SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Network Characteristics of Cloud Architecture1
Performance Dimensions
2
¨  Application performance differs according to perspective.
¤  For a user, an ideal application would deliver high performance
and responsiveness.
¤  For an administrator, an ideal application would consume the
least amount of network resources.
¨  Performance also differs based on application type.
¤  Performance for a bulk file transfer application might have
different implications than performance for a transactional
application.
Stakeholders: Users and Administrators
¨  Users want applications to be fast
and predictable.
¨  Users judge application performance
by their experience:
¤  Is the application quick to respond?
¤  Is an hourglass icon/pinwheel
displayed while background
operations are carried out?
¤  Does the application launch and close
quickly?
¤  Are errors handled in an
understandable way?
¨  Administrators want applications to scale.
¨  Administrators often judge an
application's performance on how
efficiently it uses network resources.
¨  Administrators may ask:
¤  Does the application have low overhead
and efficient network usage?
¤  Are the minimum number of connections
used, so my server can service as many
users at once as possible?
¤  Am I constantly calling helpdesk?
3
Measuring application performance
4
¨  Round Trip Time (RTT)
¤  Time for a request to make a trip from a source to a destination and back
¤  Factors affecting RTT:
n  Network infrastructure, distance between nodes, network conditions, and packet size,
congestion payload compressibility, forward error correction and data compression
¨  Goodput
¤  Measure of useful application data successfully processed by the receiver, in
bits-per-second.
n  Enables the measurement of effective or useful throughput and includes only
application data
n  Packet, protocol, and media headers are considered overhead, and are not part of
goodput
Measuring application performance
5
¨  Protocol Overhead
¤  Non-application bytes (protocol and media framing) divided by the total
number of bytes transmitted (expressed as percent).
¨  Bandwidth-Delay Product
¤  Bits-per-second bandwidth of the network X the RTT (in seconds)
¤  # of bits it takes to fill available network bandwidth
¤  When the value for bandwidth-delay product is high, the TCP/IP stack must
handle large amounts of unacknowledged data in order to keep the pipeline full
¤  A key end-to-end metric for streaming applications
Network Characteristics of Cloud Apps
6
¨  Network/protocol characteristics of cloud apps
depend broadly on the app type
¨  Transactional versus Streaming Apps
¤  Transactional apps are also called interactive
¤  Streaming apps are also referred to as batch
processing applications
Environmental Factors
7
¨  Application that perform fine on a
local computer may cause significant
performance degradation/resource
consumption when run across a
network
¨  Environment affects application
performance
¤  Transactional applications are more
sensitive to RTT
¤  Streaming applications are more sensitive
to bandwidth-delay product
LAN
Dial up Satellite / WAN
Internet and
VPN
LOW HIGH
LOW
HIGH
Bandwidth
RTT
Transactional versus Streaming Apps
¨  Transactional applications
¤  Stop-and-go
¤  Perform request/reply
operations
n  Data is ordered (often)
¤  Examples
n  synchronous remote
procedure call (RPC)
n  some HTTP and (DNS)
implementations
¨  Streaming applications
¤  Move data
¤  Pedal-to-the-metal data
transmission philosophy
n  Less concern for data
ordering
¤  Examples
n  network backup
n  file transfer protocol (FTP)
8
Avoidable Behaviors
9
¨  Chatty Applications
¤  Some applications perform many small transactions. When combined with the network overhead
associated with each such transaction, the effect is multiplied. In networking, small transactions can
consume as many resources and as much time as large transactions. A better approach is to combine
many small transactions into a single large transaction.
¨  Serialized Transactions
¤  Unnecessary serialization of transactions can result in poor performance, and affect scalability. For
example, 1000 serialized transactions take at least 1000 * RTT to complete. A better approach is to
run unrelated transactions in parallel
¨  Fat Transactions
¤  Applications that send unnecessary bytes on the network are considered fat applications. Applications
that send unnecessary bytes on the network increase network overhead, and performance is hampered.
This situation often comes from inefficient data structures or inefficient data streaming. To remedy this,
optimize data structures, or consider using compression
Questions and discussion on topic
10
11
Thank you.

Más contenido relacionado

La actualidad más candente

Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
HostedbyConfluent
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
Vikrant Arya
 
RedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_DatasheetRedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_Datasheet
Laurentiu Nicula
 

La actualidad más candente (20)

OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.
 
momentum dns security case study
momentum dns security case studymomentum dns security case study
momentum dns security case study
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
PLNOG15: Network Monitoring&Data Analytics at 10/40/100GE speeds. Why spend a...
PLNOG15: Network Monitoring&Data Analytics at 10/40/100GE speeds. Why spend a...PLNOG15: Network Monitoring&Data Analytics at 10/40/100GE speeds. Why spend a...
PLNOG15: Network Monitoring&Data Analytics at 10/40/100GE speeds. Why spend a...
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
CROC'S VIRTUAL DATA CENTER
CROC'S VIRTUAL DATA CENTERCROC'S VIRTUAL DATA CENTER
CROC'S VIRTUAL DATA CENTER
 
Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
Continuous Intelligence for Customer Service Using Kafka Event Streams | Simo...
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
 
Advanced Change Data Streaming Patterns in Distributed Systems | Gunnar Morli...
Advanced Change Data Streaming Patterns in Distributed Systems | Gunnar Morli...Advanced Change Data Streaming Patterns in Distributed Systems | Gunnar Morli...
Advanced Change Data Streaming Patterns in Distributed Systems | Gunnar Morli...
 
Software Defined Networking - 2
Software Defined Networking - 2Software Defined Networking - 2
Software Defined Networking - 2
 
Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...
Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...
Fan-out, fan-in & the multiplexer: Replication recipes for global platform di...
 
Work is a Stream of Applications (Audun Strand, NAV) Kafka Summit London 2019
Work is a Stream of Applications (Audun Strand, NAV) Kafka Summit London 2019Work is a Stream of Applications (Audun Strand, NAV) Kafka Summit London 2019
Work is a Stream of Applications (Audun Strand, NAV) Kafka Summit London 2019
 
Software Defined Networking - 3
Software Defined Networking - 3Software Defined Networking - 3
Software Defined Networking - 3
 
RedHat MRG and Infinispan for Large Scale Integration
RedHat MRG and Infinispan for Large Scale IntegrationRedHat MRG and Infinispan for Large Scale Integration
RedHat MRG and Infinispan for Large Scale Integration
 
Kafka Summit NYC 2017 - Stream it Together: 3 Realities of Modern Programming
Kafka Summit NYC 2017 - Stream it Together: 3 Realities of Modern ProgrammingKafka Summit NYC 2017 - Stream it Together: 3 Realities of Modern Programming
Kafka Summit NYC 2017 - Stream it Together: 3 Realities of Modern Programming
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 
Accela Ericsson Rehome Module
Accela Ericsson Rehome ModuleAccela Ericsson Rehome Module
Accela Ericsson Rehome Module
 
地产知识.ppt
地产知识.ppt地产知识.ppt
地产知识.ppt
 
RedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_DatasheetRedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_Datasheet
 
A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...
 

Similar a Network characteristics of the cloud

Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docx
dirkrplav
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
AgileNetwork
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
ijwscjournal
 
Application Performance Lecture
Application Performance LectureApplication Performance Lecture
Application Performance Lecture
Vishwanath Ramdas
 
Angelbeat -Cut Your Troubleshooting_Time-In-Half
Angelbeat -Cut Your Troubleshooting_Time-In-HalfAngelbeat -Cut Your Troubleshooting_Time-In-Half
Angelbeat -Cut Your Troubleshooting_Time-In-Half
Rick Kingsley
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud traffic
ijccsa
 

Similar a Network characteristics of the cloud (20)

INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?
 
02 requirements and technology for Modern Network by Nader Elmansi
02 requirements and technology for Modern Network by Nader Elmansi02 requirements and technology for Modern Network by Nader Elmansi
02 requirements and technology for Modern Network by Nader Elmansi
 
Data stream processing and micro service architecture
Data stream processing and micro service architectureData stream processing and micro service architecture
Data stream processing and micro service architecture
 
Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docx
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 
Application Performance Lecture
Application Performance LectureApplication Performance Lecture
Application Performance Lecture
 
Angelbeat -Cut Your Troubleshooting_Time-In-Half
Angelbeat -Cut Your Troubleshooting_Time-In-HalfAngelbeat -Cut Your Troubleshooting_Time-In-Half
Angelbeat -Cut Your Troubleshooting_Time-In-Half
 
Move fast and make things with microservices
Move fast and make things with microservicesMove fast and make things with microservices
Move fast and make things with microservices
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud traffic
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
DevDay: Corda Enterprise: Journey to 1000 TPS per node, Rick Parker
DevDay: Corda Enterprise: Journey to 1000 TPS per node, Rick ParkerDevDay: Corda Enterprise: Journey to 1000 TPS per node, Rick Parker
DevDay: Corda Enterprise: Journey to 1000 TPS per node, Rick Parker
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksThe Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless Networks
 

Más de Cloud Genius (8)

Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
Netflix cloud architecture...continued
Netflix cloud architecture...continuedNetflix cloud architecture...continued
Netflix cloud architecture...continued
 
From DVD in the mail to Streaming from the Cloud
From DVD in the mail to Streaming from the CloudFrom DVD in the mail to Streaming from the Cloud
From DVD in the mail to Streaming from the Cloud
 
Architecting applications in the AWS cloud
Architecting applications in the AWS cloudArchitecting applications in the AWS cloud
Architecting applications in the AWS cloud
 
Meeting application performance needs: Scaling up versus scaling out
Meeting application performance needs: Scaling up versus scaling outMeeting application performance needs: Scaling up versus scaling out
Meeting application performance needs: Scaling up versus scaling out
 
Understanding application requirements
Understanding application requirementsUnderstanding application requirements
Understanding application requirements
 
Understanding business_requirements: Security_legal_compliance_budgets
Understanding business_requirements: Security_legal_compliance_budgetsUnderstanding business_requirements: Security_legal_compliance_budgets
Understanding business_requirements: Security_legal_compliance_budgets
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Network characteristics of the cloud

  • 1. Network Characteristics of Cloud Architecture1
  • 2. Performance Dimensions 2 ¨  Application performance differs according to perspective. ¤  For a user, an ideal application would deliver high performance and responsiveness. ¤  For an administrator, an ideal application would consume the least amount of network resources. ¨  Performance also differs based on application type. ¤  Performance for a bulk file transfer application might have different implications than performance for a transactional application.
  • 3. Stakeholders: Users and Administrators ¨  Users want applications to be fast and predictable. ¨  Users judge application performance by their experience: ¤  Is the application quick to respond? ¤  Is an hourglass icon/pinwheel displayed while background operations are carried out? ¤  Does the application launch and close quickly? ¤  Are errors handled in an understandable way? ¨  Administrators want applications to scale. ¨  Administrators often judge an application's performance on how efficiently it uses network resources. ¨  Administrators may ask: ¤  Does the application have low overhead and efficient network usage? ¤  Are the minimum number of connections used, so my server can service as many users at once as possible? ¤  Am I constantly calling helpdesk? 3
  • 4. Measuring application performance 4 ¨  Round Trip Time (RTT) ¤  Time for a request to make a trip from a source to a destination and back ¤  Factors affecting RTT: n  Network infrastructure, distance between nodes, network conditions, and packet size, congestion payload compressibility, forward error correction and data compression ¨  Goodput ¤  Measure of useful application data successfully processed by the receiver, in bits-per-second. n  Enables the measurement of effective or useful throughput and includes only application data n  Packet, protocol, and media headers are considered overhead, and are not part of goodput
  • 5. Measuring application performance 5 ¨  Protocol Overhead ¤  Non-application bytes (protocol and media framing) divided by the total number of bytes transmitted (expressed as percent). ¨  Bandwidth-Delay Product ¤  Bits-per-second bandwidth of the network X the RTT (in seconds) ¤  # of bits it takes to fill available network bandwidth ¤  When the value for bandwidth-delay product is high, the TCP/IP stack must handle large amounts of unacknowledged data in order to keep the pipeline full ¤  A key end-to-end metric for streaming applications
  • 6. Network Characteristics of Cloud Apps 6 ¨  Network/protocol characteristics of cloud apps depend broadly on the app type ¨  Transactional versus Streaming Apps ¤  Transactional apps are also called interactive ¤  Streaming apps are also referred to as batch processing applications
  • 7. Environmental Factors 7 ¨  Application that perform fine on a local computer may cause significant performance degradation/resource consumption when run across a network ¨  Environment affects application performance ¤  Transactional applications are more sensitive to RTT ¤  Streaming applications are more sensitive to bandwidth-delay product LAN Dial up Satellite / WAN Internet and VPN LOW HIGH LOW HIGH Bandwidth RTT
  • 8. Transactional versus Streaming Apps ¨  Transactional applications ¤  Stop-and-go ¤  Perform request/reply operations n  Data is ordered (often) ¤  Examples n  synchronous remote procedure call (RPC) n  some HTTP and (DNS) implementations ¨  Streaming applications ¤  Move data ¤  Pedal-to-the-metal data transmission philosophy n  Less concern for data ordering ¤  Examples n  network backup n  file transfer protocol (FTP) 8
  • 9. Avoidable Behaviors 9 ¨  Chatty Applications ¤  Some applications perform many small transactions. When combined with the network overhead associated with each such transaction, the effect is multiplied. In networking, small transactions can consume as many resources and as much time as large transactions. A better approach is to combine many small transactions into a single large transaction. ¨  Serialized Transactions ¤  Unnecessary serialization of transactions can result in poor performance, and affect scalability. For example, 1000 serialized transactions take at least 1000 * RTT to complete. A better approach is to run unrelated transactions in parallel ¨  Fat Transactions ¤  Applications that send unnecessary bytes on the network are considered fat applications. Applications that send unnecessary bytes on the network increase network overhead, and performance is hampered. This situation often comes from inefficient data structures or inefficient data streaming. To remedy this, optimize data structures, or consider using compression