亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? nfs tracing.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
NFS Tracing By Passive Network MonitoringMatt BlazeDepartment of Computer Science Princeton University mab@cs.princeton.eduABSTRACTTraces of filesystem activity have proven to be useful for a wide variety ofpurposes, rang ing from quantitative analysis of system behavior totrace-driven simulation of filesystem algo rithms. Such traces can bedifficult to obtain, however, usually entailing modification of thefilesystems to be monitored and runtime overhead for the period of thetrace. Largely because of these difficulties, a surprisingly small number offilesystem traces have been conducted, and few sample workloads areavailable to filesystem researchers.This paper describes a portable toolkit for deriving approximate traces ofNFS [1] activity by non-intrusively monitoring the Ethernet traffic to andfrom the file server. The toolkit uses a promiscuous Ethernet listenerinterface (such as the Packetfilter[2]) to read and reconstruct NFS-relatedRPC packets intended for the server. It produces traces of the NFS activityas well as a plausible set of corresponding client system calls. The tool iscurrently in use at Princeton and other sites, and is available viaanonymous ftp.1. MotivationTraces of real workloads form an important part of virtually all analysis ofcomputer system behavior, whether it is program hot spots, memory accesspatterns, or filesystem activity that is being studied. In the case offilesystem activity, obtaining useful traces is particularly challenging.Filesystem behavior can span long time periods, often making it necessary tocollect huge traces over weeks or even months. Modification of thefilesystem to collect trace data is often difficult, and may result inunacceptable runtime overhead. Distributed filesystems exa cerbate thesedifficulties, especially when the network is composed of a large number ofheterogeneous machines. As a result of these difficulties, only a relativelysmall number of traces of Unix filesystem workloads have been conducted,primarily in computing research environments. [3], [4] and [5] are examplesof such traces.Since distributed filesystems work by transmitting their activity over anetwork, it would seem reasonable to obtain traces of such systems byplacing a "tap" on the network and collecting trace data based on thenetwork traffic. Ethernet[6] based networks lend themselves to this approachparticularly well, since traffic is broadcast to all machines connected to agiven subnetwork. A number of general-purpose network monitoring tools areavail able that "promiscuously" listen to the Ethernet to which they areconnected; Sun's etherfind[7] is an example of such a tool. While thesetools are useful for observing (and collecting statistics on) specific typesof packets, the information they provide is at too low a level to be usefulfor building filesystem traces. Filesystem operations may span severalpackets, and may be meaningful only in the context of other, previousoperations.Some work has been done on characterizing the impact of NFS traffic onnetwork load. In [8], for example, the results of a study are reported inwhich Ethernet traffic was monitored and statistics gathered on NFSactivity. While useful for understanding traffic patterns and developing aqueueing model of NFS loads, these previous stu dies do not use the networktraffic to analyze the file access traffic patterns of the system, focusinginstead on developing a statistical model of the individual packet sources,destinations, and types.This paper describes a toolkit for collecting traces of NFS file accessactivity by monitoring Ethernet traffic. A "spy" machine with a promiscuousEthernet interface is connected to the same network as the file server. EachNFS-related packet is analyzed and a trace is produced at an appropriatelevel of detail. The tool can record the low level NFS calls themselves oran approximation of the user-level system calls (open, close, etc.) thattriggered the activity.We partition the problem of deriving NFS activity from raw network trafficinto two fairly distinct subprob lems: that of decoding the low-level NFSoperations from the packets on the network, and that of translating theselow-level commands back into user-level system calls. Hence, the toolkitconsists of two basic parts, an "RPC decoder" (rpcspy) and the "NFSanalyzer" (nfstrace). rpcspy communicates with a low-level networkmonitoring facility (such as Sun's NIT [9] or the Packetfilter [2]) to readand reconstruct the RPC transactions (call and reply) that make up each NFScommand. nfstrace takes the output of rpcspy and reconstructs the sys temcalls that occurred as well as other interesting data it can derive aboutthe structure of the filesystem, such as the mappings between NFS filehandles and Unix file names. Since there is not a clean one-to-one mappingbetween system calls and lower-level NFS commands, nfstrace uses some simpleheuristics to guess a reasonable approximation of what really occurred.1.1. A Spy's View of the NFS ProtocolsIt is well beyond the scope of this paper to describe the protocols used byNFS; for a detailed description of how NFS works, the reader is referred to[10], [11], and [12]. What follows is a very brief overview of how NFSactivity translates into Ethernet packets.An NFS network consists of servers, to which filesystems are physicallyconnected, and clients, which per form operations on remote serverfilesystems as if the disks were locally connected. A particular machine canbe a client or a server or both. Clients mount remote server filesystems intheir local hierarchy just as they do local filesystems; from the user'sperspective, files on NFS and local filesystems are (for the most part)indistinguishable, and can be manipulated with the usual filesystem calls.The interface between client and server is defined in terms of 17 remoteprocedure call (RPC) operations. Remote files (and directories) are referredto by a file handle that uniquely identifies the file to the server. Thereare operations to read and write bytes of a file (read, write), obtain afile's attributes (getattr), obtain the contents of directories (lookup,readdir), create files (create), and so forth. While most of theseoperations are direct analogs of Unix system calls, notably absent are openand close operations; no client state information is maintained at theserver, so there is no need to inform the server explicitly when a file isin use. Clients can maintain buffer cache entries for NFS files, but mustverify that the blocks are still valid (by checking the last write time withthe getattr operation) before using the cached data.An RPC transaction consists of a call message (with arguments) from theclient to the server and a reply mes sage (with return data) from the serverto the client. NFS RPC calls are transmitted using the UDP/IP connectionless unreliable datagram protocol[13]. The call message contains a uniquetransaction identifier which is included in the reply message to enable theclient to match the reply with its call. The data in both messages isencoded in an "external data representation" (XDR), which provides amachine-independent standard for byte order, etc.Note that the NFS server maintains no state information about its clients,and knows nothing about the context of each operation outside of thearguments to the operation itself.2. The rpcspy Programrpcspy is the interface to the system-dependent Ethernet monitoringfacility; it produces a trace of the RPC calls issued between a given set ofclients and servers. At present, there are versions of rpcspy for a numberof BSD-derived systems, including ULTRIX (with the Packetfilter[2]), SunOS(with NIT[9]), and the IBM RT running AOS (with the Stanford enet filter).For each RPC transaction monitored, rpcspy produces an ASCII recordcontaining a timestamp, the name of the server, the client, the length oftime the command took to execute, the name of the RPC command executed, andthe command- specific arguments and return data. Currently, rpcspyunderstands and can decode the 17 NFS RPC commands, and there are hooks toallow other RPC services (for example, NIS) to be added reasonably easily.The output may be read directly or piped into another program (such asnfstrace) for further analysis; the for mat is designed to be reasonablyfriendly to both the human reader and other programs (such as nfstrace orawk).Since each RPC transaction consists of two messages, a call and a reply,rpcspy waits until it receives both these components and emits a singlerecord for the entire transaction. The basic output format is 8 vertical-barseparated fields:timestamp | execution-time | server | client | command-name | arguments |reply-datawhere timestamp is the time the reply message was received, execution-timeis the time (in microseconds) that elapsed between the call and reply,server is the name (or IP address) of the server, client is the name (or IPaddress) of the client followed by the userid that issued the command,command-name is the name of the particular program invoked (read, write,getattr, etc.), and arguments and reply-data are the command dependentarguments and return values passed to and from the RPC program,respectively.The exact format of the argument and reply data is dependent on the specificcommand issued and the level of detail the user wants logged. For example, atypical NFS command is recorded as follows:690529992.167140 | 11717 | paramount | merckx.321 | read |{"7b1f00000000083c", 0, 8192} | ok, 1871In this example, uid 321 at client "merckx" issued an NFS read command toserver "paramount". The reply was issued at (Unix time) 690529992.167140seconds; the call command occurred 11717 microseconds earlier. Threearguments are logged for the read call: the file handle from which to read(represented as a hexadecimal string), the offset from the beginning of thefile, and the number of bytes to read. In this example, 8192 bytes arerequested starting at the beginning (byte 0) of the file whose handle is"7b1f00000000083c". The command completed successfully (status "ok"), and1871 bytes were returned. Of course, the reply message also included the1871 bytes of data from the file, but that field of the reply is not loggedby rpcspy.rpcspy has a number of configuration options to control which hosts and RPCcommands are traced, which call and reply fields are printed, which Ethernetinterfaces are tapped, how long to wait for reply messages, how long to run,etc. While its primary function is to provide input for the nfstrace program(see Section 3), judi cious use of these options (as well as such programsas grep, awk, etc.) permit its use as a simple NFS diag nostic andperformance monitoring tool. A few screens of output give a surprisinglyinformative snapshot of current NFS activity; we have identified quicklyusing the program several problems that were otherwise difficult topinpoint. Similarly, a short awk script can provide a breakdown of the mostactive clients, servers, and hosts over a sampled time period.2.1. Implementation IssuesThe basic function of rpcspy is to monitor the network, extract thosepackets containing NFS data, and print the data in a useful format. Sinceeach RPC transaction consists of a call and a reply, rpcspy maintains atable of pending call packets that are removed and emitted when the matchingreply arrives. In normal operation on a reasonably fast workstation, thisrarely requires more than about two megabytes of memory, even on a busy network with unusually slow file servers. Should a server go down, however, thequeue of pending call messages (which are never matched with a reply) canquickly become a memory hog; the user can specify a maximum size the tableis allowed to reach before these "orphaned" calls are searched out andreclaimed.File handles pose special problems. While all NFS file handles are a fixedsize, the number of significant bits varies from implementation toimplementation; even within a vendor, two different releases of the sameoperating system might use a completely different internal handle format. Inmost Unix implementations, the handle contains a filesystem identifier andthe inode number of the file; this is sometimes augmented by additionalinformation, such as a version number. Since programs using rpcspy outputgenerally will use the handle as a unique file identifier, it is importantthat there not appear to be more than one handle for the same file.Unfortunately, it is not sufficient to simply consider the handle as abitstring of the maximum handle size, since many operating systems do notzero out the unused extra bits before assigning the handle. Fortunately,most servers are at least consistent in the sizes of the handles theyassign. rpcspy allows the user to specify (on the command line or in astartup file) the handle size for each host to be monitored. The handlesfrom that server are emitted as hexadecimal strings truncated at thatlength. If no size is specified, a guess is made based on a few commonformats of a reasonable size.It is usually desirable to emit IP addresses of clients and servers as theirsymbolic host names. An early ver sion of the software simply did a

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久er热在这里只有精品15| 亚洲妇女屁股眼交7| 久草这里只有精品视频| 日韩欧美一二三| 国产一区二区三区在线观看免费| 精品裸体舞一区二区三区| 国产麻豆精品在线观看| 国产精品拍天天在线| 91麻豆国产香蕉久久精品| 亚洲国产中文字幕| 4hu四虎永久在线影院成人| 人人精品人人爱| 国产农村妇女精品| 色8久久人人97超碰香蕉987| 午夜久久电影网| 精品国产a毛片| fc2成人免费人成在线观看播放| 亚洲免费资源在线播放| 欧美久久久久久久久中文字幕| 蜜桃91丨九色丨蝌蚪91桃色| 国产人伦精品一区二区| 欧美专区日韩专区| 激情综合网最新| 亚洲欧美偷拍另类a∨色屁股| 欧美日韩国产高清一区| 国产一区二区免费在线| 亚洲欧美日韩精品久久久久| 日韩一区二区高清| 99精品视频一区二区三区| 免费的成人av| 亚洲精品亚洲人成人网| 久久综合久久鬼色| 在线观看国产一区二区| 国产精品一卡二| 偷拍日韩校园综合在线| 亚洲欧洲精品一区二区三区不卡| 51精品视频一区二区三区| bt欧美亚洲午夜电影天堂| 日韩成人精品在线| 亚洲精品免费看| 国产亚洲女人久久久久毛片| 欧美性色欧美a在线播放| 国产毛片一区二区| 欧美96一区二区免费视频| 国产精品福利电影一区二区三区四区| 欧美精品自拍偷拍| 色综合网站在线| 国产91清纯白嫩初高中在线观看| 天天av天天翘天天综合网色鬼国产 | 欧美精品久久久久久久多人混战| 国产精品中文字幕欧美| 性久久久久久久久久久久| 国产精品福利一区二区三区| 久久综合色一综合色88| 91精品国产入口| 欧美体内she精视频| 成人动漫视频在线| 国产在线视频不卡二| 视频精品一区二区| 夜夜操天天操亚洲| 国产精品乱人伦| 欧美国产日韩亚洲一区| 日韩精品一区二区三区中文不卡| 欧美三级日韩在线| 色素色在线综合| 99久久99久久精品免费观看| 国产成人啪免费观看软件| 精品一区二区精品| 久久精品国产网站| 日精品一区二区三区| 亚洲成人av一区二区| 亚洲综合色成人| 亚洲欧美国产三级| 一区在线观看视频| 18成人在线视频| 亚洲色图一区二区| 亚洲精品欧美激情| 亚洲精品久久久久久国产精华液 | 国产精品青草久久| 中文无字幕一区二区三区 | 婷婷成人综合网| 亚洲影视在线播放| 午夜精品一区二区三区三上悠亚| 一区二区三区国产豹纹内裤在线| 亚洲免费观看高清| 亚洲一卡二卡三卡四卡无卡久久| 亚洲精品国产a| 亚洲一区成人在线| 日韩精品电影一区亚洲| 日韩国产高清在线| 激情综合色综合久久| 国产伦精品一区二区三区在线观看 | 欧美激情一区二区三区四区| 欧美激情一区二区三区全黄| 国产精品乱码一区二区三区软件 | 精品成人在线观看| 国产午夜精品一区二区三区嫩草| 国产精品午夜在线观看| 国产精品久久久久久亚洲毛片| 中文字幕一区在线观看| 一区二区三区美女| 男女男精品网站| 国产美女主播视频一区| 成人一区二区三区视频在线观看| 成人黄色小视频| 欧美日韩黄视频| 久久亚洲欧美国产精品乐播| 国产精品久久久久毛片软件| 亚欧色一区w666天堂| 另类成人小视频在线| 国产suv精品一区二区6| 色偷偷成人一区二区三区91| 9191成人精品久久| 日本一区二区成人| 亚洲一区二区三区四区在线| 蜜臀av一级做a爰片久久| 成人精品免费看| 91麻豆精品国产91久久久资源速度| 日韩精品一区二区三区四区视频| 亚洲欧洲精品一区二区精品久久久 | 亚洲妇女屁股眼交7| 加勒比av一区二区| 在线亚洲一区观看| 久久久精品免费免费| 亚洲国产欧美另类丝袜| 国产成人免费视| 欧美日韩mp4| 中文字幕一区二区三区色视频| 五月开心婷婷久久| 99久久99精品久久久久久 | 久久精品在这里| 亚洲高清不卡在线观看| 成人黄色综合网站| 精品国产免费人成电影在线观看四季 | 久久99精品久久久| 欧美亚洲综合色| 国产精品美女久久久久久2018 | 亚洲欧美日本韩国| 韩日欧美一区二区三区| 欧美日韩在线三区| 日韩毛片视频在线看| 国精品**一区二区三区在线蜜桃| 色爱区综合激月婷婷| 国产亚洲成年网址在线观看| 日产国产欧美视频一区精品| 在线视频亚洲一区| 日韩美女啊v在线免费观看| 国产精品自拍在线| 日韩欧美一区二区久久婷婷| 亚洲国产日韩精品| 色综合视频在线观看| 国产亚洲成年网址在线观看| 美美哒免费高清在线观看视频一区二区 | 亚洲综合一区在线| 94-欧美-setu| 亚洲色图丝袜美腿| eeuss影院一区二区三区| 久久精品人人做人人爽人人| 另类小说视频一区二区| 日韩一区二区三区av| 日本视频中文字幕一区二区三区| 欧美日韩专区在线| 一卡二卡三卡日韩欧美| 一本在线高清不卡dvd| 日韩伦理电影网| 色诱亚洲精品久久久久久| 亚洲色图制服丝袜| 色婷婷亚洲精品| 亚洲国产wwwccc36天堂| 欧美日韩另类国产亚洲欧美一级| 亚洲午夜免费电影| 欧美性猛交xxxx乱大交退制版| 亚洲一区二区精品视频| 欧美在线视频日韩| 五月综合激情婷婷六月色窝| 91精选在线观看| 美女爽到高潮91| 久久这里只精品最新地址| 国产成人免费视频网站| 国产精品国产三级国产有无不卡 | 色成人在线视频| 性做久久久久久| 日韩午夜在线观看视频| 久久成人久久鬼色| 欧美国产一区在线| av影院午夜一区| 亚洲午夜久久久久久久久电影院| 欧美人体做爰大胆视频| 伦理电影国产精品| 国产丝袜欧美中文另类| 色综合天天在线| 日韩精品电影在线| 久久久精品日韩欧美| 91丨九色丨国产丨porny| 洋洋av久久久久久久一区| 欧美丰满嫩嫩电影| 国产麻豆视频精品| 一区二区三区鲁丝不卡| 日韩精品最新网址| 成人18视频在线播放|