Question

In: Computer Science

During 1 30 minute observation, a web server received 2700 requests. The mean response time was...

During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?

Solutions

Expert Solution

QUESTION:During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?

SOLUTION:

GIVEN:

OBSERVATION INTERVAL : 1HOUR 30MINUTES ==>60+30 =90MINUTES

RECEIVED REQUEST : 2700

MEAN RESPONSE TIME : 2 SECONDS

FORMULA FOR ARRIVAL RATE IS GIVEN BY

WHERE

A =Total number of request arrived=2700

T= total interval of time =90min

NOW, as we know MEAN RESPONSE TIME IS 2 SECONDS

1 request will be completed in 2seconds

then

30 requests will be competed in 1 minutes

So,mean number of queries in the system is ZERO and it does not depends on the distributional assumptions.


Related Solutions

The time T between requests to a web server is exponentially distributed with mean 0.5 seconds....
The time T between requests to a web server is exponentially distributed with mean 0.5 seconds. (a) What is the value of the parameter in this exponential distribution? Give the p.d.f. and c.d.f. of T? [2] (b) Use the c.d.f. of T to find the median request time and interpret it. [3] (c) What is the probability that the request time is between 0.25 and 1.5 seconds? [1]( d) Find the 60th percentile of the request time and interpret it....
Will rate answer 1) Assume a user requests a large object from a web server. Assume...
Will rate answer 1) Assume a user requests a large object from a web server. Assume that for the TCP running on the web server: • the MSS is 1,460 bytes (a more precise value for TCP when operating over an Ethernet), • each segment transmitted contains 66 bytes of headers (for TCP and all lower-level protocols), and • flow and congestion control mechanisms do not limit the rate at which the web server transmits data. a) Derive an expression...
Let N be the number of requests to a web server per day and let N...
Let N be the number of requests to a web server per day and let N Poisson(). Each request comes from a human with probability p or from a spam bot with probability 1 ? p. Assume that the requests are independent of each other. Let X be the number of requests from humans per day and Y be the number of requests from spam bots per day. (a) State the conditional distribution of X given N = n, and...
Design a structured observation sheet to record the behavior of individuals during first 30 minutes of...
Design a structured observation sheet to record the behavior of individuals during first 30 minutes of the train rides in an Air conditioned compartment. Complete the sheet with general information, and ten behaviors. This is a Research Question.
A sample of 30 observation has sample mean x̅ = 53 and sample standard deviation of...
A sample of 30 observation has sample mean x̅ = 53 and sample standard deviation of s = 3. Construct a 99% two sided confidence interval for the population mean. If we want the length of 99% two sided confidence interval to be smaller than 1, how many more samples do we need to take? Please show your work, I will be studying the solution step by step.
A emergency center ensures that the average response time for the calls received is less than...
A emergency center ensures that the average response time for the calls received is less than 75 seconds. To corroborate this statement, an external agency collects a sample of 90 calls. For this sample, the average response time was 70 seconds with a standard deviation of 15 seconds. Does the collected information match the claim of the center? Show your work. If needed use a level of significance = 0:05
1. A Client-side digital signature can be used to authenticate to a web server through SSL,...
1. A Client-side digital signature can be used to authenticate to a web server through SSL, but confidentiality can still be vulnerable to attack. Identify a type of attack to which the use of SSL is vulnerable and justify your answer. 2. Discuss the benefits of MPLS LSP (multiprotocol label switching label switched path) to support high availability of service with illustration of use for Push, Swap and Pop. 3. The manager wishes to access confidential company data while travelling...
the time between phone calls received by a telephonist is exponentially distributed with a mean of...
the time between phone calls received by a telephonist is exponentially distributed with a mean of 10 minutes.what is the probability that there are no more than four calls within one hour?
7. Suppose the number of photons emitted by an atom during a one-minute time window can...
7. Suppose the number of photons emitted by an atom during a one-minute time window can be modeled as a Poisson random variable with parameter ? = 2. Now, suppose you watch the atom for two minutes, and the number of emitted photons in each minute is an independent Poisson process. Calculate the probability that you see exactly one photon during the two minutes. (Hint: this is the probability that you see no photons in the first minute and one...
At an exchange At an exchange, number of calls received in 245 successive one minute interval is given below. Determine the mean and the mode of the distribution?
At an exchange, number of calls received in 245 successive one minute interval is given below. Determine the mean and the mode of the distribution?No. of calls:  0,      1,      2,      3,      4,     5,     6,     7,    Total Frequency: 14,    21,    25,    43,    51    40    39    12    245 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT