuratesimulationofthestateofthelesystem.additionally, nfstracecouldincorporateadirectory-namecache simulatorinthesamestyleasablock-cachesimulatorandbeabletosimulatethecontentsofthiscache amongmanyclients.asinthecaseofablock-cache simulator,adirectory-namecachesimulatorwould enablenfstracetobeusedtostudyinteractionsbetweenthecachesoftheclientsandtrackthehistory ofchangestothelesystem.theuseofsuchamodi- cationmayenableafollow-upstudytoshirriand Ousterhout'sworkonnameandattributecaching ([26]). Manyofthelimitationsinnfstrace,indeed,the veryneedfornfstracetohavetoestimateopenclosesessions,arecausedbythefactthatthisinformationaboutopenorcloseisnottransmittedinthe NFSprotocol.Otherdistributed-systemprotocols, suchassprite[19]andtheandrewfilesystem[12], transmitinformationrelatedtothestateoflesin thedistributedlesystem.ifnfstracewasmodi- edtoworkwithsuchastate-orientateddistributed system,theaccuracyofnfstraceoutputcouldpotentiallybeashighasafullkernelinstrumentation trace.thepotentialforaccuraterpcspy/nfstrace analysisofdistributedsystemsshouldalsoholdtrue foranydistributedlesystemthattransmitsenough stateinformationacrossthenetwork.thismethod evenhasthepotentialtoworkontheoreticaldistributedlesystems,suchasxfs[36,9],whichdepartfromacentralleservermodelcompletely.it isconceivablethatduringthedevelopmentofsuch monitoringsystems,methodsbasedonthepassive monitoringofnetworktracwouldbecomeaprimarytoolforassistinginthedevelopmentandultimatelythemanagementofsuchsystems. Anothertechniqueforincreasingtheaccuracyof nfstraceistoaddsimulatedstateoperationsto NFS.Thiswouldinvolvemodifyingthekernelof eachclienttooutputextranfstransactionsforsystemcallssuchasopen,closeandseek.itwould notbenecessaryfortheservertoactonoreven acknowledgethesecallsbutthetransmissionofthe extrainformationthroughthenetworkwouldpotentiallygivenfstraceenoughinformationtobeable toestablishwhenleswereopenedandclosed.of course,suchmodicationsarecontrarytomanyof theconceptsofpassivenetworkmonitoring,requiringmodicationstoperhapsmanyclientmachines. However,thistechniquewouldmaintainthebenet thatthecollectionofthetracedatawouldbeindependentoftheserverandclients.itwouldimpose noextraworkloaddirectlyuponthem.thismethod ofaddingadditionalinformationtothecommunicationstracbetweenclientandserver,forthepurposesofmonitoring,wasusedinbakeretal.[2]as oneofanumberofmodicationstheymadetocollectdatafortheirwork. Distributedcomputersystemsdonotconsist solelyofdistributedlesystems.systemsinthe styleofsprite[19]andamoeba[30]enablethemigrationofprocessesamongcpuelements(typically acpuelementisacomputerworkstation).amonitoringmethodforsuchasystemmightinvolvemonitoringthenetwork'sinterconnectingprocessingelementsandtrackingthemovementoftheprocessesin thesamewaythatnfstracemonitorsthemovement ofledataamongworkstations.inthisway,passive networkmonitoringhaspossibleapplicationsinareasotherthanjustthemonitoringofdistributedle systems. 9 Summarycomments Systemmonitoringhasasignicantroleinthedevelopmentofcomputersystems. Acommonmethodofmonitoringsystemsisto usefullkernelinstrumentation,involvingthemodi- cationofthesource-codefortheoperatingsystem ofthemachine.passivenetworkmonitoringcanbea preferredchoiceoverkernelinstrumentationforcertainsystemmonitoringwork,particularlywherethe source-codeoftheoperatingsystemisnotavailable. Additionally,otheradvantagesofpassivenetwork monitoringinclude: anindependenceofthecollectionofresults fromthemachinesbeingmonitoredonthenetwork, theabilitytomonitorsimultaneouslymultiple machinesonanetwork;thepassivenetwork
athesissubmittedinfulfillmentofthe requirementsforthedegreeof
AComparisonofPassiveNetworkMonitoringwithFull OperatingSystemandFileSystemMonitoring: KernelInstrumentationTechniques AndrewW.Moore by athesissubmittedinfulfillmentofthe requirementsforthedegreeof departmentofroboticsanddigitaltechnology
More informationshort introduction to linux high availability description of problem and solution possibilities linux tools
High Availability with Linux / Hepix October 2004 Karin Miers 1 High Availability with Linux Using DRBD and Heartbeat short introduction to linux high availability description of problem and solution possibilities
More informationCS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
More informationMeasuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
More informationStateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
More informationChapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
More informationBinding IP Addresses To Physical Hardware Addresses
Binding IP Addresses To Physical Hardware Addresses Must use physical addresses to send and receive packets Therefore, must map IP addresses to physical addresses Particular method depends on underlying
More informationHow To Write A Boot(Ing) Protocol On A Microsoft Ipnet (Net) (Netnet) On A Network (Ipnet) With A Network Address) (Ip Address) On An Ip Address (Ipaddress) On Your Ip
Boot(ing) protocols From (R)ARP to BSDP dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 12, 2008 dr. C. P. J. Koymans (UvA) Boot(ing) protocols September 12, 2008 1 / 25 ARP
More informationNew OBD Smart PC Tool User Manual
New OBD Smart PC Tool User Manual V0.6 2013-07-30 1 / 16 Catalogue I Installation... 3 II Configuration... 3 2.1 Main interface... 4 2.2 Alarms... 6 2.3 Network... 8 2.4 Regular Report... 9 2.5 Others...
More informationFlexi Soft Ethernet IP: Implicit Messaging with a Omron PLC
O N L I N E - H E L P Flexi Soft Ethernet IP: Implicit Messaging with a Omron PLC s GB Online Help This document is protected by the law of copyright, whereby all rights established therein remain with
More informationWe mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
More informationKVM PERFORMANCE IMPROVEMENTS AND OPTIMIZATIONS. Mark Wagner Principal SW Engineer, Red Hat August 14, 2011
KVM PERFORMANCE IMPROVEMENTS AND OPTIMIZATIONS Mark Wagner Principal SW Engineer, Red Hat August 14, 2011 1 Overview Discuss a range of topics about KVM performance How to improve out of the box experience
More informationChapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
More informationNFS Tracing By Passive Network Monitoring
NFS Tracing By Passive Network Monitoring Matt Blaze Department of Computer Science Princeton University mab@cs.princeton.edu ABSTRACT Traces of filesystem activity have proven to be useful for a wide
More informationLast Class: Communication in Distributed Systems. Today: Remote Procedure Calls
Last Class: Communication in Distributed Systems Structured or unstructured? Addressing? Blocking/non-blocking? Buffered or unbuffered? Reliable or unreliable? Server architecture Scalability Push or pull?
More informationComputer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
More informationSecure Web. Hardware Sizing Guide
Secure Web Hardware Sizing Guide Table of Contents 1. Introduction... 1 2. Sizing Guide... 2 3. CPU... 3 3.1. Measurement... 3 4. RAM... 5 4.1. Measurement... 6 5. Harddisk... 7 5.1. Mesurement of disk
More informationConfiguring Simulator 3 for IP
Configuring Simulator 3 for IP Application Note AN405 Revision v1.0 August 2012 AN405 Configuring Simulator 3 for IP 1 Overview This Application Note is designed to help to configure a Sim 3 to run in
More informationDistributed File Systems
Distributed File Systems 1 Topics Introduction File Service Architecture DFS: Case Studies Case Study: Sun NFS Case Study: Hadoop HDFS 2 Introduction File system were originally developed for centralized
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationImproving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
More informationWhat TCP/IP Protocol Headers Can Tell Us About the Web
at Chapel Hill What TCP/IP Protocol Headers Can Tell Us About the Web Félix Hernández Campos F. Donelson Smith Kevin Jeffay David Ott SIGMETRICS, June 2001 Motivation Traffic Modeling and Characterization
More informationLarge Scale Storage. Orlando Richards, Information Services orlando.richards@ed.ac.uk. LCFG Users Day, University of Edinburgh 18 th January 2013
Large Scale Storage Orlando Richards, Information Services orlando.richards@ed.ac.uk LCFG Users Day, University of Edinburgh 18 th January 2013 Overview My history of storage services What is (and is not)
More information20 Command Line Tools to Monitor Linux Performance
20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System
More informationeztcp Technical Document Modbus/TCP of eztcp Caution: Specifications of this document may be changed without prior notice for improvement.
eztcp Technical Document Modbus/TCP of eztcp Version 1.3 Caution: Specifications of this document may be changed without prior notice for improvement. Sollae Systems Co., Ltd. http://www.sollae.co.kr Contents
More informationMidterm II SOLUTIONS December 4 th, 2006 CS162: Operating Systems and Systems Programming
Fall 2006 University of California, Berkeley College of Engineering Computer Science Division EECS Midterm II SOLUTIONS December 4 th, 2006 CS162: Operating Systems and Systems Programming John Kubiatowicz
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationConfiguring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
More informationSecurity threats and network. Software firewall. Hardware firewall. Firewalls
Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of
More informationVirtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant Laurak@aesclever.com Applied Expert Systems, Inc. 2011 1 Background
More informationPresentation of Diagnosing performance overheads in the Xen virtual machine environment
Presentation of Diagnosing performance overheads in the Xen virtual machine environment September 26, 2005 Framework Using to fix the Network Anomaly Xen Network Performance Test Using Outline 1 Introduction
More informationLecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
More informationAppendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
More informationSmall is Better: Avoiding Latency Traps in Virtualized DataCenters
Small is Better: Avoiding Latency Traps in Virtualized DataCenters SOCC 2013 Yunjing Xu, Michael Bailey, Brian Noble, Farnam Jahanian University of Michigan 1 Outline Introduction Related Work Source of
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationDistributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
More informationChapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationNetwork File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
More informationCOSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
More informationDigi Cellular Application Guide Using Digi Surelink
Introduction Digi s SureLink is a mechanism to help maintain persistent wireless connections. It contains four main components: 1. Mobile Link Rx Inactivity Timer 2. SureLink Settings - Hardware Reset
More informationAdministrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.edu Lab Jaringan Komputer (C-307) Table of
More informationD1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,
More informationSet Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationAnalysisofTCPPerformanceoverMobileAdHocNetworks. fgholland,vaidyag@cs.tamu.edu. OurresearchisfocusedontheperformanceofTCP. overmobileadhocnetworks.
AnalysisofTCPPerformanceoverMobileAdHocNetworks GavinHollandandNitinVaidya DepartmentofComputerScience TexasA&MUniversity,CollegeStation,TX77843-3112 fgholland,vaidyag@cs.tamu.edu Abstract Mobileadhocnetworkshavegainedalotofattention
More informationPre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
More informationConfiguring IP to Serial with Auto Answer and Serial to IP
Configuring IP to Serial with Auto Answer and Serial to IP You can configure the AirLink device to: Auto answer incoming TCP/IP or UDP/IP connections and send the packet payload out the AirLink device
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More information2 Purpose. 3 Hardware enablement 4 System tools 5 General features. www.redhat.com
A Technical Introduction to Red Hat Enterprise Linux 5.4 The Enterprise LINUX Team 2 Purpose 3 Systems Enablement 3 Hardware enablement 4 System tools 5 General features 6 Virtualization 7 Conclusion www.redhat.com
More informationSchool of Information Science (IS 2935 Introduction to Computer Security, 2003)
Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack
More informationOPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
More informationMONITORING PERFORMANCE IN WINDOWS 7
MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance
More informationWireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University
Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: meeran@tlu.ee February 2014 What is wireless mesh networks?
More informationTSX ETY 110 Module 8
Module 8 Introduction Subject of this chapter What s in this Chapter? This chapter describes the implementation of a TSX ETY 110 module. This chapter contains the following sections: Section Topic Page
More informationLoad Balancing - Single Multipath Route HOWTO
Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing
More informationi.mx28 Ethernet Performance on Linux
Freescale Semiconductor Document Number:AN4544 Application Note Rev. 0, 6/2012 i.mx28 Ethernet Performance on Linux 1 Introduction The aim of this document is to show how to measure the ENET "Ethernet
More informationStateful Inspection Technology
White Paper Stateful Inspection Technology The industry standard for enterprise-class network security solutions Check Point protects every part of your network perimeter, internal, Web to keep your information
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationThe Performance Analysis of Linux Networking Packet Receiving
The Performance Analysis of Linux Networking Packet Receiving Wenji Wu, Matt Crawford Fermilab CHEP 2006 wenji@fnal.gov, crawdad@fnal.gov Topics Background Problems Linux Packet Receiving Process NIC &
More informationPrintFleet Enterprise Security Overview
PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary
More informationPERFORMANCE TUNING ORACLE RAC ON LINUX
PERFORMANCE TUNING ORACLE RAC ON LINUX By: Edward Whalen Performance Tuning Corporation INTRODUCTION Performance tuning is an integral part of the maintenance and administration of the Oracle database
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationAIX NFS Client Performance Improvements for Databases on NAS
AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. gulabani@netapp.com Diane Flemming Advisory Software Engineer
More informationLocal Storage for Video Archives Using iscsi
Contents Disk Space Requirements 2 Archive Retention and Storage Requirements 2 VMSS Network Module 3 Deployment Topology 4 Installation and Configuration of iscsi Server 5 Sample Branch Router iscsi Configuration
More informationWhite Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio Environment Variables Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered
More informationTFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
More informationBuilding a Linux Cluster
Building a Linux Cluster CUG Conference May 21-25, 2001 by Cary Whitney Clwhitney@lbl.gov Outline What is PDSF and a little about its history. Growth problems and solutions. Storage Network Hardware Administration
More informationStateless Packet Filtering Firewall on the NIC & Address Based Filtering
Since the days of medieval castle design, architects have cleverly engineered concentric defensive layers along with traps, to thwart attackers, and protect the strong hold. Today many people still believe
More informationChoices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols!
Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols! Focus & contents of this talk Why SMB 3? How SMB 3? Implementing an SMB 3 Server on Linux/UNIX
More informationIntroduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline
Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May
More informationHomework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
More informationEfficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
More informationSPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks
SPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks Xiaonan Ma Texas A & M University xiaonan@ee.tamu.edu A. L. Narasimha Reddy Texas A & M University reddy@ee.tamu.edu
More informationPolicy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
More informationDomain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationEffects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,dovrolis@cc.gatech.edu Abstract. Several
More informationNetwork File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr
Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
More informationSolution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
More informationRed Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationPerformance and Bandwidth Testing for Data Circuits
Performance and Bandwidth Testing for Data Circuits In some cases, customers report that they are experiencing slower than expected data connections. These can be caused by any number of factors, including
More informationEasy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1
More informationLab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
More informationThe Performance of a Linux NFS Implementation. Christopher M. Boumenot
The Performance of a Linux NFS Implementation by Christopher M. Boumenot A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree
More informationNetwork Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India navi@iitk.ac.in Megha Jain, Payas
More informationWe will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
More informationMonitoring Quality Virtual Desktop
Monitoring Quality Virtual Desktop eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationSeparating Data and Control Transfer in Distributed Operating Systems
Separating Data and Control Transfer in Distributed Operating Systems Chandramohan A. Thekkath, Henry M. Levy, and Edward D. Lazowska Department of Computer Science and Engineering University of Washington
More informationNetwork-based Modeling of Assets and Malicious Actors
Network-based Modeling of Assets and Malicious Actors Christopher Kruegel Computer Security Group MURI Meeting Santa Barbara, August 23-24, 2010 Motivation Thrust I: Obtaining an up-to-date view of the
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationCisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
More informationWAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
More informationUsing a Generic Plug and Play Performance Monitor for SoC Verification
Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why
More informationConfiguring Secure Linux Hosts
A Perspective on Practical Security 2005 by Landon Curt Noll BOSTON NEW YORK SAN FRANCISCO SACRAMENTO CHARLOTTE WASHINGTON DC Introduction Congratulations! You have just installed Linux; an Open Source
More informationStorage benchmarking cookbook
Storage benchmarking cookbook How to perform solid storage performance measurements Stijn Eeckhaut Stijn De Smet, Brecht Vermeulen, Piet Demeester The situation today: storage systems can be very complex
More informationDecember 1998 Part Number: AR-400-AGV2-01.PDF
December 1998 Part Number: AR-400-AGV2-01.PDF 1991 1998 by Remedy Corporation. All rights reserved. This documentation may not be copied in whole or in part without the prior written consent of Remedy
More informationChapter 7 Troubleshooting
Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and
More informationACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER
User s Guide PMCM-ETHCC-0208 2/2008 ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER TABLE OF CONTENTS INTRODUCTION... 2 Supported Ethernet Protocols... 2 Hardware... 2 Meter Firmware...
More informationand reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
More information