摘要:
Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.
摘要:
Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.
摘要:
Simulating an application. A method that may be practiced in a computing environment configured for simulating an application modeled by an application model deployed in a performance scenario of a computing system by deploying service models of the application model to device models modeling devices. The method includes referencing a performance scenario to obtain a transaction being modeled as originating from a first device model. The transaction invokes of a first service model. The first service model specifies hardware actions for simulation. The first service model is referenced to determine the hardware actions for simulation and the next referenced service. The next referenced service specifies hardware actions to be added to the transaction and may specify invocation of other service models. A chain of hardware actions is generated by following the invocation path of the service models. The hardware actions are applied to device models to simulate the transaction.
摘要:
Aspects of the subject matter described herein relate to modeling and simulating software contention. In aspects, a model declares properties of a scarce software object and models software components that need the scarce software object to execute. A simulator uses the model to set up data structures that track locking activity related to the software object. The simulator simulates the interaction between software components and hardware including seizing and releasing locks on the software object. The simulator may use a function or other similar mechanism to distribute seize and release operations with respect to a lock across multiple instances of the software object. The simulator may use data generated by a simulation to provide an indication of lock objects and hardware utilization, transaction latencies, and other statistics.
摘要:
Simulating device interactions. A method may be practiced in a computing system for simulating interconnected devices. The method of simulating device interactions may be done in performing an overall transaction to obtain an output of system performance characteristics including measurement of latencies and/or device loads for actions performed by devices in performing the overall transaction. The method includes dividing a transaction into individual actions. The actions are applied to appropriate device models to produce latencies and/or device utilizations for the action as applied to the appropriate device model. This may be done by including an indication of an action type and optionally an action subservice. Memory resources may be conserved by ending the simulation when latencies and/or device utilizations have settled. Device utilization and latency may be aggregated and averaged over time. When changes in the latencies and/or device utilizations are within a predetermined range, the simulation can be ended.
摘要:
A method and system for defining performance models of distributed applications such as distributed systems or network systems in a way that combines discrete and analytical models and simulating such performance models for analyzing software performance and impacts on devices of the distributed applications is described. Also described is a method for accelerating the simulation process by converting the discrete load into aggregate load dynamically based on the statistical analysis of the simulation results.
摘要:
Aspects of the subject matter described herein relate to modeling and simulating software contention. In aspects, a model declares properties of a scarce software object and models software components that need the scarce software object to execute. A simulator uses the model to set up data structures that track locking activity related to the software object. The simulator simulates the interaction between software components and hardware including seizing and releasing locks on the software object. The simulator may use a function or other similar mechanism to distribute seize and release operations with respect to a lock across multiple instances of the software object. The simulator may use data generated by a simulation to provide an indication of lock objects and hardware utilization, transaction latencies, and other statistics.
摘要:
Preconditioning for stochastic simulation of computer system performance is described. In an embodiment, methods taught herein include preconditioning a performance scenario that is simulated as part of a software deployment. The performance scenario specifies devices included as part of a hardware configuration supporting the software. The performance scenario can be modified based, at least in part, on the result of the preconditioning. Other methods taught herein include two complementary techniques for preconditioning performance scenarios, referred to as pseudo-simulation and workload aggregation.
摘要:
Simulating network connections. A method includes generating a transaction by simulating a method model of a service model. The transaction includes representations of network interactions. A sequence of actions is created. The actions define network hardware activities including network actions performed by one or more source computer models, one or more network models, and one or more destination computer models. The sequence of actions is applied to network hardware device models to simulate network connectivity.
摘要:
Methods, systems, and computer-readable media for deploying an update to nodes propagated throughout a data center are provided. Launching new upgrade to hosting environment residing on the nodes typically invokes a mechanism (e.g., fabric controller) to form a group of nodes that are independent of one another with respect to upgrade domains, which are assigned to tenants (e.g., program components of service applications running within the data center) presently hosted by the nodes. The constraints of the update domains are articulated by service level agreements established for the service applications, respectively. Forming the group involves identifying independent nodes for membership, where no two members of the group host analogous tenants (belonging to a common service application) that are assigned to distinct update domains. However, it is acceptable to join to the group those nodes hosting analogous tenants that are each assigned to the same update domain.