合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

        COMPSCI 315代做、代寫Python/Java語言編程
        COMPSCI 315代做、代寫Python/Java語言編程

        時間:2024-09-26  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



        Web Server Workload Characterization
        Assignment 3 and 4, COMPSCI 315
        Due: Refer to the deadline on Canvas; Submission via Canvas
        1 Introduction
        Internet traffic measurement involves collecting network data that can be analyzed for several purposes such
        as traffic modeling, designing better network protocols, and traffic management. The growth in popularity
        of Web in the 19**s resulted in researchers trying to characterize Web traffic. These research works have
        utilized Web server logs to understand the workload characteristics of Web servers. The results of the
        research has led to improving performance of Web applications, designing better caching and load balancing
        techniques, and providing better user experience to clients, among other things [1, 3–5].
        2 Web Server Access Logs
        In this assignment, you will analyze one of two university Web server access logs [2]:
        1. A campus-wide Web server at the University of Saskatchewan (UofS_access_log).
        2. A department-level Web server at the University of Calgary (UofC_access_log).
        The server access log contains information about all requests made to the server and the corresponding
        server responses. The server log is in the fixed text-based Common Log Format and has the following syntax:
        hostname - - [dd/mm/yyyy:hh:mm:ss time_zone] object response_code transfer_size
        The hostname is the resolved name or IP address of the client making a request for an object stored on
        the Web server. The following fields (- -) are usually empty, but may contain user-identifier information
        such as username. The next field indicates the day and time the request was made along with the time zone.
        The URL requested is noted in the object field. The response_code field indicates the HTTP response
        code returned by the server. The transfer_size field records the bytes transferred by the server.
        For example, the following is a line from the UofS_access_log:
        imhotep.usask.ca - - [15/Sep/1995:16:02:09 -0600] "GET /changes.html HTTP/1.0" 200 1254
        This line represents a request made by host imhotep.usask.ca on September 15, 1995 at 4:02:09 p.m.
        The time zone is central time (GMT-0600). The host requested the HTML file called changes.html using
        HTTP version 1.0. This request was successfully completed by the server as shown by the status code 200.
        The server transferred 1254 bytes to the host imhotep.usask.ca.
        Note the following about the datasets:
        • UofS_access_log: This trace contains seven month’s worth of all HTTP requests to the university
        Web server. The logs fully preserve the originating host and HTTP request. A local client is one
        containing usask.ca in the hostname or an IP address with 128.233.X.X. All others are considered
        remote clients. Timestamps have 1 second resolution.
        1• UofC_access_log: This trace contains approximately one year’s worth of all HTTP requests to the
        University of Calgary’s Department of Computer Science Web server. The hosts making requests to
        the server have had their addresses removed to preserve privacy. Hosts are identified as either local
        or remote where local is a host from the University of Calgary, and remote is a host from outside of
        the University of Calgary domain. Paths have been removed. Files were numbered from 1 for the
        first file encountered in the trace. Files retain the original file extension, so that the type of file can
        be determined. Paths of the filenames have been removed. Modified filenames consist of two parts:
        num.type, where num is a unique integer identifier, and type is the extension of the requested file.
        Timestamps have 1 second resolution.
        3 Web Server Workload Analysis
        Choose one dataset you like and answer all questions:
        1. Based on your learning of Internet measurements in this course answer the following questions:
        (a) What measurement mechanism was used for the collection of the Web server logs? Active, Passive,
        or both.
        (b) What type of network were the measurements taken from? Edge network, core network, or both.
        (c) What type of analysis techniques did you apply on the dataset to get the answers? Online, offline,
        or both.
        (d) Is analyzing server logs the only way to characterize the workload of a Web server? Why?
        2. How many requests are made per day on average?
        3. How many bytes were transferred during the entire log duration expressed in Megabytes (MB)?
        4. What is the average number of bytes transferred per day expressed in MB per day?
        5. Produce a breakdown of the server response codes expressed in percentage of the total number of
        requests. Group the status code as follows: Successful, Not Modified, Found, Unsuccessful. A successful
        response (status code: 200) means that the server received a request for a valid object (for which the
        client has the necessary access privilege), the object was found, and returned successfully to the client.
        A not modified response (status code: 304) means that the client already has a copy of the requested
        object in its cache, wants to verify if the object is up-to-date, and the client is informed that the
        object has not been modified at the server. A found response (status code: 302) results when the
        requested object is known to be stored in a different location than the URL requested by the client.
        The server responds with the new URL in this situation. A unsuccessful response (status code: 4XX
        and 5XX) happens when the requested object does not exist on the server, the client did not have
        access permission, or there was a server-side error.
        6. How many requests are made by local clients and remote clients, respectively? Report your answer as
        a percentage of total requests.
        7. How many bytes are transferred by local clients and remote clients, respectively? Report your answer
        as a percentage of total bytes transferred.
        8. Produce a breakdown of requests by file type category. The file categories are as follows: Video, Sound,
        Dynamic, Formatted, HTML, Images, Others. Report your answer as a percentage of total requests.
        The file categories by file extensions are described in Table 1.
        9. Using Table 1, produce a breakdown of bytes transferred by each file category. Report your answer as
        a percentage of total bytes transferred.
        10. Using Table 1, calculate the average transfer sizes (in bytes) of each file category.
        2Table 1: File categories
        Category File extension
        HTML html, htm, shtml, map
        Images gif, jpeg, jpg, xbm, bmp, rgb, xpm
        Sound au, snd, wav, mid, midi, lha, aif, aiff
        Video mov, movie, avi, qt, mpeg, mpg
        Formatted ps, eps, doc, dvi, txt
        Dynamic cgi, pl, cgi-bin
        Others Everything else
        11. Identify all unique object requests in the log and sort them based on frequency. Next, identify all the
        objects that were requested only once in the log. What percentage of unique objects are accessed only
        once in the log? What percentage of bytes are accessed only once in the log?
        12. Produce a Cumulative Distribution Function (CDF) plot of the transfer sizes of all distinct objects.
        The x-axis should be in log-10 scale.
        13. Produce at least one plot to show the percentage of total requests per hour of the day, the percentage
        of total requests per day of the week, or percentage of total requests per month of the year.
        14. Produce a CDF plot of the inter-reference times of objects that are requested more than once. The
        x-axis should be in log-10 scale.
        For questions 6 onwards, your analysis should be based on successful requests only. Report
        your results to 2 decimal places. Some requests in the log may be malformed. It is safe to
        ignore these requests in your analysis. Please check that these requests account for a negligible
        fraction of the total requests. Briefly comment on your results (Explain the results and discuss
        their implications).
        4 Submission
        Complete the attached file with your answers. Convert this file to PDF format. Rename it
        to your username.pdf. Submit the file to Canvas. Submit answers to questions **7 as part of
        Assignment 3. Submit answers to questions 8-14 as part of Assignment 4.
        A code template will be provided at a later date. For added challenge, you are encouraged to write the
        parser and analysis scripts from scratch using a programming language of your choice. You are free to use
        online resources (e.g., online code, tools) as long as you provide appropriate attribution. You do not need
        to submit the code. You should keep the code, in case we wish to see it. You are encouraged to discuss the
        assignment with each other, however, the code and the produced results must be done individually.
        Questions regarding this assignment and code template should be directed to the course tutors.
        5 Grading Scheme
        Each question is worth 10 points. Assignment 3 is worth 70 points. Assignment 4 is worth 70 points. For
        each question, you will receive full points for the correct answer. You will receive 50% points for an answer,
        which is close to the correct answer. You will receive zero points for an answer that is far off from the correct
        answer. Each answer should have a brief explanation to receive full marks.
        References
        [1] Martin Arlitt and Tai Jin, A Workload Characterization Study of the 1998 World Cup Web Site, IEEE
        Network 14 (2000), no. 3.
        3[2] Martin Arlitt and Carey Williamson, Internet Web Servers: Workload Characterization and Performance
        Implications, IEEE/ACM Trans. Netw. 5 (1997), no. 5, 631–645.
        [3] Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Characterization of a Large Web
        Site Population with Implications for Content Delivery, WWW 9 (2006), no. 4.
        [4] Venkata Padmanabhan and Lili Qiu, The Content and Access Dynamics of a Busy Web Site: Findings
        and Implications, Proc. ACM SIGCOMM, 2000.
        [5] Weisong Shi, Y Wright, Eli Collins, and Vijay Karamcheti, Workload Characterization of a Personalized
        Web Site and its Implications for Dynamic Content Caching, Proc. WCW, 2002.


        請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp








         

        掃一掃在手機打開當前頁
      1. 上一篇:代寫AI6012程序、代做Java/c++編程
      2. 下一篇:INFT 2064代做、代寫C++, Java設計編程
      3. 無相關信息
        合肥生活資訊

        合肥圖文信息
        急尋熱仿真分析?代做熱仿真服務+熱設計優化
        急尋熱仿真分析?代做熱仿真服務+熱設計優化
        出評 開團工具
        出評 開團工具
        挖掘機濾芯提升發動機性能
        挖掘機濾芯提升發動機性能
        海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
        海信羅馬假日洗衣機亮相AWE 復古美學與現代
        合肥機場巴士4號線
        合肥機場巴士4號線
        合肥機場巴士3號線
        合肥機場巴士3號線
        合肥機場巴士2號線
        合肥機場巴士2號線
        合肥機場巴士1號線
        合肥機場巴士1號線
      4. 短信驗證碼 酒店vi設計 deepseek 幣安下載 AI生圖 AI寫作 aippt AI生成PPT

        關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

        Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
        ICP備06013414號-3 公安備 42010502001045

        主站蜘蛛池模板: 亚洲AV无码一区二区三区久久精品| 尤物精品视频一区二区三区 | 麻豆国产在线不卡一区二区| 亚洲一区精品伊人久久伊人| 亚欧免费视频一区二区三区| 国产美女视频一区| 国产主播福利一区二区| 最美女人体内射精一区二区| 精品视频一区二区观看| 精品无码人妻一区二区三区18| 一区二区三区四区视频| 久久福利一区二区| 日韩精品无码视频一区二区蜜桃| 国产人妖视频一区在线观看| 天天视频一区二区三区| 高清精品一区二区三区一区| 日韩人妻一区二区三区蜜桃视频| 岛国无码av不卡一区二区| 亚洲AⅤ无码一区二区三区在线| 国产未成女一区二区三区| 亚洲AV无码国产精品永久一区| 精品视频无码一区二区三区| 亚欧色一区W666天堂| 人妻无码久久一区二区三区免费| 亚洲一区二区三区在线观看精品中文 | 无码一区二区三区视频| 亚洲国产精品一区二区第一页| 国产精品亚洲不卡一区二区三区| 无码人妻一区二区三区精品视频| 亚洲AV日韩精品一区二区三区| 婷婷国产成人精品一区二| 精品一区二区三区在线观看l | 一区二区传媒有限公司| 国产精品综合AV一区二区国产馆| 亚洲高清一区二区三区| 国产乱码精品一区二区三区| 精品欧美一区二区在线观看 | 亚洲一区电影在线观看| 精品无人区一区二区三区 | 中文字幕在线观看一区二区 | 免费高清av一区二区三区|