Free

WEd Design and Network - Assignment Example

Comments (0) Cite this document
Summary
CloudVM. Create a vm and set up a web server at Amazon AWS cloud. 2. VPS. Hosting the site at a hosting company such as iPage or bluehost where we share a user account with other users on a linux host. 3…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
WEd Design and Network
Read TextPreview

Extract of sample "WEd Design and Network"

Answer these question CDN vs Cloud Akamais Edge Server solution vs client side cache server solution. a. Its edge server is closer to the clients and therefore faster.
Yes No
Yes. The Akamai intelligent platform sends user content through the Akamai edge server that is physically closer to the user and therefore faster (Akamai).
b. The client browsers do not have to be reconfigured to send requests indirectly through the client side cache server therefore their accesses to Internet are faster.
Yes No YES
2. Akamais Edge Server solution vs Mirror Server solution.
a. Its edge server is closer to users than that from the typical mirror server to users and therefore faster.
Yes No
Yes. Users get their content from the closest servers such that page loads are faster.
b. Mirror server service is free while there is cost associated with the use of Akamai Edge Servers.
Yes No
No. mirror server services are not cheap. They are expensive because the servers have to be mirrored by their redundant servers.
c. Mirror servers are owned and operated by different organizations and their availabilities are typically lower.
Yes No
yes
Hosting Trade-off.
We can host a web site with the following four option: 1. CloudVM. Create a vm and set up a web server at Amazon AWS cloud. 2. VPS. Hosting the site at a hosting company such as iPage or bluehost where we share a user account with other users on a linux host. 3. SharedHttpd.Share the httpd web server on a linux machine as virtual web site using directory.
choose
1. Which option uses most resource?
cloudVM or VPS or shareHTTPD
CloudVM. It provides unlimited storage resources because it uses SAN storage.
2- Which option use least resource?
cloudVM or VPS or shareHTTPD
VPS.
3- Which option enable one to upgrade software pacakges freely without interferring other users?
cloudVM or VPS or shareHTTPD
cloudVM. The cloud servers are completely separated from each other hence another users actions have no impact on you. Each user has his own virtual server.
 Web Server Configuration and Benchmarking
a. Web Server Configuration
1. What directives of the httpd server are related to the feature of adapting to the dynamic nature of the incoming traffic and resulting faster response time?
a. MinSpareThreads. Yes No
yes it is used to maintain a pool of spare or idle server threads.
b. MaxSpareServers. Yes No
yes
c. Allow. Yes No
no
d. TransferLog. Yes No
yes
2. What is the default MaxSpareThreads value set for worker MPM in httpd 2.4 version?
The default MaxSpareThreads for worker MPM in httpd is 250. These MPMs deal with idle threads on a server-wide basis. If there are too many idle threads in the server then child processes are killed until the number of idle threads is less than this number.
3. Explain why httpd would like to kill working threads after they process the request?
to eliminate dormant threads.
4. Understand directives and httpd option.
a. Explain why it is not wise to use "User root " directive.
because it can be modified by non-root users
b. If we restrict the httpd daemon with -X option, the site with MPM=client will outperform the site with MPM=prefork. Explain why.
This is because MPM=prefork uses only one thread
c. If we configure a web server with "Allow 128.198.48.192/26" in block directive , describe how and where can we view the server status of this web server.
The allow directive is used to specify access controls. Setting it to the address 128.198.48.192 means that is the place we can view it.
5. KeepAlive Directive.
a. Describe the type of web pages where a web server with KeepAlive directive will signficantly improve the performance.
KeepAlive directive will enhance performance of webpages with many images because a single connection will be used to transfer multiple files.
If KeepAlive is so useful, explain why by default we set KeepAliveTimeout to 5 seconds, why not forever.

This is to minimize the time processes waste in waiting for requests.
Setting the keepAliveTimeout to a higher value can result in performance issues especially with highly loaded servers. This is because the server processes will be kept occupied waiting on connections with idle clients.
b. NGINX, Apache httpd, and nodejs
1. Describe what is the main advantage which NGINX claims to make it outperform Apache httpd.
NGINX usage of RAM and CPU is incredibly reduced. This translates to faster load times for videos, images and text without any need of out-of-the-box tuning.
Among those three web servers, which is slowest?
NGINX, or Apache httpd, or nodejs
Nodejs because it uses a single thread to handle requests.
a
1 Discuss the performance impact of running web server on a virtual machine.

Running a webserver on a machine affects disk I/O because of the additional overhead. This makes the VM compete for resources with the OS hence making the computer slower.
b Cache Server.
1. Which HTTP request header allows a client to tell all cache servers along the path to the original server not to cache the document?

Private
2. Which HTTP request header is used by client browser or cache server to ensure no unnecessary document transfer?
Only-if-cached
3. Which technique is used to ensure the cached documents are evenly distributed in the apache httpd cache directory?
a. Hash the url and use the hash value as the file path for the cached document. Yes No
yes
b. Use the file size as the prefix of the file path for a cached document. Yes No
yes
 Reverse Proxy
a. What is the advantage of using reverse proxy with back end real servers, compared with direct access to the real servesr?
1. A real server can be run at different port numbers than that known to the client? Yes No
No
2. A real server of the reverse proxy cluster can be shutdown for maintenance without clients recognize it. The reverse proxy can automatically redirect the traffic to other real servers.
Yes No
no
3. Reverse proxy can distribute the request to different real servers based on the uri info in the http request.
Yes No
Yes. When a client request for resources a reverse proxy distributes those requests and returns those requests as if it were the
Reverse proxy can load balance the requests of the same url to different real server based on weight factors.
Yes No
YES. Reverse proxies are used to load balance several back end servers even at times provide caching for a slower back-end server
b. What are the command you used to restart the httpd server after your edit the httpd.conf file?

apachectl -k graceful
references
Akamai. "Any experience. Any device. Anywhere." 2014. Akamai. 26 February 2015 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“WEd Design and Network Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
WEd Design and Network Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680363-wed-design-and-network
(WEd Design and Network Assignment Example | Topics and Well Written Essays - 250 Words)
WEd Design and Network Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680363-wed-design-and-network.
“WEd Design and Network Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680363-wed-design-and-network.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF WEd Design and Network

Network design

...? NETWORK DESIGN By Sylvaughn Allen Presented to Computer Sciences And Information Technology Due NETWORK DESIGN Allen2 Abstract The essay discusses the business network designed to be implemented for SLC Corp., a small storage and logistic company based at Surrey. The company headquarters, referred to as SLC-HQ, is located at Surrey ,while at present there are three warehouses at different locations in Greater London. The company employs 200 vans to deliver/collect the goods to/from the clients all over the country depending on the requirement. It has shown excellent performance in providing temporary storage spaces and delivering for...
5 Pages(1250 words)Essay

Network Design

...? Table of Contents Introduction 2 2 Addressing Deployment Approach for Departments 3 3 Addressing Security Issues and Deployment Approach for WAN 5 4 Security Policy Development 10 5 Disaster Recovery 14 6 References 16 1 Introduction For designing a network for the second building of the company requires a fit for purpose scalable network that will address future goals of the company. Currently we have two buildings and in the future there may be three buildings, i.e. more risk exposure. Moreover, critical assets of the company are located at the ground floor, as the company is located near river banks, there is a high probability of natural disasters i.e. floods etc. Furthermore, the...
14 Pages(3500 words)Essay

Network design

...? NETWORK DESIGN SOLUTION by Your Full The of Your and March 3, NETWORK DESIGN AND SOLUTION The London Storage and Logistics Company has for some time been attempting to improve its business practices. The current outlook of the company is to provide clients with the most efficient delivery services and adequate temporary storage facilities at a reasonable price. In order to maintain these standards the Storage and Logistics Company needs to re-evaluate its warehouse facilities and delivery processing systems. The following is an analysis of the new network design solution for the Storage and Logistics Company: BACKGROUND DESCRIPTION...
6 Pages(1500 words)Coursework

Dental office network design

...? Dental office network design Analyze the given case and provide a clear set of requirements for the network solution Operation of a single dental office does not require a lot of attention in terms of network solutions as compared to several offices. The integration of a single office with other dental practices has indicated a need for a better network solution to manage operations. The network solution will require equipments responsible for passage of information between the dentist and the patients (Stair & Reynolds, 2010). Considering that the dentists are mobile and involved in offering services in different locations, the...
4 Pages(1000 words)Case Study

Network Design

...?SHFL ENTERTAINMENT LOCAL AREA NETWORK Design of the SMHL Network FIIRST FLOOR WAREHOUSE Warehouse offices RND compliance Sales and operations Showroom Figure 1: Design of SHFL Network Overview The network configuration has a reasonable design and pricing that satisfies most of the requirements of SHFL. It improves the efficiency of work and thus supports the businesses and all possible functions at SHFL Entertainment. It uses star network topology and its network cables are fiber optics as well as unshielded twisted pair network cabling. It recommends 5 APs (access...
4 Pages(1000 words)Essay

Network Design

...Introduction As technology takes big leaps in the modern world an Internet network has become the necessity of any small business. Network design isan iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator. The process can be tailored according to each new network or service. This is an extremely important process that must be performed before the establishment of a new telecommunications network or service. Steps in Network...
2 Pages(500 words)Essay

Network Design

...Running Head: NETWORK DESIGN Network Design Computer Network Computer network is an interconnected collection of autonomous computers that can exchange information. Network design is a systematic approach to interconnect a number of computers in such a way that they can exchange information. It is a detailed, labor-intensive activity and utilizes both physical and logical network design strategies. During the design process, all key aspects of the network design are examined in terms of how they meet current...
3 Pages(750 words)Essay

Network design

.... However, ABC Company can achieve these capabilities by implementing a corporate network technology system that can offer the business different facilities, tools, and services such as data sharing, communication, files transfer, and linking different departments inside the company. The management of ABC wants to implement a computer network in order to enhance business productivity and provide better services to its clients. In addition, the management is willing to invest heavily in new facilities and equipments or providing a consistently superior standard of services. Problem Areas With the traditional ways of data sharing and communication the ABC Company is facing a lot of problems in managing the...
12 Pages(3000 words)Essay

Network Topology Design

...Network Topology Design The company has grown from ten to a hundred employees in one year. This is a tremendous growth rate which is a pointer to effective management, security, and integrity of the network that the technology oriented company has employed so far. Additionally, the company projects a hundred percent expansion in the next one year. This requires a network topology that is stable, secure, and integral. For the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal access to the databases. In this topology, single stations use their own internal drives as the...
1 Pages(250 words)Assignment

Network Design

...Network Design Insert Insert Network design requires give-and-take to achieve business goals. What four trade-offs would need to be made to achieve maximum security of the system? Cost and time trade-off. The time taken to complete a particular activity can be compromised i.e. reduced by investing more in the activity (Pino, 2014). However, this should be within the acceptable limits. Thus, the time took to analyze the network to completing it is dependent on the amount of cash we invest in carrying out this activity. Performance of the network and security tradeoff. Every business loves to have high performance as regards to their...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic WEd Design and Network for FREE!

Contact Us