Abstract
In this paper we discuss why message acknowledgements are an appropriate engineering approach to meet system functionality. The data replication problem in database systems is our motivation. We introduce a new queueing theoretic model, the MIMO model, that incorporates burstiness in the sending side and busy periods in the receiving side. Based on simulation results derived from this model, we show that the buffer requirements from M/M/1/N queues are too optimistic.
Chapter PDF
Similar content being viewed by others
References
Froscher, J.N., Goldschlag, D.M., Kang, M.H., Landwehr, C.E., Moore, A., Moskowitz, I.S., and Payne, C.N. (1995) Improving Inter-Enclave information flow for a secure strike planning application, in Proc. 11th Computer Security Applicatons Conference, New Orleans.
Goldschlag, D.M. (to appear) Several secure store and forward devices, to appear: Proc. 3rd ACM Conference on Computer & Communications Security, New Delhi, 1996.
Gross, D. and Harris,C.M. (1985) Fundamentals of Queuing Theory, 2nd ed., John Wiley, NY.
Gusella, R. (1991) Characterizing the variability of arrival processes with indexes of dispersion, IEEE Journal on Selected Areas in Communications, 9, No. 2, Feb., 203–211.
Heffes, H. and Lucantoni, D.M. (1986) A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance, IEEE Journal on Selected Areas in Communications, SAC-4, No. 6, Sept., 856–868.
Kang, M. H. and Moskowitz, I. S. (1993) A Pump for rapid, reliable, secure communication, in Proc. 1st ACM Conference on Computer & Communications Security, Fairfax, 119–129.
Kang, M. H., Froscher, J. N., and Costich, O. (1993) A practical transaction model and untrusted transaction manager for multilevel-secure database systems, in Database Security, VI: Status and Prospects, North-Holland, 285–300.
Kang, M. H., Froscher, J.N., McDermott, J., Costich, O., and Peyton, R. (1994) Achieving Database Security through Data Replication: The SINTRA Prototype, in Proc. 17th National Computer Security Conference, 77–87.
Kang, M. H. and Moskowitz, I. S. (1995) A data pump for communication, NRL Memo Report 5540–95–7771
Kang, M.H., Moskowitz, I.S., and Lee, D.C. (1995) A network version of the Pump, in Proc. IEEE Symposium on Research in Security and Privacy, Oakland, 144–154.
Leland, W.E., Taqqu, M.S., Willinger, T W., and Wilson, D.V. (1993) “On the self-similar nature of ethernet traffic,” Proceedings of SIGCOMM’93.
Li, S. and Mark, J.W. (1985) Performance of voice/data integration on a TDM system,IEEE Transactions on Communications, COM-33, No. 12, Dec., 1265–1273.
McDermott, J. (1994) The b2c3 problem: How big buffers overcome covert channel cynicism in trusted database systems, in Database Security, VIII: Status and Prospects, North-Holland, 111–122.
Paxson, V. and Floyd, S. (1994) Wide area traffic: The failure of Poisson modeling, in Proc. SIGCOMM’94 and IEEE/ACM Transactions on Networking, June 1995, 3, No. 3, 226–244.
Robertazzi, T.H. (1990) Computer Networks and Systems: “Queuing Theory and Performance Evaluation” Springer-Verlag, NY, 1990.
Saulnier, E.T. and Vastola, K.S. (1992) A “HI-LO” Markov chain model for multimedia traffic in ATM networks, in Proc. Globecom’92, 3, Dec., 1450–1454.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Moskowitz, I.S., Kang, M.H. (1996). The Modulated-Input Modulated-Output Model. In: Spooner, D.L., Demurjian, S.A., Dobson, J.E. (eds) Database Security IX. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34932-9_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-34932-9_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2954-1
Online ISBN: 978-0-387-34932-9
eBook Packages: Springer Book Archive