Project Part 4 Details Jug Venkatesh. Project 4 Overview 1.Continue log collection and analysis 2.Extend log collection from our scripts to your own,

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Lecture 1: Overview of Computers & Programming
Extensible Networking Platform 1 Liquid Architecture Cycle Accurate Performance Measurement Richard Hough Phillip Jones, Scott Friedman, Roger Chamberlain,
Nonlinear & Neural Networks LAB. CHAPTER 20 VHDL FOR DIGITAL SYSYEM DESIGN 20.1VHDL Code for a Serial Adder 20.2VHDL Code for a Binary Multiplier 20.3VHDL.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Understanding Linux Kernel to Build Software Routers (Qualitative Discussion) Shiv Kalyanaraman,
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Common System Components
APPLICATION DEVELOPMENT BY SYED ADNAN ALI.
Chapter 1 Software Engineering. Homework ► Read Section 2.2 (pages 79-98) ► Answer questions: ► 7, 8, 11, 12, & 13 on page 134. ► Answer on paper, hand.
Information Extraction from Documents for Automating Softwre Testing by Patricia Lutsky Presented by Ramiro Lopez.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Presentation Using the Cisco Technical Support.
Documentation 1. User Documentation 2. Technical Documentation 3. Program Documentation.
Detailed Technical Feature Presentation Background Information The Importance of Software Software Roadblocks Development Environment DSP Development Cycle.
Abhinav Kamra Computer Science, Columbia University 3.1 Operating System Concepts Silberschatz, Galvin and Gagne  2002 Chapter 3: Operating-System Structures.
Module 13 Automating SQL Server 2008 R2 Management.
CLEO’s User Centric Data Access System Christopher D. Jones Cornell University.
1 Homework 1.Imagine you are a RTOS developer. Your task is to implement preemptive OS. What hardware peripherals for task switching algorithm shall you.
Unit B065 – Coding a solution PREP WORK 1)Make sure you keep a work log / diary. Use the table on page 16 of the hand book as a template 2)Keep a bibliography.
AUTOBUILD Build and Deployment Automation Solution.
Chapter 2: Operating-System Structures. 2.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 2: Operating-System Structures Operating.
1 The Software Development Process  Systems analysis  Systems design  Implementation  Testing  Documentation  Evaluation  Maintenance.
Conrad Benham Java Opcode and Runtime Data Analysis By: Conrad Benham Supervisor: Professor Arthur Sale.
Principles of Program Design What should be taught in core programming curricula.
Equipment Module Usage Tracking, Repairs & Maintenance.
Team Software Process (TSPi) CS4320 Fall TSP Strategy Provide a simple process framework based on the PSP. Use modest, well-defined problems. Develop.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Advanced Compilers CMPSCI 710 Spring 2004 Lecture 1 Emery Berger University of Massachusetts,
Proposed Debugger Features Ken Ryall Warren Paul.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
The Software Development Process
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Python programming 1: Introduction.
Presenting and Analysing your Data CSCI 6620 Spring 2014 Thesis Projects: Chapter 10 CSCI 6620 Spring 2014 Thesis Projects: Chapter 10.
UNIX Unit 1- Architecture of Unix - By Pratima.
Sep 13, 2006 Scientific Computing 1 Managing Scientific Computing Projects Erik Deumens QTP and HPC Center.
LLVM Compiler Katie Dew. Lectures High-level overview of LLVM (Katie) Walkthrough of LLVM in context of our project (Jason) –Input requirements –Configuration.
Research on Asymmetric-aware Hypervisor Scheduler Project overview 6/4.
1.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Lecture 2: OS Structures (Chapter 2.7)
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
CIS 4910 Information Systems Development Project Project Documentation.
Test Plan: Introduction o Primary focus: developer testing –Implementation phase –Release testing –Maintenance and enhancement o Secondary focus: formal.
2.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition System Programs (p73) System programs provide a convenient environment.
Accounting in DataGrid HLR software demo Andrea Guarise Milano, September 11, 2001.
Dept. of Animal Breeding and Genetics Programming basics & introduction to PERL Mats Pettersson.
Introduce Caching Technologies using Xrootd Wei Yang 10/28/14ATLAS TIM 2014 Univ. Chicago1.
Chapter 10 Software quality. This chapter discusses n Some important properties we want our system to have, specifically correctness and maintainability.
Web-CAT: Automatic grading using student-written tests Web-CAT: Grade it your way Decide when and how students can submit, including.
Session 7: More Module Interface Rob Kutschke art and LArSoft Course August 4, 2015.
Introduction to Operating Systems Concepts
Operating System Kernel Compilation
Implementation Plan Notes
Operating System Structures
Processes and threads.
OpenMosix, Open SSI, and LinuxPMI
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Smart Batteries Spring 2016 – Update 1.
CMIS 102 Innovative Education--snaptutorial.com
AUTOMATED SESSION PLANNING. In the present world, everything has become automated. By, a click everything is being processed. But the preparation of the.
Operating System Kernel Compilation
Chapter 3: Operating-System Structures
Chapter 2: Operating-System Structures
Overview of the Lab 2 Assignment: Multicore Real-Time Tasks
Introduction to OProfile
Off-line Direct Disk Access System
Building a Performance Monitoring System using XEvents and DMVs
Chapter 2. Problem Solving and Software Engineering
Chapter 2: Operating-System Structures
Operating System Kernel Compilation
Automating Student Yield Data Extraction
PowerShell for ConfigMgr 2012 SP1
Presentation transcript:

Project Part 4 Details Jug Venkatesh

Project 4 Overview 1.Continue log collection and analysis 2.Extend log collection from our scripts to your own, using performance counters 3.Implement your own DVFS module 4.Compare and quantify your algorithm to the “state of the art”

1. Continue Log Collection Latest scripts are stable. Use them, make sure to understand: – How we collect data – What we collect – Where this data comes from – look up the source files in Linux/Android documentation – This will help you collect your own data! Continue collecting and analyzing short- and long-term logs

Kernel Modules Written to extend kernel functionality Modular self-contained binaries that can be installed/uninstalled at boot- time or runtime Compiled from C code using the ARM toolchain into a *.ko file (kernel object)

Kernel Modules (cont’d)

2. Gathering Useful Data Using kernel module, automate gathering and extracting useful data: – File access: time_in_state, cpuusage, cpufreq, gpufreq – Hardware performance counters Provided with the Cortex A8 manual, with register codes for different performance counters. Your job to decide which ones are useful, and justify in your report using actual numbers.

Data Collection via Kernel Module Read from log files: – C-standard file reads – read access only to avoid performance hit – Access to last few lines of a log via “inspect” method of file command Performance counters: – Opening in code to set performance counters – Limit of 4 perf counters at a time

Data Collection Demo

3. Implementing your policy Kernel module has an open area for your algorithm (or just the initial data collection)

Kernel Implementation Demo

4. Compare your algorithm Looking for details – quantify your results! – What does your algorithm do? – How does your algorithm affect specific scenarios: Show specific results – graphs or tables How do these cases apply in terms of general usage – justify based on your usage pattern – How effective is your algorithm? It doesn’t help to improve the 1% use case by 100x Amdahl’s Law