Evaluation of performance aspects of the Auto-ID Infrastructure

Slides:



Advertisements
Similar presentations
Web Performance Tuning Lin Wang, Ph.D. US Department of Education Copyright [Lin Wang] [2004]. This work is the intellectual property of the author. Permission.
Advertisements

Welcome to Middleware Joseph Amrithraj
Copyright © 2011 by the Commonwealth of Pennsylvania. All Rights Reserved. Load Test Report.
New Release Announcements and Product Roadmap Chris DiPierro, Director of Software Development April 9-11, 2014
Raptor Technical Details. Outline Workshop structured by Raptor workflow – Raptor Event model. – ICA log file parsing – ICA/MUA event storage – ICA event.
17th February, 2000 by Maciej Korzeniowski (CERN-IT-IA-MI) 1 Oracle Discoverer Product Presentation  This is an ad hoc query and analysis tool for.
Enterprise Architecture Firm Architecture World ‘10 SOA on Demand Ulf Fildebrandt Chief Development Architect SOA Infrastructure SAP AG.
1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
Professional Toolkit V2.0 C:\Presentations - SmartCafe_Prof_V2.0 - bsc page 1 Professional Toolkit 2.0.
SATO XML-enabled Printers Introduction
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
XENMON: QOS MONITORING AND PERFORMANCE PROFILING TOOL Diwaker Gupta, Rob Gardner, Ludmila Cherkasova 1.
Online Hotel Reservation System
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
LYU9901 TravelNet Final Presentation Supervisor: Prof. Michael R. Lyu Members: Ho Chi Ho Malcolm Lau Chi Ho Arthur On
Proxy Cache Leonid Romanovsky Olga Fomenko Winter 2003 Instructor: Konstantin Sinyuk.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Created by the Community for the Community Building a RFID solution in BTS 09.
Cloud Computing Systems Lin Gu Hong Kong University of Science and Technology Sept. 21, 2011 Windows Azure—Overview.
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
Mobile Computing Lecture: 4.
 Introduction Introduction  Definition of Operating System Definition of Operating System  Abstract View of OperatingSystem Abstract View of OperatingSystem.
Boštjan Šumak dr. Marjan Heričko THE ROLE OF BIZTALK SERVER IN BUSINESS PROCESS INTEGRATION.
J2EE Application Server Deployment and Performance Optimization for Enterprise Application Service Thesis presentation Author: Xiaoyang Wang.
Chapter 13 Starting Design: Logical Architecture and UML Package Diagrams.
Christopher Jeffers August 2012
Introduction to ASP.NET. Prehistory of ASP.NET Original Internet – text based WWW – static graphical content  HTML (client-side) Need for interactive.
UNIX System Administration OS Kernal Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept Kernel or MicroKernel Concept: An OS architecture-design.
Testing Tools using Visual Studio Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Bottlenecks: Automated Design Configuration Evaluation and Tune.
ALLIANCE Administration 20 Oct 2009 (Based on Release 2.2) Michaël Petit.
OOI CyberInfrastructure: Technology Overview - Hyrax January 2009 Claudiu Farcas OOI CI Architecture & Design Team UCSD/Calit2.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Tenth Edition.
© 2005 by Prentice Hall 1 Chapter 9: The Client/Server Database Environment Modern Database Management 7 th Edition Jeffrey A. Hoffer, Mary B. Prescott,
Improving Network I/O Virtualization for Cloud Computing.
1 Analysis of Push Initiator Tool used for Wireless Application Protocol Taotao Huang Helsinki University of Technology Department of Electrical and Communication.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Implementation - Part 2 CPS 181s March 18, Pieces of the Site-building Puzzle Page 180, figure 4.1.
Chapter 13 Logical Architecture and UML Package Diagrams 1CS6359 Fall 2012 John Cole.
ISMT E-200: Trends in Enterprise Information Systems Project: GLOCO – Integrated Corporate Portal Part 2 Technical Specification Team Members: Joyce Torres.
ISMT E-200: Trends in Enterprise Information Systems Project: GLOCO – Integrated Corporate Portal Part 2 Technical Specification Team Members: Joyce Torres.
Self-assembling Agent System Presentation 1 Donald Lee.
eFinaX Teller System. Contents 1. Operation System 2. Development / Maintenance System 3. Feature 4. Benefit 5. Supports.
INFORMATION SYSTEM-SOFTWARE Topic: OPERATING SYSTEM CONCEPTS.
GVis: Grid-enabled Interactive Visualization State Key Laboratory. of CAD&CG Zhejiang University, Hangzhou
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Silberschatz, Galvin and Gagne  Operating System Concepts Operating Systems 1. Overview 2. Process Management 3. Storage Management 4. I/O Systems.
Full and Para Virtualization
ASP. ASP is a powerful tool for making dynamic and interactive Web pages An ASP file can contain text, HTML tags and scripts. Scripts in an ASP file are.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
IPS Infrastructure Technological Overview of Work Done.
Software Architecture in Practice Mandatory project in performance engineering.
Deck off cards Draft 2 Insert Your Name. Product Overview QlikView Developer Development tool to create data model and graphical interface QlikView Server.
Computing Facilities CERN IT Department CH-1211 Geneva 23 Switzerland t CF CC Monitoring I.Fedorko on behalf of CF/ASI 18/02/2011 Overview.
CLIENT SERVER COMPUTING. We have 2 types of n/w architectures – client server and peer to peer. In P2P, each system has equal capabilities and responsibilities.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
 Cloud Computing technology basics Platform Evolution Advantages  Microsoft Windows Azure technology basics Windows Azure – A Lap around the platform.
Connectathon 2009 Gazelle: HL7 V2 EVS, PIX Tests Agents, Automated Testing Project plans for Connectathon 2009 (February 23 rd -27 th 2009 ) November 14.
SmartCode Brad Argue INLS /19/2001.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
The Client/Server Database Environment
Lecture 1: Multi-tier Architecture Overview
Moodle Scalability What is Scalability?
<Project Name & Date> <Presenter Name>
Starting Design: Logical Architecture and UML Package Diagrams
Presentation transcript:

Evaluation of performance aspects of the Auto-ID Infrastructure Kai Sachs (TU Darmstadt) Supervisors: Christof Bornhoevd (SAP) Mariano Cilia (TU Darmstadt) Evaluation of performance aspects of the Auto-ID Infrastructure

CONTENTS Auto-ID Infrastructure Measurement Approach Results of the Experiments Final Conclusions

Auto-ID Infrastructure Measurement Approach Results of the Experiments Final Conclusions

SAP Auto-ID Infrastructure 2.0 (AII) AII: Overview (1) SAP Auto-ID Infrastructure 2.0 (AII) Middleware solution Receiving RFID data from data capture sources (e.g. RFID devices) Integrates the data into enterprise applications. Early prototype

SAP Auto-ID Infrastructure (AII) Auto-ID Cockpit (Web User Interface) AII: Overview (2) The illustration below shows an overview of SAP RFID landscape: Reader Device Controller SAP Auto-ID Infrastructure (AII) SAP Exchange Infrastructure (XI) SAP R/3 RFID Tags Backend AII LLI XML/PML XML IDoc Auto-ID Cockpit (Web User Interface) Traffic Generator Traffic Generator From: SAP RFID Solution Package SAP Auto-ID Infrastructure 2.0 (AII) Theory

Integration Layer (XI) Auto-ID Node System Architecture Auto-ID Cockpit Auto-ID Node DC BE IDoc XML Message Dispatcher Activities XML Integration Layer (XI) Communication Layer Communication Layer XML TG IDoc BE Rule Engine AIN Repository From: SAP Auto-ID Infrastructure

CONTENTS Auto-ID Infrastructure Measurement Approach Results of the Experiments Final Conclusions

Test Environment

What should be observed? Experiments settings Multiple readers Message size System behavior CPU load IO Activities Single processes Memory … Throughput Components on the Auto – ID Infrastructure Gross Times Gross CPU Times Customized Traffic Generator Microsoft Performance Customized Traffic Generator JARM

Microsoft Performance Part of Microsoft Windows 2000 & XP System Monitor Allows to observe: Single processes IO Activities CPU load … Observations could be logged in a CSV - file.

JARM Allows observation of Java components Provides averages values and sums per component Hierarchies of components are possible Results are accessible through Visual Administrator Needs source code modifications! Problems, if JMS is used

JARM Measurement Points Auto-ID Cockpit Auto-ID Node DC BE IDoc XML Message Dispatcher Activities XML Integration Layer (XI) Communication Layer Communication Layer XML TG IDoc BE Rule Engine AIN Repository

JARM Measurement Points Auto-ID Cockpit Auto-ID Node DC BE IDoc XML Message Dispatcher Activities XML Integration Layer (XI) Communication Layer Communication Layer XML TG IDoc BE Rule Engine AIN Repository Parser Rule Processor HTTP

Customized Traffic Generator Based on SAP Traffic Generator Used to simulate reader observations New logging functions were added Every sent request can be logged Allows better review of throughput Other new functions: Add Timeframes for experiments Send a defined number of messages Possibility to run different scripts parallel Scenario – Definitions …

CONTENTS Auto-ID Infrastructure Measurement approach Results of the Experiments Conclusion

Results of Experiments CPU Load IO Activities Throughput J2EE Components of the Auto-ID Node Different VM settings Settings of Message Dispatcher

Results of Experiments CPU Load IO Activities Throughput J2EE Components of the Auto-ID Node Different VM settings Settings of Message Dispatcher

CPU Load Fall down Incursions

CPU Load Incursions and the observed fall down have heavy influence on the average CPU load CPU load differ for the experiments Throughput depends on CPU load Need for a key figure for comparison of the different experiments. 

IO Activities I Savepoints of MaxDB

IO Activities II Savepoints of MaxDB

IO Activities III MaxDB Savepoints have a significant influence on the system behavior. Settings for MaxDB Savepoint intervals can be changed. Influence of Savepoints is bigger, if the files are fragmented. The Savepoints could not explain the CPU load fall down in the end of the experiment time frame!!!

Different message sizes Throughput Different message sizes 9 EPCs per message 45 EPCs per message 90 EPCs per message 900 EPCs per message Multiple readers 1 simulated reader 3 simulated readers 5 simulated readers 7 simulated readers 10 simulated Reader

Throughput II

Throughput III

Throughput IV

Throughput V Conclusions: Influence of message size: Bigger message size Higher throughput in no. of EPCs per sec. Influence of multiple simulated RFID readers: Throughout increases up to n reader; decreases after that Throughput decreases over time

Auto-ID Node Components

Auto-ID Node Components

Auto-ID Node Components II

Auto-ID Node Components III

Auto-ID Node Components IV Conclusions: Gross Times scale linear for different message sizes. The activities are the dominating part of the Auto-ID Node. The activities are dominated by database accesses.

CONTENTS Auto-ID Infrastructure Measurement Approach Results of the Experiments Final Conclusions

Final Conclusions I CPU Load: CPU load has short incursions Number of simulated readers has no influence on the CPU load Message size influences the proportions of the system processes regarding CPU load CPU load decrease at the end of the experiment time frame IO Activities: MaxDB Savepoints have a significant influence on the system behavior Throughput: Throughput is higher for larger messages Throughput decreases over time Throughput depends on number of readers

Final Conclusions II Components of the Auto-ID Node: Auto-ID Node components scale linear Rule Activities are the dominating component Performance of Activities is dominated by database accesses Number of simulated readers has significant influence on the Gross Time Settings of Java Virtual Machine: Heap size is the most important parameter for higher throughput JMS settings of Message Dispatcher: Throughput is lower, if JMS is used. Gross Time is higher, if JMS is used.