A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster
|
|
|
- Lorena Sparks
- 10 years ago
- Views:
Transcription
1 A Solution to the Network Chllenges of Dt Recovery in Ersure-coded Distributed Storge Systems: A Study on the Fcebook Wrehouse Cluster K V Rshmi, Nihr Shh, D Gu, H Kung, D Borthkur, K Rmchndrn
2 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO
3 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO
4 Need for Redundnt Storge Frequent unvilbility in dt- centers commodity components fil frequently solwre glitches, mintennce shutdowns, power filures Redundncy gives more relibility nd vilbility
5 Populr pproch: Replicon Mulple copies of dt cross mchines Eg, GFS, HDFS store 3 replics by defult block 1 block 2 block 3 block 4 b b Typiclly stored cross different rcks, b: dt blocks
6 Petbyte Scle dt: Replicon expensive Modertely sized dt: storge is chep replicon vible Mulple tens of PBs ggregte storge no longer chep replicon is expensive
7 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x
8 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures
9 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures
10 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures
11 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures
12 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: In generl: tolertes ny one filure lower MTTDL, high storge requirement tolertes ny two filures order of mgnitude higher MTTDL with much lesser storge
13 Ersure Codes Using RS codes insted of 3- replicon on less- frequently ccessed dt hs led to svings of mulple Petbytes in the Fcebook Wrehouse cluster
14 Reed- Solomon (RS) Codes (#dt, #prity) RS code: tolertes filure of ny #prity blocks these (#dt + #prity) blocks constute stripe Fcebook wrehouse cluster uses (10, 4) RS code Exmple: (2, 2) RS code b +b +2b #dt = 2 (dt blocks) #prity = 2 (prity blocks) 4 blocks in stripe
15 Why RS codes? Mximum possible fult- tolernce for storge overhed storge- cpcity opml mximum- distnce- seprble (MDS) (in coding theory prlnce) Flexibility in choice of prmeters Supports ny #dt nd #prity
16 Why RS codes? Mximum possible fult- tolernce for storge overhed storge- cpcity opml mximum- distnce- seprble (MDS) (in coding theory prlnce) Flexibility in choice of prmeters Supports ny #dt nd #prity However result in incresed downlod nd disk IO during dt recovery
17 Dt Recovery: Incresed downlod & disk IO Repliction block 1 block 2 block 3 b Downlod & IO 1x block 4 b
18 Dt Recovery: Incresed downlod & disk IO Repliction Reed-Solomon code block 1 block 2 block 3 b Downlod & IO 1x block 1 block 2 block 3 b +b b +b Downlod & IO 2x block 4 b block 4 +2b
19 Dt Recovery: Incresed downlod & disk IO Repliction Reed-Solomon code block 1 block 2 block 3 b Downlod & IO 1x block 1 block 2 block 3 b +b b +b Downlod & IO 2x block 4 b block 4 +2b In generl Downlod & IO required = #dt x (size of dt to be recovered)
20 Dt Recovery: Burden on TOR switches AS/Router TOR TOR TOR TOR b + + b 2b node 1 node 2 node 3 node 4 Burdens the lredy oversubscribed Top- of- Rck nd higher level switches
21 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO
22 Brief System Descripon HDFS cluster with mulple thousnds of nodes Mulple tens of PBs nd growing Dt immutble unl deleted Reducing storge requirements is of high importnce
23 Brief System Descripon HDFS cluster with mulple thousnds of nodes Mulple tens of PBs nd growing Dt immutble unl deleted Reducing storge requirements is of high importnce Uses (10, 4) RS code to reduce storge requirements on less- frequently ccessed dt Mulple PBs of RS coded dt
24 Brief System Descripon 256 Mbytes dt blocks block 1 block 2 block 10
25 Brief System Descripon dt blocks block 1 block 2 block 10 1 byte 256 Mbytes prity blocks block 11 block 14
26 Mchine Unvilbility Events From HDFS Nme- Node logs Logged when no hert- bet for > 15min Blocks mrked unvilble, periodic recovery process #mchine-unvilbility events logged" Dy" Medin of 50 mchine- unvilbility events logged per dy
27 Missing blocks per stripe # blocks missing in stripe % of stripes with missing blocks x x 10-9 Dominnt scenrio: Single block recovery
28 #Blocks Recovered & Cross- rck Trnsfers Medin of 180 TB trnsferred cross rcks per dy for recovery operons Around 5 mes tht under 3- replicon
29 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO
30 Piggybcking: Toy Exmple Step 1: Tke (2, 2) Reed- Solomon code dt blocks block 1 block b 1 b 2 prity blocks block 3 block b 1 +b 2 b 1 +2b 2 1 byte 1 byte
31 Piggybcking: Toy Exmple (In (2,2) RS code: recovery downlod & IO = 4 bytes) block 1 1 b 1 2 b b 1 +b 2 block 2 2 b 2 block b 1 +b 2 block b 1 +2b 2
32 Piggybcking: Toy Exmple Step 2: Add piggybcks to prity nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b No ddionl storge!
33 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b 2 + 1
34 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b
35 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 1 b 1 block 2 2 b 2 block b 1 +b 2 block b 1 +2b subtrct 1 2
36 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b b 1 b 2
37 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b 2 + 1
38 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 block 1 1 b 1 b 1 +b 2 block 2 2 b 2 b 1 +2b block b 1 +b 2 block b 1 +2b 2 + 1
39 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 subtrct block 1 1 b 1 b 1 +b 2 block 2 2 b 2 b 1 +2b block b 1 +b 2 block b 1 +2b 2 + 1
40 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 block 1 1 b 1 b 1 +b 2 block 2 block b 2 b 1 +b 2 b 1 +2b subtrct block b 1 +2b 2 + 1
41 Generl Piggybcking Recipe To construct Piggybcked- RS code: Step 1: Tke RS code with idencl prmeters Step 2: Add crefully designed funcons from one byte stripe on to nother retins sme fult- tolernce nd storge overhed piggybck funcons designed to reduce mount of downlod nd IO for recovery Generl theory nd lgorithms: KV Rshmi, Nihr Shh, K Rmchndrn, A Piggybcking Design Frmework for Red-nd Downlod-efficient Distributed Storge Codes, in IEEE Interntionl Symposium on Informtion Theory (ISIT) 2013
42 (10,4) Piggybcked- RS lternve to (10,4) RS currently used in HDFS
43 (10,4) Piggybcked- RS code Step 1: Tke (10, 4) Reed- Solomon code block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) f 3 (b 1,,b 10 ) f 4 (b 1,,b 10 ) 1 byte 1 byte
44 (10,4) Piggybcked- RS code Step 2: Add `Piggybcks block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) 1 byte 1 byte
45 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0)
46 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS
47 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS
48 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block 14 recover 1,, 10 like in RS 1 10 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 1 (0,,0, 4, 5, 6,0,,0) subtrct piggybcks (funcons of 1,, 10 ) f 4 (b 1,,b 10 ) + f 1 (0,,0, 7, 8, 9,0)
49 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 1 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 1 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS subtrct piggybcks (funcons of 1,, 10 ) recover b 1,,b 10 like in RS
50 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 block 13 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) block 14 f 4 ( 1,, 10 ) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0)
51 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0)
52 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS
53 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS
54 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 )
55 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 )
56 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 ) remove effect of 2 nd 3 to get 1
57 (10,4) Piggybcked- RS code block 1 1 b 1 block 2 2 b 2 Downlod & IO: block 3 3 b 3 block in RS 10 b in Piggybcked- RS block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 ) remove effect of 2 nd 3 to get 1
58 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 1,2,3
59 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 4,5,6
60 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 7,8,9
61 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of block 10
62 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS
63 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS Reduced recovery downlod & disk IO 30% less for single block recoveries in stripe potenl reducon >50TB cross- rck trffic per dy
64 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS Reduced recovery downlod & disk IO 30% less for single block recoveries in stripe potenl reducon >50TB cross- rck trffic per dy Recovery me: expect fster recovery need to connect to more nodes system limited by disk nd network bndwidth corroborted by preliminry experiments hence, expect higher MTTDL
65 Relted Work: Mesurements Exisng Studies Avilbility studies: Schroeder & Gibson 2007, Jing et l 2008, Ford et l 2010 etc Comprisons between replicon nd ersure codes: Rodrigues & Liskov 2005, Wetherspoon & Kubitowicz 2002 etc Our focus Incresed network trffic due to incresed downlods during recovery of ersure- coded dt Mesurements from Fcebook wrehouse cluster in producon
66 Relted Work: Codes for Efficient Dt Recovery Hung et l (Windows Azure) 2012, Sthimoorthy et l (Xorbs) 2013 dd ddionl pries: need extr storge Hu et l (NCFS) 2011 Network file system using repir- by- trnsfer codes (Shh et l): need extr storge Khn et l (Rotted- RS) 2012 #prity 3 (lso, #dt 36) Xing et l, Wng et l (Opmized RDP & EVENODD) 2010 #prity <=2 Our solu;on: Piggybcked- RS no ddionl storge: storge- cpcity opml ny #dt & #prity s good s or bezer thn Rotted- RS, opmized RDP & EVENODD
67 Summry nd Future Work Ersure codes require higher downlod & IO for recovery Mesurements from Fcebook wrehouse cluster in producon Piggybcked- RS: lternve to RS no ddionl storge required; sme fult- tolernce s RS 30% reducon in downlod & disk IO for recovery Future Work implementon in HDFS (in progress t UC Berkeley) empiricl evluon
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster
A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster K. V. Rashmi 1, Nihar B. Shah 1, Dikang Gu 2, Hairong Kuang
FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Enterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
How To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
How To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
Small Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
Performance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
Comp anies. Innova,ve. Promotion. a w n
Innov,ve Comp nies & Cloud u,ng Ake Edlund, PhD Project leder t KTH Cloud projects CEO Pwn Promo=on Cloud strtegies Strtup Evngelist Numeri, MySQL Cluster, Cycore SeOng the stge First: Wht is cloud compu=ng?
Humana Critical Illness/Cancer
Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert
Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
The Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
VoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
Application Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
Introducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A
Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM
Binary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
AntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
VoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
SCRIBE: A large-scale and decentralized application-level multicast infrastructure
!! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec
FortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
VoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
How To Reduce Telecommunictions Costs
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
Traffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
EasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
Graphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
EQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
VoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
VoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors
Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one
Data replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
Scalable Mining of Large Disk-based Graph Databases
Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon
Health insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
Human Pedigrees. Independent Assortment. Mendel s Second Law. Independent Assortment Test Cross. 4 phenotypes. Pedigree analysis:
Biology 2250 rinciples of Genetics nnouncements B2250 edings nd roblems Lb 3 Informtion: B2250 (Innes) webpge downlod nd print before lb. Virtul fly: log in nd prctice http://biologylb.wlonline.com/ Ch.
trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007
trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.
The CUBE. Thunderbolt and PCIe Expansion
Trnsform lptop in worksttion in The CUBE TM TM TM Thunderbolt PCIe Expnsion The CUBE mcube re trdemrks of One Stop Systems, Inc. All rights reserved. PCI Express PCIe re trdemrks of PCI-SIG. Thunderbolt
Engineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
How To Get A Free Phone Line From A Cell Phone To A Landline For A Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
Experiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
File Storage Guidelines Intended Usage
Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess
Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey
IN: 2277-3754 Interntionl Journl of Engineering nd Innovtive Technology (IJEIT) Energy Efficiency for Dt Center nd Cloud Computing: A Literture Review Abusfin Elgelny, Nder Nd udn University, Khrtoum,
Network Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
STRM Log Manager Installation Guide
Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper
IaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
Engineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t [email protected] nd t [email protected] Or visit our
VoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
Vectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
VoIP for the Small Business
Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified
JaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
Lectures 8 and 9 1 Rectangular waveguides
1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves
Factoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
VoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
A generic Decision Support System for integrated weed management
A generic Decision Support System for integrted weed mngement By: Per Rydhl, IPM Consult, Denmrk nd: Nicols Munier-Jolin (INRA), Frnce Robert Msin, University of Pdov, Itly Murizio Sttin (IBAF-CNR), Itly
How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
How To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
THERMAL EXPANSION OF TUNGSTEN
. THERMAL EXPANSION OF TUNGSTEN S515 By Peter Hidnert nd W. T. Sweeney ABSTRACT This pper gives the results of n investigtion on the therml expnsion of tungsten (99.98 per cent) over vrious temperture
Secure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,
WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
VMware Horizon Mirage Web Manager Guide
VMwre Horizon Mirge We Mnger Guide Horizon Mirge 4.3 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for
Student Access to Virtual Desktops from personally owned Windows computers
Student Aess to Virtul Desktops from personlly owned Windows omputers Mdison College is plesed to nnoune the ility for students to ess nd use virtul desktops, vi Mdison College wireless, from personlly
What is the closest Metro/Train or Bus station? The T - (www.the-t.com)
Are GABLES 411: Sutter Creek Where is the closest post office? Locted 5.3 miles from the community, t the intersection of E Prk Row Dr. nd New York Ave. Below is the ddress nd phone number for your reference.
Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
The Journal of Systems and Software
The Journl of Systems nd Softwre xxx (2008) xxx xxx Contents lists ville t ScienceDirect The Journl of Systems nd Softwre journl homepge: www.elsevier.com/locte/jss Energy-efficient rel-time oject trcking
Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach
Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives
Savvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery
Svvis IT Infrstructure Svvis SS Infrstructure Solutions Enterprise-clss Resources for SS Delivery Softwre-s--Service (SS) Cretes New Opportunities Originlly ppeling to mostly smller businesses, SS is now
Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
Warm-up for Differential Calculus
Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:
g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany
Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required
COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials
COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,
STATUS OF LAND-BASED WIND ENERGY DEVELOPMENT IN GERMANY
Yer STATUS OF LAND-BASED WIND ENERGY Deutsche WindGurd GmbH - Oldenburger Strße 65-26316 Vrel - Germny +49 (4451)/9515 - [email protected] - www.windgurd.com Annul Added Cpcity [MW] Cumultive Cpcity [MW]
Health insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
Morgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
