3 research outputs found

    An Approximate Performance of Self-Similar Lognormal M 1 K Internet Traffic Model

    Get PDF
    Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires the use of heavy-tailed distributions. In this paper, we present log-normal distribution as a suitable heavy-tailed distribution for modeling self-similar Internet arrival process. Specifically, we developed its approximate performance measures for large buffer size. Results using the simulated data confirm the adequacy of the proposed model

    Modelling Internet Traffic Streams with Ga/M/1/K Queuing Systems under Self-similarity

    Get PDF
    High-intensity concurrent arrivals of request packets in Internet traffic can cause dependence of event-to-event-times of the requests being served, which causes non-memoryless, modelled with heavy-tail distributions unlike common known traffics. The performance of Internet traffic can be examined using analytical models for the purpose of optimizing the system to reduce its operating costs. Therefore, our study examined a Ga/M/1/K Internet queue class (Gamma arrival processes, Ga; with memoryless-Poisson service process, M; a single server, 1, and K waiting room) and proposed specific derivations of its performance indicators. Real-life data of a corporate organisation Internet server was monitored at both peak and off-peak periods of its usage for Internet traffic data analysis. The minimum โ€˜0โ€™ in the arrival process indicates self-similarity and was assessed using Hurst parameter, H, and their (standard deviation). โ€˜Hโ€™ > 0.5 arrival process in the peak period only, indicates self-similarity. Performance of Ga/M/1/K was compared with various queuing Internet traffic models used in existing literatures. Results showed that the value of the waiting room size for Ga/M/1/K has closest ties with true self-similar model at peak-periods usage of the Internet, which indicates possible concurrent arrival of clients' requests leading to more usage of the waiting room, but with light-tailed queue model at the off-peak periods. Therefore, the proposed Ga/M/1/K model can assist in evaluating the performance of high-intensity self-similar Internet traffic.      Keywords: Internet traffic; self-similarity; Ga/M/1/K model; gamma distributio

    A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions

    Get PDF
    Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, PoA-based Blockchain DLT has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provide recommendations that could facilitate the continuous growth of blockchain application in healthcare. Lastly, the study then explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks
    corecore