Solved

in case of low speed file transfer on file server, which parts of server should be suspected as bottle neck ?

Posted on 2012-03-15
1
414 Views
Last Modified: 2012-03-25
I found that the transferring data speed is very low between serverA to serverB in my office.

I connected serverA and serverB directly,  link is up at Fast Ether , but the transferring speed is not enough. 50MByte takes 1 minutes.
I changed the network cable to see if network is no problem.
the result is same.

I suspect that ServerA's performance is not so good.
this ServerA is an appliance server, therefore I don't know what kind of CPU or memory are used.

In case of copy and paste data between folderA and folderB on the serverA,
50MB takes 2 minutes. ( it takes double time than network)

My question is ,
1)the reason of low data transferring speed is RAID1 ?( ServerA is Raid1)
If I change the Raid1 to Raid5, can I expect it is improved ?

2) Are there any possibility that RAID card is bottle neck ?
or SATA disk is bottle neck ? or
 low performance CPU ?
memory ?

which parts of server should be suspected as bottle neck ?

best regards
0
Comment
Question by:shouichi
1 Comment
 
LVL 3

Accepted Solution

by:
StuWhitby earned 500 total points
ID: 37727313
This depends on the data as much as anything else.  If you've got loads of small files, RAID 1 will perform better than RAID 5.  If it's all data and no headers, RAID 5 will probably give you better performance.

I'm assuming Windows.  To look for bottlenecks, get Process Explorer from http://technet.microsoft.com/sysinternals and look at process CPU, memory, I/O etc.  Performance Monitor will also give you the tools you need to look at this, and will give you better stats on saturation.  If it's Unix, then sar and top are the best ones I know.  Look at both user and kernel time if it's a CPU limitation.  I've seen situations where the processor has been at 56% CPU logged, but another 44% in kernel mode as it spent the time doing I/O.
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Requirements: root access via SSH, telnet, or other.. Alternately, access from the server administrator to run a counter-strike server, and the proper access rights to do so. Enough free disk space (and allowed to use this much, eg disk quota): 6…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question