Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)

Slides:



Advertisements
Similar presentations
A Workflow Engine with Multi-Level Parallelism Supports Qifeng Huang and Yan Huang School of Computer Science Cardiff University
Advertisements

Distributed Data Processing
Performance Testing - Kanwalpreet Singh.
Threads, SMP, and Microkernels
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1. Introducing Java Computing  What is Java Computing?  Why Java Computing?  Enterprise Java Computing  Java and Internet Web Server.
1 Chapter 4 Threads Threads: Resource ownership and execution.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
2 Systems Architecture, Fifth Edition Chapter Goals Describe client/server and multi-tier application architecture and discuss their advantages compared.
Virtualization and the Cloud
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Distributed Systems: Client/Server Computing
What Can You do With BTM? Business Transaction Management touches the following disciplines:  Performance Management  Application Management  Capacity.
Data Storage Willis Kim 14 May Types of storages Direct Attached Storage – storage hardware that connects to a single server Direct Attached Storage.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
An Introduction to IBM Systems Director
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
第十四章 J2EE 入门 Introduction What is J2EE ?
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Computer Emergency Notification System (CENS)
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Processes Introduction to Operating Systems: Module 3.
Hwajung Lee.  Interprocess Communication (IPC) is at the heart of distributed computing.  Processes and Threads  Process is the execution of a program.
Middleware Services. Functions of Middleware Encapsulation Protection Concurrent processing Communication Scheduling.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 TCP/IP Application Layer.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Ceilometer + Gnocchi + Aodh Architecture
Group Communication Theresa Nguyen ICS243f Spring 2001.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Mastering SNMP Notes 25/12/2010. Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message format for communication.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
 Cloud Computing technology basics Platform Evolution Advantages  Microsoft Windows Azure technology basics Windows Azure – A Lap around the platform.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
System Components Operating System Services System Calls.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
CompTIA Security+ Study Guide (SY0-401)
TrueSight Operations Management 11.0 Architecture
Lec 5: SNMP Network Management
Cisco Unified Communications Management
z/Ware 2.0 Technical Overview
CHAPTER 3 Architectures for Distributed Systems
University of Technology
CompTIA Security+ Study Guide (SY0-401)
Virtualization Techniques
Lec 5: SNMP Network Management
Time Gathering Systems Secure Data Collection for IBM System i Server
Specialized Cloud Architectures
Presentation transcript:

Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)

Computer Measurement Group, India 2 Virtualization (Multi-tenancy enabler) Server Virtualization Network Virtualization Storage Virtualization Application Virtualization Database Virtualization In APE, network virtualization enables emulation of connections between applications, services, and end users for testing Virtualizing Storage randomizes sequential I/O which cause a lag in performance. APE should develop scenarios to optimize this performance Virtualization of the database enables compute and storage resources to be pooled and allocated on demand which provides increased flexibility, more granular and efficient allocation of pooled resources, and more scalable computing Server virtualization means partitioning a single server to appear as multiple servers. Hypervisor is responsible for creating, releasing, and managing the resources of "guest" operating systems, or virtual machines. Capacity planning is the art of looking at trends in performance data to predict future capacity needs and then building provisioning strategies around that data.APM complements capacity planning. Application virtualization layers replace part of the runtime environment normally provided by the operating system. These solutions are widely adopted by enterprises so that its users can securely connect to corporate applications from any device. But, While access management is simplified and device independence is enabled, IT managers lose all ability to assess the quality of service end users are experiencing.

Computer Measurement Group, India 3 APM (Application + System) Systems Resource Monitoring Performance Management – Evolution SNMP Agent based Agent lessHeterogeneous Sniffing with Analytics Machine Data (Performance Metrics) Wire Data (Performance Metrics)

Computer Measurement Group, India 4 Monitoring Techniques – brief 1.Simple Network Management Protocol (SNMP)  Is part of TCP/IP suite  Operates in the Application Layer – acts as an agent  Management Information Bases (MIBs) are data collectors  MIBs consists of object IDs  Each OID identifies a variable that can be read or set via SNMP  Key SNMP Protocol Data Units  GetRequest – (manager-to-agent) to retrieve the value of a variable or list of variables  SetRequest – (manager –to – agent) to change/modify the value of a variable  Trap – (agent –to – manager) to send notifications from 2.Agent based –  System Monitoring agents run on a system to be monitored  Implementation is limited to computer systems  Agent either runs as an start-up application (or) service  RPC over TCP/IP is one of the communication medium  Agents invokes local OS commands to collect metrics  Collected metrics are saved into proprietary file formats 3.Agent less  An intrusive monitoring system  OS commands are packaged into predefined templates  Telnet/SSH/Java RMI/WCF (xml) are used as medium to invoke commands and collect metrics

Computer Measurement Group, India 5 Monitoring Techniques – brief 4.Heterogeneous – Combination of top-down (i.e. application ) & bottom up (i.e. system ) approach Two sets of performance metrics are monitored End User experience – (Active and passive) in terms of Availability and Response Times, compared to different locations and user loads  Active monitoring (aka Synthetic Monitoring) is done by executing automated (scripted) business process flow on an agent  Passive monitoring is usually an agent less appliance implemented using network port mirroring Performance of Application components and system resources Runtime Application Architecture – CMDB compliant  Application Discovery and Dependency Mapping (ADDM) solutions exist to automate the process of mapping transactions and applications to underlying infrastructure components Application component monitoring (Diagnostics tools)  Agent based and is generally targeted in the middleware space focusing on the application, and messaging servers.  Provides a real time view of the J2EE and.NET stacks, tying them back to the user defined business transactions.  Shows a clear path from a code execution standpoint (e.g., springs, struts, etc.), to the URL rendered, to the user request. 4.Wire Data What is Wire Data – is it polling or trolling? A scripted SNMP or Agent or Agent-less process for metrics collection is “polling” A passive network monitoring to observe performance issues as they occur on network is “Trolling” Polling is like “do you see performance issues” Where as Trolling is “I see performance issues”

Computer Measurement Group, India 6 Thank you !!! The theme and the information is sourced from the below link –