Presentation is loading. Please wait.

Presentation is loading. Please wait.

Case Study II: A Web Server CSCI 8710 September 30 th, 2008.

Similar presentations


Presentation on theme: "Case Study II: A Web Server CSCI 8710 September 30 th, 2008."— Presentation transcript:

1 Case Study II: A Web Server CSCI 8710 September 30 th, 2008

2 The Web Server A large company uses an internal Web server to allow its programmers, testers, and documentation personnel to download two types of files: – PDF files containing documents and manuals – ZIP files containing software files. The server has one CPU and 4 identical disks. – PDF files are stored on disks 1 and 2 (with evenly distributed access) – ZIP files are stored in disks 3 and 4 (with evenly distributed access)

3 Capacity Planning Questions How many PDF and ZIP file downloads can be sustained concurrently with given response times? What is the impact of using Secure Sockets Layer (SSL) for secure downloads?

4 From the Web Log

5

6 Confidence Interval Estimation of the Mean Known population standard deviation. Unknown population standard deviation: – Large samples: sample standard deviation is a good estimate for population standard deviation. OK to use normal distribution. – Small samples and original variable is normally distributed: use t distribution with n-1 degrees of freedom.

7 Confidence Interval Estimation of the Mean

8

9 Central Limit Theorem

10

11 Confidence Interval (large (n>30) samples)

12 Confidence Interval (small samples, normally distributed population)

13 Computing Important Quantiles in Excel

14

15 Building the Performance Model

16

17

18

19 Service Demands

20 Original Layout QN Model

21 Balanced Configuration

22

23

24 Secure Download Scenarios

25 Symmetric Encryption and Decryption

26 Public Key Encryption and Decryption

27 Performance Considerations Public Key (PK) cryptography is orders of magnitude slower than symmetric key cryptography. – encrypting a 128-byte block using a public key of 512 bits takes 3.5 msec on a Pentium-II 266 MHz while symmetric key encryption using AES would take less than one microsecond on the same machine.

28 Performance Considerations Symmetric key cryptography is not scalable to a large number of users: they are required to share a secret key. It is faster to encrypt with a public key than to decrypt with a secret key.

29 Message Digest

30

31

32 Performance of Message Digest Functions Message digest generation is a fast operation. For example, the hash generation rate of SHA- 1 is 13 clock cycles per byte on a Pentium machine. So, a digest of a 1-Mbyte file would be generated in approximately 13 msec on a 1 GHz Pentium machine.

33 Digital Signature

34 SSL Protocol Overview

35 Generation of a Server Certificate

36 Verification of a Server Certificate

37 SSL Connection Establishment

38

39

40

41

42 CPU Times for Various Security Options

43 Results for Secure Downloads

44 Experimental Comparison of Two Servers

45 Using Confidence Intervals to Compare the Two Servers

46


Download ppt "Case Study II: A Web Server CSCI 8710 September 30 th, 2008."

Similar presentations


Ads by Google