<em id="rw4ev"></em>

      <tr id="rw4ev"></tr>

      <nav id="rw4ev"></nav>
      <strike id="rw4ev"><pre id="rw4ev"></pre></strike>
      合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

      COMPSCI 315代做、代寫Python/Java語言編程
      COMPSCI 315代做、代寫Python/Java語言編程

      時間:2024-09-26  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



      Web Server Workload Characterization
      Assignment 3 and 4, COMPSCI 315
      Due: Refer to the deadline on Canvas; Submission via Canvas
      1 Introduction
      Internet traffic measurement involves collecting network data that can be analyzed for several purposes such
      as traffic modeling, designing better network protocols, and traffic management. The growth in popularity
      of Web in the 19**s resulted in researchers trying to characterize Web traffic. These research works have
      utilized Web server logs to understand the workload characteristics of Web servers. The results of the
      research has led to improving performance of Web applications, designing better caching and load balancing
      techniques, and providing better user experience to clients, among other things [1, 3–5].
      2 Web Server Access Logs
      In this assignment, you will analyze one of two university Web server access logs [2]:
      1. A campus-wide Web server at the University of Saskatchewan (UofS_access_log).
      2. A department-level Web server at the University of Calgary (UofC_access_log).
      The server access log contains information about all requests made to the server and the corresponding
      server responses. The server log is in the fixed text-based Common Log Format and has the following syntax:
      hostname - - [dd/mm/yyyy:hh:mm:ss time_zone] object response_code transfer_size
      The hostname is the resolved name or IP address of the client making a request for an object stored on
      the Web server. The following fields (- -) are usually empty, but may contain user-identifier information
      such as username. The next field indicates the day and time the request was made along with the time zone.
      The URL requested is noted in the object field. The response_code field indicates the HTTP response
      code returned by the server. The transfer_size field records the bytes transferred by the server.
      For example, the following is a line from the UofS_access_log:
      imhotep.usask.ca - - [15/Sep/1995:16:02:09 -0600] "GET /changes.html HTTP/1.0" 200 1254
      This line represents a request made by host imhotep.usask.ca on September 15, 1995 at 4:02:09 p.m.
      The time zone is central time (GMT-0600). The host requested the HTML file called changes.html using
      HTTP version 1.0. This request was successfully completed by the server as shown by the status code 200.
      The server transferred 1254 bytes to the host imhotep.usask.ca.
      Note the following about the datasets:
      • UofS_access_log: This trace contains seven month’s worth of all HTTP requests to the university
      Web server. The logs fully preserve the originating host and HTTP request. A local client is one
      containing usask.ca in the hostname or an IP address with 128.233.X.X. All others are considered
      remote clients. Timestamps have 1 second resolution.
      1• UofC_access_log: This trace contains approximately one year’s worth of all HTTP requests to the
      University of Calgary’s Department of Computer Science Web server. The hosts making requests to
      the server have had their addresses removed to preserve privacy. Hosts are identified as either local
      or remote where local is a host from the University of Calgary, and remote is a host from outside of
      the University of Calgary domain. Paths have been removed. Files were numbered from 1 for the
      first file encountered in the trace. Files retain the original file extension, so that the type of file can
      be determined. Paths of the filenames have been removed. Modified filenames consist of two parts:
      num.type, where num is a unique integer identifier, and type is the extension of the requested file.
      Timestamps have 1 second resolution.
      3 Web Server Workload Analysis
      Choose one dataset you like and answer all questions:
      1. Based on your learning of Internet measurements in this course answer the following questions:
      (a) What measurement mechanism was used for the collection of the Web server logs? Active, Passive,
      or both.
      (b) What type of network were the measurements taken from? Edge network, core network, or both.
      (c) What type of analysis techniques did you apply on the dataset to get the answers? Online, offline,
      or both.
      (d) Is analyzing server logs the only way to characterize the workload of a Web server? Why?
      2. How many requests are made per day on average?
      3. How many bytes were transferred during the entire log duration expressed in Megabytes (MB)?
      4. What is the average number of bytes transferred per day expressed in MB per day?
      5. Produce a breakdown of the server response codes expressed in percentage of the total number of
      requests. Group the status code as follows: Successful, Not Modified, Found, Unsuccessful. A successful
      response (status code: 200) means that the server received a request for a valid object (for which the
      client has the necessary access privilege), the object was found, and returned successfully to the client.
      A not modified response (status code: 304) means that the client already has a copy of the requested
      object in its cache, wants to verify if the object is up-to-date, and the client is informed that the
      object has not been modified at the server. A found response (status code: 302) results when the
      requested object is known to be stored in a different location than the URL requested by the client.
      The server responds with the new URL in this situation. A unsuccessful response (status code: 4XX
      and 5XX) happens when the requested object does not exist on the server, the client did not have
      access permission, or there was a server-side error.
      6. How many requests are made by local clients and remote clients, respectively? Report your answer as
      a percentage of total requests.
      7. How many bytes are transferred by local clients and remote clients, respectively? Report your answer
      as a percentage of total bytes transferred.
      8. Produce a breakdown of requests by file type category. The file categories are as follows: Video, Sound,
      Dynamic, Formatted, HTML, Images, Others. Report your answer as a percentage of total requests.
      The file categories by file extensions are described in Table 1.
      9. Using Table 1, produce a breakdown of bytes transferred by each file category. Report your answer as
      a percentage of total bytes transferred.
      10. Using Table 1, calculate the average transfer sizes (in bytes) of each file category.
      2Table 1: File categories
      Category File extension
      HTML html, htm, shtml, map
      Images gif, jpeg, jpg, xbm, bmp, rgb, xpm
      Sound au, snd, wav, mid, midi, lha, aif, aiff
      Video mov, movie, avi, qt, mpeg, mpg
      Formatted ps, eps, doc, dvi, txt
      Dynamic cgi, pl, cgi-bin
      Others Everything else
      11. Identify all unique object requests in the log and sort them based on frequency. Next, identify all the
      objects that were requested only once in the log. What percentage of unique objects are accessed only
      once in the log? What percentage of bytes are accessed only once in the log?
      12. Produce a Cumulative Distribution Function (CDF) plot of the transfer sizes of all distinct objects.
      The x-axis should be in log-10 scale.
      13. Produce at least one plot to show the percentage of total requests per hour of the day, the percentage
      of total requests per day of the week, or percentage of total requests per month of the year.
      14. Produce a CDF plot of the inter-reference times of objects that are requested more than once. The
      x-axis should be in log-10 scale.
      For questions 6 onwards, your analysis should be based on successful requests only. Report
      your results to 2 decimal places. Some requests in the log may be malformed. It is safe to
      ignore these requests in your analysis. Please check that these requests account for a negligible
      fraction of the total requests. Briefly comment on your results (Explain the results and discuss
      their implications).
      4 Submission
      Complete the attached file with your answers. Convert this file to PDF format. Rename it
      to your username.pdf. Submit the file to Canvas. Submit answers to questions **7 as part of
      Assignment 3. Submit answers to questions 8-14 as part of Assignment 4.
      A code template will be provided at a later date. For added challenge, you are encouraged to write the
      parser and analysis scripts from scratch using a programming language of your choice. You are free to use
      online resources (e.g., online code, tools) as long as you provide appropriate attribution. You do not need
      to submit the code. You should keep the code, in case we wish to see it. You are encouraged to discuss the
      assignment with each other, however, the code and the produced results must be done individually.
      Questions regarding this assignment and code template should be directed to the course tutors.
      5 Grading Scheme
      Each question is worth 10 points. Assignment 3 is worth 70 points. Assignment 4 is worth 70 points. For
      each question, you will receive full points for the correct answer. You will receive 50% points for an answer,
      which is close to the correct answer. You will receive zero points for an answer that is far off from the correct
      answer. Each answer should have a brief explanation to receive full marks.
      References
      [1] Martin Arlitt and Tai Jin, A Workload Characterization Study of the 1998 World Cup Web Site, IEEE
      Network 14 (2000), no. 3.
      3[2] Martin Arlitt and Carey Williamson, Internet Web Servers: Workload Characterization and Performance
      Implications, IEEE/ACM Trans. Netw. 5 (1997), no. 5, 631–645.
      [3] Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Characterization of a Large Web
      Site Population with Implications for Content Delivery, WWW 9 (2006), no. 4.
      [4] Venkata Padmanabhan and Lili Qiu, The Content and Access Dynamics of a Busy Web Site: Findings
      and Implications, Proc. ACM SIGCOMM, 2000.
      [5] Weisong Shi, Y Wright, Eli Collins, and Vijay Karamcheti, Workload Characterization of a Personalized
      Web Site and its Implications for Dynamic Content Caching, Proc. WCW, 2002.


      請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp








       

      掃一掃在手機打開當前頁
    1. 上一篇:代寫AI6012程序、代做Java/c++編程
    2. 下一篇:INFT 2064代做、代寫C++, Java設計編程
    3. 無相關信息
      合肥生活資訊

      合肥圖文信息
      出評 開團工具
      出評 開團工具
      挖掘機濾芯提升發動機性能
      挖掘機濾芯提升發動機性能
      戴納斯帝壁掛爐全國售后服務電話24小時官網400(全國服務熱線)
      戴納斯帝壁掛爐全國售后服務電話24小時官網
      菲斯曼壁掛爐全國統一400售后維修服務電話24小時服務熱線
      菲斯曼壁掛爐全國統一400售后維修服務電話2
      美的熱水器售后服務技術咨詢電話全國24小時客服熱線
      美的熱水器售后服務技術咨詢電話全國24小時
      海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
      海信羅馬假日洗衣機亮相AWE 復古美學與現代
      合肥機場巴士4號線
      合肥機場巴士4號線
      合肥機場巴士3號線
      合肥機場巴士3號線
    4. 上海廠房出租 短信驗證碼 酒店vi設計

      成人久久18免费网站入口