scholarly journals Network Measurement and Performance Analysis at Server Side

2018 ◽  
Vol 10 (7) ◽  
pp. 67 ◽  
Author(s):  
Guang-Qian Peng ◽  
Guangtao Xue ◽  
Yi-Chao Chen

Network performance diagnostics is an important topic that has been studied since the Internet was invented. However, it remains a challenging task, while the network evolves and becomes more and more complicated over time. One of the main challenges is that all network components (e.g., senders, receivers, and relay nodes) make decision based only on local information and they are all likely to be performance bottlenecks. Although Software Defined Networking (SDN) proposes to embrace a centralize network intelligence for a better control, the cost to collect complete network states in packet level is not affordable in terms of collection latency, bandwidth, and processing power. With the emergence of the new types of networks (e.g., Internet of Everything, Mission-Critical Control, data-intensive mobile apps, etc.), the network demands are getting more diverse. It is critical to provide finer granularity and real-time diagnostics to serve various demands. In this paper, we present EVA, a network performance analysis tool that guides developers and network operators to fix problems in a timely manner. EVA passively collects packet traces near the server (hypervisor, NIC, or top-of-rack switch), and pinpoints the location of the performance bottleneck (sender, network, or receiver). EVA works without detailed knowledge of application or network stack and is therefore easy to deploy. We use three types of real-world network datasets and perform trace-driven experiments to demonstrate EVA’s accuracy and generality. We also present the problems observed in these datasets by applying EVA.

2021 ◽  
pp. 73-82
Author(s):  
Dorina Bano ◽  
Tom Lichtenstein ◽  
Finn Klessascheck ◽  
Mathias Weske

Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.


Author(s):  
Kostas N. Oikonomou ◽  
Rakesh K. Sinha ◽  
Robert D. Doverspike

The authors describe a methodology for evaluating the performability (combined performance and reliability) of large communications networks. Networks are represented by a 4-level hierarchical model, consisting of traffic matrix, network graph, “components” representing failure modes, and reliability information. Network states are assignments of modes to the network components, which usually represent network elements and their key modules, although they can be more abstract. The components can be binary or multi-modal, and each of their failure modes may change a set of attributes of the graph (e.g. the capacity or cost of a link). Their methodology also captures the effect of automatic restoration against network failures by including two common rerouting methods. To compute network performability measures, including upper and lower bounds on their cumulative distribution functions, we augment existing probabilistic state-space generation algorithms with our new “hybrid” algorithm. To characterize the network failures of highest impact, we compute the Pareto boundaries of the network’s risk space. The authors have developed a network analysis tool called nperf that embodies this methodology. To illustrate the methodology and the practicality of the tool, they describe a performability analysis of three design alternatives for a large commercial IP backbone network. [Article copies are available for purchase from InfoSci-on-Demand.com]


2020 ◽  
Vol 12 (2) ◽  
pp. 135-148
Author(s):  
Cicilia Apriliana Tungga

This research aims to analyze the level of the importance and the performance of the implementation of factors that determine the successful inventory of assets in Rote Ndao Regency. Importance Performance Analysis (IPA) is used as an analysis tool to process research data. The results showed that asset inventory has not been fully optimal. This can be seen from the results of data analysis that is unbalancing between interest and performance levels. There are 4 inventory factors that are priority to improve performance, namely: regional asset logging activities in Rote Ndao District Government, improvement of updated data base, implementation of regional asset census to get correct and accurate asset data, and information technology capabilities and completeness of infrastructure facilities in the office supported by HR capabilities   Keywords: inventory of regional assets , local government, Importance Performance Analysis (IPA)


Author(s):  
Kostas N. Oikonomou ◽  
Rakesh K. Sinha ◽  
Robert D. Doverspike

The authors describe a methodology for evaluating the performability (combined performance and reliability) of large communications networks. Networks are represented by a 4-level hierarchical model, consisting of traffic matrix, network graph, “components” representing failure modes, and reliability information. Network states are assignments of modes to the network components, which usually represent network elements and their key modules, although they can be more abstract. The components can be binary or multi-modal, and each of their failure modes may change a set of attributes of the graph (e.g. the capacity or cost of a link). Their methodology also captures the effect of automatic restoration against network failures by including two common rerouting methods. To compute network performability measures, including upper and lower bounds on their cumulative distribution functions, we augment existing probabilistic state-space generation algorithms with our new “hybrid” algorithm. To characterize the network failures of highest impact, we compute the Pareto boundaries of the network’s risk space. The authors have developed a network analysis tool called nperf that embodies this methodology. To illustrate the methodology and the practicality of the tool, they describe a performability analysis of three design alternatives for a large commercial IP backbone network.


2004 ◽  
Vol 12 (4) ◽  
pp. 239-251 ◽  
Author(s):  
Bartosz Baliś ◽  
Marian Bubak ◽  
Włodzimierz Funika ◽  
Roland Wismüller ◽  
Marcin Radecki ◽  
...  

This paper presents an application monitoring infrastructure developed within the CrossGrid project. The software is aimed at enabling performance measurements for the application developer and in this way facilitating the development of applications in the Grid environment. The application monitoring infrastructure is composed of a distributed monitoring system, the OCM-G, and a performance analysis tool called G-PM. The OCM-G is an on-line, grid-enabled, monitoring system, while G-PM is an advanced graphical tool which allows to evaluate and present the results of performance monitoring, to support optimization of the application execution. G-PM supports build-in standard metrics and user-defined metrics expressed in the Performance Measurement Specification Language (PMSL). Communication between the G-PM and the OCM-G is performed according to a well-defined protocol, OMIS (On-line Monitoring Interface Specification). In this paper, the architecture and features of the OCM-G and G-PM are described as well as an example of use of the monitoring infrastructure to visualize the status and communication in the application, to evaluate the performance, including discovering the reason of the performance flaw.


Sign in / Sign up

Export Citation Format

Share Document