This document summarizes a study on modeling local area network traffic behavior using an M/M/1 queuing model with Poisson and exponential distributions. The study designs a simulation to analyze network performance parameters like delay, load, traffic received, utilization, and throughput under the two distributions. The results show that the exponential distribution produces higher values for all parameters compared to the Poisson distribution. The document concludes by suggesting additional distributions and parameters for future work.
Defuzzification is the process of producing a quantifiable result in Crisp logic, given fuzzy sets and corresponding membership degrees. It is the process that maps a fuzzy set to a crisp set. It is typically needed in fuzzy control systems.
Peripheral
It means various components or devices those are connected to CPU. Actually these are input output devices. Thus, it sometimes calls as I/O devices.
Interface
An interface is a concept that refers to a point of interaction between objects or components and is applicable at the level of both hardware and software.
Thus PHERIPHERAL INTERFACING is a kind of interaction between processor and external or peripheral devices.
To interface physically, a component or mediator between I/O device and processor is used which is called I/O module.
Manchester & Differential Manchester encoding schemeArunabha Saha
The two main variants of biphase encoding techniques are discussed here. Manchester and Differential Manchester encoding scheme are explained with examples. Comparison between several classes of polar encoding techniques are done along with the exposure about the advantages and disadvantages of both schemes.
Defuzzification is the process of producing a quantifiable result in Crisp logic, given fuzzy sets and corresponding membership degrees. It is the process that maps a fuzzy set to a crisp set. It is typically needed in fuzzy control systems.
Peripheral
It means various components or devices those are connected to CPU. Actually these are input output devices. Thus, it sometimes calls as I/O devices.
Interface
An interface is a concept that refers to a point of interaction between objects or components and is applicable at the level of both hardware and software.
Thus PHERIPHERAL INTERFACING is a kind of interaction between processor and external or peripheral devices.
To interface physically, a component or mediator between I/O device and processor is used which is called I/O module.
Manchester & Differential Manchester encoding schemeArunabha Saha
The two main variants of biphase encoding techniques are discussed here. Manchester and Differential Manchester encoding scheme are explained with examples. Comparison between several classes of polar encoding techniques are done along with the exposure about the advantages and disadvantages of both schemes.
A brief introduction to task communication in real time operating system.It covers Inter-process communication like concepts of shared memory , message passing, remoteprocedure call .Interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categorized as clients and servers, where the client requests data and the server responds to client requests.Many applications are both clients and servers, as commonly seen in distributed computing.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
It is a digital representation of an analog signal that takes samples of the amplitude of the analog signal at regular intervals. The sampled analog data is changed to, and then represented by, binary data.
Introduction to Dynamic Programming, Principle of OptimalityBhavin Darji
Introduction
Dynamic Programming
How Dynamic Programming reduces computation
Steps in Dynamic Programming
Dynamic Programming Properties
Principle of Optimality
Problem solving using Dynamic Programming
A brief introduction to task communication in real time operating system.It covers Inter-process communication like concepts of shared memory , message passing, remoteprocedure call .Interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categorized as clients and servers, where the client requests data and the server responds to client requests.Many applications are both clients and servers, as commonly seen in distributed computing.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
It is a digital representation of an analog signal that takes samples of the amplitude of the analog signal at regular intervals. The sampled analog data is changed to, and then represented by, binary data.
Introduction to Dynamic Programming, Principle of OptimalityBhavin Darji
Introduction
Dynamic Programming
How Dynamic Programming reduces computation
Steps in Dynamic Programming
Dynamic Programming Properties
Principle of Optimality
Problem solving using Dynamic Programming
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
With the increased use of real time applications, there is a need for improved network traffic and bandwidth management. Switches are being used by computer networks for enabling connection between those hosts which are not connected by a direct link. When two or more than two host attempt to transmit packet at the same time, collision in data packets occurred. In this paper an optimized performance of local area network in terms of collision count and some other parameter have been investigated using simulation model. Simulation results have been obtained in different network scenarios by varying the number of devices in the network.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
Congestion is a major problem in almost all kinds of wireless networks such as mobile ad-hoc networks; wireless
sensor networks (WSNs). There are variety of applications of WSN such as defense, temperature monitoring,
health monitoring. Congestion occurs in the sensor network because of limited resources such as low processing
power of the sensor node. As all the sensor nodes are battery powered. Hence, congestion in the sensor network
results in waste of energy of sensor nodes. All the layers of protocol suite of the network can be involved in the
congestion control process. This paper gives a brief idea about various congestion control methods. In some of
the schemes, cross-layer design is applied for better results.
Unsupervised object-level video summarization with online motion auto-encoderNEERAJ BAGHEL
Unsupervised video summarization plays an important role on digesting, browsing, and searching the ever-growing videos every day.
Author investigate a pioneer research direction towards the unsupervised object-level video summarization.
It can be distinguished from existing pipelines in two aspects:
Extracting key motions of participated objects
Learning to summarize in an unsupervised and online manner.
Host rank:Exploiting the Hierarchical Structure for Link AnalysisNEERAJ BAGHEL
Link analysis algorithms play key roles in Web search systems. solution for two problems:
The sparsity of link graph
Biased ranking of newly-emerging pages.
TVSum: Summarizing Web Videos Using TitlesNEERAJ BAGHEL
Title-based video summarization is a relatively unexplored domain; there is no publicly available dataset suitable for our purpose.
Author therefore collected a new dataset,TVSum50, that contains 50 videos and their shot-level importance scores obtained via crowdsourcing
A Framework For Dynamic Hand Gesture Recognition Using Key Frames ExtractionNEERAJ BAGHEL
Abstract—Hand Gesture Recognition is one of the natural
ways of human computer interaction (HCI) which has wide
range of technological as well as social applications. A dynamic
hand gesture can be characterized by its shape, position and
movement. This paper presents a user independent framework
for dynamic hand gesture recognition in which a novel algorithm
for extraction of key frames is proposed. This algorithm is based
on the change in hand shape and position, to find out the most
important and distinguishing frames from the video of the hand
gesture, using certain parameters and dynamic threshold. For
classification, Multiclass Support Vector Machine (MSVM) is
used. Experiments using the videos of hand gestures of Indian
Sign Language show the effectiveness of the proposed system for
various dynamic hand gestures. The use of key frame extraction
algorithm speeds up the system by selecting essential frames and
therefore eliminating extra computation on redundant frames.
Biometric is a technology which deals with unique bio elements of an individual.
It is used to verify an individual by its own bio elements saved in system.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Traffic behavior of local area network based on
1. Traffic Behavior of Local Area Network Based on
M/M/1 Queuing Model Using Poisson and
Exponential Distribution
Amirali Rezaei
School of Postgraduate Studies
Asia Pacific University of Technology & Innovation (APU)
Technology Park Malaysia,
Bukit Jalil, 57000, Malaysia
Saadiah Yahya
Faculty of Computer and Mathematical science
Universiti Teknologi MARA (UiTM)
Shah Alam, Malaysia
Alireza Erfanian
Faculty of Computer Science and Information Technology
Universiti Putra Malaysia (UPM), 43400, Serdang
Selangor Darul Ehsan
Kayvan Atefi
Faculty of Computer and Mathematical sciences
Universiti Teknologi MARA (UiTM)
Shah Alam, Malaysia
Presented by:
Neeraj Baghel
2016 IEEE Region 10 Symposium (TENSYMP), Bali,
Indonesia
2. OUTLINE
• INTRODUCTION
• BACKGROUND OF STUDY
• NETWORK PERFORMANCE MEASUREMENT AND ANALYSIS
• DESIGN
• RESULTS
• SUGGESTIONS AND FUTURE WORK
• REFERENCES
3. INTRODUCTION
• Local Area Networks (LAN) is one of the most popular networks in which
its performance is very important for operators.
• The LAN method has been an essential infrastructure of numerous
companies and organizations for a long time.
• Thus, the issue to create the network topological structure continues to be
elevated for scientists and engineers to resolve, due to its foundational
status within the network application [14].
• LAN as a high-speed data network that spans in a small physical area.
Usually, workstations, printers, personal computers, servers, and other
network devices are connected through LAN.
• This provides a lot of advantages such as file transferring between users
communicating by Email and accessing shared devices and applications
4. BACKGROUND OF STUDY
A. Queuing Model
• In queuing theory, a queuing model can be used to approximate a genuine queuing situation
or system.
• Therefore, the queuing behavior could be analyzed mathematically.
• Queuing models allow numerous helpful steady condition performance measures to be
determined.
B. Single-Server Queues (M/M/1)
• The central element of the Single-Server Queues (M/M/1) is a server which provides some
service to items.
• Items from some population of items arrive at the system to be served.
• If the server is idle, an item is served immediately.
• Otherwise, an arriving item joins waiting in line.
• When the server has completed serving an item, the item departs.
• If there are items waiting in the queue, one is immediately dispatched to the server.
• The server in this model can represent anything that performs some function or service for a
collection of items.
For instance, a processor provides service to processes; a transmission line provides a
transmission service to packets or frames of data; an I/O device provides a read or write service for
I/O requests [8].
5. NETWORK PERFORMANCE
MEASUREMENT AND ANALYSIS
• It is very difficult to understand the cause-effect relationships of the Internet due to its size,
complexity and diversity. Measurement is essential for comprehending the behavior of the
system.
• A careful analysis is needed after measurement. Data analyzing in network also differs from
other disciplines.
• Developing and evaluating new techniques use measurement or analysis methods including
Queuing models and Simulation models.
• The different types of queuing systems are analyzed to determine performance measures from
the description of the system. Since a queuing model represents a dynamic system, the values
of the performance measures vary with time.
6. DELAY (w)
• One of the most important performance characteristics of network is delay.
• Delay is defined as the time consumed for a bit of data to travel through the network from one
node to another.
• The end-to-end delay is the average time consumed from sending a packet by the source and
receiving it at the destination.
• The waiting time is the time that a job spends in a queue waiting to be serviced.
• Delay in queuing WQ is given by:
7. UTILIZATION (ρ)
• The queuing system is considered in server utilization.
• The percentage of time in which the server is busy to process jobs during a simulation is
known as server utilization.
• If the queuing system consists of a single server, then the utilization is the fraction of the time
in which the server is busily occupied.
• The server utilization is given by
8. THROUGHPUT (λ)
• Network throughput is the average rate of a successful message transfer through a media.
• The system throughput is also known as the sum of data rates delivered to all terminals in the
network.
• The system throughput can be evaluated using mathematical queuing theory.
• In this theory, the arrival rate λ indicates the load in packets per time unit and departure rate μ
indicates the throughput in packets per time unit.
• Since the departure rate is equal to the arrival rate λ for a queuing system in statistical
equilibrium.
• The throughput is given by:
9. Network load
• Network load is principally caused by the bandwidth used, buffer availability and processing
time at intermediate nodes.
• Indeed, network load is really a key parameter that has a potentially large effect on network
methods.
• Besides, network load accounts for traffic delay and it is sometimes wrongly identified as
congestion.
10. Distribution
There are some distributions in this study that will focus on Poisson and Exponential
distribution:
A Poisson distribution
• Poisson distribution in probability theory and statistics can be defined as a discrete probability
distribution that shows the probability of a number of events with a known average rate
occurring in a fixed period of time and independent of the last event time.
• It can be applied to events with other definite intervals such as distance, area or volume.
• On the other hand, [13] discussed that Poisson distribution arises when a number of events are
counted across time or over an area.
• The Poisson distribution is commonly used when the occurrences are independent.
• Therefore, when the average frequency of occurrence is known, a sample occurrence cannot
change the chance of other occurrences.
11. Distribution
B Exponential Distribution
• The exponential distribution in probability theory of statistics is a kind of continuous
probability distributions.
• The time between events in a Poisson process can be defined by exponential distribution.
• Furthermore the exponential distribution is really a group of continuous probability
distributions.
• It describes time between occasions inside a Poisson process, i.e. a procedure by which
occasions occur continuously and individually in a constant average rate [6].
12. Network load
• Network load is principally caused by the bandwidth used, buffer availability and processing
time at intermediate nodes.
• Indeed, network load is really a key parameter that has a potentially large effect on network
methods.
• Besides, network load accounts for traffic delay and it is sometimes wrongly identified as
congestion.
13. DESIGN
Table I illustrates the parameters used in testing the packet
size of Poisson and Exponential which is 320(bits). The type
of model is Ethernet station while the type of connection is
100BaseT with its data rate as 100,000,000.
14. RESULTS
This phase compares and analyzes the two scenarios together which are
Scenario 1 (Poisson) and Scenario 2 (Exponential).
The mentioned five parameters are analyzed in the following section.
A. Delay
B. Load
C. Traffic Received
D. Utilization
E. Throughput
15. A. Delay
• Figure 1 shows the comparison
results between two scenarios
in the field of delay. Scenario 1
is on Poisson distribution while
scenario 2 is Exponential.
• Maximum delay recorded in
scenario 1 is at 15 minutes that is
0.0001075, and for scenario 2
the maximum delay stated is
6.5 minutes that is 0.0001045.
• Figure 1 shows that the delay in
Poisson distribution is higher
than that in exponential
distribution.
Exponential
Poisson
Time
Fig 1 Delay
Delay
/ Sec
16. B. Load
• Figure 2 shows the load
arameter for the scenarios. As
can be seen in the figure, the
maximum load recorded for
scenario 2 is 280 bits/second
while the minimum is 99
bits/second.
• This is different for scenario 1
where the maximum load is
only 99 bit/second while the
minimum is 30 bits/second.
• According to Figure 2,
Exponential had a higher load
compared to that of Poisson
Exponential
Poisson
Time
Fig 2 Load
Bits /
Sec
17. C. Traffic Received
• The following Figure 3
illustrates that traffic received
for Exponential is higher
compared to Poisson.
• The maximum traffic received
for scenario 2 (Exponential) is
362 bits/second compared to
265 bits/second for Poisson
(scenario 1).
• But in the 5th minute, the same
volumes of traffic are received
for both.
Exponential
Poisson
Time
Fig 3 Traffic
Recieved
Bits/
Sec
18. D. Utilization
• Figure 4 shows the utilization
for the scenarios. As can be
seen, the maximum utilization
for scenario 2 is 0.00140 while
the minimum is 0.00030.
• This is different for scenario 1
where the maximum utilization
is only 0.00080 while the
minimum is 0.00030.
• According to Figure
4,Exponential had a higher
utilization compared to
Poisson.
Exponential
Poisson
Time
Fig 4 Utilization
Bits /
Sec
19. E. Throughput
• Figure 5 shows the throughput
for the scenarios.
• As can be seen, the maximum
throughput for scenario 2 is 0.5
(packet/sec) while the
minimum is 0.12 (packet/sec).
• This is different for scenario 1
where the maximum
throughput is only 0.31
(packet/sec) while the
minimum is 0.12 (packet/sec).
• According to Figure 5,
Exponential had a higher
throughput compared to
Poisson.
Exponential
Poisson
Time
Fig 5 Throughput
Bits /
Sec
20. SUGGESTIONS AND FUTURE WORK
There are many distributions that have not yet been studied, such as Bernoulli
distribution, binomial distribution, geometric distribution, negative binomial
distribution and discrete uniform distribution.
In addition, other parameters can also be applied such as traffic send, data loss
and jitter.
21. REFERENCES
[1] Periklis C., A. C. B. (2007). Performance Analysis of IEEE 802.11 DCF in
Presence of Transmission Errors. IEEE Communications Society.
[2] Wu Bin, Z. H., Sun He. (2008). Research on Multilevel Control Model of
Network Performance Based on Multi-Agent. International Conference
on Advanced Computer Control/IEEE.
[3] Shu-Gang L., H. F., Jin-Jiang L. (2003). Application of Event Graph in
Network Performance Analysis. Proceedings of the Second International
Conference on Machine Learning and Cybernedcs.
[4] Bradley W. S, S. W. H., Jeffery A. K, and Stephen W. P. (2011).
Diagnosing Anomalous Network Performance with Confidence.
International Symposium on Cluster, Cloud and Grid Computing/IEEE.
22. REFERENCES
[5] Gunter B, S. G., Hermam D. M., Krisher S. T. (2006). Queuing networks
and Markov chains: modeling and performance evaluation.
[6] Daniel F., Schmidt E. M. (2009). Universal Models for the Exponential
Distribution. Monash University Clayton School of Information
Technology/IEEE.
[7] Merike K., (2003). Designing Network Security, 2nd Edition. Cisco Press
[8] William S., (2000). Data and Computer Communications, 5th Ed.
Universidade do Minho – Dep. Informática - Campus de Gualtar.
[9] Lambert M. S, Miriam T. T, Susan F. M. (2010). Queuing Theory (First
ed.): Betascript Publishing.
23. REFERENCES
[10] Rajender K. Brahmjit S (2010). EVM as Generic Qos Trigger for
Heterogeneous Wireless Overlay Networks. International Journal of
Wireless & Mobile Networks (IJWMN). DOI: 10.5121/ijwmn.2010.2315
[11] Ivo A., Jacques R. (2002). Queuing Theory. Eindhoven University of
Technology.
[12] Adriano G., Chris G. (2009). A New Metric for Network Load and
Equation of State, In Proceedings of IEEE Computer Society (ICNS09),
Valencia, Spain
[13] Bernard A. R. (2006), Fundamentals of Biostatistics (sixth edition).
Cengage Learning, THOMSON.
[14] Fei T., Gang Z. (2009), the Research of an Approach to Design Local
Area Network Topology Based on Genetic Algorithm. Second
International Symposium on Computational Intelligence and Design.
ISBN: 978-0-7695-3865-5
24. REFERENCES
[15] Munir B. S., Abhik C., S. L. Nalbalwar, K. T. Subramanian (2010).
Novel Approach to Improve QoS of a Multiple Server Queue. Int. J.
Communications, Network and System Sciences.
doi:10.4236/ijcns.2010.31012
[16] Geoff H., Telstra (2014). Measuring IP Network Performance, Volume 6,
Number 1. Access date 2/12/2014. Retrieved at:
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-
1/measuring_ip.html