Investigating the Impacts of Web Servers on Web Application Energy Usage Computer and Information Sciences University of Delaware Irene L. Manotas G. Cagri.

Slides:



Advertisements
Similar presentations
Energy-directed Test Suite Optimization Ding Li, ∗ Cagri Sahin,† James Clause,† and William G.J. Halfond ∗ ∗ University of Southern California † University.
Advertisements

Pocket PC For small projects Shazia Naz Subhani Registries Core Facility, BESC King Faisal Specialist Hospital & Research Centre.
Front and Back End: Webpage and Database Management Prepared by Nailya Galimzyanova and Brian J Kapala Supervisor: Prof. Adriano Cavalcanti, PhD College.
w/ Service Provider Foundation & Service Management Automation VMs, Networks, Automation Service Bus Database SQL Sever MySQL Web Sites Services Plans.
Packard BioScience. Packard BioScience What is ArrayInformatics?
1 of 13 May 26, 2000 Comparing Web Applications with Desktop Applications: An Empirical Study Paul Pop Department of Computer and Information.
The Web is perhaps the single largest data source in the world. Due to the heterogeneity and lack of structure, mining and integration are challenging.
Integrating Historical and Realtime Monitoring Data into an Internet Based Watershed Information System for the Bear River Basin Jeff Horsburgh David Stevens,
Web UI and BrightAuthor networking features
Bandwidth Allocation in a Self-Managing Multimedia File Server Vijay Sundaram and Prashant Shenoy Department of Computer Science University of Massachusetts.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Move your Data Anywhere: Getting Data to and From Diverse Systems Presenter: Win Worrall Senior Applications Engineer.
EEE evaluation Give me feedback! Midterm Feedback Form (TLTC)
By: Marcus Owens. Essential Components Your computer depends on two things: hardware and software. Hardware are physical components that make up your.
Operating System Overview
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
What is an And Gate? It is a digital circuit that produce logical operations The logical operations are call Boolean logical Boolean operation consist.
Managed by UT-Battelle for the Department of Energy Kay Kasemir ORNL/SNS Oct EPICS Meeting, PAL, Korea Control System Studio Training.
Bookkeeping Tutorial. Bookkeeping & Monitoring Tutorial2 Bookkeeping content  Contains records of all “jobs” and all “files” that are created by production.
Engineering on Display: Back-End Development for Sensor Instrumentation Systems Student: Brian J Kapala Supervisor: Dr. Cavalcanti.
National Science Foundation (NSF). Directorate for Computer and Information Science and Engineering (CISE)
SYSTEMSDESIGNANALYSIS 1 Chapter 18 Interface Design Jerry Post Copyright © 1997.
Our goal is to make a web based multi-user organizer that can be accessed via cellular devices. There are three main component for this project: A main.
$aveZone Milestone 2 - Update $aveZone Milestone 2 - Update Fifth team: Dima Reshidko Oren Gafni Shiko Raboh Harel Cohen.
Blog and Wiki. what is a Blog ? Blog is a hierarchy of text, images, media objects and data, arranged chronologically, that can be viewed in an HTML browser.
Bookkeeping Tutorial. 2 Bookkeeping content  Contains records of all “jobs” and all “files” that are produced by production jobs  Job:  In fact technically.
JavaScript 101 Introduction to Programming. Topics What is programming? The common elements found in most programming languages Introduction to JavaScript.
Teaching Empirical Skills and Concepts in Computer Science using Random Walks Grant Braught Dickinson College
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
(Domain Name System) Ismael Ali Technology Context Chi.
IBM Software Group © 2008 IBM Corporation Tivoli Provisioning Manager Beta Program Web Replay Intro and Lab September, 2008 Robert Uthe.
Shuang Wu REU-DIMACS, 2010 Mentor: James Abello. Project description Our research project Input: time data recorded from the ‘Name That Cluster’ web page.
Installing and Configuring Moodle. Download Download latest Windows Install package from Moodle.orgMoodle.org.
Designing a Grid Computing Architecture: A Case Study of Green Computing Implementation Using SAS® N.Krishnadas Indian Institute of Management, Kozhikode.
May 2003 Statistical Exception Detection System, Based on MASF Technique Igor Trubin, Ph.D., Kevin McLaughlin Capital One Services, Inc.
1 Thinking What are the top three ways that you use your computer? What type of programs do you use for these functions? 2 Web Search What is.
SoftUpdate New features and management technique.
Galaxy for analyzing genome data Hardison October 05, 2010
James A. Senn’s Information Technology, 3rd Edition
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Windows® MultiPoint™ Server 2010
Enterprise Integration: Workflow
What’s New from Platform Computing
An Empirical Study of Property Collocation on Large Scale of Knowledge Base 龚赛赛
DVD (Qualitative Research: Methods in the Social Sciences)
Station Management System
Database Connectivity and Web Development
Evaluation of A Semi-Automated Feature Extraction Method to Identify and Map Smuggler Trails into the U.S. from Across the Mexican Border.
Campus Resource Scheduling & Event Management
Principles of Experimental Design
Choosing to Purchase or Upgrade to an R-2000 Home
Presentation transcript:

Investigating the Impacts of Web Servers on Web Application Energy Usage Computer and Information Sciences University of Delaware Irene L. Manotas G. Cagri Sahin James Clause Lori Pollock Kristina Winbladh

Which Web Server Should I Use? Empirically Investigate RQ1—Feasibility: Does the choice of web server impact the energy consumption of a web application? RQ2—Consistency: Are the web servers consistent in their impact? 2

Experimental Setup web browser 3 workloads web server web application LEAP energy monito r Integration Tests Automatic Testing user inputs 3 WEBRick

4 % Difference in energy consumption from the mean Web Servers FeatureMongrelPumaThinWEBrick Calendar Context Edit Preferences Review Search Show Statistics Toggle Context Total  A given web server is not always the best under all features.  The web server does make a difference  Energy consumption variability differs across features. 44 This work is supported in part by National Science Foundation Grant No and an award from the University of Delaware Research Foundation Results: Feasibility and Consistency

Correlating energy measurements with design decisions/implementations in a non-tedious manner 5 Issues We Face Questions for Discussion How are others monitoring and mapping energy usage to program units? How many repeated runs do others perform to take measurements to account for variations?