Methodology easy but important 1. ToC 1.What is performance evaluation about ? 2.Metrics, Load and Goals 3.Hidden Factors 4.The Scientific Method 5.Patterns.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Topics to be discussed Introduction Performance Factors Methodology Test Process Tools Conclusion Abu Bakr Siddiq.
CSUSM Smoking and GPA Analysis Business Statistics 304 Walter Evans Farzana Mohsini Sheryl Lejano Ryan Thomas.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Project Ideas slides modified from Eileen Kraemer and David P. Feldman.
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
1 End to End Bandwidth Estimation in TCP to improve Wireless Link Utilization S. Mascolo, A.Grieco, G.Pau, M.Gerla, C.Casetti Presented by Abhijit Pandey.
MULTIPLE TCP CONNECTIONS Presented by Josh Kaltman and Bob Otting.
Measurements of Congestion Responsiveness of Windows Streaming Media (WSM) Presented By:- Ashish Gupta.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
IP traffic and QoS control : the need for flow aware networking Jim Roberts France Telecom R&D NSF-COST Workshop.
Queuing Theory For Dummies
Project 4 U-Pick – A Project of Your Own Design Proposal Due: April 14 th (earlier ok) Project Due: April 25 th.
Comparing flow-oblivious and flow-aware adaptive routing Sara Oueslati and Jim Roberts France Telecom R&D CISS 2006 Princeton March 2006.
Swami NatarajanJune 17, 2015 RIT Software Engineering Reliability Engineering.
SE 450 Software Processes & Product Metrics Reliability Engineering.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
Academic Advisor: Prof. Ronen Brafman Team Members: Ran Isenberg Mirit Markovich Noa Aharon Alon Furman.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Performance Evaluation
Reducing the Buffer Size in Backbone Routers Yashar Ganjali High Performance Networking Group Stanford University February 23, 2005
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
OS Fall ’ 02 Performance Evaluation Operating Systems Fall 2002.
MAC Protocol By Ervin Kulenica & Chien Pham.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Accounting Theory & Practice OVERVIEW OF ACCOUNTING THEORY
Chapter 1 The Challenges of Networked Games. Online Gaming Desire for entertainment has pushed the frontiers of computing and networking technologies.
1 Issues in Benchmarking Intrusion Detection Systems Marcus J. Ranum.
Characteristics of QoS-Guaranteed TCP on Real Mobile Terminal in Wireless LAN Remi Ando † Tutomu Murase ‡ Masato Oguchi † † Ochanomizu University,Japan.
1 An SLA-Oriented Capacity Planning Tool for Streaming Media Services Lucy Cherkasova, Wenting Tang, and Sharad Singhal HPLabs,USA.
Process of Science The Scientific Method.
Writing a Discussion Section. Writing a discussion section is where you really begin to add your interpretations to the work. In this critical part of.
1 Performance Evaluation of Computer Systems and Networks Introduction, Outlines, Class Policy Instructor: A. Ghasemi Many thanks to Dr. Behzad Akbari.
Chapter 2: The Research Enterprise in Psychology.
THEORETICAL FRAMEWORK and Hypothesis Development
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
4.1 Advanced Operating Systems Desktop Scheduling You are running some long simulations. In the mean time, why not watch an illegally downloaded Simpsons.
1 Modeling and Performance Evaluation of DRED (Dynamic Random Early Detection) using Fluid-Flow Approximation Hideyuki Yamamoto, Hiroyuki Ohsaki Graduate.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
1 Measuring Congestion Responsiveness of Windows Streaming Media James Nichols Advisors: Prof. Mark Claypool Prof. Bob Kinicki Reader: Prof. David Finkel.
1 On Scalable Edge-based Flow Control Mechanism for VPN Tunnels --- Part 2: Scalability and Implementation Issues Hiroyuki Ohsaki Graduate School of Information.
1 A paper by Yi-Bing Lin IEEE Transactions on Mobile Computing Vol. 4, No. 2, March/April ’05 Presented by Derek Pennington Per-User Checkpointing For.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
Lecture №1 Role of science in modern society. Role of science in modern society.
Receiver Driven Bandwidth Sharing for TCP Authors: Puneet Mehra, Avideh Zakor and Christophe De Vlesschouwer University of California Berkeley. Presented.
Introduction Network Quality Assurance (and Simulation!) Read Chapters 1, 2, 3.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
-Mayukh, clemson university1 Project Overview Study of Tfrc Verification, Analysis and Development Verification : Experiments. Analysis : Check for short.
Introduction to Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
Performance Evaluation of L3 Transport Protocols for IEEE (2 nd round) Richard Rouil, Nada Golmie, and David Griffith National Institute of Standards.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Introduction to Performance Tuning Chia-heng Tu PAS Lab Summer Workshop 2009 June 30,
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Network Performance and Quality of Service
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Introduction to Networking
TCP in Mobile Ad-hoc Networks
Goal Control the amount of traffic in the network
Strayer University at Arlington, VA
TCP in Wireless Ad-hoc Networks
AI Applications in Network Congestion Control
Presentation transcript:

Methodology easy but important 1

ToC 1.What is performance evaluation about ? 2.Metrics, Load and Goals 3.Hidden Factors 4.The Scientific Method 5.Patterns 2

What is Performance Evaluation ?

Load You need to define the load under which your system operates Make the difference between Intensity of the load (e.g. nb jobs per second) Nature of the load Statistical details that may matter: e.g. job sizes are heavy tailed or not Benchmarks are artificial load generators; we will play with one of them

Metric Define a metric; examples Response time Power consumption Throughput Define operational conditions under which metric is measured (« Viewpoint », see Chapter 11)

Compare Windows vs Linux 6

7 Syscall Benchmark

8 Memory Access Time

9 Ghostscript

Metrics are often Multidimensional 10

A and D are non dominated 11

Know your goals A1 and A3 are comparisons, A2 is an absolute statement E2 is an engineering rule

3. Hidden Factors Factor: an element that may impact the performance (desired factors): intensity of load, number of servers (nuisance factors): time of the day, presence of denial of service attack 13

TCP Throughput Increases with Mobility

TCP Throughput Decreases with Mobility

Why were we fooled ? Hidden factor had a more important role than the factor we were interested in We interpreted correlation as causality Need to be aware of all factors and incorporate in the analysis Or randomize experiment to reduce impact of hidden factors

Simpson’s Paradox A well known phenomenon -- Special case of Hidden Factor paradox when metric is success rate and factors are discrete

Berkeley Sex Case 1973 (source: wikipedia) 18

Take Home Message Pitfall number 1 is the presence of hidden factor Any study is susceptible to it Easy for opponents to find

4. Be Scientific Joe measures performance of his Wireless Shop: what would you conclude ?

Scientific Method Joe buys 2 more Access Points improvement ? 21 BeforeAfter

Scientific Method A conclusion can only proven to be wrong Do not draw conclusions unless the experiment was designed to test the statement Measurement 1 suggested that the wireless network was congested, but the experiment was not designed to test this statement Joe should: design an experiment to validate: H1: “the wireless network is the bottleneck” for example: measure the number of collisions / packet loss result: collision · 1%; conclusion: H1 is not valid hypothesis H2: the server is saturated experiment: measure memory utilization : result ¼ 100% 22

Performance After Doubling Server Memory 23

Example from Nitin Vaidya, Mobicom 2000 Tutorial, slides

25

26

27

Use of Scientific Method Recognize a fact Pose a hypothesis Verify the hypothesis on simulations / measurements designed to test it TCP throughput may increase with mobility (1) Duration of link failure period is impacted by speed (2) It has a negative impact on TCP throughput Do more simulations measure distrib of link failure period Verify (1) and (2) How ? 28

Is ATM-ABR better than ATM-UBR ? 29

Take Home Message You should not conclude from an experiment without trying to invalidate the conclusion (Popper, 1934): you should alternate between the roles of Proponent Adversary

5. Patterns These are common traits found in different situations Knowing some of them may save a lot of time

Bottlenecks may be your enemy Bottlenecks are like non invited people at a party – they may impose their agenda Previous example: what we are measuring is the bottleneck, not the intended factor 33

Bottlenecks are Your Friends

Simplify your life, analyze bottlenecks ! In many cases, you may ignore the rest 35

Behind a Bottleneck May Hide Another Bottleneck

37 i ’ i ” i

i ’ i ” i 38

39

Congestion Collapse Definition: Offered load increases, work done decreases Frequent in complex systems May be due to cost per job increases with load Impatience Rejection of jobs before completion Designer must do something to avoid congestion collapse Eg. Admission control in Apache servers Eg. TCP congestion control Analyst must look for congestion collapse 40

Sources use TCP (= fair scheduling). Increase capacity of link 5 to 100 kb/s; what happens ? 41

Competition Side Effect System balances resources according to some scheduling Apparent paradox: put more resources, some get less 42

No TCP, users send as much can Increase capacity of link 2 from 10 to 1000 kb/s kb/s

Competition Side Effect Apparent paradox: put more resources, all get less 44

Museum Audio Guide 45 Low speed USB connections at docking station High speed

Latent Congestion Collapse System is susceptible to congestion collapse Low speed access prevents congestion collapse Adding resources reveals congestion collapse 46

Take Home Message Watch for patterns, they are very frequent Bottlenecks Congestion collapse Competition side effects Latent Congestion collapse 47

Now it’s your turn… 48