next up previous contents
Next: 4.2 Transparency to applications Up: 4. Evaluation Previous: 4. Evaluation

4.1 Experimental setup

The client, the surrogate, and the server machine used in the experiments were a Pentium 90MHz, a Pentium-MMX-200MHz, and a Pentium 90MHz machine respectively. All three machines were running the Linux operating system (kernel version 2.0.35). The network between the surrogate and the server was a 10-Mbps Ethernet. The network bandwidth between the remote client and the surrogate varied in different tests, and we used the Coda failure emulation package (libfail and filcon) [18] to emulate different network bandwidths on a 10-Mbps Ethernet.

We performed 16 different tests using nine common non-interactive applications (Figure 3). We used real-life input files, found in our environment, for the tests. We selected the tests such that the data size in each test was close to one of the three reference sizes: 16, 64, and 256 Kbytes. The data size is defined as the total size of the files updated by an operation. The 16 tests were labeled as $T1, T2, \cdots, T16$. Each test was repeated three times.



Copyright 1999 by Y.W. Lee, K.S. Leung, and M. Satyanarayanan