07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

204<br />

<strong>Enterprise</strong> <strong>Library</strong> <strong>Test</strong> <strong>Guide</strong><br />

Operation Users TPS<br />

Response time<br />

(ms)<br />

Total<br />

transactions<br />

Overhead<br />

(percent)<br />

<strong>Enterprise</strong> 1 Baseline<br />

<strong>Library</strong> 1.1<br />

wraps and<br />

throws an<br />

exception.<br />

<strong>Enterprise</strong> 10 Baseline<br />

<strong>Library</strong> 1.1<br />

wraps and<br />

throws an<br />

exception.<br />

<strong>Enterprise</strong> 50 Baseline<br />

<strong>Library</strong> 1.1<br />

wraps and<br />

throws an<br />

exception.<br />

Exception 1<br />

Handling<br />

Application<br />

Block wraps<br />

and throws an<br />

exception.<br />

Exception 10<br />

Handling<br />

Application<br />

Block wraps<br />

and throws an<br />

exception.<br />

Exception<br />

Handling<br />

Application<br />

Block wraps<br />

and throws an<br />

exception.<br />

50<br />

For an explanation of these metrics, see Measuring Performance.<br />

<strong>Test</strong>ing the Cryptography Application Block<br />

The tests for the Cryptography Application Block use a variety of symmetric algorithm<br />

providers and hash providers. Table 19 lists the scenarios for the Cryptography<br />

Application Block. Here is an explanation of each of the columns.<br />

● ID. This column lists the ID number for each scenario.<br />

● Scenario. This column lists the Cryptography Application Block scenario being<br />

tested.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!