跳到主要內容

簡易檢索 / 詳目顯示

研究生: 丁冰和
Ping-Ho Ting
論文名稱: 企業系統使用者分配之研究
Profile Oriented User Distributions in Enterprise Systems
指導教授: 許秉瑜
Ping-Yu Hsu
口試委員:
學位類別: 博士
Doctor
系所名稱: 管理學院 - 企業管理學系
Department of Business Administration
畢業學年度: 93
語文別: 英文
論文頁數: 77
中文關鍵詞: 群集使用者記錄企業系統負載平衡
外文關鍵詞: Enterpise systems, Cluster, Profile, Load Balance
相關次數: 點閱:8下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 正當全球企業系統追求即時管理以增加生產力,客戶服務及彈性.以N層式架構的企業系統的使用者分配就變得重要,一般認為,只要相似使用行為的使用者放在同一應用系統伺服器有助於系統的提昇.
    本論文提出以應用程式的重複使用率及有限的記憶體大小兩種演算法並以真實的企業資料進行模擬,模擬效果顯示兩種算法是可行的.


    As enterprises world-wide race to embrace real 吃time management to improve
    productivity, customer services, and flexibility. Many resources have been invested in enterprise systems (ESs). All modern ESs adopt a n-tier client-server architecture that includes several application servers to host users and applications. As in any other multi-server environment, the load distributions and user
    distributions in particular, become a critical issue in tuning system performance.
    In ESs, each application is evoked by a user who logs on an application server
    and stays connected to the server for an entire working session, which can last
    for days. Therefore, admitting a user into an application server affects not only
    current but also future performance of the server.
    Distributions in application servers and web servers are different in granularity. In the former scenario, a user represented by a set of transactions is the atomic element while in the latter scenario, single request is the atomic element and different requests issued by the same user can be directed to different web
    servers. To the best of our knowledge, no research has been devoted in the user
    distribution to application servers in n-tier architecture.
    The paper proposes two methods to distribute users evoking similar transactions to the same servers. One is threshold of application reusibility and the other is limited buÞer sizes in each servers. Based on user profiles, the algorithms return suggestions of user distributions, the number of servers needed,
    and the similarity of user requests in each server. The paper also discusses how
    to apply the knowledge of existing user patterns to distribute new users, who do not have enough entries in the proßle and have no distribution suggestion,in the run time. The algorithms are also applied on a set of real data which are
    derived from the access log of an enterprise ERP system to evaluate the quality of the suggested distributions.

    1 Introduction ........................................................1 2 Related Work........................................................ 8 3 Finding Users'' Regular Transactions ................................12 4 Proßle Oriented Clustering Algorithm(POCA) 17 4.1 The Definitions of Similarity Measure, Clusters, and Distributions 17 4.2 Clustering and Distributing by POCA . . . . . . . . . . . . . . . 21 4.3 The Correctness of POCA . . . . . . . . . . . . . . . . . . . . . 23 4.4 An AR Based Hybrid Dispatching Approach . . . . . . . . . . . . 26 5 Buffer Constrainted Clustering Algorithm( BC2A )....................28 5.1 Clustering and Distributing Users with Regular Transactions . . 28 5.2 Clustering an Distributing by BC2A . . . . . . . . . . . . . . .. 32 5.3 The Correctness of BC2A . . . . . . . . . . . . . . . . . . . . . 35 5.4 An AMR Based Hybrid Dispatching Approach . . . . . . . . . . .....37 6 Performance improvement of POCA and BC2A ...........................38 6.1 POCA Improvement . . . . . . . . . . . . . . . . . . . . . . . . .38 6.2 BC2A Improvement . . . . . . . . . . . . . . . . . . . . . . . . 39 7 Simulation ........................................................ 45 7.1 Experimental Results of Heuristic POCA . . . . . . . . . . . . 46 7.2 Experimental Results of Heruistic BC2A . . . . . . . . . . . . . 48 7.3 Comparision of HPOCA, HBC2A and Round-Robin User Distribution... 50 8 Conclusion .........................................................53 A Aprori Algorithm ...................................................59 B Performance Improvement by incorporating Chain .....................61 C Detailed Results of Experiments ....................................63

    [1] SAP AG. System R/3 Technicale Consultant Training 1 - adminis-
    tration, chapter R/3 WorkLoad Distribution. SAP AG, 1998.
    [2] SAP AG. System R/3 Technicale Consultant Training 3 - Perf. Tun-
    ing, chapter R/3 Memory Management. SAP AG, 1998.
    [3] Woo Hyun Ahn, Woo Jin Kim, and Daeyson Park. Content-aware coop-
    erative caching for cluster-based. The Journal of system and software,
    69(1):75-86, 2004.
    [4] R. Argawal and R. Srikant. Fast algorithms for mining associations rules.
    In Proceedings of International Conference in Very Large Data Bases,
    pages 487Û499, 1994.
    [5] H. Bryhni, E. Klovning, and O. Kure. A comparison of load balancing
    techniques for scalable web servers. IEEE Network, 14:58-64, 2000.
    [6] V. Cardellini, M. Colajanni, and P.S. Yu. Dynamic load balancing on web-
    server systems. IEEE Internet Computing, 3:28-39, 1999.
    [7] Yen-Liang Chen, Ping-Yu Hsu, and Chun-Ching Ling. Mining quantitative
    assocation rules in bag databases. Journal of Information Management,
    7:215-229, 2001.
    [8] Gianfranco Ciardo, Alma Riska, and Evgenia Smirni. Equiload:a load bal-
    ancing policy for cluster web servers. Performance Evaluation, 46:101-
    124, 2001.
    [9] B.A. Davey and H.A. Priestley. Introduction to Lattice and Order. Cam-
    bridge Mathematical Textbooks, 1990.
    [10] P. Dreyfus. The second wave: netscape usability on the services based
    internet. IEEE Internet Computing, 2(2):36-40, 1998.
    [11] R. O. Duda and P. E. Hard. Pattern Classißcation and Scene Analysis.
    Wiley-Interscience Publication, 1973.
    [12] S. Guha, R. Rastogi, and K. Shim. Rock: A robust clustering algorithm
    for categorical attributes. Information Systems, 25(5):345Û366, 2000.
    [13] J. Han and M. Kamber. Data Mining: Concepts and Techniques, chap-
    ter Mining association rules in large databases. Morgan Kaufmann Pub-
    lisher, 2001.
    [14] J. Han and M. Kamber. Data Mining: Concepts and Techniques, chap-
    ter Clustersing. Morgan Kaufmann Publisher, 2001.
    [15] J.A. Hernæandes. The SAP R/3 Handbook, chapter Distributing R/3 Sys-
    tems. McGraw-Hill, 2 edition, 2000.
    [16] J. Pei J. Han and Y. Yin. Mining frequent patterns without candidate gen-
    eration. In Proceedings of ACM-SIGMOD International Conference
    on Management of Data, pages 1-12, 2000.
    [17] A.K. Jain and R.C. Dubes. Algorithms for Clustering Data. Prentice
    Hall, 1988.
    [18] P. Mohapatra and H. Chen. A framework for managing qos and improving
    performance of dynamic web content. In Proceedings of Global Telecom-
    munications Conference, volume 4, pages 2460-2464, 2001.
    [19] S. Nadimpalli and S. Majumdar. Techniques for achieving high performance
    web servers. In Proceedings of International Conference on Parallel
    Processing, pages 233-241, 2000.
    [20] B. C-P. Ng and C-L. Wang. Document distribution algorithm for load
    balancing on an extensible web server architecture. In Proceedings of
    International symposium on cluster computing and the Grid, pages
    140-147, 2001.
    [21] Victor Safronov and Manish Parashar. Optimizing web servers using page
    rank prefetching for clustered accesses. Information Sciences, 150:165-
    176, 2003.
    [22] Zhiguang Shan, Chuang Lin, and Dan Marineslu. Modeling and perfor-
    mance analysis of qos-aware load balancing of web-server cluster. Com-
    puter Networks, 40(2):235-244, 2002.
    [23] Sun Micorsystems Inc. Software Development for the web enabled en-
    terprise: beneßt of the solaris operating environment, 1999.
    [24] J. Zhang, T. Hamalainen, J. Joutsensalo, and K. Kaario. Qos-aware load
    balancing algorithm for globally distributed web systems. In Proceedings
    of international conferences on Info-tech and Info-net, volume 2, pages
    60-65, 2001.

    QR CODE
    :::