Connection-level Analysis and Modeling of Network Traffic
|
|
|
- Hilary Burns
- 10 years ago
- Views:
Transcription
1 ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling studies lump all connections together into a single flow. Such aggregate traffic typically exhibits long-range-dependent (LRD) correlations and non-gaussian marginal distributions. Importantly, in a typical aggregate traffic model, traffic bursts arise from many connections being active simultaneously. In this paper, we develop a new framework for analyzing and modeling network traffic that moves beyond aggregation by incorporating connection-level information. A careful study of many traffic traces acquired in different networking situations reveals (in opposition to the aggregate modeling ideal) that traffic bursts typically arise from just a few high-volume connections that dominate all others. We term such dominating connections alpha traffic. traffic is caused by large file transmissions over high bandwidth links and is extremely bursty (non-gaussian). Stripping the alpha traffic from an aggregate trace leaves a beta traffic residual that is Gaussian, LRD, and shares the same fractal scaling exponent as the aggregate traffic. traffic is caused by both small and large file transmissions over low bandwidth links. In our alpha/beta traffic model, the heterogeneity of the network resources give rise to burstiness and heavy-tailed connection durations give rise to LRD. Queuing experiments suggest that the alpha component dictates the tail queue behavior for large queue sizes, whereas the beta component controls the tail queue behavior for small queue sizes. Keywords network traffic modeling, animal kingdom I. INTRODUCTION ÆETWORK traffic analysis and modeling play a major rôle in characterizing network performance. Models that accurately capture the salient characteristics of traffic are useful for analysis and simulation, and they further our understanding of network dynamics and so aid design and control. Most traffic analysis and modeling studies to date have attempted to understand aggregate traffic, in which all simultaneously active connections are lumped together into a single flow. Typical aggregate time series include the number of packets or bytes per time unit over some interval. Numerous studies have found that aggregate traffic exhibits fractal or self-similar scaling behavior, that is, the Department of Electrical Engineering, Rice University, Houston, TX shri, riedi, Web: dsp.rice.edu. This work was supported by NSF, DARPA/AFOSR, DOE, and ONR. traffic looks statistically similar on all time scales []. Self similarity endows traffic with long-range-dependence (LRD) []. Numerous studies have also shown that traffic can be extremely bursty, resulting in a non-gaussian marginal distribution []. These findings are in sharp contrast to classical traffic models such as Markov or homogeneous Poisson. LRD and non-gaussianity can lead to much higher packet losses than predicted by classical Markov/Poisson queueing analyses [], [3]. The discovery of self-similar behavior in traffic led immediately to new fractal aggregate traffic models (see [4], [5], for example). Fractional Gaussian noise (fgn), the most widely applied fractal model, is a Gaussian process with strong scaling behavior. Due to its Gaussianity, it lends itself to rigorous analytical studies of queueing behavior. Also, approximate fgn can be synthesized rapidly by a variety of different techniques, including wavelets. A strong argument for fgn in networks is that often aggregate traffic can be viewed as a superposition of a large number of independent individual ON/OFF sources that transmit at the same rate but with heavy-tailed ON durations [6], [7]. In the limit of infinitely many sources, the ON/OFF model converges to fgn. Unfortunately, fgn is unrealistic for bursty non- Gaussian traffic. For instance, when the standard deviation of the traffic exceeds its mean, a considerable portion of an fgn traffic synthesis is negative. These failings have motivated more complicated models for aggregate traffic such as multifractals and infinitely divisible cascades [], [8]. However, while more statistically accurate, these models lack network relevance in their parameterizations. In particular, they do not account for why bursts occur in network traffic. This is precisely the question we study in this paper. We will exploit the connection-level information contained in most publicly available traffic traces to target bursts directly. This information is typically ignored in a classical aggregate (LRD, fractal, multifractal) analyses. The result is a new framework for analyzing and modeling bursty network traffic. ½ See [6], [7] for connection-level studies to explain the underlying causes of self-similar behavior.
2 ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Number of bytes per time Number of connections per time Bytes per connection during a burst 3 x number of connections 4 5 x (a) 4 6 time ( unit=5ms) (b) 4 6 time ( unit=5ms) (c) Fig.. (a) Bytes-per-time and (b) number of connections-per-time of an aggregate traffic trace [9]. (c) Number of bytes per connection (sorted in decreasing order) during a typical burst. Clearly one connection dominates all others. total traffic alpha component beta component 3 x 5 3 x 5 3 x 5.5 = time ( unit=5ms) 4 6 time ( unit=5ms) 4 6 time ( unit=5ms) Fig.. Decomposition of the traffic trace into the sum of a bursty alpha component and an fgn beta component. II. CONNECTION-LEVEL TRAFFIC ANALYSIS We define a connection as the unique four-tuple comprising a source IP address, destination IP address, source port number, and destination port number. Connection-level information enables us to conduct a refined analysis of traffic bursts. In aggregate traffic models (including the ON/OFF model), traffic bursts arise from a large number of connections transmitting bytes or packets simultaneously. That is, bursts stem from a kind of constructive interference of many connections. With connection-level information, we can test this hypothesis. If it were true, then we should observe in real traffic traces a large number of active connections during bursts. However, Figures. (a) and (b) demonstrate that this is not the case. Bursts in bytes-per-time generally do not coincide with large values connections-per-time. Quite to the contrary, a careful analysis of many real traces [] reveals that generally very few high-rate connections dominate during a burst. In fact in most cases only one connection dominates. This surprising finding has far-reaching implications for traffic analysis and modeling. To explore further, we propose a new analysis technique that exploits connection-level information to separate a measured traffic trace into two distinct components at a time-scale Ì of interest.. In each Ì -second time bin, identify the connection(s) that transmits the largest.. If the strength of the identified connection(s) is greater than a threshold, then label it as a dominant connection. The (large) threshold is chosen based on the mean of the aggregate traffic at time-scale Ì plus a few standard deviations. We call the traffic corresponding to the dominant connections the alpha component. The residual traffic is called the beta component. 3 Our procedure thus decomposes an aggregate traffic trace into total traffic alpha traffic beta traffic () See Figure for real data example. We have applied the alpha/beta traffic decomposition to many real-world traffic traces, from Auck [9] to LBL [] and found tremendous consistency in our results []. The statistical properties of the components can be summarized as follows. traffic: At time-scales coarser than the round-trip time, the beta component is very nearly Gaussian and ¾ While we set Ì ¼¼ms for the analyses in this paper, our results held for a wide range of Ì. By analogy to the dominating alpha males and submissive beta males observed in the animal kingdom.
3 SHRIRAM SARVOTHAM, RUDOLF RIEDI, RICHARD BARANIUK 3 strongly LRD (i.e., approximately fgn), provided a sufficiently large number of connections are present. Moreover, the beta component carries the same fractal scaling (LRD) exponent as the aggregate traffic (see Figure 4(a)). traffic: The alpha component constitutes a small fraction of the total workload but is entirely responsible for the bursty behavior. traffic is highly non-gaussian. See [] for a number of computationally simpler schemes for decomposing traffic into alpha and beta components, including a scheme based on wavelet thresholding that does not require explicit connection information to extract the alpha traffic. III. ORIGINS OF ALPHA AND BETA TRAFFIC We have seen that bursts are not caused by a conspiracy of many moderate flows, but rather by solitary alpha connections. Here we study the origins of this behavior. A. Potential causes of bursts To begin, we list four possible reasons for connections to dominate and cause bursts. The first three are based on the predominant network protocol, TCP, while the last one blames the heterogeneity in bottleneck bandwidths.. Transient response to re-routing: Some connections could be rerouted from a high-bandwidth end-to-end path to the (lower-bandwidth) measured link. Since TCP feedback takes at least one round-trip time, we could expect a transient bursty behavior for such connections.. Transient response to start/stop of connections: When connections sharing a link terminate or are rerouted away from the measured link, other competing connections will grab their share of the bandwidth. This could potentially lead to bursty connections, especially for those connections in TCP slow-start. 3. TCP slow-start peculiarities: Some connections could get lucky during slow start in that they encounter no packet drops for an unusually long time. 4. Heterogeneity in bottleneck bandwidths: This scenario acknowledges the fact that connections are limited in their transmission rates by bottlenecks somewhere in the network, which may or may not be at the measured link. Bottlenecks can occur through limited capacity at a router, through shaping, or through a thin client, to give a partial list. When we have a large pool of connections, we would expect that the high bottleneck connections should dominate over the low-bottleneck connections and could potentially cause bursts. This scenario assumes that there are only a few connections that have high bottleneck bandwidth. B. Dominance and bursts as end-to-end properties We argue that the last of the above scenarios, i.e., heterogeneity in bottleneck bandwidths, is solely responsible for the bursts observed in our analyses. 4 Our first and most striking observation is the clustering of alpha connections according to their source-receiver host pairs. We collect all connections with the same source and destination hosts into an end-to-end group. If random effects of the networking protocols were causing bursts, then we would find the dominating alpha connections distributed randomly over the end-to-end groups. The abovementioned clustering indicates that the opposite is true. More convincingly, our second observation states that if an end-to-end group contains one alpha connection, then all connections in that group are either alpha, or too short to cause a burst. This demonstrates clearly that bursts are caused by large volume connections over particular (necessarily high-bandwidth) end-to-end paths. Finally, a third observation based on a more refined analysis gives a potential physical reason for the original of alpha bursts. To this end, we compare for each connection its total transfer load with its peak rate, which we compute as the maximum sent by the connection during any time period of duration Ì. Figure 3 displays the total load versus peak rate for all connections within six particular end-to-end groups. The groups in the top row contain at least one alpha connection, the groups in the bottom row none. For all of the connections in groups ½ and ¾, most of the transfer is completed within a single time period of Ì ¼¼ms. We conclude that these connections were not limited in their bandwidth consumption. In other words, the end-to-end paths corresponding to groups ½ and ¾ have a high available bandwidth. To the contrary, the connections in groups 4 6 are obviously not getting as much bandwidth as they could consume. None of these connections are alpha. Finally, group must have limited bandwidth, but at a level high enough to admit burst causing connections indeed, all its connections are alpha. With such a consistent picture, we can exclude re-routing as the main cause for bursts, since it would be highly unlikely that all connections in a group would be systematically affected by it. In summary, we conclude that the majority of burst causing connections are due to large file transfers over a large bottleneck bandwidth end-to-end path. We cannot exclude the possibility that one or more of the other scenarios cause an occasional burst. However, we focus here on the mechanisms that produce the overwhelming majority of bursts.
4 4 ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP End to end host group End to end host group 5 5 End to end host group End to end host group 4 End to end host group 5 End to end host group Fig. 3. Plot of peak rate and total transfer for six end-to-end groups (which comprise all connections sharing the same pair of source and destination hosts). Connections are sorted in decreasing order of total transfer. Note the high peak rates in the top row groups 3 contain alpha connections. Note the starvation of connections and low overall peak rates in the bottom row groups 4 6 contain only beta connections. IV. CONNECTION-LEVEL TRAFFIC MODELING Our alpha/beta decomposition technique suggests an intuitive and natural traffic model that takes into account both the network topology and user behavior. A major conclusion of our analysis is that the burstiness in network traffic is caused by the heterogeneity in link speeds and computational power within the network (including the networking software/hardware of the clients) and user behavior. The TCP protocols enters in its ability to grab free bandwidth quickly in slow-start. Consider a simplified taxonomy of a network system. There are roughly two kinds of file sizes: large ones such as jpeg images and small ones such as text s. There are also roughly two speeds of connections: fast ones such as Ethernet or DSL lines and slow ones such as 56k modems. We argue that only large files over fast links contribute to alpha traffic (see Table I). The remaining combinations aggregate together into fgn beta traffic. Therefore, we model traffic as a sum of alpha and beta traffic as in () and Figure. Such traffic is simple to both analyze and synthesize. The beta component succinctly collects all the average connections and is well modeled as fgn with LRD parameter equal to that of the overall traffic. The alpha component consists of the dominant, burst causing connections and contributes low traffic volume but accounts for all the bursts, which arrive in a pattern according to the capabilities of network and requests of the clients routing TABLE I SIMPLE 4-WAY FILE SIZE VS. LINK-SPEED TAXONOMY. file size large small connection speed slow fast through the given point of measurement. The alpha burst arrivals are not exactly Poisson but can to a first approximation be modeled as such (most likely, they are compound Poisson). Furthermore, the dominant connections are uncorrelated with the overall connection arrivals and thus can be modeled as an independent process. Our alpha/beta model is predictive, since for a given topology and user behavior, we can determine a priori which connections will aggregate into the fgn background and which connections will cause bursts. Syntheses from our model then closely match real traffic and controlled ns simulations []. For example, under heavy utilization (when the router at which we take our measurements becomes itself the bottleneck link for all connections) or with a considerably homogeneous clientele, we should and do observe fewer bursts and more Gaussian traffic. We observe exactly the contrary in the LBL data [], since there
5 SHRIRAM SARVOTHAM, RUDOLF RIEDI, RICHARD BARANIUK 5 log(variance) LRD (Variance time plot) Multifractal spectra Queuing behavior Scale (dyadic) spectrum f(α) α tail queue probability queue size in (a) (b) (c) Fig. 4. Statistical properties of the components. (a) The beta component determines the LRD of the overall traffic (same slopes in a variance-time plot). (b) The alpha component is responsible for the bursts (as evidenced by the multifractal spectrum). (c) The alpha/beta components influence queue overflow probability primarily at large/small queue sizes. are not enough active connections to give a full fgn beta component once the dominant connection is stripped away. Finally, through queueing simulations, we have demonstrated that the beta component determines the tail queue probability for small queue sizes, whereas the alpha component determines the tail queue probability for large queue sizes (see Figure 4(c)). More experiments are underway. V. CONCLUSIONS We have proposed a new framework for analyzing and modeling network traffic that takes into account the crucial connection-level information that aggregate analysis ignores. Our alpha/beta traffic model incorporates both the topological and user aspects of networking. The topological variability of the network enters through the distribution of bottlenecks link speeds, which in a real world situation will depend on the particular location where the measurements are taken. Client behavior will determine both the LRD component as well as how often large files are transferred over large bottlenecks. Currently we are analyzing more traces to further test and prove-out the model. and high variability. In: Progress in probability and statistics, E. Eberlein and M. Taqqu eds., vol., Birkhaeuser, Boston, 986, pp [6] M. Crovella and A. Bestavros, Self-similarity in World Wide Web traffic. Evidence and possible causes, IEEE/ACM Transactions on Networking, vol. 5, pp , December 997. [7] W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, Selfsimilarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level, IEEE/ACM Trans. Networking (Extended Version), vol. 5, no., pp. 7 86, Feb [8] A. Feldmann, A. C. Gilbert, and W. Willinger, Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic, Proc. ACM/Sigcomm 98, vol. 8, pp. 4 55, 998. [9] NLANR, Auckland-II trace archive, [] S. Sarvotham, R. Riedi, and R. Baraniuk, Connection-level analysis and modeling of network traffic, Tech. Rep., ECE Dept., Rice Univ., July. [] LBL, Internet traffic archive, [] K. Fall and K. Varadhan, ns notes and documentation, [3] S. McCane and S. Floyd, ns- network simulator, [4] J. Lévy Véhel and R. Riedi, Fractional Brownian motion and data traffic modeling: The other end of the spectrum, Fractals in Engineering, pp. 85, Springer 997. REFERENCES [] W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the selfsimilar nature of Ethernet traffic (extended version), IEEE/ACM Trans. Networking, pp. 5, 994. [] R. H. Riedi, M. S. Crouse, V. Ribiero, and R. G. Baraniuk, A multifractal wavelet model with application to TCP network traffic, IEEE Trans. Inform. Theory, vol. 45, no. 3, pp. 99 8, April 999. [3] A. Erramilli, O. Narayan, and W. Willinger, Experimental queueing analysis with long-range dependent traffic, IEEE/ACM Trans. Networking, pp. 9 3, April 996. [4] F. Brichet, J. Roberts, A. Simonian, and D. Veitch, Heavy traffic analysis of a fluid queue fed by a superposition of ON/OFF sources, COST, vol. 4, 994. [5] M. Taqqu and J. Levy, Using renewal processes to generate LRD
Connection-level Analysis and Modeling of Network Traffic
Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling studies lump all connections together into
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: [email protected] Helmut E. Bez Department of Computer
Network Performance Measurement and Analysis
Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
On the Use of Traffic Monitoring and Measurements for Improving Networking
On the Use of Traffic Monitoring and Measurements for Improving Networking Sílvia Farraposo 1, Philippe Owezarski 2, Edmundo Monteiro 3 1 Escola Superior de Tecnologia e Gestão de Leiria, Morro do Lena
Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
A Compound Model for TCP Connection Arrivals
A Compound Model for TCP Connection Arrivals Carl J Nuzman Dept of Electrical Engineering Princeton University Iraj Saniee Wim Sweldens Alan Weiss Bell Laboratories, Lucent Technologies Murray Hill, NJ
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
Application Layer Traffic Analysis of a Peer-to-Peer System
Application Layer Traffic Analysis of a Peer-to-Peer System Dietmar Tutsch Technical University Berlin Institute of Computer Engineering and Microelectronics Berlin, Germany [email protected] Gilbert
Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation Manish Jain Georgia Tech [email protected] Constantinos Dovrolis Georgia Tech [email protected] ABSTRACT The area of available
Analysis of VDI Workload Characteristics
Analysis of VDI Workload Characteristics Jeongsook Park, Youngchul Kim and Youngkyun Kim Electronics and Telecommunications Research Institute 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Republic of
The Interaction of Forward Error Correction and Active Queue Management
The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier
Network Traffic Modeling and Prediction with ARIMA/GARCH
Network Traffic Modeling and Prediction with ARIMA/GARCH Bo Zhou, Dan He, Zhili Sun and Wee Hock Ng Centre for Communication System Research University of Surrey Guildford, Surrey United Kingdom +44(0)
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Robust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,
15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
Hybrid network traffic engineering system (HNTES)
Hybrid network traffic engineering system (HNTES) Zhenzhen Yan, Zhengyang Liu, Chris Tracy, Malathi Veeraraghavan University of Virginia and ESnet Jan 12-13, 2012 [email protected], [email protected] Project
Workload Generation for ns. Simulations of Wide Area Networks
1 Workload Generation for ns Simulations of Wide Area Networks and the Internet 1 M. Yuksel y, B. Sikdar z K. S. Vastola z and B. Szymanski y y Department of Computer Science z Department of Electrical
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Measurement and Modelling of Internet Traffic at Access Networks
Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The
Fractal Network Traffic Analysis with Applications
Fractal Network Traffic Analysis with Applications A Dissertation by Jian Liu In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the School of Electrical and Computer
Time Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,
Rate-Based Active Queue Management: A Green Algorithm in Congestion Control
Rate-Based Active Queue Management: A Green Algorithm in Congestion Control Balveer Singh #1, Diwakar Saraswat #2 #1 HOD Computer Sc. & Engg. #2 Astt. Prof. Computer Sc. & Engg PKITM Mathura (UP) India
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT Sergejs Ilnickis Keywords: network traffic, self-similar traffic, traffic analysis. Abstract - Last scientific publication shows that
Techniques for available bandwidth measurement in IP networks: A performance comparison
Computer Networks 50 (2006) 332 349 www.elsevier.com/locate/comnet Techniques for available bandwidth measurement in IP networks: A performance comparison Leopoldo Angrisani a, Salvatore DÕAntonio b, *,
MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD
STaaS, modelling, cloud computing Rostyslav STRUBYTSKYI * MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD Abstract Cloud data storages in their internal structure are not using their full potential
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS by Arthur L. Blais B.A., California State University, Fullerton, 1982 A thesis submitted to the Graduate Faculty
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC Boris Bellalta 1, Miquel Oliver 1, David Rincón 2 1 Universitat Pompeu Fabra, Psg. Circumval lació 8, 83 - Barcelona, Spain, boris.bellalta,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Bandwidth Measurement in Wireless Networks
Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen
PFS scheme for forcing better service in best effort IP network
Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
An Improved Available Bandwidth Measurement Algorithm based on Pathload
An Improved Available Bandwidth Measurement Algorithm based on Pathload LIANG ZHAO* CHONGQUAN ZHONG Faculty of Electronic Information and Electrical Engineering Dalian University of Technology Dalian 604
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract
Bandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring
A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring Cesar D Guerrero 1 and Miguel A Labrador University of South Florida Department of Computer Science and Engineering Tampa,
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
Bandwidth Estimation for Best-Effort Internet Traffic
Bandwidth Estimation for Best-Effort Internet Traffic Jin Cao Statistics and Data Mining Research Bell Labs Murray Hill, NJ William S Cleveland Department of Statistics Purdue University West Lafayette,
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
