System Performance Tuning. 2nd Edition

- Autorzy:
- Gian-Paolo D. Musumeci, Mike Loukides
- Promocja Przejdź


- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 352
- Dostępne formaty:
-
ePubMobi
Opis książki: System Performance Tuning. 2nd Edition
System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware? In the current economic downturn, performance tuning takes on a new importance. It allows system administrators to make the best use of existing systems and minimize the purchase of new equipment. Well-tuned systems save money and time that would otherwise be wasted dealing with slowdowns and errors. Performance tuning always involves compromises; unless system administrators know what the compromises are, they can't make intelligent decisions.Tuning is an essential skill for system administrators who face the problem of adapting the speed of a computer system to the speed requirements imposed by the real world. It requires a detailed understanding of the inner workings of the computer and its architecture. System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. Topics covered include:
- Real and perceived performance problems, introducing capacity planning and performance monitoring (highlighting their strengths and weaknesses).
- An integrated description of all the major tools at a system administrator's disposal for tracking down system performance problems.
- Background on modern memory handling techniques, including the memory-caching filesystem implementations in Solaris and AIX. Updated sections on memory conservation and computing memory requirements.
- In depth discussion of disk interfaces, bandwidth capacity considerations, and RAID systems.
- Comprehensive discussion of NFS and greatly expanded discussion of networking.
- Workload management and code tuning.
- Special topics such as tuning Web servers for various types of content delivery and developments in cross-machine parallel computing
Wybrane bestsellery
-
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployment...
Juniper SRX Series. A Comprehensive Guide to Security Services on the SRX Series Juniper SRX Series. A Comprehensive Guide to Security Services on the SRX Series
(0,00 zł najniższa cena z 30 dni)271.15 zł
319.00 zł(-15%) -
Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical gu...
Network Programmability and Automation. Skills for the Next-Generation Network Engineer Network Programmability and Automation. Skills for the Next-Generation Network Engineer
(0,00 zł najniższa cena z 30 dni)169.15 zł
199.00 zł(-15%) -
Explore the emerging definitions, protocols, and standards for SDN—software-defined, software-driven, programmable networks—with this comprehensive guide. Two senior network engineers show you what’s required for building networks that use software for bi-directional communicati...
SDN: Software Defined Networks. An Authoritative Review of Network Programmability Technologies SDN: Software Defined Networks. An Authoritative Review of Network Programmability Technologies
(0,00 zł najniższa cena z 30 dni)203.15 zł
239.00 zł(-15%) -
It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical—and nontechnical—steps involved. Many of the challenges for your enterprise...
Planning for IPv6. IPv6 Is Now. Join the New Internet Planning for IPv6. IPv6 Is Now. Join the New Internet
(0,00 zł najniższa cena z 30 dni)80.74 zł
94.99 zł(-15%) -
Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administrators—including the most recent set of flow-based security services and design guidelines that incorporate...
Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition
(0,00 zł najniższa cena z 30 dni)220.15 zł
259.00 zł(-15%) -
Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with r...
Time Management for System Administrators. Stop Working Late and Start Working Smart Time Management for System Administrators. Stop Working Late and Start Working Smart
(0,00 zł najniższa cena z 30 dni)118.15 zł
139.00 zł(-15%) -
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data ...(0,00 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their life...
Using SANs and NAS. Help for Storage Administrators Using SANs and NAS. Help for Storage Administrators
(0,00 zł najniższa cena z 30 dni)101.15 zł
119.00 zł(-15%) -
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing
-
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platform
Gian-Paolo D. Musumeci, Mike Loukides - pozostałe książki
-
In the early days of the 20th century, department store magnate JohnWanamaker famously said, "I know that half of my advertising doesn'twork. The problem is that I don't know which half." That remainedbasically true until Google transformed advertising with AdSense basedon new uses of data and an...
-
Have we entered the age of NoOps infrastructures? Hardly. Old-style system administrators may be disappearing in the face of automation and cloud computing, but operations have become more significant than ever. As this O’Reilly Radar Report explains, we’re moving into a more complex ...
-
In the past few years, we’ve seen many data products based on predictive modeling. These products range from weather forecasting to recommendation engines like Amazon's. Prediction technology can be interesting and mathematically elegant, but we need to take the next step: going from recomm...
-
This report examines the important shifts in data products. Drawing from diverse examples, including iTunes, Google's self-driving car, and patient monitoring, author Mike Loukides explores the "disappearance" of data, the power of combining data, and the difference between discovery and recommen...
-
We've all heard it: according to Hal Varian, statistics is the next sexy job. Five years ago, in What is Web 2.0, Tim O'Reilly said that "data is the next Intel Inside." But what does that statement mean? Why do we suddenly care about statistics and about data? This report examines the many sides...
Ebooka przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video zobaczysz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP4 (pliki spakowane w ZIP)
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5204-6, 9780596552046
- Data wydania ebooka:
-
2002-02-05
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@helion.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.0MB
- Rozmiar pliku Mobi:
- 3.2MB
- Kategorie:
Sieci komputerowe
Spis treści książki
- System Performance Tuning, 2nd Edition
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who Should Buy This Book?
- A Note on Coverage
- How to Read This Book
- This Book as a Story
- This Book as a Reference
- Organization
- Typographic Conventions
- Comments and Questions
- Personal Comments and Acknowledgments
- Acknowledgments from Mike Loukides
- 1. An Introduction to Performance Tuning
- 1.1. An Introduction to Computer Architecture
- 1.1.1. Levels of Transformation
- 1.1.1.1. Software: algorithms and languages
- 1.1.1.2. The Instruction Set Architecture
- 1.1.1.3. Hardware: microarchitecture, circuits, and devices
- 1.1.1. Levels of Transformation
- 1.1.2. The von Neumann Model
- 1.1.3. Caches and the Memory Hierarchy
- 1.1.4. The Benefits of a 64-Bit Architecture
- 1.1.4.1. What does it mean to be 64-bit?
- 1.1.4.2. Performance ramifications
- 1.1. An Introduction to Computer Architecture
- 1.2. Principles of Performance Tuning
- 1.2.1. Principle 0: Understand Your Environment
- 1.2.2. Principle 1: TANSTAAFL!
- 1.2.3. Principle 2: Throughput Versus Latency
- 1.2.4. Principle 3: Do Not Overutilize a Resource
- 1.2.5. Principle 4: Design Tests Carefully
- 1.3. Static Performance Tuning
- 1.3.1. Other Miscellaneous Things to Check
- 1.4. Concluding Thoughts
- 2. Workflow Management
- 2.1. Workflow Characterization
- 2.1.1. Simple Commands
- 2.1.2. Process Accounting
- 2.1.2.1. Enabling process accounting
- 2.1.2.2. Reviewing accounting records
- 2.1.3. Automating sar
- 2.1.3.1. Enabling sar
- 2.1.3.2. Retrieving data
- 2.1. Workflow Characterization
- 2.1.4. Virtual Adrian
- 2.1.5. Network Pattern Analysis
- 2.1.5.1. Pattern 1: request-response
- 2.1.5.2. Pattern 1B: inverse request-response
- 2.1.5.3. Pattern 2: data transfer
- 2.1.5.4. Pattern 3: message passing
- 2.1.5.5. Packet size distributions
- 2.2. Workload Control
- 2.2.1. Education
- 2.2.1.1. Usage and performance agreements
- 2.2.1. Education
- 2.2.2. The maxusers and the pt_cnt Parameters
- 2.2.3. Limiting Users
- 2.2.3.1. Quotas
- 2.2.3.2. Environmental limits
- 2.2.4. Complex Environments
- 2.3. Benchmarking
- 2.3.1. MIPS and Megaflops
- 2.3.1.1. MIPS
- 2.3.1.2. Megaflops
- 2.3.1. MIPS and Megaflops
- 2.3.2. Component-Specific Benchmarks
- 2.3.2.1. Linpack
- 2.3.2.2. SPECint and SPECfp
- 2.3.3. Commercial Workload Benchmarks
- 2.3.3.1. TPC
- 2.3.3.2. SPECweb99
- 2.3.4. User Benchmarks
- 2.3.4.1. Choose your problem set
- 2.3.4.2. Choose your runtime
- 2.3.4.3. Automate heavily
- 2.3.4.4. Set benchmark runtime rules
- 2.4. Concluding Thoughts
- 3. Processors
- 3.1. Microprocessor Architecture
- 3.1.1. Clock Rates
- 3.1.2. Pipelining
- 3.1.2.1. Variable-length instructions
- 3.1.2.2. Branches
- 3.1.3. The Second Generation of RISC Processor Design
- 3.1. Microprocessor Architecture
- 3.2. Caching
- 3.2.1. The Cache Hierarchy
- 3.2.2. Cache Organization and Operation
- 3.2.3. Associativity
- 3.2.4. Locality and "Cache-Busters"
- 3.2.4.1. Unit stride
- 3.2.4.2. Linked lists
- 3.2.4.3. Cache-aligned block copy problems
- 3.2.5. The Cache Size Anomaly
- 3.3. Process Scheduling
- 3.3.1. The System V Model: The Linux Model
- 3.3.1.1. Finding a processs priority
- 3.3.1.2. Adjusting a process's effective priority
- 3.3.1.3. Modifications for SMP systems
- 3.3.1. The System V Model: The Linux Model
- 3.3.2. Multilayered Scheduling Classes: The Solaris Model
- 3.3.2.1. The Solaris threading model
- 3.3.2.2. Scheduling classes
- 3.3.2.3. The dispatcher
- 3.3.2.4. Checking a process's priority
- 3.3.2.5. Tuning the dispatch tables
- 3.3.2.6. Adjusting priorities
- 3.4. Multiprocessing
- 3.4.1. Processor Communication
- 3.4.1.1. Buses
- 3.4.1.2. Crossbars
- 3.4.1.3. UltraSPARC-III systems: Fireplane
- 3.4.1.4. "Interconnectionless" architectures
- 3.4.1. Processor Communication
- 3.4.2. Operating System Multiprocessing
- 3.4.3. Threads
- 3.4.4. Locking
- 3.4.5. Cache Influences on Multiprocessor Performance
- 3.5. Peripheral Interconnects
- 3.5.1. SBus
- 3.5.1.1. Clock speed
- 3.5.1.2. Burst transfer size
- 3.5.1.3. Transfer mode
- 3.5.1.4. Summary of SBus implementations
- 3.5.1.5. SBus card utilization
- 3.5.1. SBus
- 3.5.2. PCI
- 3.5.2.1. PCI bus transactions
- 3.5.2.2. CompactPCI
- 3.5.3. A Summary of Peripheral Interconnects
- 3.5.4. Interrupts in Linux
- 3.5.5. Interrupts in Solaris
- 3.6. Processor Performance Tools
- 3.6.1. The Load Average
- 3.6.2. Process Queues
- 3.6.3. Specific Breakdowns
- 3.6.4. Multiprocessor Systems
- 3.6.5. top and prstat
- 3.6.6. Lock Statistics
- 3.6.7. Controlling Processors in Solaris
- 3.6.7.1. psrinfo
- 3.6.7.2. psradm
- 3.6.7.3. psrset
- 3.6.8. Peripheral Interconnect Performance Tools
- 3.6.9. Advanced Processor Performance Statistics
- 3.7. Concluding Thoughts
- 4. Memory
- 4.1. Implementations of Physical Memory
- 4.2. Virtual Memory Architecture
- 4.2.1. Pages
- 4.2.2. Segments
- 4.2.3. Estimating Memory Requirements
- 4.2.4. Address Space Layout
- 4.2.5. The Free List
- 4.2.5.1. Virtual memory management in Linux
- 4.2.6. Page Coloring
- 4.2.7. Transaction Lookaside Buffers (TLB)
- 4.3. Paging and Swapping
- 4.3.1. The Decline and Fall of Interactive Performance
- 4.3.2. Swap Space
- 4.3.2.1. Anonymous memory
- 4.3.2.2. Sizing swap space
- 4.3.2.3. Organizing swap space
- 4.3.2.4. Swapfiles
- 4.4. Consumers of Memory
- 4.4.1. Filesystem Caching
- 4.4.2. Filesystem Cache Writes: fsflush and bdflush
- 4.4.2.1. Solaris: fsflush
- 4.4.2.2. Linux: bdflush
- 4.4.3. Interactions Between the Filesystem Cache and Memory
- 4.4.3.1. Priority paging
- 4.4.3.2. Cyclic caching
- 4.4.4. Interactions Between the Filesystem Cache and Disk
- 4.5. Tools for Memory Performance Analysis
- 4.5.1. Memory Benchmarking
- 4.5.1.1. STREAM
- 4.5.1.2. lmbench
- 4.5.1. Memory Benchmarking
- 4.5.2. Examining Memory Usage System-Wide
- 4.5.2.1. vmstat
- 4.5.2.2. sar
- 4.5.2.3. memstat
- 4.5.3. Examining Memory Usage of Processes
- 4.5.3.1. Solaris tools
- 4.5.4. Linux Tools
- 4.6. Concluding Thoughts
- 5. Disks
- 5.1. Disk Architecture
- 5.1.1. Zoned Bit Rate (ZBR) recording
- 5.1.1.1. Disk caches
- 5.1.1. Zoned Bit Rate (ZBR) recording
- 5.1.2. Access Patterns
- 5.1.3. Reads
- 5.1.4. Writes
- 5.1.4.1. UFS write throttling
- 5.1. Disk Architecture
- 5.1.5. Performance Specifications
- 5.1.5.1. One million bytes is a megabyte?
- 5.1.5.2. Burst speed versus internal transfer speed
- 5.1.5.3. Internal transfer speed versus actual speed
- 5.1.5.4. Average seek time
- 5.1.5.5. Storage capacity and access capacity
- 5.2. Interfaces
- 5.2.1. IDE
- 5.2.1.1. Improving IDE performance in Linux
- 5.2.1.2. Limitations of IDE drives
- 5.2.1. IDE
- 5.2.2. IPI
- 5.2.3. SCSI
- 5.2.3.1. Multi-initiator SCSI
- 5.2.3.2. Bus transactions
- 5.2.3.3. Synchronous versus asynchronous transfers
- 5.2.3.4. Termination
- 5.2.3.5. Command queuing
- 5.2.3.6. Differential signaling
- 5.2.3.7. Bus utilization
- 5.2.3.8. Mixing different speed SCSI devices
- 5.2.3.9. SCSI implementations
- 5.2.4. Fibre Channel
- 5.2.5. IEEE 1394 (FireWire)
- 5.2.6. Universal Serial Bus (USB)
- 5.3. Common Performance Problems
- 5.3.1. High I/O Skew
- 5.3.2. Memory-Disk Interactions
- 5.3.3. High Service Times
- 5.4. Filesystems
- 5.4.1. vnodes, inodes, and rnodes
- 5.4.1.1. The directory name lookup cache (DNLC)
- 5.4.1. vnodes, inodes, and rnodes
- 5.4.2. The Unix Filesystem (UFS)
- 5.4.2.1. inode density
- 5.4.2.2. Filesystem cluster size
- 5.4.2.3. Minimum free space
- 5.4.2.4. Rotational delay
- 5.4.2.5. fstyp and tunefs
- 5.4.2.6. Bypassing memory caching
- 5.4.2.7. The inode cache
- 5.4.2.8. The buffer cache
- 5.4.3. Logging Filesystems
- 5.4.3.1. Solstice:DiskSuite
- 5.4.3.2. Solaris
- 5.4.4. The Second Extended Filesystem (EXT2)
- 5.4.5. The Third Extended Filesystem (EXT3)
- 5.4.5.1. Tuning the elevator algorithm
- 5.4.5.2. Choosing a journaling mode
- 5.4.5.3. Transitioning from ext2 to ext3
- 5.4.6. The Reiser Filesystem (ReiserFS)
- 5.4.6.1. Tail packing
- 5.4.7. The Journaled Filesystem (JFS)
- 5.4.8. The Temporary Filesystem (tmpfs)
- 5.4.9. Veritas VxFS
- 5.4.10. Caching Filesystems (CacheFS)
- 5.4.10.1. Minimizing seek times by filesystem layout
- 5.5. Tools for Analysis
- 5.5.1. Enabling Disk Caches
- 5.5.2. Disk Performance Benchmarking
- 5.5.2.1. hdparm
- 5.5.2.2. tiobench
- 5.5.2.3. iozone
- 5.5.3. Second-Time-Through Improvements?
- 5.5.4. Using iostat
- 5.5.4.1. Historical limitations: iostat and queuing terminology
- 5.5.5. Using sar
- 5.5.6. I/O Tracing
- 5.5.6.1. Using the kernel probes
- 5.5.6.2. Using process filtering
- 5.5.6.3. Restarting prex
- 5.6. Concluding Thoughts
- 6. Disk Arrays
- 6.1. Terminology
- 6.2. RAID Levels
- 6.2.1. RAID 0: Striping
- 6.2.2. RAID 1: Mirroring
- 6.2.3. RAID 2: Hamming Code Arrays
- 6.2.4. RAID 3: Parity-Protected Striping
- 6.2.5. RAID 4: Parity-Protected Striping with Independent Disks
- 6.2.6. RAID 5: Distributed, Parity-Protected Striping
- 6.2.7. RAID 10: Mirrored Striping
- 6.3. Software Versus Hardware
- 6.3.1. Software
- 6.3.2. Hardware
- 6.3.2.1. RAID overlap
- 6.4. A Summary of Disk Array Design
- 6.4.1. Choosing a RAID Level
- 6.5. Software RAID Implementations
- 6.5.1. Solaris: Solstice DiskSuite
- 6.5.1.1. State databases
- 6.5.1.2. RAID 0: stripes
- 6.5.1.3. RAID 1: mirrors
- 6.5.1.4. RAID 5 arrays
- 6.5.1.5. Hot spare pools
- 6.5.1. Solaris: Solstice DiskSuite
- 6.5.2. Linux: md
- 6.5.2.1. Persistent superblocks
- 6.5.2.2. Chunk size
- 6.5.2.3. Linear mode
- 6.5.2.4. RAID 0: stripes
- 6.5.2.5. RAID 1: mirrors
- 6.5.2.6. RAID 5 arrays
- 6.5.2.7. Creating the array
- 6.5.2.8. Autodetection
- 6.5.2.9. Booting from an array device
- 6.6. RAID Recipes
- 6.6.1. Attribute-Intensive Home Directories
- 6.6.2. Data-Intensive Home Directories
- 6.6.3. High Performance Computing
- 6.6.4. Databases
- 6.6.5. Case Study: Applications Doing Large I/O
- 6.7. Concluding Thoughts
- 7. Networks
- 7.1. Network Principles
- 7.1.1. The OSI Model
- 7.1. Network Principles
- 7.2. Physical Media
- 7.2.1. UTP
- 7.2.1.1. A note on terminology: plugs and jacks
- 7.2.1. UTP
- 7.2.2. Fiber
- 7.3. Network Interfaces
- 7.3.1. Ethernet
- 7.3.1.1. Fundamentals of Ethernet signaling
- 7.3.1.2. Topologies
- 7.3.1.3. 10BASE-T
- 7.3.1.4. 100BASE-T4
- 7.3.1.5. 100BASE-TX
- 7.3.1.6. Gigabit Ethernet topologies
- 7.3.1.7. The 5-4-3 rule
- 7.3.1.8. Collisions
- 7.3.1.9. Autonegotiation
- 7.3.1.10. Displaying and setting modes
- 7.3.1. Ethernet
- 7.3.2. FDDI
- 7.3.3. ATM
- 7.3.4. Ethernet Versus ATM/FDDI
- 7.4. Network Protocols
- 7.4.1. IP
- 7.4.1.1. Fragmentation
- 7.4.1.2. Time-to-live
- 7.4.1.3. Protocols
- 7.4.1.4. IP addresses
- 7.4.1.5. Classful addressing
- 7.4.1.6. Subnetting classful networks
- 7.4.1.7. Moving to a classless world
- 7.4.1.8. Routing
- 7.4.1. IP
- 7.4.2. TCP
- 7.4.2.1. Connection initiation and SYN flooding
- 7.4.2.2. Path MTU discovery and the maximum segment size
- 7.4.2.3. Buffers, watermarks, and windows
- 7.4.2.4. Retransmissions
- 7.4.2.5. Deferring acknowledgments
- 7.4.2.6. Window congestion and the slow start algorithm
- 7.4.2.7. TCP timers and intervals
- 7.4.2.8. The Nagle algorithm
- 7.4.3. UDP
- 7.4.4. TCP Versus UDP for Network Transport
- 7.5. NFS
- 7.5.1. Characterizing NFS Activity
- 7.5.2. Tuning Clients
- 7.5.2.1. Obtaining statistics for an NFS-mounted filesystem
- 7.5.2.2. The rnode cache
- 7.5.2.3. Tuning NFS clients for bursty transfers
- 7.5.2.4. Tuning NFS clients for sequential transfer
- 7.5.3. Tuning Servers
- 7.5.3.1. Designing disk subsystems for NFS servers
- 7.5.3.2. NVRAM caching
- 7.5.3.3. Memory requirements
- 7.5.3.4. The two basic types of NFS servers
- 7.5.3.5. Tuning the number of NFS threads
- 7.5.3.6. Adjusting the buffer cache
- 7.5.3.7. The maxusers parameter
- 7.5.3.8. The directory name lookup cache (DNLC)
- 7.5.3.9. The inode cache
- 7.5.3.10. Observing NFS server performance with nfsstat
- 7.5.4. Wide Area Networks and NFS
- 7.6. CIFS via Unix
- 7.7. Concluding Thoughts
- 8. Code Tuning
- 8.1. The Two Critical Approaches
- 8.1.1. String Searching Algorithms
- 8.1.1.1. Algorithm 1: naive searching
- 8.1.1.2. Algorithm 2: Knuth-Morris-Pratt searching
- 8.1.1.3. Algorithm 3: Boyer-Moore searching
- 8.1.1. String Searching Algorithms
- 8.1.2. Caveats in Optimization
- 8.1. The Two Critical Approaches
- 8.2. Techniques for Code Analysis
- 8.2.1. Application Timing: time, timex, and ptime
- 8.2.1.1. time
- 8.2.1.2. timex
- 8.2.1.3. ptime
- 8.2.1.4. Mechanisms of timing
- 8.2.1. Application Timing: time, timex, and ptime
- 8.2.2. Timing-Specific Code Sections
- 8.2.2.1. Timing via gethrtime
- 8.2.2.2. Timing via the TICK register
- 8.2.3. Probe-Based Analysis: Solaris TNF
- 8.2.3.1. Inserting probes
- 8.2.3.2. Caveats
- 8.2.4. Profiler-Based Analysis: gprof
- 8.2.4.1. Implementing profiling
- 8.2.4.2. Compiling with profiling
- 8.2.4.3. Execution with profiling
- 8.2.4.4. Profile analysis
- 8.2.4.5. Caveats
- 8.3. Optimization Patterns
- 8.3.1. Arithmetic
- 8.3.2. Loops
- 8.3.3. Strings
- 8.4. Interacting with Compilers
- 8.4.1. Typical Optimizations: -fast
- 8.4.2. Optimization Level: -xO
- 8.4.3. Specifying Instruction Set Architecture: -xarch
- 8.4.4. Specifying Processor Architecture: -xchip
- 8.4.5. Function Inlining: -xinlining and -xcrossfile
- 8.4.6. Data Dependency Analysis: -xdepend
- 8.4.7. Vector Operations: -xvector
- 8.4.8. Default Floating Point Constant Size: -xsfpconst
- 8.4.9. Data Prefetching: -xprefetch
- 8.4.10. Quick and Dirty Compiler Flags
- 8.4.11. Profiling Feedback
- 8.5. Concluding Thoughts
- 9. Instant Tuning
- 9.1. Top Five Tuning Tips
- 9.1.1. Where Is the Disk Bottleneck?
- 9.1.2. Do You Have Enough Memory?
- 9.1.3. Are the Processors Overloaded?
- 9.1.4. Are Processes Blocked on Disk I/O?
- 9.1.5. Does System Time Heavily Dominate User Time?
- 9.1. Top Five Tuning Tips
- 9.2. Instant Tuning Recipes
- 9.2.1. Single-User Development Workstations
- 9.2.1.1. Filesystems
- 9.2.1.2. Swap space
- 9.2.1.3. Kernel tuning
- 9.2.1. Single-User Development Workstations
- 9.2.2. Workgroup Servers
- 9.2.2.1. Memory
- 9.2.2.2. Disks
- 9.2.2.3. Filesystems
- 9.2.2.4. Swap space
- 9.2.2.5. Optimizing NFS
- 9.2.2.6. Kernel tuning
- 9.2.3. Web Servers
- 9.2.3.1. Memory
- 9.2.3.2. Disks
- 9.2.3.3. Filesystems
- 9.2.3.4. Swap space
- 9.2.3.5. Networks
- 9.2.3.6. Kernel tuning
- 9.2.3.7. Special case: proxy servers
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the proce...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Edge AI is transforming the way computers interact with the real world, allowing IoT devices to make decisions using the 99% of sensor data that was previously discarded due to cost, bandwidth, or power limitations. With techniques like embedded machine learning, developers can capture human intu...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all ...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Python was recently ranked as today's most popular programming language on the TIOBE index, thanks to its broad applicability to design and prototyping to testing, deployment, and maintenance. With this updated fourth edition, you'll learn how to get the most out of Python, whether you're a profe...(0,00 zł najniższa cena z 30 dni)
305.15 zł
359.00 zł(-15%) -
With the accelerating speed of business and the increasing dependence on technology, companies today are significantly changing the way they build in-house business solutions. Many now use low-code and no code technologies to help them deal with specific issues, but that's just the beginning. Wit...
Building Solutions with the Microsoft Power Platform Building Solutions with the Microsoft Power Platform
(0,00 zł najniższa cena z 30 dni)271.15 zł
319.00 zł(-15%) -
Companies are scrambling to integrate AI into their systems and operations. But to build truly successful solutions, you need a firm grasp of the underlying mathematics. This accessible guide walks you through the math necessary to thrive in the AI field such as focusing on real-world application...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.In this book, authors BK Sarthak Das and Virginia Chu d...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
With the increasing use of AI in high-stakes domains such as medicine, law, and defense, organizations spend a lot of time and money to make ML models trustworthy. Many books on the subject offer deep dives into theories and concepts. This guide provides a practical starting point to help develop...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Why are so many companies adopting GitOps for their DevOps and cloud native strategy? This reliable framework is quickly becoming the standard method for deploying apps to Kubernetes. With this practical, developer-oriented book, DevOps engineers, developers, IT architects, and SREs will learn th...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building applica...(0,00 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
W przypadku usługi "Druk na żądanie" termin dostarczenia przesyłki może obejmować także czas potrzebny na dodruk (do 10 dni roboczych)
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.


Oceny i opinie klientów: System Performance Tuning. 2nd Edition Gian-Paolo D. Musumeci, Mike Loukides (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.