2001
DOI: 10.1078/1434-8411-00005
|View full text |Cite
|
Sign up to set email alerts
|

Source Traffic Modeling of Wireless Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0
1

Year Published

2002
2002
2011
2011

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(41 citation statements)
references
References 16 publications
0
40
0
1
Order By: Relevance
“…Section 3 discusses our videoconference traffic model and its accuracy, and Section 4 presents the Web traffic model that we use in our study (from [35] and [36]). Section 5 presents the adopted error model for the wireless channel, and Section 6 contains the description of our CAC scheme, as well as its conceptual comparison with quite a few CAC schemes of the literature.…”
Section: Second Classification Of Cac Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Section 3 discusses our videoconference traffic model and its accuracy, and Section 4 presents the Web traffic model that we use in our study (from [35] and [36]). Section 5 presents the adopted error model for the wireless channel, and Section 6 contains the description of our CAC scheme, as well as its conceptual comparison with quite a few CAC schemes of the literature.…”
Section: Second Classification Of Cac Schemesmentioning
confidence: 99%
“…Size of main object: log-normal( is assumed Poisson with rate sessions per second. We do not simulate the Web request viewing time in our adopted data model, as it is done in [36]: We only compute the mean download time needed for a user to download all the Web pages in one Web session. This way, we actually consider a worst case scenario of a user asking for consecutive downloads and then viewing the requested material offline in order to check our system's performance under very bursty data loads.…”
Section: Data Traffic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Many of these works, similar to that of [75], [114], and [128] have sought to characterize, model and validate the distributions that depict the way individual users and user populations interact with websites. Extrapolating from this body of research, a number papers have made use of and extended these models to simulate web traffic for a number of purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Both assumptions are appropriate to interactive applications such as web browsing, see [25] for a coupling between traffic models and actual applications. As a result, the measure for delay is taken to be the mobile's response delay to the oldest activity request taking place while in sleep mode.…”
Section: A Related Workmentioning
confidence: 99%