Top Banner

of 42

CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

Aug 07, 2018

Download

Documents

Stephen Leow
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    1/112

    ii

    UNIVERSITI TEKNOLOGI MALAYSIA

    DECLARATION OF THESIS / POSTGRADUATE PROJECT PAPER AND COPYRIGHT

    Author’s full name : Abdirashid Hassan Abdi

    Date of birth : 25th September 1987 

    Title : CLIENT SERVER APPLICATION FOR

    SERVER FARM PERFORMANCE

    MONITORING

    Academic Session : 2011/2012(2)

    I declare that this thesis is classified as:

    I acknowledged that Universiti Teknologi Malaysia reserves the right as

    follows:

    1. The thesis is the property of Universiti Teknologi Malaysia.2. The Library of Universiti Teknologi Malaysia has the right to

    make copies for the purpose of research only.

    3. The Library has the right to make copies of the thesis for

    academic exchange.

    Certified by:

    SIGNATURE SIGNATURE OF SUPERVISOR

    P00076735 DR ISMAIL FAUZI ISNIN

    (NEW IC NO. /PASSPORT NO) NAME OF SUPERVISOR

    Date : 21 JUNE 2012 Date : 21 JUNE 2012

    NOTES :  * If the thesis is CONFIDENTAL or RESTRICTED, please attach with the

    letter from the organization with period and reasons forconfidentiality or restriction.

    CONFIDENTIAL (Contains confidential information under theOfficial Secret Act 1972)*

    RESTRICTED (Contains restricted information as specifiedby the organization where research was

    OPEN ACCESS I agree that my thesis to be published asonline open access (full text)

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    2/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    3/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    4/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    5/112

    iii

    “Dedicated to my beloved family and friends, without their understanding,

    supports, and most of all love, the completion of this work would not have been

     possible.” 

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    6/112

    iv

    ACKNOWLEDGEMENT

    First and foremost, I would like to thank Allah because of His blessings; I

    would be able to successfully complete this dissertation. My word of appreciation

    goes to Dr Ismail Fauzi Isnin for his priceless supervision, inspiring discussion and

    fruitful collaboration. I am thankful for all his invaluable hours to provide

    constructive critics, enthusiasm, immerse knowledge and continuous feedback.

    Without his continued support and patience, this dissertation would not have been the

    same as presented here.

    My thanks also extend to my friends, for their enlightening companionship

    and encouragement of trudging through all the moments from down to up the hill in

    the run to complete this Master program. I would not have done it without the help

    and motivation from all of you.

    To my family, no words can describe my gratefulness for always being there

    despite of the distance. They showered me with love and compassion and enrich my

    life like no other. They are the source of comfort and kept me focus the priorities in

    life and therefore, this work is dedicated to them.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    7/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    8/112

    vi

    ABSTRAK

    Stesen kerja atau ladang pelayan telah menjadi penyelesaian yang kos efektif

    untuk pengkomputeran yang berprestasi tinggi. Ladang pelayan atau pelayan

     berkelompok adalah gabungan pelayan komputer yang biasanya dikendalikan oleh

    syarikat untuk mencapai keperluan pelayan jauh di luar kemampuan sebsah mesin.

    Ladang pelayan sering mempunyai salinan pelayan dimana ia boleh mengambil alih

    fungsi pelayan utama apabila pelayan utama mengalami kerosakan. Ia adalah kritikal

    dan penting untuk memantau, mengawal dan menguruskan pelayan dan sumber-

    sumber yang lain. Untuk menangani masalah ini, ia memerlukan system aplikasi

     pemantauan prestasi yang digunakan kepada sekelompok pelayan, yang boleh

    memantau pelbagai sumber seperti penggunaan CPU, penggunaan cakera dan

    rangkaian lebar dari semasa ke semasa. Rekabentuk sistem aplikasi pemantauan prestasi ini membolehkan flesibiliti dan kebolehpanjangan skala meningkat.

    Maklumat akan dipapar dalam format carta dan akan disegarkan dalam selang masa

    tertentu. Eksperimen berdasarkan kepada sistem prototaip yang menggambarkan

    system aplikasi ini boleh menilai dan mengumpul data yang berkaitan dan

    digambarkan ke dalam bentuk carta dan menunjukkan kebolehgunaan yang baik.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    9/112

    vii

    TABLE OF CONTENTS

    CHAPTER TITLE PAGE 

    DECLARATION ii

    DEDICATION iii

    ACKNOWLEDGMENT iv

    ABSTRACT v

    ABSTRAK vi

    TABLE OF CONTENTS vii

    LIST OF TABLES xi

    LIST OF FIGURES xiii

    LIST OF APPENDICES xv

    1 RESEARCH OVERVIEW

    1.1 Introduction 1

    1.2 Problem Background 3

    1.3 Problem Statement 5

    1.4 Project Aim 5

    1.5 Objectives of the project 51.6 Scope of the project 6

    1.7 Organization of report 6

    2 LITERATURE REVIEW

    2.1  Introduction  8

    2.2  Background Study of the Research 10

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    10/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    11/112

    x

    4 DESIGN PHASE

    4.1 Introduction 56

    4.2 Architecture of proposed system 57

    4.3 Proposed Tool flowchart. 59

    4.4.1 Server side flowchart 59

    4.4.2 Client side flowchart 60

    4.4 Monitoring Nodes 61

    4.5 Techniques and Algorithms of the Proposed Tool 62

    4.5.1 Client side algorithm 62

    4.5.2 Server algorithm 64

    4.5.3 Registered User and Organization algorithm 65

    4.6 Retrieving Data 67

    4.7 Design of proposed system 68

    4.8 Chapter Summary 69

    5 IMPLEMENTATION AND RESULTS

    5.1 Introduction 70

    5.2 Testbed for the Proposed Tool 71

    5.2.1 Test Case 1 72

    5.3 Server farm monitoring tools and proposed tool comparison 83

    5.8 Chapter Summary 84

    6 Conclusion and Recommendation

    6.1 Introduction 85

    6.2 Concluding Remarks 85

    6.3 Contributions 87

    6.4 Future works and recommendation 88

    6.8 Chapters Summary 89

    REFFERENCE  90

    APPENDIX A 95

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    12/112

    xi

    LIST OF TABLES

    TABLE NO TITLE PAGE

    2.1 Causes of high performance consumption for server farm 30

    2.1 Comparing core functions in different monitoring tools  39

    2.2 Comparing mechanisms in different monitoring tools 40

    3.1 Details of operational framework 44

    3.2 Use Case Description for client module 50

    3.3 Use Case Description for server module 52

    3.4 Software requirements 53

    5.1 Comparison core functions of existing tools and proposed tool. 83

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    13/112

    xii

    LIST OF FIGURES

    FIGURE NO TITLE PA

    GE

    2.1 Literature review map 9

    2.2 Overview of monit 32

    2.3 An overview of Nagios 33

    2.4 Ganglia architecture 35

    2.5 PARMON architecture 38

    3.1 Project Operational Framework 43

    3.2 System prototyping 47

    3.3 Evolutionary Prototyping 483.4 Use Case Diagrams for client side 49

    3.5 Use Case Diagrams for server side 51

    4.1 The architecture of the proposed tool 57

    4.2 Flowchart of server side on proposed system 59

    4.3 Flowchart of client side on proposed system 60

    4.4 Pseudo code of the client 63

    4.5 Pseudo code of the server 64

    4.6 Registered User and Organization Algorithm 66

    4.7 Code to get available Memory and CPU usage 67

    4.8 Design of server side of proposed tool 68

    5.1 Configuration of testbed 71

    5.2 Main interface of the central monitoring 73

    5.3 Adding New Client 74

    5.4 Client list form 74

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    14/112

    xiii

    5.5 Choose client form 75

    5.6 Choosing performance type 76

    5.7 Performance monitoring 77

    5.8 Removing Counter 78

    5,9 Change color 79

    5.10 System information 80

    5.11 CPU information 80

    5.12 Memory information 81

    5.13 Disk information 82

    5.14 Network Bandwidth 82

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    15/112

    xiv

    LIST OF APPENDICES

    APPENDIX TITLE PAGE

    A Gantt chart 95

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    16/112

    xv

    CHAPTER 1

    PROJECT OVERVIEW

    1.1  Introduction

     Now days every business linked to the Internet and also managing and

    organizing e-business within each application, these applications are often prepared

    within server farm. Server farm is a collection of servers or clusters in a secure; who

    an internet seats vital needs on servers, to perform a solid reliable well-organized

    service to clients. Servers must be flexible to failures, also able to hold significantnumbers of requests, and able to answer those needs fast. A server farm also known

    as group of computers that helps the needs of organization that are not easily met by

    single computer. These computers are placed in single house or housed different in

    locations(Heo et al ., 2011).

    In 1980s can improve the performance of the computer by creating more

    capable processors and quicker believed by several computer scientists. But in 1990s,

    the concept of clustering was challenging this idea (Buyya, 2000), which

    fundamentally means interconnecting two or more computers to achieve shared

    functions as a single system. Actually the computers are extremely connected to each

    other and collectively support the server needs and handle additional load that is

     placed on the server. This additional load is distributed among the different farm

    computers and different server components. So, it provides computing power for

    advanced needs

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    17/112

    2

    However most of server farms contain a primary and back-up system so that

    if the main server goes down then the back-up system will prevent shutting down

    your companies services (Hai Huang, 2009).

    Early time server farms were used mostly in academic and research services

     but has changed. But know universities and all companies are using server farms.

    Though a mainframe can house up more than hundreds of virtual machines and eat

    less energy. They are also easy to manage and maintain when it use server farms an

    experts needs to fix physical problems while the mainframes is mostly likely a

    software issues. However a large server farm wants a lot of cooling systems and

    extremely large amount of power. For this reason, server farm is measured by

     performance per watt rather than performance per processor.

    A server farm present several advantages such as the following:

    i.  Delivery data is very fast and reliable

    ii.  The capacity is highiii.  Flexibility and scalability

    iv.  Cost effective physical placement and simplified

    v.  Secure remote management

    vi.   No single point of failure Redundancy

    The goal is to give up server farm infrastructure (hardware, software, or both)

    to the expectations of many computers and a single system Thus, back users can use

    without knowing the computer that really works. Monitor a daunting task and

    difficult since the workstations are designed to work as a typical stand-alone and not

     part of a workstation. Can be facilitated by software systems that hold up the

    watching of the whole systems at various levels by providing a graphical user

    interface and integrated interface.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    18/112

    3

    1.2  Problem Background

    Building a server farm is not easy there are a lot of challenges. One of the

    most important issues is to make sure that the building is equipped with enough

     power to handle the load of all the new devices that are planned to be installed.

     Not only does the power need to be present, but it need also to be tested to

    make sure that there are not frequent surges or sags which would cause the hardware

    to shut-down and restart. The result of this is loss of data and possibly ruined

    equipment. The data center is the core of every business that holds the assets and

    applications that are often subjected to electronic attacks. The result of attackers

    against a server farm will become losses of business for e-commerce that includes

     business to business applications. Data centers are the end point where malicious

    attacks take place. To protect the data center from Electronic attack is crucial for any

     business.

    However electronic attack can influence an increasing number of data server

    centers and computers yearly, the issues of security in the server farms source of

    general concern for large and small businesses. Protecting assets and data effectively,

    the data centers will be free from malicious cyber attacks.

    The basic types of security issues of the server farm is a denial of service

    (DoS), reconnaissance, intrusion attacks, and malicious code copies and worms.

    DOS Denial of service can influence all the data centers that will avoid the allowed

    users for finishing easy business.

    An attacker such intrusion can steal sensitive information. While the misuse

    or abuse poll pirates steal and copy fingerprint server, this technique can be used

    once. A self-duplicating program which can externally damage called worms, May

     be left a denial of service and compromised servers for the risk of hackers with the

    form of the back door. Hackers can use the code for those who request copies decode

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    19/112

    4

    Passwords, select the files that hold secret information. Hackers who use code

    copying can issue commands, decipher passwords and locate files that contain

    confidential information.

    The manageability also becomes principal important, while today in data

    centers usually consist of hundreds or even thousands of nodes. The high-

     performance systems differed significantly from today's heterogeneous machines

    from the earlier period and now countenance the similar set of issues, and those large

    spread systems. One of the main issues countenanced by high-performance systems

    and distributed non-observation of the system state.

    Due to a great enough of the contract and the linked computational,

    applications placed I/O and network demands, failures in great scale systems turn

    into commonplace. Treating hub wear and to maintain or keep up the health of the

    system, the monitoring tool should be talented to fast identify errors so that it can be

    repaired either through out-of-band means (e.g. restart) or automatically. In large

    systems, the communication between a countless of computing nodes, it can be

    complex links, storage devices network and switches.

    Data center needs monitoring tool that arrests a part of these connections and

     presented in ways that are interesting and often lead to a better understanding of the

     behavior of the macroscopic.

    A high quality tool of monitoring can help here as well as long as a worldwide view

    of the system, which can be obliging in recognizing problems of performance and,

    eventually, supplementary planning capacity.

    The priority for administrators is to provide IT resources and services when

    and where they’re needed. The question is, how? 

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    20/112

    5

    1.3  Problem Statement

    Although server farm is a collection of servers or clusters, every server need

    to be managed individually and secured. The question is how to monitor large

    number of machines, it is critical and important to monitor and control servers and

    various resources. Of course there are several Monitoring Tools such as Ganglia,

    PARMON, Monit, Nagios and Card but they are all huge, which would consume a

    lot of system resource when running and their architecture is complex.

    1.4  Project Aim

    The aim of this project is to develop a prototype client server base of resource

    and performance monitoring tool for server farm. It can monitor and obtain

    information and the status of the underlying resources of each server in the server

    farm, such as CPU, Memory, disk utilization and network, and also visualize all

    those information through graphical user interface (GUI).

    1.5  Objectives of the Project:

    1.  To analyze available tools of resource and performance monitoring for Server

    Farm.

    2.  To design and develop prototype of resource and performance monitoring for

    Server Farm.

    3.  To test prototype of resource and performance monitoring for Server Farm.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    21/112

    6

    1.6  Scope of the Project

    1.  The analysis will be conducted mainly with tools about resource and

     performance monitoring for sever farm.

    2.  The prototype will focus on monitoring resources and performance of the

    servers such as such as CPU utilization, memory usage, disk utilization and

    network bandwidth from time to time on demand.

    3.  The prototype will be using as front end C# .

    1.7  Organization of Report

    This project consists of five chapters. These chapters are organized according

    to different works that involved in this study. The detailed organization of this

     project is described in following paragraphs. This section presents how this report is

    organize in different chapters.

    Chapter 1  of this project consists of overview of the project, problem

     background, problem statement, objectives, scope and Aim of this project.

    Chapter 2 of this report presents a review of the literature related to the area

    of management of server farm. It discusses monitoring tools in details that includes

    Ganglia, PARMON, Monit, Nagios and Card.

    Chapter 3  consists of wide description on project methodology, which

     provides a full discussion about the flow of this project. This includes how the

    operational and experimental work has been carried out for the study.

    Chapter 4 discussed architecture and designs of proposed prototype in detail.

    Designs include both the design of client-server system and the design of

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    22/112

    7

     performance monitoring tool which has four critical functions such as CPU

    utilization, memory usage, disk usage and network bandwidth.

    Chapter 5 is the conclusion of overall chapters and future works in the

    related area of monitoring and controlling server farm performance will be discussed.

    This includes recommendations for further study.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    23/112

    8

    CHAPTER 2

    LITERATURE REVIEW

    2.1  Introduction

    This chapter of literature review will help the researcher to provide a high

    level of knowledge in the research area. The job of literature review is to probe

    into areas that are of interest to the research study.

    The researcher will be able to organize and present the research study. For

    example, the literature review provides the reader real understanding of the

    subject knowledge and better evaluation of the research study flow. The

    following figure 2.1 shows diagram of the literature review.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    24/112

    8

    Figure 2.1 Map of Literature Review 

     Na ios

    Monitoring resourceand performance

    Server farm

    PARMON

    Card

    Monit

    Gan lia

    Literature Review (Chapter 2)

    Resource andPerformance

    Monitoringmetric

    CPU Usage

    Memory

    Disk

     Network

     bandwidth

    Virtual Machines Mobility

    makes difficult Security

    General issues onserver farm

    Security Virtualizing leaves

    Server Virtualizin

    Multiple System

    one physical wire

    Traffic Inspection

    Requirements Don’t change

    High Availability BecomesEven More Critical

    Planning Capacity is hard

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    25/112

    10

    2.2  Background Study of the Research

    The Internet seats vital needs on severs, to perform a solid reliable well-organized

    service to clients. Servers must be flexible to failures, also able to hold significant

    numbers of requests, and able to answer those needs fast. A server farm also known

    as association of computers that helps the needs of society that are not easily met by

    individual computer. These computers are placed in individual firm or housed

    different locations (Jayasinghe et al ., 2011).

    Building a server farm is not easy there are a lot of challenges. One of the most

    critical issues is to make sure that the building is equipped with enough power to

    handle the responsibility of all the new devices that are planned to be installed

    (Gandhi et al., 2009).

     Not only does the power need to be present, but it needs also to be tested to

    make sure that there are not many surges or sags which would cause the hardware to

    shut-down and restart. The result of this is loss of data and possibly ruined things. All

    the wires of power even the ground wire should be tested to see if it goes all the way

     back to the main circuit breaker. When it doing all standard testing it is the time to

    consider another problem which would be keep the equipment resources(Niyato et

    al ., 2009).

    Another issue in implementing a server farm would be to evaluate the

    company’s expectations or needs for the future and present. Mostly focusing on how

    much storage space is needed to support daily functions. The data center is the

     purpose of every organization that holds the assets and applications that are often

    subjected to electronic attacks.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    26/112

    11

    The result of attackers against a sever farm will become losses of critical

    information for e-commerce that includes application of business to another business.

    Data centers are end points where malicious attacks take place. To keep these attacks

    are perfect for every business (Gandhi et al., 2010b).

    2.3  General issues on a server farm

    There are plenty of challengers when building a server farm for the first time. To

    make sure is one of the mainly issues that the property is equipped with enough power to handle the pressure of all of the new devices that are planned to be installed

    (Heo et al ., 2011).

     Not only does the nation need to be present, but it needs to develop test and

    ensure that there are not many surges or sags which would cause the hardware to shut

    down and restart. This would result in lost data and possibly ruined equipment. The

    ground wire should also be tested so as understand weather it all the way back to the

    main circuit breaker.

    After doing all the large testing it’s time to worry yet another problem which

    would be to keep the equipment resources from the unavoidable fluctuations in

     power. Even though the input power was tested for major stake and sags it will not

    count for small fluctuations that will in fact destroy a system(Gandhi et al ., 2010a).

    Many people think that surge protectors are the way to go in which that that the

    truth never be further. If a surge protector receives are generally stake and pops to

    save the production hardware it does not always disconnect the power entirely,

    leaving it vulnerable to another point.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    27/112

    12

    A good idea would be to invest in an Uninterruptible Power Supply. This will ensure

     proper protection from surges and also provide a battery backup so that the system

    will stay connected in case of a power outage.

    Some Uninterrupted Power Supplies are set to automatically shut down so when the

     batteries do run out of power there would be no unsaved data loss while others are

    set to notify a trough to shutdown manually. If the server system is expected to

    remain twenty four hours online a day and seven days a week then it may be wise to

    invest in a generator large enough to warrant the entire room. Another problem in

    implementing a server farm would be to evaluate the company’s expectations or

    needs for the future and the present (Zhang et al ., 2010).

    Mainly focusing on how much storage space is needed to support daily functions.

    This need is directly related to how big a server room needs to be. The equipment

    needed can get quite complicated so ample space is required. On top of a big enough

    space to keep the stuff there needs to be sufficient ventilation.

    All the electronic devices in the server room dissipate heat and that heat needs to be

    redirected out of the room. So a room in the middle of a building may not be the best

    choice to make. It would be a lot easier to add more authority if needed and to

    establish ducting to freshen a area that is on one of the sides (Li et al ., 2009).

    Today’s data centers the strongest attribute is virtualization of servers. Comedown to frames of servers into cheaper, smaller and more powerful the main

    direction for every organization is virtual machine farms, saving hardware device,

     power consumption, and air-conditioning capacity (Chunhong et al ., 2008).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    28/112

    13

    2.3.1  Many cable systems in one physical

    Most important difference between physical and virtual environment is the

    failure of one network cable to join the physical server model of use and systemsecurity manager. Although security policies are not necessary that every server has

    its individual connection to the network business, the reality is that most projects can

     benefit from the safety of the physical separation among the servers.

    After that, very much difference between the actual servers simplify the

    design, makes it easy to separate safety. There are many applications on multiple

    servers with dissimilar security configurations will all appear on the same server, and

    "wire" to exit from this server no longer gives us the physical separation (Saboori et

    al ., 2010).

    The great thing in this case is that it is easy to solve. The Company may use

    different types of tools used by VLAN, to provide the same level of security chapter,

    which has always been. In other words, the firewall institutions familiar with CAN

    (usually!) can be upgraded to handle the virtual server is very simple. Business is not

    no need to change the way creating a basic security policy, for its own firewall

    technology, which serves as a safety barrier for the year should continue to serve

    them in a virtual environment on the wall vendor performance and ability to handle

    this load. (This is another issue, but separately.), Have heard of the decision makers

    that are already on the cart or go to the default virtual conference safely on a

     proposal to transfer the security barrier in the virtual machine itself.

    In other words, suggested the use of software-based security services to

    virtual replacement of physical security. Virtual security tools can interact with the

    system's infrastructure and a realistic model to confirm one-system/one-

    application/one-wire least about.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    29/112

    14

    The idea that the installation of safety equipment, often to the virtual server, it

    is determined that more than logic separation and control (Jin et al ., 2007). It's an

    interesting idea, and sure as if moving in the right direction. Unfortunately, the

    majority of companies to avoid this way the plan to default immediately, four

    reasons (Snyder, 2008):

    1)  And the near certainty of limited value. Met the software firewall can run

    in a virtual machine, and some providers do not do more to increase the

    effectiveness of a virtual environment. But the only standard product

    upgrade security in a virtual environment without hooks and clear in the

    hypervisor does not help to define the default project and limit the choice

    of a. Virtual security services are very useful, there must be a real

    integration in a virtual environment that leads to the following

    reasons(Snyder, 2008).

    2)  Useful machine cannot be buying yet.  Important features for the

    security of a VPN, including knowledge of the status of each virtual

    machine, especially devices that migration between servers and full

    control of "virtual switches" in each virtual server . Without this hook a

    hypervisor, security services can not do its job properly virtual. in the

    major virtual environment, that Ware and VMsafe (to date) has an

    application programming interface to enable the firewall fire properly

    integrated with the hypervisor, although the Citrix and Microsoft will

    most likely be the same frame soon. However, security vendors and

    impose any tool that integrates seamlessly with VMsafe. This will change

    quickly, but even if they are fully integrated security service did not start

    in the virtual ship, and system administrators and security providers have

    enough experience with them. not for the security situation in depth

    infrastructure software virtual based on the new brand with an application

     programming interface new, and we hope that we all work

     properly(Snyder, 2008).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    30/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    31/112

    16

    security using firewalls and IPS and other devices to reduce the threat,

    they should move to the default strategy will not change suddenly the

    security chain(Snyder, 2008).

    However what is the alternative to deal with the various systems on the wired

    one? Using traditional firewall? I worked the answer is yes, in the past, and it will

    work well in the virtual world.

    2.3.2  Inspection of Traffic Don’t Change the Requirements

    Companies increasingly under the control of various systems to meet

    regulatory and industry, as well as trying to do to manage and reduce their own risk,

    Review of traffic technology such as intrusion detection and leak detection, and often

    much more to meet this requirement, When we moved from physical servers to a

    hypothetical situation, the need for checks passed unchanged Fortunately, the

    solution of this question is easy to use the existing security services abroad. Leading

     practices in this area to repeat the practice in the near future, If the institution fails to

    install the SPI every server need not be present.

    UTM with IPS device, and to prevent leakage to sit on a place in the network, this

    copy of policies and practices is existing security. In The case where Traffic is

    required to monitor the internal virtual server, and existing solutions, the instrumentcan perform autonomous motion detector that connects to the virtual port

    is "illegal" in the virtual switch, and capture traffic between virtual machines.

    The sensor can be analyzed either directly or password, for more predictable

     performance, the copy that traffic between the external Physical interface where the

    traditional Inspection unit can do the job(Luo et al ., 2002).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    32/112

    17

    2.3.3  High Availability Becomes Even More Critical

    “Place every one of your eggs in the individual container -and see that container” is

    generally satisfactory in a situation of virtual server that is the Mark Twain’s well-

    known saying. For example the functionality of each server is achieved by reducing

    number of servers, and also development of every server the value is possible impact

    of any not working.

    Essentially when a secret document may be physical or implied is in a way that is

    untested, creating secret document highly available is perfect situation if you don’thave already confirmed that a negligible employment creates additional argument for

     programs like IPS and Firewall, and there is another reason to believe using outdoor

    employment is HA. However it can be important to growth the external uses

    accessibility, although is properly accepted wisdom and properly agreed. The major

    danger is that the network availability also it can be justified by enhancing the

    system to meet required conditions(Jayram et al ., 2001).

    Security architecture is the major concern for a virtualization process, though

    the major concern is to incorporate technologies of active-active for services related

    to firewalls compared to the easer strategy of active-passive. There are three

    objectives and they are like the following:

    1)  Usually technology of active-active will grow well than normal reply time of

    devices for the security. While an organization as speed 100 Mbps, a small

    number of milliseconds alteration cannot affect them. But in context of

    virtualization, it drives up uplink network connections, little changes in

    functioning are enlarged higher speeds for access links of 1 Gbps and 10

    Gbps. in general Using technologies of active-active decrease load on every

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    33/112

    18

    security system while simultaneously are working, offering the chance for

    improved functioning.

    2)  Advanced ranks of error acceptance. Through active-active configuration, a

    quite number only are available during every specific part in the system. So if

    there is any deficiency in any machine, device and method, only significant

    amount of the net is involved by check and the likelihood of component

    failure. Actually as soon as practical servers include both short stayed

    connection of HTTP and also offer stayed connection of VPN, backup

    connections, or sharing of files, technologies of active-active places fewer

    risk than active-passive traffic. However when a high robust systems like

     blade-builder systems or server farm are employed through various sharing

    responsibility basics, the problem is greatly minimized The setting when a

    single blade or firewall factor is reduced when it is handling 10 percent of the

    traffic than when it is handling 100 percent of the traffic.

    3)  Theoretically, Active/active configurations and virtualized projects aresuitable for each other,. Virtualization is all about making use of well-

    organized resources, ranging from physical space to hardware capacity. The

    disorganization of active/passive firewalls has for long been disorganized and

    this brought about a problem to security professionals. With virtualization

     projects calling much larger devices, it is more suited to consider the cost

    savings of using active/active and clustering technology where possible.

    Whether an enterprises goes with clustering and active/active technologies or not, the

    key point here is to ensure that high availability features of inline network and

    security elements are easily configured and tested in any virtualization project.

    A firewall is meant to protect servers but not a denial of service when a firewall

     protected dozen severs, it was certainly a problem if that firewall stopped passingtraffic. When firewalls keep a dozen physical servers and a hundred virtual servers,

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    34/112

    19

    this will amount to an overall failure of the business. Liberal use of joint aggregation,

    different server ports, redundant network switches, and redundant links at all points-

    along with HA clusters of security mechanism will reduce the net failure and

    improve availability.

    2.3.4  Planning Capacity is hard

    When the default is to use more applications on the same device address, and

    the network is the use of these materials will increase. Traditionally, the network is

    heavy maintenance of their networks, especially in the data center, rather than for

    capacity planning on the left side of each server. Removed with prices constantly on

    the local network switching equipment, and can spend a lot of time at the expense of

    100 Mbps and 1 Gbps and lives in distress does not deserve to simply just update

    every switch in the rack Gigabit speeds and participation. If the bandwidth is less

    than 1 Gigabit average server technology with remarkable efficiency(Ling and Zahir,

    2002).

    In the world of virtual servers, physical servers, or a group of a simple system

    to saturate the link and 1 GB capacity planning, performance management and the

    second is more important. Tools such as link aggregation that the reliability of the

    system, from which a number of reasons, and now it is also important to bridge the

    gap between the industrialized countries, the new 1 GB per second of precious and

    more expensive 10 GB per second, and switch. The power supply can be used as

     planned. If two virtual machines on the same server to transfer large amounts of data,

    we cannot bear the weight of the network traffic.

    But if one of these virtual machines to switch to other networks or other virtual

    server, network traffic suddenly hit like a bomb ambitions may incur. These

    dissimilarities in network performance and ability operation are also two vital

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    35/112

    20

    insinuations for safety on the side of the sharing of default: basic services must be

    adequate and must be based expansion.

    Denied barely baseline to give an adequate picture of the achievements, but

    there are some implicit signal about the value. Most firewalls and tools for the safety

    of others are cooked on the Internet-oriented applications. in cyberspace, may

    include the movement of everything instead of the failure of applications to support a

     partnership or a video on the multiplayer online, The firewall on the long-term

    relationship with the size of the package (or the back of the failure of the partnership,

    for example) in the case, of middle of the ring. The other, the multicast performance

    is less predictable.

    While, according to documents provided by the data provider is a good first

    step in measuring performance, and mitigation of threats, most HA active / active,

    and a large number of security zones and rules to implement virtualization to take

    him out of the area of comfort for most of the sheet firewall.

    This suggests that instead of testing and monitoring of performance and should be

     part of the plan of the project defaults. The institutions should not be surprised if the

    traffic performance of them gives a. Different, higher or lower than expected.

    Variable performance of the building is the safest way to ensure that security

    applications that can support the current and future growth. Perhaps such features as

    the process in parallel (with code based on the structure or group of devices the most

    active / active are good ways to achieve this goal) Company grant from the edge for

    success.

    When selecting protection devices for performance, it is important to choose

    the most sophisticated equipment product lines. It should be that the company did not

    start with something up 1 GB per second, while providing security for the change

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    36/112

    21

    along the way to go faster. What safety device is selected, a unique line of products

    that can develop together and it is for them a variety of Gigabit speed 10 Gbps. The

    company does not want a product line, or even worse, to other sources, and change

    management, interfaces with complex security policies on the fly to review if they

    are also at risk.

    When you design security architecture for virtual environments is very large,

    and companies should seek safety devices which are based on the balance of the

    structure with the addition of processing elements in the structure of the car. These

    types of safety devices tend to be a better world; companies increase the number of

     processing elements, or timetables or by changing the deceleration speed of the

     blades, if necessary.

    The company does not want to buy a rolling structure of the blades on the first day,

     but be able to remove the leaves and move easily reduce the amount of planning is

    essential to the scope of the project increases.

    Suggest a dirty instead of using the security services in the same way that

    companies have more equipment probation usual in the network.

    But the amount of work cannot from the virtual farm, more intelligent of the

    lot, with a strong sense to develop using tools such as parallel processing

    and hardware-based security structure is the best strategy.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    37/112

    22

    2.3.5  Virtual Machines mobility makes difficult Security

    A feature of the traditional physical servers is that they tend to change

    frequently. To load the application group and a group of units and to avoid any

    sudden change of security policy in a number of servers is very slow. Rather the

    opposite is true for virtual servers: To move the virtual machines and applications of

    system administrators from physical server to physical server as part of the balance

    and control. When using functions such as VMware VMotion, virtual machines

    move more often in response to open the pregnancy and correction, and the system.

    This movement and the application server security makes it difficult to identify (Li et

    al ., 2008).

    Have already described this part is a chance to put a seal layer between

     physical servers and security services as part of the basic design for a server farm

    topology. This aggregation, which includes a large number of servers and VLAN

    them in an instant and without this problem. The important point is the need for

    adequate performance, and bandwidth in the security services. For larger server

    farms, you may be asked for more than 1 GB link provided in bits per second or up

    to 10 Gbps interfaces and interfaces to handle the load and to ensure portability

    wireless. Pressure on the control and safety zone around the layer 2 hop away from

    virtual machines, and will be transferred will not be a problem because it does not

    change (except the MAC address of the server application) when moving virtual

    machines between servers.

    If the company removes a layer of product, the best solution is safer to match

    the hardware configuration with support for the definition of area-based policy. In

    this way, an application that is on one side of the firewall at the same time, but on the

    other side on the other hand, does not need to re-design the security policy. In this

    case, well-designed central management is a must. And determine security policies

    for each unit do not work here.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    38/112

    23

    And "the urgent need for the policy management system that is nothing of the inner

    movement of virtual machines. Security manager must be able to implement a policy

     based on the applications and servers, instead of physical interfaces or devices,

    distribution and determine recovery of this policy between security appliances.

    2.3.6  Security Virtualizing goes with Servers Virtualizing

    From the point of view is very high, default is simply to take the physicalservers and virtual servers grinding down. In the details, however, require much

    more than that. A good default requires a lot of resources, including the ability of

    multiple memories, CPUs, storage, and brings them together for greater efficiency.

    Philosophically, it creates intellect for virtualization security tasks at the same

    time: combine multiple security functions into a single device using this system more

    efficient. Instead of a pile a stack of individual safety devices, it is best to match the

    safety of the largest multi-functional unit on a farm and a large physical server with

    multiple virtual machines.

    Traditionally, companies refused and are often called this strategy to raise the

    security UTM. Reasons in the category of best practices rather than an integratedapproach based on the LUNs UTM States are a legend in the part and a part of my

    work. Since the actual scheme is fixed and clearly separated servers in racks or

    curricula that provide similar results when Virtualizing a large number of servers

    happened, and especially those who sit in different areas of protection, shift the

     balance significantly in favor of the security services integrated UTM. The idea that

    one UTM security services that can handle the various functions in all the different

    sectors that are directly in accordance with the concept of virtualization (Aghajani et

    al ., 2010).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    39/112

    24

    UMTS consolidation of functions, allowing flexibility, The existence and

    functions of the standard means that the motion of the virtual machine is not a

     problem because mitigation technologies and security threats in place, anywhere,

    anytime. UMTS also simplify the topology and distribution. Part of the difficulty of

     building services applications available for a very good agreement, and all

    communication between the enterprise network and application servers.

    HA design of security services and one or two that provides multiple

    functions is much easier than trying to ensure that all paths through all unnecessary

    devices properly, scalable and available. With UTM in place and the institution has

    the greatest ability to publish simplified.

    To find devices UTM, who are ready to develop projects in virtual

    environments is difficult, Also shown a past experience, creating and UTM devices

    for many small businesses, the environment of medium and small office and home,

    and have sufficient flexibility to support the operation of the company. The following

    table shows some key areas to focus on the choice of UTM device for managing the

    virtual environment.

    2.4  Basic Concepts of Performance Measurement

    It can be observed in the system behavior by changes in system status. Any

    change in the system status reports neither the beginning nor the end of a given

    activity (or inactivity) components in the system (a hardware component, a

    component of the program or process). Any change in the state system, as was the

    case: There is a transition from one state to another system, if certain conditions are

    met. Devices to facilitate access to information about the changes in the system, the

    current model of the devices that rely on information about individual components

    and their interaction desired. In particular, one can not know how often is the

    implementation of a particular process (for example, the number of times you entered

    a particular state.) In this case, it is necessary only to detect the occurrence of the

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    40/112

    25

    event and include the receipt of the statement significantly. Some examples of this

    type of measurement are as follows: count tests on each disk, by measuring by

    counting the night in a way to reduce the frequency of page faults, to measure the

    frequency of memory parity error.(Yuanyuan et al., 2008).

    It was available in the frequency of an event by dividing the number of

    incidents that have accumulated along the period, interest. A more difficult and

    include the synchronization of activities observed. The simplest case is to determine

    what percentage of the average time for the system in a particular country.

    Traditional measures of the channel and the CPU or I / O and used at the same time

    (overlapping) channel CPU and L / S in this category. Finally, the most difficult

     problem is that while individual cases of a particular act ivity, ie, to measure when it

    enters a particular state, and the time that the system remains in this state. An

    example of this type of problem is to measure the distribution of service time for the

     processor, or the interval between the measurement errors, such as parity error,

    disruption of the head disk memory.

    In all three cases, and assumes that it is possible to detect changes in the state.

    In fact, for the second category, it is not necessary to reveal exactly when the status

    changes, in many cases, these types of measurements of samples from the second

    state of the system. In response to a question about the status of the system at any

    given time, at random, in the sense that nothing to do with these points on the

    activities of the time measurement. Each monitors, as will or will not find in the case

    of the system corresponding to the measurement of the activity. If he spent the percentage of time in this case, to determine the percentage of successful

    observations (the system was in a state of interest) for a number of observations.

    It should be noted that the timers monitor the performance of the implementation of

    this method. Since the sampling rate is generally very high (1 MHz - 10 MHz), it is

     possible to convert a number of observations over time with high precision.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    41/112

    26

    However, if the measures taken by the programs that have been implemented

    in the systems investigated, the sampling rate remains relatively low because the

    costs associated with them, it is best to use the direct method is described below,

    When the direct method is very simple. Reading hour when measuring the activity

     begins and again when you're done.

    The difference between the readings and the center of activity is measured. This

    method requires, of course, can be detected from the events at the beginning and end

    of each body. It was also assumed that there is adequate time with accuracy, and can

     be accessed easily, and which appear on the screen for certain activities.

    2.4.1  Performance parameters

    2.4.1.1  CPU utilization

    CPU utilization is a key performance metric. It can be used to track CPU

     performance regressions or improvements, and is a useful data point for performance

     problem investigations. It is also fairly ubiquitous; it is reported in numerous places

    in the Windows family of operating systems, including Task Manager (taskmgr.exe),

    Resource Monitor (resmon.exe), and Performance Monitor (perfmon.exe) (Xiaorui et

    al ., 2009).

    The concept of CPU utilization used to be simple. Assume that there is a

    single core processor fixed at a frequency of 2.0 GHz. CPU utilization in this

    scenario is the percentage of time the processor spends doing work (as opposed to

     being idle). If this 2.0 GHz processor does 1 billion cycles worth of work in a

    second, it is 50% utilized for that second, fairly straightforward (Bridges et al .,

    1992).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    42/112

    27

    2.4.1.2  Memory Utilization

    Although the principle for estimating the service time for memory is the same

    as that described in Resource Utilization and Performance,, it use a different formula

    to estimate the performance impact of memory utilization than you do for other

    system components. Memory is not managed as a single component such as a CPU

    or disk, but as a collection of small components called pages. The size of a typical

     page in memory can range from 1 to 8 kilobytes, depending on the operating system.

    A computer with 64 megabytes of memory and a page size of 2 kilobytes contains

    approximately 32,000 pages (Kundu et al ., 2010).

    When the operating system needs to allocate memory for use by a process, it

    scavenges any unused pages within memory that it can find. If no free pages exist,

    the memory-management system has to choose pages that other processes are still

    using and that seem least likely to be needed in the short run. CPU cycles are

    required to select those pages. The process of locating such pages is called a page

    scan. CPU utilization increases when a page scan is required (Ramamoorthy and

    Wah, 1981).

    Memory-management systems typically use a least recently used algorithm to

    select pages that can be copied out to disk and then freed for use by other processes.

    When the CPU has identified pages that it can appropriate, it pages out the old page

    images by copying the old data from those pages to a dedicated disk. The disk or disk

     partition that stores the page images is called the swap disk, swap space, or swap

    area. This paging activity requires CPU cycles as well as I/O operations.

    2.4.1.3  Disk usage

    Disk usage is the amount of space in a specified directory on a computer disk.

    Disk usage results are usually based on the du command. Disk usage will display the

    http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf02.htm#ToC_61http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf46.htm#sii-01basic-26652http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf46.htm#sii-01basic-26652http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf02.htm#ToC_61

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    43/112

    28

    total number of directories within the domain’s online space and is calculated in

    kilobytes (KB). Disk usage also shows the entire directory paths in which files are

    contained. The most commonly used command for monitoring disk space usage is

    /usr/bin/df, which, by default, displays the number of free blocks and files on all

    currently mounted volumes. Alternatively, many administrators create an alias for df

    in their shell initialization script (for example, ~/.cshrc for C shell) like df -k, which

    displays the amount of free disk space in kilobytes (Ohyama, 1994).

    2.4.1.4  Network bandwidth

    In computer networks, bandwidth is often used as a synonym for  data transfer

    rate - the amount of data that can be carried from one point to another in a given time

     period (usually a second). This kind of bandwidth is usually expressed in bits (of

    data) per second (bps). Occasionally, it's expressed as bytes per second (Bps). A

    modem that works at 57,600 bps hastwice the bandwidth of a modem that works at

    28,800 bps. In general, a link with a high bandwidth is one that may be able to carryenough information to sustain the succession of images in a video presentation. It

    should be remembered that a real communications path usually consists of a

    succession of links, each with its own bandwidth. If one of these is much slower than

    the rest, it is said to be a bandwidth bottleneck.

    In electronic communication, bandwidth is the width of the range (or  band) of

    frequencies that an electronic signal uses on a given transmission medium. In this

    usage, bandwidth is expressed in terms of the difference between the highest-

    frequency signal component and the lowest-frequency signal component. Since the

    frequency of a signal is measured in hertz (the number of cycles of change per

    second), a given bandwidth is the difference in hertz between the highest frequency

    the signal uses and the lowest frequency it uses. A typical voice signal has a

     bandwidth of approximately three kilohertz (3 kHz); an analog television (TV)

    http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212583,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci331643,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212986,00.htmlhttp://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212160,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212244,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212441,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212441,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212244,00.htmlhttp://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212160,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212986,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci331643,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212583,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.html

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    44/112

    29

     broadcast video signal has a bandwidth of six megahertz (6 MHz)  -- some 2,000

    times as wide as the voice signal.

    The following table illustrates possible causes of high performance consumption for

    server farm.

    Table 2.1 shows causes of high performance consumption for server farm.

    Causes Description

    Application processes Process spawning lots of threads in high load condition

    where there is no throttling at all. This can cause unusually

    high CPU consumption just because of the unexpected load

    on the application. This will generally consume the CPU

    cycles available on the machine.

    Other processes not

    application process

    This may be due to totally unrelated processes like batch

     jobs, alerting jobs, cron jobs etc

    System/OS processes Operating system has scheduled jobs/processes that can be

    consuming high CPU for a particular time period. Generally

    these processes run with higher priority (nice value) then

    other regular application processes that may lead to

    consuming high CPU.

    many users are using the

    application at the same

    time

    Several users are using application same time so this

    generally will consume high memory.

    External process External process clients can cause consuming more memory

    many indexed items Too many indexed items in one index column caused by

    unplanned increase in crawled content or changed type of

    content

    Query matching When the indexer and query matching components are

    http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212562,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212562,00.html

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    45/112

    30

    component installed on

    the index server but the

    query matching

    component has been

    stopped

    running on the same server, the query matching component

    is responsible for deleting old index sets as it is activating

    new sets. If the query matching component has been stopped

     but the administrator has not suspended indexing, the

    indexer will continue to produce new index sets based on

    crawled content. As the query matching component is unable

    to delete the old index sets, the disk usage will increase over

    time.

    Insufficient bandwidth Sometimes, a network just doesn't have the throughput it

    requires. When a network does bog down, several options

    typically exist for increasing capacity. Besides boosting up-

    and downstream speeds

    DNS errors DNS configuration errors can lead to numerous network

    failures and generalized slow performance.

    Spyware infestation Spyware, the scourge of the last few years, finally appears to

     be meeting its match in business environments. The

    development of potent anti-spyware tools, combined with

    effective end user policies, is reducing the impact ofspyware in many organizations

    Virus A computer virus can cause a memory loss and other

     problems. Viruses attach to files on your computer, causing

    them to require more memory than normal.

    2.5  System Monitoring 

    System monitoring is essential and is one of the most important responsibilities

    that a system administrator has. Its aim is to be able to know at every moment what

    is happening in the system, to detect the problems.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    46/112

    31

    2.5.1  MONIT (UNIX Systems Management) Tool

    One of the famous managing and monitoring tools, Monit, it monitors

     processes, file, directories and devices on UNIX system. Automatic maintenance is

    conducted by monit and can execute meaningful causal actions in error situation. For

    instance monit can start a process restart a process if does not run, respond and stop a

     process if it uses too much resource. To monitor files, directories and devices it may

    use MONIT for changes, such as timestamp changes, checksum changes or size

    changes (MONIT, 1998).

    However, control file can be configured based on free format monit, it is

    controlled via an easy, token syntax oriented. Syslog logged by Monit or to its own

    file of log and informs the conditions about error via alert messages of customizable.

    Monit uses Many TCP/IP to carry out protocol checks, network checks and SSL

    utilize for such checks. A HTTP(S) interface is provided by monit and to access the

    monit server can use a browser

    Figure 2.2 overview of monit 

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    47/112

    32

    2.5.2  Nagios

     NAGIOS is one of tool that monitors the other network computers orcomponents status. It can monitor the network and it alert when effects happen. For

    example if fails one the computers or the responding stops someway, Nagios will

    send page an email, or allow to know in various ways. However the current status

    shows a web page Nagios monitoring all the systems because Nagios has many

    abilities, to set up can be complex.

    Figure 2.3 an overview of Nagios.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    48/112

    33

    2.5.3  Ganglia Tool

    Another scalable distributed monitoring system for high performancecomputing systems such as clusters and Grids is Ganglia. The design is based on

    hierarchy, federations of clusters is the target of ganglia. It relies based

    listen/announce protocol on a multicast to monitor clusters state and a tree of point-

    to-point used by ganglia, amongst connections delegates nodes of cluster to count

    clusters and federate them, It widely leverages used technologies such as, XDR for

     portable, compact transport data, XML for representation data and RRD tool for

    visualization and storage data. There are achievement overheads when structures of

    data and the algorithms on individual system are accepted high concurrency. The

    implementation is healthy, ported to an wide set of operating systems and

    architectures of processor, and is now in use on more than 500 clusters about the

    world (Massie et al., 2004).

    Ganglia are based on a hierarchical design targeted at federations of clusters

    (Fig. 1). It relies based listen/announce protocol on a multicast to monitor clusters

    state and uses connections of a tree of point-to-point between cluster of

    representative nodes to clusters of federate and their state aggregation. Within each

    cluster, Ganglia use on a well-known multicast address heartbeat messages as the

    foundation for protocol of a membership. Membership is claimed by using the

    heartbeat reception as a sign that the non-reception and available node of a heartbeat

    over multiple of a small of a periodic interval announcement as a sign that

    unavailable node. Each node monitors its local resources and sends multicast packetscontaining monitoring data on a well-known multicast address whenever significant

    updates occur. Applications may also send on the same multicast address in order to

    monitor their own application-specific metrics.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    49/112

    34

    Ganglia distinguish between built-in metrics and application-specific metrics

    through a field in the multicast Packets of monitoring will sent. All listening nodes

    for both types of well-known address multicast metrics and gather and maintain

    monitoring information for every node. Therefore, always all nodes have an

    estimated view of the cluster’s state entire and this state is reconstructed easily after a

    crash (Massie et al ., 2004).

    Figure 2.4 Ganglia architecture

    Ganglia federate multiple clusters together using a tree of point-to-point

    connections. All entities in the domain been federated are clustered before exiting, on

    the other hand system on the high hierarchy specify aggregation points. Since, the

    monitoring data of the cluster is copied on each system, the outgoing computer

    represent a distinct cluster in a logical manner otherwise they represents a set of

    clusters. (We specify multiple cluster nodes for each leaf to handle failures.) The

    counting of each portion of the set is done in a timely interval.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    50/112

    35

    Monitoring data from both leaf nodes and aggregation points is then exported

    using the same mechanism, namely a TCP connection to the node being polled

    followed by a read of all its monitoring data.

    2.5.4  CARD

    CARD (Cluster Administration using Relational Databases) is system for

    monitoring large clusters of cooperating computers. CARD scales both in capacity

    and in visualization to at least 150 machines, and can in principle scale far beyondthat. The architecture is easily extensible to monitor new cluster software and

    hardware. CARD detects a fault and determines the best way of recovery in a

    systematic form. CARD uses a Java applet as its primary interface and it allows

    internet users anywhere to use their browser to monitor the cluster (Patterson, 1997).

    While monitoring large clusters; CARD identified four different problems

    and the countermeasures. Initially they try to figure out the evolution of software and

    hardware in a cluster. Secondly is the issue of fault tolerance mechanisms in the

    cluster and the corresponding software. Thirdly is the explanation on how they

    increase data scalability. Finally they explain how they display the statistical display

    of information from a large number of systems (Patterson, 1997).

    2.5.5  PARMON

    PARMON allows the user to monitor system activities and resource

    utilization of various components of workstation clusters. It monitors the machine at

    various levels: Component, node and the overall level of the system displaying a

    system image as individual. PARMON the administrator of the system lets

    monitoring of the following functions

    I.  Utilization of system resource aggregations

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    51/112

    36

    II.  Activities of process.

    III.  Activities of system log.

    IV.  Activities of the kernel.

    V.  Many requests as similar source.

    PARMON lets the client describe actions that trigger certainly when a party

    condition is satisfied. It offers logical and physical outlooks of the of the system

    components. The PARMON key features include the following (Buyya, 2000).

    I.  Development exploits of most modern technologies, software andhardware features for imaging and communication.

    II.  Lets the user to build the structure of the database (groups and nodes)

    includes the name of the node, interfaces of communication, and specific

    unit to monitor the disk.

    III.  Holds recording details of the structure and configuration of the machine

    to complete nodes of a cluster.

    IV.  Lets the system instrumentation of resources like a CPU, memory,

    network and disk, and their parameters, both micro at and macro level.

    V.  Holds cluster monitoring at level of node, set of group or set of total

    system, and therefore exhibits a single image of the system.

    VI.  Lets the performance equivalence of chosen operations on a family or

    individual of workstations, interactive reference and real-time monitoring

    (e.g. Memory, processor, network and disk utilization), and maintenance

    of the normal tasks like cluster or node shutdown.

    VII.  The client PARMON is moveable of all programmed stages supporting

    structure of Java runtime, JVM (Java Virtual Machine) and server

    PARMON is moveable of running machines Linux or Solaris.

    In PARMON there are parmon-server and parmon-client. The model of

    system as shown in Figure 2.9 continue to the client – server case with monitoring

    nodes acting as servers and systems of monitored or user-position acting as clients.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    52/112

    37

    The nodes of the cluster are able to monitor from any PC, workstation, or the cluster

    node itself. The server of PARMON is weighted nodes that require monitoring

    (Buyya, 2000).

    Requests of the client the parameters values through passing message and

    gets the answer of the server in messages form. The messages interpreted by the

    client and converted them into proper format visualization of graphical. A client can

    monitor selectively observe a few nodes of the group or all the nodes.

    The cluster theory is supported by effective monitoring. A group kind of

    group nodes are elected based on the resources allocation to different set of users.

    Such a method of a grouping helps in collecting and monitoring statistics of the

    usability, with which the administrator of the system can change the allocation

    strategy of the resource.

    Figure 2.5 PARMON architecture 

    PARMON is planned to take independent of other system monitoring; it a

    easy method uses (there is no any protocol standard) for transferring data between its

    servers and clients.

    The layer of transport consists of sockets connected (TCP/IP) streams and the layer

    of software uses messages character and strings. Required monitoring data is

    retrieved by the client from the running server on the nodes of the cluster by

    exchanging messages. The message normally requested by the client contains an

    indicating etiquette what it is looking for. The reply message of the server contains a

    strings of series, whose varies distance from one type of application to another.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    53/112

    38

    The following Table 2.1 shows comparing core functions in different

    monitoring tools such as Ganglia, Parmon, Monit, Nagios and Card.

    Table 2.2: Shows comparing core functions in different monitoring tools

     Number of monitoring tools has been developed for high performance

    computing PARMON is one of the most familiar who allows the user to monitor

    system activities and resource utilization of various components of cluster’s

    workstation. Also Ganglia is popular toolkit for systems of cluster and grids, which is

     based on a hierarchical design. It exploits a multicast-based listen/announce protocol

    to monitor states within clusters. In Ganglia architecture, a tree of TCP

    (Transmission Control Protocol) connections between multiple daemons can

    aggregate monitoring information for multiple clusters.

    In monitoring tools is a critical and important task to monitor performance of

    the servers From Table 2.1, out of 12 functions, there are four functions that can

    successfully embed 100% of monitoring tools. These four functions are “CPU

    activity”, “Memory activity”, “Disk activity” and “Network activity”. Process

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    54/112

    39

    activity function all tools were embedded except Nagios tool. However there are also

    other functions that are embedded some of the tools such as device activity all the

    tools were embedded except Ganglia and Nagios.

    Table 2.3: Shows comparing mechanisms in different monitoring tools

    It need to identify the mechanisms of those tools like Ganglia, CARD,

    Parmon, Monit and Nagios table 2.3 shows that the PARMON is designed to run

    independent of other monitoring systems; it uses a simple mechanism (not any

    standard protocol) for transporting information between its servers and clients. The

    layer of transport consists of socket connected (TCP/IP) streams and the layer of

    application uses messages character strings. The required monitoring information

    retrieved by the client from running the server on the nodes of the cluster by

    swapping messages. The request message of the client usually contains a code

    representative what it is appearing for. The reply message of the server contains a

    series of strings, whose varies length from single type of request to another. And also

     both a ganglia and Monit are using TCP connection.. And CARD is used Hybrid

    Push/Pull Protocol and finally Nagios is using Plug-ins available with the

    distribution. Plug-ins for Nagios are Perl or other similar scripts that, when executed,

    sends a specific data query to a device. The value returned from the plug-in is what

     Nagios tracks, the plug-ins do all the work.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    55/112

    40

    2.6  Summary

    In this chapter, we covered the area that is necessary for the development of

    monitoring server farm tool. An investigation has been done on previous literature

    from some resources such as internet, books, conferences and journal. We also

    discussed some important concepts about monitoring systems such as server farm

    monitoring tools and effective controlling servers and so on. Although this project

    had gathered all the literature review about server farm security management, a good

    understanding for each field is very important in order to develop effective server

    farm monitoring tool.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    56/112

    42

    CHAPTER 3

    PROJECT METHODOLOGY

    3.1  Introduction

    This chapter demonstrates short description of project methodology that will

     be used in this research. As most excellent follow project methodology procedures,

    tools and models must be named so as to fix the prototype. However the operational

    framework of the project, schedule of the project, the researcher will discuss in this

    chapter and afterward on the requirements of software and hardware for the proposed

     prototype development

    3.2  Operational Framework

    To ensure that all the activities of this project are well-organized, it needs

     project methodology to direct those activities to the right guidance. For instance to

    collect all data linked to the project so as to develop a methodology or operational

    framework. And also to ensure that all the jobs of the project have been clearly done.

    As shown Figure 3.1 the operational framework of the project. And the Table

    3.1 demonstrates the features of the project operational framework.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    57/112

    42

    PHASE 1  – Analysis of Tools Monitoring Server Farm 

    PHASE 2  – Design anddevelop bothsystemarchitectureand systemdesign

    PHASE 3  – Testingprototype andRepot written

    Choose important functions and

    add one extra function

    Test Prototype

    Report Writing

    Prototype

    accepted

     No

    Yes

    Develo Protot e

    Analyze existing Tools of

    monitoring server Farm.

    Compare core functions of

    selected tools of monitoring

    server Farm.

    Design System Architecture.

    Design Interface of client-

    server monitoring

     performance.

    Figure 3.1 the Project operational framework

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    58/112

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    59/112

    44

    Prototype

    of

    monitorin

    g server

    farm

    Develop

    the

    prototype

     prototype of

    server farm

    monitoring tool.

      To develop

    sub

    component

    of the

    system\

      To develop

    GUI

    interface

    monitoring

    server farm

     prototype

    (GUI

    architecture).

     Coding of

    component1

     Coding of

    component2

     Coding ofcomponent 3

    and features that

    will be included

    the monitoring

    server farm

    Prototype(architecture

    and design GUI

    of the system).

    4 Test the

    Prototype

    Write the

    report

     To design

    system features.

     To test the

     prototype.

     To get finalized

     prototype.

     To write the

    final report of

    the prototype.

     Write the

    report by

    Combining

    and

    organizing

    all the data

    in

    understanda

     ble way.

      Using report

    writing skills.

      Final

    prototype.

      Complete final

    report.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    60/112

    45

    3.2.1  Analysis tools of monitoring servers.

    This section analysis tools of monitoring servers the researcher is going to

    highlight collected data during online research and offline research will be analyzed,

    the methods used to analyze it and the data analysis tools used.

    3.2.2  Data Analysis Methods

    Analyzing information, the researcher can use one of the data analysis

    techniques called qualitative and quantitative but in this research will be applied

    quantitative method.

    3.2.3  Project Schedule

    The schedule of the project will roll through down tin general schedule of the

     project contain the start date of the project and project end date, also the actions that

    wanted to perform in the research according to the objectives of the project. The

     project schedule details are exposed in Gantt chart attached in Appendix A.

    3.2.4  Prototype methodology

    System prototyping is a quick development of software so as to confirm

    requirements. Using software prototyping assists developers and users to identify for

    the system requirement, vulnerabilities, mistakes and omissions are identified. So

    users can see how the system supports their work.

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    61/112

    46

    Generally prototyping can be considered as risk reduction activity. In

     particular it provides improved system usability closer match to the system needs,

    improved design quality, improved maintainability and reduced overall development

    efforts.

    The Figure 3.2 shows prototyping process in the project. (Sommer Ville, 2000)

    Figure 3.2 System prototyping 

    There are two approaches for prototyping: Evolutionary prototyping approachand Throw-away prototyping. In this research, Evolutionary prototyping approach is

    used where an initial prototype is produced and refined through a number of stages

    as shown in Figure 3.3. (SommerVille, 2000).

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    62/112

    47

    Figure 3.3 Evolutionary Prototyping

    3.3  Use case of the proposed tool.

    The use case diagram of the proposed tool is represented both client side and

    server side. Figure 3.4 illustrates use case proposed tool for client side.

    Yes

     No

    Develop abstract 

    specification 

    Build prototype

    systemTest the

    Prototype

    system

    Deliver

    system System is

    completed?

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    63/112

    48

    Figure 3.4 Use Case Diagrams for client side

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    64/112

    49

    This tool performs five main different Functions as figure 3.4 shows. From

    table 3.2 the functions are Check System Information, Check CPU performance,

    Check Memory Performance, Check Disk performance and Check Network

    Bandwidth. The description of each function and the preconditions that requires

     being present before each function are presented.

    Use Cases Description Precondition

    Check System

    Information

    System Information, which

    contains basic information

    about the target client

    operating system

    Windows operating systems

    of version XP and higher.And .Net Framework 2.0 or

    later versions installed on theclients and the server.

    Check CPU

     performance.

    It collects CPU performance,

    such as CPU usage,

    Windows operating systems

    of version XP and higher.

    And .Net Framework 2.0 or

    later versions installed on the

    clients and the server.

    Check Memory

    Performance

    Checks all nodes the Memory

    Utilization, and visualizes the

    server.

    Windows operating systems

    of version XP and higher.

    And .Net Framework 2.0 or

    later versions installed on the

    clients and the server.

    Check Disk

     performance.

    It collects Disk performance

    information all the nodes andshows in the server computer.

    Windows operating systems

    of version XP and higher.And .Net Framework 2.0 or

    later versions installed on the

    clients and the server.

    Check Network

    Bandwidth.

    First collect information about

     Network bandwidth such

    input signal and output, after

    collection then visualize the

    server.

    Windows operating systems

    of version XP and higher.

    And .Net Framework 2.0 or

    later versions installed on the

    clients and the server.

    Table 3.2  Use Case Descri tion for client module

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    65/112

    50

    Figure 3.5 shows as use case diagram for server module, this module first

    receives the information from the client module and visualize to the control node.

    Figure.3.5 Use Case Diagrams for server side

  • 8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING

    66/112

    51

    As the above the table 3.3 the server module first of all receives the resource

    information such system information, CPU usage, Memory usage, Disk utilization

    and Network bandwidth and displays to the control node or the server.

    Use Cases Description Precondition

    Receive and display

    System Information

    It receives System

    Information, which contains

     basic information about the

    target client operating system

    and display.

    Windows operating systems

    of version XP and higher.And .Net Framework 2.0 or

    later versions installed on theclients and the server.

    Receive and display

    CPU performance.

    It receives the CPU usage, and

    visualizes on the server or

    control node.

    Windows operating systems

    of version XP and higher.

    And .Net Framework 2.0 or

    later versions installed on theclients and the server.

    Rec