AN AIR TRAFFIC MANAGEMENT (ATM) SYSTEM PERFORMANCE MODEL ETMS
|
|
|
- Godfrey Hamilton
- 10 years ago
- Views:
Transcription
1 AN AIR TRAFFIC NAGEMENT (ATM) SYSTEM PERFORNCE MODEL Edward J. Modzelesky, Tejal Topiwala, Sarah E. Stalnaker, Michael A. Hermes, The MITRE Corporation, McLean, VA Abstract In this paper, we discuss our approach in developing a system performance model of the Enhanced Traffic Management System (ETMS), which is a part of the Federal Aviation Administration s (FAA s) Air Traffic Management (ATM) system. The ETMS, developed and operated at the Volpe National Transportation Systems Center, is a complex system with a centralized processing architecture and a geographically wide data distribution system. The model we are presenting here is being developed using QASE, a Commercial-Off-The-Shelf (COTS), systems engineering tool. The model predicts the system performance of ETMS (e.g., server utilization, network utilization, and response time) if potential hardware, software, communications, and workload changes are implemented. Keywords Modeling, performance, system engineering, simulation, ETMS, ATM, ATC, QASE Background The role of traffic management is becoming more important in the FAA s overall strategy to cope with increasing air traffic. As a result, a number of functional and infrastructure enhancements are planned for the ETMS. Currently, decision-makers must, however, authorize changes to ETMS with little or no quantitative data on the impact these changes will have on system performance. For instance, when decisions to implement software changes are made, it is not clear if hardware and communications upgrades are needed to support the software changes. With a model, the impact of software changes can be estimated by modeling the software components; executing simulation runs; and monitoring server utilization, network utilization, and response time. Areas of risk or even potential failure may be discovered. Furthermore, the hardware and communications upgrades can be modeled to determine if they are sufficient and by how much. Finally, the software changes can be modeled with different implementation options. For instance, the software can be allocated to different processors or modeled to execute different data flows. The model can thus provide a useful, quantitative what-if analysis capability. ETMS The ETMS acquires airspace, flight intent and position, and Traffic Flow Management (TFM) data from across the U.S., Canada, England, and soon Mexico. The system integrates all of these data into a national picture of aviation activity and then redistributes this information to FAA facilities, National Airspace Users, and International Air Traffic Management facilities. The ETMS is composed of two major subsystems: the ETMS Hub and the ETMS Field Site. The ETMS Hub, the system's main computing and communications complex, is located in Cambridge,. The ETMS Field Sites, each consisting of a File server for local and Hub data acquisition and processing and multiple Workstations for graphic display and human interface, are located at over 80 FAA facilities. The ETMS has a centralized architecture the ETMS Hub acquires data, performs processing and forwards data for display at the Workstations. The ETMS Hub uses flight intent information to predict the number of aircraft that will arrive at airports, depart from airports, and occupy adapted volumes 1
2 of airspace for 15-minute intervals over the next several hours. If the predicted traffic counts exceed adapted thresholds, an alert is generated. The prediction of traffic counts and the generation of alerts are a part of the Monitor Alert capability. The ETMS Hub provides flight data, weather data, and Monitor Alert data to the Field Sites for display at the Workstations. Figure 1 provides a high level data flow for the ETMS. Flight Data, Weather Data Traffic Count Data (Monitor Alert Data) ETMS HUB FCA List Request File Server Workstation FCA List Response Evaluate Reroute Impact Request Evaluate Reroute Impact Response ETMS Field Site Figure 1. ETMS Data Flow The ETMS Hub and the ETMS Field Sites are connected via a partially meshed, hierarchical FAA network that guarantees 256 kbps of bandwidth between the ETMS Hub and each of the ETMS Field Sites. The FAA has decided to add two new capabilities Flow Constrained Area (FCA) processing and Reroute processing - to the ETMS. The FCA capability allows the traffic manager to define an area around severe weather or congested area and to determine the flights that will traverse the defined area (via the FCA List Request). The Rerouting capability allows the traffic manager to develop a plan to reroute flights around severe weather and to determine the impact on traffic counts (via the Evaluate Reroute Impact Request) before actually rerouting any flights. Approach In developing the system performance model, we followed a spiral development cycle. We first concentrated on building the hardware components and then added the software components. We ran experiments and monitored system performance attributes of interest. As better information became available, we incorporated it into the model and again ran appropriate experiments, continuing to refine model components and experiments. Model Design Our first step was to determine a useful model abstraction level. Initially, we wanted to model the ETMS Hub and the multiple ETMS Field Sites, but we quickly realized that the simulation runs would take too long. Instead, we decided to just model the ETMS Hub, a single ETMS Field Site, and the Wide Area Network (WAN) connecting the two sites. This is acceptable since the data flow from 2
3 the ETMS Hub to each ETMS Field Site is nearly identical. The ETMS Hub and the network, however, do handle loading from all of the ETMS Field Sites. In order to represent the workload imposed by the ETMS Field Sites that were not explicitly modeled, we injected workload directly into the ETMS Hub servers. In addition, the workload from external sources is also injected directly into the ETMS Hub servers. In order to simplify the modeling of the software, we did not include the following processing in the model: Initialization Processing: Initialization processing of the system and individual processes is not modeled. Generation and maintenance of recovery data: For instance, the primary copy of a software unit transmits data to its backup copy. The generation, transmission, and maintenance of this recovery data is not modeled. Failure and recovery processing: If a software unit determines that its database is not current, it will recover data from another database. The generation and transmission of this recovery data is not modeled. We also decided that the model should be developed in two major phases. In the first phase, the model should reflect ETMS prior to integrating FCA and Rerouting. In the second phase, the components necessary to model FCA and Rerouting capabilities should be added. Our next step was to understand what information was needed in order to develop the hardware and software components of the model. The hardware components require a hardware architecture and the specification details for processors (type, speed, operating system), storage devices (type, transfer speed), and communication devices (type, protocol, packet size, transfer speed). Figure 2 illustrates the hardware architecture of the model. The key model inputs are as follows: ETMS Hub Server -- HP-K570, 150 million instructions per second (MIPS), HP-UNIX Edge Router-- Cisco7206, 10MIPS, Cisco Integrated Operating System (IOS) Hub Site Router -- Cisco 8510, 100MIPS, IOS Autonomous System (AS) Border Router -- Cisco 7513, 50MIPS, IOS Network Node Router -- Integrated Digital Network Exchange (IDNX), 25MIPS, IOS Hub Communications Processor -- HP- C360, 90MIPS, HP-UNIX File Server, Workstation -- HP-C360, 90MIPS, HP-UNIX Wide Area Network link kilo-bits per second (Kbps) 3
4 Workstation Hub Server Hub Site Router ETMS HUB SITE WAN File Server Edge Router Comm Processor Edge Router AS Border Router Network Node Router Figure 2. Hardware Architecture The software components consist of an execution flow for each major processing thread and the workload for each execution flow. At a high level, an execution flow is a sequence of functions that must be performed on the stimuli (or workload) that enter the system. For example, in Figure 3, the execution flow contains Functions A, B, C, and D. These Functions are connected by Flow Connectors F1, F2, F3, and F4. A Function specifies the processing that must be performed on stimuli. For instance, Function C specifies that for each stimuli, a database is accessed and a set of x instructions are executed. Note that an adapted number of instructions are executed for each database access. In addition, the input/output access times are modeled. The Flow Connectors F1, F2, F3, and F4 specify the probability that the stimuli will traverse its path and size of data. Note that in this example, Functions A, B, and C are allocated to processor 1 and Function D is allocated to processor 2. Each of the stimuli will incur a load on each processor and communication device between processor 1 and 2. The key execution flows modeled for the ETMS include the following: Flight Data Monitor Alert Weather Data List Request Airport Demand List (ADL) Flow Constrained Area (FCA) Reroute 4
5 Function B Stimuli Processor 1 F3 Function A F1 Function D Processor 1 F2 Processor 2 Function C Processor 1 F4 Access Database I/O Access Time Function Size - Execute x instructions Figure 3. Execution Flow Key Information Sources The key information sources that we used to model the hardware components, software components, and new software components are identified. In many cases, we estimated the input. Hardware Components No formal architecture or hardware documents were available. We were, however, able to piece together the hardware architecture based on various informal documents, even though they were incomplete and inconsistent with each other. We were able to verify our findings with test experts at the FAA's William J. Hughes Technical Center (WJHTC) and with a communications expert at the Volpe National Transportation Systems Center. In addition, the test experts were able to provide the necessary details of the processors and communication devices. Software Components Execution Flows We used the ETMS Software Design Document, the ETMS Functional Description Document, and an ETMS Version Design Document to develop the execution flows. Workload We were able to obtain and analyze archives of data received at an ETMS Field Site from the Hub Server. We used this data to estimate the workload into the Hub Server and into the WAN. Function Size - Because we did not have access to the source code, we were not able to use a profiler tool to determine the number of instruction per input type. For the ETMS Hub Server, we were able to use a Hewlett-Packard (HP)-Openview client process called Measure Ware Agent (MWA) to collect process utilization data on 1- minute intervals as the system normally processed input. A process is a software unit that can contain processing for multiple input types. We used the collected MWA data along with our estimate of the workload into the Hub Server to estimate the number of instructions executed per input type. 5
6 For the File Server, we estimated the function sizes based on the design. For the Workstation, we used the processor speed and the time to bring up a display (measured using a stopwatch) to determine the number of instructions that are executed to bring up a display. I/O Access Times We obtained sample data from the WJHTC that indicated that disk access times are frequently 5-6 seconds. Our understanding is that it is the communications protocol used to access the databases (which are in virtual memory) and not the database search algorithms that take up much of 5-6 seconds. We will incorporate measured disk access times into the model when we have more complete data. New Software Components We used the FCA Design Document to develop the FCA Execution Flow. We derived a design for the Reroute capability and then developed the Reroute Execution Flow based on the design. We estimated the workload and function sizes for FCA and Reroute capabilities. We were able to obtain process CPU data for FCA and Reroute capabilities that have been implemented in a prototype and used this data to sanity check our model predictions. Results Figures 4 and 5 show predicted WAN Link utilization in going from generating and distributing traffic counts or Monitor Alerts once every 5 minutes to once every minute. The Monitor Alert () files contain 50 KB of data. Note the reduction in spare WAN capacity. This analysis was a factor in our customer s decision to increase the frequency of Monitor Alert processing less aggressively, at least initially. Figure 4. WAN Link Utilization with 5 Min Monitor Alert () 6
7 Figure 5. WAN Link Utilization with 1 Min Monitor Alert () Figures 6 and 7 show the predicted impact to Hub Server utilization to process FCA List Requests and Evaluate Reroute Impact Requests. In Figure 6, the Hub Server is modeled with a 120 MIPS machine. In Figure 7, the Hub Server is modeled with a 150 MIPS machine. Note the small but significant reduction in the Hub Server s peak utilization in Figure 7 versus Figure 6. The ETMS Hub Server was recently upgraded to 150 MIPS. Figure 8 shows the end-to-end response time for executing the Evaluate Reroute Impact Request as a function of Disk Access time. In order to process the Evaluate Reroute Impact Request, the Hub Server needs to access the disk multiple times. Since we currently do not have good data for disk access times, we modeled a range for disk access times from 0 milliseconds to 50 milliseconds. If a disk access time of 50 milliseconds is used, it may take over 35 seconds for a traffic manager to see the results of an Evaluate Reroute Impact Request. Conclusion Our approach to modeling the ETMS has been to use a model abstraction level that allows us to avoid modeling unnecessary details but still provides us insight into system performance. We have followed a spiral development cycle, adding and refining model components, executing simulations, and analyzing results. We have used many sources to acquire the necessary data to develop the model components. A key benefit of the model is that it is a compilation of system information in one place. Initial results indicate that the model can identify potential performance and capacity risks (or the lack thereof) with a selected implementation option. The customer has already noted the usefulness of the Monitor Alert analysis (see Figures 4 and 5). Further work is being planned to increase the model fidelity and to validate its predictions so that the model can more effectively support decision-makers. 7
8 Reroute FCA FCA Figure 6. HUB Server Utilization (Hub Server 120 MIPS) Reroute FCA FCA Figure 7. HUB Server Utilization (Hub Server 150 MIPS) 8
9 Disk Access Times ( msec ) Figure 8. Response Time for Evaluate Reroute Impact 9
Application Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
features at a glance
hp availability stats and performance software network and system monitoring for hp NonStop servers a product description from hp features at a glance Online monitoring of object status and performance
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com [email protected]
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
HP Client Manager 6.1
HP Client Manager 6.1 Introduction... 2 New Features in HPCM 6.1... 4 Understanding how HPCM works... 6 Extensive reporting capability... 7 HPCM in operation... 7 Client inventory... 7 Health monitoring...
Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
HP Client Manager 6.2
HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
ATFM STATUS REPORT: SOUTH AFRICA
Central Airspace Management Unit ATFM STATUS REPORT: SOUTH AFRICA Presented by: Sandile L Maphanga Manager: Central Airspace management Unit SCOPE Company Profile Area of Responsibility South African Airspace
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
pc resource monitoring and performance advisor
pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
ΤΕΙ Κρήτης, Παράρτηµα Χανίων
ΤΕΙ Κρήτης, Παράρτηµα Χανίων ΠΣΕ, Τµήµα Τηλεπικοινωνιών & ικτύων Η/Υ Εργαστήριο ιαδίκτυα & Ενδοδίκτυα Η/Υ Modeling Wide Area Networks (WANs) ρ Θεοδώρου Παύλος Χανιά 2003 8. Modeling Wide Area Networks
Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise
Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Introducing Unisys All in One software based weather platform designed to reduce server space, streamline operations, consolidate
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
The OSI Network Management Model - Capacity and performance management
Edith Cowan University Research Online ECU Publications Pre. 2011 2008 The OSI Network Management Model - Capacity and performance management Chompu Nuangjamnong Edith Cowan University Stanislaw P. Maj
A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY
51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies
Accelerate Private Clouds with an Optimized Network
Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
System Infrastructure Non-Functional Requirements Related Item List
System Infrastructure Non-Functional Requirements Related Item List April 2013 Information-Technology Promotion Agency, Japan Software Engineering Center Copyright 2010 IPA [Usage conditions] 1. The copyright
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Grid Scheduling Dictionary of Terms and Keywords
Grid Scheduling Dictionary Working Group M. Roehrig, Sandia National Laboratories W. Ziegler, Fraunhofer-Institute for Algorithms and Scientific Computing Document: Category: Informational June 2002 Status
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:
Performance Testing Definition: Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program or device. This process can involve
Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0
Muse Server Sizing 18 June 2012 Document Version 0.0.1.9 Muse 2.7.0.0 Notice No part of this publication may be reproduced stored in a retrieval system, or transmitted, in any form or by any means, without
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
Stratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Deduplication and Beyond: Optimizing Performance for Backup and Recovery
Beyond: Optimizing Gartner clients using deduplication for backups typically report seven times to 25 times the reductions (7:1 to 25:1) in the size of their data, and sometimes higher than 100:1 for file
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
Cisco Active Network Abstraction 4.0
Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Virtualizing Exchange
Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Distributed applications monitoring at system and network level
Distributed applications monitoring at system and network level Monarc Collaboration 1 Abstract Most of the distributed applications are presently based on architectural models that don t involve real-time
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
MANAGEX 4.23 ACTIVE DIRECTORY SERVICES Policies & Reports
MANAGEX 4.23 ACTIVE DIRECTORY SERVICES Policies & Reports MANAGEX 4.23 ACTIVE DIRECTORY SERVICE REPORTS & POLICIES NOTICE Hewlett-Packard makes no warranty of any kind with regard to this material, including,
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
Making Sense of Broadband Performance Never Mind the Connection Speed, Measure the Connection Consistency!
Making Sense of Broadband Performance Never Mind the Connection Speed, Measure the Connection Consistency! In today s Internet world dominated by on-demand Voice, Video and IP-TV, the key to good connection
Backbone Capacity Planning Methodology and Process
Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
The Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Using Synology SSD Technology to Enhance System Performance Synology Inc.
Using Synology SSD Technology to Enhance System Performance Synology Inc. Synology_WP_ 20121112 Table of Contents Chapter 1: Enterprise Challenges and SSD Cache as Solution Enterprise Challenges... 3 SSD
Capacity Plan. Template. Version X.x October 11, 2012
Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business
Don t be duped by dedupe - Modern Data Deduplication with Arcserve UDP
Don t be duped by dedupe - Modern Data Deduplication with Arcserve UDP by Christophe Bertrand, VP of Product Marketing Too much data, not enough time, not enough storage space, and not enough budget, sound
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Cisco Dynamic Workload Scaling Solution
Cisco Dynamic Workload Scaling Solution What You Will Learn Cisco Application Control Engine (ACE), along with Cisco Nexus 7000 Series Switches and VMware vcenter, provides a complete solution for dynamic
Detailed Lab Report DR101115D. Citrix XenDesktop 4 vs. VMware View 4 using Citrix Branch Repeater and Riverbed Steelhead
Detailed Lab Report Citrix XenDesktop 4 vs. VMware View 4 using Citrix Branch Repeater and Riverbed Steelhead February 11, 2011 Miercom www.miercom.com Table of Contents 1.0 Executive Summary... 3 2.0
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Hardware Configuration Guide
Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
How To Test For Performance
: Roles, Activities, and QA Inclusion Michael Lawler NueVista Group 1 Today s Agenda Outline the components of a performance test and considerations Discuss various roles, tasks, and activities Review
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Application of Predictive Analytics for Better Alignment of Business and IT
Application of Predictive Analytics for Better Alignment of Business and IT Boris Zibitsker, PhD [email protected] July 25, 2014 Big Data Summit - Riga, Latvia About the Presenter Boris Zibitsker
Improving availability with virtualization technology
Improving availability with virtualization technology Renata Budko Solutions Marketing Manager VMware, Inc Why focus on business continuity In the previous years backup & recovery was best effort Today
Enterprise Application Monitoring with
Enterprise Application Monitoring with 11/10/2007 Presented by James Peel [email protected] / www.altinity.com 1 Who am I? James Peel - [email protected] Job: Managing Director of Altinity
Using Multipathing Technology to Achieve a High Availability Solution
Using Multipathing Technology to Achieve a High Availability Solution Table of Contents Introduction...3 Multipathing Technology...3 Multipathing I/O Implementations...5 Storage Redundancy...5 Infortrend
Introduction to Networks
www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
