Loading…
Methodology of profiling network operations in software for distributed information systems
Network operations take up large amounts of resources in distributed systems and in this case, existing profilers can correctly construct the execution tree of the program code and correctly identify the runtime, so you need other methods that will allow finding bottlenecks in the. The article discu...
Saved in:
Published in: | ITM web of conferences 2016, Vol.6, p.3009 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153 |
---|---|
cites | cdi_FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153 |
container_end_page | |
container_issue | |
container_start_page | 3009 |
container_title | ITM web of conferences |
container_volume | 6 |
creator | Lukyanchikov, Oleg Filatov, Vyacheslav Biryukov, Dmitry Pluzhnik, Evgeniy |
description | Network operations take up large amounts of resources in distributed systems and in this case, existing profilers can correctly construct the execution tree of the program code and correctly identify the runtime, so you need other methods that will allow finding bottlenecks in the. The article discusses various approaches on the time efficiency assessment software, and based on a new method for profiling distributed systems, also an example of its use on a system built with agent technology-relational mapping. As a demonstration of the proposed method there’s presented an example of the system, built using the technology of agent-relational mapping that performs network operations in distributed transactions. Thus showing that for the ease of using this technology we have to pay with lots of operations to monitor network transactions. |
doi_str_mv | 10.1051/itmconf/20160603009 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_a26d8e70a8794304acfc1c10e6bd8138</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_a26d8e70a8794304acfc1c10e6bd8138</doaj_id><sourcerecordid>4042659591</sourcerecordid><originalsourceid>FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153</originalsourceid><addsrcrecordid>eNpNUU1LAzEQXUTBUvsLvAQ8r51J9iN7lOJHoeJFTx5CNh81dbupSUrpv3dti_QyM7x5vDfMy7JbhHuEEqcurZXv7ZQCVlABA2gushGlNeYUmvrybL7OJjGuAABLXiGtRtnnq0lfXvvOL_fEW7IJ3rrO9UvSm7Tz4Zv4jQkyOd9H4noSvU07GQyxPhDtYgqu3Sajh92ArA9EEvcxmXW8ya6s7KKZnPo4-3h6fJ-95Iu35_nsYZErhjzl1Filaw0tQ4CyUJxZ1IY3BfDGmkLX9VCYUmXZtG2lFEdEiai5BEs5lmyczY-62suV2AS3lmEvvHTiAPiwFDIkpzojJK00NzVIXjcFg0Iqq1AhmKrVHBkftO6OWsMjfrYmJrHy29AP5wuseUULaIpmYLEjSwUfYzD23xVB_IUiTqGIs1DYL6H_gtw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1786240949</pqid></control><display><type>article</type><title>Methodology of profiling network operations in software for distributed information systems</title><source>Publicly Available Content Database</source><creator>Lukyanchikov, Oleg ; Filatov, Vyacheslav ; Biryukov, Dmitry ; Pluzhnik, Evgeniy</creator><contributor>Veremey, E.I. ; Nikulchev, E.V.</contributor><creatorcontrib>Lukyanchikov, Oleg ; Filatov, Vyacheslav ; Biryukov, Dmitry ; Pluzhnik, Evgeniy ; Veremey, E.I. ; Nikulchev, E.V.</creatorcontrib><description>Network operations take up large amounts of resources in distributed systems and in this case, existing profilers can correctly construct the execution tree of the program code and correctly identify the runtime, so you need other methods that will allow finding bottlenecks in the. The article discusses various approaches on the time efficiency assessment software, and based on a new method for profiling distributed systems, also an example of its use on a system built with agent technology-relational mapping. As a demonstration of the proposed method there’s presented an example of the system, built using the technology of agent-relational mapping that performs network operations in distributed transactions. Thus showing that for the ease of using this technology we have to pay with lots of operations to monitor network transactions.</description><identifier>ISSN: 2271-2097</identifier><identifier>ISSN: 2431-7578</identifier><identifier>EISSN: 2271-2097</identifier><identifier>DOI: 10.1051/itmconf/20160603009</identifier><language>eng</language><publisher>Les Ulis: EDP Sciences</publisher><subject>Computer networks ; Identification methods ; Mapping ; Technology utilization</subject><ispartof>ITM web of conferences, 2016, Vol.6, p.3009</ispartof><rights>2016. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153</citedby><cites>FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1786240949?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>309,310,314,780,784,789,790,4024,23930,23931,25140,25753,27923,27924,27925,37012,44590</link.rule.ids></links><search><contributor>Veremey, E.I.</contributor><contributor>Nikulchev, E.V.</contributor><creatorcontrib>Lukyanchikov, Oleg</creatorcontrib><creatorcontrib>Filatov, Vyacheslav</creatorcontrib><creatorcontrib>Biryukov, Dmitry</creatorcontrib><creatorcontrib>Pluzhnik, Evgeniy</creatorcontrib><title>Methodology of profiling network operations in software for distributed information systems</title><title>ITM web of conferences</title><description>Network operations take up large amounts of resources in distributed systems and in this case, existing profilers can correctly construct the execution tree of the program code and correctly identify the runtime, so you need other methods that will allow finding bottlenecks in the. The article discusses various approaches on the time efficiency assessment software, and based on a new method for profiling distributed systems, also an example of its use on a system built with agent technology-relational mapping. As a demonstration of the proposed method there’s presented an example of the system, built using the technology of agent-relational mapping that performs network operations in distributed transactions. Thus showing that for the ease of using this technology we have to pay with lots of operations to monitor network transactions.</description><subject>Computer networks</subject><subject>Identification methods</subject><subject>Mapping</subject><subject>Technology utilization</subject><issn>2271-2097</issn><issn>2431-7578</issn><issn>2271-2097</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEQXUTBUvsLvAQ8r51J9iN7lOJHoeJFTx5CNh81dbupSUrpv3dti_QyM7x5vDfMy7JbhHuEEqcurZXv7ZQCVlABA2gushGlNeYUmvrybL7OJjGuAABLXiGtRtnnq0lfXvvOL_fEW7IJ3rrO9UvSm7Tz4Zv4jQkyOd9H4noSvU07GQyxPhDtYgqu3Sajh92ArA9EEvcxmXW8ya6s7KKZnPo4-3h6fJ-95Iu35_nsYZErhjzl1Filaw0tQ4CyUJxZ1IY3BfDGmkLX9VCYUmXZtG2lFEdEiai5BEs5lmyczY-62suV2AS3lmEvvHTiAPiwFDIkpzojJK00NzVIXjcFg0Iqq1AhmKrVHBkftO6OWsMjfrYmJrHy29AP5wuseUULaIpmYLEjSwUfYzD23xVB_IUiTqGIs1DYL6H_gtw</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Lukyanchikov, Oleg</creator><creator>Filatov, Vyacheslav</creator><creator>Biryukov, Dmitry</creator><creator>Pluzhnik, Evgeniy</creator><general>EDP Sciences</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7TB</scope><scope>7U5</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>DOA</scope></search><sort><creationdate>2016</creationdate><title>Methodology of profiling network operations in software for distributed information systems</title><author>Lukyanchikov, Oleg ; Filatov, Vyacheslav ; Biryukov, Dmitry ; Pluzhnik, Evgeniy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer networks</topic><topic>Identification methods</topic><topic>Mapping</topic><topic>Technology utilization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lukyanchikov, Oleg</creatorcontrib><creatorcontrib>Filatov, Vyacheslav</creatorcontrib><creatorcontrib>Biryukov, Dmitry</creatorcontrib><creatorcontrib>Pluzhnik, Evgeniy</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Open Access: DOAJ - Directory of Open Access Journals</collection><jtitle>ITM web of conferences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lukyanchikov, Oleg</au><au>Filatov, Vyacheslav</au><au>Biryukov, Dmitry</au><au>Pluzhnik, Evgeniy</au><au>Veremey, E.I.</au><au>Nikulchev, E.V.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Methodology of profiling network operations in software for distributed information systems</atitle><jtitle>ITM web of conferences</jtitle><date>2016</date><risdate>2016</risdate><volume>6</volume><spage>3009</spage><pages>3009-</pages><issn>2271-2097</issn><issn>2431-7578</issn><eissn>2271-2097</eissn><abstract>Network operations take up large amounts of resources in distributed systems and in this case, existing profilers can correctly construct the execution tree of the program code and correctly identify the runtime, so you need other methods that will allow finding bottlenecks in the. The article discusses various approaches on the time efficiency assessment software, and based on a new method for profiling distributed systems, also an example of its use on a system built with agent technology-relational mapping. As a demonstration of the proposed method there’s presented an example of the system, built using the technology of agent-relational mapping that performs network operations in distributed transactions. Thus showing that for the ease of using this technology we have to pay with lots of operations to monitor network transactions.</abstract><cop>Les Ulis</cop><pub>EDP Sciences</pub><doi>10.1051/itmconf/20160603009</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2271-2097 |
ispartof | ITM web of conferences, 2016, Vol.6, p.3009 |
issn | 2271-2097 2431-7578 2271-2097 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_a26d8e70a8794304acfc1c10e6bd8138 |
source | Publicly Available Content Database |
subjects | Computer networks Identification methods Mapping Technology utilization |
title | Methodology of profiling network operations in software for distributed information systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T18%3A22%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Methodology%20of%20profiling%20network%20operations%20in%20software%20for%20distributed%20information%20systems&rft.jtitle=ITM%20web%20of%20conferences&rft.au=Lukyanchikov,%20Oleg&rft.date=2016&rft.volume=6&rft.spage=3009&rft.pages=3009-&rft.issn=2271-2097&rft.eissn=2271-2097&rft_id=info:doi/10.1051/itmconf/20160603009&rft_dat=%3Cproquest_doaj_%3E4042659591%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c318t-2efcd7d0b310054c83f1de894089fe4d77e4d3cc559bb6cc8111a11d8a0f28153%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1786240949&rft_id=info:pmid/&rfr_iscdi=true |