亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? nfs tracing.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
NFS Tracing By Passive Network MonitoringMatt BlazeDepartment of Computer Science Princeton University mab@cs.princeton.eduABSTRACTTraces of filesystem activity have proven to be useful for a wide variety ofpurposes, rang ing from quantitative analysis of system behavior totrace-driven simulation of filesystem algo rithms. Such traces can bedifficult to obtain, however, usually entailing modification of thefilesystems to be monitored and runtime overhead for the period of thetrace. Largely because of these difficulties, a surprisingly small number offilesystem traces have been conducted, and few sample workloads areavailable to filesystem researchers.This paper describes a portable toolkit for deriving approximate traces ofNFS [1] activity by non-intrusively monitoring the Ethernet traffic to andfrom the file server. The toolkit uses a promiscuous Ethernet listenerinterface (such as the Packetfilter[2]) to read and reconstruct NFS-relatedRPC packets intended for the server. It produces traces of the NFS activityas well as a plausible set of corresponding client system calls. The tool iscurrently in use at Princeton and other sites, and is available viaanonymous ftp.1. MotivationTraces of real workloads form an important part of virtually all analysis ofcomputer system behavior, whether it is program hot spots, memory accesspatterns, or filesystem activity that is being studied. In the case offilesystem activity, obtaining useful traces is particularly challenging.Filesystem behavior can span long time periods, often making it necessary tocollect huge traces over weeks or even months. Modification of thefilesystem to collect trace data is often difficult, and may result inunacceptable runtime overhead. Distributed filesystems exa cerbate thesedifficulties, especially when the network is composed of a large number ofheterogeneous machines. As a result of these difficulties, only a relativelysmall number of traces of Unix filesystem workloads have been conducted,primarily in computing research environments. [3], [4] and [5] are examplesof such traces.Since distributed filesystems work by transmitting their activity over anetwork, it would seem reasonable to obtain traces of such systems byplacing a "tap" on the network and collecting trace data based on thenetwork traffic. Ethernet[6] based networks lend themselves to this approachparticularly well, since traffic is broadcast to all machines connected to agiven subnetwork. A number of general-purpose network monitoring tools areavail able that "promiscuously" listen to the Ethernet to which they areconnected; Sun's etherfind[7] is an example of such a tool. While thesetools are useful for observing (and collecting statistics on) specific typesof packets, the information they provide is at too low a level to be usefulfor building filesystem traces. Filesystem operations may span severalpackets, and may be meaningful only in the context of other, previousoperations.Some work has been done on characterizing the impact of NFS traffic onnetwork load. In [8], for example, the results of a study are reported inwhich Ethernet traffic was monitored and statistics gathered on NFSactivity. While useful for understanding traffic patterns and developing aqueueing model of NFS loads, these previous stu dies do not use the networktraffic to analyze the file access traffic patterns of the system, focusinginstead on developing a statistical model of the individual packet sources,destinations, and types.This paper describes a toolkit for collecting traces of NFS file accessactivity by monitoring Ethernet traffic. A "spy" machine with a promiscuousEthernet interface is connected to the same network as the file server. EachNFS-related packet is analyzed and a trace is produced at an appropriatelevel of detail. The tool can record the low level NFS calls themselves oran approximation of the user-level system calls (open, close, etc.) thattriggered the activity.We partition the problem of deriving NFS activity from raw network trafficinto two fairly distinct subprob lems: that of decoding the low-level NFSoperations from the packets on the network, and that of translating theselow-level commands back into user-level system calls. Hence, the toolkitconsists of two basic parts, an "RPC decoder" (rpcspy) and the "NFSanalyzer" (nfstrace). rpcspy communicates with a low-level networkmonitoring facility (such as Sun's NIT [9] or the Packetfilter [2]) to readand reconstruct the RPC transactions (call and reply) that make up each NFScommand. nfstrace takes the output of rpcspy and reconstructs the sys temcalls that occurred as well as other interesting data it can derive aboutthe structure of the filesystem, such as the mappings between NFS filehandles and Unix file names. Since there is not a clean one-to-one mappingbetween system calls and lower-level NFS commands, nfstrace uses some simpleheuristics to guess a reasonable approximation of what really occurred.1.1. A Spy's View of the NFS ProtocolsIt is well beyond the scope of this paper to describe the protocols used byNFS; for a detailed description of how NFS works, the reader is referred to[10], [11], and [12]. What follows is a very brief overview of how NFSactivity translates into Ethernet packets.An NFS network consists of servers, to which filesystems are physicallyconnected, and clients, which per form operations on remote serverfilesystems as if the disks were locally connected. A particular machine canbe a client or a server or both. Clients mount remote server filesystems intheir local hierarchy just as they do local filesystems; from the user'sperspective, files on NFS and local filesystems are (for the most part)indistinguishable, and can be manipulated with the usual filesystem calls.The interface between client and server is defined in terms of 17 remoteprocedure call (RPC) operations. Remote files (and directories) are referredto by a file handle that uniquely identifies the file to the server. Thereare operations to read and write bytes of a file (read, write), obtain afile's attributes (getattr), obtain the contents of directories (lookup,readdir), create files (create), and so forth. While most of theseoperations are direct analogs of Unix system calls, notably absent are openand close operations; no client state information is maintained at theserver, so there is no need to inform the server explicitly when a file isin use. Clients can maintain buffer cache entries for NFS files, but mustverify that the blocks are still valid (by checking the last write time withthe getattr operation) before using the cached data.An RPC transaction consists of a call message (with arguments) from theclient to the server and a reply mes sage (with return data) from the serverto the client. NFS RPC calls are transmitted using the UDP/IP connectionless unreliable datagram protocol[13]. The call message contains a uniquetransaction identifier which is included in the reply message to enable theclient to match the reply with its call. The data in both messages isencoded in an "external data representation" (XDR), which provides amachine-independent standard for byte order, etc.Note that the NFS server maintains no state information about its clients,and knows nothing about the context of each operation outside of thearguments to the operation itself.2. The rpcspy Programrpcspy is the interface to the system-dependent Ethernet monitoringfacility; it produces a trace of the RPC calls issued between a given set ofclients and servers. At present, there are versions of rpcspy for a numberof BSD-derived systems, including ULTRIX (with the Packetfilter[2]), SunOS(with NIT[9]), and the IBM RT running AOS (with the Stanford enet filter).For each RPC transaction monitored, rpcspy produces an ASCII recordcontaining a timestamp, the name of the server, the client, the length oftime the command took to execute, the name of the RPC command executed, andthe command- specific arguments and return data. Currently, rpcspyunderstands and can decode the 17 NFS RPC commands, and there are hooks toallow other RPC services (for example, NIS) to be added reasonably easily.The output may be read directly or piped into another program (such asnfstrace) for further analysis; the for mat is designed to be reasonablyfriendly to both the human reader and other programs (such as nfstrace orawk).Since each RPC transaction consists of two messages, a call and a reply,rpcspy waits until it receives both these components and emits a singlerecord for the entire transaction. The basic output format is 8 vertical-barseparated fields:timestamp | execution-time | server | client | command-name | arguments |reply-datawhere timestamp is the time the reply message was received, execution-timeis the time (in microseconds) that elapsed between the call and reply,server is the name (or IP address) of the server, client is the name (or IPaddress) of the client followed by the userid that issued the command,command-name is the name of the particular program invoked (read, write,getattr, etc.), and arguments and reply-data are the command dependentarguments and return values passed to and from the RPC program,respectively.The exact format of the argument and reply data is dependent on the specificcommand issued and the level of detail the user wants logged. For example, atypical NFS command is recorded as follows:690529992.167140 | 11717 | paramount | merckx.321 | read |{"7b1f00000000083c", 0, 8192} | ok, 1871In this example, uid 321 at client "merckx" issued an NFS read command toserver "paramount". The reply was issued at (Unix time) 690529992.167140seconds; the call command occurred 11717 microseconds earlier. Threearguments are logged for the read call: the file handle from which to read(represented as a hexadecimal string), the offset from the beginning of thefile, and the number of bytes to read. In this example, 8192 bytes arerequested starting at the beginning (byte 0) of the file whose handle is"7b1f00000000083c". The command completed successfully (status "ok"), and1871 bytes were returned. Of course, the reply message also included the1871 bytes of data from the file, but that field of the reply is not loggedby rpcspy.rpcspy has a number of configuration options to control which hosts and RPCcommands are traced, which call and reply fields are printed, which Ethernetinterfaces are tapped, how long to wait for reply messages, how long to run,etc. While its primary function is to provide input for the nfstrace program(see Section 3), judi cious use of these options (as well as such programsas grep, awk, etc.) permit its use as a simple NFS diag nostic andperformance monitoring tool. A few screens of output give a surprisinglyinformative snapshot of current NFS activity; we have identified quicklyusing the program several problems that were otherwise difficult topinpoint. Similarly, a short awk script can provide a breakdown of the mostactive clients, servers, and hosts over a sampled time period.2.1. Implementation IssuesThe basic function of rpcspy is to monitor the network, extract thosepackets containing NFS data, and print the data in a useful format. Sinceeach RPC transaction consists of a call and a reply, rpcspy maintains atable of pending call packets that are removed and emitted when the matchingreply arrives. In normal operation on a reasonably fast workstation, thisrarely requires more than about two megabytes of memory, even on a busy network with unusually slow file servers. Should a server go down, however, thequeue of pending call messages (which are never matched with a reply) canquickly become a memory hog; the user can specify a maximum size the tableis allowed to reach before these "orphaned" calls are searched out andreclaimed.File handles pose special problems. While all NFS file handles are a fixedsize, the number of significant bits varies from implementation toimplementation; even within a vendor, two different releases of the sameoperating system might use a completely different internal handle format. Inmost Unix implementations, the handle contains a filesystem identifier andthe inode number of the file; this is sometimes augmented by additionalinformation, such as a version number. Since programs using rpcspy outputgenerally will use the handle as a unique file identifier, it is importantthat there not appear to be more than one handle for the same file.Unfortunately, it is not sufficient to simply consider the handle as abitstring of the maximum handle size, since many operating systems do notzero out the unused extra bits before assigning the handle. Fortunately,most servers are at least consistent in the sizes of the handles theyassign. rpcspy allows the user to specify (on the command line or in astartup file) the handle size for each host to be monitored. The handlesfrom that server are emitted as hexadecimal strings truncated at thatlength. If no size is specified, a guess is made based on a few commonformats of a reasonable size.It is usually desirable to emit IP addresses of clients and servers as theirsymbolic host names. An early ver sion of the software simply did a

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩丝袜美女视频| 91在线无精精品入口| 91精品在线一区二区| 亚洲成人第一页| 日韩午夜小视频| 国产一区视频在线看| 日本一区二区三区四区| 成人高清在线视频| 亚洲免费观看高清完整版在线观看熊 | 中文字幕欧美日本乱码一线二线| 懂色av中文字幕一区二区三区| 亚洲人成小说网站色在线 | 亚洲精品成人少妇| 制服.丝袜.亚洲.另类.中文| 韩国v欧美v亚洲v日本v| 国产精品国产三级国产| 欧美日韩一级大片网址| 国模冰冰炮一区二区| 亚洲色图另类专区| 7777精品伊人久久久大香线蕉的 | 不卡的av电影| 日韩精品亚洲专区| 国产精品免费视频网站| 欧美日韩国产免费一区二区| 国产精品66部| 亚洲高清免费观看高清完整版在线观看| 91精品国产高清一区二区三区蜜臀| 久久精品国产亚洲一区二区三区| 中文字幕欧美三区| 欧美一区二区三区小说| 成人国产精品免费网站| 看片网站欧美日韩| 亚洲美女屁股眼交| 久久久久九九视频| 欧美在线视频你懂得| 国产精品系列在线播放| 亚洲成av人影院| 中日韩免费视频中文字幕| 欧美另类videos死尸| 成人激情动漫在线观看| 蜜桃传媒麻豆第一区在线观看| 国产拍揄自揄精品视频麻豆| 欧美久久婷婷综合色| av福利精品导航| 国内久久精品视频| 日韩在线卡一卡二| 夜夜揉揉日日人人青青一国产精品| 精品国产精品一区二区夜夜嗨| 91视频你懂的| 国产福利电影一区二区三区| 日本不卡1234视频| 亚洲va在线va天堂| 亚洲另类春色国产| 国产精品欧美久久久久一区二区| 精品sm在线观看| 日韩一区二区不卡| 欧美一区二区二区| 欧美日韩综合不卡| 91福利精品视频| 91片黄在线观看| 不卡高清视频专区| 大白屁股一区二区视频| 国产麻豆精品一区二区| 麻豆精品精品国产自在97香蕉| 亚洲国产视频网站| 亚洲一区二区黄色| 一区二区三区日韩精品| 亚洲天天做日日做天天谢日日欢| 欧美国产精品久久| 国产人妖乱国产精品人妖| 久久久久青草大香线综合精品| 精品区一区二区| 久久亚洲一区二区三区四区| 制服.丝袜.亚洲.另类.中文 | 欧美精品一区二区不卡| 日韩欧美aaaaaa| 欧美tickling挠脚心丨vk| 日韩欧美国产一区二区在线播放 | 欧美日韩中文字幕一区二区| 欧美专区日韩专区| 欧美日韩在线播放| 在线电影一区二区三区| 日韩午夜在线观看视频| 精品国产髙清在线看国产毛片| 欧美成va人片在线观看| 久久精品一区八戒影视| 国产精品国产三级国产aⅴ中文| 中文字幕在线观看一区二区| 亚洲免费观看在线视频| 亚洲va在线va天堂| 久久99精品国产麻豆婷婷| 国产精品白丝av| 97久久精品人人做人人爽50路| 色婷婷综合在线| 欧美精品自拍偷拍动漫精品| 精品久久人人做人人爰| 国产欧美一区二区精品久导航| 国产精品动漫网站| 亚洲一二三区不卡| 麻豆国产91在线播放| 国产宾馆实践打屁股91| 色综合av在线| 日韩免费在线观看| 亚洲欧洲韩国日本视频| 亚洲成人一区二区在线观看| 九九在线精品视频| 99视频精品免费视频| 欧美日韩国产免费| 久久久激情视频| 亚洲一二三四区不卡| 精品在线一区二区| 91论坛在线播放| 日韩限制级电影在线观看| 亚洲欧洲99久久| 美日韩一区二区| av亚洲产国偷v产偷v自拍| 91精品国产欧美日韩| 国产精品久久看| 美女在线观看视频一区二区| 不卡视频在线看| 精品国产一区二区三区不卡| 亚洲欧美综合另类在线卡通| 男人的天堂久久精品| 91浏览器打开| 精品久久国产老人久久综合| 亚洲精品久久嫩草网站秘色| 国产一区二区三区精品欧美日韩一区二区三区 | 亚洲视频 欧洲视频| 人人爽香蕉精品| 色老汉av一区二区三区| 久久久久久毛片| 午夜亚洲福利老司机| 99国产一区二区三精品乱码| 欧美电影免费观看完整版| 亚洲精品高清视频在线观看| 国产麻豆9l精品三级站| 欧美日韩精品福利| 成人欧美一区二区三区小说| 久久99在线观看| 欧美日韩国产综合视频在线观看| 欧美激情一二三区| 久久99精品久久久久久国产越南| 欧美在线看片a免费观看| 国产精品久久精品日日| 国产一区二区三区久久悠悠色av| 欧美日韩国产首页| 亚洲免费三区一区二区| av网站一区二区三区| 国产午夜精品一区二区三区嫩草| 日韩精品亚洲专区| 欧美日韩成人一区二区| 亚洲一级二级三级在线免费观看| 成人激情午夜影院| 久久久久成人黄色影片| 麻豆中文一区二区| 欧美一区二区视频在线观看| 亚洲成人三级小说| 欧美日韩国产免费一区二区| 亚洲一区二区三区四区五区黄| 91美女片黄在线| 亚洲色图.com| 91网站最新地址| 亚洲欧美偷拍三级| 色综合久久综合网97色综合| 亚洲欧美日韩综合aⅴ视频| 成人小视频在线观看| 中文字幕精品综合| 波多野结衣视频一区| 国产精品午夜免费| zzijzzij亚洲日本少妇熟睡| 中文字幕成人av| 99精品欧美一区二区三区小说| 国产精品你懂的在线欣赏| 成人午夜短视频| 中文字幕五月欧美| 一本大道久久精品懂色aⅴ| 亚洲欧美视频一区| 欧美日韩二区三区| 毛片av一区二区| 国产午夜精品理论片a级大结局| 懂色av中文一区二区三区 | 欧美日韩高清在线| 免费成人在线观看| 日韩视频一区二区三区在线播放| 麻豆中文一区二区| 国产精品网站一区| 日本道在线观看一区二区| 五月婷婷综合激情| 久久一区二区三区四区| 99re这里只有精品视频首页| 亚洲国产欧美在线人成| 日韩一区二区精品| 高清beeg欧美| 亚洲一二三区在线观看| 精品国内二区三区| 91在线看国产| 美女视频免费一区| 一色桃子久久精品亚洲| 欧美一区二区三区四区在线观看| 国产乱淫av一区二区三区|