• DocumentCode
    686183
  • Title

    Evaluation of distributed security systems server modules peak workload

  • Author

    Panasenko, Sergey

  • Author_Institution
    ANCUD Ltd., Moscow, Russia
  • fYear
    2013
  • fDate
    25-27 Oct. 2013
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    In this paper we examine distributed security systems with dedicated server modules which perform client modules managing and monitoring. Distributed security systems provide optimal solutions for various problems such as user authentication and system components access control. Workload of distributed access control systems server modules has distinct peak periods because an amount of user authentication requests is definitely unbalanced in time. We analyze workload profile and evaluate peak and average workload of distributed access control system server modules. Then we generalize the calculation of peak workload to any distributed security system with dedicated server modules. Knowledge of server modules peak workload may be used to determine the sufficient level of server resources to perform the predefined set of operations while managing client security modules. If peak workload exceeds server resources (allocated for management of distributed system modules) at any time period, it is required to increase performance of server hardware or to design a server cluster. An alternative way is making server workload uniform to avoid distinct periods of peak workload.
  • Keywords
    authorisation; client-server systems; resource allocation; average workload evaluation; client module management; client module monitoring; distributed access control system server modules; distributed security system server evaluation; peak workload evaluation; server cluster; server hardware performance; server resources; user authentication requests; workload profile analysis; Access control; Authentication; Hardware; Schedules; Servers; Software; Access control system; Average workload; Centralized management; Distributed security System; Peak performance; Peak workload; Resource requirements; User authentication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on
  • Conference_Location
    Shanghai
  • Type

    conf

  • DOI
    10.1109/ICASID.2013.6825271
  • Filename
    6825271