Abstract
This paper describes a simplified model of a bottleneck in user access to the World-Wide Web. It has been used to illustrate performance modeling, queueing analysis and simulation in courses on simulation and computer networking.
- 1. Mitrani, I. Modelling of Computer and Communication Systems, Cambridge University Press, 1987. Google Scholar
Digital Library
- 2. Erlang, A.K. "Solution of Some Problems in the Theory of Probabilities of Significance in Automatic Telephone Exchanges", The Post Office Electrical Engineer's Journal, 1917.Google Scholar
- 3. Scherr, A. An Analysis of Time-Shared Computer Systems, MIT Press, 1967.Google Scholar
- 4. Berghel, H. "The Client's Side View of the World-Wide Web", Commun. ACM 39, 1, pp. 30-40, Jan. 1996. Google Scholar
Digital Library
- 5. Denning, P. J. and Buzen, J. P. "The Operational Analysis of Queueing Network Models", ACM Computing Surveys, Vol. 10, pp. 225-261, 1978. Google Scholar
Digital Library
- 6. Blum, H. "Modeling and Simulation of Congestion in World-Wide Web Access", Working Papers, School of Computer Science and Information Systems, Pace University, (to appear).Google Scholar
Index Terms
Internet connection for Web access: an example for performance modeling and simulation
Recommendations
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server
EurAsia-ICT '02: Proceedings of the First EurAsian Conference on Information and Communication TechnologyRole-based Access Control (RBAC) appears to be the most appropriate technique for access control to minimize the errors likely to occur in managing users and network resources. It can also reduce management costs. In this paper, we show a method for ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Application of Role-Based Access Control for Web Environment
UMC '08: Proceedings of the 2008 International Symposium on Ubiquitous Multimedia ComputingMost access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-Based Access Control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC ...






Comments