CS556 Course Project Performance Analysis of M-NET using GSPN

Size: px
Start display at page:

Download "CS556 Course Project Performance Analysis of M-NET using GSPN"

Transcription

1 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software system. For many software development groups, it remains easier to wait until a system has been built before evaluating its performance. Among the three most used techniques, measurement, simulation and analytic modeling [7], measurement is believed to be the most accurate method. But it is only feasible after system is implemented. Most organizations rely solely on performance testing and regularly incur the cost of redesign when performance problems arise. Situation would become better if we can evaluate system performance before we physically build up that system. That s why simulation and analytic modeling become useful. Simulation tends to be expensive due to large computation time and can t prove properties. Many analytic performance models are proposed by different researchers, including Queueing Network model, Markov chain model, and Markov reward models, etc. As a mathematical and graphic tool, Petri Net can be used to describe a large variety of different systems [9]. It has been proven to be able to model system behaviors [6]. Based on that model, Petri Net provides approaches for the formal analysis, including performance analysis. Because of those benefits, applications of Petri Net range from informal systems to formal systems, from software systems to hardware systems, and from systems with concurrent processes to systems without any concurrency. Various extensions to Petri net models have been proposed. Among them, we chose Generalized Stochastic Petri Nets (GSPN) over other techniques because of their ability to randomize arrival and processing delays and of their capacity to model complex interactions. A good property of GSPNs is they are isomorphic to continuous time Markov chains (MCs) []. This makes it easier to apply performance analysis based on GSPNs.. Work in this paper M-Net is a web based meeting net, which enables people in remote areas to hold virtual meetings through the internet [, 8]. This system has been developed by Professor Carl K. Chang s students. We intend to build up an analytic model for M-Net and analyze its performance. This paper is organized as follows: section gives a brief overview to GSPN, section introduces M-NET which will be modeled in this paper. In section, GSPN models for M-NET are described. Section /9

2 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 applies some performance analysis based on those GSPN models. Section 6 evaluates and concludes this paper.. Generalized Stochastic Petri Net (GSPN). Introduction to GSPN Murata [] described Petri Nets (PN s) as a promising tool for describing and studying information processing systems that are characterized as being concurrent, asynchronous, distributed, parallel, nondeterministic, and/or stochastic. PN can be formally defined as [Peterson] : PN = (P, T, A, M) () where P, T, A, M are the sets of place, transition, arc, and marking. One of the important developments in the theory of PN s is the introduction of enhancements that make PN s more useful in performance evaluation studies. One such enhancement is the Stochastic Petri Net (SPN) which associates a random firing time to each transition. The reachability graph of an SPN can be turned into a continuous-time Markov chain (CTMC) by assigning to each edge a weight equal to the firing rate of the associated SPN transition. A SPN is defined formally as a tuple: SPN = (P, T. A, M, R) [] () where P, T, A, M are as in (), and R = {r, r,, r m } is the set of firing rates associated with the PN transitions. GSPN s [0] are timed Petri nets in which the transitions are classified into two groups: immediate and timed transitions. Immediate transitions have higher priority than timed transitions, fire in zero time and are labeled with a marking-dependent firing probability. Associated with timed transitions there are random, exponentially distributed firing times. A marking in which immediate transitions are enabled is known as a vanishing marking, while a marking in which only timed transitions are enabled is known as a tangible marking. Vanishing states have sojourn times which are zero, while tangible states have nonzero exponentially distributed sojourn times.. Performance analysis based on GSPN Smith defined performance [] as the degree to which a system or component accomplishes its designated functions within given constraints, such as speed, accuracy, or memory usage. What makes GSPN useful to performance analysis is that GSPN is isomorphic to Markov Chain. CTMC is one of the most useful tools for numerical analysis, but it s difficult to directly get CTMC for a big system. Compared to CTMC, GSPN model is more straightforward to build. So it s a normal way to build GSPN model first, then recognize its embedded CTMC. After that, we can analyze system performance based on numerical results gained from CTMC. Based on steady-state and /9

3 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 transient-state distribution probability derived from CTMC, most performance analysis can be handled.. Introduction to M-NET. Overview of M-NET M-Net is a web based meeting net, which enables people in remote areas to hold virtual meetings through the internet. M-Net System was built on a communication platform which manages communication among different users. It also includes various applications to support collaborative meetings. These applications include chat, which supports test based discussions; slideshow, which displays slides; IxiFtp, which allows file operations and browser operations; layered whiteboard, which supports the exchange of the visual pictures drawn in the browser. M-Net also includes features like secure control, user registration, and so on. In the M-Net System, everybody can apply to be a member, and can then launch a meeting and invite other members to attend. In a meeting, all attendee can share ideas through M-Net applications, and those ideas are broadcasted to all the other meeting members.. M-NET system architecture M-Net can be considered as a three-tier client/server system. The three tiers are client, server, and database. M-Net client is actually a Java let that is downloaded from a Server, and run in any browser. It communicates directly with servers through socket connections. M-Net mainly includes interfaces that need to communicate with servers and applications. Figure shows how M-Net communicates [] : /9

4 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Side Server Side M-Net Server (Java lication) M-Net Server (Java lication) M-Net Server (Java lication) Central Central Server (Java application) Central Central Database Server (Java application) JDBC Central MS- Access Figure : Top level system architecture of M-Net. Modeling M-NET by scenarios Due to its client/server structure and its complex applications, it s very difficult and tedious to describe the whole M-NET system by GSPN. Also because M-NET is a real-time system with random user requests, it s very difficult to analyze performance for the whole system. In this case, performance analysis based on scenarios is alternative and can still be very useful. System behaviors can be divided into different scenarios. So it s possible to get whole system performance evaluation by systematic scenario performance analysis. This paper will use one scenario: Floor control as example to illustrate this procedure. Its state diagram and GSPN are depicted as below.. Floor Control In M-Net, applications Chat and WhiteBoard have Floor Control. For example, in a Chat room, only FloorHolder can speak. Users can ask for floor at any time, and the chairman will either grant him the floor or deny his request. Figure is a state diagram that models the behavior of meeting members requesting the floor to gain access to the whiteboard. In this example there are three states representing FloorHeld, FloorRequested, and FloorNeitherHeldNor- /9

5 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Requested. Transitions are represented as probability variables, which enables close integration with Petri Net modeling and Markov modeling. A delay is introduced into the FloorHeld state so that once a person enters the state they will remain in that state for a time period equal to TimeToWrite, unless the floor is prematurely removed by the chair. These transitions are all represented as variables that can be used to support numerical performance analysis. Figure : Floor Control represented as a State transition diagram Figure is a Petri Net that models the behavior of meeting members requesting the floor to gain access to the whiteboard. We assume that there re one chairman and five members in this meeting. In order to gain a Markovian model of this scenario, the following assumptions are made: Members request floor at exponentially distributed random rate with average ; Members cancel their requests at exponentially distributed random rate with average ; The request may not immediately served, either because the floor is held by another member, or because the chairman denies this request; Floor can be prematurely removed from a floor-holder by the chairman. Floor-holder writes to whiteboard for an exponentially distributed random rate with average before releasing the floor. /9

6 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 t P P P P m t t t t P Figure : Floor Control represented as a GSPN Table : Legend for the GSPN in Figure P : Active member P : Member waiting for floor P : Chairman P : Floor free P : Member holds floor T : Member requests floor T : Member cancel floor request T : Chairman assign floor to member T : Chairman removes floor from member T : Member releases floor. Performance analysis based on GSPN models Response time is one of the most important performances, especially for network based applications. In this paper, only response time analysis is proposed.. Derive CTMC Based on the Petri Net in Figure, we can draw reachability graph as Figure : t t t t t t t t t t /t t t /t t t /t t t t /t t /t t t Figure : Reachability graph for GSPN in Figure 6/9

7 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 It has been proved that there is a one-to-one correspondence between the reachability graph and the continuous-time Markov Chain (CTMC) []. Figure shows the CTMC corresponding to the GSPN of Figure. M : 00 M :0 M :0 M :0 M :0 M 6 : M 7 :00 M 8 :0 M 9 :0 M 0 :0 M :00 Figure : Continuous time Markov Chain for the GSPN in Figure Without loss of generality, we assume =, =, =, =, =. For this CTMC, we generate matrix: Q = Solve this CTMC, we can get π = [0.66, 0.86, 0.0, 0.0, 0.00, 0.00, 0.06, 0.078, 0.00, 0.00, 0.000]. Response time analysis Let n denote the average number of tokens in a place, λ denote the average arrival rate of tokens, and w denote the average wait of a token in a place. So we can derive n = λw () Our goal is to gain the mean response time t f that elapses from a floor request is generated until the floor is assigned to that member. If we can get the average number of token (by steady state) in a place, which is the n in (), we can easily compute w, which is the mean wait time of a token in that place. As for our goal, the response time t f is the time of waiting for floor. From Figure, we can see that is the waiting time in place. So we gain: t f = w. () Then n = 0* * *0.0 + *0.0 + * * * * * * * /9

8 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 = 0.9 λ = = w = t f = Hereby we know that the mean response time from a member request the floor till the member release that floor is s.. Evaluate performance against original requirements After we calculate those numerical results, the next step is to evaluate those performances against the original requirements. According to the related requirement item Each floor request should be responded within second, obviously this requirement is satisfied. 6. Evaluation, Conclusion and Future work The example in this paper is a very simple one since only one scenario and only response time are considered. Values used in this example are fictitious. But from the numerical result, we can see that early performance evaluation is feasible. Actually GSPN can be very useful for most performance evaluation, like throughput, server load, CPU utilization, etc. All those work can be future work. Real-time Server- structure is difficult to model by even high-level Petri Net, but we can capture system behaviors by different scenarios, and analyze different system performances upon those scenarios. In doing this work, a major factor should be considered: those scenarios can completely capture system behaviors. References: [] Jian Zhang, M-Net Server Enhancement and NT Service, Master s Project Report, Apr. 00 [] Marco Ajmone, et al., A Class of Generalized Stochastic Petri Nets for the Performance Evaluation of Multiprocessor Systems, ACM Trans. Computer Systems, Vol., No., May 98, pp. 9- [] Kurt Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, de Bakker, J.W.; de Roever, W.-P.; Rozenberg, G.: Lecture Notes in Computer Science, vol. 80; A Decade of Concurrency, Springer-Verlag, Jun. 99, pp [] Murata, T. "Petri Nets: Properties, Analysis and lications", Proc. IEEE, Apr. 989, pp. -79 [] J.L. Peterson, Petri Net Theory and the Modeling of Systems, Prentice Hall PTR, 8/9

9 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Upper Saddle River, NJ, 98 [6] Kurt Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, de Bakker, J.W.; de Roever, W.-P.; Rozenberg, G.: Lecture Notes in Computer Science, vol. 80; A Decade of Concurrency, Springer-Verlag, Jun. 99, pp [7] O.C. Ibe, et al., Performance Evaluation of -Server Systems, IEEE Trans. Parallel & Distributed System, vol., no., Nov. 99, pp [8] Rong Qian, Meeting Net Real.0 Server Design and Implementation, Master Project Report. Int l Center for Software Eng., Computer Science Dept., Univ. of Illinois at Chicago, April 999. [9] J.L. Peterson, Petri nets. ACM Comput. Surv. 9, (Sept. 977), -. [0] M. A. Marsan, G. Balbo, and G. Conte, Performance Models of Multiprocessor Systems. Cambridge, MA: MIT Press, 986. [] C.M. Woodside and C. U. Smith, "Performance Validation at Early Stages of Development", Position paper, Performance 99, Istanbul, Turkey, October 99 9/9

Programma della seconda parte del corso

Programma della seconda parte del corso Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,

More information

Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup.

Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance and

More information

A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux

A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux Regiane Y. Kawasaki 1, Luiz Affonso Guedes 2, Diego L. Cardoso 1, Carlos R. L. Francês 1, Glaucio H. S. Carvalho 1, Solon

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems

Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems Jiacun Wang, Senior Member, IEEE Abstract Real-time billing is one of the most important functionalities in a telecommunication

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Response time behavior of distributed voting algorithms for managing replicated data

Response time behavior of distributed voting algorithms for managing replicated data Information Processing Letters 75 (2000) 247 253 Response time behavior of distributed voting algorithms for managing replicated data Ing-Ray Chen a,, Ding-Chau Wang b, Chih-Ping Chu b a Department of

More information

ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883. www.ijsetr.com

ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883. www.ijsetr.com ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883 www.ijsetr.com A Review of Disaster Recovery Techniques and Online Data Back-Up in Cloud Computing YOGESHWAR. CH 1, SATEESH NAGAVARAPU 2 1 PG

More information

Modeling and Performance Evaluation of Internet of Things based on Petri Nets and Behavior Expression

Modeling and Performance Evaluation of Internet of Things based on Petri Nets and Behavior Expression Research Journal of Applied Sciences, Engineering and echnology (18): 3381-3385, 212 ISSN: 2-767 Maxwell Scientific Organization, 212 Submitted: March 26, 212 Accepted: April 17, 212 Published: September

More information

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog. Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected

More information

Introduction to Finite Automata

Introduction to Finite Automata Introduction to Finite Automata Our First Machine Model Captain Pedro Ortiz Department of Computer Science United States Naval Academy SI-340 Theory of Computing Fall 2012 Captain Pedro Ortiz (US Naval

More information

How To Understand The Difference Between Business Process And Process Model In Java.Java.Org (Programming)

How To Understand The Difference Between Business Process And Process Model In Java.Java.Org (Programming) Business Process Modeling and Workflow Automation Ivo Vondrak * [email protected] Abstract: Process modeling and workflow applications have become more an more important during last decade. The main reason

More information

Modeling and Simulation Firewall Using Colored Petri Net

Modeling and Simulation Firewall Using Colored Petri Net World Applied Sciences Journal 15 (6): 826-830, 2011 ISSN 1818-4952 IDOSI Publications, 2011 Modeling and Simulation Firewall Using Colored Petri Net 1 2 Behnam Barzegar and Homayun Motameni 1 Department

More information

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

Software Performance and Scalability

Software Performance and Scalability Software Performance and Scalability A Quantitative Approach Henry H. Liu ^ IEEE )computer society WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents PREFACE ACKNOWLEDGMENTS xv xxi Introduction 1 Performance

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS

OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS K. Sarathkumar Computer Science Department, Saveetha School of Engineering Saveetha University, Chennai Abstract: The Cloud computing is one

More information

DiPro - A Tool for Probabilistic Counterexample Generation

DiPro - A Tool for Probabilistic Counterexample Generation DiPro - A Tool for Probabilistic Counterexample Generation Husain Aljazzar, Florian Leitner-Fischer, Stefan Leue, and Dimitar Simeonov University of Konstanz, Germany Abstract. The computation of counterexamples

More information

A novel load balancing algorithm for computational grid

A novel load balancing algorithm for computational grid International Journal of Computational Intelligence Techniques, ISSN: 0976 0466 & E-ISSN: 0976 0474 Volume 1, Issue 1, 2010, PP-20-26 A novel load balancing algorithm for computational grid Saravanakumar

More information

Traffic Control by Influencing User Behavior

Traffic Control by Influencing User Behavior Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before

More information

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of

More information

Web Server Software Architectures

Web Server Software Architectures Web Server Software Architectures Author: Daniel A. Menascé Presenter: Noshaba Bakht Web Site performance and scalability 1.workload characteristics. 2.security mechanisms. 3. Web cluster architectures.

More information

TIME DEPENDENT PRIORITIES IN CALL CENTERS

TIME DEPENDENT PRIORITIES IN CALL CENTERS TIME DEPENDENT PRIORITIES IN CALL CENTERS LASSAAD ESSAFI and GUNTER BOLCH Institute of Computer Science University of Erlangen-Nuremberg Martensstrasse 3, D-91058 Erlangen, Germany E-mail : [email protected],

More information

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND. [email protected]

A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND. bhaji@usc.edu A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND Rasoul Hai 1, Babak Hai 1 Industrial Engineering Department, Sharif University of Technology, +98-1-66165708, [email protected] Industrial

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load

More information

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science

More information

Layered Dependability Modeling of an Air Traffic Control System

Layered Dependability Modeling of an Air Traffic Control System Layered Dependability Modeling of an Air Traffic Control System Olivia Das, C. Murray Woodside Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada email: [email protected],

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

M/M/1 and M/M/m Queueing Systems

M/M/1 and M/M/m Queueing Systems M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential

More information

Possibilities and limitations of formal methods for business process analysis and design

Possibilities and limitations of formal methods for business process analysis and design Possibilities and limitations of formal methods for business process analysis and design Joseph Barjis PhD, Associate Professor Department of Systems Engineering Faculty of Technology, Policy and Management

More information

Performance Modeling for Web based J2EE and.net Applications

Performance Modeling for Web based J2EE and.net Applications Performance Modeling for Web based J2EE and.net Applications Shankar Kambhampaty, and Venkata Srinivas Modali Abstract When architecting an application, key nonfunctional requirements such as performance,

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu [email protected] Department of Computer & Information Systems Robert Morris University

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: [email protected] Abstract: The

More information

There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.

There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems. ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances

More information

Load Testing on Web Application using Automated Testing Tool: Load Complete

Load Testing on Web Application using Automated Testing Tool: Load Complete Load Testing on Web Application using Automated Testing Tool: Load Complete Neha Thakur, Dr. K.L. Bansal Research Scholar, Department of Computer Science, Himachal Pradesh University, Shimla, India Professor,

More information

Analysis of a Production/Inventory System with Multiple Retailers

Analysis of a Production/Inventory System with Multiple Retailers Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University

More information

RESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009

RESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009 An Algorithm for Dynamic Load Balancing in Distributed Systems with Multiple Supporting Nodes by Exploiting the Interrupt Service Parveen Jain 1, Daya Gupta 2 1,2 Delhi College of Engineering, New Delhi,

More information

Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach

Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach William A. Massey ORFE Department Engineering Quadrangle, Princeton University Princeton, NJ 08544 K.

More information

A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS

A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS 382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:

More information

Excerpts from Chapter 4, Architectural Modeling -- UML for Mere Mortals by Eric J. Naiburg and Robert A. Maksimchuk

Excerpts from Chapter 4, Architectural Modeling -- UML for Mere Mortals by Eric J. Naiburg and Robert A. Maksimchuk Excerpts from Chapter 4, Architectural Modeling -- UML for Mere Mortals by Eric J. Naiburg and Robert A. Maksimchuk Physical Architecture As stated earlier, architecture can be defined at both a logical

More information

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,

More information

Periodic Capacity Management under a Lead Time Performance Constraint

Periodic Capacity Management under a Lead Time Performance Constraint Periodic Capacity Management under a Lead Time Performance Constraint N.C. Buyukkaramikli 1,2 J.W.M. Bertrand 1 H.P.G. van Ooijen 1 1- TU/e IE&IS 2- EURANDOM INTRODUCTION Using Lead time to attract customers

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters

A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters Abhijit A. Rajguru, S.S. Apte Abstract - A distributed system can be viewed as a collection

More information

Automatic Stress and Load Testing for Embedded Systems

Automatic Stress and Load Testing for Embedded Systems Automatic Stress and Load Testing for Embedded Systems Mohamad S. Bayan João W. Cangussu Department of Computer Science University of Texas at Dallas msb021000,cangussu @utdallas.edu Abstract Load and

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

CHAPTER 7 STOCHASTIC ANALYSIS OF MANPOWER LEVELS AFFECTING BUSINESS 7.1 Introduction

CHAPTER 7 STOCHASTIC ANALYSIS OF MANPOWER LEVELS AFFECTING BUSINESS 7.1 Introduction CHAPTER 7 STOCHASTIC ANALYSIS OF MANPOWER LEVELS AFFECTING BUSINESS 7.1 Introduction Consider in this chapter a business organization under fluctuating conditions of availability of manpower and business

More information

PIPE The Great Re-Plumbing

PIPE The Great Re-Plumbing Imperial College London Department of Computing PIPE The Great Re-Plumbing Author: Sarah Tattersall Supervisor: Dr. William Knottenbelt June 2014 Submitted in part fulfilment of the requirements for the

More information

An Implementation of Software Project Scheduling and Planning using ACO & EBS

An Implementation of Software Project Scheduling and Planning using ACO & EBS An Implementation of Software Project Scheduling and Planning using ACO & EBS 1 Prof. DadaramJadhav, 2 Akshada Paygude, 3 Aishwarya Bhosale, 4 Rahul Bhosale SavitribaiPhule Pune University, Dept. Of Computer

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]

More information

Resource Allocation Schemes for Gang Scheduling

Resource Allocation Schemes for Gang Scheduling Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Telephone Traffic Queues in a Customer Call Center. A Thesis. Presented for the. Master of Science Degree. The University of Tennessee at Chattanooga

Telephone Traffic Queues in a Customer Call Center. A Thesis. Presented for the. Master of Science Degree. The University of Tennessee at Chattanooga Telephone Traffic Queues in a Customer Call Center A Thesis Presented for the Master of Science Degree The University of Tennessee at Chattanooga Patrick Todd April 2009 Copyright 2009 by Patrick Todd

More information

Radar Image Processing with Clusters of Computers

Radar Image Processing with Clusters of Computers Radar Image Processing with Clusters of Computers Alois Goller Chalmers University Franz Leberl Institute for Computer Graphics and Vision ABSTRACT Some radar image processing algorithms such as shape-from-shading

More information

A Comparison of General Approaches to Multiprocessor Scheduling

A Comparison of General Approaches to Multiprocessor Scheduling A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA [email protected] Michael A. Palis Department of Computer Science Rutgers University

More information

Load Balancing Algorithm Based on Services

Load Balancing Algorithm Based on Services Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao

More information

How To Model A System

How To Model A System Web Applications Engineering: Performance Analysis: Operational Laws Service Oriented Computing Group, CSE, UNSW Week 11 Material in these Lecture Notes is derived from: Performance by Design: Computer

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Module 1: Introduction to Computer System and Network Validation

Module 1: Introduction to Computer System and Network Validation Module 1: Introduction to Computer System and Network Validation Module 1, Slide 1 What is Validation? Definition: Valid (Webster s Third New International Dictionary) Able to effect or accomplish what

More information

Performance Comparison of Database Access over the Internet - Java Servlets vs CGI. T. Andrew Yang Ralph F. Grove

Performance Comparison of Database Access over the Internet - Java Servlets vs CGI. T. Andrew Yang Ralph F. Grove Performance Comparison of Database Access over the Internet - Java Servlets vs CGI Corresponding Author: T. Andrew Yang T. Andrew Yang Ralph F. Grove [email protected] [email protected] Indiana University

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle

Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle Nicholas Clark, M.S. Research Associate, C4I Center J. Mark Pullen, D.Sc Professor of Computer

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle

More information

Introduction to Modelling Embedded Systems with Alvis

Introduction to Modelling Embedded Systems with Alvis AUTOMATYKA 2011 Tom 15 Zeszyt 2 Marcin Szpyrka*, Piotr Matyasik*, Rafa³ Mrówka*, Wojciech Witalec*, Jaros³aw Baniewicz**, Leszek Kotulski* Introduction to Modelling Embedded Systems with Alvis 1. Introduction

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Load Testing and Monitoring Web Applications in a Windows Environment

Load Testing and Monitoring Web Applications in a Windows Environment OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows

More information

UML Modeling of Network Topologies for Distributed Computer System

UML Modeling of Network Topologies for Distributed Computer System Journal of Computing and Information Technology - CIT 17, 2009, 4, 327 334 doi:10.2498/cit.1001319 327 UML Modeling of Network Topologies for Distributed Computer System Vipin Saxena and Deepak Arora Department

More information