Application Performance Index Apdex Final Technical Specification
|
|
|
- Derek Dalton
- 10 years ago
- Views:
Transcription
1 Application Performance Index Apdex Final Technical Specification Peter Sevcik, NetForecast, Inc. Published by the Apdex Alliance September 22, Introduction The Apdex Alliance is a group of companies collaborating to promote an application performance metric called Application Performance Index (Apdex). Apdex is a numerical measure of user satisfaction with the performance of enterprise applications, intended to reflect the effectiveness of IT investments in contributing to business objectives. The Apdex metric may be used by any organization seeking insight into their IT investments. This specification defines Apdex, which is a method for calculating and reporting a metric of transactional application response time in the form of an index with a value of 0 to Status of This Document This specification document is the cornerstone of the Apdex Alliance. It was developed and ratified by the current Alliance member companies through a consensus process. The voting members of the Apdex Alliance at the time that this document was formally adopted are: Industry Members Akamai Technologies Compuware Coradiant Expand Networks FineGround Juniper Networks Keynote Systems NetForecast Netli NetQoS Network Physics Packeteer Swan Labs Symphoniq WildPackets Advisory Board Members Kerry Field Senior Specialist 3M IT System & Performance Management Services Michael Kennedy Vice President, Performance Engineering JP Morgan Chase Doug McClure Sr. Manager, Service & Technology Monitoring EarthLink Peter Christy Co-Founder and Principal Analyst Internet Research Group Mike Pennacchi President Network Protocol Specialists LLC Jeffrey Sult Business Technologies Optimization Practice International Network Services (INS) Members of the Alliance have made a commitment to implement tools or services that adhere to this specification. The Alliance is also committed to supporting an ongoing process of inquiry into the relationship between application responsiveness and user satisfaction. This specification may be updated over time based upon feedback from practical experience with Apdex, or to reflect new insights into application performance and its impact on business Apdex Alliance Apdex Specification Page 1 of 11
2 1.2 Relationship of this Document to Other Documents The Apdex Alliance plans to develop and maintain additional documents and educational material to help enterprises understand the Apdex metric and put it to productive use within their organizations. The Apdex Technical Guide will provide detailed information on defining Apdex parameters within an enterprise. Most recent information about the Alliance and Apdex documents will be made available at the Alliance web site at 2. Index Overview There are many aspects of performance relating to the delivery and management of information technology. One critical performance factor is the responsiveness of the human-computer interface from the perspective of the human user. This responsiveness is a core quality of a transactional application. The speed by which an application reacts to the needs of the user directly affects the user s productivity and satisfaction with the application experience. It is a critical metric of application performance that has direct implications for business revenue, customer retention, and user productivity. Therefore, measuring and tracking application response time is important to an enterprise that values the opinion and productivity of its users experiences. However, measuring is a necessary but insufficient step in proper management of the user experience. Meaningful reporting of the measurements is equally important. The Application Performance Index ( Apdex ) defines a methodology for reporting the responsiveness of human-application transactions, in terms of its effect on user productivity. 2.1 Index Objectives The fundamental objective of Apdex is to simplify the reporting of application response time measurements by making it possible to represent any such measurement using a common metric. Response time data can describe a wide range of targets, and its magnitude can vary widely. The index is designed to normalize for this variability of time (wide range of seconds) and measurement requirements (many distinct targets), producing a single metric that always has the same meaning. The goals of this metric are: To provide a useful summary of an application s responsiveness To make it easy to understand the significance of values produced by the index To work for all transactional applications To operate within a fixed rage (0-to1) and be unit-neutral To indicate application performance directly so that 0 is the worst performance and 1 is the best performance To operate in such a way that specific values of the index (e.g., 0.5) report the same user experience across any application, user group, or enterprise To operate in such a way that equivalent user experiences observed by different measurement and reporting tools will report the same value The purpose of this document is to provide a standard by which many vendors of measurement and reporting tools can achieve these seven objectives. 2.2 Terms in This Document This document makes a clear distinction between the user of an application that is being measured and the user of the tool that is performing the measurement and generating index values. The latter is called the technician. Other unique terms are defined in the glossary at the end of this document Apdex Alliance Apdex Specification Page 2 of 11
3 2.3 User-Application Interaction Model In order for the index to properly report on users perceptions of application responsiveness, the measurements that are used as input must measure the actual time that a user is waiting for the application to respond. Transactional applications are characterized by a query-response interaction process. A user types, clicks, or makes some entry followed by a period of time when the system (network, computers, databases, etc.) processes the entry and generates a response. This period is typically called user wait time. The critical factor regarding the duration of this time is that the user is typically incapable even prevented from proceeding with the application until the response is delivered. The user will then read, react, or in some way process the response that will then lead him or her to make the next entry. This period of time where the system is waiting for the user to make the next entry is typically called user think time. This enter-wait-think cycle repeats many times during the user s session with the application. The user s perception of the application s responsiveness or speed is formed by an accumulated number of views regarding the lengths of wait times or response times. There are many components of a client-server interaction that make up response time. Transactional applications have complex behaviors that operate at many levels. It is important to deconstruct the layers of interaction within the taxonomy described in Table 1. For purposes of clarity the table shows examples for HTTP and HTML (web-based) applications. Transactional applications based upon other protocols or proprietary schema follow the same taxonomy and may therefore be measured and reported by tools using Apdex. Within the above taxonomy, the layer where the human user is most aware of the responsiveness or speed of the application delivery system is the Task. Specifically, the application response time is the task wait time. Therefore, application response time is herein defined as the elapsed time from when a user completes a task entry to when the system responds with all the information needed in order for the user to proceed to the next task. Apdex is a context-based reporting and analysis method. This specification defines the method for reporting Apdex based upon Tasks. The Apdex Alliance may expand the scope of the Apdex method to other layers of the above transactional taxonomy. Specifically, there may be an Apdex for an application process. However, such a method will require its own context setting that would be described in a separate specification document Apdex Alliance Apdex Specification Page 3 of 11
4 Table 1 Taxonomy of Transactional Computer Applications Apdex Term Session General Definition The period of time that a user is connected to an application. This is a continuous period of time that the user is interacting with the application. Process Multi-step series of user interactions Task (see below) plus user think time that may (buy a book, look up an address, get a stock quote) or may not (no clear end) be well defined. Often called the transaction or application use case. Task Each user interaction with the application during a process. Task time is measured from the moment the user enters an application query, command, function, etc., that requires a server response to the moment the user receives the response such that they can proceed with the application. Often called the user wait time or application response time. Turn Each application client-server software interaction needed to generate a user response or Task (see above). These software-level clientserver interactions add to the time it takes for the software to complete a Task. The user does not see Turns operating. A Turn is a client-server request-driven round-trip. Often called application chattiness. Protocol The above Turns are further deconstructed into transport protocol events required to reliably move information among computers. These include DNS look-ups, TCP Opens, TCP transmission, TCP ACKs, retransmission, etc. Packet The smallest unit of interaction and transmission between the user s client and the application server is the packet. Packets are routed and transported by networks from source to destination. HTML/HTTP Equivalent No specific HTML or HTTP markers define a session. A proxy is an IP address connection (open-to-close). Another is the assignment of a session identification cookie followed by a period of inactivity. Series of web pages that follow the same general definition. Page, consisting of a container and zero or more component objects. HTTP Gets for parts of a Web page or frame. Object, such as a container (index.html), component (image.gif) or stand-alone document (program.zip). In HTML, each object will generate a Turn. TCP is the protocol supporting HTTP. HTML/HTTP do not generate additional events at this layer of the transactional model. HTML/HTTP do not generate additional events at this layer of the transactional model Apdex Alliance Apdex Specification Page 4 of 11
5 2.4 How Users Interpret Task Response Time Users have a finite set of reactions or views by which they characterize application response time. Each such group of time durations is called a performance zone. Performance zones are defined by two thresholds times where the zone begins and ends. Apdex defines three such performance zones: Satisfied Tolerating Frustrated Response times that are fast enough to satisfy the user, who is therefore able to concentrate fully on the task at hand, with minimal negative impact on his/her process. Responses in the tolerating zone are longer than those of the satisfied zone, exceeding the threshold at which the user notices how long it takes to interact with the system, and potentially impairing the user s productivity. Application responses in this zone are less than ideal but don t by themselves threaten the usability of the application. As response times increase, at some threshold the user becomes unhappy with slow performance entering the frustrated zone. With response times in the frustrated zone, a casual user is likely to abandon a process and a production user is likely to stop working on a task. The three zones are defined by two thresholds: T and F, in seconds, as follows. Satisfied Zone = zero to T. Tolerating Zone = T to F. Frustrated Zone = F to infinity. The value of F is four times the value T. For example, if users perceive response time as tolerable beginning at 4 seconds then they will be frustrated at greater than 16 seconds. The research that supports this model is described in Reference 1. Further background information is available in References How the Index Works The Apdex method converts response time (seconds) into an index (unitless) by counting the number of samples in each performance zone relative to all samples. The result is a ratio that is therefore within the range of 0-to-1. An index of zero means that all of the samples were within the frustrated zone. An index of 1 means that all of the samples were within the satisfied zone. An index that is greater than zero and less than one means that the samples were from a mix of the performance zones. The higher the index value, the more satisfied the user population was for that group of application performance response samples. 3. Apdex Calculation Inputs A wide variety of tools and methods may be used to gather the necessary information for an Apdex calculation and report. The following are the minimal requirements for such a tool. Each tool vendor may add features and capabilities above these minimal requirements. 3.1 Response Time Measurements Tool vendors must identify which applications their tool is capable of interpreting at the task level. For example, having the ability to mark the start and end of a Web page by interpreting the 2005 Apdex Alliance Apdex Specification Page 5 of 11
6 HTTP and HTML protocols is sufficient for Web-based applications. The tool must clearly identify the application by protocol (e.g., HTTP/HTML), or by software maker and product name (e.g., Microsoft Exchange), that it is capable of properly interpreting tasks and measuring response times. Implementation of the Task measurement will vary. However, Task measurements must be a reasonable approximation of response time measurements that could be performed by the user with a stopwatch. Implementations of Apdex-based Task reporting may vary, provided that individual Task measurements are assigned to a performance zone that is factored into an Apdex calculation and reported as further defined in this specification. 3.2 Defining a Report Group The report group is a specified set of individual measurement samples that will form the foundation for an Apdex calculation. A report group s set of measurement samples may be unique or may have overlapping measurement samples with other report groups. Report groups can be defined in many ways, but the following are required: Application User Group Time Period An application as selected by the technician. At a minimum, this is the application that the tool can interpret to the task level (see above). The technician must be able to define various user groups of an application (e.g., geography, organization). The technician must be able to define time of day periods for which the index will be calculated. The report group is one of the fundamental controls available to a technician. The report group may be defined as broadly as all of the samples for an application, or as narrowly as a single sample. Single samples are useful for diagnostic purposes. 3.3 Threshold Settings The technician (operator of the tool) must be able to set the target threshold, T (satisfiedtolerating boundary) and no other Apdex threshold for each application. This threshold is a positive decimal value in seconds, having no more than two significant digits of granularity. This means that the following types of values are permitted: 0<T<10 Greater than 0 seconds and below 10 seconds can be defined to a tenth of a second. Examples: 0.5, 1.2, 5.8, <T<100 Equal to or greater than 10 seconds but below 100 seconds can be defined to one second. Examples: 10, 19, 56, 85, <T<1,000 Equal to or greater than 100 seconds but below 1000 seconds can be defined to 10 seconds. Examples: 100, 190, 560, 850, Apdex Alliance Apdex Specification Page 6 of 11
7 T>1,000 Values equal to or greater than 1,000 seconds follow the same two significant digits restriction. The threshold must be consistent for all samples of a report group. All tools will ship with a default setting of T that will be selected by the tool vendor. The default enables the tool to begin supplying information with minimal set-up by the technician. It is recommended that the default target threshold value, T, be set to 4 seconds. Technicians have the ability to change this default setting as defined above. 3.4 Number of Measurement Samples There must be at least one sample in the report group in order to calculate an Apdex value. Single sample Apdex results are permitted but discouraged. The primary reason to have a small sample size is to cover low traffic periods or provide data for diagnostic reasons. These are not considered good indicators of application performance. The minimum sample size for normal reporting of the index is 100 samples within a report group. Special handling is required for smaller report groups; Section 5.2 specifies the method for reporting an Apdex result for a report group of fewer than 100 samples. 4. Calculating the Index The Apdex does not entail new measurements rather it is a new way to represent existing measurements, calculated by counting the measurement samples in each of the performance zones. 4.1 The Apdex Formula The Apdex is calculated for each report group using the following equation: Given, A report group that defines a set of measurement samples, and a target threshold T (seconds) between the satisfied-tolerating zones of performance Where, F defines the threshold between the tolerating-frustrated zones of performance, and F = 4T Such that, There are counts of response time measurement samples within the above defined performance zones of: Satisfied count = number of satisfied response time samples, Tolerating count = number of tolerating response time samples, Total samples = number of all samples in the report group Then, Apdex T = Tolerating count Satisfied count + 2 Total samples Note that measurements in the frustrated zone are counted in the number of total user samples in the denominator. To achieve the optimal Apdex value of 1.00, all users must experience 2005 Apdex Alliance Apdex Specification Page 7 of 11
8 satisfactory performance. If some users see tolerating or frustrating performance, then the index rapidly dips below For example, if 80% of users are satisfied and 10% are tolerating, while the remaining 10% are frustrated, the index is Dealing with Exceptions User aborts are factored into the above equation. A user abort occurs when a user enters a new inquiry before the system responds with the original inquiry. A user-generated abort stops the timing of the Task. Therefore, user aborts can fall into any of the satisfied, tolerating, frustrated zones. If a tool can detect a clear server-generated abort, then it is handled differently. Server aborts (e.g., TCP closes within a Task) are counted as a frustrated sample regardless of the Task time measurement. Some tools may have the optional capability to interpret the application to a greater level of detail than the minimal task boundary. For example, they may be able to detect user relevant information at the layer of the application logic. If the tool can detect task errors, then these application errors (e.g. Web page 404 replies) are counted as frustrated samples. 5. Reporting the Index The index is a decimal value between 0 and 1. The Apdex representation on all reports (screen, print, or otherwise) must adhere to the following rules. 5.1 Displaying the Apdex Value The index always starts with a 0, followed by a decimal point, followed by the fractional value for the calculation to two decimals, and the value of T is clearly associated with the index presentation as defined below. There is a special case of the value 1.00 that starts with the digit of 1. A 1.00 is presented when the formula produces a result that can be rounded arithmetically to 1.00 (results equal to or greater than round to 1.00). Apdex may not be reported in granularity smaller than one one-hundredth. Decimal values of 3 or more digits are not permitted. Tools in a computer screen or in printed reports always identify it as an Apdex value. When there are many values of the index presented in tabular form representing many reporting groups, then the Apdex label should appear with the appropriate column or row. All Apdex values are calculated with a particular target threshold, T. The value of T must be clearly displayed in association with the Apdex score. Furthermore, in order to facilitate exporting Apdex values from a tool and then importing them to other analysis tools, all tools must support at least one uniform output as shown below Apdex Alliance Apdex Specification Page 8 of 11
9 Uniform Output (Mandatory) The tool shall display, print, and export to an ASCII file each Apdex value with the following fixed format. Table 2 Uniform Output Definition Element Position Definition Example/Range 1 Value whole number digit 0 or 1 2 Decimal point. 3 Value tenths digit 0 through 9 4 Value hundredths digit 0 through 9 5 Space 6 Left bracket designating start of T [ 7 First digit of T 0.1 or greater N Rest of T as defined in section 3.3 Numeric digits N+1 Right bracket designating end of T ] N+2 Small group indicator (see 5.2 below) * if present Examples of the uniform output are: 0.85 [5.5], 1.00 [8.0]*, 0.90 [4.0], and 0.77 [450]. Subscripted Output (Optional) Tools may display Apdex values with a T shown as a mathematical subscript. For example, an Apdex value of 0.75 that is based upon a T of 4 seconds is shown as When T has a decimal component, as defined in section 3.3, then the exact value of T must be shown (example: ). In order to make the index easy to read, tools may drop the decimal portion of T if it is zero (example: becomes ). 5.2 Indicating Sample Size Apdex values are calculated based upon a set of measurements (samples) in the report group. If there are a small number of samples, the tool must still present a result. However, a result for such a small report group must be clearly marked. A small report group is defined as any number of samples between 0 and 99. Apdex tools will clearly indicate that the result is based upon one of the following scenarios: No Samples The Apdex calculation could not be performed because there were no samples (NS) within the report group. Where the calculated Apdex value would normally appear, the tool will show an output of NS. Examples: NS [4.0], NS 4 Small Group When an Apdex value is the output of a small group (1 to 99) calculation, an asterisk (*) must be appended to that value. Examples: 0.80 [4.0]*, *. 5.3 When T is a General Case General Apdex value discussions that reflect any target of T are written with T as shown in the following examples. Uniform Output: Everyone should understand that 0.90 [T] is a better value than 0.80 [T]. Subscripted Output: Everyone should understand that 0.90 T is a better value than 0.80 T Apdex Alliance Apdex Specification Page 9 of 11
10 5.4 Additional Reporting Rules Some tool vendors may wish to add graphical aids to report the Apdex value. This is an optional feature, but, if implemented, it must follow these guidelines. Two forms of alternative representations are permitted: the rating (a word), and a color indication. The following table shows the fixed set of alternative modes of representing the Apdex. The table shows examples where the target threshold (T) is 4 seconds. The color of the patch can be determined by the vendor in line with their existing product set, however a legend must clearly indicate which color represents each Apdex rating. Table 3 Apdex Qualitative Reporting Rules (Examples where T=4) Apdex Value Range Rating Color Indication to Excellent 4 Determined by vendor (with a 4 plus a color indication) to Good 4 Determined by vendor (with a 4 plus a color indication) to Fair 4 Determined by vendor (with a 4 plus a color indication) to Poor 4 Determined by vendor (with a 4 plus a color indication) to Unacceptable 4 or UNAX 4 Determined by vendor (with a 4 plus a color indication) Low Sample Cases 0.NS 4 NoSample 4 Determined by vendor (with a 4 plus an NS inside color indication) * Good 4 * Determined by vendor (with a 4 plus an * inside color indication) 6. References 1 "Defining The Application Performance Index," by Peter Sevcik, Business Communications Review, March This is a comprehensive overview of Apdex and the formation of the Apdex Alliance. 2 Understanding How Users View Application Performance, by Peter Sevcik, Business Communications Review, July Describes the three zones of performance. 3 This Is Your Father s Performance After All!, by Peter Christy, published in Business Communications Review, November This is a rebuttal from Peter Christy on reference 2. 4 How Fast is Fast Enough?, by Peter Sevcik, Business Communications Review, March This article continues the discussion in references 2 and 3 above of user perception of application response time Apdex Alliance Apdex Specification Page 10 of 11
11 7. Glossary Frustrated Zone Performance Zone Report Group Response Time Sample Satisfied Zone Task T Technician F Threshold Tolerating Zone Tool User Zone Any application response time above F in which the user is very negatively affected by response time. A range of time (between two time values) that a user waits for an application to respond during which his/her perception of the application s responsiveness does not change. The parameters that define a set of measurement samples that are used in an Apdex calculation. These parameters are meaningful to the user and typically relate to the way the user s enterprise is managing performance. The elapsed time beginning when a user completes a task entry and ending when the system responds with all the information needed in order for the user to proceed to the next task. One unique user Task response time measurement. The range of application response times between 0 and T in which the user is not affected by the response time. Each user-application interface interaction that requires a user entry and an application response. The target threshold which defines the boundary between satisfied and tolerating performance zones. The person who controls the measurement and reporting tool. This person also reads and interprets the index. Typically, this is a member of an enterprise application, data center, or network staff. The threshold which defines the boundary between tolerating and frustrated performance zones. The response time value that defines a boundary between performance zones. The range of application response times between T and F in which the user is negatively affected by response time. The measurement and reporting system (devices, software, etc.) that generates Apdex values. The human user of an enterprise transactional application. The human may be accessing the application through client software in a clientserver application architecture or he/she may be using a much simpler termination device. See Performance Zone, Satisfied Zone, Tolerating Zone, Frustrated Zone Apdex Alliance Apdex Specification Page 11 of 11
Real vs. Synthetic Web Performance Measurements, a Comparative Study
Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage
Application-Centric Analysis Helps Maximize the Value of Wireshark
Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and
Choosing Application Performance Management (APM) Tools
1990-2010 Peter Sevcik and NetForecast, Inc., All rights reserved. Choosing Application Performance Management (APM) Tools Peter Sevcik NetForecast, Inc. Charlottesville, Virginia [email protected]
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
Why SAP Performance Needs Help
Why SAP Performance Needs Help By Peter Sevcik and Rebecca Wetzel July 2006 Consider this. An employee entering data into an SAP system proceeds quickly and efficiently when the system responds within
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship
Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 https://www.desu.edu/academics/mycaa Contact: Amystique Harris-Church 302.857.6143 [email protected] Education & Training Plan IT Network
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
24x7 Monitoring and Troubleshooting Distributed Application Performance
24x7 Monitoring and Troubleshooting Distributed Application Performance WHITE PAPER Gone is the luxury of sending network engineers to physically visit a site to troubleshoot performance issues. Today
Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008
Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals
NetQoS Offers An Experience Monitoring Solution For Global Performance Management The Forrester Wave Vendor Summary, Q2 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D., and Reedwan Iqbal EXECUTIVE
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance Key indicators and classification capabilities in Stratusphere FIT and Stratusphere UX Whitepaper INTRODUCTION This whitepaper
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship
University of Texas at El Paso Professional and Public Programs 500 W. University Kelly Hall Ste. 212 & 214 El Paso, TX 79968 http://www.ppp.utep.edu/ Contact: Sylvia Monsisvais 915-747-7578 [email protected]
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Diagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Web Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
Integration with CA Transaction Impact Monitor
Integration with CA Transaction Impact Monitor CA Application Delivery Analysis Multi-Port Monitor Version 10.1 This Documentation, which includes embedded help systems and electronically distributed materials,
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Managed Service Provider s Guide to Application Performance Optimization Services
Managed Service Provider s Guide to Application Performance Optimization Services By Rebecca Wetzel and Peter Sevcik May 2009 The time for service offerings that measure, accelerate, and control application
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
VisuSniff: A Tool For The Visualization Of Network Traffic
VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 [email protected] Oliver Gronz University
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
Microsoft Dynamics NAV 2015 What s new?
What s new? RapidStart Upgrade includes several enhancements for upgrading solutions. RapidStart Upgrade - Code New application merge utilities help partners upgrade their solution - application code and
General ISP Data Usage Meter Specification and Best Practices
General ISP Data Usage Meter Specification and Best Practices Peter Sevcik, Rebecca Wetzel, Andrew Lacy June 2015 Many ISPs track subscriber data usage for the purposes of informing subscribers about their
Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine
Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user
CCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8
Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.
Chapter 4 Rate Limiting
Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Administrator Guide. CA Multi-Port Monitor. Version 10.2
Administrator Guide CA Multi-Port Monitor Version 10.2 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ),
CHAPTER 4: BUSINESS ANALYTICS
Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
Content Delivery Networks
Content Delivery Networks Silvano Gai Cisco Systems, USA Politecnico di Torino, IT [email protected] 1 Agenda What are Content Delivery Networks? DNS based routing Server Load Balancing Content Routers Ethical
FortiBalancer: Global Server Load Balancing WHITE PAPER
FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Troubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
IT Service Level Management 2.1 User s Guide SAS
IT Service Level Management 2.1 User s Guide SAS The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS IT Service Level Management 2.1: User s Guide. Cary, NC:
PolyServe Understudy QuickStart Guide
PolyServe Understudy QuickStart Guide PolyServe Understudy QuickStart Guide POLYSERVE UNDERSTUDY QUICKSTART GUIDE... 3 UNDERSTUDY SOFTWARE DISTRIBUTION & REGISTRATION... 3 Downloading an Evaluation Copy
Chapter 1 Load Balancing 99
Chapter 1 Load Balancing 99 asterisk indicates a required parameter. For a term in parentheses, see the corresponding argument in the table above.) Name* (name; Note: Cannot be changed for a previously
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Customer Network Assessment
--------- Customer Network Assessment Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests...
BI4Dynamics provides rich business intelligence capabilities to companies of all sizes and industries. From the first day on you can analyse your
BI4Dynamics provides rich business intelligence capabilities to companies of all sizes and industries. From the first day on you can analyse your data quickly, accurately and make informed decisions. Spending
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia
WAN Performance Analysis A Study on the Impact of Windows 7
A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and
LESSON PLANS FOR PERCENTAGES, FRACTIONS, DECIMALS, AND ORDERING Lesson Purpose: The students will be able to:
LESSON PLANS FOR PERCENTAGES, FRACTIONS, DECIMALS, AND ORDERING Lesson Purpose: The students will be able to: 1. Change fractions to decimals. 2. Change decimals to fractions. 3. Change percents to decimals.
Macros allow you to integrate existing Excel reports with a new information system
Macro Magic Macros allow you to integrate existing Excel reports with a new information system By Rick Collard Many water and wastewater professionals use Microsoft Excel extensively, producing reports
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Monitoring Nginx Server
Monitoring Nginx Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Firewall Port Handling in TENA Applications
Firewall Port Handling in TENA Applications The purpose of this report is to describe the manner in which TENA applications handle communications using TCP. This report will also present some insight for
S y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
CA Performance Center
CA Performance Center Release Notes Release 2.3.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
Configuring and Monitoring the Client Desktop Component
Configuring and Monitoring the Client Desktop Component eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring
Chapter 11 Network Address Translation
Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses
Deploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Deploying the BIG-IP System v11 with DNS Servers
Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
TSX ETY 110 Module 8
Module 8 Introduction Subject of this chapter What s in this Chapter? This chapter describes the implementation of a TSX ETY 110 module. This chapter contains the following sections: Section Topic Page
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Engineering Problem Solving and Excel. EGN 1006 Introduction to Engineering
Engineering Problem Solving and Excel EGN 1006 Introduction to Engineering Mathematical Solution Procedures Commonly Used in Engineering Analysis Data Analysis Techniques (Statistics) Curve Fitting techniques
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests... 3 Tests and
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.
