Context-Aware Prefetching at the Storage Server

Total Page:16

File Type:pdf, Size:1020Kb

Context-Aware Prefetching at the Storage Server Context-Aware Prefetching at the Storage Server Gokul Soundararajan, Madalin Mihailescu†, and Cristiana Amza Department of Electrical and Computer Engineering Department of Computer Science† University of Toronto Abstract repeatable non-sequential access patterns as well. How- ever, the storage system receives interleaved requests In many of today’s applications, access to storage con- originating from many concurrent application streams. stitutes the major cost of processing a user request. Thus, even if the logical I/O sequence of a particular ap- Data prefetching has been used to alleviate the stor- plication translates into physically sequential accesses, age access latency. Under current prefetching tech- and/or the application pattern is highly repeatable, this niques, the storage system prefetches a batch of blocks pattern may be hard to recognize at the storage system. upon detecting an access pattern. However, the high This is the case for concurrent execution of several ap- level of concurrency in today’s applications typically plications sharing a network attached storage, e.g., as leads to interleaved block accesses, which makes detect- shown in Figure 1, and also for a single application with ing an access pattern a very challenging problem. To- multiple threads exhibiting different access patterns, e.g., wards this, we propose and evaluate QuickMine, a novel, a database application running multiple queries, as also lightweight and minimally intrusive method for context- shown in the figure. aware prefetching. Under QuickMine, we capture ap- We investigate prefetching in storage systems and plication contexts, such as a transaction or query, and present a novel caching and prefetching technique that leverage them for context-aware prediction and improved exploits logical application contexts to improve prefetch- prefetching effectiveness in the storage cache. ing effectiveness. Our technique employs a context We implement a prototype of our context-aware tracking mechanism, as well as a lightweight frequent prefetching algorithm in a storage-area network (SAN) sequence mining [38] technique. The context tracking built using Network Block Device (NBD). Our proto- mechanism captures application contexts in an applica- type shows that context-aware prefetching clearly out- tion independent manner, with minimal instrumentation. performs existing context-oblivious prefetching algo- These contexts are leveraged by the sequence mining rithms, resulting in factors of up to 2 improvements in technique for detecting block access patterns. application latency for two e-commerce workloads with repeatable access patterns, TPC-W and RUBiS. In our context tracking mechanism, we simply tag each application I/O block request with a context iden- tifier corresponding to the higher level application con- 1 Introduction text, e.g., a web interaction, database transaction, appli- cation thread, or database query, where the I/O request In many of today’s applications, such as, e-commerce, to the storage manager occurs. Such contexts are readily on-line stores, file utilities, photo galleries, etc., access available in any application and can be easily captured. to storage constitutes the major cost of processing a We then pass this context identifier along with each read user request. Therefore, recent research has focused block request, through the operating system, to the stor- on techniques for alleviating the storage access latency age server. This allows the storage server to correlate the through storage caching [14, 23, 29] and prefetching block accesses that it sees into frequent block sequences techniques [24, 25, 35, 36, 37]. Many traditional storage according to their higher level context. Based on the de- prefetching algorithms implement sequential prefetch- rived block correlations, the storage cache manager then ing, where the storage server prefetches a batch of se- issues block prefetches per context rather than globally. quential blocks upon detecting a sequential access pat- At the storage server, correlating block accesses is per- tern. Recent algorithms, like C-Miner∗ [24, 25], capture formed by the frequent sequence mining component of USENIX Association USENIX ’08: 2008 USENIX Annual Technical Conference 377 our approach.approachh. In particular,particular, we design and implement a MySQL/InnoDB MySQL/InnoDB lightweight aand dynamic frequent sequence mining tech- 1 2 3 5 7 9 IV V VI II IX X nique, called QuicQuickMinekMine. Thread-1 Thread-2 Thread-3 Thread-4 Justlik likee state-of-the-arts prefetching algorithmsalggorithms [24, 25], QuicQuickMinekMMine detects sequential as wwell as non- Operating System Operating System sequential co correlationsorrelations using a history-based d mechani mechanism.sm. 1 2 5 7 3 9 IV II IX V X VI QuickMine’sQuickMine’s keykey noveltynovelty lies in detecting andannd leveragingleveraging VolumeVolume 1 VolumeVolume 2 block correla correlationsations within logical application n conte contexts.xts. In Consolidated Storage additionaddition, QuQuickMineuickMine generates and adapts block corre-corre 1 2 IV 5 II 7 IX 3 V X 9 VI lations incrincrementally,rementallyemmentallyy,, on-the-fly , through a lightweight mining algor algorithm.rithm. As we will sho showw in our e experi-xperi- mental e evaluation,valuuation, these no novelvel features mmak makee QuicQuick-k- Figure 1: InterleavedInterleaved Accesses. Accessess from con- Mine uniqueuniquelyely suitable for on-line pattern n mining and current processes/threadsproceesses/threads are interleavedinterleaved at the storagestorage prefetching bby i) substantially reducing the e footprint of server.server. the block cor correlationsrrelations it generates, ii) impro improvingvving the lik like-e- lihood that th thehe block correlations maintained d will lead to accurate pref prefetchesfetches and iii) pro providingviding fle flexibilityxiibility to dy- prefetches or ii)ii) non-repeatable (false)(ffalse)alse) block correlationscorrelations namic chang changesges in the application pattern, and concur concur-- at conte contextxt bou boundaries,undaries, hence useless prefetch h rules in the rencrencyy de degree.gree. contecontext-obliviousxt-obliviious approaches. Our e evaluationvaluationn sho showsws that WWee implem implementment QuicQuickMinekMine in a lightwe lightweighteight storage QuicQuickMinekMine gegeneratesenerates substantially more ef effectiveffectifefective block cache prototypeprototyype embedded into the NetworkNetworrk Block De- correlation ru rulesules o overall,verall, in terms of both the e number of vice (NBD) code. WWe e also implement se severalveral al alterna-terna- prefetches tri triggeredggered and the prefetching ac accuracy.curacy. WWe e titiveve approach approacheshes for comparison with our sch scheme,heme, includ- also sho showw tha thatat QuicQuickMinekMine is capable of adjus adjustingsting its cor cor-- ing a baseline e LR LRURUU cache replacement algor algorithmrithm with no relation rules dynamically dynamically,, without incurring undue o over-ver- prefetching, and the follo followingwing state-of-the state-of-the-arte-art conte context-xt- head for rapid rapidlydly changing patterns. obliobliviousvious pre prefetchingefetching schemes: tw twoo adapti adaptiveve se sequentialquential The rest of f this paper is or organizedganized as fo follows.llows. Sec- prefetching sschemes [10, 16] and the recen recentlyntly proposed tions 2 pro providesviddes the necessary background an andnd moti motivatesvates C-Miner∗ storagestoorage prefetching algorithm [24,[244, 25]. our dynamic, , conte context-awarext-aware algorithm. Se Sectionection 3 in- troduces our QQuicQuickMinekMine contecontext-awarext-aware prefe prefetchingetching solu- In our e experimentalxpperimental e evaluation,valuation, we use th threehree standard tition. SSection ti 4 pro providesvidesid ddetails t il of f our iimpl implementation.llementation.t ti database app applications:plications: the TPC-W e-comm e-commercemerce bench- Section 5 des describesscribes our e experimentalxperimental platfor platform,rm, method- mark [1], th thehe RRUBiS UBiS auctions benchmark k and DBT DBT-T-- ologyology,, other approaches in storage cache m managementanagement 2 [40], a TPC TPC-C-likeC-C-like benchmark [30]. The appli applicationscations that we e evaluatevaluate in our e experiments.xperiments. Section n 6 pres presentsents hahaveve a wide range of access patterns. TPC TPC-WC-W and RRU- U- our e experimentalxperimeental results. Section 7 discu discussesusses r relatedelated BiS are read- read-intensive-intensive w workloadsorkloads with high highlyly repe repeatableatable wworkork and Sec Sectionction 8 concludes the paper paper.. access patter patterns;rns; the theyy contain 80% and 85 85%% read-only transactions, respecti respectively,vely, in their w workloadorkload mix. In con- trast, DBT DBT-2T-2-2 is a write-intensi write-intensiveve applicat applicationionn with rapidly 2 BackgroundBackgrround andMoti Motivationvation changing acc accesscess patterns; it contains only 44% read-only transactions in its w workloadorkload mix. WWe e in instrumentstrument the WeWe focus on improvingimproving the cache hit rate att the storage MMySQL/InnoMySQL/InnoDBSQL/I oDBDB ddatabase t b engine i tto ttrack k th thehhe conte contextst xtst of f cache in a SA SANAN en environmentvironmentv through prefet prefetching.tching. Our interest. WWe e found that changing the DBMS S to incorpo- techniques arearre applicable to situations wherewherre the work-work-
Recommended publications
  • Comptia® Security+ SY0-601 Cert Guide
    CompTIA® Security+ SY0-601 Cert Guide Omar Santos Ron Taylor Joseph Mlodzianowski A01_Santos_Fm_pi-plii_1.indd 1 01/06/21 2:49 pm CompTIA® Security+ SY0-601 Cert Guide Editor-in-Chief Copyright © 2022 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the Executive Editor information contained herein. Although every precaution has been taken in Nancy Davis the preparation of this book, the publisher and author assume no respon- Development Editor sibility for errors or omissions. Nor is any liability assumed for damages Christopher A. Cleveland resulting from the use of the information contained herein. ISBN-13: 978-0-13-677031-2 Managing Editor ISBN-10: 0-13-677031-2 Sandra Schroeder Library of Congress Control Number: 2021935686 Senior Project Editor ScoutAutomatedPrintCode Tonya Simpson Copy Editor Trademarks Chuck Hutchinson All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Pearson IT Certification Indexer cannot attest to the accuracy of this information. Use of a term in this book Erika Millen should not be regarded as affecting the validity of any trademark or service mark. Proofreader Abigail Manheim Warning and Disclaimer Technical Editor Every effort has been made to make this book as complete and as accurate Chris Crayton as possible, but no warranty or fitness is implied.
    [Show full text]
  • S Strategic Plan for Genesi: North a America
    Page 1 of 24 Strategic Plan for Genesi: North America Genesi will be providing the San Antonio school district, in partnership with SA Yes, technology software products to incorporate technology into every aspect of the educational environment. The partnership with SA Yes will enable Genesi to provide packages that include a wireless mobile computing device for each educator and student, a productivity, communication, and presentation software for use as learning tools, and online instructional resources that supports studies in English language arts, mathematics, science, and social studies. The package will cost anywhere from $150 to $250 per student. The bundled packages will be discounted from the base cost and the partnership will help alleviate the cost of the school district. The computers will be given to each student to use throughout the entirety of the year. It will alleviate the hassle of carrying textbooks and notebooks. Insttead, the majority of the work will be completed and submitted to the teacher through thhe computer. The vision for educational technology has been encouraged by educators and leaders in recent years. Technology’s incorporation into the educational environment allows students to learn and creates environments that enhance teaching and learningg. It provides students a more personalized learning experience. Interactive technologies allow students to build new knowledge by doing, receiving feedback, and refining their understaannding. Technology immersion requires that curricular and assessment resources support the state’s curriculum. Currently, the majority of the software used in school districts is web-based and would not be affected by the Lennox operating system. Page 2 of 24 Strategic Business Plan for Genesi North America Team Members Parker Moore Hillary Adams Will Touchstone Tunggul Sitindjak Page 3 of 24 I.
    [Show full text]
  • Mobile App Version 7.18 This Documentation Is Provided Under Restrictions on Use and Are Protected by Intellectual Property Laws
    Mobile app Version 7.18 This documentation is provided under restrictions on use and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this documentation, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. © 2021 Creatio. All rights reserved. Table of Contents | 3 Table of Contents Get started with the mobile app setup 4 System requirements for mobile devices 4 Install the app 5 Mobile application settings 6 Message operation modes 8 Get started with the mobile app UI 11 Search records 14 Add records 15 Filter records 15 Edit records 18 Run actions 21 Approve records 22 Work with the mobile app calendar 23 View someone else's calendar 25 Add a task 25 Task actions 26 Work with dashboards in the mobile app 27 Work with service cases in the mobile app 29 Create a new case 31 Process a case 31 View processing history 33 Mobile application FAQ 34 Why won’t the mobile app sync in online mode (Error "Item% 24 batch not found)? 34 How to resolve the synchronization conflict in the offline mode? 34 How to clear the mobile app cache? 35 How can I set up push notifications for mobile application users? 36 © 2021 Creatio.
    [Show full text]
  • Our Approach and Platform for CRM Success
    See and serve your customers better ℠ Our approach and platform for CRM success Commercial Excellence | Customer Care | Systems Support March 2020 Contents What is a CRM strategy? Why commit to a CRM strategy? What does the CRM technology do? What is our preferred CRM platform? How might we help? How about a demo? 2 What is a CRM strategy? Commitment to knowing and serving your customers better A Commitment For better interaction with, insight upon, and value for your customers. CRM A Platform For collecting data, supporting workflow, providing insight, and connecting outwardly across marketing, sales, and service. Customer Relationship A Culture Management Of delivering a positive customer experience via interactions that are informed, timely, and useful. 3 Why commit to CRM? Value drivers across marketing, sales, and service Better messages, Better team allocation Faster offers, & win rates & orchestration cycle times Superior Informed & coordinated Consolidated service sales pursuits systems Robust & Better Better agility reliable data compliance & flexibility Full view Better customer Better efficiency of customer experience & satisfaction & effectiveness 4 What does the CRM technology do? Enablement of a CRM strategy, transformation, and culture Teams & Workflow 1 2 3 Marketing Sales Service Integrations for Integrations with External Interactions CRM Platform Enterprise Systems Website HR Email 1. Unified Data Storage Finance Social 2. Workflow for Front- Operations Line Users Partners Data Warehouse 3. Dashboards for Managers Accounts | Contacts | Interactions Contracts | Orders | Projects | Field Dispatch Activities | Campaigns | Opportunities Inquiries & Cases | Service Level Agreements Objective: Coordinated interactions, workflow, insight, and integrations 5 What is our preferred CRM Platform? (1 of 2) Cloud-based, low-code, high-value CRM and BPM Brand name prior to Oct.
    [Show full text]
  • AWS-Certified-Solutions-Architect
    100% Valid and Newest Version AWS-Certified-Solutions-Architect-Professional Questions & Answers shared by Certleader https://www.certleader.com/AWS-Certified-Solutions-Architect-Professional-dumps.html (398 Q&As) AWS-Certified-Solutions-Architect-Professional Dumps Amazon AWS Certified Solutions Architect Professional https://www.certleader.com/AWS-Certified-Solutions-Architect-Professional- dumps.html The Leader of IT Certification visit - https://www.certleader.com 100% Valid and Newest Version AWS-Certified-Solutions-Architect-Professional Questions & Answers shared by Certleader https://www.certleader.com/AWS-Certified-Solutions-Architect-Professional-dumps.html (398 Q&As) NEW QUESTION 1 An organization is planning to extend their data center by connecting their DC with the AWS VPC using the VPN gateway. The organization is setting up a dynamically routed VPN connection. Which of the below mentioned answers is not required to setup this configuration? A. The type of customer gateway, such as Cisco ASA, Juniper J-Series, Juniper SSG, Yamaha. B. Elastic IP ranges that the organization wants to advertise over the VPN connection to the VPC. C. Internet-routable IP address (static) of the customer gateway's external interface. D. Border Gateway Protocol (BGP) Autonomous System Number (ASN) of the customer gatewa Answer: B Explanation: The Amazon Virtual Private Cloud (Amazon VPC) allows the user to define a virtual networking environment in a private, isolated section of the Amazon Web Services (AWS) cloud. The user has complete control over the virtual networking environment. The organization wants to extend their network into the cloud and also directly access the internet from their AWS VPC. Thus, the organization should setup a Virtual Private Cloud (VPC) with a public subnet and a private subnet, and a virtual private gateway to enable communication with their data center network over an IPsec VPN tunnel.
    [Show full text]
  • Future Internet
    The European FIRE Initiative Overview and Potential Tridentcom 2009 Washington DC, US April 2009 Dr Max Lemke Deputy Head of Unit European Commission DG Information Society and Media New Infrastructure Paradigms and Experimental Facilities [email protected] .eu www.cordis.lu/fp7/ict/fire ••• 1 "The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission" Overview The global context for Future Internet Research European Future Internet Research (ICT) Research under “The Network of the Future” Research under “Future Internet Research and Experimentation” (FIRE) ••• 2 Terabyte networks Support investments: backward Comppylexity compatibilitcompatibility Mobility Technological Economic Need for (open) Internet of things standards Clean slate approaches Security for commer- cial services and Societal/Political applications European competitiveness on future Internet (act where market forces fail) Consumer protection / empowerment Social responsibility: preserve neutrality, openness, fairness, social role Ba lance the need for security/ account abilit y and the right to privacy ••• 3 Internet is evolving towards a Mobile Internet Smartphone shipments x1000 2100 1800 1500 Broadband llions) Subscription, 2/3 1200 mobile in 2012 900 600 ubscriptions (Mi ubscriptions S 300 0 2005 2006 2007 2008 2009 2010 2011 2012 Mobile Internet use generated over $5 billion in 2007, and accounted for $1.7 billion in Q1 of this year, i.e 33% increase. 400 Millions Mobile Internet users
    [Show full text]
  • Amazon Exam Questions AWS-Certified-Solutions-Architect-Professional Amazon AWS Certified Solutions Architect Professional
    Certshared now are offering 100% pass ensure AWS-Certified-Solutions-Architect-Professional dumps! https://www.certshared.com/exam/AWS-Certified-Solutions-Architect-Professional/ (398 Q&As) Amazon Exam Questions AWS-Certified-Solutions-Architect-Professional Amazon AWS Certified Solutions Architect Professional Guaranteed success with Our exam guides visit - https://www.certshared.com Certshared now are offering 100% pass ensure AWS-Certified-Solutions-Architect-Professional dumps! https://www.certshared.com/exam/AWS-Certified-Solutions-Architect-Professional/ (398 Q&As) NEW QUESTION 1 An organization is planning to extend their data center by connecting their DC with the AWS VPC using the VPN gateway. The organization is setting up a dynamically routed VPN connection. Which of the below mentioned answers is not required to setup this configuration? A. The type of customer gateway, such as Cisco ASA, Juniper J-Series, Juniper SSG, Yamaha. B. Elastic IP ranges that the organization wants to advertise over the VPN connection to the VPC. C. Internet-routable IP address (static) of the customer gateway's external interface. D. Border Gateway Protocol (BGP) Autonomous System Number (ASN) of the customer gatewa Answer: B Explanation: The Amazon Virtual Private Cloud (Amazon VPC) allows the user to define a virtual networking environment in a private, isolated section of the Amazon Web Services (AWS) cloud. The user has complete control over the virtual networking environment. The organization wants to extend their network into the cloud and also directly access the internet from their AWS VPC. Thus, the organization should setup a Virtual Private Cloud (VPC) with a public subnet and a private subnet, and a virtual private gateway to enable communication with their data center network over an IPsec VPN tunnel.
    [Show full text]
  • System Settings and Lookups Version 7.18 This Documentation Is Provided Under Restrictions on Use and Are Protected by Intellectual Property Laws
    System settings and lookups Version 7.18 This documentation is provided under restrictions on use and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this documentation, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. © 2021 Creatio. All rights reserved. Table of Contents | 3 Table of Contents Manage lookup values 4 Create new lookups 6 Creating lookups via Section Wizard 6 Adding a lookup based on an existing object 8 Manage system settings 9 Access the system settings 9 Change system setting value 11 Manage access to separate system settings 11 Description of system settings 12 Auto numbering of records 12 Updating contact ages 13 Administration 14 Business processes 16 Lock a user account 16 Approvals 17 Global Search 18 Process log 18 Applications 19 Values by default 19 Integration with external resources 21 Configuration 21 Mobile application 23 Email section settings 23 Cases 24 General 25 Send emails 27 Duplicate search 28 LDAP synchronization 28 Phone 31 Managing passwords 31 Manage files 33 Junk case filter 34 Finances 34 Chats 34 © 2021 Creatio. All rights reserved. Manage lookup values | 4 Manage lookup values PRODUCTS: ALL CREATIO PRODUCTS Most drop-down lists in Creatio draw their values from “lookups.” There is also a special “lookup” type of fields, where the user can select a record from a Creatio object.
    [Show full text]
  • Exam Questions AWS-Certified-Solutions-Architect- Professional Amazon AWS Certified Solutions Architect Professional
    Welcome to download the Newest 2passeasy AWS-Certified-Solutions-Architect-Professional dumps https://www.2passeasy.com/dumps/AWS-Certified-Solutions-Architect-Professional/ (398 New Questions) Exam Questions AWS-Certified-Solutions-Architect- Professional Amazon AWS Certified Solutions Architect Professional https://www.2passeasy.com/dumps/AWS-Certified-Solutions-Architect- Professional/ Passing Certification Exams Made Easy visit - https://www.2PassEasy.com Welcome to download the Newest 2passeasy AWS-Certified-Solutions-Architect-Professional dumps https://www.2passeasy.com/dumps/AWS-Certified-Solutions-Architect-Professional/ (398 New Questions) NEW QUESTION 1 By default, Amazon Cognito maintains the last-written version of the data. You can override this behavior and resolve data conflicts programmatically. In addition, push synchronization allows you to use Amazon Cognito to send a silent notification to all devices associated with an identity to notify them that new data is available. A. get B. post C. pull D. push Answer: D Explanation: By default, Amazon Cognito maintains the last-written version of the data. You can override this behavior and resolve data conflicts programmatically. In addition, push synchronization allows you to use Amazon Cognito to send a silent push notification to all devices associated with an identity to notify them that new data is available. Reference: http://aws.amazon.com/cognito/faqs/ NEW QUESTION 2 In the context of AWS IAM, identify a true statement about user passwords (login profiles). A. They must contain Unicode characters. B. They can contain any Basic Latin (ASCII) characters. C. They must begin and end with a fonrvard slash (/). D. They cannot contain Basic Latin (ASCII) characters.
    [Show full text]
  • Bpm'online Sales a Lead Can Be Created in the Following Ways: • Added Manually in the [Leads] Section
    Bpm’online sales Commerce package User guide Contents 1. Bpm’online sales overview ............................................................................................................................... 8 2. Bpm’online functionality .................................................................................................................................10 2.1. Bpm'online interface overview................................................................................................................ 11 2.2. Record pages .............................................................................................................................................14 2.3. Section analytics ........................................................................................................................................17 2.3.1. The “Chart” dashboard component...............................................................................................18 2.3.2. The “Metric” dashboard component.............................................................................................21 2.3.3. The “Gauge” dashboard component...........................................................................................22 2.3.4. The “List” dashboard component .................................................................................................23 2.3.5. The “Widget” dashboard component..........................................................................................24 2.3.6. The “Web page” dashboard component................................................................................24
    [Show full text]
  • Iot En El Sector Energético: Software De Monitorización Y Análisis De Variables Ambientales Y Energéticas
    TRABAJO DE FINAL DE CARRERA 16-1-2020 IOT EN EL SECTOR ENERGÉTICO: SOFTWARE DE MONITORIZACIÓN Y ANÁLISIS DE VARIABLES AMBIENTALES Y ENERGÉTICAS. GRADO EN INGENIERÍA DE LA ENERGÍA Autor: Ricardo Boriba Makuere Director: Joan Grau Barcelo Co-director: Javier Farreras de la Morena IOT EN EL SECTOR ENERGÉTICO. Resumen El presente documento está dividido en dos bloques: Bloque teórico: fundamentos teóricos del IoT para la fase experimental. En este bloque se explica todos los fundamentos teóricos necesarios para entender el concepto de Internet de las cosas o IoT como comúnmente se conoce y también se explica el conjunto de capas o tecnologías que se involucran en este concepto. Esta explicación teórica se hace con la finalidad de asentar las bases para poder entender mejor el segundo bloque que consiste en una fase más experimental. Bloque Experimental: creación de la Prueba de Concepto (PdC). En esta parte del documento se crean dos pruebas de concepto, es decir, se implementa de manera resumida e incompleta lo que se ha explicado en el bloque teórico, con la intención de verificar que el concepto de IoT es susceptible de ser explotado de manera más útil. La primera prueba de concepto creada se explica paso a paso y consiste en la creación de una página web en la que se visualiza mediante gráficos los datos capturados por un sensor de humedad y temperatura. Se trata de una página web sin servidor y utilizando tecnología de la computación en la nube y lenguajes de programación bastante conocidos como son Python, JavaScript, DynamoDB, etc. La segunda prueba de concepto, consiste en incluir más datos de sensores (Luxómetro, medidor de energía, calidad del aire y presión) en la plataforma anterior.
    [Show full text]
  • System Requirements Version 7.18 This Documentation Is Provided Under Restrictions on Use and Are Protected by Intellectual Property Laws
    System requirements Version 7.18 This documentation is provided under restrictions on use and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this documentation, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. © 2021 Creatio. All rights reserved. Table of Contents | 3 Table of Contents Client-side system requirements 4 Server-side system requirements 4 General guidelines 7 Connection channels 7 Requirements to servers for the Exchange Listener synchronization service 8 Software requirements 8 Deploying Creatio .NET Core application on Linux 9 © 2021 Creatio. All rights reserved. Client-side system requirements | 4 Client-side system requirements PRODUCTS: ALL CREATIO PRODUCTS Software products on the Creatio platform are web applications, so they do not require any installation on the client side. Users access the application via an Internet browser and required parameters of the customer’s computer must meet the requirements of the browser. The indicative characteristics: Monitor minimum 1280x768 resolution CPU Pentium G/J, AMD A6-7xxx 3.0 Ghz or higher RAM 4GB recommended 512 MB of free RAM is recommended during the work process HDD 500 MB free space is recommended Note. You can learn more about the recommended parameters for the mobile apps in the “System requirements for mobile devices” article.
    [Show full text]