Download presentation
Presentation is loading. Please wait.
Published byAugustus Hutchinson Modified over 9 years ago
1
Case Study II: A Web Server CSCI 8710 September 30 th, 2008
2
The Web Server A large company uses an internal Web server to allow its programmers, testers, and documentation personnel to download two types of files: – PDF files containing documents and manuals – ZIP files containing software files. The server has one CPU and 4 identical disks. – PDF files are stored on disks 1 and 2 (with evenly distributed access) – ZIP files are stored in disks 3 and 4 (with evenly distributed access)
3
Capacity Planning Questions How many PDF and ZIP file downloads can be sustained concurrently with given response times? What is the impact of using Secure Sockets Layer (SSL) for secure downloads?
4
From the Web Log
6
Confidence Interval Estimation of the Mean Known population standard deviation. Unknown population standard deviation: – Large samples: sample standard deviation is a good estimate for population standard deviation. OK to use normal distribution. – Small samples and original variable is normally distributed: use t distribution with n-1 degrees of freedom.
7
Confidence Interval Estimation of the Mean
9
Central Limit Theorem
11
Confidence Interval (large (n>30) samples)
12
Confidence Interval (small samples, normally distributed population)
13
Computing Important Quantiles in Excel
15
Building the Performance Model
19
Service Demands
20
Original Layout QN Model
21
Balanced Configuration
24
Secure Download Scenarios
25
Symmetric Encryption and Decryption
26
Public Key Encryption and Decryption
27
Performance Considerations Public Key (PK) cryptography is orders of magnitude slower than symmetric key cryptography. – encrypting a 128-byte block using a public key of 512 bits takes 3.5 msec on a Pentium-II 266 MHz while symmetric key encryption using AES would take less than one microsecond on the same machine.
28
Performance Considerations Symmetric key cryptography is not scalable to a large number of users: they are required to share a secret key. It is faster to encrypt with a public key than to decrypt with a secret key.
29
Message Digest
32
Performance of Message Digest Functions Message digest generation is a fast operation. For example, the hash generation rate of SHA- 1 is 13 clock cycles per byte on a Pentium machine. So, a digest of a 1-Mbyte file would be generated in approximately 13 msec on a 1 GHz Pentium machine.
33
Digital Signature
34
SSL Protocol Overview
35
Generation of a Server Certificate
36
Verification of a Server Certificate
37
SSL Connection Establishment
42
CPU Times for Various Security Options
43
Results for Secure Downloads
44
Experimental Comparison of Two Servers
45
Using Confidence Intervals to Compare the Two Servers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.