8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
1/112
ii
UNIVERSITI TEKNOLOGI MALAYSIA
DECLARATION OF THESIS / POSTGRADUATE PROJECT PAPER AND COPYRIGHT
Author’s full name : Abdirashid Hassan Abdi
Date of birth : 25th September 1987
Title : CLIENT SERVER APPLICATION FOR
SERVER FARM PERFORMANCE
MONITORING
Academic Session : 2011/2012(2)
I declare that this thesis is classified as:
I acknowledged that Universiti Teknologi Malaysia reserves the right as
follows:
1. The thesis is the property of Universiti Teknologi Malaysia.2. The Library of Universiti Teknologi Malaysia has the right to
make copies for the purpose of research only.
3. The Library has the right to make copies of the thesis for
academic exchange.
Certified by:
SIGNATURE SIGNATURE OF SUPERVISOR
P00076735 DR ISMAIL FAUZI ISNIN
(NEW IC NO. /PASSPORT NO) NAME OF SUPERVISOR
Date : 21 JUNE 2012 Date : 21 JUNE 2012
NOTES : * If the thesis is CONFIDENTAL or RESTRICTED, please attach with the
letter from the organization with period and reasons forconfidentiality or restriction.
CONFIDENTIAL (Contains confidential information under theOfficial Secret Act 1972)*
RESTRICTED (Contains restricted information as specifiedby the organization where research was
OPEN ACCESS I agree that my thesis to be published asonline open access (full text)
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
2/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
3/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
4/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
5/112
iii
“Dedicated to my beloved family and friends, without their understanding,
supports, and most of all love, the completion of this work would not have been
possible.”
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
6/112
iv
ACKNOWLEDGEMENT
First and foremost, I would like to thank Allah because of His blessings; I
would be able to successfully complete this dissertation. My word of appreciation
goes to Dr Ismail Fauzi Isnin for his priceless supervision, inspiring discussion and
fruitful collaboration. I am thankful for all his invaluable hours to provide
constructive critics, enthusiasm, immerse knowledge and continuous feedback.
Without his continued support and patience, this dissertation would not have been the
same as presented here.
My thanks also extend to my friends, for their enlightening companionship
and encouragement of trudging through all the moments from down to up the hill in
the run to complete this Master program. I would not have done it without the help
and motivation from all of you.
To my family, no words can describe my gratefulness for always being there
despite of the distance. They showered me with love and compassion and enrich my
life like no other. They are the source of comfort and kept me focus the priorities in
life and therefore, this work is dedicated to them.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
7/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
8/112
vi
ABSTRAK
Stesen kerja atau ladang pelayan telah menjadi penyelesaian yang kos efektif
untuk pengkomputeran yang berprestasi tinggi. Ladang pelayan atau pelayan
berkelompok adalah gabungan pelayan komputer yang biasanya dikendalikan oleh
syarikat untuk mencapai keperluan pelayan jauh di luar kemampuan sebsah mesin.
Ladang pelayan sering mempunyai salinan pelayan dimana ia boleh mengambil alih
fungsi pelayan utama apabila pelayan utama mengalami kerosakan. Ia adalah kritikal
dan penting untuk memantau, mengawal dan menguruskan pelayan dan sumber-
sumber yang lain. Untuk menangani masalah ini, ia memerlukan system aplikasi
pemantauan prestasi yang digunakan kepada sekelompok pelayan, yang boleh
memantau pelbagai sumber seperti penggunaan CPU, penggunaan cakera dan
rangkaian lebar dari semasa ke semasa. Rekabentuk sistem aplikasi pemantauan prestasi ini membolehkan flesibiliti dan kebolehpanjangan skala meningkat.
Maklumat akan dipapar dalam format carta dan akan disegarkan dalam selang masa
tertentu. Eksperimen berdasarkan kepada sistem prototaip yang menggambarkan
system aplikasi ini boleh menilai dan mengumpul data yang berkaitan dan
digambarkan ke dalam bentuk carta dan menunjukkan kebolehgunaan yang baik.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
9/112
vii
TABLE OF CONTENTS
CHAPTER TITLE PAGE
DECLARATION ii
DEDICATION iii
ACKNOWLEDGMENT iv
ABSTRACT v
ABSTRAK vi
TABLE OF CONTENTS vii
LIST OF TABLES xi
LIST OF FIGURES xiii
LIST OF APPENDICES xv
1 RESEARCH OVERVIEW
1.1 Introduction 1
1.2 Problem Background 3
1.3 Problem Statement 5
1.4 Project Aim 5
1.5 Objectives of the project 51.6 Scope of the project 6
1.7 Organization of report 6
2 LITERATURE REVIEW
2.1 Introduction 8
2.2 Background Study of the Research 10
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
10/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
11/112
x
4 DESIGN PHASE
4.1 Introduction 56
4.2 Architecture of proposed system 57
4.3 Proposed Tool flowchart. 59
4.4.1 Server side flowchart 59
4.4.2 Client side flowchart 60
4.4 Monitoring Nodes 61
4.5 Techniques and Algorithms of the Proposed Tool 62
4.5.1 Client side algorithm 62
4.5.2 Server algorithm 64
4.5.3 Registered User and Organization algorithm 65
4.6 Retrieving Data 67
4.7 Design of proposed system 68
4.8 Chapter Summary 69
5 IMPLEMENTATION AND RESULTS
5.1 Introduction 70
5.2 Testbed for the Proposed Tool 71
5.2.1 Test Case 1 72
5.3 Server farm monitoring tools and proposed tool comparison 83
5.8 Chapter Summary 84
6 Conclusion and Recommendation
6.1 Introduction 85
6.2 Concluding Remarks 85
6.3 Contributions 87
6.4 Future works and recommendation 88
6.8 Chapters Summary 89
REFFERENCE 90
APPENDIX A 95
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
12/112
xi
LIST OF TABLES
TABLE NO TITLE PAGE
2.1 Causes of high performance consumption for server farm 30
2.1 Comparing core functions in different monitoring tools 39
2.2 Comparing mechanisms in different monitoring tools 40
3.1 Details of operational framework 44
3.2 Use Case Description for client module 50
3.3 Use Case Description for server module 52
3.4 Software requirements 53
5.1 Comparison core functions of existing tools and proposed tool. 83
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
13/112
xii
LIST OF FIGURES
FIGURE NO TITLE PA
GE
2.1 Literature review map 9
2.2 Overview of monit 32
2.3 An overview of Nagios 33
2.4 Ganglia architecture 35
2.5 PARMON architecture 38
3.1 Project Operational Framework 43
3.2 System prototyping 47
3.3 Evolutionary Prototyping 483.4 Use Case Diagrams for client side 49
3.5 Use Case Diagrams for server side 51
4.1 The architecture of the proposed tool 57
4.2 Flowchart of server side on proposed system 59
4.3 Flowchart of client side on proposed system 60
4.4 Pseudo code of the client 63
4.5 Pseudo code of the server 64
4.6 Registered User and Organization Algorithm 66
4.7 Code to get available Memory and CPU usage 67
4.8 Design of server side of proposed tool 68
5.1 Configuration of testbed 71
5.2 Main interface of the central monitoring 73
5.3 Adding New Client 74
5.4 Client list form 74
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
14/112
xiii
5.5 Choose client form 75
5.6 Choosing performance type 76
5.7 Performance monitoring 77
5.8 Removing Counter 78
5,9 Change color 79
5.10 System information 80
5.11 CPU information 80
5.12 Memory information 81
5.13 Disk information 82
5.14 Network Bandwidth 82
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
15/112
xiv
LIST OF APPENDICES
APPENDIX TITLE PAGE
A Gantt chart 95
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
16/112
xv
CHAPTER 1
PROJECT OVERVIEW
1.1 Introduction
Now days every business linked to the Internet and also managing and
organizing e-business within each application, these applications are often prepared
within server farm. Server farm is a collection of servers or clusters in a secure; who
an internet seats vital needs on servers, to perform a solid reliable well-organized
service to clients. Servers must be flexible to failures, also able to hold significantnumbers of requests, and able to answer those needs fast. A server farm also known
as group of computers that helps the needs of organization that are not easily met by
single computer. These computers are placed in single house or housed different in
locations(Heo et al ., 2011).
In 1980s can improve the performance of the computer by creating more
capable processors and quicker believed by several computer scientists. But in 1990s,
the concept of clustering was challenging this idea (Buyya, 2000), which
fundamentally means interconnecting two or more computers to achieve shared
functions as a single system. Actually the computers are extremely connected to each
other and collectively support the server needs and handle additional load that is
placed on the server. This additional load is distributed among the different farm
computers and different server components. So, it provides computing power for
advanced needs
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
17/112
2
However most of server farms contain a primary and back-up system so that
if the main server goes down then the back-up system will prevent shutting down
your companies services (Hai Huang, 2009).
Early time server farms were used mostly in academic and research services
but has changed. But know universities and all companies are using server farms.
Though a mainframe can house up more than hundreds of virtual machines and eat
less energy. They are also easy to manage and maintain when it use server farms an
experts needs to fix physical problems while the mainframes is mostly likely a
software issues. However a large server farm wants a lot of cooling systems and
extremely large amount of power. For this reason, server farm is measured by
performance per watt rather than performance per processor.
A server farm present several advantages such as the following:
i. Delivery data is very fast and reliable
ii. The capacity is highiii. Flexibility and scalability
iv. Cost effective physical placement and simplified
v. Secure remote management
vi. No single point of failure Redundancy
The goal is to give up server farm infrastructure (hardware, software, or both)
to the expectations of many computers and a single system Thus, back users can use
without knowing the computer that really works. Monitor a daunting task and
difficult since the workstations are designed to work as a typical stand-alone and not
part of a workstation. Can be facilitated by software systems that hold up the
watching of the whole systems at various levels by providing a graphical user
interface and integrated interface.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
18/112
3
1.2 Problem Background
Building a server farm is not easy there are a lot of challenges. One of the
most important issues is to make sure that the building is equipped with enough
power to handle the load of all the new devices that are planned to be installed.
Not only does the power need to be present, but it need also to be tested to
make sure that there are not frequent surges or sags which would cause the hardware
to shut-down and restart. The result of this is loss of data and possibly ruined
equipment. The data center is the core of every business that holds the assets and
applications that are often subjected to electronic attacks. The result of attackers
against a server farm will become losses of business for e-commerce that includes
business to business applications. Data centers are the end point where malicious
attacks take place. To protect the data center from Electronic attack is crucial for any
business.
However electronic attack can influence an increasing number of data server
centers and computers yearly, the issues of security in the server farms source of
general concern for large and small businesses. Protecting assets and data effectively,
the data centers will be free from malicious cyber attacks.
The basic types of security issues of the server farm is a denial of service
(DoS), reconnaissance, intrusion attacks, and malicious code copies and worms.
DOS Denial of service can influence all the data centers that will avoid the allowed
users for finishing easy business.
An attacker such intrusion can steal sensitive information. While the misuse
or abuse poll pirates steal and copy fingerprint server, this technique can be used
once. A self-duplicating program which can externally damage called worms, May
be left a denial of service and compromised servers for the risk of hackers with the
form of the back door. Hackers can use the code for those who request copies decode
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
19/112
4
Passwords, select the files that hold secret information. Hackers who use code
copying can issue commands, decipher passwords and locate files that contain
confidential information.
The manageability also becomes principal important, while today in data
centers usually consist of hundreds or even thousands of nodes. The high-
performance systems differed significantly from today's heterogeneous machines
from the earlier period and now countenance the similar set of issues, and those large
spread systems. One of the main issues countenanced by high-performance systems
and distributed non-observation of the system state.
Due to a great enough of the contract and the linked computational,
applications placed I/O and network demands, failures in great scale systems turn
into commonplace. Treating hub wear and to maintain or keep up the health of the
system, the monitoring tool should be talented to fast identify errors so that it can be
repaired either through out-of-band means (e.g. restart) or automatically. In large
systems, the communication between a countless of computing nodes, it can be
complex links, storage devices network and switches.
Data center needs monitoring tool that arrests a part of these connections and
presented in ways that are interesting and often lead to a better understanding of the
behavior of the macroscopic.
A high quality tool of monitoring can help here as well as long as a worldwide view
of the system, which can be obliging in recognizing problems of performance and,
eventually, supplementary planning capacity.
The priority for administrators is to provide IT resources and services when
and where they’re needed. The question is, how?
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
20/112
5
1.3 Problem Statement
Although server farm is a collection of servers or clusters, every server need
to be managed individually and secured. The question is how to monitor large
number of machines, it is critical and important to monitor and control servers and
various resources. Of course there are several Monitoring Tools such as Ganglia,
PARMON, Monit, Nagios and Card but they are all huge, which would consume a
lot of system resource when running and their architecture is complex.
1.4 Project Aim
The aim of this project is to develop a prototype client server base of resource
and performance monitoring tool for server farm. It can monitor and obtain
information and the status of the underlying resources of each server in the server
farm, such as CPU, Memory, disk utilization and network, and also visualize all
those information through graphical user interface (GUI).
1.5 Objectives of the Project:
1. To analyze available tools of resource and performance monitoring for Server
Farm.
2. To design and develop prototype of resource and performance monitoring for
Server Farm.
3. To test prototype of resource and performance monitoring for Server Farm.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
21/112
6
1.6 Scope of the Project
1. The analysis will be conducted mainly with tools about resource and
performance monitoring for sever farm.
2. The prototype will focus on monitoring resources and performance of the
servers such as such as CPU utilization, memory usage, disk utilization and
network bandwidth from time to time on demand.
3. The prototype will be using as front end C# .
1.7 Organization of Report
This project consists of five chapters. These chapters are organized according
to different works that involved in this study. The detailed organization of this
project is described in following paragraphs. This section presents how this report is
organize in different chapters.
Chapter 1 of this project consists of overview of the project, problem
background, problem statement, objectives, scope and Aim of this project.
Chapter 2 of this report presents a review of the literature related to the area
of management of server farm. It discusses monitoring tools in details that includes
Ganglia, PARMON, Monit, Nagios and Card.
Chapter 3 consists of wide description on project methodology, which
provides a full discussion about the flow of this project. This includes how the
operational and experimental work has been carried out for the study.
Chapter 4 discussed architecture and designs of proposed prototype in detail.
Designs include both the design of client-server system and the design of
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
22/112
7
performance monitoring tool which has four critical functions such as CPU
utilization, memory usage, disk usage and network bandwidth.
Chapter 5 is the conclusion of overall chapters and future works in the
related area of monitoring and controlling server farm performance will be discussed.
This includes recommendations for further study.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
23/112
8
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
This chapter of literature review will help the researcher to provide a high
level of knowledge in the research area. The job of literature review is to probe
into areas that are of interest to the research study.
The researcher will be able to organize and present the research study. For
example, the literature review provides the reader real understanding of the
subject knowledge and better evaluation of the research study flow. The
following figure 2.1 shows diagram of the literature review.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
24/112
8
Figure 2.1 Map of Literature Review
Na ios
Monitoring resourceand performance
Server farm
PARMON
Card
Monit
Gan lia
Literature Review (Chapter 2)
Resource andPerformance
Monitoringmetric
CPU Usage
Memory
Disk
Network
bandwidth
Virtual Machines Mobility
makes difficult Security
General issues onserver farm
Security Virtualizing leaves
Server Virtualizin
Multiple System
one physical wire
Traffic Inspection
Requirements Don’t change
High Availability BecomesEven More Critical
Planning Capacity is hard
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
25/112
10
2.2 Background Study of the Research
The Internet seats vital needs on severs, to perform a solid reliable well-organized
service to clients. Servers must be flexible to failures, also able to hold significant
numbers of requests, and able to answer those needs fast. A server farm also known
as association of computers that helps the needs of society that are not easily met by
individual computer. These computers are placed in individual firm or housed
different locations (Jayasinghe et al ., 2011).
Building a server farm is not easy there are a lot of challenges. One of the most
critical issues is to make sure that the building is equipped with enough power to
handle the responsibility of all the new devices that are planned to be installed
(Gandhi et al., 2009).
Not only does the power need to be present, but it needs also to be tested to
make sure that there are not many surges or sags which would cause the hardware to
shut-down and restart. The result of this is loss of data and possibly ruined things. All
the wires of power even the ground wire should be tested to see if it goes all the way
back to the main circuit breaker. When it doing all standard testing it is the time to
consider another problem which would be keep the equipment resources(Niyato et
al ., 2009).
Another issue in implementing a server farm would be to evaluate the
company’s expectations or needs for the future and present. Mostly focusing on how
much storage space is needed to support daily functions. The data center is the
purpose of every organization that holds the assets and applications that are often
subjected to electronic attacks.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
26/112
11
The result of attackers against a sever farm will become losses of critical
information for e-commerce that includes application of business to another business.
Data centers are end points where malicious attacks take place. To keep these attacks
are perfect for every business (Gandhi et al., 2010b).
2.3 General issues on a server farm
There are plenty of challengers when building a server farm for the first time. To
make sure is one of the mainly issues that the property is equipped with enough power to handle the pressure of all of the new devices that are planned to be installed
(Heo et al ., 2011).
Not only does the nation need to be present, but it needs to develop test and
ensure that there are not many surges or sags which would cause the hardware to shut
down and restart. This would result in lost data and possibly ruined equipment. The
ground wire should also be tested so as understand weather it all the way back to the
main circuit breaker.
After doing all the large testing it’s time to worry yet another problem which
would be to keep the equipment resources from the unavoidable fluctuations in
power. Even though the input power was tested for major stake and sags it will not
count for small fluctuations that will in fact destroy a system(Gandhi et al ., 2010a).
Many people think that surge protectors are the way to go in which that that the
truth never be further. If a surge protector receives are generally stake and pops to
save the production hardware it does not always disconnect the power entirely,
leaving it vulnerable to another point.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
27/112
12
A good idea would be to invest in an Uninterruptible Power Supply. This will ensure
proper protection from surges and also provide a battery backup so that the system
will stay connected in case of a power outage.
Some Uninterrupted Power Supplies are set to automatically shut down so when the
batteries do run out of power there would be no unsaved data loss while others are
set to notify a trough to shutdown manually. If the server system is expected to
remain twenty four hours online a day and seven days a week then it may be wise to
invest in a generator large enough to warrant the entire room. Another problem in
implementing a server farm would be to evaluate the company’s expectations or
needs for the future and the present (Zhang et al ., 2010).
Mainly focusing on how much storage space is needed to support daily functions.
This need is directly related to how big a server room needs to be. The equipment
needed can get quite complicated so ample space is required. On top of a big enough
space to keep the stuff there needs to be sufficient ventilation.
All the electronic devices in the server room dissipate heat and that heat needs to be
redirected out of the room. So a room in the middle of a building may not be the best
choice to make. It would be a lot easier to add more authority if needed and to
establish ducting to freshen a area that is on one of the sides (Li et al ., 2009).
Today’s data centers the strongest attribute is virtualization of servers. Comedown to frames of servers into cheaper, smaller and more powerful the main
direction for every organization is virtual machine farms, saving hardware device,
power consumption, and air-conditioning capacity (Chunhong et al ., 2008).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
28/112
13
2.3.1 Many cable systems in one physical
Most important difference between physical and virtual environment is the
failure of one network cable to join the physical server model of use and systemsecurity manager. Although security policies are not necessary that every server has
its individual connection to the network business, the reality is that most projects can
benefit from the safety of the physical separation among the servers.
After that, very much difference between the actual servers simplify the
design, makes it easy to separate safety. There are many applications on multiple
servers with dissimilar security configurations will all appear on the same server, and
"wire" to exit from this server no longer gives us the physical separation (Saboori et
al ., 2010).
The great thing in this case is that it is easy to solve. The Company may use
different types of tools used by VLAN, to provide the same level of security chapter,
which has always been. In other words, the firewall institutions familiar with CAN
(usually!) can be upgraded to handle the virtual server is very simple. Business is not
no need to change the way creating a basic security policy, for its own firewall
technology, which serves as a safety barrier for the year should continue to serve
them in a virtual environment on the wall vendor performance and ability to handle
this load. (This is another issue, but separately.), Have heard of the decision makers
that are already on the cart or go to the default virtual conference safely on a
proposal to transfer the security barrier in the virtual machine itself.
In other words, suggested the use of software-based security services to
virtual replacement of physical security. Virtual security tools can interact with the
system's infrastructure and a realistic model to confirm one-system/one-
application/one-wire least about.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
29/112
14
The idea that the installation of safety equipment, often to the virtual server, it
is determined that more than logic separation and control (Jin et al ., 2007). It's an
interesting idea, and sure as if moving in the right direction. Unfortunately, the
majority of companies to avoid this way the plan to default immediately, four
reasons (Snyder, 2008):
1) And the near certainty of limited value. Met the software firewall can run
in a virtual machine, and some providers do not do more to increase the
effectiveness of a virtual environment. But the only standard product
upgrade security in a virtual environment without hooks and clear in the
hypervisor does not help to define the default project and limit the choice
of a. Virtual security services are very useful, there must be a real
integration in a virtual environment that leads to the following
reasons(Snyder, 2008).
2) Useful machine cannot be buying yet. Important features for the
security of a VPN, including knowledge of the status of each virtual
machine, especially devices that migration between servers and full
control of "virtual switches" in each virtual server . Without this hook a
hypervisor, security services can not do its job properly virtual. in the
major virtual environment, that Ware and VMsafe (to date) has an
application programming interface to enable the firewall fire properly
integrated with the hypervisor, although the Citrix and Microsoft will
most likely be the same frame soon. However, security vendors and
impose any tool that integrates seamlessly with VMsafe. This will change
quickly, but even if they are fully integrated security service did not start
in the virtual ship, and system administrators and security providers have
enough experience with them. not for the security situation in depth
infrastructure software virtual based on the new brand with an application
programming interface new, and we hope that we all work
properly(Snyder, 2008).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
30/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
31/112
16
security using firewalls and IPS and other devices to reduce the threat,
they should move to the default strategy will not change suddenly the
security chain(Snyder, 2008).
However what is the alternative to deal with the various systems on the wired
one? Using traditional firewall? I worked the answer is yes, in the past, and it will
work well in the virtual world.
2.3.2 Inspection of Traffic Don’t Change the Requirements
Companies increasingly under the control of various systems to meet
regulatory and industry, as well as trying to do to manage and reduce their own risk,
Review of traffic technology such as intrusion detection and leak detection, and often
much more to meet this requirement, When we moved from physical servers to a
hypothetical situation, the need for checks passed unchanged Fortunately, the
solution of this question is easy to use the existing security services abroad. Leading
practices in this area to repeat the practice in the near future, If the institution fails to
install the SPI every server need not be present.
UTM with IPS device, and to prevent leakage to sit on a place in the network, this
copy of policies and practices is existing security. In The case where Traffic is
required to monitor the internal virtual server, and existing solutions, the instrumentcan perform autonomous motion detector that connects to the virtual port
is "illegal" in the virtual switch, and capture traffic between virtual machines.
The sensor can be analyzed either directly or password, for more predictable
performance, the copy that traffic between the external Physical interface where the
traditional Inspection unit can do the job(Luo et al ., 2002).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
32/112
17
2.3.3 High Availability Becomes Even More Critical
“Place every one of your eggs in the individual container -and see that container” is
generally satisfactory in a situation of virtual server that is the Mark Twain’s well-
known saying. For example the functionality of each server is achieved by reducing
number of servers, and also development of every server the value is possible impact
of any not working.
Essentially when a secret document may be physical or implied is in a way that is
untested, creating secret document highly available is perfect situation if you don’thave already confirmed that a negligible employment creates additional argument for
programs like IPS and Firewall, and there is another reason to believe using outdoor
employment is HA. However it can be important to growth the external uses
accessibility, although is properly accepted wisdom and properly agreed. The major
danger is that the network availability also it can be justified by enhancing the
system to meet required conditions(Jayram et al ., 2001).
Security architecture is the major concern for a virtualization process, though
the major concern is to incorporate technologies of active-active for services related
to firewalls compared to the easer strategy of active-passive. There are three
objectives and they are like the following:
1) Usually technology of active-active will grow well than normal reply time of
devices for the security. While an organization as speed 100 Mbps, a small
number of milliseconds alteration cannot affect them. But in context of
virtualization, it drives up uplink network connections, little changes in
functioning are enlarged higher speeds for access links of 1 Gbps and 10
Gbps. in general Using technologies of active-active decrease load on every
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
33/112
18
security system while simultaneously are working, offering the chance for
improved functioning.
2) Advanced ranks of error acceptance. Through active-active configuration, a
quite number only are available during every specific part in the system. So if
there is any deficiency in any machine, device and method, only significant
amount of the net is involved by check and the likelihood of component
failure. Actually as soon as practical servers include both short stayed
connection of HTTP and also offer stayed connection of VPN, backup
connections, or sharing of files, technologies of active-active places fewer
risk than active-passive traffic. However when a high robust systems like
blade-builder systems or server farm are employed through various sharing
responsibility basics, the problem is greatly minimized The setting when a
single blade or firewall factor is reduced when it is handling 10 percent of the
traffic than when it is handling 100 percent of the traffic.
3) Theoretically, Active/active configurations and virtualized projects aresuitable for each other,. Virtualization is all about making use of well-
organized resources, ranging from physical space to hardware capacity. The
disorganization of active/passive firewalls has for long been disorganized and
this brought about a problem to security professionals. With virtualization
projects calling much larger devices, it is more suited to consider the cost
savings of using active/active and clustering technology where possible.
Whether an enterprises goes with clustering and active/active technologies or not, the
key point here is to ensure that high availability features of inline network and
security elements are easily configured and tested in any virtualization project.
A firewall is meant to protect servers but not a denial of service when a firewall
protected dozen severs, it was certainly a problem if that firewall stopped passingtraffic. When firewalls keep a dozen physical servers and a hundred virtual servers,
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
34/112
19
this will amount to an overall failure of the business. Liberal use of joint aggregation,
different server ports, redundant network switches, and redundant links at all points-
along with HA clusters of security mechanism will reduce the net failure and
improve availability.
2.3.4 Planning Capacity is hard
When the default is to use more applications on the same device address, and
the network is the use of these materials will increase. Traditionally, the network is
heavy maintenance of their networks, especially in the data center, rather than for
capacity planning on the left side of each server. Removed with prices constantly on
the local network switching equipment, and can spend a lot of time at the expense of
100 Mbps and 1 Gbps and lives in distress does not deserve to simply just update
every switch in the rack Gigabit speeds and participation. If the bandwidth is less
than 1 Gigabit average server technology with remarkable efficiency(Ling and Zahir,
2002).
In the world of virtual servers, physical servers, or a group of a simple system
to saturate the link and 1 GB capacity planning, performance management and the
second is more important. Tools such as link aggregation that the reliability of the
system, from which a number of reasons, and now it is also important to bridge the
gap between the industrialized countries, the new 1 GB per second of precious and
more expensive 10 GB per second, and switch. The power supply can be used as
planned. If two virtual machines on the same server to transfer large amounts of data,
we cannot bear the weight of the network traffic.
But if one of these virtual machines to switch to other networks or other virtual
server, network traffic suddenly hit like a bomb ambitions may incur. These
dissimilarities in network performance and ability operation are also two vital
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
35/112
20
insinuations for safety on the side of the sharing of default: basic services must be
adequate and must be based expansion.
Denied barely baseline to give an adequate picture of the achievements, but
there are some implicit signal about the value. Most firewalls and tools for the safety
of others are cooked on the Internet-oriented applications. in cyberspace, may
include the movement of everything instead of the failure of applications to support a
partnership or a video on the multiplayer online, The firewall on the long-term
relationship with the size of the package (or the back of the failure of the partnership,
for example) in the case, of middle of the ring. The other, the multicast performance
is less predictable.
While, according to documents provided by the data provider is a good first
step in measuring performance, and mitigation of threats, most HA active / active,
and a large number of security zones and rules to implement virtualization to take
him out of the area of comfort for most of the sheet firewall.
This suggests that instead of testing and monitoring of performance and should be
part of the plan of the project defaults. The institutions should not be surprised if the
traffic performance of them gives a. Different, higher or lower than expected.
Variable performance of the building is the safest way to ensure that security
applications that can support the current and future growth. Perhaps such features as
the process in parallel (with code based on the structure or group of devices the most
active / active are good ways to achieve this goal) Company grant from the edge for
success.
When selecting protection devices for performance, it is important to choose
the most sophisticated equipment product lines. It should be that the company did not
start with something up 1 GB per second, while providing security for the change
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
36/112
21
along the way to go faster. What safety device is selected, a unique line of products
that can develop together and it is for them a variety of Gigabit speed 10 Gbps. The
company does not want a product line, or even worse, to other sources, and change
management, interfaces with complex security policies on the fly to review if they
are also at risk.
When you design security architecture for virtual environments is very large,
and companies should seek safety devices which are based on the balance of the
structure with the addition of processing elements in the structure of the car. These
types of safety devices tend to be a better world; companies increase the number of
processing elements, or timetables or by changing the deceleration speed of the
blades, if necessary.
The company does not want to buy a rolling structure of the blades on the first day,
but be able to remove the leaves and move easily reduce the amount of planning is
essential to the scope of the project increases.
Suggest a dirty instead of using the security services in the same way that
companies have more equipment probation usual in the network.
But the amount of work cannot from the virtual farm, more intelligent of the
lot, with a strong sense to develop using tools such as parallel processing
and hardware-based security structure is the best strategy.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
37/112
22
2.3.5 Virtual Machines mobility makes difficult Security
A feature of the traditional physical servers is that they tend to change
frequently. To load the application group and a group of units and to avoid any
sudden change of security policy in a number of servers is very slow. Rather the
opposite is true for virtual servers: To move the virtual machines and applications of
system administrators from physical server to physical server as part of the balance
and control. When using functions such as VMware VMotion, virtual machines
move more often in response to open the pregnancy and correction, and the system.
This movement and the application server security makes it difficult to identify (Li et
al ., 2008).
Have already described this part is a chance to put a seal layer between
physical servers and security services as part of the basic design for a server farm
topology. This aggregation, which includes a large number of servers and VLAN
them in an instant and without this problem. The important point is the need for
adequate performance, and bandwidth in the security services. For larger server
farms, you may be asked for more than 1 GB link provided in bits per second or up
to 10 Gbps interfaces and interfaces to handle the load and to ensure portability
wireless. Pressure on the control and safety zone around the layer 2 hop away from
virtual machines, and will be transferred will not be a problem because it does not
change (except the MAC address of the server application) when moving virtual
machines between servers.
If the company removes a layer of product, the best solution is safer to match
the hardware configuration with support for the definition of area-based policy. In
this way, an application that is on one side of the firewall at the same time, but on the
other side on the other hand, does not need to re-design the security policy. In this
case, well-designed central management is a must. And determine security policies
for each unit do not work here.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
38/112
23
And "the urgent need for the policy management system that is nothing of the inner
movement of virtual machines. Security manager must be able to implement a policy
based on the applications and servers, instead of physical interfaces or devices,
distribution and determine recovery of this policy between security appliances.
2.3.6 Security Virtualizing goes with Servers Virtualizing
From the point of view is very high, default is simply to take the physicalservers and virtual servers grinding down. In the details, however, require much
more than that. A good default requires a lot of resources, including the ability of
multiple memories, CPUs, storage, and brings them together for greater efficiency.
Philosophically, it creates intellect for virtualization security tasks at the same
time: combine multiple security functions into a single device using this system more
efficient. Instead of a pile a stack of individual safety devices, it is best to match the
safety of the largest multi-functional unit on a farm and a large physical server with
multiple virtual machines.
Traditionally, companies refused and are often called this strategy to raise the
security UTM. Reasons in the category of best practices rather than an integratedapproach based on the LUNs UTM States are a legend in the part and a part of my
work. Since the actual scheme is fixed and clearly separated servers in racks or
curricula that provide similar results when Virtualizing a large number of servers
happened, and especially those who sit in different areas of protection, shift the
balance significantly in favor of the security services integrated UTM. The idea that
one UTM security services that can handle the various functions in all the different
sectors that are directly in accordance with the concept of virtualization (Aghajani et
al ., 2010).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
39/112
24
UMTS consolidation of functions, allowing flexibility, The existence and
functions of the standard means that the motion of the virtual machine is not a
problem because mitigation technologies and security threats in place, anywhere,
anytime. UMTS also simplify the topology and distribution. Part of the difficulty of
building services applications available for a very good agreement, and all
communication between the enterprise network and application servers.
HA design of security services and one or two that provides multiple
functions is much easier than trying to ensure that all paths through all unnecessary
devices properly, scalable and available. With UTM in place and the institution has
the greatest ability to publish simplified.
To find devices UTM, who are ready to develop projects in virtual
environments is difficult, Also shown a past experience, creating and UTM devices
for many small businesses, the environment of medium and small office and home,
and have sufficient flexibility to support the operation of the company. The following
table shows some key areas to focus on the choice of UTM device for managing the
virtual environment.
2.4 Basic Concepts of Performance Measurement
It can be observed in the system behavior by changes in system status. Any
change in the system status reports neither the beginning nor the end of a given
activity (or inactivity) components in the system (a hardware component, a
component of the program or process). Any change in the state system, as was the
case: There is a transition from one state to another system, if certain conditions are
met. Devices to facilitate access to information about the changes in the system, the
current model of the devices that rely on information about individual components
and their interaction desired. In particular, one can not know how often is the
implementation of a particular process (for example, the number of times you entered
a particular state.) In this case, it is necessary only to detect the occurrence of the
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
40/112
25
event and include the receipt of the statement significantly. Some examples of this
type of measurement are as follows: count tests on each disk, by measuring by
counting the night in a way to reduce the frequency of page faults, to measure the
frequency of memory parity error.(Yuanyuan et al., 2008).
It was available in the frequency of an event by dividing the number of
incidents that have accumulated along the period, interest. A more difficult and
include the synchronization of activities observed. The simplest case is to determine
what percentage of the average time for the system in a particular country.
Traditional measures of the channel and the CPU or I / O and used at the same time
(overlapping) channel CPU and L / S in this category. Finally, the most difficult
problem is that while individual cases of a particular act ivity, ie, to measure when it
enters a particular state, and the time that the system remains in this state. An
example of this type of problem is to measure the distribution of service time for the
processor, or the interval between the measurement errors, such as parity error,
disruption of the head disk memory.
In all three cases, and assumes that it is possible to detect changes in the state.
In fact, for the second category, it is not necessary to reveal exactly when the status
changes, in many cases, these types of measurements of samples from the second
state of the system. In response to a question about the status of the system at any
given time, at random, in the sense that nothing to do with these points on the
activities of the time measurement. Each monitors, as will or will not find in the case
of the system corresponding to the measurement of the activity. If he spent the percentage of time in this case, to determine the percentage of successful
observations (the system was in a state of interest) for a number of observations.
It should be noted that the timers monitor the performance of the implementation of
this method. Since the sampling rate is generally very high (1 MHz - 10 MHz), it is
possible to convert a number of observations over time with high precision.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
41/112
26
However, if the measures taken by the programs that have been implemented
in the systems investigated, the sampling rate remains relatively low because the
costs associated with them, it is best to use the direct method is described below,
When the direct method is very simple. Reading hour when measuring the activity
begins and again when you're done.
The difference between the readings and the center of activity is measured. This
method requires, of course, can be detected from the events at the beginning and end
of each body. It was also assumed that there is adequate time with accuracy, and can
be accessed easily, and which appear on the screen for certain activities.
2.4.1 Performance parameters
2.4.1.1 CPU utilization
CPU utilization is a key performance metric. It can be used to track CPU
performance regressions or improvements, and is a useful data point for performance
problem investigations. It is also fairly ubiquitous; it is reported in numerous places
in the Windows family of operating systems, including Task Manager (taskmgr.exe),
Resource Monitor (resmon.exe), and Performance Monitor (perfmon.exe) (Xiaorui et
al ., 2009).
The concept of CPU utilization used to be simple. Assume that there is a
single core processor fixed at a frequency of 2.0 GHz. CPU utilization in this
scenario is the percentage of time the processor spends doing work (as opposed to
being idle). If this 2.0 GHz processor does 1 billion cycles worth of work in a
second, it is 50% utilized for that second, fairly straightforward (Bridges et al .,
1992).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
42/112
27
2.4.1.2 Memory Utilization
Although the principle for estimating the service time for memory is the same
as that described in Resource Utilization and Performance,, it use a different formula
to estimate the performance impact of memory utilization than you do for other
system components. Memory is not managed as a single component such as a CPU
or disk, but as a collection of small components called pages. The size of a typical
page in memory can range from 1 to 8 kilobytes, depending on the operating system.
A computer with 64 megabytes of memory and a page size of 2 kilobytes contains
approximately 32,000 pages (Kundu et al ., 2010).
When the operating system needs to allocate memory for use by a process, it
scavenges any unused pages within memory that it can find. If no free pages exist,
the memory-management system has to choose pages that other processes are still
using and that seem least likely to be needed in the short run. CPU cycles are
required to select those pages. The process of locating such pages is called a page
scan. CPU utilization increases when a page scan is required (Ramamoorthy and
Wah, 1981).
Memory-management systems typically use a least recently used algorithm to
select pages that can be copied out to disk and then freed for use by other processes.
When the CPU has identified pages that it can appropriate, it pages out the old page
images by copying the old data from those pages to a dedicated disk. The disk or disk
partition that stores the page images is called the swap disk, swap space, or swap
area. This paging activity requires CPU cycles as well as I/O operations.
2.4.1.3 Disk usage
Disk usage is the amount of space in a specified directory on a computer disk.
Disk usage results are usually based on the du command. Disk usage will display the
http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf02.htm#ToC_61http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf46.htm#sii-01basic-26652http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf46.htm#sii-01basic-26652http://publib.boulder.ibm.com/infocenter/idshelp/v10/topic/com.ibm.perf.doc/perf02.htm#ToC_61
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
43/112
28
total number of directories within the domain’s online space and is calculated in
kilobytes (KB). Disk usage also shows the entire directory paths in which files are
contained. The most commonly used command for monitoring disk space usage is
/usr/bin/df, which, by default, displays the number of free blocks and files on all
currently mounted volumes. Alternatively, many administrators create an alias for df
in their shell initialization script (for example, ~/.cshrc for C shell) like df -k, which
displays the amount of free disk space in kilobytes (Ohyama, 1994).
2.4.1.4 Network bandwidth
In computer networks, bandwidth is often used as a synonym for data transfer
rate - the amount of data that can be carried from one point to another in a given time
period (usually a second). This kind of bandwidth is usually expressed in bits (of
data) per second (bps). Occasionally, it's expressed as bytes per second (Bps). A
modem that works at 57,600 bps hastwice the bandwidth of a modem that works at
28,800 bps. In general, a link with a high bandwidth is one that may be able to carryenough information to sustain the succession of images in a video presentation. It
should be remembered that a real communications path usually consists of a
succession of links, each with its own bandwidth. If one of these is much slower than
the rest, it is said to be a bandwidth bottleneck.
In electronic communication, bandwidth is the width of the range (or band) of
frequencies that an electronic signal uses on a given transmission medium. In this
usage, bandwidth is expressed in terms of the difference between the highest-
frequency signal component and the lowest-frequency signal component. Since the
frequency of a signal is measured in hertz (the number of cycles of change per
second), a given bandwidth is the difference in hertz between the highest frequency
the signal uses and the lowest frequency it uses. A typical voice signal has a
bandwidth of approximately three kilohertz (3 kHz); an analog television (TV)
http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212583,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci331643,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212986,00.htmlhttp://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212160,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212244,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212441,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212441,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212244,00.htmlhttp://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212160,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212986,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci331643,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212583,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.htmlhttp://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213492,00.html
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
44/112
29
broadcast video signal has a bandwidth of six megahertz (6 MHz) -- some 2,000
times as wide as the voice signal.
The following table illustrates possible causes of high performance consumption for
server farm.
Table 2.1 shows causes of high performance consumption for server farm.
Causes Description
Application processes Process spawning lots of threads in high load condition
where there is no throttling at all. This can cause unusually
high CPU consumption just because of the unexpected load
on the application. This will generally consume the CPU
cycles available on the machine.
Other processes not
application process
This may be due to totally unrelated processes like batch
jobs, alerting jobs, cron jobs etc
System/OS processes Operating system has scheduled jobs/processes that can be
consuming high CPU for a particular time period. Generally
these processes run with higher priority (nice value) then
other regular application processes that may lead to
consuming high CPU.
many users are using the
application at the same
time
Several users are using application same time so this
generally will consume high memory.
External process External process clients can cause consuming more memory
many indexed items Too many indexed items in one index column caused by
unplanned increase in crawled content or changed type of
content
Query matching When the indexer and query matching components are
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212562,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212562,00.html
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
45/112
30
component installed on
the index server but the
query matching
component has been
stopped
running on the same server, the query matching component
is responsible for deleting old index sets as it is activating
new sets. If the query matching component has been stopped
but the administrator has not suspended indexing, the
indexer will continue to produce new index sets based on
crawled content. As the query matching component is unable
to delete the old index sets, the disk usage will increase over
time.
Insufficient bandwidth Sometimes, a network just doesn't have the throughput it
requires. When a network does bog down, several options
typically exist for increasing capacity. Besides boosting up-
and downstream speeds
DNS errors DNS configuration errors can lead to numerous network
failures and generalized slow performance.
Spyware infestation Spyware, the scourge of the last few years, finally appears to
be meeting its match in business environments. The
development of potent anti-spyware tools, combined with
effective end user policies, is reducing the impact ofspyware in many organizations
Virus A computer virus can cause a memory loss and other
problems. Viruses attach to files on your computer, causing
them to require more memory than normal.
2.5 System Monitoring
System monitoring is essential and is one of the most important responsibilities
that a system administrator has. Its aim is to be able to know at every moment what
is happening in the system, to detect the problems.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
46/112
31
2.5.1 MONIT (UNIX Systems Management) Tool
One of the famous managing and monitoring tools, Monit, it monitors
processes, file, directories and devices on UNIX system. Automatic maintenance is
conducted by monit and can execute meaningful causal actions in error situation. For
instance monit can start a process restart a process if does not run, respond and stop a
process if it uses too much resource. To monitor files, directories and devices it may
use MONIT for changes, such as timestamp changes, checksum changes or size
changes (MONIT, 1998).
However, control file can be configured based on free format monit, it is
controlled via an easy, token syntax oriented. Syslog logged by Monit or to its own
file of log and informs the conditions about error via alert messages of customizable.
Monit uses Many TCP/IP to carry out protocol checks, network checks and SSL
utilize for such checks. A HTTP(S) interface is provided by monit and to access the
monit server can use a browser
Figure 2.2 overview of monit
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
47/112
32
2.5.2 Nagios
NAGIOS is one of tool that monitors the other network computers orcomponents status. It can monitor the network and it alert when effects happen. For
example if fails one the computers or the responding stops someway, Nagios will
send page an email, or allow to know in various ways. However the current status
shows a web page Nagios monitoring all the systems because Nagios has many
abilities, to set up can be complex.
Figure 2.3 an overview of Nagios.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
48/112
33
2.5.3 Ganglia Tool
Another scalable distributed monitoring system for high performancecomputing systems such as clusters and Grids is Ganglia. The design is based on
hierarchy, federations of clusters is the target of ganglia. It relies based
listen/announce protocol on a multicast to monitor clusters state and a tree of point-
to-point used by ganglia, amongst connections delegates nodes of cluster to count
clusters and federate them, It widely leverages used technologies such as, XDR for
portable, compact transport data, XML for representation data and RRD tool for
visualization and storage data. There are achievement overheads when structures of
data and the algorithms on individual system are accepted high concurrency. The
implementation is healthy, ported to an wide set of operating systems and
architectures of processor, and is now in use on more than 500 clusters about the
world (Massie et al., 2004).
Ganglia are based on a hierarchical design targeted at federations of clusters
(Fig. 1). It relies based listen/announce protocol on a multicast to monitor clusters
state and uses connections of a tree of point-to-point between cluster of
representative nodes to clusters of federate and their state aggregation. Within each
cluster, Ganglia use on a well-known multicast address heartbeat messages as the
foundation for protocol of a membership. Membership is claimed by using the
heartbeat reception as a sign that the non-reception and available node of a heartbeat
over multiple of a small of a periodic interval announcement as a sign that
unavailable node. Each node monitors its local resources and sends multicast packetscontaining monitoring data on a well-known multicast address whenever significant
updates occur. Applications may also send on the same multicast address in order to
monitor their own application-specific metrics.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
49/112
34
Ganglia distinguish between built-in metrics and application-specific metrics
through a field in the multicast Packets of monitoring will sent. All listening nodes
for both types of well-known address multicast metrics and gather and maintain
monitoring information for every node. Therefore, always all nodes have an
estimated view of the cluster’s state entire and this state is reconstructed easily after a
crash (Massie et al ., 2004).
Figure 2.4 Ganglia architecture
Ganglia federate multiple clusters together using a tree of point-to-point
connections. All entities in the domain been federated are clustered before exiting, on
the other hand system on the high hierarchy specify aggregation points. Since, the
monitoring data of the cluster is copied on each system, the outgoing computer
represent a distinct cluster in a logical manner otherwise they represents a set of
clusters. (We specify multiple cluster nodes for each leaf to handle failures.) The
counting of each portion of the set is done in a timely interval.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
50/112
35
Monitoring data from both leaf nodes and aggregation points is then exported
using the same mechanism, namely a TCP connection to the node being polled
followed by a read of all its monitoring data.
2.5.4 CARD
CARD (Cluster Administration using Relational Databases) is system for
monitoring large clusters of cooperating computers. CARD scales both in capacity
and in visualization to at least 150 machines, and can in principle scale far beyondthat. The architecture is easily extensible to monitor new cluster software and
hardware. CARD detects a fault and determines the best way of recovery in a
systematic form. CARD uses a Java applet as its primary interface and it allows
internet users anywhere to use their browser to monitor the cluster (Patterson, 1997).
While monitoring large clusters; CARD identified four different problems
and the countermeasures. Initially they try to figure out the evolution of software and
hardware in a cluster. Secondly is the issue of fault tolerance mechanisms in the
cluster and the corresponding software. Thirdly is the explanation on how they
increase data scalability. Finally they explain how they display the statistical display
of information from a large number of systems (Patterson, 1997).
2.5.5 PARMON
PARMON allows the user to monitor system activities and resource
utilization of various components of workstation clusters. It monitors the machine at
various levels: Component, node and the overall level of the system displaying a
system image as individual. PARMON the administrator of the system lets
monitoring of the following functions
I. Utilization of system resource aggregations
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
51/112
36
II. Activities of process.
III. Activities of system log.
IV. Activities of the kernel.
V. Many requests as similar source.
PARMON lets the client describe actions that trigger certainly when a party
condition is satisfied. It offers logical and physical outlooks of the of the system
components. The PARMON key features include the following (Buyya, 2000).
I. Development exploits of most modern technologies, software andhardware features for imaging and communication.
II. Lets the user to build the structure of the database (groups and nodes)
includes the name of the node, interfaces of communication, and specific
unit to monitor the disk.
III. Holds recording details of the structure and configuration of the machine
to complete nodes of a cluster.
IV. Lets the system instrumentation of resources like a CPU, memory,
network and disk, and their parameters, both micro at and macro level.
V. Holds cluster monitoring at level of node, set of group or set of total
system, and therefore exhibits a single image of the system.
VI. Lets the performance equivalence of chosen operations on a family or
individual of workstations, interactive reference and real-time monitoring
(e.g. Memory, processor, network and disk utilization), and maintenance
of the normal tasks like cluster or node shutdown.
VII. The client PARMON is moveable of all programmed stages supporting
structure of Java runtime, JVM (Java Virtual Machine) and server
PARMON is moveable of running machines Linux or Solaris.
In PARMON there are parmon-server and parmon-client. The model of
system as shown in Figure 2.9 continue to the client – server case with monitoring
nodes acting as servers and systems of monitored or user-position acting as clients.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
52/112
37
The nodes of the cluster are able to monitor from any PC, workstation, or the cluster
node itself. The server of PARMON is weighted nodes that require monitoring
(Buyya, 2000).
Requests of the client the parameters values through passing message and
gets the answer of the server in messages form. The messages interpreted by the
client and converted them into proper format visualization of graphical. A client can
monitor selectively observe a few nodes of the group or all the nodes.
The cluster theory is supported by effective monitoring. A group kind of
group nodes are elected based on the resources allocation to different set of users.
Such a method of a grouping helps in collecting and monitoring statistics of the
usability, with which the administrator of the system can change the allocation
strategy of the resource.
Figure 2.5 PARMON architecture
PARMON is planned to take independent of other system monitoring; it a
easy method uses (there is no any protocol standard) for transferring data between its
servers and clients.
The layer of transport consists of sockets connected (TCP/IP) streams and the layer
of software uses messages character and strings. Required monitoring data is
retrieved by the client from the running server on the nodes of the cluster by
exchanging messages. The message normally requested by the client contains an
indicating etiquette what it is looking for. The reply message of the server contains a
strings of series, whose varies distance from one type of application to another.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
53/112
38
The following Table 2.1 shows comparing core functions in different
monitoring tools such as Ganglia, Parmon, Monit, Nagios and Card.
Table 2.2: Shows comparing core functions in different monitoring tools
Number of monitoring tools has been developed for high performance
computing PARMON is one of the most familiar who allows the user to monitor
system activities and resource utilization of various components of cluster’s
workstation. Also Ganglia is popular toolkit for systems of cluster and grids, which is
based on a hierarchical design. It exploits a multicast-based listen/announce protocol
to monitor states within clusters. In Ganglia architecture, a tree of TCP
(Transmission Control Protocol) connections between multiple daemons can
aggregate monitoring information for multiple clusters.
In monitoring tools is a critical and important task to monitor performance of
the servers From Table 2.1, out of 12 functions, there are four functions that can
successfully embed 100% of monitoring tools. These four functions are “CPU
activity”, “Memory activity”, “Disk activity” and “Network activity”. Process
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
54/112
39
activity function all tools were embedded except Nagios tool. However there are also
other functions that are embedded some of the tools such as device activity all the
tools were embedded except Ganglia and Nagios.
Table 2.3: Shows comparing mechanisms in different monitoring tools
It need to identify the mechanisms of those tools like Ganglia, CARD,
Parmon, Monit and Nagios table 2.3 shows that the PARMON is designed to run
independent of other monitoring systems; it uses a simple mechanism (not any
standard protocol) for transporting information between its servers and clients. The
layer of transport consists of socket connected (TCP/IP) streams and the layer of
application uses messages character strings. The required monitoring information
retrieved by the client from running the server on the nodes of the cluster by
swapping messages. The request message of the client usually contains a code
representative what it is appearing for. The reply message of the server contains a
series of strings, whose varies length from single type of request to another. And also
both a ganglia and Monit are using TCP connection.. And CARD is used Hybrid
Push/Pull Protocol and finally Nagios is using Plug-ins available with the
distribution. Plug-ins for Nagios are Perl or other similar scripts that, when executed,
sends a specific data query to a device. The value returned from the plug-in is what
Nagios tracks, the plug-ins do all the work.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
55/112
40
2.6 Summary
In this chapter, we covered the area that is necessary for the development of
monitoring server farm tool. An investigation has been done on previous literature
from some resources such as internet, books, conferences and journal. We also
discussed some important concepts about monitoring systems such as server farm
monitoring tools and effective controlling servers and so on. Although this project
had gathered all the literature review about server farm security management, a good
understanding for each field is very important in order to develop effective server
farm monitoring tool.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
56/112
42
CHAPTER 3
PROJECT METHODOLOGY
3.1 Introduction
This chapter demonstrates short description of project methodology that will
be used in this research. As most excellent follow project methodology procedures,
tools and models must be named so as to fix the prototype. However the operational
framework of the project, schedule of the project, the researcher will discuss in this
chapter and afterward on the requirements of software and hardware for the proposed
prototype development
3.2 Operational Framework
To ensure that all the activities of this project are well-organized, it needs
project methodology to direct those activities to the right guidance. For instance to
collect all data linked to the project so as to develop a methodology or operational
framework. And also to ensure that all the jobs of the project have been clearly done.
As shown Figure 3.1 the operational framework of the project. And the Table
3.1 demonstrates the features of the project operational framework.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
57/112
42
PHASE 1 – Analysis of Tools Monitoring Server Farm
PHASE 2 – Design anddevelop bothsystemarchitectureand systemdesign
PHASE 3 – Testingprototype andRepot written
Choose important functions and
add one extra function
Test Prototype
Report Writing
Prototype
accepted
No
Yes
Develo Protot e
Analyze existing Tools of
monitoring server Farm.
Compare core functions of
selected tools of monitoring
server Farm.
Design System Architecture.
Design Interface of client-
server monitoring
performance.
Figure 3.1 the Project operational framework
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
58/112
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
59/112
44
Prototype
of
monitorin
g server
farm
Develop
the
prototype
prototype of
server farm
monitoring tool.
To develop
sub
component
of the
system\
To develop
GUI
interface
monitoring
server farm
prototype
(GUI
architecture).
Coding of
component1
Coding of
component2
Coding ofcomponent 3
and features that
will be included
the monitoring
server farm
Prototype(architecture
and design GUI
of the system).
4 Test the
Prototype
Write the
report
To design
system features.
To test the
prototype.
To get finalized
prototype.
To write the
final report of
the prototype.
Write the
report by
Combining
and
organizing
all the data
in
understanda
ble way.
Using report
writing skills.
Final
prototype.
Complete final
report.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
60/112
45
3.2.1 Analysis tools of monitoring servers.
This section analysis tools of monitoring servers the researcher is going to
highlight collected data during online research and offline research will be analyzed,
the methods used to analyze it and the data analysis tools used.
3.2.2 Data Analysis Methods
Analyzing information, the researcher can use one of the data analysis
techniques called qualitative and quantitative but in this research will be applied
quantitative method.
3.2.3 Project Schedule
The schedule of the project will roll through down tin general schedule of the
project contain the start date of the project and project end date, also the actions that
wanted to perform in the research according to the objectives of the project. The
project schedule details are exposed in Gantt chart attached in Appendix A.
3.2.4 Prototype methodology
System prototyping is a quick development of software so as to confirm
requirements. Using software prototyping assists developers and users to identify for
the system requirement, vulnerabilities, mistakes and omissions are identified. So
users can see how the system supports their work.
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
61/112
46
Generally prototyping can be considered as risk reduction activity. In
particular it provides improved system usability closer match to the system needs,
improved design quality, improved maintainability and reduced overall development
efforts.
The Figure 3.2 shows prototyping process in the project. (Sommer Ville, 2000)
Figure 3.2 System prototyping
There are two approaches for prototyping: Evolutionary prototyping approachand Throw-away prototyping. In this research, Evolutionary prototyping approach is
used where an initial prototype is produced and refined through a number of stages
as shown in Figure 3.3. (SommerVille, 2000).
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
62/112
47
Figure 3.3 Evolutionary Prototyping
3.3 Use case of the proposed tool.
The use case diagram of the proposed tool is represented both client side and
server side. Figure 3.4 illustrates use case proposed tool for client side.
Yes
No
Develop abstract
specification
Build prototype
systemTest the
Prototype
system
Deliver
system System is
completed?
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
63/112
48
Figure 3.4 Use Case Diagrams for client side
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
64/112
49
This tool performs five main different Functions as figure 3.4 shows. From
table 3.2 the functions are Check System Information, Check CPU performance,
Check Memory Performance, Check Disk performance and Check Network
Bandwidth. The description of each function and the preconditions that requires
being present before each function are presented.
Use Cases Description Precondition
Check System
Information
System Information, which
contains basic information
about the target client
operating system
Windows operating systems
of version XP and higher.And .Net Framework 2.0 or
later versions installed on theclients and the server.
Check CPU
performance.
It collects CPU performance,
such as CPU usage,
Windows operating systems
of version XP and higher.
And .Net Framework 2.0 or
later versions installed on the
clients and the server.
Check Memory
Performance
Checks all nodes the Memory
Utilization, and visualizes the
server.
Windows operating systems
of version XP and higher.
And .Net Framework 2.0 or
later versions installed on the
clients and the server.
Check Disk
performance.
It collects Disk performance
information all the nodes andshows in the server computer.
Windows operating systems
of version XP and higher.And .Net Framework 2.0 or
later versions installed on the
clients and the server.
Check Network
Bandwidth.
First collect information about
Network bandwidth such
input signal and output, after
collection then visualize the
server.
Windows operating systems
of version XP and higher.
And .Net Framework 2.0 or
later versions installed on the
clients and the server.
Table 3.2 Use Case Descri tion for client module
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
65/112
50
Figure 3.5 shows as use case diagram for server module, this module first
receives the information from the client module and visualize to the control node.
Figure.3.5 Use Case Diagrams for server side
8/20/2019 CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING
66/112
51
As the above the table 3.3 the server module first of all receives the resource
information such system information, CPU usage, Memory usage, Disk utilization
and Network bandwidth and displays to the control node or the server.
Use Cases Description Precondition
Receive and display
System Information
It receives System
Information, which contains
basic information about the
target client operating system
and display.
Windows operating systems
of version XP and higher.And .Net Framework 2.0 or
later versions installed on theclients and the server.
Receive and display
CPU performance.
It receives the CPU usage, and
visualizes on the server or
control node.
Windows operating systems
of version XP and higher.
And .Net Framework 2.0 or
later versions installed on theclients and the server.
Rec