IBM 170 Servers Manual page 71

Intel power systems operating systems
Hide thumbs Also See for 170 Servers:
Table of Contents

Advertisement

Table 5.7
Transaction Type:
Request/Response
(RR) 128 Byte
Asym. Connect/Request/Response
(ACRR) 8K Bytes
Large Transfer
(Stream) 16K Bytes
Notes:
Capacity metrics are provided for nonsecure and each variation of security policy
The table data reflects System i as a server (not a client)
This is only a rough indicator for capacity planning. Actual results may differ significantly.
Each SSL connections was established with a 1024 bit RSA handshake.
x, y and z are scaling constants, one for each NetPerf scenario.
VPN
Although the term Virtual Private Networks (VPN) didn't start until early 1997, the concepts behind VPN
started around the same time as the birth of the Internet. VPN creates a secure tunnel to communicate
from one point to another using an unsecured network as media. Table 5.8 provides some rough capacity
planning information for VPN communication, when using 1 Gigabit Ethernet.
Table 5.8
Transaction Type:
Request/Response
(RR) 128 Byte
Asym. Connect/Request/Response
(ACRR) 8K Bytes
Large Transfer
(Stream) 16K Bytes
Notes:
Capacity metrics are provided for nonsecure and each variation of security policy
The table data reflects System i as a server (not a client)
VPN measurements used transport mode, TDES, AES128 or RC4 with 128-bit key symmetric cipher and MD5 message
digest with RSA public/private keys. VPN antireplay was disabled.
This is only a rough indicator for capacity planning. Actual results may differ significantly.
This table also shows a range of encryption methods to give you an insight on the performance between
less secure but faster, or more secure but slower methods, all compared to unsecured TCP/IP.
Table 5.9 below illustrates relative CPU consumption for VPN instead of potential capacity. Essentially,
this is a normalized inverse of the CPU capacity data from Table 5.6. It gives another view of the impact
of choosing one security policy over another for various NetPerf scenarios.
Table 5.9
IBM i 6.1 Performance Capabilities Reference - January/April/October 2008
©
Copyright IBM Corp. 2008
SSL Relative Performance
(scaled to Nonsecure baseline)
Nonsecure
RC4 /
TCP/IP
MD5
1.0 x
2.1
1.0 y
4.7
1.0 z
8.6
(transactions per second per server CPU)
Nonsecure
AH with
TCP/IP
MD5
1167.0
428.5
249.7
49.9
478.4
44.0
Chapter 5 - Communications Performance
RC4 /
AES128 /
SHA-1
SHA-1
2.2
2.4
5.2
8.0
9.0
13.0
VPN Performance
ESP with
ESP with
RC4 / MD5
AES128 /
SHA-1
322.9
307.71
37.7
32.7
31.0
25.6
AES256 /
TDES /
SHA-1
SHA-1
2.5
5.8
9.1
51.7
15.0
73.7
ESP with TDES /
SHA-1
148.4
9.1
5.4
71

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

7xx serversAs/400 risc server

Table of Contents