Question

In: Computer Science

During 1 30 minute observation, a web server received 2700 requests. The mean response time was...

During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?

Solutions

Expert Solution

QUESTION:During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?

SOLUTION:

GIVEN:

OBSERVATION INTERVAL : 1HOUR 30MINUTES ==>60+30 =90MINUTES

RECEIVED REQUEST : 2700

MEAN RESPONSE TIME : 2 SECONDS

FORMULA FOR ARRIVAL RATE IS GIVEN BY

WHERE

A =Total number of request arrived=2700

T= total interval of time =90min

NOW, as we know MEAN RESPONSE TIME IS 2 SECONDS

1 request will be completed in 2seconds

then

30 requests will be competed in 1 minutes

So,mean number of queries in the system is ZERO and it does not depends on the distributional assumptions.


Related Solutions

The time T between requests to a web server is exponentially distributed with mean 0.5 seconds....
The time T between requests to a web server is exponentially distributed with mean 0.5 seconds. (a) What is the value of the parameter in this exponential distribution? Give the p.d.f. and c.d.f. of T? [2] (b) Use the c.d.f. of T to find the median request time and interpret it. [3] (c) What is the probability that the request time is between 0.25 and 1.5 seconds? [1]( d) Find the 60th percentile of the request time and interpret it....
Will rate answer 1) Assume a user requests a large object from a web server. Assume...
Will rate answer 1) Assume a user requests a large object from a web server. Assume that for the TCP running on the web server: • the MSS is 1,460 bytes (a more precise value for TCP when operating over an Ethernet), • each segment transmitted contains 66 bytes of headers (for TCP and all lower-level protocols), and • flow and congestion control mechanisms do not limit the rate at which the web server transmits data. a) Derive an expression...
Let N be the number of requests to a web server per day and let N...
Let N be the number of requests to a web server per day and let N Poisson(). Each request comes from a human with probability p or from a spam bot with probability 1 ? p. Assume that the requests are independent of each other. Let X be the number of requests from humans per day and Y be the number of requests from spam bots per day. (a) State the conditional distribution of X given N = n, and...
1. (A) A Web server is identified by port number 25 while an email server process...
1. (A) A Web server is identified by port number 25 while an email server process using the SMTP protocol is identified by port number 80. True False (b) Both SMTP with HTTP are used to transfer files from one host to another. True False (c) We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that...
Design a structured observation sheet to record the behavior of individuals during first 30 minutes of...
Design a structured observation sheet to record the behavior of individuals during first 30 minutes of the train rides in an Air conditioned compartment. Complete the sheet with general information, and ten behaviors. This is a Research Question.
A sample of 30 observation has sample mean x̅ = 53 and sample standard deviation of...
A sample of 30 observation has sample mean x̅ = 53 and sample standard deviation of s = 3. Construct a 99% two sided confidence interval for the population mean. If we want the length of 99% two sided confidence interval to be smaller than 1, how many more samples do we need to take? Please show your work, I will be studying the solution step by step.
Activity 3: How does injection attack occur? (30 minutes) Assume the web server includes the following...
Activity 3: How does injection attack occur? (30 minutes) Assume the web server includes the following code sqlString = “select USERID from USER where USERID = ` $userId ` and PWD = ` $password `” result = GetQueryResult(sqlString) if(result = “”) then      userHasBeenAuthenticated = False else      userHasBeenAuthenticated = True end if Here, $userId and $password are the values submitted by the user, and the query statement provides the quotation marks that set it as a literal string. Critical...
A emergency center ensures that the average response time for the calls received is less than...
A emergency center ensures that the average response time for the calls received is less than 75 seconds. To corroborate this statement, an external agency collects a sample of 90 calls. For this sample, the average response time was 70 seconds with a standard deviation of 15 seconds. Does the collected information match the claim of the center? Show your work. If needed use a level of significance = 0:05
1. A Client-side digital signature can be used to authenticate to a web server through SSL,...
1. A Client-side digital signature can be used to authenticate to a web server through SSL, but confidentiality can still be vulnerable to attack. Identify a type of attack to which the use of SSL is vulnerable and justify your answer. 2. Discuss the benefits of MPLS LSP (multiprotocol label switching label switched path) to support high availability of service with illustration of use for Push, Swap and Pop. 3. The manager wishes to access confidential company data while travelling...
the time between phone calls received by a telephonist is exponentially distributed with a mean of...
the time between phone calls received by a telephonist is exponentially distributed with a mean of 10 minutes.what is the probability that there are no more than four calls within one hour?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT