1 / 14

Evaluation of Distributed Security Systems Server Modules Peak Workload

Evaluation of Distributed Security Systems Server Modules Peak Workload. Sergey Panasenko serg@panasenko.ru, www.panasenko.ru ANCUD Ltd. www.ancud.ru. 2. Distributed security systems. Dedicated servers manage and monitor client modules, which may perform various security functions, e. g.:

sage
Download Presentation

Evaluation of Distributed Security Systems Server Modules Peak Workload

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Evaluation of Distributed Security Systems Server Modules Peak Workload Sergey Panasenko serg@panasenko.ru, www.panasenko.ru ANCUD Ltd. www.ancud.ru

  2. 2 Distributed security systems Dedicated servers manage and monitor client modules, which may perform various security functions, e. g.: • access control modules; • anti-virus software; • firewalls; • virtual private network modules; • intrusion detection/prevention sensors; • identification and authentication modules.

  3. Example #1:distributed access control system 3

  4. Typical workload profile 4 Typical workload/time dependence graph of a database server: [“Oracle database performance tuning guide. 10g release 2,”http://download.oracle.com, 2008.]

  5. Evaluation of Server Modules Peak Workload 5 Average and peak workload of distributed access control systems server modules should be evaluated before their deployment. This allows to determine an amount of required resources and to provide clustering. Also, this helps to balance the server modules workload if needed. Let us try to determine peak workload on distributed security systems server modules.

  6. Peak workload of distributed access control systems 6 Average server workload per time unit: where: • NC – a number of access control boards; each of them authenticates a user NA times a day in average; • TA – an average number of time units required to process one authentication request; • PA – average resources of the server needed while authentication request processing per time unit; • TT – the number of time units per a day.

  7. Peak workload of distributed access control systems 7 Average server workload in peak periods: where: • TP – the length of peak workload periods in a day in aggregate; • CP – a coefficient, which is defined as a ratio of a number of user authentication requests during peak workload periods to a total number of such requests per a day.

  8. Generalization on anydistributed security system 8 Average server workload per time unit: where: • Nn – an average amount of n-type operations for each client module during a day; • Tn – an average amount of time units required to perform one n-type operation; • Pn – average resources of the server needed while processing one n-type operation per time unit.

  9. Example #2:multi-purpose distributed system 9

  10. Multi-purpose distributed system server workload profile 10

  11. Peak workload of multi-purpose distributed systems 11 Average server workload for n-type operations processing during the peak time period T: where: • Cn,T – represents a ratio of a number of n-type operations during the time period T with length of TP,T time units to a total number of n-type operations per a day.

  12. Peak workload of multi-purpose distributed systems 12 Average server workload for all types of operations during the same time period T:

  13. Conclusion 13 Peak workload periods may be predicted and evaluated early during the development of distributed security systems server modules. Such evaluation allows to determine the sufficient level of server resources before system deployment. An alternative way is to make server workload as uniform as possible to avoid distinct periods of peak workload.

  14. Thank you! Sergey Panasenko serg@panasenko.ru, www.panasenko.ru ANCUD Ltd. www.ancud.ru

More Related