Modeling and Simulation Analysis of the Performance of Application-Level Communication between Distributed Objects
|
|
- Suzanna Summers
- 7 years ago
- Views:
Transcription
1 Modeling and Simulation Analysis of the Performance of -Level Communication between Distributed Objects Hiroshi Yamada Abstract--Almost all business es among enterprise activities use information technology (IT) systems. These days several s are integrated to implement more useful services. In addition, IT systems and networks are becoming larger and more complex in order to satisfy severe business requirements. The performance of a business is largely dependent on the IT system performance. Therefore, the performance design and management of the IT system are becoming more important issues. They must be viewed from an perspective, and transactions need to be tracked end-to-end through the entire infrastructure including client nodes, protocols, network configurations, architectures, and other components. In this paper, I introduce the performance design approach concept called ITAP (IT System Architecture Planning) approach by integrating and leveraging Business Process Modeling, Traffic Profiling, and Network Simulation, Benchmarking. As a case study, I evaluated the performance of three -level communication protocols: fan-out, pipeline, and ordered synchronous request/response communication protocols, using the ITAP approach. Given the activity diagrams that represent the ways for the initiating running on the broker to receive the sub services running on the remote s, I developed simulation modules that represent the dynamics of these -level communication protocols and performed simulation experiments. Index Terms --Communication management, Communication protocols, Information Technology, Simulation. A I. INTRODUCTION LMOST all business es in enterprise activities uses Information technology (IT) systems. These days several s are integrated to implement more useful services. This is called EAI (Enterprise Integration). In addition, the IT system and network are becoming larger and more complex in order to satisfy severe business requirements. The s running on IT systems are also becoming more complex and have a multi-tier structure to enable the distributed computing. For example, most web s have a complex multi-tier architecture and are ed in several computers. A client PC sends a request message to a web, which acts as a message broker. This web Hiroshi Yamada is with Nippon Telegraph and Telephone (NTT) Service Integration laboratories, 9-11, Midori-Cho 3-Chome Musashino-Shi Tokyo Japan (telephone: , yamada.hiroshi@lab.ntt.co.jp). ICITA2002 ISBN: analyzes the request message and invokes a suitable. The invoked may update data in a remote database, or send a remote procedure call (RPC) to receive services in the remote s. Finally, the web sends the response messages to the client, and the client receives them. When an involves accessing multiple es running on different s in the network, those es must communicate with each other. There are many types of communication between es running in different computers, depending on the content and purpose of the information that is exchanged in the business. Therefore, the performance of the business is largely dependent on the IT system performance. The performance design and management of the IT system are becoming more important issues. They must be viewed from an perspective, and transactions need to be tracked end-to-end through the entire infrastructure including client nodes, protocols, network configurations, architectures, and other components. As mentioned above, the architecture has become more complex. So, organizations, e.g., network service providers and network managers in companies, need to optimize the performance of s before implementing them. When we consider the performance of an that operates in a distributed computing environment, many issues arise that do not exist when all the data is stored and ed by a single central computer. In this case, the performance of an is affected by several factors, e.g., network resources, the or speed of each computer, middleware, traffic volume, and the communication path between objects. IT system managers must design the performance well and manage the and network performance, e.g., the response time, throughput, the number of committed transactions and so on in order to satisfy the business requirements. In this paper, first, I introduce the performance design approach concept called ITAP (IT System Architecture Planning) [1]. Next, I evaluate the performance of the -level communication protocol using this approach as a case study. In this paper, we consider the following situation. The service integrates several sub services running on the remote computers (Fig.1). All requests from the clients are received at a broker. This invokes the to receive suitable sub services. The invoked sends request messages to multiple remote s and database s, which may exist in a high-speed LAN or remote LAN connected by a slow WAN line. That is, this broker acts as a request broker.
2 To integrate the sub services, we consider the following three communication methods to connect these sub services as the -level communication protocol: Fan out parallelism, pipeline parallelism, and ordered. Their performances are evaluated and compared through simulation experiments. This paper is organized as follows. Section 2 introduces the ITAP approach and section 3 summarizes the -level protocol. Section 4 briefly explains the simulation modeling. Section 5 presents the simulation results. Section 6 summarizes the main points and mentions topics for further study. Client -level communication Invokes to receive a suitable service 1 N Figure 1 Multi-tier architecture using request broker. II. ITAP APPROACH In order to handle the performance issues of IT systems, methodology is being developed [1] to evaluate performance by integrating and leveraging: business modeling, traffic profiling, network simulation/benchmarking. We call this approach ITAP (IT System Architecture Planning). Figure 2 shows its concept maps. The business means all tasks and the flow of information in the business activity. A business activity using the IT system consists of several s that are executed according to the business. The business modeling is done using UML (Unified Model Language). The activity diagram and sequence diagram drawn by UML show the business activities for several aspects, for example: What are the successive stages or tasks of the business? What are sources and target data or ing objects? Where are sources and target data or ing objects? How do the data and ing objects communicate with each other? The above information is used to understand and improve the business itself and to model the traffic flow in the IT system: the destination/source, direction of the traffic flow, and the time when the transaction was generated, etc. In traffic profiling, the communication path should be considered. It is defined as the path among the identical 3-tier layers. According to [2], consider the theoretical three-tier architecture (Fig.3). This identical 3-tier architecture is represented by a 3 x 3 matrix: the rows are the physical tiers, i.e., client workstation,, and database, and the columns are the logical layers, i.e., presentation management, workflow/ logic management, and data management. The presentation management layer is an -related component that interacts with users and handles the presentation, preparation, and collection of information. The workflow and logic management layer accepts information requests, decomposes them, and directs them to the appropriate database management layer. The s that are implemented using this architecture model need several different types of inter- communications between the elements of this matrix. If there is a prototype of the, the communication path is defined using measurement data and analysis tools, for example, ACE ( Characterization Environment) [3]. By analyzing the communication path of the, we can understand how the integrated service communicates with the running on the remote s and where the traffic flow is concentrated on. In the network simulation, the virtual network is configured on the computer and virtual traffic data or real traffic data imported from the measurement tool flows on the configured network on the computer. Through the simulation experiments, we can obtain the performance of the and network devices. The simulation modules to represent the dynamics of the new or customized protocol are developed on demand. I used the hierarchical object oriented network simulation tool, OPNET [3] to model the simulation module and to execute the simulation experiments. It is very important to evaluate performance through the simulation experiments prior to implementations. This requires that: The IT system configuration representing the target IT platform is modeled on the computer, The target traffic flows along the communication path is revealed by the traffic profiling. Hereafter, we consider the -level communication protocols. These are implemented on the middleware. Because the enterprises need to develop more useful s as EAI, the importance of the performance evaluation of the level communication protocol is growing. Business Platform network IT system architecture Analysis based on traffic measurement Business modeling traffic profiling Network/business simulation (middleware, multi-tier, QoS, MPLS) Measurement and analysis of traffic data Simulation analysis of network and AP performance Solution approach Total performance solution
3 Presentation management Workflow management Database management Figure 2 Concept map of ITAP approach [1]. Client PC Presentation logic logic Database logic Database Figure 3 Communication paths in a distributed. [2] III. OVERVIEW APPLICATION-LEVEL CIMMUNICATION PROTOCOL This section briefly summarizes the -level communication protocol. It is very important to decide how each part of the should communicate with the other parts. This depends on the content and purpose of the. To communicate between es running in different computers, the objects that handle es should follow an agreed style of messages and protocol. Generally, for a simple client/ model, the communication is direct and synchronous. However, in a distributed, several [4], [5], [6], [7]. different styles of communication are possible: request/response, conversation, message queuing, publish and subscribe. In request/response communications, when communication is synchronous, the initiating sends a message and waits for a response message before it can continue ing. When the communication is asynchronous, the initiating continues ing after sending request messages. Let us consider an service that integrates two sub services running on remote computers. All requests from the clients are received at a broker, which invokes the to receive suitable sub services. The invoked sends request messages to multiple remote s and database s. In this case, there are three ways that the initiating running on the broker receives the sub services running on the remote s. The activity diagrams drawn by UML are shown in Fig. 4. This activity diagram is made in the Business Process Modeling phase. In order to implement these activity diagrams, there are several -level communication protocols. The initiating can also send different messages to different s in parallel. This is called Fan-out parallelism communication [4], [5]. A that receives the request from a client handles the request message and forwards it to other s, and this es it and forwards the request to other s; finally this last sends response messages back to the initiating client. The multiple tasks of the are ed in pipeline fashion like this, so this is called pipeline parallelism communication. If the broker sends the request messages to the remote in order, this is called ordered communication (See Fig. 5). In the next section, the simulation modules that represent this -level communication protocol are developed. In conversation, messages are exchanged between two communicating es. In the synchronous case, each one waits while the other takes its turn ing, and the procedure continues where it left off when the next message arrives. The message queuing is an asynchronous communication. The initiating places the message in a queue in the message queuing. The target retrieves the message later at its convenience. The response returns via a similar route. In message queuing protocol, the message is never blocked when the queue manager wants to receive it. Message queuing is very useful when an does not need to receive a response quickly. In publish and subscribe communication, an arbitrary client and es can subscribe to events and also publish events. When an event happens, a message is sent to the client or es that have subscribed to the event list. In designing a distributed, the designer should decide which communication method between distributed es running on remote computers is the best to fulfill the, considering the performance as well as the purpose and content of the. The service on the IT system is designed using a workflow editor. The workflow editor defines a workflow diagram that represents the successive stages or tasks of the business and the sub executed at each stage. So the simulation model that represents the above workflow diagram is very useful for evaluating the end-to-end performance. starts the integrated Invoke A in the 1 Invoke B in the 2 Process the responses in the broker The integrated ends Figure 4-1 Activity Diagram by UML (Fan out) starts the integrated Invoke A in the 1 Invoke B in the 2 Process the responses in the broker The integrated ends
4 Figure 4-2 Activity Diagram by UML (Pipeline) Figure 4-3 Activity Diagram by UML (Ordered) starts the integrated Invoke A in the 1 Process the response in the broker Invoke B in the 2 Process the response in the broker The integrated ends 1 Pipeline parallelism 1 1 Fan-out parallelism Ordered Figure 5 Comparison of fan-out, pipeline, and ordered IV. OPNET MODELING OF FAN-OUT COMMUNICATION In order to evaluate the performance of a multi-tier that communicates with several different s by fan-out parallelism communication, we need to modify the standard OPNET client/ model. This section briefly explains the simulation modeling by OPNET. A. Standard model OPNET is the network simulation tool that supports the hierarchical object-oriented model. In the OPNET model, to generate the traffic, several es are invoked according to tree structures, where the client/ manager is the root. The invoked child inherits the necessary information to perform the. In order to perform the layer protocol in the client node, the client/ manager invokes the profile manager and then the manager. Each manager invokes the client. The client works as follows. It establishes a TCP session between the client and the target. Then, this generates the message according to the traffic generating defined by the manager and sends it to the transport layer module. The transport layer handles the message and forwards it to the target remote. When the client has received all responses from the remote, it closes the TCP session. In the node, the client/ manager receives the request messages and handles them. In the standard OPNET ver.8.0.c client- model, the standard client s ( , ftp, http, etc.) can set a back-end custom attribute. The custom is a versatile model that enables us to model several tasks that are ed in one activity. In a task definition, we can define the source node, destination node, and the traffic volumes of the request and response messages between the source and destination nodes. When the backend custom name is set as a parameter, this information is involved in the request message from the client as the attribute. The receives the request and reads the attribute of the back-end custom name in the request message and invokes the appropriate custom. Therefore, this works as the request broker. When the invoked custom has finished, the response message is sent back to the initiating client. The client in the client node measures the round-trip request-response time. This statistical measure is very important in designing a multi-tier with the above features. Most web services have the above architecture. B. Addition of fan-out procedure to the standard OPNET client- model In the standard custom, client es can be invoked simultaneously to handle all the registered tasks. However, the standard custom manager that invoked the custom as the back-end does not care whether all simultaneously invoked tasks have finished or not. Therefore, a procedure for managing the status of all tasks invoked simultaneously should be added to the standard OPNET custom manager model to make the broker. In the modified broker model, the list is newly created to manage the status of the invoked tasks. When the broker receives a new request from the client, this list is created. Then, the data objects are also created for each task
5 to be invoked. These data objects have two properties: the task identifier and the task status flag. When a task is over, the broker manager accesses the entity in the list. When the entity with the same task identifier as that of the finished task is found in the list, this entity is removed and the memory allocated to it is released. When the broker removes all entities in the list, the list size becomes 0. This shows that all tasks invoked by the broker are over. Finally, the broker manager sends the response message back to the initiating client. (See Figure 6) In addition, in the modified model, when the broker sends request messages to s in parallel, this invokes the custom client es to handle the task continuously with a small lag, in order to avoid collisions in the network. client Figure 6 Modified broker model We added the above procedures to the standard OPNET models and simulated a back-end with fanout parallelism. Here, the client and manager models for requesting the back-end are also newly created. In this model, the client is waiting to receive the final response from the broker. After the client has received it and some thinking time has elapsed, the client sends the next request to the broker (See Fig. 7). The client cannot send another request until it has received all responses to the previous request. That is, the communication between the client and the broker is synchronous. Send the request Client/ manager Invoke manager client client When all tasks are over, interrupt the root in order to send the response back to the initiating client. Make the list Invoke simultaneously Receive the response task_identifier task_status task_identifier task_status task_identifier task_status Wait for the response Thinking time Figure 7 Generating a request by the fan-out client V. SIMULATION ANALYSIS When the task is over, the entity is removed. Using the modified broker model, we performed simulation experiments. This section explains the traffic model. The client node sends the request message and waits for the response from the broker ; that is, this is synchronous. The thinking time has an exponential distribution with mean of 30 seconds. The client generates a request message with a fixed size of 1024 bytes, and receives a response message with a fixed size of 8192 bytes from the broker. The broker generates a request message with a fixed size of 512 bytes and sends it to the. The es the request message and sends a response message with the fixed size of 4096 bytes back to the broker. The number of tasks that can be invoked by the back-end s varies. The time to generate the request message in the broker and node is fixed to 1. The time to the request message and generate the response message in the is defined as follows. In the, contention mode is chosen the job scheme. In this mode, when there is only one job to be handled, the request is ed in the and the service time of this job is explicitly fixed to 1 second. But when multiple jobs are simultaneously ed in the during congestion, the CPU power in the is equally allocated among all ing jobs. Therefore, the service time of a job may exceed 1 second during congestion. The TCP parameters of the client and nodes and other parameters of the other nodes and links are set to the OPNET default values. In addition, in using fan-out parallelism, the broker invokes the custom client es to handle the task continuously with a fixed time lag, 1 second, in order to avoid collisions in the network. In using the pipeline parallelism, the broker sends a request message with a fixed size of 512 bytes, and forwards a request message of the same size to the next. The second sends an acknowledgement back to the forwarding, and the final sends the response message with a fixed size of 4096 bytes, back to the broker. Therefore, in this simulation example, the total traffic volume flowing in the network using pipeline parallelism is the smallest among all cases. The traffic flow in this example is summarized in Fig. 8. Greq:1 Greq: 1+Proc:1 Proc: bytes 512 bytes S2 () (App) (App 8 bytes 8 bytes 4096 bytes Pipeline parallelism Greq:1 512 bytes S2 Proc: bytes (App) Fan-out () 4096 bytes parallelism Proc: bytes (App) Greq: 1+ Lag:1 Figure 8 Traffic model. Greq: Time to generate the request message Proc: Time to and generate the response Lag: Time lag to invoke the task in fan-out parallelism A. Comparison of fan-out parallelism, pipeline parallelism, and ordered communication Standard model Consider a network configured as shown in Fig. 9. The client and nodes are connected via a 100Base-T switch.
6 The broker () invokes the back-end when requests from the clients (W to WS5) are received. In the back-end, multiple tasks are ed. They are defined as follows. First, the broker sends a request message to the s, which handle it using the contention mode mentioned above; finally the broker receives the response messages from the. Here, we compare the three types of communication between the broker and es: fan-out parallelism, pipeline parallelism, and ordered. The response times are shown in Figs. 10 and 11. There are two s in Fig. 10 and four in Fig. 11. The response time as the performance measure is defined by the time difference between when the client receives the response and when it sent the request. In this case, the response time of fan-out parallelism is the shortest. When there are four s, the response time of the pipeline is smaller than that of the ordered. In this network configuration, contention among jobs in the broker and s and traffic congestion in the LAN switch affect the response time. Our simulation analysis showed that the communication path between es running in different computers improves the response time performance of the. VI. CONCLUSION AND FURTHER STUDY In this paper, I introduced the performance design approach concept called ITAP (IT System Architecture Planning) by integrating and leveraging Business Process Modeling, Traffic Profiling, and Network Simulation/Benchmarking. And as a case study, I evaluated the performance of the fan-out, pipeline, and ordered synchronous request/response communication protocol. Given the activity diagram that represents the way where the initiating running on the broker receives the sub services running on the remote s, a simulation module representing the dynamics of the above activity diagram was developed and simulation experiments were done. The type of communication between the broker and the depends on the purpose and content of the s information. If possible, the fan-out parallelism is a good choice for communication between es in order to improve the response time. In this simulation model, the communication between the client and the broker is synchronous. Therefore, when the s are busy, or the network or Internet provider s network cloud is congested, the response time is longer. In such a case, users will not be satisfied with the service quality of the. One solution is to use asynchronous communication and a message queuing protocol [2], [4], [7], [8]. I have also developed a simulation module representing the message queuing (MQ) communication model [9]. Furthermore, web services are now proposed as a technology that can integrate multiple s. In the web service, a remote procedure call RPC to the running in the remote is done using SOAP protocol [10]. In the future, communication paths will become more complex and the -level protocol will be very important. Therefore, it is important to evaluate the performance prior to implementation using several such protocol simulation models. Such an approach can reduce the risk of implementing an that subsequently shows poor performance. REFERENCES [1] Hiroshi Yamada, Yada Takeshi, Information Technology System Architecture Planning Platform (ITAP), NTT Review, Vol. 13, No. 5, Sep., pp.78 94, 2001 [2] Chris Loosley, Frank Douglas, High-Performance Client/Server A Guide to Building and Managing Robust Distributed Systems, John Wiley & Sons, Inc., 1998 [3] OPNET Technology, Inc., [4] Carl L. Hall, Building Client/Server s Using TUXEDO, John & Wiley & Sons, Inc., 1996 [5] Jeri Edwards, 3-Tier Client/Server at Work, John Wiley & Sons, Inc., [6] Juan M. Andrade, et al., The TUXEDO System, Software for Constructing and Managing Distributed Business s, Addison- Wesley Publishing Company, Inc., 1996 [7] IBM, Architecting e-business Solutions with IBM s Business Transformation & Integration Middleware, 3.ibm.com/software/ts/mqseries/library/index.html. [8] Chris Britton, IT Architectures and Middleware: Strategies for Building Large, Integrated Systems, Pearson Education, Inc., [9] Hiroshi Yamada, OPNET Modeling of Message Queuing Protocol, to appear in the Proceedings of OPNETWORK2002, [10] Sun Microsystems, Implementing Services on Demand With the Sun Open Net Environment SUN ONE - A Sun Professional Services White Paper, Client W Client WS2 Client WS3 Client WS4 Client WS5 time (seconds) Server Figure 9 Network model Download time Fan Out (mean:4.17) Ethernet SW Server 1 Pipeline (mean:5.15) Ordered (mean:5.23) Elapsed time (seconds) Figure 10 time (For two s) Server 2 Server 3 Server 4
7 time (seconds) Download time Pipeline (mean:9.78) Fan Out (mean:7.76) Ordered (mean:11.9) Elapsed time (seconds) Figure 11 time (For four s)
Methodology of performance evaluation of integrated service systems with timeout control scheme
Methodology of performance evaluation of integrated service systems with timeout control scheme Akira Kawaguchi and Hiroshi Yamada NTT Service Integration Laboratories, NTT Corporation 9-11, Midori-cho
More informationClient/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEnabling Real-Time Sharing and Synchronization over the WAN
Solace message routers have been optimized to very efficiently distribute large amounts of data over wide area networks, enabling truly game-changing performance by eliminating many of the constraints
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationWSO2 Message Broker. Scalable persistent Messaging System
WSO2 Message Broker Scalable persistent Messaging System Outline Messaging Scalable Messaging Distributed Message Brokers WSO2 MB Architecture o Distributed Pub/sub architecture o Distributed Queues architecture
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationAnalysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationPIVOTAL CRM ARCHITECTURE
WHITEPAPER PIVOTAL CRM ARCHITECTURE Built for Enterprise Performance and Scalability WHITEPAPER PIVOTAL CRM ARCHITECTURE 2 ABOUT Performance and scalability are important considerations in any CRM selection
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationClient-Server Applications
Client-Server Applications Prof. Sanjeev Setia Distributed Software Systems CS 707 Distributed Software Systems 1 Client Server Systems Distributed Software Systems 2 1 Client/Server Application Distributed
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More information3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
More informationCloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
More informationIt is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.
Session Layer The session layer resides above the transport layer, and provides value added services to the underlying transport layer services. The session layer (along with the presentation layer) add
More informationChapter 16 Distributed Processing, Client/Server, and Clusters
Operating Systems: Internals and Design Principles Chapter 16 Distributed Processing, Client/Server, and Clusters Eighth Edition By William Stallings Table 16.1 Client/Server Terminology Applications Programming
More informationSecurity Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationOracle Service Bus. Situation. Oracle Service Bus Primer. Product History and Evolution. Positioning. Usage Scenario
Oracle Service Bus Situation A service oriented architecture must be flexible for changing interfaces, transport protocols and server locations - service clients have to be decoupled from their implementation.
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationResearch on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
More informationSOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationTesting Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationClient/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
More informationCloud FTP: A Case Study of Migrating Traditional Applications to the Cloud
Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Pooja H 1, S G Maknur 2 1 M.Tech Student, Dept. of Computer Science and Engineering, STJIT, Ranebennur (India) 2 Head of Department,
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR
ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR By: Dmitri Ilkaev, Stephen Pearson Abstract: In this paper we analyze the concept of grid programming as it applies to
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationIntel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
More informationA Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt kmahmoud@eg.ibm.com 2 Computer
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationIntegrating Web Messaging into the Enterprise Middleware Layer
The increasing demand for real-time data has companies seeking to stream information to users at their desks via the web and on the go with mobile apps. Two trends are paving the way: o Internet push/streaming
More informationHow To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz ens@ia.pw.edu.pl, akozakie@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of
More informationConfiguring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
More informationSwitch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
More informationOptimization of Computer Network for Efficient Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 10, OCTOBER 2015, 396 402 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Optimization
More informationUSING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET
USING OPNET TO SIMULATE THE COMPUTER SYSTEM THAT GIVES SUPPORT TO AN ON-LINE UNIVERSITY INTRANET Norbert Martínez 1, Angel A. Juan 2, Joan M. Marquès 3, Javier Faulin 4 {1, 3, 5} [ norbertm@uoc.edu, jmarquesp@uoc.edu
More informationWhat is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationQuality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
More informationIntegrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationPOWER ALL GLOBAL FILE SYSTEM (PGFS)
POWER ALL GLOBAL FILE SYSTEM (PGFS) Defining next generation of global storage grid Power All Networks Ltd. Technical Whitepaper April 2008, version 1.01 Table of Content 1. Introduction.. 3 2. Paradigm
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationThe Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
More informationMotivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
More informationTECHNICAL NOTE TNOI27
TECHNICAL NOTE TNOI27 Title: FTP Synchronization Product(s): G3, DSP and Enhanced Modular Controller ABSTRACT The purpose of this document is to describe the G3 s FTP feature and the configuration steps
More informationModeling of Corporate Network Performance and Smoothing Spline Interpolation
American Journal of Signal Processing 2014, 4(2): 60-64 DOI: 10.5923/j.ajsp.20140402.03 Modeling of Corporate Network Performance and Smoothing Spline Interpolation Ali Danladi 1,*, Silas N. Edwin 2 1
More information1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
More informationWIDESTAR II Base Station Maintenance and Monitoring System
WIDESTAR II Base Station Maintenance and Monitoring System Web Browser Conversion Occupied Band Service System Switching Control Special Articles on WIDESTAR II High-speed Mobile Satellite Communications
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationAn On-line Backup Function for a Clustered NAS System (X-NAS)
_ An On-line Backup Function for a Clustered NAS System (X-NAS) Yoshiko Yasuda, Shinichi Kawamoto, Atsushi Ebata, Jun Okitsu, and Tatsuo Higuchi Hitachi, Ltd., Central Research Laboratory 1-28 Higashi-koigakubo,
More informationChapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
More informationThe Integration Between EAI and SOA - Part I
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationPIE. Internal Structure
PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution
More informationClient/Server and Distributed Computing
Adapted from:operating Systems: Internals and Design Principles, 6/E William Stallings CS571 Fall 2010 Client/Server and Distributed Computing Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Traditional
More informationAchieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
More informationPerformance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
More informationAnalysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity
More informationIntroduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
More informationUniversal Event Monitor for SOA 5.2.0 Reference Guide
Universal Event Monitor for SOA 5.2.0 Reference Guide 2015 by Stonebranch, Inc. All Rights Reserved. 1. Universal Event Monitor for SOA 5.2.0 Reference Guide.............................................................
More informationInformation Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340
XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationCONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
More informationJoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Middleware for Heterogeneous and Distributed Information Systems
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Architecture Chapter Outline Distributed transactions (quick
More informationRS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
More informationNetwork Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
More informationApplication Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
More informationEvent-based middleware services
3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events
More informationLab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationEXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR
EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR Hao Wu Richard M. Fujimoto George Riley College Of Computing Georgia Institute of Technology Atlanta, GA 30332-0280 {wh, fujimoto, riley}@cc.gatech.edu
More informationENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationCOMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
More informationStorage at a Distance; Using RoCE as a WAN Transport
Storage at a Distance; Using RoCE as a WAN Transport Paul Grun Chief Scientist, System Fabric Works, Inc. (503) 620-8757 pgrun@systemfabricworks.com Why Storage at a Distance the Storage Cloud Following
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationDevelopment of 10 Gbits/s Traffic Shaper
Kenji Anzai, Kenji Yoshinaka, Hiroshi Harada, Koichi Ryu, Masaya Suzuki, Atsushi Saegusa, Masanao Kobayashi, Takayuki Sato, Ryota Watanabe [Summary] We developed the PureFlow GSX-XR as a high-precision
More informationAvaya P330 Load Balancing Manager User Guide
Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationPublic Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com
More informationHow To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
More informationData Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
More informationAN IMPROVED REAL-TIME TRAFFIC FLOW MONITORING SCHEME
AN IMPROVED REAL-TIME TRAFFIC FLOW MONITORING SCHEME Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department Electrical Engineering National University Singapore, Singapore 119260 Email: engp7450, eletck,
More informationEnterprise Integration Architectures for the Financial Services and Insurance Industries
George Kosmides Dennis Pagano Noospherics Technologies, Inc. gkosmides@noospherics.com Enterprise Integration Architectures for the Financial Services and Insurance Industries Overview Financial Services
More informationCombining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus
Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus Level: Advanced Jean-Louis Maréchaux (jlmarech@ca.ibm.com), IT Architect, IBM 28 Mar 2006 Today's business
More informationNetwork Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
More information