Resource Utilization of Middleware Components in Embedded Systems
|
|
|
- Isabella Lewis
- 10 years ago
- Views:
Transcription
1 Resource Utilization of Middleware Components in Embedded Systems
2
3 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system resources impact performance, stability, deployment, and scalability of software systems. Performance will dramatically degrade as memory pages are swapped to disk, applications are forced to wait for CPU time, and network packet loss increases. Stability suffers as process execution becomes less deterministic and applications fail to allocate memory or obtain CPU time. System deployment becomes more complex, when Size, Weight, and Power requirements determine hardware selection and the distribution of software processes. Scalability is impacted as it becomes harder, or impossible to add new features, users, or connections to an existing system that has maxed out its available memory, CPU, or network bandwidth. A typical approach to software development is to consider the constraints of Size, Weight, and Power (and disk, memory, CPU, and network) during architecture, design, and implementation phases of software development. Software controls can be put in place, and resource usage can be monitored throughout the software development process. Software and designs can evolve as necessary to meet resource constraints. This process can work well, when a software development team has control of all the software. And in typical embedded applications, this process is the norm. Software projects might make use of COTS hardware, and sometimes a COTS operating system, but all other software components for infrastructure, communications, and the remaining functional requirements are written to meet the constraints of disk, memory, CPU, and network resources. Gaining insight into resource utilization within your infrastructure components is necessary as embedded systems are developed and deployed, but this can be particularly challenging when using commercial software. How do you gain insight into the resource utilization of a black box component? How do you control the memory or CPU utilization? Using the Data Distribution Service (DDS) technology as an example, this paper describes the concepts and tools necessary to determine and analyze the resource utilization of middleware components in embedded systems. DDS Background The Data Distribution Service (DDS) is a standardized communication middleware technology, and there are a number of commercial and open source implementations available. Because of it s flexibility, configurability, and performance, DDS is used across a wide variety of industries, including many embedded applications in DoD, space, medical, consumer electronics, energy, and environmental monitoring industries (among others). A DDS implementation will typically include a library (or set of libraries) that is linked into each application that will
4 4 communicate using DDS. For some implementations, a daemon or server process must be running for communications, but this is not required by all implementations. The DDS technology allows the application to define the data types that will be used for communication at compile time. These data types are defined in a language independent format, and compiled into type-specific DDS code, allowing the software developer to read and write data in a language-natural way. For example, C programmers will use C structures, while Java programmers will use classes. The DDS technology includes an automatic and dynamic discovery process. Each application using DDS for communications will discover all other applications using DDS, without requiring any configuration of IP addresses or port numbers. DDS is highly configurable. The standards specify 22 Quality of Service (QoS) policies that are used to configure the behavior of data communications. For example, the reliability, latency, durability, saved history, and organization of data may be configured. These configurations settings can effect resource utilization, some directly, some indirectly. Many DDS implementations extend this basic set of QoS policies for enhanced control. System Resources how are they consumed? Memory There are a few aspects to system memory consumption, including static or persistent memory and run-time memory. Static or persistent memory is consumed by executables, libraries, and data files. Runtime memory is consumed by code and static data, the stack, and the heap. A typical DDS distributed software application will have the following aspects that may consume memory: 1. Executable Code This category includes application code, libraries, and external daemons or server processes. DDS applications will include type specific generated code, DDS libraries, and may include external daemons or server processes (not all implementations require this). 2. Transport This category may or may not be appropriate, depending on how the application communicates with its distributed peers. Typical UDP or TCP transports will use buffers to collect data written or received. Many DDS implementations allow the application to select and configure transports. For example, UDP, TCP, shared memory, or serial, all of which have their own configuration aspects. 3. Locally Created Entities The category is focused on abstracted middleware components. For example, the DDS API requires applications to create entities to read and write data. A publishing
5 5 application will create a DDS DomainParticipant (to participate on the DDS network) a DDS DataWriter (to write data of a specific type), and a DDS Topic (to logically write data to). Each of these created entities will consume some amount of memory. 4. Discovery this category includes memory required for discovery of peer participants. In DDS, each application (or possibly a DDS daemon or server process) will keep bookkeeping information about discovered peer DDS applications and entities. 5. History Caches This category includes buffers used by the application (or by the middleware) to store sent or received data. DDS contains QoS policies to configure history caches for readers and writers. CPU There are many design decisions that will impact the resulting CPU utilization of a software application. Threading policies is one example. With multi-core CPU s, it is advantageous to parallel process where possible. Communication middleware is an easy place to take advantage of parallel processing: one thread to read data, one thread to manage events (including writing data), and one application thread, is just one way to take advantage of multiple CPU s with one process. However, when deploying on a single-core CPU, especially a low-powered device, threaded applications will require more context switching, in addition to using additional memory. In these environments, less CPU usage can be reduced by deploying a single threaded application. Another architectural design that impacts CPU utilization is busy waiting versus asynchronous notifications. A communication infrastructure like DDS can offer both design options to system developers. Network Data encoding on the wire will impact network utilization: binary formats will generally be more compact than text formats. Data batching and data aggregation algorithms may reduce network overhead for each message sent. Other algorithms that will impact network usage include the protocol for discovering peer endpoints, and reliability protocol design for handshaking, ack/nacks and re-transmission of missed data packets. When the distributed software contains one or few writers writing to many readers, the selection of multicast versus unicast will also impact network usage. Inter-process communications on one machine can be designed to use a local communications mechanism and avoid the network stack. Some DDS implementations provide on-machine transports in addition to network transports. There are significant benefits to being able to use the same communication protocols for all on-machine and off-machine communications, including the flexibility to redistribute software processes across available hardware without significant software re-writes.
6 6 Plan early, Monitor often In any software development process, there is an architecture and design phase, and implementation phase, and a test/integration phase (sometimes multiple phases within each). Changes in design and implementation will happen throughout each of these phases, and in many cases, these changes will be due to resource utilization and limitations. Due to the cost growth of rework in later phases, it is important to plan and monitor resource usage throughout the development process. This is only possible if there are tools to estimate usage (for those architecture and design phases), and measure usage (during the implementation and test phases). Managing Resource Usage As software architects and developers, we strive for a balance between conflicting requirements. For example: the balance between performance and memory usage, or the balance between flexibility and code size. With respect to infrastructure software components, it is critical to not only balance between conflicting requirements, but to allow application designers to control which requirements have more importance for any particular application. A wide range of architectural and design decisions will impact resource utilization, and many of these apply to infrastructure components. Architecture, distribution, and segregation of software components will impact resource utilization. If we look at a DDS example, segregating software components that do not need to communicate into separate DDS Domains will reduce the amount of discovery memory and network traffic for all DDS applications. Data architecture will also impact memory and network usage. For example, fixed sized data types allow applications and infrastructure components to pre-allocate space to hold all written and/or received data, but may waste space if data is truly dynamic in size. Unbounded data types (which may include unbounded strings or lists) may use less memory and network bandwidth, but require dynamic memory allocation during application execution. For example, consider the follow 2 data types (these data types are defined using IDL a language independent format for specifying data: struct A_fixed { String<128> color; } struct A_unbounded { String color; } Depending on design constraints and runtime usage, one data type may be preferred over the other. When using DDS, these data types will be compiled into language specific, type specific code, including the data type declaration. The following may be the resulting (generated) C representation of the data types:
7 7 struct A_fixed { char[128] color; } struct A_unbounded { char * color; } Many DDS implementations are threaded, and some allow the application to control the number of threads used, including down to no additional threads. The DDS standards specify multiple notification options (how the application is notified of events within the infrastructure, including data is available to be read ): asynchronous (call backs), synchronous (wait on a condition), and polling (calling get_status()). Applications may improve CPU utilization by aggregating data writes. For example in a threaded DDS implementation, the application may setup a latency budget (QoS policy). With a greater than 0 latency budget, DDS will queue events and reduce the number of times different threads must wake up to perform work. A latency budget may allow the DDS infrastructure to delay (up to the configured budget) the writing of data (for DataWriters) in order to process multiple messages together, and the delivery of data (for DataReaders) in order to notify the application one time for multiple messages. Another DDS QoS policy allows reading applications to filter received data. Some DDS implementation allow configuration of this filter to be applied at the writer, before data is written to the network, or at the reader. These options have multiple impacts on resource utilization. Reading applications that perform the filter must wake up for every message written, even if that message will be dropped because of a configured data filter. However, because data is written to all reading applications, the data writer may use multicast to reach many readers with one write on the network. Writing applications that perform the filter must unicast data written to only the reading applications that need to receive it. Depending on the number of reading applications and the filter configuration, this can result in more network traffic than using multicast and filtering at the reader. Measuring resource usage There are two ways to measure resource utilization for a software component: from the inside and from the outside. Measuring from the inside requires instrumentation, hooks, or another mechanism where the software component can accurately report is usage of memory or packets written to a network. Inside measuring provides a more accurate measurement of one process or component. Measuring from the outside is done using external tools, for example: ps, top, tcpdump, or valgrind. Outside measurements are typically a courser measurement. For example, the ps, top, perfmon, and taskmgr tools are not standardized or well documented, and will only measure an entire process. These tools cannot measure the memory or CPU usage
8 8 of one library or other component of the application. External tools are available (for typical desktop environments), and may be used on any software component, even a commercial component. However, they are generally a courser measurement of resource usage. The most accurate measurements (inside measurements) can only be obtained in COTS products that include hooks and/or instrumentation to allow these measurements. Figure 1: Example of an inside memory measuring tool for DDS Summary Resource utilization (memory, CPU, network) is a primary concern when developing deeply embedded components or deploying into a Swap constrained environment. Gaining insight into memory utilization within your infrastructure components is necessary for architects and engineers as they develop and deploy these systems, but this can be particularly challenging when using commercial software. Mismanaged system resources can lead to reduced scalability, poor performance, and increased deployment costs. It is important to gain insight into the resource requirements of your software components, and especially your infrastructure components. When these components are highly configurable, it is also important to understand the impact of configuration on resource utilization. The ability to estimate, plan, and monitor resource utilization using inside measurements will ultimately reduce the time required for development and test, as well as reducing overall project risk. Figure 2: Example of an inside memory measuring tool for DDS
9 About Twin Oaks Computing With corporate headquarters located in Castle Rock, Colorado, USA, Twin Oaks Computing is a company dedicated to developing and delivering quality software solutions. We leverage our technical experience and abilities to provide innovative and useful services in the domain of data communications. Founded in 2005, Twin Oaks Computing, Inc delivered the first version of CoreDX DDS in The next two years saw deliveries to over 100 customers around the world. We continue to provide world class support to these customers while ever expanding. Contact Twin Oaks Computing, Inc. (720) (855) (0) Maleta Lane Suite 203 Castle Rock, CO Copyright 2014 Twin Oaks Computing, Inc.. All rights reserved. Twin Oaks Computing, the Twin Oaks Computing and CoreDX DDS Logos, are trademarks or registered trademarks of Twin Oaks Computing, Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Printed in the USA.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems
WHITEPAPER Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems Abstract RTI Connext DDS (Data Distribution Service) is a powerful tool that lets you efficiently
What can DDS do for Android?
2012 What can DDS do for Android? Twin Oaks Computing, Inc 755 Maleta Ln, Suite 203 Castle Rock, CO 80108 720-733-7906 855-671-8754 (toll free) www.twinoakscomputing.com Contents Abstract... 3 What is
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
RTI Monitoring Library Getting Started Guide
RTI Monitoring Library Getting Started Guide Version 5.1.0 2011-2013 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. December 2013. Trademarks Real-Time Innovations,
Practical Performance Understanding the Performance of Your Application
Neil Masson IBM Java Service Technical Lead 25 th September 2012 Practical Performance Understanding the Performance of Your Application 1 WebSphere User Group: Practical Performance Understand the Performance
An Oracle White Paper September 2013. Advanced Java Diagnostics and Monitoring Without Performance Overhead
An Oracle White Paper September 2013 Advanced Java Diagnostics and Monitoring Without Performance Overhead Introduction... 1 Non-Intrusive Profiling and Diagnostics... 2 JMX Console... 2 Java Flight Recorder...
- An Essential Building Block for Stable and Reliable Compute Clusters
Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Lustre Networking BY PETER J. BRAAM
Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information
An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
Driving force. What future software needs. Potential research topics
Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.
technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple
Manjrasoft Market Oriented Cloud Computing Platform
Manjrasoft Market Oriented Cloud Computing Platform Aneka Aneka is a market oriented Cloud development and management platform with rapid application development and workload distribution capabilities.
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
Cognos8 Deployment Best Practices for Performance/Scalability. Barnaby Cole Practice Lead, Technical Services
Cognos8 Deployment Best Practices for Performance/Scalability Barnaby Cole Practice Lead, Technical Services Agenda > Cognos 8 Architecture Overview > Cognos 8 Components > Load Balancing > Deployment
Optimizing Shared Resource Contention in HPC Clusters
Optimizing Shared Resource Contention in HPC Clusters Sergey Blagodurov Simon Fraser University Alexandra Fedorova Simon Fraser University Abstract Contention for shared resources in HPC clusters occurs
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Rackspace Cloud Databases and Container-based Virtualization
Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many
SolarWinds. Packet Analysis Sensor Deployment Guide
SolarWinds Packet Analysis Sensor Deployment Guide Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability Introduction Integration applications almost always have requirements dictating high availability and scalability. In this Blueprint
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Automatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Mission-Critical Java. An Oracle White Paper Updated October 2008
Mission-Critical Java An Oracle White Paper Updated October 2008 Mission-Critical Java The Oracle JRockit family of products is a comprehensive portfolio of Java runtime solutions that leverages the base
Manjrasoft Market Oriented Cloud Computing Platform
Manjrasoft Market Oriented Cloud Computing Platform Innovative Solutions for 3D Rendering Aneka is a market oriented Cloud development and management platform with rapid application development and workload
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
High-Performance Automated Trading Network Architectures
High-Performance Automated Trading Network Architectures Performance Without Loss Performance When It Counts Introduction Firms in the automated trading business recognize that having a low-latency infrastructure
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance
TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance M. Rangarajan, A. Bohra, K. Banerjee, E.V. Carrera, R. Bianchini, L. Iftode, W. Zwaenepoel. Presented
dnstap: high speed DNS logging without packet capture Robert Edmonds ([email protected]) Farsight Security, Inc.
: high speed DNS logging without packet capture Robert Edmonds ([email protected]) Farsight Security, Inc. URL http://.info Documentation Presentations Tutorials Mailing list Downloads Code repositories Slide
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
New Products and New Features May, 2015
NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.
Application Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
ActiveVOS Clustering with JBoss
Clustering with JBoss Technical Note Version 1.2 29 December 2011 2011 Active Endpoints Inc. is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective
How To Improve Your Communication With An Informatica Ultra Messaging Streaming Edition
Messaging High Performance Peer-to-Peer Messaging Middleware brochure Can You Grow Your Business Without Growing Your Infrastructure? The speed and efficiency of your messaging middleware is often a limiting
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Introduction to SFC91xx ASIC Family
White Paper Introduction to SFC91xx ASIC Family Steve Pope, PhD, Chief Technical Officer, Solarflare Communications David Riddoch, PhD, Chief Software Architect, Solarflare Communications The 91xx family
JoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
Ultra-Low Latency, High Density 48 port Switch and Adapter Testing
Ultra-Low Latency, High Density 48 port Switch and Adapter Testing Testing conducted by Solarflare and Force10 shows that ultra low latency application level performance can be achieved with commercially
RTP Performance Enhancing Proxy
PACE RTP Performance Enhancing Proxy V2 Whilst the above information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy, Inmarsat makes no warranty
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
Simplifying Data Center Network Architecture: Collapsing the Tiers
Simplifying Data Center Network Architecture: Collapsing the Tiers Abstract: This paper outlines some of the impacts of the adoption of virtualization and blade switches and how Extreme Networks can address
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Quantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Network Infrastructure Services CS848 Project
Quality of Service Guarantees for Cloud Services CS848 Project presentation by Alexey Karyakin David R. Cheriton School of Computer Science University of Waterloo March 2010 Outline 1. Performance of cloud
Chapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
DETECTION OF PEER TO PEER APPLICATIONS
DETECTION OF PEER TO PEER APPLICATIONS AN OPSWAT WHITE PAPER Author: Priti Dadlani Contributors: Benny Czarny, Steven Ginn, Toshit Antani April 2008 OPSWAT, INC. www.opswat.com CONTENTS Introduction...
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
How Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011
A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
ARISTA NETWORKS AND F5 SOLUTION INTEGRATION
ARISTA NETWORKS AND F5 SOLUTION INTEGRATION SOLUTION BRIEF INSIDE Overview Agility and Efficiency Drive Costs Virtualization of the Infrastructure Network Agility with F5 Arista Networks EOS maximizes
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft
WINDOWS SERVER MONITORING
WINDOWS SERVER Server uptime, all of the time CNS Windows Server Monitoring provides organizations with the ability to monitor the health and availability of their Windows server infrastructure. Through
RTI Database Integration Service. Release Notes
RTI Database Integration Service Release Notes Version 5.2.0 2015 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. June 2015. Trademarks Real-Time Innovations, RTI, NDDS,
LinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers Happiest People. Happiest Customers Contents Abstract... 3 Introduction... 3 Performance Comparison... 4 Architecture... 5 Diagram...
Gigabit Ethernet Design
Gigabit Ethernet Design Laura Jeanne Knapp Network Consultant 1-919-254-8801 [email protected] www.lauraknapp.com Tom Hadley Network Consultant 1-919-301-3052 [email protected] HSEdes_ 010 ed and
VMware View 4 with PCoIP I N F O R M AT I O N G U I D E
VMware View 4 with PCoIP I N F O R M AT I O N G U I D E Table of Contents VMware View 4 with PCoIP................................................... 3 About This Guide........................................................
bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS
TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................
White Paper. Advanced Server Network Virtualization (NV) Acceleration for VXLAN
White Paper Advanced Server Network Virtualization (NV) Acceleration for VXLAN August 2012 Overview In today's cloud-scale networks, multiple organizations share the same physical infrastructure. Utilizing
Monitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015
CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 1. Goals and Overview 1. In this MP you will design a Dynamic Load Balancer architecture for a Distributed System 2. You will
SPAMfighter Exchange Module
SPAMfighter Exchange Module For Microsoft Exchange Server 2000 and 2003. White Paper July 2004. Copyright 2004 by SPAMfighter ApS. All rights reserved. SPAMfighter Exchange Module Page 1 of 10 Table of
Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure
1 Alessandro Alinone Agenda Introduction Push Technology: definition, typology, history, early failures Lightstreamer: 3rd Generation architecture, true-push Client-side push technology (Browser client,
Programming Assignments for Graduate Students using GENI
Programming Assignments for Graduate Students using GENI 1 Copyright c 2011 Purdue University Please direct comments regarding this document to [email protected]. 1 OVERVIEW 2 1 Overview This document
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
Four Keys to Successful Multicore Optimization for Machine Vision. White Paper
Four Keys to Successful Multicore Optimization for Machine Vision White Paper Optimizing a machine vision application for multicore PCs can be a complex process with unpredictable results. Developers need
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts
Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware
Informatica Ultra Messaging SMX Shared-Memory Transport
White Paper Informatica Ultra Messaging SMX Shared-Memory Transport Breaking the 100-Nanosecond Latency Barrier with Benchmark-Proven Performance This document contains Confidential, Proprietary and Trade
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
