ethernet bandwidth utilization of datafull, dataless, and ... · less, and diskless nodes, as well...

111
ESD-TR-92-051 MTR- 11282 Ethernet Bandwidth Utilization of Datafull, Dataless, and Diskless Node Workstations and X-Terminals AD-A252 374 By J. E. Manley S. P. Trieber May 1992 Prepared for Director, Intelligence Data Handling System Program Office Electronic Systems Division Air Force Systems Command United States Air Force DTIC_ ELECTE S JUN 3 01992 A"U 92-17050 * . .j 0Project No. 558B Prepared by The MITRE Corporation Approved for public release; Bedford, Massachusetts distribution unlimited. Contract No. F19628-89-C-0001

Upload: lamngoc

Post on 20-Jul-2019

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

ESD-TR-92-051 MTR- 11282

Ethernet Bandwidth Utilization of Datafull, Dataless,and Diskless Node Workstations and X-Terminals

AD-A252 374 By

J. E. ManleyS. P. Trieber

May 1992

Prepared for

Director, Intelligence Data HandlingSystem Program Office

Electronic Systems DivisionAir Force Systems Command

United States Air Force

DTIC_ELECTE S

JUN 3 01992

A"U

92-17050

* ..j 0Project No. 558B

Prepared by

The MITRE Corporation

Approved for public release; Bedford, Massachusettsdistribution unlimited. Contract No. F19628-89-C-0001

Page 2: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

When U.S. Government drawings, specificationsor other data are used for any purpose otherthan a definitely related government procure-ment operation, the government thereby incursno responsibility nor any obligation whatsoever;and the fact that the government may have for-mulated, furnished, or in any way supplied thesaid drawings, specifications, or other data isnot to be regarded by implication or otherwiseas in any manner licensing the holder or anyother person or conveying any rights or permis-sion to manufacture, use, or sell any patentedinvention that may in any way be relatedthereto.

Do not return this copy. Retain or destroy.

REVIEW AND APPROVAL

This technical report has been reviewed and is approved for publication.

DEBRA J. NICELY, MAJ, USAFDirector, IDHS Architecture Division

FOR THE COMMANDER

MIKE PROWSE, LTC, USAFDirector, Intelligence Data HandlingSystem Program Office

Page 3: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Form Approv#ed

REPORT DOCUMENTATION PAGE MB No7ppov

Public reoorrn. burden tor this collection of nformation is estimated to averaqe i hour oer response, including the time tor reviewing instructions. searr,'o e.-stra oata sources,gathering and rmalntainIng the data needed, and completing and reviewing ttre collection of information Send comments regarding this burden estimate or an :ther aswect ot thiscollection Ot information. ,nciuding suggestions for reducing this ourden to Washington Headouarters Services. Directorate for information Opcerations and Reports. 125 JeffersonDaws Hiqghwav. Suite 1204 Arlington. /A 22202-4302. and to the Office of Management and Budget, Paperworx Reducton Project (0704-0?88). Washngton, DC 20503

1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED

I May 1992 Final4. TITLE AND SUBTITLE 5. FUNDING NUMBERS

Ethernet Bandwidth Utilization of Datafull. Dataless, andDiskless Node Workstations and X-Terminals F19628-89-C-0001

558B6. AUTHOR(S)

Manley, James E.Trieber, Steven P.

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION

The MITRE Corporation REPORT NUMBER

202 Burlington Road MTR-11282Bedford MA, 01730

9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING

Director, Intelligence Data Handling System Program AGENCY REPORT NUMBER

OfficeElectronic Systems Division, AFSC (ESD/IC) ESD-TR-92-051Hanscom AFB, MA 01731-5000

11. SUPPLEMENTARY NOTES

12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE

Approved for public release; distribution unlimited.

13. ABSTRACT (Maximum 200 words)

As users of "open system technologies" migrate towards use of the Network FileSystem (NFS), the X-Window System, and workstations configured as datafull, data-less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report examines the Ethernet bandwidth utilizationof three applications, all X-Windows based, in four different workstation/terminalconfigurations. Information is provided to facilitate replication of the datacollection techniques for individual sites and network/application configurations.Several conclusions and recommendations are drawn which may be of interest tosystem designers considering network capacity planning.

14. SUBJECT TERMS 15. NUMBER OF PAGESCapacity Planning Performance Measurement 119Network Performance X Protocol 16. PRICE CODENFS

17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACTOF REPORT OF THIS PAGE OF ABSTRACTUnclassified Unclassified Unclassified SAR

NSN 7540-01-280-5500 Standard Form 298 (Rev 2-89)PrescrIbed bV ANSI Std 139.18298- 02

Page 4: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

EXECUTIVE SUMMARY

As users of "open system technologies" migrate towards use of the Network File System(NFS), the X-Window System, and workstations configured as datafull, dataless, and disklessnodes, as well as X-Terminals, many questions arise as to network capacity planning. Thisdocument examines each of the technologies mentioned above, as well as paging andswapping, all of which have a direct bearing on network bandwidth utilization. In addition,this report provides information which can be used by a system designer/planner to replicatethe tests performed in our study, using his or her specific workstation configurations andapplications.

Based on the results obtained in this study, several conclusions were drawn. These included:

That application execution traffic rather than application startup traffic be used asthe basis of network bandwidth capacity planning;

* That rough estimates of bandwidth consumption, and maximum number ofsupportable workstations can be estimated, for specific workstation configurationsand applications;

" That the X-Protocol is extremely bandwidth intensive and that wholesale use ofexported X displays should be carefully considered prior to adoption in any systemarchitecture.

In addition, several recommendations were made which included:

* That the use of diskless node workstations be avoided;

• That use of NFS File Servers be encouraged;

* That use of dataless nodes offer a slight advantage over use of datafull nodes;

• That use of X-Terminals should be used cautiously;

* That network traffic behavior be used as additional application selection criteria;

That the basic techniques described in this report be built upon and refined toproduce more useful and accurate predictive results.

AccL;O,1 For 1

NTIS (RAt

DTIC 1A

JusIhf:catioq

By 1

Di~t i 4t 0:

-- 40, ., ' ,, .,. ,

I~-Th

Page 5: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

ACKNOWLEDGMENTS

This document has been prepared by The MITRE Coporation under Project Number 558B,Contract Number F19628-89-C-0001. The contract is sponsored by the Electronic SystemsDivision, Air Force Systems Command, United States Air Force, Hanscom Air Force Base,Massachusetts 01731-5000.

We would like to extend our thanks to Frank Robey in assisting us with the analysis of ourbase data, to the staff and management of G 113 for use of their Sniffer, to Rajiv Kohli andMark Workman for their review of this document, to the secretarial staff of G 115 for theirassistance in producing this document, and to Denise and Leslie for their understandingduring the creation of this document.

iv

Page 6: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

TABLE OF CONTENTS

SECTION PAGE

1 Introduction 1-1

1.1 Purpose and Objectives of this Document 1-11.2 Organization of This Document 1-3

2 Base Technology Description 2-1

2.1 The X-Window System 2-12.2 The Network File System 2-32.3 Paging 2-62.4 Swapping 2-8

3 Experimental Method 3-1

3.1 Testbed Hardware 3-13.1.1 NFS File Server 3-13.1.2 Datafull Workstation 3-13.1.3 Dataless Workstation 3-13.1.4 Diskless Workstation 3-33.1.5 X-Terminal 3-3

3.2 Testbed Software 3-33.2.1 Motif Window Manager 3-33.2.2 Office Automation Package 3-33.2.3 Imaging Package 3-33.2.4 Mapping Package 3-3

3.3 Testbed Analysis Software 3-43.3.1 Primary Data Analysis Tool 3-43.3.2 Secondary Data Analysis Tools 3-6

3.4 Test Procedure 3-83.4.1 Office Automation Package 3-83.4.2 Mapping Package 3-83.4.3 Imaging Package 3-8

3.5 Collection and Analysis Methodology 3-8

4 Data Anslysis 4-1

4.1 Consolidated Application Data Tables 4-1

V

Page 7: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

4.2 Frame Count Analysis 4-54.3 Total Byte Analysis 4-64.4 Total Delta Time Analysis 4-64.5 Bandwidth Utilization Analysis 4-6

5 Concludsions 5-1

5.1 Conclusion 1: Basis for Capacity Planning 5-15.2 Conclusion 2: Estimating Optimal Network Configurations 5-15.3 Conclusion 3: Use of "X-Terminals" 5-1

6 Recommendations 6-1

6.1 Recommendation 1: Use of Diskless Node Workstations 6-16.2 Recommendation 2: Use of NFS File Servers 6-16.3 Recommendation 3: Use of Dataless Node Workstations 6-16.4 Recommendation 4: Use of "X-Terminals" 6-16.5 Recommendation 5: Use of Network Behavior as an

Application Selection Criteria 6-26.6 Recommendation 6: Enhancements to Network Loading

Modelling Techniques 6-2

A Application Session Description/Data Collection Procedure A-1

B Testbed System Configurations B-1

C Postprocessing Scripts C-1

D Postprocessing Scripts D-1

vi

Page 8: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

LIST OF FIGURES

FIGURE PAGE

1-1 A Notional IDHS LAN Architecture 1-2

2-1 The X-Window System 2-2

2-2 The X-Windows Protocol Stack 2-3

2-3 The Network File System 2-5

2-4 A get attributes (Oxl) Request Between a Client (system B) and aNFS File Server 2-6

2-5 Local Swapping and Paging 2-7

2-6 Swapping and Paging via NFS 2-9

3-1 Notional Testbed 3-2

3-2 Result Totals After Running Sniffer Data Through Scripts 3-10

4-1 Consolidated Slate Data 4-2

4-2 Consolidated Oilstock Data 4-3

4-3 Consolidated Paragon Data 4-4

4-4 Frame Count Analysis Data 4-5

4-5 Application Startup Sequence 4-7

5-1 Estimate of Maximum Systems in a Homogeneous Application/System Environment 5-2

vii

Page 9: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 1

INTRODUCTION

The Intelligence Data Handling Systems(IDHS) community, Department of DefenseIntelligence Information Systems (DODIIS) community, and the commercial-off-the-shelf(COTS) vendor community are all currently in the midst of migrating to "open systemarchitectures." These architectures are based in large part on COTS workstation, Local AreaNetwork (LAN), UNIX Operating System, and X-Window User Interface technologies.

Movement to "open system architectures" is not without its growing pains. One problemarea facing system designers is that of workstation/network capacity planning;that is,determining how many user workstations can be effectively supported on a particularsubLAN in a responsive, yet cost-effective manner.

1.1 PURPOSE AND OBJECTIVES OF THIS DOCUMENT

The purpose of this document is to share with the community the results of a series ofexperiments designed to capture the network loading effects of using datafull, dataless, anddiskless workstations, as well as "X-Terminals." These results we believe will be useful insupporting capacity planning functions. We have detailed our methodology so that our"experiments" can be replicated in the field with actual IDHS and DODIIS applications.

The problem of capacity planning given the current suite of workstation technologiesavailable to system planners and designers is shown in figure 1-1, "A Notional IDHS LANArchitecture." In this diagram, subLAN_l depicts the architecture of a Network File System(NFS) File Server and a suite of client workstations it supports. NFS provides a networktransparent file system capability which allows files shared by multiple users (clientworkstations) to be centrally located. NFS however is not without its costs, in that itgenerates network traffic while providing its services. The specific capacity planningproblem facing designers is to determine the optimum number, "n," where "n" is the totalnumber of workstations capable of being serviced on the subLAN without inundating thesubLAN with NFS traffic. The problem is further complicated by shrinking Department ofDefense (DOD) budgets, which do not permit system designers to simply segment their LANinto many subLANs, and replicate the NFS Servers on each subLAN. Similar capacityplanning issues are faced on subLAN_2, which is X-Window Application Server based, andsubLAN_3, which is a hybrid environment.

The goal of this study and paper was to begin the process of understanding the specificeffects of these workstation technologies, in order to support the capacity planning needs ofthe community, as well as address current operational needs of the community.

1-1

Page 10: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

CL

cj

e44

zz

00

z 0

40)

1-2z

Page 11: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

1.2 ORGANIZATION OF THIS DOCUMENT

Section 1, Introduction, provides a high-level description of the workstation/network capacityplanning problems the IDHS and DODIIS communities are currently facing and states thegoals this document hopes to achieve.

Section 2, Base Technology Description, discusses the base technologies involved witheffort. These include NFS, X-Windows, datafull, dataless, and diskless workstations, and X-Terminals. Discussion of "paging and swapping" and how these two activities affect networkperformance are also included.

Section 3, Experimental Method, describes the specific testbed constructed for this effort andthe methods used to simulate IDHS environments and capture the resulting network data.

Section 4, Data Analysis, presents the pertinent results of our experiments and describes ouranalysis techniques, and resulting observations.

Section 5, Conclusions, presents several conclusions resulting from our analysis, andillustrates how the data collected can be applied to the capacity planning problem.

Section 6, Recommendations, makes several specific recommendations to the IDHScommunity, based on the results of our efforts, and describes how this effort can serve as thebasis for more refined modeling, and analysis techniques.

Appendix A describes the specific sequence of operations used to generate and collect datafor each application tested, in each of the configurations.

Appendix B contains descriptions of the testbed configurations, and includes both key filesand file system sizes.

Appendix C contains listings of the scripts and programs used to process and generate thedata contained in appendix D.

Appendix D contains postprocessed data collected and generated by the Network GeneralSniffer LAN analyzer and vmstat, and nfsstat.

1-3

Page 12: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 2

BASE TECHNOLOGY DESCRIPTION

This study dealt with a number of related technologies, including the X-Window System, theNetwork File System(NFS), Datafull Node Workstations, Dataless Node Workstations,Diskless Node Workstations, and X-Terminals. In addition, an examination of operatingsystem paging and swapping was required in order to understand the nature of the networktraffic generated. This section provides a brief explanation of each of the technologiesdescribed above.

2.1 THE X-WINDOW SYSTEM

The X-Window System, developed at the Massachusetts Institute of Technology (MIT), is anindustry standard for device-independent, graphical user interfaces for applications in aheterogeneous environment. It is a network-based, event-driven windowing system thatconforms to the client-server model.

The client is the actual application which is displayed on the X-server such as the windowmanager or a map graphics package. Client applications make requests to the X-server suchas getting window attributes or displaying text or graphics in a window. The X-servercommunicates with the clients by sending events to the client applications, such as an exposeevent if the application is exposed from being covered by another window. The X-server isresponsible for all input and output devices including the display, mouse, and keyboard and itmanipulates windows created by clients through the use of text, fonts, and graphics.

The interaction of requests and events can occur with the application executing locally andbeing displayed and manipulated locally as shown by System A in figure 2-1, "The X-Window System." The true benefit of the X-Window System is its ability to extend to thenetwork model where the interaction between the client application and X-server occurs viathe network. For example, the client application may execute on System A, but its display isexported to System B, allowing a user to access and manipulate the application as if it wereexecuting locally.

The X-Windows protocol consists of the Xt Intrinsics, the X-Library, and the X-Toolkitwhich contains the widget set. As shown in figure 2-2, the client application is displayed ona remote X-Server by being sent on the network and traversing the X-Protocol stack to the X-Server on the remote host where the device drivers and independent device architecture takesover.

2-1

Page 13: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C-CA

2-2-

Page 14: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Application Keyboard Mouse Screen I

Xt Widget Set Device Drivers

Xlib Library X Server J[Network Protocols [[Network Protocols

f Ethernet

Figure 2-2. The X-Windows Protocol Stack

2.2 THE NETWORK FILE SYSTEM

The Network File System (NFS) is a network-based, stateless file system protocol that allowsclient workstations transparent, remote access to shared file systems. The main benefit ofthis type of configuration is that it allows applications to be centrally located on a file serverand shared by many different client workstations. The configuration consists of an NFS fileserver which exports file systems or directories in the file system directory hierarchy to oneor more clients using the /etc/exports file. The clients then mount the exported file systemsto local mount points within the local directory structure. All manipulation to or from theremote file system occurs through a set of requests and replies handled by the NFS protocol.A client's file access request is translated to an NFS request which is sent over the network tothe file server. The file server receives the request, processes the file system operation, andsends a response back to the client over the network. Each type of request is shown in table2-1 with its hexadecimal equivalent which is stored in the network packet header.

Table 2-1. NFS Request Identification Numbers

Type of Request Hexadecimal ID

NULL 0Get Attributes 1Set Attributes 2Root 3Lookup 4Read Link 5Read 6

2-3

Page 15: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Table 2-1. NFS Request Identification Numbers (Concluded)

Type of Request Hexadecimal ID

Write Cache 7Write 8Create 9Remove ARename BLink CSymbolic Link DMake Director ERemove Directory FRead Director 10File System Status 11N Procedure 12

The NFS protocol is platform independent; i.e., the protocol is not based on any oneparticular operating system, machine, network, or transport protocol. NFS transactions occurthrough Remote Procedure Calls (RPC) built on top of the eXternal Data Representation(XDR). The RPC allows for a procedure-oriented interface to remote program services. NFSis one of the programs which is accessed by providing a host address, program number,version number, and procedure number. The XDR standard provides a common machineindependent means of representing a set of data types over a network. In our experiments the8192 byte blocked data is passed on the network within the User Datagram Protocol (UDP)layered above the 802.3 TCP/IP packet header.

Figure 2-3, "The Network File System," shows an example setup of a network using NFS. Itconsists of three systems; an application file server (system A), a database file server (systemC), and a workstation NFS client (system B). When a client workstation makes an NFSrequest, a network packet is sent from the client to the file server and a reply is received bythe client from the file server. A typical NFS request and each of the steps involved is shownin figure 2-4, including the network protocol packet headers. Note that only the file handleand the RPC procedure call number had to be sent from the client.

In frame I the client sends a request to the file server asking for the file attributes of stated 32byte file handle, as shown. In response to the request from the client, the file serverprocesses the request, gathers the file system information and sends a reply back to the client.The reply contains information for the file attributes such as its type, mode, number of links,user ID, group ID, size, block size, number of blocks in the file, the file system ID, the lastaccess time, modifications time, and node change time.

2-4

Page 16: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

EE

IZ

7ii

w 02

rzz

2-5

Page 17: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

- Fram e I -----------------

CLIENT NFS: --- SUN NFS ---

CLIENT NFS:CLIENT NFS: Proc = 1 (Get file attributes)CLIENT NFS: File handle = 0000070600000001000A000000008E23CLIENT NFS: 61D1B9ECOOOAOOOO000000021EEIA2FFCLIENT NFS:CLIENT NFS: [Normal end of "SUN NFS".]

------ Frame 2 -----------------

SERVER NFS: ---- SUN NFS ----SERVER NFS:SERVER NFS: Proc = 1 (Get file attributes)SERVER NFS: Status = 0 (OK)SERVER NFS: File type = I (Regular file)SERVER NFS: Mode = 0100755SERVER NFS: Type = Regular fileSERVER NFS: Owner's permissions = rwxSERVER NFS: Group's permissions = r-xSERVER NFS: Others' permissions = r-xSERVER NFS: Link count = 1, UID = 0, GID = 10SERVER NFS: File size = 516096, Block size = 8192, No. of blocks = 1024SERVER NFS: File system id = 1798, File id = 36387SERVER NFS: Access time = 9-Aug-91 13:58:30.056788 GMTSERVER NFS: Modification time 11-Oct-90 23:09:07.000000 GMTSERVER NFS: Inode change time = 20-Jun-91 19:18:20.024464 GMTSERVER NFS:SERVER NFS: [Normal end of "SUN NFS".]

Figure 2-4. A get attributes (OxI) Request Between a Client (system B) and a NFS FileServer

2.3 PAGING

The virtual memory system is a technique which allows the execution of processes that maynot reside completely in memory. The main advantage of this schema is that user programscan be larger than physical memory therefore allowing the degree of multiprogramming toincrease because more user programs may execute. It is based on transferring portions of aprogram image called pages in and out of memory. Local paging is managed by the "pagingschedule" and occurs between the binary, which is resident on the disk, and memory, and theswap device, as needed, during program execution. The 4.3 Berkley Software Distribution(BSD) UNIX system pages based on what is known as "Fill-on-Demand Klustering."When a portion of a program is not found in memory, an internal page fault occurs. A simplescenario of handling a page fault and subsequent page-in is described below and shcwn infigure 2-5, "Local Swapping and Paging."

2-6

Page 18: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Bus [ Bus

[--1Application1

Application 2

Operating Application Swap Application 3System File System Device

Application n

System Memory

Figure 2-5. Local Swapping and Paging

* A check is made in the CPU of whether the reference was a valid or invalid memoryaccess.

* If it was a valid reference, the scheduler fetches the page from the file system or the

swap device.

* The page is written to a free frame in physical system memory.

" The page table is reset with the new reference.

• The instruction is restarted.

When user demand requires more memory than is available, page replacement occurs whichinvolves a page-out and then a page-in. The steps in the page replacement process for asimple scenario is described below:

• The desired page to page in is found on the swap device or on the file system.

* If there exists a free frame use it.

* If not, a victim page is selected to be swapped out to the swap device or freed by thescheduler if the page was not accessed within a specified time interval.

• The page table reference is updated to no longer contain the victim page.

* If the page resided on the swap device it is reclaimed.

2-7

Page 19: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

• The new page is written to the selected free frame in physical memory.

* The page table is reset with the new reference.

• The instruction is restarted.

The concept of paging can be extended to the network model as shown in figure 2-6,"Swapping and Paging via NFS", for each of the platforms except the X-terminal. Page-insoccur via the NFS network protocol for each of the user applications on each workstation.Page-outs occur locally to the swap device on the datafull and dataless workstations andremotely via the network on the diskless workstation. This type of network traffic increasesthe network load and increases the amount of network bandwidth utilization.

The 4.3 BSD paging procedure is based on a Least Recently Used (LRU) clock algorithm.Swap space is pre-allocated for the entire address space of a process at load time. When apage fault occurs, a cluster, which is equivalent to one logical page or multiple physicalpages, is pre-paged into memory. The system page table is statically allocated. Pages arefilled on demand by reclaiming the logical page from the free list or allocating a new page ofmemory for the fetched page. If free memory exists, pageinO allocates the number of pageclusters the process requires, oiherwise the process sleeps on the global variablefreememuntil more memory is available, then restarts the operation.

2.4 SWAPPING

The swap process completely removes a process from main memory, including the processpage tables, the pages of the data and stack segments that are not already in swap space, theuser structure, and the text segment. Swapping is similar in nature to paging in that pagingreads in and writes out pages and swapping reads in and writes out the entire process.

The 4.3 BSD swapping procedure will swap a process in/out based on three conditions:

• If paging cannot free memory fast enough to satisfy demand,• If the system page map becomes fragmented,• If the process is inactive for more than 20 seconds.

A swap-out is based on the length of time the process has been asleep in memory and the sizeof the process. A swap-in is based on the length of time the process has been swapped out,the size of the process when it was swapped out, its nice value, and the amount of time theprocess was asleep since it last ran.

The swap-out procedure is as follows (reference figure 2-5);

* Map the user structure of the process into the kernel virtual memory.• Allocate swap space for the user structure and page tables.

2-8

Page 20: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

zz

CLu

-

2-9

Page 21: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

* Release the text portion of the image.* Forcibly page out all resident pages in the data and stack sections of the process.• Write out the page tables to the swap space.* Write out the user structure and kernel stack to the swap space.• Release the user structure.* Free the page tables.

The swap-in procedure is as follows (reference figure 2-5):

* Any shared text for the process is locked against change.

* Resources are allocated for the page tables.

* Memory is allocated for the user structure and it is read back from the swap space.

* The page tables are read into memory.

" Swap space for the user structure and page tables is freed.

The text area is attached with the text page tables being swapped in if necessary fora multiuser application.

* The process is returned to the run queue if it is runnable.

In our experiments, the dataless and datafull workstations took advantage of the localswapping scheme and the X-terminal was not affected by it. We could extend the idea oflocal swapping to the network model using the diskless workstation. Here the schedulerexecutes locally but the swap space resides remotely on a NFS file server as shown in figure2.6. Every swap-in and swap-out must occur via NFS to a dedicated swap file on the server.The network traffic generated by this swapping activity increased the network load, reducedthe performance of the network, and slowed the response time of an application and userrequests.

2-10

Page 22: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 3

EXPERIMENTAL METHOD

This section discusses the testbed used in the network loading study, the manner in which thenetwork traffic was geneiated using representitive IDHS applications, and the tools andmethods used to collect the network traffic previously described.

3.1 TESTBED HARDWARE

Figure 3-1 shows the notional testbed configuration which was used in the experiments. TheSPARCstation I+ contained 16 MB of physical RAM and a 1.2 GB Seagate disk. Thediskless, dataless, and datafull workstation was one in the same. It was reconfigured to act asthe required type of workstation for each of the tests. The NFS file server and the XApplications server was one in the same and allowed both the X-Windows client applicationsto reside with the three test applications.

3.1.1 NFS File Server

The NFS file server was configured to use the nonsecure trivial file transfer protocol (tftp)server for booting purposes. The file server contained the kernel and the root partition for thediskless client which resided under the /export partition. It also contained a 50 MB specialfile which resided under the /export/swap partition for dedicated swap space usage by thediskless client. The NFS file server also contained the test user account which was mountedto each of the clients. A listing of the /etc/fstab and /etc/exports files are shown inappendices B. I and B.2 respectivly.

3.1.2 Datafull Workstation

The datafull workstation had the partitions, shown in appendix B.3., and is considered to be afully operational system which does not rely on any file servers for minimal use. Theapplications are mounted from the NFS file server to the /homel partition. A listing of the/etc/fstab file and disk capacities are shown in appendices B.3 and B.6 respectively.

3.1.3 Dataless Workstation

The dataless workstation was configured to use one 8 MB partition on the 1.2 GB disk. Thispartition contained the root (/) partition and the kernel. A 50 MB swap partition was placedon the same disk. This type of configuration allows all swapping between the disk cache andmemory to occur locally without network intervention. Paging of applications into memorystill occurs via the network. The /usr partition is mounted from the the NFS file server andcan be shared among many clients. This increases the load both on the network and on theNFS file server whenever system utilities are accessed. A listing of the /etc/fstab file anddisk capacities are shown in the appendices B.4 and B.7 respectively.

3-1

Page 23: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

4.N-

CAC

3-2-

Page 24: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

3.1.4 Diskless Workstation

The diskless workstation used in this analysis maintained all configuration aspects of thebaseline configuration excluding the 1.2 GB disk which was detached. All paging andswapping traffic occurred via the network and the NFS protocol. A listing of the /etc/fstabfiles are shown in the appendix B.5.

3.1.5 X-Terminal

The X-Terminal that was used in the experiment is a Tektronix 4210, which requires otherthan standard fonts to be downloaded from a font server. The NFS file server contained thespecial fonts needed for BBN Slate to function properly. The backing store was enabled andRGB downloading occurred at boot time. The X Display Manager was exported to the X-Terminal's display allowing login to the NFS file server. After logging, in applications arestarted in the normal fashion similar to the other types of workstations.

3.2 TESTBED SOFTWARE

3.2.1 Motif Window Manager

The Motif Window Manager(mwm), from Open Software Foundation (OSF) is a userinterface used to manage and manipulate multiple windows being displayed on one display.It is an X-Windows client application that executes like other X clients, but is used foropening, closing, moving, and resizing windows (clients). The Motif window manager wasselected to be used in this study for its ease of use and functional capabilities.

3.2.2 Office Automation Package

Bolt, Beranak, and Newman's Slate Office Automation Package was selected for its highlyfunctional capabilities of manipulating imagery, graphics, spreadsheets, audio, and text in atypical office environment. The ability to incorporate each of these functions into onepackage allows a user to have complete control over the work environment by having each ofthe main functions integrated into one package.

3.2.3 Imaging Package

Paragon Imaging represents a typical imagery package allowing the user to manipulate animage through the use of Zoom, Region of Interest Operations, (e.g., rotate, xray, scale,texture), Colormap Manipulation, Lut, and Overlay additions including text, circles,rectangles, lines, and polygons.

3.2.4 Mapping Package

Oilstock is a mapping package originally created by NSA and rewritten by MITRE toconform to the OSF Motif standards. This was accomplished by using the UIMX interactivedesign tool. This allowed the package to remain functionally equivalent to its predecessorbut also contain a look and feel that conforms to industry standards. It displays World

3-3

Page 25: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Database II vector maps that can be manipulated through the use of the menu bar functionssuch as File, Criteria, Tracking, Geographics Features, Map Features, Intel Features, MapDetail, Feature Detail, and Projection.

3.3 TESTBED ANALYSIS SOFTWARE

3.3.1 Primary Data Analysis Tool

The Network General Sniffer was the primary data collection and analysis tool, and is anethernet portable protocol analyzer, which offers protocol analysis, and real time networkperformance statistics. The Sniffer hardware is a Toshiba 80386 IBM PC clone with aspecial ethernet card to accept all packets being sent on the backbone. We selected theEthernet Network PA-302 Sniffer for a number of reasons. It is very portable andlightweight, provides real time analysis capability, analyzes both NFS and X-Windowprotocol suites (no other analyzer offers this feature), resides as a separate entity on thenetwork (i.e., the Sniffer does not place any load on the network because it is a data gatheringtool), and the operation and control of the unit was straightforward and simple. We evaluatedseveral other network protocol analyzers: the HP4900 series including the HP4972A, theLANalyzer, the SpiderAnalyzer P320, and the Vance ATS 1000. The PA-302 was the mostflexible and upward compatible for our needs.

The Sniffer generates statistical information in real time which can be reported in manyvariations. The following is a summary of what the analyzer can accomplish.

Reports/Displays:

• Cable faults.

• Source/destination station addresses in both internet and aliased format.

* Station pair counts of frames and kilobytes sent between nodes.

* Station counts of frames and kilobytes sent from each node.

* Real time bar graph of the number of frames/kilobytes on the Ethernet.

Percent of network utilization (this is a floating average of the percent of theEthernet bandwidth being utilized) within a 1-1000 ms window. It is a percentageof total network bandwidth (1,250 Kbytes/sec) from 0 to 100 percent.

* Traffic generator (will send specified data to specific/all nodes).

* Actual data in each layer of the protocol.

* The number of good frames.

* The number of bad CRC (Cyclic Redundancy Check) frames.

3-4

Page 26: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

• The number of fragmented frames.

• The number of bad alignment frames.

• The number of accepted frames.

• Pattern matching filters.

* Protocol address level filters (DLC, IP, etc.).

• Protocol suites (NFS, ATALK, etc.).

* Absolute time, delta time, relative time, network utilization, bytes, cumulativebytes.

• Hexadecimal view of the data.

" Capture termination when a search string or byte sequence (trigger) has beenidentified within a data packet.

Other Functions:

• Prints above displays and reports to a serial/parallel printer.* Saves setups and captured data to a file which can be rerun for later analysis.

Statistical Data:

• Using the above tools the following information can be reported:

- Percentage of Ethernet bandwidth utilized.

- Relative time of application execution..

- Percentage of NFS traffic including a breakdown of the type of traffic withrespect to function (e.g., file search, attribute request, file open,acknowledgement).

- Percentage of X-Window traffic including a breakdown of the type of trafficwith respect to graphics, pure data, resource management, and X events.

- Packets sent versus time graph.

- Number of packets sent versus the type of packet graph.

- Frequency calculations on data transmissions.

- Average file access size.

3-5

Page 27: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

- Average session duration.

- Mean waiting time from send to receive.

- Differentiate overhead from application data.

3.3.2 Secondary Data Analysis Tools

3.3.2.1 nfsstat

nfsstat is a UNIX-based utility which measures Network File System related statistics. Itdisplays information about the number of NFS calls received (calls) and rejected (badcalls),and the counts and percentages for the various calls that were made. The client NFS displayshows the number of calls sent and rejec.ted, as well as the number of times a CLIENT handlewas received (nclget), the number of times a call had to sleep while awaiting a handle(nclsleep), as well as a count of the various calls and their respective percentages. The serverdisplay shows the number oH NFS calls received (calls) and rejected (badcalls).

nfsstat also displays Remote Procedure Call (RPC) statistical information for the server andclient. The client display shows the total number of P"" calls received, total number of callsrejected, number of times no RPC packet was avwiiable when trying to receive, the number ofpackets that were too short, and the n-rnbyr of packets that had a malformed header. Theserver RPC display shows the total number of RPC calls sent, the total number of callsrejected by the server, the number of times a call had to be retransmitted, the number of timesa reply did not match the call, the number of times a ',-all timed out, the number of times acall had to wait on a busy CLIENT handle, and the number of times authenticationinformation had to be refreshed.

The following is an example of a nfsstat call on a workstation that has remote mounted and

exported file system.

%nfsstat

Server rpc:calls badcalls nullrecv badlen xdrcall55 0 0 0 0

Server nfs:calls badcalls55 0null getattr setattr root lookup readlink read0 0% 4480% 0 0% 0 0% 4 7% 0 0% 0 0%wrcache write create remove rename link symlink00% 1 1% 00% 0 0% 0 0% 0 0% 0 0%mkdir rmdir readdir fsstat0 0% 0 0% 610% 0 0%calls badcalls nullrecv badlen xdrcall

3-6

Page 28: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

0 0 0 0 0

Client rpc:calls badcalls retrans badxid timeout wait newcred timers335 0 0 0 0 0 0 0

Client nfs:calls badcalls nclget nclsleep335 0 335 0null getattr setattr root lookup readlink read0 0% 12838% 0 0% 0 0% 56 16% 0 0% 12035%wrcache write create remove rename link symlink0 0% 5 1% 10% 0 0% 0 0% 0 0% 0 0%mkdir rmdir readdir fsstat0 0% 0 0% 25 7% 0 0%

3.3.2.2 vmstat

vmstat is a UNIX-based utility which reports virtual memory statistics from the contents ofthe sum structure, giving the total number of several kinds of paging-related events whichhave occurred since boot. An example of the statistical data produced by a datafullworkstation by vmstat is shown below.

datafull% vmstat -s130 swap ins

0 swap outs100 pages swapped in108 pages swapped out

4513 total address trans. faults taken7 page ins0 page outs

11 pages paged in0 pages paged out0 sequential process pages freed

227 total reclaims (0% fast)227 reclaims from free list

0 intransit blocking page faults0 zero fill pages created

247 zero fill page faults0 executable fill pages created0 executable fill page faults0 swap text pages found in free list

227 inode text pages found in free list0 file fill pages created0 file fill page faults0 pages examined by the clock daemon0 revolutions of the clock hand0 pages freed by the clock daemon

3-7

Page 29: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

1473 cpu context switches20052 device interrupts

4751 traps8133 system calls6497 total name lookups (cache hits 70% per process) toolong 19

3.4 TEST PROCEDURE

The test procedure and data collection was divided into subparts for each of the four testbedconfigurations. This provided a more concise comparative analysis of data betweenplatforms. The subprocedures included: logging in, using the X Display Manager, xdm;starting the Motif window manager, mwm; manipulating each package's functionality, andlogging out.

The gateway to the MITRENET was disabled to isolate Ethernet segment and allow theSniffer to capture only those frames related to the test nodes.

The human interaction response time has been considered in the evaluation of time variancesin data being sent across the network. Each application's time delays were analyzed and a setof commands for each application was set up to reduce the amount of human interaction withthe application. These procedures are described below, and in appendix A.

3.4.1 Office Automation Package

A clear user environment was set up for the BBN Slate office automation package to createdefault configuration files and documents in the user's file system. Slate was then startedwith the "Welcome- 1.2.slt" document which contains a mixture of Slate capabilities. Adetailed description of the the steps taken to generate and collect data for this application iscontained in appendix A.1

3.4.2 Mapping Package

The Oilstock mapping package procedure is similar to the office automation packageprocedure and is described in appendix B.2.

3.4.3 Imaging Package

The Paragon imaging package procedure is similar to the office automation packageprocedure and is described in appendix B.3

3.5 COLLECTION AND ANALYSIS METHODOLOGY

The Sniffer had limited disk space and memory and as such it was necessary to subdivide thetests into smaller tests. After applying sample runs to the Ethernet and Sniffer, breakoffpoints were found where the Sniffer capturing could be stopped and the data saved becauseno data was being sent across the network between client and server. After each of the data

3-8

Page 30: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

segments was collected and saved to the Sniffer hard disk (e.g., TEST1A-TEST1F for Slate),they were trasnsferred to a UNIX platform so the results could be analyzed automaticallyusing Bourne shell scripts as shown in appendix C.

The Sniffer saves its data in a compressed format to minimize disk space requirements.Unfortunately, the data can not be read by any other applications. In order to transfer thedata to the UNIX platform, the data had to be printed out, frame by frame, to a file in anASCII delimited format using the Sniffer print capability. The frames that were selected tobe printed contained the following attributes set for display: Delta time, relative time, size inbytes, network utilization within a 100 ms braketing window, destination, source, protocol,and summary information.

The data was then backed up to 3.5-inch floppy disk using the DOS backup command andrestored on the UNIX platform through a DOS emulator which had access to the UNIX filesystem.

On the UNIX platform, the Bourne shell script "go" was run, and all data was analyszed andtotalled into summary sheets, figure 3-2.

The data final results were then moved from the UNIX platform to a Macintosh and importedinto Microsoft Excel for further analysis.

3-9

Page 31: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Frame count: 454

Total Delta Time: 288.899Mean Delta Time: 0.637746

Total Bytes: 419740Mean Bytes: 924.537

Total NW Utilization Sniffer MB/Sec (%): 7875.9Mean NW Utilization Sniffer MB/Sec (%): 17.3478

Mean NW Utilization Actual Bytes/Sec (%): 1452.9

NFS Procedure Totals

Null: 0Get Attributes: 69Set Attributes: 0Root: 0Lookup: 51Read Link: 0Read: 36Write Cache: 0Write: 45Create: 9Remove: 6Rename: 0Link: 0Symbolic Link: 0Make Dir: 0Remove Dir: 0Read Dir: 3Stata File Sys: 0N Proc: 0

UDP Continuation: 228

Figure 3-2. Result Totals After Running Sniffer Data Through Scripts

3-10

Page 32: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 4

DATA ANALYSIS

While the data collection approach of this set of experiments included the use of nfsstat andvmstat as described in section 3, data analysis was focused on the network traffic datacollected by the Network General Sniffer. Furthermore, the analysis described in this sectionwas focused on the "D" and "E" portions of each data collection run as described in section 3.Note that the "D" portion of the data collection run pertains to network performanceassociated with starting an application, while the "E" portion of the data collection runpertains to network performance associated with using an application. Appendix D containsfull listings of the results of data collection runs lA-F, 2A-F, and 3A-F, where 1, 2, and 3refer to Slate, Oilstock, and Paragon respectively.

4.1 CONSOLIDATED APPLICATION DATA TABLES

Figures 4-1, 4-2, and 4-3 contain consolidated data, collected by the Network GeneralSniffer, for the Slate, Oilstock, and Paragon applications respectively, in each of the systemconfigurations tested. An explanation of the data fields used in these figures is given below.

The consolidated application data tables contain a variety of useful data for each of thesystem configurations. As previously described, this data was obtained using the NetworkGeneral Sniffer.

A frame is a unit of information transferred over the Ethernet. The first item listed in theapplication data tables is "Frame count." "Frame count" is equal to the total number offrames required to complete the sequence of user operations detailed in section 3 of thisdocument.

"Total Delta Time" represents the summation of the time intervals between each frametransmission. "Mean Delta Time" represents the average time between frame transmissions.

"Total Bytes" is the total amount of information transferred over the Ethernet, expressed inbyte units. "Mean Bytes" is the average number of bytes contained in one frame.

"Mean NW Utilization Actual Bytes/Sec" is equal to "Total Bytes"/"Total Delta Time" whichrepresents the average network load generated by the particular application and systemconfiguration, and is expressed in units of bytes/sec. A more meaningful expression fordetermining network bandwidth utilization is "Mean NW Utilization Actual Mbits/sec"which is equal to ["Mean NW Utilization Actual Mbits/sec" * 81/1,000,000. This expressionis more meaningful as it is expressed in the same units, Mbits/sec, that Ethernet's bandwidthis commonly expressed in. "Percent Utilization of Effective Bandwidth" is equal to "MeanNW Utilization Actual Mbits/Sec"/(5 Mb/s). 5 Mb/s is used as the effective workingbandwidth of Ethernet, rather than

4-1

Page 33: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

In- (C' 00 00e00 eq ON 000 en M ~ enr- I

S. ~ * r-- q r- q e %n --

00 V0

0-0

0 eq **00 000

0- 00 00 0000 , a e

0 I l 5 e 4 C 50 0 ( ' 4 I fCu It~ en 00 00 t-C

in -0 in0 5 q 0eq 0

olS00~ k

0%~ W)e e % 94i 00I ) c00 tn0 ~ -0 '

00 enn

co

j~ .42

100

Cuu

* .4-2

Page 34: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

~ ~ 00 r-e~o

00~ \0 C4 C5 n 00 %0T -: r- C

00~~r 00% 0 0f

C5u

0\0 0 00C00 C0

0 e4~ r-0 000 tr 00~ qN 00 0 W f00 \

, I"

00 wsri J\ 00 , i mr0 04 C5 r %0

Cu ~-0 ~ 0%e~-.40 00i Q\ 0 rwu w cn 00 C

00 r4

12 ~ ~ * *nc

wlW

C L TA.

00 o 00

4-3

Page 35: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

%0 V 00

0q00 09 It0

V)~00 0% eO

W" \0 00 w 00 Oor 0

el0 - ) -- - '.

tn , w. 0\. e4()

00 tf)000q 04 t, cn0%% 00

0 -~ ~- .c . ~en 0 '0~ ~ .00 ci0

00IJ en - - - 000 0 -

Ci 00

00 C' 00 r-

C40

~E

000 00

0 -- -

E. Lq

4-4

Page 36: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

the theoretical 10 Mb/s bandwidth. It has been observed that when Ethernet bandwidthutilization exceeds approximately 5 Mb/s, frame collision rates increase to the point wheremore frames are retransmitted than get through to their destination on the first try.

4.2 FRAME COUNT ANALYSIS

An analysis of frame counts generated by each application in each of its respective systemconfigurations was conducted to determine if the collected data tracked with expectedbehavior.

The expected behavior of the datafull node configuration was that "Frame count" would bedirectly proportional to paging activity resulting from application startup and execution. Theexpected behavior of the dataless node configuration was that its total "Frame count" wouldbe equal to that of the datafull node configuration and any additional paging generated byaccesses to the /user file system. Finally, the expected behavior of the diskless nodeconfiguration was that its total "Frame count" would be equal to or greater than that of thedataless node configuration, based on swap activity.

The expected behavior witnessed in all the three applications confirmed our assumptions thata datafull node configuration would generate the least network activity, a diskless nodeconfiguration would generate the most network activity, and a dataless node configurationgenerate activity between the two. Figure 4-4 illustrates the percentage relationships betweenframe counts for each of the application/configuration sets. The data was generated asfollows:

[(Configuration2 - Configuration 1) / Configuration I] * 100;

where Configuration2:Configuration I is as indicated in figure 4-4.

Dataless:Dataful Diskless:Datafull Diskless:Dataless

Slate Test ID 3.65 7.03 3.26Test 1E 10.37 122.25 101.37

Oilstock Test 2D 9.3 9.3 0Test 2E 0 28.76 28.03

Paragon Test 3D 7.1 9.09 1.86Test 3E 11.93 46.08 30.51

NOTE: Each number represents the percentage increase in frames of the first systemconfiguration as compared to the second.

Figure 4-4. Frame Count Analysis Data

4-5

Page 37: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

From figure 4-4, we again see that the expected behavior was observed for eachconfiguration. In addition, we see that a dramatic increase in frame count occurs when wemove from datafull and dataless configurations to a diskless node configuration.

4.3 TOTAL BYTE ANALYSIS

The expected behavior of the "Total Bytes" count was identical to that of Total "Framecount." As with the "Frame count" behavior, "Total Byte" counts for each of theconfigurations tracked with expected behavior, as can be seen in figures 4-1to 4-3.

4.4 TOTAL DELTA TIME ANALYSIS

In addition to representing the summation of time intervals between each frame transmission,it was empirically determined that a direct relationship exists between "Total Delta Time"and perceived user performance. Thus, we see from figures 4-1, 4-3, that perceived userperformance was roughly comparable for datafull, dataless, and diskless workstationconfigurations. Also, we see from the same figures that the perceived user performance forthe X-Terminal tested was three to five times slower than the various workstationconfigurations. We attribute this to the fact that the X-Terminal used in this study was a"first-generation" de,: -e and as such, suffered from performance limitations. Empirically,we have seen more cnr.iparable user perceived performance on newer "second-generation"X-Terminals an(. Y Servers. Unfortunately, our schedule did not permit replication of ourtests on alternate "X-Terminal devices."

Another behavior pattern observed was that in two of the three applications we tested,datafull workstations had a slightly lower "Total Delta Time" than dataless workstations. Weattribute this to the fact that in the datafull configuration, applications do not have to page-invia NFS, rom the /usr file system, located on the NFS File Server.

4.5 BANDWIDTH UTILIZATION ANALYSIS

Analysis of the bandwidth utilization data revealed two major behaviors which will be ofparticular interest to the IDHS community and "distributed workstation," users, in general.

The first behavior pattern observed was that considerable bandwidth was consumed bydatafull, dataless, and diskless workstation configurations when applications are first started.Bandwidth usage ranged from 25-34 percent. Fortunately, these high usage rates were shortlived, ranging from 7-17 seconds, depending on the particular application and workstationconfiguration. Inspection of data from secondary sources, nfsstat and vmstat, confirmed ourexpectation that these high initial usage rates were due to the paging activity associated withloading an application into physical memory.

The bandwidth consumption rates described above contrasted sharply with those observed forapplications executing on the X-Terminal. Application startups consumed bandwidthranging from only 2.4-5.1 percent. Inspection of the raw Sniffer data and secondary nfsstat

4-6

Page 38: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

and vmstat data again confirmed our expectation that we were witnessing only the "end-result" of the application startup; that is, the user display, and that intense paging activity wasin fact occurring on the "X Application Server." These concepts are illustrated in figure 4-5,"Application Startup Sequence."

____- ____Prime Source of Application "IStartup Bandwidth Utilization

Generation Processing Generationof of X Calls of Display

Figure 4-5. Application Startup Sequence

The second behavior pattern observed was that execution bandwidth was roughly comparablefor particular applications executing on datafull and dataless workstations, but increased byfactors of 25-100 percent for diskless node workstations. In addition, we observed thatbandwidth consumption for exported X-Window applications (X-Terminal data), rangedfrom two to five times greater than that for datafull or dataless node operation.

We attribute the poor bandwidth behavior of the X-Terminal to the nature of the X-Protocolrather than to our specific X-Terminal. In general, we observed that X-Protocol behavior ischaracterized by significantly greater number of frames (10-45 times greater depending onthe specific application), where the mean size ("Mean Bytes") of each frame is roughly 1/5-1/2 the size of datafull/dataless/diskless node configurations.

4-7

Page 39: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 5

CONCLUSIONS

We believe we were successful in meeting the overall goals of this research effort, whichwere to determine the characteristic behaviors of NFS and X-Protocol in a variety ofworkstation configurations; and to devise a basis for distributed computing capacity planningfor IDHS programs. Detailed conclusions are cited below.

5.1 CONCLUSION 1: BASIS FOR CAPACITY PLANNING

Based on the significant differences observed in bandwidth utilization of datafull, dataless,diskless, and X-Terminals in application startup as opposed to application execution, webelieve that bandwidth utilization figures associated with application execution be used asthe primary basis for capacity planning.

Although application startup places a short, but severe strain on available networkbandwidth, we believe that .most operational sites are characterized by a somewhat"staggered" user startup schedule. This in turn produces a "randomizing" effect whichdistributes the startup load over a larger time interval. System planners should howeverconsider this loading effect when designing a "con-ops" for their system/site.

Also, we believe that the approach taken in our execution tests are somewhat conservative inemulating the actual user/application behavior, in that we did not necessarily factor in "userthink time" into our tests. This should have the net effect of producing a simulation which iscloser to a worst-case scenario for system planners.

5.2 CONCLUSION 2: ESTIMATING OPTIMAL NETWORK CONFIGURATIONS

Discounting the simultaneous startup issue described above, and using bandwidth utilizationdata generated by an application(s) execution(s), we can make a rough estimate as to theapproximate number of users a subLAN can support based on its mix of systemconfigurations and applications. This estimate can be obtained by dividing theapplication/system bandwidth consumption percentage into 100 percent, yielding theapproximate number of systems which can be supported for that application/system mix. Asample estimate graph is shown in figure 5-1, entitled "Estimate of Maximum Systems in aHomogeneous Application/System Environment."

5.3 CONCLUSION 3: USE OF "X-TERMINALS"

We believe that even if a faster X-Terminal had been used in our study, that the "Total Bytes"figures would have remained constant. While "Mean Bytes" could increase if an X-Terminalmade better use of buffering, and possibly lower the total number of frames, we do not

5-1

Page 40: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

Cu

2'a 0

'a- Cu

2~

0 U,

rj,

0*4* 1 1

Cu0

0

2Cu

U,a~Cu ~

a.'U,'a

2Cu

2

'a

6e..Cu0a.'

Cu

-

*

SUIa1SACS 30 1~~Wfl~ WflWIX3I4~5-2

Page 41: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

believe that the total number of frames would be lowered substantially. We do expect thatthe use of a higher performance X-Terminal would result in a decrease in "Total Delta Time,"which would improve user perceived performance provided a network was lightly loaded.However, as stated above, "Total Bytes" would remain constant, and as such, drive up thealready high bandwidth utilization rate of the "X-Terminal." This in turn would necessitate areduction in the total number of "X-Terminals" capable of being serviced on a particularsubLAN.

5-3

Page 42: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

SECTION 6

RECOMMENDATIONS

In addition to the conclusions drawn in the previous section, we have included severalrecommendations which include ways in which the results of our study can be applied to thesystem engineering needs of the IDHS community, and ways in which these basic methodscan be refined to provide more realistic, and hence, more accurate results for the community.

6.1 RECOMMENDATION 1: USE OF DISKLESS NODE WORKSTATIONS

From a network load standpoint, this configuration consistently exhibited the greatest amountof bandwidth utilization. While diskless node workstations were novel when first introduced,Winchester disk technology has advanced to the point where it is practical to provide eachuser workstation with a hard disk of at least 200 MB. The workstation can then beconfigured as either a datafull or dataless node as requirements dictate.

6.2 RECOMMENDATION 2: USE OF NFS FILE SERVERS

With the possible exception of very data intense applications (such as an interactive 3D mapgraphics system), use of NFS File Servers appears to be practical to the IDHS community.This is due to the relatively low loading exhibited with the test applications run on datafulland dataless node workstations. Use of central NFS servers minimizes system disk storagerequirements and simplifies fije system maintenance.

6.3 RECOMMENDATION 3: USE OF DATALESS NODE WORKSTATIONS

Dataless node configurations consume only slightly more bandwidth than do datafullconfigurations, and allow centralized management and storage of a sizeable file system. Assuch, we can make a general recommendation that systems take advantage of thisconfiguration. However, as with all the recommendations presented here, implementationdecisions should be based on the specific mix of applications present in a system.

6.4 RECOMMENDATION 4: USE OF "X-TERMINALS"

Based on our observations, we recommend a cautious approach to the use of X-Terminals inthe IDHS environment. In addition to their potentially adverse effect on bandwidthutilization, system designers should not be lulled into thinking "X-Terminals" are a cheapsolution. While the display head itself is relatively inexpensive, the system designer mustallocate adequate application server resources in terms of raw CPU power, system memory,and system swap space.

6-1

Page 43: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

6.5 RECOMMENDATION 5: USE OF NETWORK BEHAVIOR AS ANAPPLICATION SELECTION CRITERIA

As was evidenced in our tests, specific applications exhibit a wide variety of paging andnetwork related behaviors. The community should consider added network behavior (e.g..,low bandwidth utilization) as an additional criteria when selecting applications for theirsystems.

6.6 RECOMMENDATION 6: ENHANCEMENTS TO NETWORK LOADINGMODELLING TECHNIQUES

When ths task was initiated we were uncertain if meaningful data could be obtained. Uponanalysis of our data, we were encouraged that this approach to network modelling has somepromise. With that in mind, this technique could be enhanced through several follow-onactivities. The first is to test the accuracy of our model against real IDHS systems, usingsimilar performance monitoring tools. Provided our model mimics the real-world reasonablywell, the next step should be to extend the model to deal with heterogeneous mixes ofapplications and workstation configurations. Following this, the final logical step would beto integrate Remote Terminal Emulator (RTE) technology into the model. RTEs allow userX-Window and console session activities to be captured into a file which then be "playedback" to systems under test (SUT). RTEs provide a reliable mechanism to replicate a set ofuser generated activities, which includes "think-time." In addition, RTEs can be used tostress test systems by simulating many users at once from a single captured session, or set ofsessions.

6-2

Page 44: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

APPENDIX A

APPLICATION SESSION DESCRIPTION/DATA COLLECTION PROCEDURE

A.1 SLATE OFFICE AUTOMATION APPLICATION

Isolate all workstations which are not involved in this test by disconnecting them from theEthernet fanout box. Log in as the test user on the client workstation and clear all unneededfiles from the test account's file system. Start and exit Slate to set up the defaultconfiguration files. Execute a nfsstat -z and a vmstat -z as root after rebooting the client toclear all statistical information.

server: login as rootxset s offcd /miscscriptnfsstat -znfsstatvmstat -zvmstat -s

sniffer: set up sniffer to capture between server and client

client: login as the test user via the X Display Manager

sniffer: FO to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST1Arestart capture (F10)

server: nfsstatvmstat -s

client: scriptnfsstatvmstat -smwm &

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST1Brestart capture (F 10)

server: nfsstatvmstat -s

A-1

Page 45: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

client: click in xtermnfsstatvmstat -s

sniffer: FIO to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST1Crestart capture (F1O)

server: nfsstatvmstat -s

client: slateafter slate starts let it idle for 10 seconds

sniffer: F1O to stop capturesave buffer frames to disk as file: C:\STRIEBER\TESTIDrestart capture (FIO)

server: nfsstatvmstat -s

client: 1. Scroll through the document displaying a color image, text, geometricgraphics, digitized speech, a spreadsheet, a chart generated from thespreadsheet, a scanned black and white image, an enclosure, andmultilingual text.

2. Scroll to the speech section.

3. Trigger a six second audio segment.

4. Scroll to the top of the document.

5. Use the menu bar to change the text font style of the entire documentfrom Helvetica, 10 point, normal face to Helvetica, 18 point, bold-italicface.

6. croll down to the spreadsheet portion of the document.

7. Change the column labeled sin(x), row 1 from 0 to 5 degrees.

8. Change the column labeled cos(x), row 1 from 0 to 5 degrees.

9. Click in graphic and generate a new graph using the new spreadsheetfigures.

10. Scroll to the bottom of the document.

11. Type in three lines of text.

A-2

Page 46: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

12. Use the menu bar to add a raster image from disk.

13. Save the edited document.

14. Use the menu bar to exit the document editor.

15. Use the window manager to exit the file selection box.

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST1Erestart capture (F10)

server: nfsstatvmstat -s

client: nfsstatvmstat -sexitexit

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST1F

server: nfsstatvmstat -sexitmv typescript testl.servermv -test/typescript /misc/test 1 .client

A.2 OILSTOCK MAP GRAPHICS APPLICATION

Isolate all workstations which are not involved in this test by disconnecting them from theEthernet fanout box. Log in as the test user on the client workstation and clear all unneededfiles from the test account's file system. Execute a nfsstat -z and a vmstat -z as root afterrebooting the client to clear all statistical information.

server: login as rootxset s offcd /miscscriptnfsstat -znfsstatvmstat -zvmstat -s

sniffer: set up sniffer to capture between server and client

A-3

Page 47: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

client: login as the test user via the X Display Manager

sniffer: F1O to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST2Arestart capture (F 10)

server: nfsstatvmstat -s

client: scriptnfsstatvmstat -smwm &

sniffer: FlO to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST2Brestart capture (F10)

server: nfsstatvmstat -s

client: click in xtermnfsstatvmstat -s

sniffer: FIO to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST2Crestart capture (F10)

server: nfsstatvmstat -s

client: mapafter map starts let it idle for 10 seconds

sniffer: FIO to stop capturesave buffer frames to disk as file: C:ASTRIEBER\TEST2Drestart capture (F 10)

server: nfsstatvmstat -s

client: 1. Start the application within the binaries directory.2. Select Map Detail from the menu bar.3. Select 2 from the pull-down menu.4. Select Feature Detail from the menu bar.5. Select 9 from the pull-down menu.6. Select Geographic Functions from the menu bar.

A-4

Page 48: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

7. Select Show Area from the pull-down menu.8. Type in united states at the prompt.9. Select Map Features from the menu bar.

10. Select the toggle button labeled Internal Boundaries.11. Select the toggle button labeled Rivers.12. Select the toggle button labeled Railroads.13. Select the toggle button labeled Roads.14. Select the toggle button labeled Cities.15. Select the toggle button labeled Countries/Bodies of Water.16. Select Intel Features from the menu bar.17. Select LAT/LON Grid Lines from the pull-down menu.

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST2Erestart capture (F10)

server: nfsstatvmstat -s

client: 18. Select Projection from the menu bar.19. Select Orthographic Equitorial from the pull-down menu.20. Select File from the menu bar.21. Select Exit from the pull-down menu.22. Select the Ok button.

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRLEBER\TEST2Frestart capture (F10)

server: nfsstatvmstat -s

client: nfsstatvmstat -sexitexit

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST2G

server: nfsstatvmstat -sexitmv typescript testl.servermy -test/typescript /misc/testl .client

A-5

Page 49: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

A.3 PARAGON IMAGE PROCESSING APPLICATION

Isolate all workstations which are not involved in this test by disconnecting them from theEthernet fanout box. Log in as the test user on the client workstation and clear all unneededfiles from the test account's file system. Execute a nfsstat -z and a vmstat -z as root afterrebooting the client to clear all statistical information.

server: login as rootxset s offcd /miscscriptnfsstat -znfsstatvmstat -zvmstat -s

sniffer: set up sniffer to capture between server and client

client: login as the test user via the X Display Manager

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3Arestart capture (F10)

server: nfsstatvmstat -s

client: scriptnfsstatvmstat -smwm &

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3Brestart capture (F10)

server: nfsstatvmstat -s

client: click in xtermnfsstatvmstat -s

sniffer: F1O to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3Crestart capture (F 10)

A-6

Page 50: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

server: nfsstatvmstat -s

client: demoafter slate starts let it idle for 10 seconds

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3Drestart capture (F10)

server: nfsstatvmstat -s

client: 1. Start the application within the user's home directory with the Kiev carrier

as the default image.

2. Move the vdisplay-form under the image display to coordinates (10,650).

3. Move the pointer to the Zoom button and click.

4. Freeze the display on the zoom window.

5. Move the zoom window to the right of the image display to coordinates(700,30).

6. Zoom in on the Kamov-25 helicopter at zoom factor 2.

7. Select Functions from the vdisplayform.

8. Resize the vdisplayjformfunction-subform using the bottom rightcorner to 420x460.

9. Move the vdisplay-formfunctionsubform to (690,340).

10. Select ROt (Region Of Interest).

11. Select ROI OPERATIONS.

12. Select vhenhance from ROI Operations.

13. Move the right vertical ROI bar to 335.

14. Move the left vertical ROI bar to 255.

15. Move the bottom horizontal ROI bar to 220.

16. Move the bottom horizontal ROI bar to 155.

A-7

Page 51: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

17. Click on extract within the ROI window.

18. Select vhxray from ROI Operations.

19. Click on extract within the ROI window.

20. Select vrotate from ROI Operations.

21. Click on extract within the ROI window.

22. Move the pointer to the Overlays button and click.

23. Move the vdisplayjform xvoverlay-subform to (690,340).

24. Type in the input overlay filename and click on Get Overlay (the selectedoverlay contains lines, circles, rectangles, and text).

25. Click on Close from the vdisplay-formxvoverlay-subform.

26. Click on Functions from the vdisplayjform.

27. Click on Input/Output from the vdisplayjformfunctionsubform.

28. Enter the output file name including path (home 1/users/test/ship2.ovr).

29. Click on OUTPUT IMAGE.

30. Click on Close from the vdisplayjformfunctionsubform.

31. Click on Quit from vdisplay.form.

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3Erestart capture (F10)

server: nfsstatvmstat -s

client: nfsstatvmstat -sexitexit

sniffer: F10 to stop capturesave buffer frames to disk as file: C:\STRIEBER\TEST3F

A-8

Page 52: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

server: nfsstatvmstat -sexitmy typescript testl.servermy -test/typescript /misc/testl1.client

A-9

Page 53: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

APPENDIX B

TESTBED SYSTEM CONFIGURATIONS

B.1 FILE SERVER /ETC/FSTAB FILE

/dev/sd2a / 4.2 rw I1I/dev/sd2g /usr 4.2 rw 1 2/dev/sd2d /export 4.2 rw 1 3/devlsd2e /export/swap 4.2 rw 1 6/dev/sd2f /home 1 4.2 rw 1 4Idevlsd2h /var 4.2 rw 1 5

B.2 FILE SERVER /ETC/EXPORTS FILE

/usr -root=diskless:dataless/home -root=diskless :dataless:datafullIhome 1 -access=datafull,root=datafull/var/spoollmail -access=diskless:dataless:datafulI/export/root/diskless -access=diskless,root=diskless/export/swap/diskless -access=di skle ss,root=d isk less

B.3 DATAFULL NODE /ETC/FSTAB FILE

/dev/sd2a / 4.2 rw I1I/dev/sd2d /home 4.2 rw 1 3/devfsd2g /usr 4.2 rw 1 2/dev/sd2h /var 4.2 rw 1 4nfserver:Ihomel /homelI nfs rw 0 0

B.4 DATALESS NODE /ETC/FSTAB FILE

fdevfsd3a on / type 4.2 (rw)nfserver:/export/exec/sun4.sunos.4. 1.1 on /usr type nfs (rw)nfserver:/export/exec/kvm/sun4c.sunos.4. 1.1 on /usr/kvrn type nfs (rw)nfserver:/export/share/sunos.4. 1. 1 on /usr/share type nfs (rw)nfserver:/homel on /homel type nfs (rw)nfserver:/home/nfserver on /home/nfserver type ni's (rw)

B-1

Page 54: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

B.5 DISKLESS NODE /ETC/FSTAB FILE

nfserver:/export/root/diskless / nffs rw 0 0nfserver:/export/exec/sun4.sunos.4. 1 .1 /usr nfs ro 0 0nfserver:Iexport/execlkvmlsun4c.sunos.4. 1.1 /usr/kvm nfs ro 0 0nfserver:/home/nfserver /home/nfserver nfs rw 0 0nfserver:Ihornel /homelI nfs rw 0 0nfserver:/var/spoollmail /varlspool/mail nfs rw 0 0nfserver:/export/sharelsunos.4. 1. 1 Iusr/share nfs rw 0 0

B.6 DISK CAPACITY OF DATAFULL NODE

Filesystem kbytes used avail capacity Mounted on/dev/sd2a 8999 3706 4393 46% //dev/sd2g 46279 38805 2846 93% /usr/dev/sd2d 34847 10 31352 0% /home/dev/sd2h 13815 93 12340 1% /varnfserver:/homel 588438 150091 379503 28% /homel

B.7 DISK CAPACITY OF DATALESS NODE

Filesystem kbytes used avail capacity Mounted on/dev/sd3a. 7799 3987 3032 57% Infserver:Iexportlexeclsun4.sunos.4. 1.1

144239 43817 85998 34% /usrnfserver:/export/exec/kvm/sun4c sunos.4. 1.1

144239 43817 85998 34% /usr/kvmnfserver:/export/sharelsunos.4. 1.1

144239 43817 85998 34% Iusrlsharenfserver:/homel 588438 150091 379503 28% /homelnfserver:f home/nf server

8999 4206 3893 52% /home/nfserver

B-2

Page 55: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

APPENDIX C

POSTPROCESSING SCRIPTS

C.A CONV

#!/bin/sh

# This script will convert the DOS-based data file to UNIX and the new data will be totaled.if [ -f$1thenecho "Processing Data.. . Please Wait"echo ""echo "Converting from DOS to UNIX format...dos2unix $1 $1.newecho "Selecting only the frame header lines..grep nfserver $1.new > $1.goodrm $1.newecho "Totaling statistics. .. "/homel/users/strieber/doc/AFIA/Notes/total $1 .good > $1 .totalsrm $1.goodecho "Totalling NFS statistics../home 1/users/strieber/doc/AFIA/Notes/greps $1 >> $I.totalsecho "Done"else

echo "File not found: " $1fi

C.2 TOTAL

#!/bin/sh# total3: Total Delta Time# total5: Total Bytes# total6: Total Sniffer Network Bandwidth Utilization (100 ms window)

awk'BEGIN { FS=","}

{total3 += $3total5 += $5total6 += $6++count

)END(

print "Frame count: ", count

C-1

Page 56: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

. toot

printprint "Total Delta Time: ", tota13print "Mean Delta Time: ", total3 / (count - 1)print "print "Total Bytes: ", total5print "Mean Bytes: ", tota15 / countprint "print "Total NW Utilization Sniffer MB/Sec %)",total6print "Mean NW Utilization Sniffer MB/Sec (% ,tota16 /countprint "print "Mean NW Utilization Actual Bytes/Sec ()",total15 tota13

) $1

C.3 GREPS

#!/bin/shprocO='grep "Proc = 0 $11I wc -1'proc I =grep "Proc = 1 ("$11I wc -I'proc2='grep "Proc =2 ("$11I wc -1'proc3='grep "Proc = 3 ("$11 wc -I'proc4='grep "Proc = 4 ("$1 1 we -I'proc5='grep "Proc = 5 ("$11I wc -I'proc6='grep "Proc = 6 ("$1 1 wc -I'proc7='grep "Proc = 7 C'$1 1 wc -Cproc8='grep "Proc = 8 ("$1 1 wc -I'proc9='grep "Proc = 9 %" 1 wc -I'procl0='grep "Proc = 10 ("$1 1 wc -1'proc Il='grep "Proc = I1" $11I wc -I'proc I2='grep "Proc = 12 ("$11I wc -I'procl3='grep "Proc = 13 ("$1 1 wc -1'procl4='grep "Proc = 14 C'$11I wc -I'procl5='grep "Proc = 15 ("$1 1 wc -1'procl6='grep "Proc = 16 ("$11I wc -1'procl7='grep "Proc = 17 ("$1 1 wc -1'procl8=&grep "Proc = 18 ("$1 1 wc -I'udp='grep "continuation ID=" $1 1 wc -I'

echo "echo "NFS Procedure Totals"echo "echo " Null: "$Proc0echo " Get Attributes: "$proc Iecho " Set Attributes: "$proc2echo " Root: "$proc3echo " Lookup: "$proc4echo " Read Link: "$proc5echo " Read: "$proc6

C-2

Page 57: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

echo " Write Cache: " $proc7echo " Write: of$proc8echo " Create: "$proc9echo " Remove: " $proc 10echo " Rename: " $procl 1echo " Link: "$procl12echo " Symbolic Link: "$proc 13echo " Make Dir: "$procl14echo " Remove Dir: "$proc 15echo " Read Dir: "$proc 16echo " Stata File Sys: " $procl17echo " N Proc: "$Procl18echo "echo "UDP Continuation: "$udp

CA4 GO

#!/bin/sh

go.datafullgo.datalessgo.disklessgo.xterminl

C.5 GO.DATAFULL

# datafull

cd /home 1/users/strieber/doc/AFIA/results/datafull/oilstock/test2a/home 1/users/strieber/doc/AFIA/Notes/conv t2aboth.csv/home 1/users/strieber/doc/AFIAfNotes/conv t2adf.csv/home 1/users/strieber/doc/AFIAfNotes/conv t2anf.csv

cd /home I /users/strieber/doc/AFIA/results/datafull/oilstock/test2b/homel1/users/strieber/doc/AFIA/Notesfconv t2bboth.csv/home I/users/strieber/doc/AFIAfNotes/conv t2bdf.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2bnf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafull/oilstock/test2c/home 1/users/strieber/doc/AFIA/Notes/coriv t2cboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2cdf.csv/home 1/users/strieber/doc/AFIAfNotes/conv t2cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafull/oilstock/test2d/homel1/users/strieber/doc/AFIA/Notes/conv t2dboth.csv

C-3

Page 58: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/Notes/conv t2ddfcsv/home 1/users/strieber/doc/AFIA/Notes/conv t2dnf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafull/oilstock/test2e/home 1/users/strieber/doc/AFIA/Notes/conv t2eboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2edf.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2enf.csv

ed /home 1/users/strieber/doc/AFIA/results/datafull/oilstock/test2f/home 1/users/strieber/doc/AFIA/Notes/conv t2fboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2fdf.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2fnf.csv

cd /home 1/users/strieber/doc/AFIA/res ults/datafu I/oilstock/test2g/home 1/users/strieber/doc/AFIA/Notes/conv t2gboth.csv/home l/users/strieber/doc/AFIA/Notes/conv t2gdf. csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gnf.csv

cd /home 1/users/strieber/doc/AFLA/results/datafulb'paragon/test3a/homelI/users/strieber/doc/AFIAINotes/conv t3aboth.csv/home 1/users/stfieber/doc/AFIA/Notes/conv t3adf.csv/home 1/users/strieber/doc/AFIAINotes/conv t3anf.csv

cd /home 1/users/stfieber/doc/AFIA/results/datafulllparagon/test3b/home 1/users/stieber/doc/AFIAINotes/conv t3 bboth.csv/home 1/users/stfieber/doc/AFIA/Notes/conv t3bdf.csv/home 1/users/strieberfdocfAFIA/Notes/conv t3 bnf.csv

cd /hiome 1/users/strieber/doc/AFIA/reSLIlt c/datafu I/paragon/test3c/home 1/users/strieber/doc/AFIA/Notes/conv t3cboth.csv/home 1/users/striebei-/doc/AFIA/Notes/conv t3cdf.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafull/paragon/test3d/home 1/users/strieber/doc/AFIA/Notes/conv t3dboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3ddf.csv/homel1/users/stieber/doc/AFIAfNotes/conv t3dnf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataful l'paragon/test3e/home 1/users/stfieber/doc/AFIA/Notes/conv t3eboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3edf.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3enf.csv

cd /home 1/usersfstrieber/doc/AFLAfresults/datafull/paragon/test3f/home 1/users/strieber/doc/AFIAfNotes/conv t3fboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3fdf.csv/home 1/users/strieber/doc/AFIA/Notes/con v t3 fnf.csv

C-4

Page 59: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

cd /home l/users/strieber/doc/AFIA/results/datafull/slate/test 1 a/homel1/users/strieber/doc/AFAfNotes/conv tlIaboth.csv/home 1/users/strieber/doc/AFIAfNotes/conv t 1adf.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIanf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafulllslate/test lb/home 1/users/strieber/doc/AFIA/Notes/conv t Ibboth.csv/home l/users/strieber/doc/AFIA/Notes/conv tl1bdf.csv/homel1/users/strieber/doc/AFIA/Notes/conv tI bnf.csv

ed /home 1/users/strieber/doc/AFIA/results/datafullVslate/testl c/homel1/users/strieber/doc/AFIA/Notes/conv tI cboth.csv/homel1/users/strieber/doc/AFIA/Notes/conv t 1cdf.csv/home l/users/strieber/doc/AFIA/Notes/conv t 1cnf.csv

cd /home 1/users/strieber/doc/AFLA/resu its/datafull/slate/test 1 d/home l/users/strieber/doc/AFIA/Notes/conv tl1dboth.csv/home l/users/strieber/doc/AFIA/Notes/conv tlIddf.csv/home l/users/strieber/doc/AFIA/Notes/conv tIidnf.csv

cd /home l/users/strieber/doc/AFIA/resu Its/datafullVslate/test 1 e/home 1/users/strieber/doc/AFIA/Notes/conv tl1eboth.csv/homel1/users/strieber/doc/AFIA/Notes/conv tl1edf.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIenf.csv

cd /home 1/users/strieber/doc/AFIA/results/datafulllslate/test If/home l/users/strieber/doc/AFIA/Notes/con v t fboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv tl1fdf.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIfnf.csv

C.6 GO.DATALESS

# dataless

cd /home 1/users/strieber/doc/AFIA/results/dataless/oilstock/test2a/home 1/users/strieber/doc/AFIA/Notes/conv t2aboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t2adal .csv/home 1/users/strieber/doc/AFIA/Notes/conv t2anf.csv

cd /home l/users/strieber/doc/AFIA/results/dataless/oilstock/test2b/hbome 1/users/strieber/doc/AF[A/Notes/conv t2bboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2bdal.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2bnf.csv

cd /home 1/users/strieber/doc/AFIA/resu lts/dataless/oilstock/test2c/home 1/users/strieber/doc/AFIAfNotes/conv t2cboth.csv/homel1/users/strieber/doc/AFIA/Notes/conv t2cdal.csv

C-5

Page 60: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieher/doc/AFIAINotes/conv t2cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/d atales s/oilstock/test2d/home 1/users/strieber/doc/AFIAINotes/conv t2dboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2ddal.csv/home 1/users/strieber/doc/AFIA/Notes/con v t2d nf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/oilstock/test2e/home 1/users/strieber/doc/AFIA/Notes/conv t2eboth .csv/home 1/users/strieber/doc/AFIAfNotes/conv t2edal.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2enf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/oilstock/test2f/home I/users/strieber/doc/AFIA/Notes/conv t2fboth.csv/home 1/users/strieber/doc/AFIAINotes/conv t2fdal.csv/homel1/users/strieber/doc/AFIANotes/conv t2fnf.csv

cd /home l/users/strieber/doc/AFIA/resu hs/daraless/oilstock/test2g/home 1/users/strieber/doc/AFIAINotes/conv t2gboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gdal .csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gnf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/paragon/test3a/home 1/users/strieber/doc/AFIA/Notes/conv t3aboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3adal .c sv/home 1/users/strieber/doc/AFIA/Notes/con v t3an f.csv

cd /home 1/users/strieber/doc/AFIA/reSu lts/dataless/paragon/test3b/home 1/u serslstrieber/doclA FIA/Notes/conv t3 bboth .csv/home 1/usezs/strieber/doc/AFIA/Notes/con v t3bdal .csv/homelI/users/strieber/doc/A FAIN otes/con v t3bnf.csv

cd /home l/users/strieber/doc/AFIA/resu Its/dataless/paragon/test3c/home l/users/strieber/doc/AFIA/Notes/conv t3cboth.csv/home l/users/strieber/doc/AFIAfNotes/conv t3cdal .csv/home l/users/strieber/doc/AFIA/Notes/conv t3cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/paragon/test3d/home I /users/strieber/doc/AFIA/Notes/conv t3dboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3ddal .csv/home l/users/strieber/doc/AFIA/Notes/conv t3d nf.csv

cd /home 1/users/strieber/doc/AFIA/resu Its/dataless/paragon/test3e/home 1/users/strieber/doc/AFIA/Notes/conv t3eboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3edal .csv/home 1/users/strieber/doc/AFIA/Notes/conv t3enf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/paragon/test3f

C-6

Page 61: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIAfNotes/conv t3fboth.csv/home l/users/strieber/doc/AFIA/Notes/conv t3fdal.csv/home 1/users/stiieber/doc/AFIA/Notes/conv t3fnf.csv

cd /home 1/users/strieber/doc/AFIA/resuilts/dataless/slate/test 1 a/home 1/users/strieber/doc/AFIA/Notes/conv tl1aboth~csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIadal .csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIanf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/slate/test l b/home l/users/strieber/doc/AFIAINotes/conv tlIbboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv tl1bdalcsv/home 1/users/srieber/doc/AFlAINotes/conv t Ibnf.csv

ed /home 1/users/strieber/doc/AFIA/resu Its/data] ess/slate/test I c/home 1/users/strieber/doc/AFIA/Notes/conv t 1 both .csv/home l/users/strieber/doc/AFJA/Notes/conv tlIcdal .csv/home 1 /users/strieber/doc/AFIAINotes/conv t Icnf.csv

cd /home l/users/strieber/doc/AFIA/results/dataless/slate/testl1d/home lfusers/strieber/doc/AFIAfNotes/conv tl1dboth.csv/home I /users/strieber/doc/AFIA/Notes/conv tl1ddal.csv/home l/users/strieber/doc/AFIA/Notes/conv tid nf.csv

cd /home I /usersfstrieber/docfAFIA/results/dataless/slate/test I e/home l/users/strieber/doc/AFIA/Notes/conv tlIeboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIedal .c sv/home I /users/strieber/doc/AFIA/Notes/conv tlIenf.csv

cd /home 1/users/strieber/doc/AFIA/results/dataless/slate/test If/home 1/users/strieber/doc/AFIA/Notes/conv tl1fboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIfdal.csv/home I /users/su-ieber/doc/AFIA/Notes/conv tl1fnf.csv

C.7 GO.DISKLESS

# diskiess

cd /home 1 /users/strieber/doc/AFIA/results/diskless/oi Istock/test2a/home 1/users/strieber/doc/AFIA/Notes/conv t2aboth.csv/home 1/users/strieber/doc/AFIA/Notes/coiv t2adil.csv/home I/users/strieber/doc/AFIA/Notes/conv t2anf.csv

cd /home l/users/strieber/doc/AFIA/results/diskless/oilstock/test2b/home 1/users/strieber/doc/AFIA/Notes/conv t2bboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2bdil.esv/home 1/users/strieber/doc/AFIAfNotes/conv t2bnf.csv

C-7

Page 62: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

cd /home 1/users/strieber/doc/AFIA/results/diskless/oilstock/test2c/home I/users/strieber/doc/AFJA/Notes/conv t2cboth.csv/home 1/users/strieber/doc/AFIAfNotes/conv t2cdil .csv/homel1/users/stnieber/doc/AFIA/Notes/conv t2cnf.csv

cd /home 1/users/strieber/doc/AFJA/resu hts/diskless/oilstockltest2d/home 1/users/strieber/doc/AFIAINotes/conv t2dboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2ddil.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2dnf.csv

cd /home 1/users/strieber/do/AFIA/resu Its/di skles s/oilstocktest2e/home 1/users/strieber/doc/AFIA/Notes/conv t2eboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2edil .csv/home 1/users/strieber/doc/AFIAINotes/conv t2enf.csv

cd /home 1/users/strieher/doc/AFIA/results/diskless/oilstockltest2f/home 1/users/strieber/doc/AFIA/Notes/conv t2fboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t2fdil .csv/home 1/users/strieber/doc/AFIAINotes ,/conv t2fnf.csv

cd /home 1/users/strieber/doc/AFIA/results/dz skless/oilstock/test2g/home 1/users/strieber/doc/AFIA/Notes/conv t2gboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gdil.csv/home 1/users/strieber/doc/AFIAINotes/conv t2gnf.csv

cd /home 1/users/strieber/doc/AFIA/results/diskless/paragon/test3a/home 1/users/stfieber/doc/AFIA/Notes/conv t3aboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t3adil .csv/home 1/users/strieber/doc/AFlA/Notes/con v t3anf.csv

cd /home 1/users/strieber/doc/AFIA/results/d iskless/paragon/test3b/home 1/usersfstrieber/doc/AFIA/Notes/conv t3 bboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3bdil.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3bnf.csv

cd /home lfusers/strieberfdocfAFIA/resu Its/di skless/paragon/test3c/home 1/users/strieber/doc/AFIA/Notes/conv t3cboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3cdil .csv/home I /users/strieber/doc/AFIAINotes/conv t3cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/di skless/paragon/test3d/home 1/users/strieber/doc/AFIAfNotes/conv t3dboth .csv/home 1/users/strieber/doc/AFIAINotes/conv t3ddil .csv/home l/users/strieber/doc/AFAfNotes/conv t3dnf.csv

cd /home l/users/strieber/doc/AFIA/results/diskless/paragon/test3e/home l/users/strieber/doc/AFIAfNotes/conv t3eboth.csv

C-8

Page 63: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/Notes/conv t3edil.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3enf.csv

cd /home 1/users/strieber/doc/AFIA/results/diskless/paragon/test3f/home 1/users/strieber/doc/AFIA/Notes/conv t3fhoth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3fdil.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3fnf.csv

cd /home l/users/strieber/cloc/AFIA/result s/diskless/slate/test I a/home 1/users/strieber/doc/AFIA/Notes/conv tlIaboth.csv/homel1/users/strieber/doc/AFIA/Notes/conv ti adil.csv/home 1/users/strieber/doc/AFIAfNotes/conv tl1anf.csv

cd /home I /users/strieber/doc/AFIA/results/diskless/slate/test l b/home 1/users/strieber/doc/AFIA/Notes/conv tl1bboth.csv/home l/users/strieber/doc/AFIA/Notes/conv t I bdil.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIbnf.csv

cd /home l/users/strieber/doc/AFIA/resu lts/diskless/slate/test I c/home 1/users/strieber/doc/AFIAINotes/conv tl1cboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv I cdii .csv/home l/users/strieber/doc/AFIA/Notes/coniv tlIcnf.csv

cd /home 1 /users/strieber/doc/AFIA/results/diskless/slate/test 1 d/home 1/users/strieber/doc/AFIAfNotes/conv 1 dboth.csv/home 1/users/strieber/doc/AFIAfNotes/conv 1 ddil.csv/home l/users/strieber/doc/AFIA/Notes/conv t Idnf.csv

cd /home l/users/strieber/doc/AFLA/results/di sklesslsl ate/test 1 e/home 1/users/strieber/doc/AFIA/Notes/conv tlIeboth .csv/home l/users/strieber/doc/AFIA/Notes/conv 1 edil .csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIenf.csv

cd /home I/users/strieber/doc/AFIA/resu Its/di skiess/slate/test If/home 1/users/strieber/doc/AFIA/Notes/coriv t I fboth.csv/home 1/users/strieber/doc/AFIA/Notes/con v ii fd il.csv/home I /users/strieber/doc/AFIA/Notes/conv tlIfnf.csv

C.8 GO.XTERMINL

# xterminl

cd /home 1/users/strieber/doc/AFIA/resti I s/x termi n I/oilstock/test2a/home 1/users/strieber/doc/AFIA/Notes/conv t2aboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2axt.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2anf.csv

C-9

Page 64: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

cd /home l/users/strieber/doc/AFIA/results/xterminl/oilstockltest2b/home 1/users/strieber/doc/AFIA/Notes/conv t2bboth.csv/home 1/users/strieber/doc/AFIAINotes/conv t2bxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2bnf csv

cd /home 1/users/strieber/doc/AFIA/results/xtermninl/oilstock/test2c/home 1/users/strieber/doc/AFIAINotes/conv t2cboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2cxt.csv/home 1/users/strieber/doc/AFIAINotes/conv t2cnf.csv

cd /home 1/users/strieber/doc/AFIA/results/xterm-inl/oilstock/test2d/home I /users/strieber/doc/AFIA/Notes/conv t2d both.csv/home 1/users/strieber/doc/AFIAINotes/conv t2dxt.csv/home 1/users/strieber/doc/AFIAINotes/conv t2dnf.csv

cd /home 1/users/strieber/doc/AFIA/results/xtetrminl/oilstock/test2e/home 1/users/strieber/doc/AFIA/Notes/conv t2eboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2ext.csv/home l/users/strieber/doc/AFIA/Note-s/conv t2enf.csv

cd /home 1/users/strieber/doc/AFLA/results/xterrninl/oilstock/test2f/home 1/users/strieber/doc/AFIA/Notes/conv t2fboth.csv/home 1/users/strieber/doc/AFJA/Notes/conv t2fxt. csv/home 1/users/strieber/doc/AFIA/Notes/conv t2fnf.csv

cd /home I/users/strieber/doc/AFIA/res itis/xterminl/oilstockltest2g/home 1/users/strieber/doc/AFIA/Notes/conv t2gboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv t2gnf.csv

cd /home 1/users/strieber/doc/AFIA/resu Its/x terminl/paragon/test3a/home 1/users/strieber/doc/AFIA/Notes/conv t3aboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t3axt.csv/home 1 /users/strieber/doc/AFJA/Notes/conv t3anf.csv

cd /home 1/users/strieberfdoc/AFIA/reS Its/xtermninl/paragon/test3b/home I/users/strieber/doc/AFIA/Notes/conv t3 bboth .csv/home 1/users/strieber/doc/AFIA/Notes/conv t3bxt.csv/home l/users/strieber/doc/AFIA/Notes/coiv t3 bnf.csv

cd /home I/users/strieber/doc/AFIA/results/xterminl/paragon/test3c/home l/users/strieber/doc/AFIA/Notes/conv t3cboth.csv/home I /users/strieber/doc/AFIA/Notes/conv t3cxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3cnf.csv

cd /home 1 /users/strieber/doc/AFIA/reSLults/xterminl/paragon/test3d/home 1/users/strieber/doc/AFIA/Notes/conv t3d both .csv/home 1/users/strieber/doc/AFIA/Notes/conv t3dxt.csv

C-10

Page 65: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/Notes/conv t3dnf.csv

cd /home 1/users/strieber/doc/AFIA/results/xterminl/paragon/test3e I/home 1/users/strieber/doc/AFIA/Notes/conv t3e 1 both.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3elIxt.csv/home 1 /users/strieber/doc/AFIA/Notes/conv t3el1nf.csv

cd /home 1/users/strieber/doc/AFIA/resuits/xterminl/paragon/test3e2/home 1/users/strieber/doc/AFIAfNotes/conv t3e2both .csv/home 1/users/strieber/doc/AFIAfNotes/conv t3e2xt.csv/home 1/users/strieber/doc/AFIA/Notes/con v t3e2nf.csv

cd /home 1/users/strieber/doc/AFLA/resuits/xterminl/paragon/test3f/home 1/users/strieber/doc/AFIA/Notes/conv t3fboth.csv/home I/users/strieber/doc/AFIA/Notes/conv t3fxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv t3fnf.csv

cd /home 1/users/strieber/doc/AFIA/results/xterminl/slate/test 1 a/home 1/users/strieber/doc/AFIA/Notes/conv tlIaboth.csv/home lfusers/strieber/doc/AFIA/Notes/conv tlIaxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIanf.csv

ed /home 1/users/strieber/doc/AFIA/resu Its/xtern-i n /slate/test l b/home 1/users/strieber/doc/AFIA/Notes/conv tlIbboth.csv/home 1 /users/strieber/doc/AFIA/Notes/conv tlIbxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIbnf.csv

cd /home 1/users/strieber/doc/AFIA/resuits/xterminl/slate/test 1 c/homie 1/users/strieber/doc/AFIA/No,-tes/conv t Icboth.csv/home 1/users/strieber/doc/AFIA/Notej--conv tl1cxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIcnf.csv

cd /home 1/users/strieber/doc/AFIA/resu Its/xtem-ni ni/slate/test 1 d/home 1/users/strieber/doc/AFIAINotes/conv tlIdboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIdxt.csv/home 1/users/strieber/doc/AFIA/Notes/conv tlIdnf.csv

cd /home 1/users/strieber/doc/AFIA/results/xterminl/slate/test 1 e/home 1/users/strieber/doc/AFIA/Notes/con v tlIeboth.csv/homel1/users/strieber/doc/AFIA/Notes/conv tlIext.csv/homel1/users/strieber/doc/AFIA/Notes/conv t lenf.csv

cd /home 1/users/strieber/doc/AFIA/resulIts/xtermi ni/slate/test If/homel1/users/strieber/doc/AFIA/Notes/conv tl1fboth.csv/home 1/users/strieber/doc/AFIA/Notes/conv tl1fxt.csv/home 1/users/strieber/doc/AFIAINotes/conv tlIfnf.c sv

C-1I

Page 66: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C.9 DIRECTORY STRUCTURE USED TO STORE SNIFFER DATA AND

RESULTS

datafull/ dataless! diskiess! x terminl/

/home 1/users/strieber/doc/AFIA/results/datafufl:oistock/ paragon/ slate!

/home 1/users/strieber/doc/AFIA/results/datafull/oilstock:scripts/ test2a/ test2c/ test2e/ test2g/sniffer/ test2b/ test2d/ test2f/

/home 1/users/strieber/doc/AFIA/resul ts/datafull/oilstock/scripts:test2.client type script.clien ttest2.server typescript. server

/home 1/users/strieber/doc/AFIA/resu its/dataful l/oilstock/sniffer:test2a.enc test2c.enc test2e. enc test2g.enctest2b.enc test2d.enc test2f.enc

/home 1/users/strieber/doc/AFIA/results/dataful l/oilstock/test2a:t2aboth.csv t2adfcsv t2anfcsvt2aboth.csv.totals t2adf. csv.totals t2anf. csv. totals

/home 1/users/strieber/doc/AFI A/resti Its/dataful lVoi Istock/test2 b:t2bboth.csv t2bdf.csv t2bnf.csvt2bboth.csv. totals t2bdf.csv. totals t2bnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/dacaful l/oilstock/test2c:t2cboth.csv t2cdf.csv t2cnf.csvt2cboth.csv.totals t2cdf.csv. totals t2cnf.csv. totals

/home 1/users/strieber/doc/AFIA/results/datafull/oilstockltest2d:t2dboth.csv t2ddf.csv t*-dnf.csvt2dboth.csv.totals t2ddf.csv.totals t2dn f.csv. totals

/home 1/users/strieber/doc/AFIA/reSLults/datafull/oilstock/test2e:t2eboth.csv t2edf.csv t2enf.csvt2eboth.csv.totals t2edf. csv. totals t2enf.csv. totals

/home 1/users/strieber/doc/AFIA/resul ts/d atafull/oilstock/test2f:t2fboth.csv t2fdf.csv t2fnf.csvt2fboth.csv. totals t2fdf.csv.totals t2fnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/datafuhl/oilstock/test2g:t2gboth.csv t2gdf.csv t2gnfcsvt2gboth.csv.totals t2gdf.csv. totals t2gnf.csv. totals

C- 12

Page 67: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/results/datafull/paragon:scripts/ test3a/ test3cl test3e/sniffer/ test3b/ test3dl test3f/

/home 1/users/strieber/doc/AFIA/resulIts/datafullf/paragon/scripts:test3.client typescript.clienttest3.server typescript. server

/home 1/users/strieber/doc/AFIA/results/datafull/paragon/sniffer:test3a.enc test3c.enc test3e.enctest3b.enc test3d.enc test3f.enc

/home 1/users/strieber/doc/AFIA/resul ts/datafull/paragon/test3a:t3aboth.csv t3adf.csv t3anf.csvt3aboth.csv.totals t3adf.csv. totals t3anf.csv. totals

/home 1/users/strieber/doc/AFIA/resul ts/dataful l/paragon/test3b:t3bboth.csv t3bdf.csv t3bnf.csv0 bboth.csv. totals 0 bdf.csv. totals 0 bnf.csv. totals

/home 1/users/su-ieber/doc/AFIA/results/datafull/paragon/test3c:t3cboth.csv t3cdf.csv t3cnf.csvt3cboth.csv.totals t3cdf.csv. totals t3c nf.csv. totals

/home 1/users/strieber/doc/AFIA/resul ts/dataful 1/paragon/test3d:t3dboth.csv t3ddf.csv t3dnf.csvt3dboth.csv. totals t3ddf.csv.totals t3dnf.csv.totals

/home 1/users/strieber/doc/AFIA/reSLults/datafull/paragon/test3e:t3eboth.csv t3edf.csv t3enfcsvt3eboth.csv.totals t3edf.csv.totals t3enf.csv. totals

/hoine 1/users/strieber/doc/AFIA/resul ts/datafull/paragon/test3f:t3fboth.csv t3fdf.csv t3fnf.csvt3fboth.c sv. totals 0 fdf.csv. totals t3fnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/datafuI I/slate:scripts/ testlIa/ test Ic/ testle!sniffer! test lI test I d/ test!f1

/home 1/users/strieber/doc/AFIA/results/dataful 1/slate/scripts:testl1.client typescript.clienttestl.server typescript. server

/home 1 /users/strieber/doc/AFIA/resuilts/dataful /slate/sniffer:testla.enc testlc.enc testle.enctestlb.enc testld.enc testlIf.enc

C-13

Page 68: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/resul ts/datafull/slate/test 1 a:tlaboth.csv tladf.csv tlanf.csvti aboth.csv.totals ri adfcsv.totals t I a nf.csv. totals

/home 1/users/strieber/doc/AFIA/resuts/dataft.dh/slate/test 1 b:tlbboth.csv tlbdf.csv tlbnf.csvti bboth.csv. totals ti bdf.csv. totals ti bnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/datafuI /slate/test 1 c:tlcboth.csv tlcdfcsv tl cnf.csvtlIcboth.csv. totals t I cdf.csv. totals tlIcnf.csv. totals

/home 1/users/strieber/doc/AFIA/results/datafull/slate/test 1 d:tldboth.csv tlddf.csv tldnf.csvtlIdboth.csv. totals ti ddf.csv. totals ti dnf.csv.totals

/home 1/users/strieber/dco/AFIA/res ul ts/dataful /slate/test 1 e:tleboth.csv tledfcsv tlenfcsvtleboth.csv.totals ti edfcsv.totals t enfcsv. totals

/home 1/users/strieber/doc/AFIA/resul ts/datafull/sl', te/test 1if:tlfboth.csv tlfdf.csv tlfnf.csvt I fboth.csv. totals ti fdf.csv.totals ti fnf.csv.totals

/home I1/u sers/strieber/doc/A FIA/resu I ts/da tales s:oilstock/ paragon/ slate/

/home 1/users/strieber/doc/AFIA/results/dataless/ojistock:scripts/ test2a/ test2c/ test2e/ test2g/sniffer/ test2b/ test2d/ test2f/

/home 1/users/strieber/doc/AFIA/reSu I ts/dataless/oi lstock/scripts:test2.client type script.cl ienttest2.server typescript. server

/home 1/users/strieber/doc/AFIA/resuhlts/dataless/oi istock/sniffer:test2a.enc test2c.enc test2e.enc test2g.enctest2b.enc test2d.enc test2f.enc

/home 1/users/strieber/doc/AFIA/results/dataless/oilstock/test2a:t2aboth.csv t2adal.csv t2anf.csvt2aboth.csv. totals t2ada,'csv. totals t2anf. csv. totals

/home 1/users/strieber/doc/AFIA/resul ts/dataless/oilstock/test2b:t2bboth.csv t2bdal.csv t2bnf.csvt2bboth.csv. totals t2bdal.csv.totals t2bn f.csv. totals

/home 1/users/strieberfdoc/AFIA/resulIts/dataless/oi Istock/test2c:

C- 14

Page 69: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

t2cboth.csv t2cdal.csv t2cnf.csvt2cboth.csv.totals t2cdal.c sv. totals t2cnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/dataless/oilstock/test2d:t2dboth.csv t2ddal.csv t2dnf.csvt2dboth.csv.totals t2ddal. csv. totals t2d nf.csv. totals

/home 1/users/strieber/doc/AFIA/results/dataless/oilstockltest2e:t2eboth.csv t2edal.csv t2enf.csvt2eboth.csv.totals t2edal.csv. totals t2enf.csv. totals

/home 1/users/strieber/doc/AFIA/res ul ts/d atales s/oi Istock/test2f:t2fboth.csv t2fdal.csv t2fnf.csvt2fboth.csv. totals t2fdal.csv. totals t2fnf.csv.totals

/home 1/users/strieber/doc/AFIA/resu lts/dataless/oilstockltest2g:t2gboth.csv t2gdal.csv t2gnf.csvt2gboth.csv. totals t2gdal.csv. totals t2gnf.csv. totals

/home 1/users/strieber/doc/AFIA/results/dataless/paragon:scripts/ test3al test3c/ test3elsniffer/ test3b/ test3d/ test3f/

/home 1/users/strieber/doc/AFIA/reSLults/dataless/paragon/scripts:test3.client typescript.clienttest3.server typescript.server

/home 1/users/strieber/doc/AFIA/results/dataless/paragon/sniffer:test3a.enc test3c.enc test3e.enctest3b.enc test3d.enc test3f.enc

/home 1 /users/strieber/doc/AFIA/reSuLI ts/datatess/paragon/test3a:t3aboth.csv t3adal.csv t3anf.csvt3aboth.csv.totals t3adal.csv.totals t3anf.csv. totals

/home 1 /users/strieber/doc/AFLA/results/dataless/paragon/test3b:t3bboth.csv t3bdal.csv t3bnf.csvt3bboth.csv. totals t3bdal.csv .totals 0 bnf.csv. totals

/home 1/users/strieber/doc/AFIA/resiu] ts/datalesslparagonltest3c:t3cboth.csv t3cdal.csv t3cnf.csvt3c both. csv.total s t3cdal.csv. totals t3c nf.csv. totals

/home 1/users/strieber/doc/AFIA/resu I ts/d ataless/paragon/test3d:t3dboth.csv t3ddal.csv t3dnf.csvt3dboth.csv. totals t3ddal. csv. total s t3d nf.csv. totals

C-15

Page 70: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/homie 1/users/srrieber/doc/AFIA/resul ts/dataless/paragon/test3e:t3eboth.csv t3edal.csv t3enf.csvt3eboth.csv.totals t3edal.c sv. totals t3enf.csv. otals

/home 1/users/strieber/doc/AFIA/results/dataless/paragon/test3f:t3fboth.csv t3fdal.csv t3 fnf.csvt3fboth.c sv. totals t3fdal. csv. totals t3fnf.csvatotals

/home 1/users/strieber/doc/AFIA/results/dataless/slate:scripts/ test Ia/ testlIc/ testlIe/sniffer! testIb! test Id! test If!

/home 1/users/strieber/doc/AFIA/results/dataless/slate/scripts:testi .client typescript.clienttestI.server typescript. server

/home 1/users/strieber/doc/AFIA/reSuLIts/dataless/slate/sniffer:testl1a.enc testi c.enc test 1 e.etnctestlb.enc testld.enc testlf.enc

/home 1/users/strieber/doc/AFIA/results/dataless/slate/test 1 a:tlaboth.csv tladal.csv tlanf.csvti aboth.csv.totals tlIadal.csv.totals t I anf.csv.totals

/home 1/users/strieber/doc/AF1A/reS iii ts/dataless/slate/test 1 b:tlbboth.csv tl bdal.csv tl bnf.csvtIi bboth.csv. totals t I bdal.csv.totals t I bnf.csv.totals

/home 1/users/strieber/doc/AFIA/restil ts/datzaless/slate/test 1 c:tlcboth.csv tlcdal.csv tlcnf.csvtlcboth.csv.totals tlcdal.csv.totals t Icnf.csv. totals

/home 1/users/strieber/doc/AFIA/resu lts/dataless/slate/test I d:tldboth.csv tlddal.csv tldnf.csvtldboth.csv.totals tlIddal.csv.totals tl1dnf.csv.totals

/aome 1/users/strieber/doc/AFIA/restiI ts/dataless/slate/test I e:tieboth.csv tledal.csv tlenf.csvtleboth.csv.totals tledal.csv.totals t Ienf.csv.totals

/home 1 /users/strieber/doc/AFIA/resii I ts/dataless/slate/test I f:tlfbo~h.csv tlfdal.csv t Ifnf.csvtlIfboth.c sv. totals tlfdal.csv.totals tlIfnf.csv.totals

/home 1/users/stieber/doc/A FIA/res ul s/d isk less:oistock/ paragon/ slate/

C- 16

Page 71: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home I1/users/stiieber/doc/AFIA/resu Its/di1sAless/oilIstock:scripts/ test2al test2cl test2el test2g/sniffer/ test2b/ test2d/ test2f/

/home 1/users/strieber/doc/AFIA/results/diskless/oilstock/scripts:test2.client typescript.clienttest2.server typescript. server

/home 1/users/strieber/doc/AFIA/results/diskless/oilstock/sniffer:test2a.enc test2c.enc test2e.enc test2g.enctest2b.enc test2d.enc test2f.enc

/home 1/users/strieber/doc/AFIA/results/diskless/oilstock/test2a:t2aboth.csv t2adil.csv t2anf.csvt2aboth.csv.totals t2adil.c sv. totals t2anf.csv. totals

/home 1/users/strieber/doe/AFIA/resul ts/di skless/oilstockltest2b:t2bboth.csv t2bdil.csv t2bnf.csvt2bboth.csv. totals t2bdil.csv. totals t2bnf. csv. totals

/home 1/users/strieber/doc/AFlA/reS LI I ts/d i skless/oilstock/test2c:t2cboth.csv t2cdil.csv t2cnf.csvt2cboth.csv.totals t2cdil.csv.totals t2c nf.csv. totals

/home 1 /users/strieber/doc/AF] A/reSLI 1 ts/d i skless/oi I stockltest2d:t2dboth.csv t2ddil.csv t2dnf.csvt2dboth.csv. totals t2ddil.csv.totals t2dnf.csv.totals

/home 1/users/strieber/doc/AFIA/res ulIts/di skless/oilstock/test2e:t2eboth.csv t2edil.csv t2enf.csvt2eboth.csv.totals t2edil.csv.totals t2e nf.csv. totals

/home 1/users/strieber/doc/AFIA/results/d i skless/oilstock/test2f:t2fboth.csv t2fdil.csv t2fnf.csvt2fboth.csv. totals t2fdil.csv.totals t2fnf.csv.totals

/home 1/users/strieber/doc/AFIA/resti I ts/cl i skless/oi I stoc k/test2g:t2gboth.csv t2gdil.csv t2gnf.csvt2gboth.csv. totals t2gdil.csv. totals t2gnf.csv.totals

/home 1/users/strieber/doc/AFIA/resul ts/d i skiess/paragon:scripts! test3a/ test3c/ test3e/sniffer! test3b/ test3d/ test3f/

/home I /users/strieber/doc/AFIA/results/di skiess/paragon/scripts:test3.client typescript.clienttest3.server typescript.server

C- 17

Page 72: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/results/d iskless/paragon/sniffer:test3a.enc test3c.enc test3e.enctest3b.enc test3d.enc test3f.enc

/home 1/users/strieber/doc/AFIA/resul ts/di ski ess/paragonltest3a:t3aboth.csv t3adil.csv t3anf.csvt3aboth.csv.totals t3adilcsv.totals t3anf.csv.totals

/home 1/users/strieber/doc/AFIA/reSuL ts/diskless/paragon/test3 b:t3bboth.csv t3bdil.csv t3bnfcsv0 bboth.csv. totals 0 bdil.csv. totals 0 bnf.csv. totals

/home 1/users/stfieber/doc/AFIA/results/diskless/paragon/test3c:t3cboth.csv t3cdil.csv t3cnf.csvt3cboth.csv.totals t3cd il.csv. totals t3cnf.csv.totals

/home 1/users/strieber/doc/AFIA/resti Its/d i skless/paragon/test3d:t3dboth.csv t3ddil.csv t3dnf.csvt3dboth.csv. totals t3ddil.csv. totals t3dnf.csv. totals

/home 1/users/strieber/doc/AFIA/results/d i skless/paragon/test3e:t3eboth.csv t3edil.csv t3enf.csvt3eboth.csv.totals t3edil.csv.totals t3e nf.csv. totals

/home 1/usersfstfieber/doc/AFIA/res u I ts/di skiess/paragon/test3f-t3fboth.csv t3fdil.csv t3fnf.csv0 fboth.csv. totals t3fdil.csv.totals t3fnf.csv.totals

/home 1/users/strieber/doc/AFIA/reSuLI ts/d i skiess/slate:scripts/ testlIa/ testlc/ testlIe/sniffer/ test Ib/ test Id/ testl f/

/home 1/users/strieber/doc/AFIA/resu Its/disk less/slate/scripts:testlI.client typescript.clienttestlI.server type script. server

/home 1/users/strieber/doc/AFIA/resu its/di skiess/slate/sniffer:test 1a.enc testi c.enc test 1 e.enctestlIb.enc testlId.enc test I f.enc

/home 1/users/strieber/doc/AFIA/resti Its/di skiess/slate/test I a:tlaboth.csv tladil.csv tlIanf.csvtlIaboth.csv. totals tladil.csv.totals ti anfcsv. totals

/home 1/users/strieber/doc/AFIA/resil ts/di skiess/slate/test I b:tlbboth.csv tlbdil.csv tlbnf.csvtlbboth.csv.totals tl bdil.csv.totals tl bnf.csv.totals

C- 18

Page 73: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1!users/strieber/doc/AFIA/resti Its/diskiess/slate/test 1 c:tlcboth.csv tlcdil.esv tlcnf.csvtlcboth.csv.totals ti cdil.csv.totals ti cnf.csv.totals

/home 1/users/strieber/doc/AFIA/results/diskless/slatetest 1 d:tldboth.csv tlddil.csv tldnf.csvtlIdboth.csv. totals tI ddil.csv. totals t I dnf.csv. totals

/home 1/users/strieber/doc/AFIA/results/diskless/slate/test 1 e:tleboth.csv tledil.esv tlenfcsvtleboth.csv.totals ti edil.csv.totals t I enf.csv.totals

/home 1/users/strieber/doc/AFIA/resul ts/diskless/slate/test If:tlfboth.csv tlfdilcsv tlfnf.csvtl fboth.csv. totals ti fdil.csv.totals t lfnf.csv.totals

/home 1/users/strieber/doc/AFJA/res ul ts/x ierminl:oistock/ paragon/ slate!

/home I1/users/strieber/doc/AFIA/res LIts/x termi nl/oilIstock:scripts/ test2a/ test2c/ test2e@ test2g/sniffer/ test2b/ test2d/ test2f@

/home I /users/strieber/doc/AFI A/res u Its/x termni nl/oil stoc k/scripts:test2.client typescript.clienttest2.server typescript. server

/home 1/users/strieber/doc/AFIA/results/xterminl/oilstock/sniffer:test2a.enc test2c.enc test2e.enc test2g.enctest2b.enc test2d.enc test2f.enc

/home 1/users/strieberdoc/AFIA/resuhls/xtermnin l/oilstock/test2a:t2aboth.csv t2anf. csv t2axt.csvt2aboth.csv.totals t2anf.csv.totals t2axt.csv.totals

/home 1/users/strieber/doc/AFIA/res ul ts/x termi n /oilstock/test2b:t2bboth.csv t2bnf.csv t2bxt.csvt2bboth.csv. totals t2bnf.csv. totals t2bxt. csv. totals

/home 1/users/strieber/doc/AFIA/resL lts/xterminl/oilstock/test2c:t2cboth.csv t2cnf.csv t2cxt.csvt2cboth.csv.totals t2cnf.csv. totals t2cxt.csv.totals

/home 1/users/strieber/doc/AFIA/resul ts/xterminl/oilstock/test2d:t2dboth.csv t2dnf.csv t2dxt.csvt2dboth.csv. totals t2dnf.csv. totals t2dxt.csv. totals

/home 1/users/strieber/doc/AFIA/resul I s/x term inl/oilIstoc k/te st2g:

C- 19

Page 74: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

t2gboth.csv t2gnf.csv t2gxt.csvt2gboth.csv.totals t2gnf.csv.totals t2gxt.csv. totals

/home 1/users/strieher/doc/AFIA/results/xterrninllparagon:scripts/ test3a/ test3c/ test3e I/ test3f/sniffer/ test3bl test3d/ test3e2/

/home 1/users/strieber/doc/AFIA/resul ts/xterhi nI/paragon/scripts:test3.client typescript.clienttest3.server typescript. server

/home 1/users/strieber/doc/AFIA/results/xterminb~paragon/sniffer:test3a.enc test3c.enc test3el.enc test3f.enctest3b.enc test3d.enc test3e2.enc

/home 1/users/strieber/doc/AFIA/reSLults/xtermni/paragon/test3a:t3aboth.csv t3anf.csv t3axt.csvt3aboth.csv.totals t3anf.csv.totals t3axt.csv.totals

/home I /users/strieber/doc/AFIA/res uIts/x term inl/paragon/test3b:t3bboth.csv t3bnf.csv t3bxt.csvt3bboth.csv. totals t3bnf.csv. totals 0 bxt.csv. totals

/home 1/users/strieber/doc/AFIA/resu lts/xtermi nl/paragon/test3c:t3cboth.csv t3cnf.csv t3cxt.csvt3c both. csv. totals t3cnf.csv. totals t3cxt.csv.totals

/home 1/users/strieber/doc/AFIA/reSLI I ts/xterrninl/paragon/test3d:t3dboth.csv t3dnf. csv t3dxt.csvt3dboth.csv. totals t3dnf.csv. totals t3dxt.csv.totals

/home 1/users/strieber/doc/AFIA/resul ts/xterminl/paragon/test3e 1:t3elboth.csv t3elnf.csv B~e Ixt.csvt3el1both.csv.totals t3e I nf.csv.totals t3e I xt.csv.totals

/home 1/users/strieber/doc/AFIA/resul ts/xterrniinh/paragon/test3e2:t3e2both.csv t3e2nf.csv t3e2xt.csvt3e2both.csv.totals t3e2nf.csv. totals t3e2xt.csv.totals

/home I/users/strieber/doc/AFIA/resu lts/x termi nl/paragon/test3f:t3fboth.csv t3fnf.csv t3fxt.csvt3fboth.csv.totals t3fnf.csv.totals t3fxt.csv. totals

/home 1/users/strieber/doc/AFIA/results/xtermini/slate:scripts/ testla@ testlIc@ testle@sniffer/ testlIb@ testlId@ testlIf@

C-20

Page 75: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

/home 1/users/strieber/doc/AFIA/resul ts/xterminllslate/scripts:testl.client typescript.clienttestl1.server typescript. server

C-21

Page 76: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

APPENDIX D

POSTPROCESSING SCRIPTS

Page 77: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

0' 0

6* o

0 ~ o ' 00 o ' & o ~ o o 5

00 ~ ~ 00 (ON 0 C q000000o

oo m , r-o

r~~~~~ -r O') 0' 00 0 C) OO ~ O OOIx0 qO 00~r

C' 0

C~~ -a~~~-W 'd e9~ -ciO -O 0 0 00 0

c'~ n

C' 00A- 0 - t

Page 78: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

000en 00 00 00\0 eIo o o~~C4 - 1 \0

en

oq 0tn C14 INw-C n0C 4-q 00~ 00

tn en 00

*1 oo r CC00 'o mr t 0 0 w IN00 4c

- as

6 ~ 0 0)00

eq -n -, I 0g r

0--

C5U

00

Ic 0 z c

Page 79: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

\.- - t - - - - . - I-.-

00000 000 - 00 en tn ' OO

0 0 0 0 0 00 C 00Oomr r- qc 00-

'0 r- 00 -,~ 00

le I~ 0Otf 00r 0000 n 0

0~ SSrrz

0 --

60-~~F W2--~- 00

-n Sn 0 -

Page 80: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

o r-o * M r-r-4 ~- 00 6 s )

00

0 qr mC )0 0 0OO 0 0. .rI QO 0 nW TW

-n 0-r- k00 W 0

0 00 ) ) 00 00 0Q C -0 0'C. \0\0 C14en W .t 110 00

00000 0 0 00 0 00~ m~ C5 )o 0 'r, tr) k Q ~ 0'00

C)' 00 C) 10 00C

E00

0 0

n C ' CCO

rn ~ ~ ~ CZzU

Page 81: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

00 00%

r-0 -) la0CoC QCoo r 00 00

00 %000- en tn 'r-

- l4 kn t- 00-

oc

(u 0 6>~* .L2

U w E

z~~ 0 Ar

Page 82: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

- . -

V) ~ r 0 0 cC

w~ C\

-\-

00 00 0

-0 00

Q'r 1.0O000ONOCa ooCItoocOOO-~r -O Nq N tin C

r, * 00

0 C.)0-~0

-- C

UU

0 >

Page 83: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

('4~~ It C ''r ooo[W) 000 0 0 (14o~jen rO 'n ro ~ ~ ~10 0 1

M ~ 0- 00 W 0 r 6NW-n 00 - r

00

Cu 0 00 'fl 1

in 00

CCu

-N 00

4u

00 -- 0

Z:

Page 84: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

CO00 0

00

-a000is

000

00

L-

Page 85: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

0C)100q )0 0 0 0 a Oe m0 w0 W)0N q(r- W)OO 00 M r- 0 4CfN C14 C)

00 r,~ C'4 e-lr all

m~'1 0r0 -4w 0

W) C) qt4 C*4 C~~ - ' )a ) 0 o C)Cu) 0 4 N0 Nc nt qt

E 0 t C ~ l MO00 e 10 C14F,-00 c c

-cl'tj

00

- 0

bo al 00 c

0 0 0 CL cd cisI

IN C~0 wZ (A 0aii~ , 4j 0 0 0 4.) 0 0

P. C g4 00. CUCUl0 b o ob

Page 86: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C) 0 C C - 0 OO- 0 c(4 0w 0 00C,4 C4 - ) 0- C

tn ct ct 00 --4 -

.2q

00

'I

WE

C)1 C)0Nw 7

I. W) tn It* 0 )* t- 00 U)0

CU U ~b b~O~W) C C Obb~CU C C C C C r

L) ClU 0U CU U0

Page 87: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

-Acq 0 r-'r C) i W) r--. In 0o-0 C o0

eq C -- 4 -- cnC cn * e

mu -M- r

CuL

0 0

0 0

CL cumc-n .- 8

pov 00 .0obo ~ ~ ~ ~ .a owwblb o bob db 0b o

m.' m 4- Cd c ccC co0 m 0 : m ~ 4 mu m CmIm 0ObbO b9b) C1. Cu

Page 88: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

CON C 000 O r- 0-

rl e fi :)

00 00 inr-t

110 C00 No C\ el

tn2~ 00

-- C) 00)C4r- O

rU- 00 r- -

N -~00

\- en ecc m0j & 5~0 5 & oCu r= -n 0N CCI

00\ .N i C

d) W

C C

d) Q 0 o d 2 c 4

Page 89: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

n00

E~ ,6~ 0\O M n 000

0 l 'C7N ON C 0en r. 00~-q - 0 ~ 0 O 00 'nn

g - - 00 -W

0r00 110 Ile W r 0O 00 0 en0CD t-N 0- D 00 %n0 r0 00

10 0

-

o~~~ ~ ~ ~ Q U- e 0 ~ 0

00 cn 000as *- -h

00 E 0

E Gn

Page 90: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C''

t.. 00 - -400

00 W)

0

Cw M m0~ 0%~ 00 'f tr0% tr ) Mfef W)r- r-

00 r- W)C50 6

0000en000

Snt M0~ "

CuC

00

0 0

C-)j

Page 91: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

-r5 ~ 5~ 5 55~%Co - C

1r, 00

00

a, 00

066

00 \

C',

Z60 -6W0 -

Page 92: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

L.4..

00 00 OOC4O OO O 0 C004 o f e ~-O0 00

-N 00

00 o

= rO - t- 00

C100

tn a\0040 0000C Dr

cci

U, y

CA-

W-

0- 000

.&n .- 4 U, U,

UU, LE

m ~ C. .

Z 0 CM c x u ' '

Page 93: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

00 C4 acq 10 o ~ 5 o o o 6IC0 00 C,4as

- ~ ~ O ONe~-~i

O000 00 r- -- Oc oo oo00 1. 0 00 qt "o - 0 '0 e

110o 0- r-' -C

e'en

0 r4

00 r-ONIT oC50

M r- 0000 ONa

wl 6 -w

c

060

CA U2z 0 6

Page 94: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

0 00 o It 1 - 0000C 0 C-oo o I C)e) m~ 'r $ o- i W O00 asmOC1 17, "0 00iI- I"o r! in

C4 0 0 t m I

0 m ri

-0 00f-r r-fr- o

co 0 c r- 0cO 00 0 0%oC>cc1 r- . a = in 1 a%

00

coo '-00N0o 00 0 000 t r4 C4 w 1110

cr_ r-0

Cu ccn Q v

oUZ, E

Page 95: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

- )C 0 0 0000 0 0 C>r in ~ r-W) or- 0 00Ir-o C) m \ -o I=

oooo oc~o r- 00 M ON 00C' mIf N

- o r- Or G

0 0 ~0 0

cccoo

000 0 0 r- cq 0700cICT ' qi \C (q 00-

CGD 000 1 e D

-. Nl -q

CC

to.

.- .- -

~z zLo~ ZZ c

=4~ V z

Page 96: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

. l

M O 00

Cu C- 0q0C400000000C

6c

Cul

02wC4A

Page 97: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

ON O en- W)r-

WO in C o '!%4 0-0N0 00r , n0 wo0w rOC4 f140 N0 - ON r-e 0 C 0e- ac

en 00 -) eq --- rq c - 00 n

L1 -4 o nc en r- 'e

'-4o c r- e (C4 - t qIt n

02CA

w

7BW

gp 000 rOb ge 005: 5: 4 m0 cc IF I m c wm'A.~~ ~ ~ ~ 0. 4 . LIC. C. 1. n w c.91

Page 98: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

OC Omoooo roooo ro55'rn e~ NI 0O0~

m e~'0 O 00 r- 10 0 C 0 I0

&4D~~~~ tn 00qT0t 0 0 0qtt Wn In0 -0 i 4

4.-4

ed C

coCd C

00& -CU r

m~U q- CU CU - WI.. 'b 0 0O% a ob abcis~~ ~ ~ ~ 0.. ed m6) co Ud Cd0@ 5Cs'a mC0c

Page 99: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C41 C1 4 4 nC c n W

4'W W)-

W) -nt - 0 Nen C444 n 0 4ene q'

4'l

ed'C

4o -q C* 1% 4 00 0' ~O ~ ON%-w ut

0 ~ 0

C-. ft

9002Yv Od .- ww, bbo co w coco8800 08: &I4'0088800

-- 26 - - 1 - ., ,..000 w.1 Oj0..0la.

Page 100: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

00(4 r 00 -4 ;

0 0

0. W- -- C-4

0 0

cc

00 c

002w2 02 C0 an

.- L0to202t c

Page 101: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

r- S~ Ir t oo o oo o oo o

wl - O'Rt )

400

0r-r m 140 en0 ' \0 0 0 0

en0t- 0oo 06 tono-o r- ' oo o o

40 ~ ~ C) t 6 0

cc eq en0 W

0

og

00

zz-

cC

> 0000 7g '

0 W ulz x >,) I

Page 102: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

o 0 en 00

'q~ f 00 'It \ 0or- en r- Men -4 i

W) 0 r' en0 eC4 00 00 -0 00 00r40~'

CA 0 i R ) Q 0r- r4 110 C 0 -

- nrItT I '":00

Cu - -- - - -e

'00 0 C -00cl N tO 0ON 0 0r-r'.00r

c! "t C) CC It e

4.-. c

CC5

000 00n Z ~ C.0' 00% C4 00'000 -

Page 103: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

-~N 0000 0 0 -Cu 00 00

00~r W)r-C)-00

'o 6-) 0 00 M fr 0 0

M0 C5 ~ C

c) (5-45 r- It 000 -- C )(

ON .) e 0 n"

06a

00. 00

r00 CON -- 0 o

I~ 0e 0

u ~ -

cn :s

ca.

U0> jz u

4,

94, gc z 0on F-L -- - A I

Page 104: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

-N - - - r -

00

-q \0 00 C1 -

-- tn 00

C 00 - (4 a,-O 0

. 0 C- e

in n -00n C0)00 e

eq 00

00

C11

I-i

Cr_

-~~~ 0)C

c 0)

uU C.U)Ct Co

g

cn~ z ed

Page 105: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

C% s%~f

'Ccn

0 eq 0 0 00%o 0O 0OO CDC C )CD0tnC

Q% I~ -) Qi 000000 nC

00 0)

- 0 - ' in~ oor-Ci4 10 00 0occ4

0* 00* .- 00 m

CU 014

c0%

>U ci CL

on6zD A 0, 9.C O .

Page 106: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

en(I 00 00C) ON' cr-

00O~~r r-U, r- mc M - %, 00

00~ 0

M, 00 ON C4 W %

Cu

r00 CIF) 1n12 in C' 00-

*- r-00

o

Cu-

G~cn

'4424-q

.5 2 nI 0 - L-

Page 107: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

- O ~0 rf- W e

00

-0 00 00 00 e

000 eri0\oo0ooooC14 r- rn 0 00 -

tn 00 m C

- - r- 00 O t - 1

C)4. -1

0 0

E A

4.)44

_ _ _~ o Q ~c f J

Page 108: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

~0 CI

COP

0

Cd

lC 19

Page 109: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

00C CN'4' C-S

r- 00 r- 0 C\rm 0

Q~ .9C4 ~ \ O ~ \ 0.As C

So0 C 0t )N0 q0 )0C 0I -r U> U nol0C 'T10 0 % 0

cogo

SQ U* nW )I 0 C 1

00 .2 *4e C

in Ow CCI0 M L.cq* C

cis U 0 0

Wu wu 06 mU C' 4" 1610. "1

Page 110: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

W~owoooo 0030000 ool0r-o

tn C04~ ON 0 in 00~ 00C)O

CCIx

cn ~Cf

W) C1 N Ob) ~r4 0N 0 0DbC14

cc~UC ' '

Page 111: Ethernet Bandwidth Utilization of Datafull, Dataless, and ... · less, and diskless nodes, as well as X-Terminals, many questions arise as to net-work capacity planning. This report

S00 en t n .4C, C

W_ N Q00O' 00 kn cn~~r

- o \00.- 00 0 CAcq n 'IT ~C1'4 in~

('4 enC en C O ~

U2

080

0 E'S7 B7

0A 0 =w_ M 0. . .