Elasticity Variation under Rest State Environment In Case of Internet Traffic Sharing in Computer Network
نویسندگان
چکیده
The traffic sharing problem was introduced by Naldi (2002) in the form of a probability model using Markov Chains. This model was extended by Shukla and Thakur (2010) by introducing a rest state. The importance of new state was that user does not leave to the place of working and remains available for connectivity attempts. This paper extends the earlier approach of Shukla (2010) and examines the effect of elasticity on the blocking probability in computer network. Simulation study is used as a tool for measuring effect of varying model parameters on the elasticity variance.
منابع مشابه
Two-Call and Rest State Based Internet Traffic Sharing Analysis in Two Market Environment
Internet is the superhighway of information and used as an effective resource for advertising and marketing by the users in daily life. Usually, these kinds of services are managed by service providers. Owing to demands of same kind of services by the users, internet traffic load and traffic share of operators oscillated. Naldi (2002) made a pioneering contribution to the model based internet t...
متن کاملIntelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City (TECHNICAL NOTE)
Traffic congestion worldwide has led to loss of human lives due to failure in transporting accident victims, critical patients, medical equipment and medicines on time. With the unending growth in vehicular traffic everywhere, Internet of Things (IOT) and Vehicular Ad Hoc Network (VANET) have embarked as a promising platform for an Intelligent Traffic Management System (ITMS). Many researches h...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کامل