User-Activity Aware Strategies for Mobile Information Access

Total Page:16

File Type:pdf, Size:1020Kb

User-Activity Aware Strategies for Mobile Information Access USER-ACTIVITY AWARE STRATEGIES FOR MOBILE INFORMATION ACCESS A Thesis Presented to The Academic Faculty by Tae-Young Chang In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School of Electrical and Computer Engineering Georgia Institute of Technology April 2008 USER-ACTIVITY AWARE STRATEGIES FOR MOBILE INFORMATION ACCESS Approved by: Professor Raghupathy Sivakumar, Professor Magnus Egerstedt Advisor School of Electrical and Computer School of Electrical and Computer Engineering Engineering Georgia Institute of Technology Georgia Institute of Technology Professor George Riley Professor Umakishore Ramachandran School of Electrical and Computer College of Computing Engineering Georgia Institute of Technology Georgia Institute of Technology Professor Chuanyi Ji Date Approved: January 9, 2008 School of Electrical and Computer Engineering Georgia Institute of Technology To my family iii ACKNOWLEDGEMENTS I would like to acknowledge many people for helping me during my doctoral work. First of all, I would like to extend my sincere gratitude and appreciation to my advisor, Professor Raghupathy Sivakumar, for his assistance, advice, and support during my study. Throughout my doctoral work, he encouraged me to develop independent thinking and research skills. He continually stimulated my analytical thinking and greatly assisted me with scientific writing. I would like to thank Prof. George Riley and Prof. Chuanyi Ji for serving on my proposal and dissertation committees. I also thank Prof. Magnus Egerstedt and Prof. Umakishore Ramachandran for serving on the dissertation committee. They gave valuable opinions during the preparation and presentation of this dissertation, and I am deeply thankful to them. I thank the present and past members of the GNAN research group for their warm advice and support. Special thanks to Aravind, Zhenyun, Karthik and Kyu-Han for their collaboration in my research. My thanks also go out to Ashraf, Hung-Yun, Seung-Jong, Ram, Yujie for their friendship and assistance. Sandeep, Sriram, and Cheng-Lin shared their constructive comments on my research, and I wish to thank them. I thank Dr. Yeonsik Jeong for his valuable advice. My very special thanks to my parents and sisters. Their unwavering faith and confidence in my abilities is what has shaped me to be the person I am today. Finally, I woud like to thank my wife, Yejin, and my daughter, Katherine Yuna for their loving support, encouragement, and sacrifice during my study. iv TABLE OF CONTENTS DEDICATION ....................................... iii ACKNOWLEDGEMENTS ................................ iv LISTOFTABLES .................................... ix LISTOFFIGURES .................................... x SUMMARY......................................... xii I INTRODUCTION.................................. 1 II MOTIVATIONANDRELATEDWORKS . 4 2.1 ProblemSetting ................................ 4 2.2 Challenges ................................... 5 2.2.1 Greedy Content Fetching . 5 2.2.2 Non-Linearity in Size between User-Activity and File Update . 6 2.3 RelatedWorks ................................. 6 2.3.1 MobileFileSystems .......................... 6 2.3.2 Thin-ClientComputing . 8 2.3.3 WebCharacteristics .......................... 9 2.3.4 WebCaching.............................. 9 2.3.5 Prefetching............................... 11 2.3.6 Transcoding .............................. 12 III CONTRIBUTIONSANDOVERVIEW . 15 IV APPLICATION-UNAWARE READ ACCESS FOR NON-PARTITIONABLECONTENT . 19 4.1 Introduction .................................. 19 4.2 Motivation ................................... 20 4.2.1 Not all content is always seen by users . 21 4.2.2 Users suffer when response times are large . 23 4.2.3 Larger file transmissions suffer from frequent disconnections . 24 4.2.4 Greedy transmission makes network utilization inefficient . 25 4.3 Application-unaware content partitioning . ........ 26 v 4.3.1 Graphical-domain content partitioning . 26 4.3.2 Thin-clientcomputing. 29 4.4 Cut-LoadArchitecture. 35 4.4.1 Dynamic Mode Selection . 36 4.4.2 OpportunisticHoarding. 40 4.4.3 ModeTransfer ............................. 43 4.4.4 Integrated Operation . 44 4.5 PerformanceEvaluation . 44 4.5.1 SimulationSetup............................ 44 4.5.2 Impact of thin-screen data size . 46 4.5.3 Impact of network characteristics . 48 4.5.4 Impactofweight............................ 51 4.5.5 PrototypeStrawman ......................... 52 4.6 Summary.................................... 54 V APPLICATION-AWARE READ ACCESS FOR PARTITIONABLECONTENT . .. .. .. .. .. .. .. 55 5.1 Introduction .................................. 55 5.2 Motivation ................................... 56 5.2.1 Web Access Model and Simulation Setup . 56 5.2.2 Screen Contention Problem . 59 5.2.3 Bandwidth Underutilization Problem . 62 5.2.4 Summary................................ 64 5.3 OverviewofSolution.............................. 64 5.4 ObjectPrioritization(OP) . 66 5.4.1 Initial Object Prioritization . 67 5.4.2 Selective Object Fetching . 68 5.4.3 Re-prioritization ............................ 68 5.4.4 AnalyticalModel ........................... 69 5.5 ObjectsReordering(OR) . 69 5.5.1 InitialObjectsAssignment . 69 5.5.2 DynamicObjectsRescheduling. 70 vi 5.5.3 TCP-awareObjectsReordering . 71 5.5.4 AnalyticalModel ........................... 72 5.6 Connection Management (CM) . 73 5.6.1 Per-Connection Load Estimation . 73 5.6.2 Dynamic Connection Assignment . 73 5.6.3 AnalyticalModel ........................... 74 5.7 SimulationResults............................... 75 5.7.1 SimulationSetup............................ 75 5.7.2 Impact of Object Characteristics . 76 5.7.3 Impact of Number of Connections and Servers . 77 5.7.4 Impact of Network Characteristics . 77 5.7.5 ImpactofFastScroll ......................... 78 5.8 PrototypeImplementation . 79 5.8.1 Background: Architectural Overview of Web Browser . ..... 79 5.8.2 PrototypeDesign ........................... 81 5.8.3 PerformanceResults. .. .. .. .. .. .. .. 82 5.9 Summary.................................... 84 VI USER-ACTIVITY SHIPPING FOR FILE SYNCHRONIZATION . 86 6.1 Introduction .................................. 86 6.2 Motivation ................................... 87 6.3 ArchitectureofMimic . .. .. .. .. .. .. .. .. 90 6.3.1 OverviewofMimic........................... 90 6.3.2 Message Optimization . 92 6.3.3 Integration with File System . 95 6.4 ClientOperationsinMimic . 97 6.4.1 Decision of Mimic Operation . 97 6.4.2 AR Header Generation . 98 6.4.3 MessageCapture............................ 99 6.4.4 Termination .............................. 100 6.4.5 Bookkeeping .............................. 101 6.5 ServerOperationsinMimic. 102 vii 6.5.1 Decision of Playback Operation . 102 6.5.2 Initialization .............................. 102 6.5.3 ActivityPlayback .. .. .. .. .. .. .. .. 103 6.5.4 File Verification . 104 6.6 PerformanceEvaluation . 105 6.6.1 PrototypeDescription. 105 6.6.2 ExperimentalSetup . 108 6.6.3 TransferSizePerformance . 109 6.6.4 LatencyPerformance . 115 6.6.5 SystemOverheads .. .. .. .. .. .. .. .. 117 6.6.6 User statistics and expected results . 117 6.7 Summary.................................... 120 VII CONCLUSIONS................................... 121 REFERENCES....................................... 123 VITA ............................................ 131 viii LIST OF TABLES 1 An example of content classification. 38 2 Web statistics of Top 50 Web Sites. 58 3 Comparison between diff andactivitysize.. 89 4 Application index for experiments. 106 5 User activity index for experiments. 107 6 Statistics of insertion, modification, and deletion in the test. 118 7 Expected transfer-size reductions from insertion, modification, and deletion. 118 8 Frequency of copying and meta-data change in the test. ....... 119 9 Expected transfer-size reductions from copy-and-paste and meta-data change. 119 ix LIST OF FIGURES 1 TransfersizeinHTML. ............................. 22 2 TransfersizeinAcrobat............................. 22 3 TransfersizeinWord. .............................. 22 4 ResponsetimeinHTML. ............................ 22 5 ResponsetimeinAcrobat............................. 22 6 ResponsetimeinWord. ............................. 22 7 Bandwidthwastage. ............................... 25 8 Time-outrate. .................................. 26 9 Thin-clientcomputingmodel. 29 10 TransfersizeinWLAN. ............................. 31 11 ResponsetimeinWLAN. ............................ 32 12 ResponsetimeinWWAN............................. 32 13 Average transfer size for 10 sample pictures. ........ 33 14 Transfer size of localized computing. ...... 33 15 Cut-Load architecture overview. 35 16 Transmissioninthickmode.. 41 17 Transmissionindualmode. 41 18 Pseudo code for the integrated operation. ...... 45 19 PDF of document and thin-screen data size. ..... 47 20 Per-screenresponsetimeinCut-Load. ..... 47 21 CumulativeresponsetimeinCut-Load. 49 22 ImpactofbandwidthinCut-Load . 50 23 ImpactofframelossrateinCut-Load . 50 24 ImpactofweightinCut-Load . 51 25 Cut-Loadprototype. ............................... 52 26 Experimental results of Cut-Load prototype. ....... 53 27 Typical network topology for Web access. ..... 57 28 Object fetching sequence at amazon.com. ................... 60 29 Fetching with screen contention in a conventional Web browser........ 60 x 30 Fetching without screen contention in an ideal Web browser. ........ 61 31 Impactofscreencontention.. 61 32 Fetching with synchronized ending time in ideal
Recommended publications
  • Managing the Performance Impact of Web Security
    Electronic Commerce Research, 5: 99–116 (2005) 2005 Springer Science + Business Media, Inc. Manufactured in the Netherlands. Managing the Performance Impact of Web Security ADAM STUBBLEFIELD and AVIEL D. RUBIN Johns Hopkins University, USA DAN S. WALLACH Rice University, USA Abstract Security and performance are usually at odds with each other. Current implementations of security on the web have been adopted at the extreme end of the spectrum, where strong cryptographic protocols are employed at the expense of performance. The SSL protocol is not only computationally intensive, but it makes web caching impossible, thus missing out on potential performance gains. In this paper we discuss the requirements for web security and present a solution that takes into account performance impact and backwards compatibil- ity. Keywords: security, web performance scalability, Internet protocols 1. Introduction Security plays an important role in web transactions. Users need assurance about the au- thenticity of servers and the confidentiality of their private data. They also need to know that any authentication material (such as a password or credit card) they send to a server is only readable by that server. Servers want to believe that data they are sending to paying customers is not accessible to all. Security is not free, and in fact, on the web, it is particularly expensive. This paper focuses on managing the performance impact of web security. The current web security standard, SSL, has a number of problems from a performance perspective. Most obviously, the cryptographic operations employed by SSL are computationally expensive, especially for the web server. While this computational limitation is slowly being overcome by faster processors and custom accelerators, SSL also prevents the content it delivers from being cached.
    [Show full text]
  • Direct Internet 3 User Manual for the Windows Operating Systems
    DIRECT INTERNET 3 User Manual for the Mac OS® Operating System Iridium Communications Inc. Rev. 2; October 29, 2010 Table of Contents 1 OVERVIEW ............................................................................................................................................1 2 HOW IT WORKS ....................................................................................................................................1 3 THE DIAL-UP CONNECTION ...............................................................................................................2 3.1 Connect ..........................................................................................................................................2 3.2 Disconnect .....................................................................................................................................5 4 DIRECT INTERNET 3 WEB ACCELERATOR ......................................................................................6 4.1 Launch ...........................................................................................................................................6 4.2 The User Interface Menu ...............................................................................................................7 4.3 Start and Stop ................................................................................................................................8 4.4 Statistics .........................................................................................................................................9
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Performance Analysis of a Client-Side Caching/Prefetching System for Web Traffic
    1 Performance Analysis of a Client-Side Caching/Prefetching System for Web Traffic Abdullah Balamash and Marwan Krunz Department of Electrical & Computer Engineering University of Arizona Tucson, AZ 85721 fbalamash,[email protected] Philippe Nain INRIA 06902 Sophia Antipolis, France [email protected] Abstract Network congestion remains one of the main barriers to the continuing success of the Internet. For Web users, congestion manifests itself in unacceptably long response times. One possible remedy to the latency problem is to use caching at the client, at the proxy server, or within the Internet. However, Web documents are becoming increasingly dynamic (i.e., have short lifetimes), which limits the potential benefit of caching. The performance of a Web caching system can be dramatically increased by integrating document prefetching (a.k.a. “proactive caching”) into its design. Although prefetching reduces the response time of a requested document, it also increases the network load, as some documents will be unnecessarily prefetched (due to the imprecision in the prediction algorithm). In this study, we analyze the confluence of the two effects through a tractable mathematical model that enables us to establish the conditions under which prefetching reduces the average response time of a requested document. The model accommodates both passive client and proxy caching along with prefetching. Our analysis is used to dynamically compute the “optimal” number of documents to prefetch in the subsequent client’s idle (think) period. In general, this optimal number is determined through a simple numerical procedure. Closed-form expressions for this optimal number are obtained for special yet important cases.
    [Show full text]
  • Web Acceleration Mechanics
    Web Acceleration Mechanics Alexander Krizhanovsky Tempesta Technologies, Inc. [email protected] Who am I? CEO at Tempesta Technologies, INC Custom software development since 2008: ● Network security: WAF, VPN, DPI etc. e.g. Positive Technologies AF, “Visionar” Gartner magic quadrant’15 ● Databases: one of the top MariaDB contributors ● Perfomance tuning Tempesta FW – Linux Application Delivery Controller Tempesta FW: Application Delivery Controller (ADC) Web accelerator Load balancing Backend connections management TLS termination Protocol downgrade Cache responses Agenda & Disclaimer Mechanics: ● HTTP connections & messages management ● HTTP decoders & parsers ● Web caches ● Network I/O ● Multitasking ● TLS The web accelerators are mentioned only as implementation examples Some software is just more familiar to me HTTP connections & messages management Server connections New connections or persistent connections (usual) HTTP keep-alive connections Keep-Alive: timeout=5, max=10000 Reestablish closed KA connection New connections if all are busy N backend connections = N backend requests in-flight DDoS and flash crowds: as many server connections as client connections Run out of port numbers HTTP/1 message pipelining Mostly unused by proxies Squid, Tempesta FW, Polipo Messages multiplexing Forwarding and reforwarding issues Security issues ● Breaking authentication ● HTTP Response splitting HTTP Response Splitting attack (Web cache poisoning) [CRLF CRLF] Client: /redir_lang.jsp?lang=foobar%0d%0aContent-Length:%200%0d%0a%0d%0a HTTP/1.1%20200%20OK%0d%0aContent-Type:%20text/html%0d%0a
    [Show full text]
  • The Medusa Proxy a Tool for Exploring User-Perceived Web Performance
    The Medusa Proxy A Tool For Exploring User-Perceived Web Performance Mimika Koletsou and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego 9500 Gilman Dr., MS 0114 La Jolla, CA 92093-0114 USA g fkoletsou,voelker @cs.ucsd.edu Abstract example, it is not uncommon for users to believe that Web caches impose noticeable overhead to browsing, or for content distribu- In this paper we describe the Medusa proxy, a tool for explor- tion network (CDN) companies such as Akamai [1] to make ag- ing user-perceived Web performance. The Medusa proxy is a gressive claims about improvements in download performance. non-caching forwarding proxy used in conjunction with a user’s Currently, though, there is no convenient way for users to vali- browser. The two key features that the Medusa proxy provides date those beliefs or claims. are (1) the ability to simultaneously mirror HTTP requests from Characterizing user-perceived Web performance is challenging the browser to different Web delivery systems and directly com- because of the difficulty of generalizing conclusions about per- pare the results, and (2) the ability to transform requests, e.g., to formance results across a wide range of user environments and transform Akamai URLs back into URLs to the customer’s origin network locations. Rather than try to generalize our conclusions server. across a diverse group of users, we have developed the Medusa We show how the Medusa proxy can be used to explore user- proxy as a convenient tool with which individual users can ex- perceived Web performance using two experiments that deter- plore their Web performance, and the impact of various Web de- mine (1) to what extent using large-scale caching systems like livery systems on that performance, from their desktop.
    [Show full text]
  • Web Cache for Grid HTTP Access
    Web cache for grid HTTP access Duarte Meneses Fabrizio Furano [email protected] [email protected] April 1, 2014 1 1 Introduction Sites have usually several jobs and people accessing files in the grid. Even though files are often on site, these files may come from several storage elements, which can be located at any other site. Due to recent developments, many storage elements have currently an HTTP interface, implemented for example, with XRootd or with a WebDAV server. Thus, the files can be accessed with this widely known protocol using any HTTP client, instead of forcing the usage of grid-specific protocols. The use of HTTP could also enable easy caching of data using existing web caching products. In this document we explore further this possibility. The HTTP resources (files) can be re-fetched several times within the same site, ei- ther by the same user or not. This can be especially frequent with batch jobs, that pull periodically the same files from the network. To optimize the access to the data and reduce the load in the network, we are in- vestigating potential advantages and implications of deploying HTTP caches at the sites. Accessing a cached file within the site could bring a significant performance boost, pactic- ularly for sites that constantly consume external resources, i.e. resources located in other sites. Using web caches is a solution adopted often by websites for optimizing the access to it by caching its contents (possibility at several locations, close to the users). These web caches are deployed in reverse mode, and the DNS is usually pointed to it.
    [Show full text]
  • Tempesta FW Linux Application Delivery Controller
    Tempesta FW Linux Application Delivery Controller Alexander Krizhanovsky Tempesta Technologies, Inc. [email protected] Who am I? CEO & CTO at Tempesta Technologies (Seattle, WA) Developing Tempesta FW – open source Linux Application Delivery Controller (ADC) Custom software development in: ● high performance network traffic processing e.g. WAF mentioned in Gartner magic quadrant ● Databases e.g. MariaDB SQL System Versioning is coming soon (https://github.com/tempesta-tech/mariadb_10.2) Challenges Usual Web accelerators aren’t suitable for HTTP filtering Kernel HTTP accelerators are better, but they’re dead => need a hybrid of HTTP accelerator and a firewall ● Very fast HTTP parser to process HTTP floods ● Very fast Web cache to mitigate DDoS which we can’t filter out ● Network I/O optimized for massive ingress traffic ● Advanced filtering abilities at all network layers L7 DDoS mitigation Web accelerator? Application Delivery Controller (ADC) Use cases CMSes, CDNs, virtual hostings, heavy loaded Web sites, OEMs in Web security etc. Usual ADC cases: ● When you need performance ● Web content acceleration ● Web application protection ● HTTP load balancing Application layer DDoS Service from Cache Rate limit Nginx 22us 23us (Additional logic in limiting module) Fail2Ban: write to the log, parse the log, write to the log, parse the log… Application layer DDoS Service from Cache Rate limit Nginx 22us 23us (Additional logic in limiting module) Fail2Ban: write to the log, parse the log, write to the log, parse the log… - really in 21th century?! tight integration of Web accelerator and a firewall is needed Web-accelerator capabilities Nginx, Varnish, Apache Traffic Server, Squid, Apache HTTPD etc.
    [Show full text]
  • Optimasi Apache Web Server Menggunakan Varnish Web Cache Dan Reverse Proxy Nginx
    OPTIMASI APACHE WEB SERVER MENGGUNAKAN VARNISH WEB CACHE DAN REVERSE PROXY NGINX Skripsi disusun sebagai salah satu syarat untuk memperoleh gelar Sarjana Komputer Program Studi Teknik Informatika Oleh Anindya Putri Arunawati 4611416030 JURUSAN ILMU KOMPUTER FAKULTAS MATEMATIKA DAN ILMU PENGETAHUAN ALAM UNIVERSITAS NEGERI SEMARANG 2020 ii iii iv MOTTO DAN PERSEMBAHAN MOTTO • Jika yang dapat kau lakukan hanyalah merangkak, maka mulailah merangkak (Rumi) • Semakin dia yakin kepada Allah, semakin sedikit dia mengeluh dalam hidupnya (ust. Hanan Attaki) • Jangan pernah lelah untuk berdoa dan percayakan semuanya pada Allah, Allah yang mengatur segalanya (Anindya) PERSEMBAHAN Skripsi ini saya persembahkan kepada: • Kedua Orang Tua saya Bapak Achmad Daserun dan Ibu Watini yang telah mencurahkan keringatnya untuk membiayai pendidikan saya, yang selalu memberikan kasih sayang, doa, dan dukungannnya. • Adik saya, Hilal Hubdin yang telah memberikan dukungan serta doa yang terus dipanjatkan. • Teman-teman saya di jurusan Ilmu Komputer, Fakultas MIPA, serta teman-teman di Universitas Negeri Semarang. • Semua pihak yang tidak dapat disebutkan satu persatu yang telah membantu hingga terselesaikannya penulisan skripsi ini. • Almamater, Universitas Negeri Semarang. v PRAKATA Puji syukur penulis panjatkan kepada Allah Subhanahu wa ta'ala atas berkat rahmat dan hidayah-Nya penulis dapat menyelesaikan skripsi yang berjudul “Optimasi Apache Web Server Menggunakan Varnish Web Cache Dan Reverse Proxy Nginx”. Penulis menyadari bahwa penulisan skripsi ini tidak akan selesai tanpa adanya dukungan serta bantuan dari berbagai pihak. Oleh karena itu, penulis ingin menyampaikan ucapan terima kasih kepada: 1. Prof. Dr. Fathur Rokhman, M.Hum., Rektor Universitas Negeri Semarang. 2. Dr. Sugianto M.Si., Dekan Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Negeri Semarang.
    [Show full text]
  • Performance Evaluation of Raspberry Pi 3B As a Web Server
    Performance evaluation of Raspberry pi 3B as a web server Meron Istifanos and Israel Tekahun 18-06-2020 Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Tech- nology in partial fulfillment of the requirements for the bachelor’s degree in software engineering. The thesis is equivalent to 10 weeks of full-time studies. Contact Information: Author(s): Meron Istifanos E-mail: [email protected] Israel Tekahun E-mail: [email protected] University advisor: Dr. Michel Nass Department of Software Engineering Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE-371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 Abstract Context. During the usage of a product, evaluating its performance quality is a crucial procedure. Web servers are one of the most used technological products in today’s modern world[1]. Thus, in this thesis we will evaluate and compare the performances of two web servers. The servers that are tested in the experiment are a raspberry pi 3B and a personal HP laptop. Objectives. The main objective of the study is to evaluate the performance of a raspberry pi 3B as a web server. In order to give a clearer image of how the rasp- berry pi performs, the laptop will also be evaluated and its performance will be used as a contrast during the study. Realization. To fulfill our objective, an experiment was conducted with the help of a performance testing tool called apache bench.
    [Show full text]
  • SO De Xarxes D'àrea Local
    Gestió de xarxes d’àrea local TEMA 3: S.O. De Xarxes d'Àrea Local Introducció SO de Xarxes 3 Introducció......................................................................................................................4 3.0 Instal·lació d'un SO Lan..........................................................................................4 3.0.1 Instal·lació de Linux .......................................................................................5 3.0.1.1 Instal·lació amb els Cds o el DVD..........................................................5 3.0.1.2 sense Cds.................................................................................................5 3.1 Instal·lació d’una LAN............................................................................................6 3.1.1 LAN en DOS...................................................................................................6 3.1.2 LAN en Windows...........................................................................................7 3.1.21 Configuració TCP/IP des de consola......................................................13 3.1.3 LAN en Linux...............................................................................................14 3.1.3.1 LAN sense fils en Linux........................................................................18 3.2 Configuració automàtica de xarxes.......................................................................21 3.2.1 Bootstrap protocol.........................................................................................21
    [Show full text]
  • A Ground-Up Approach to High-Throughput Cloud Computing
    Università degli Studi di Torino Scuola di Dottorato in Scienze ed Alte Tecnologie XXVI ciclo Tesi di Dottorato A ground-up approach to High-Throughput Cloud Computing in High-Energy Physics Dario Berzano Relatore Correlatori Prof. Massimo Masera Dott. Gerardo Ganis Università degli Studi di Torino CERN Dott. Stefano Bagnasco INFN Torino CERN-THESIS-2014-376 16/04/2014 Controrelatore Prof. Marco Paganoni Università degli Studi di Milano-Bicocca Anno Accademico 2012–2013 «Simplicity is the ultimate sophistication.» Apple II commercial (1977) Table of Contents 1 Virtualization and Cloud Computing in High Energy Physics 13 1.1 Computing in the LHC era . 13 1.1.1 Hierarchy of computing centres . 16 1.1.2 Event processing paradigm . 17 1.1.3 Analysis framework and data format: ROOT . 18 1.1.4 The ALICE Experiment . 19 1.2 Virtualization and Cloud Computing . 21 1.2.1 State of the art . 23 1.3 From the Grid to clouds? . 25 1.3.1 Grid over clouds and more . 26 1.4 Overview of this work . 27 2 Building a Private Cloud out of a Grid Tier-2 29 2.1 Overview of the INFN Torino Computing Centre . 29 2.1.1 Grid VOs and ALICE . 30 2.2 Rationale of the Cloud migration . 32 2.2.1 No performance loss through virtualization . 32 2.2.2 Abstraction of resources in the Grid and the cloud . 32 2.2.3 Harmonization of diverse use cases in a private cloud . 33 2.2.4 IaaS: separating administrative domains . 34 2.2.4.1 Virtual farm administrator .
    [Show full text]