Abstract | ||
---|---|---|
Simulation was performed for specific network configurations to assess the effect of imposing security measures on a portion of the workload. The results provide a methodology for performing trade off analysis. The trade-offs are presented in terms of the measures of response time, workload, and cost. Network types included distributed, semicentralized, and centralized configurations. The analysis was conducted using a simulation model which is briefly summarized. The results of the simulation for the cases considered indicate that economies of scale shift from centralized to semicentralized configurations for a fixed I/O bound workload. This occurs when throughput degrades, due to the imposition of security measures, approximately 15% (10%) when 10% (20%) of the workload requires secure processing. Degradation is also examined when certain centers process only secure workload versus distributing both secure and non-secure jobs across the network. |
Year | DOI | Venue |
---|---|---|
1978 | 10.1016/0376-5075(78)90037-5 | Computer Networks (1976) |
Keywords | DocType | Volume |
Network simulation,computer security,centralized processing,distributed processing,network performance | Journal | 2 |
Issue | ISSN | Citations |
1 | 0376-5075 | 1 |
PageRank | References | Authors |
0.43 | 6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Bennet P. Lientz | 1 | 133 | 32.88 |
Ira R. Weiss | 2 | 12 | 9.61 |