Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
Custom applications
Multi-tier applications
Tasks and Phases
Application Demands
Similar to IP flows
Model simple request response transactions
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
New
Transaction Whiteboard
Capture and import real world traffic
Model real applications from capture data
Transaction Whiteboard
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
new applications
From scratch (greenfield design)
Using sophisticated application logic
From real world application captures
In a service-oriented architecture (SOA) environment using Web Service
Definition Language (WSDL) files
z Modifying an existing application captured with ACE Analyst Real
Application Simulation Module
Edit/modify existing trace
Chain applications
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
Predict/Validate
QuickPredict
AppDoctor/Application Delay Tracking
Discrete Event Simulation (DES)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
New
Real
Application
Simulation
Module
Transaction
Whiteboard
Capture Agent
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
10
z HTTP
GET (rfc1945.html)
z HTTP response
z Request / response for each image on the page
HTTP GET
(100 bytes)
Response
(2000 bytes)
Client
Web Server
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
11
HTTP Example
In Transaction Whiteboard
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
12
HTTP Example
What Did We Really Do?
What are you defining?
z Tiers
z Messages
z Dependencies
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
13
representation of
Tiers
Messages
Dependencies
z Timeline
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
14
Message Editor
Tabular interface for editing message properties
z Only
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
15
Latency delay
z Time
Protocol delay
z Protocol
Congestion delay
z Queuing
on devices
z Can vary from message to message
z Unknown prior to running the application, can vary for each run
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
16
= 1,000 bps
z Latency = 5 seconds
T=0
10
20
30
40
50
Client
30,000 bits
Bandwidth Delay
30 seconds
Latency Delay
5 seconds
Server
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
17
Slope
Convenience when creating the application model
z Bandwidth
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
18
QuickPredict
Deploy application model
on a virtual network
z Answer
what-if questions
z Compare several virtual
network conditions
simultaneously
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
19
Review
Application Modeling
z Why?
z How?
Exchange Chart
z Message Editor
z Simple Network Estimation
z QuickPredict
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
20
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
21
Lab 1: Overview
Goal
z To
Steps
z Represent
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
22
Lab 1: Review
Modeled the file download in Transaction Whiteboard
Used QuickPredict to understand the expected response time
Didnt need an ACE file to perform this study
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
23
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
24
Connections
Why is it important to model connections?
Applications use connections in specific ways
z FTP
Control connection
Data connection
z HTTP
In Transaction Whiteboard
z Every
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
25
TCP Connections
How are connections handled during simulation?
z Opening
connections
A TCP three-way handshake occurs in simulation the first time a
connection is used
z Closing connections
By default, connections are closed when the task is complete
z You can explicitly close a connection using the Transaction
Whiteboard scripting APIs
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
26
UDP Connections
UDP connections are fundamentally different than TCP connections
z UDP
Modeling challenge
z How
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
27
Drop Response
Ignore packet drop
z The
Acknowledgement based
z ACKs
28
Per Message:
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
29
Distributions
Introduce variability
z Message
size
z Tier processing time
z User think time
Distribution types
z Exponential
z Uniform
z Normal
z Pareto
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
30
z 1400
Options
z Draw
~1400 messages
z Copy and paste ~1400 times
z Use message groups
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
31
Message Groups
Quickly define a request/response pattern
z Converted
simulation
Defining a message
group
z
z
z
32
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
33
Multi-level undo/redo
Tag
Multi-message editing mode
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
34
Multi-Message Editing
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
35
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
36
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
37
Logic Scripts
Python code
z Modify
Block
z Initialization Block
z Function Block
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
38
Example:
Home-Grown Calendar Application
Consider the following home-grown calendar application
z Users
Modeling options
z Create
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
39
size
z Wait time
z Anything
Methodology
z Declare
the parameter
z Write logic script
z Give the parameter a value during deployment
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
40
value
z Description
Value can be
changed in the
project editor
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
41
on dependency
z Add Logic Script
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
42
Definition object
z Task Specification
z Edit ACE Parameters
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
43
Review:
Adding Parameters to an Application
Why?
z Change
the parameter
z Write logic script
z Give the parameter a value during deployment
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
44
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
45
Lab 2: Introduction
Overview
z Study
Objective
z Use
Steps
z Import
46
Lab 2: Review
Summary:
z Created
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
47
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
48
parameters
z Modify unsent messages
Size
CPU time
User time
z Collect custom statistics
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
49
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
50
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
51
Example:
Modeling a Chatty Database Application
Modeling the performance of
a customer tracking database
ACE Trace
z You
Number of customers is
expected to triple in 2012
z So
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
52
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
53
size
sender
receiver
parent action
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
54
Accessed a parameter
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
55
z New
front-end
z Back-end exists as a separate file
Modeling goals
z Network
impact
z Response time
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
56
is stitched into
the parent file
z Parent can pass
parameters down to the
child
action
task name
is blocking
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
parameters
57
app_server
app_server
db_server
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
58
Non-blocking:
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
59
step
z Map tier names
Actual tier name doesnt need to
exist in the parent task
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
60
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
61
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
62
Custom Statistics
Modeling studies are not limited to response time analysis
z Analyze
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
63
components of delay
z Identify problems quickly
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
64
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
65
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
AppDoctor
66
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
67
Lab 3
Goal
z To
find out how much of the total response time is due to the big image for
broadband users
Steps
z Write
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
68
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
69
Lab 3: Review
Comparison: Original Vs Corrected
Parameters give you the flexibility to re-use whiteboard file in multiple scenarios
Custom statistics provides greater control in how you study your application
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
70
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
71
you may not know which physical node to map a given logical tier to
when the application begins
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
72
redirected to www.google.cl
application
Similar to DNS
Client doesnt pick its server until mid-way through the transaction
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
73
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
74
75
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
76
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
77
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
78
Agenda
Application modeling methodologies
Creating application model in Transaction Whiteboard
Lab 1
Application modeling basics
Introduction to scripting in Transaction Whiteboard
Lab 2
Sophisticated application logic
Application model analysis
Lab 3
How do I
Review
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
79
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
80
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
81
Documentation References
Product documentation
z
82
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
83
Take-Away Points
Real Application Simulation Module capabilities
What is Transaction Whiteboard?
z Environment
analysis
AppDoctor
z Provides
time
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2010 OPNET Technologies, Inc.
84