Performance modeling and evaluation of heterogeneous computer networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance modeling and evaluation of heterogeneous computer networks

There is tremendous research interest recently in the convergence of wired networks wireless, and wireless sensor access networks and systems. Especially, recent development in wireless communication technologies and mobile networks has posed various challenges to the researchers in the field of performance modeling. These challenges require effective performance evaluation tools, techniques an...

متن کامل

SCTP performance evaluation over heterogeneous networks

Since its definition in 2000, the Stream Control Transmission Protocol (SCTP) has attracted increasing interest. Several research works, often validated through analytical and simulative analysis, have attempted to evaluate the benefits of substituting TCP with SCTP, both for signaling and data transfer. In this work, we present a traffic generation and performance analysis tool to test SCTP on...

متن کامل

Workload Modeling for Computer Systems Performance Evaluation

Reliable performance evaluations require the use of representative workloads. This is no easy task because modern computer systems and their workloads are complex, with many interrelated attributes and complicated structures. Experts often use sophisticated mathematics to analyze and describe workload models, making these models difficult for practitioners to grasp. This book aims to close this...

متن کامل

Retrial Queues for Performance Modelling and Evaluation of Heterogeneous Networks

In this paper a single server retrial queue with a finite number of heterogeneous sources of calls is investigated. It is assumed when a given source is idle it will generate a primary call after an exponentially distributed time. If the server is free at the time of the request’s arrival then the call starts to be served. The service time is also exponentially distributed. During the service t...

متن کامل

Modeling and performance evaluation of computer systems security operation

A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems. Key-Words: computer system security, security attack, security vulnerability, performance evaluation, fork-join queueing networks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer and System Sciences

سال: 2011

ISSN: 0022-0000

DOI: 10.1016/j.jcss.2010.08.009