Point Process Models for Self-Similar Network Traffic, with Applications
نویسندگان
چکیده
Self-similar processes based on fractal point processes (FPPs) provide natural and attractive network traffic models. We show that the point process formulation yields a wide range of FPPs which in turn yield a diversity of parsimonious, computationally efficient, and highly practical asymptotic second-order self-similar processes. Using this framework, we show that the relevant second-order fractal characteristics such as long-range dependence (LRD), slowly-decaying variance, and 1/f noise are completely characterized by three fundamental quantities: mean arrival rate, Hurst parameter, and fractal onset time. Four models are proposed, and the relationship between their model parameters and the three fundamental quantities are analyzed. By successfully applying the proposed models to Bellcore’s Ethernet traces, we show that the FPP models prove useful in evaluating and predicting the queueing performance of various types of fractal traffic sources.
منابع مشابه
Classification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملInternet Traffic Modelling -Variance Based Markovian Fitting of Fractal Point Process from Self-Similarity Perspective
Abstract. Most of the proposed self-similar traffic models could not address fractal onset time at which self-similar behavior actually begins. This parameter has considerable impact on network performance. Fractal point process (FPP) emulates self-similar traffic and involves fractal onset time (FOT). However, this process is asymptotic in nature and has less effective in queueing based perfor...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملProtocols Can Make Traffic Appear Self-Similar
Empirical studies have shown that self-similar traffic models may better describe traffic in many of today's computer networks than traditional Markovian models. The causes of this apparent self-similar behavior must be identified to determine how widely applicable these models are, and how network designers should respond. While some researchers have argued self similarity is an inherent prope...
متن کاملA Cellular Automaton Hardware Design For Generating Traffic Distributions For ATM Networks
Abstract: Broadband-Integrated Services Digital Network (B-ISDN) is capable of supporting the transmission of multimedia applications such as data, voice and images concurrently, because it uses Asynchronous Transfer Mode (ATM) as the basis and ATM is a high-bandwidth, low-delay, connection-oriented cell switching and multiplexing technology. Traffic of different applications has different traf...
متن کامل