ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS
|
|
|
- Jacob Ryan
- 9 years ago
- Views:
Transcription
1 ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science Helmut E. Bez Department of Computer Science Jonathan M. Blackledge Department of Electronic and Electrical Engineering S. Datta Department of Electronic and Electrical Engineering ABSTRACT There are many models in the literature that consider the main characteristics of Internet traffic noise either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets. KEYWORDS: FRACTALS,SELF-AFFINTY, INTERNET TRAFFIC, COVERT TRANSMISSION TECHNIQUES,POWER SPECTRUM 1 Introduction There are several empirical and analytical studies of Internet traffic data from networks, including Eathrnet Local- Area Networks (LAN) [1], Wide Area Network (WAN) [2], World Wide Web (WWW) data transfer [3] and other communication systems that have all convincingly demonstrated the presence of self-affine characteristics. Self-affinity and self-similarity are properties we associate with fractals - objects that appears the same regardless of the scale at which they are viewed. With Internet data, this it manifested in the absence of a natural length of a burst ; at every time scale, ranging from a few milliseconds to minutes and hours, bursts occur that consist of sub-periods separated by less bursty sub-periods. The commonly assumed models for network traffic date (e.g. the Poisson model) do not fit the statistical characteristics of Internet traffic data, primarily because these models are not able to capture the fractal behavior of Internet There are many models in the literature that consider the main characteristics of Internet traffic noise either by processing the real measurements of traffic in the time- or frequency-domain. In this work we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt the Random Scaling Fractal model, RSF (q), to simulate the self-affine characteristics of the Internet The relevance and validation of the proposed model are demonstrated by application of studies for measured Internet traffic obtained at the campus network of Loughborough University captured using the tcpdump utility. Among all the possible traffic characteristics, our work focuses on two properties: packet size in bytes and packet inter-arrival time. For the application to securing data transmission through the Internet, instead of attaching a complete file (encrypted or otherwise) at a given time, we first encrypt the file (using Crypstic TM ) and then split a binary representation of the file into a number of blocks. Each block is then saved as a sequence of binary files whose size is determined by the fractal characteristics of the Internet through which the data is to transmitted using our proposed model. At the same time, a sequence of interarrival times are generated using the same model. The data is then applied to the Internet as attachments and submitted according to the sequence of interarrival times computed. The recipient of the data recovers the information by concatenating the files sequence.
2 To our knowledge, this approach is the first of its kind to use the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number blocks (files) whose size and submission times are compatible with the bursty lengths of Internet The rest of this paper is organized as follows: In section 2 we present the description of the data set used in this work. Section 3 provides the characterization of the Internet traffic using fractal model. In setion 4 we present the estimation of fractal parametr for internet properties.in section 5 we present the covert transfer of data through the Internet. Finaly, in section 6 we conclude with the main results. 2 Network Traffic Measurement The data set used for this study was a collection of observations made of a network in aplace at Loughborough University in March, Among all the possible traffic characteristics, our work has focused on two properties: packet size and packet inter-arrival times. The measurements were made over the course of about one hour, and recorded all packets arriving at or originating from the host site on Mar , at 10:30 AM (LU-trace) [4]. self-similar or self-affine; they look the same in stochastic sense at different scale. RSF noise are characterized by power spectra whose frequency distribution is proportional to 1/ω q where ω is the frequency and q > 0 is the Fourier Dimension, a value that is simply relate to the Fractal Dimension, D and Hurst(Dimension) parameter H. The relationship between the q, H and D is given by q = H + 1/2 = (5 2D)/2 This power law describes the convenetial RSF models which based on stationary processes in which the statistics of the RSF signals are invariant of time and the value of q is constant. It is known that the Hurst parameter(dimension) H measures the features of self-affinity of time series in real-time domain. Herein, we present the description of these features through processing the time series in the frequency domain in which we assume that the power spectrum of this signal is dominated by a RSF model P (ω) = c/ω q, where c > 0 Assume X(t), in time domain, be a time series of the In- The used measurements represent the number of bytes that arrived over the server at the Computing Services Dept. and the corresponding timestamps for their arriving. The data in its original formate was at the scale of 1µsc. We aggregated this data to resolve at different time scales 1 sec, o.1 sec, 0.01 sec, and sec for computational convenience. The resulting time series array with the number bytes that arrived in each time interval is considered as the set of observations in this work. 3 Characterization of Internet Traffic Noise using a Fractal Model Fractals are applicable when the underlying process being mathematically modeled have a similar appearance regardless of the time or observation scale. It turns out that much of the traffic riding the Internet can be modeled using fractals [5]. In this section we introduce a novel method depending on the frequency analysis by which we try to capture the fractal behavior of Internet traffic in which we adopt a Random Scaling Fractal, RSF(q), model to characterize the self-affine characteristic of the Internet 3.1 Random Scaling Fractal Noise Many noise signals observed in nature are random fractals. Random Scaling Fractal noise (RSF) are signals whose probability distribution function or PDF has the same shape irrespective of the scale over which they are observed. So that, random fractal noises are statistically Figure 1. Internet bytes traffic over four different time scales; upper left: 1000 ms, upper right: 100 ms, lower left: 10 ms, and lower right: 1 ms ternet bytes traffic or packets inter-arrival times which to be assume a self-affine signal, (see Figure 1 and Figure 2 ). The power spectrum of such signal can be written as P (ω) = X(ω) 2, where X(ω) is Fast Fourier Transform (FFT) of the time series in frequency domain ( i.e. X(ω) = f f t(x(t))). For such time series the power spectrum,p (ω) obeys the RSF model P (ω) = c ω q Figure 3 show example of different plots of the measured power spectrum of Internet bytes traffic over four different time units. Figure 4 shows the plot of measured power
3 Figure 2. Inter-arrival times of packets Figure 4. Measured power spectrum of packets interarrival times, from top to bottom and from left to right: (q=0.08),(q=0.15),(q=0.19) and (q=0.11) or F (ω i ) 2 = ˆP (ω i ) = c ω i q If we consider the error function E(q, c) = [ln P (ω i ) ln ˆP (ω i )] 2 Figure 3. Measured power spectrum of bytes traffic, from top to bottom and from left to right: 1sec (q=0.45), 100ms (q=0.28), 10ms (q=0.10) and 1ms (q=0.15) spectrum of packet inter-arrival times. These figures give the evident that the power spectrum of the time series signal of internet traffic obeys the RSF model. However, we can characterize the behavior of Internet traffic through estimating the parameter q in the proposed model where the estimated values of this parameter will reflect the degree of self-similarity(fractality) in real internet To do this,and in the following section, we apply the Least Square Method on the measurements of Internet traffic that is described in Section Power Spectrum Method Let X i, i = 1, 2, 3,..., N (N being a power of 2) be an aggregated time series that represent the number of bits, bytes that occurred in a predefined unit time, this unit time may 1 sec, 100 msec, 10 msec, or 1msec. Consider the case in which the digital power spectrum P i P (ω i ) is given by applying a FFT to this time series. This data can be approximated by F (ω i ) = c ω i q 2 = [ln P (ω i ) C + q ln ω i ] 2 where C = ln c, and it is assumed that the spatial frequency ω i > 0 and the measured power spectrum P (ω i ) > 0, i then the solutions of equations (least square method) E q = 0 and E C = 0 gives and N N (ln ω i ) ln P (ω i ) ( N ln ω i )( N ln P (ω i ) q = ( N ln ω i ) 2 N N (ln ω i ) 2 C = 1 N ln P (ω i ) + q N ln ω i Since the power spectrum of real signals of size N is symmetric about the DC level, where the DC level is taken to the mid point N of the array, so in practice we consider only N 2 of data that lie to the right of DC. [7] 4 Estimation of Fractal Parameter for Packets Sizes and Inter-arrivals times The two main properties of network packets are their sizes in bytes and their inter-arrival times ( timestamp differences between consecutive packets). and both of them are
4 Figure 5. Estimating Fourier Dimension Figure 6. Generation of a synthetic fractal trace. obey to the Random Scaling FractalRSF (q) model. To estimate the fractal parameter in theses series we convert them to frequency domain in which we assumed that the empirical power spectrum of each series has an envelop Power Spectrum Density Function (PSDF) which given as the RSF model P (ω) = ω q. By using Moving Window technique, we choose a window of size N = 1024 to move over the points of the time series according to the given time unit. From each window segment we apply the PSM to estimate the Fourier Dimension q, after implementing normalizing and transformation to spectral domain on the given segment. Figure 5 shows the block diagram of the estimation method of the parameter q. Table 1 and Table 2 gives the results of estimation of q form the packet sizes for over different time scales and packet inter-arrival times, respectively. From these results we note as the time resolution increases then the value of q decreases. Wind. No. 1 ms 10 ms 100 ms 1 s Byte Byte Byte Byte Table 1. The estimated values of q, on different time scales Wind. No est(q) Table 2. The estimated values of q for packet Inter-arrival series 5 Covert Transfer of data through the Internet In this section we introduce the method of using the fractal characteristics of internet traffic to camouflage the transfer of a digital file through the Internet. For applications to securing data transmission through the Internet, instead of attaching a complete file (encrypted or otherwise) at a given Figure 7. The mechanisim of sending a digital file over the Internet. time, we split a binary representation of the file into a number of blocks. Each block is then saved as a sequence (a trace)of binary files in which the statistical characteristics of such traces fit with the characteristics of the actual trace of Internet packets. The sizes of the split files are determined by the fractal characteristics of the Internet through which the data is transmitted using the Random Scaling Fractal model. At the same time, a sequence of inter-arrival times are generated using the same model. This sequence is used to formulate the required timestamps. The data is then applied to the Internet as attachments and submitted according to the sequence of timestamps computed(see Figure 7). The recipient of the data recovers the information by concatenating the files sequence. 5.1 Synthetic Generation of a Fractal Traffic Trace The method of generating a synthetic traffic trace for the purpose of securely transferring a set of files as attachments is considered. In this way, we generate synthetic trace or sample path that exhibit the same statistical properties as the measured The points of the sample path represent the sizes in bits of the split files. In general, this method of generating a synthetic trace with fractal characteristics depends on generating white Gaussian noise that is filtered using the Random Scaling Fractal
5 model with a suitable value of the parameter q. To ensure that the synthetic trace is representative of a trace that is likely to be encountered in the real world, the synthetic trace is used the estimated values of q from the captured traces of actual Internet The inputs to the method are q, the desired Fourier dimension, and N, the desired number of points in the synthesized sample, (where N is a power of 2). Here, the parameter q takes a value from the table of estimated values or it may take the average of these values. Similarly, the synthetic sequence of inter-arival times is generated which used to produce the timestamps in military form. Figure 6 shows the block diagram of the generation a synthetic fractal trace. 6 Conclusion We studied the sereis of byte counts on different aggregation level of 1 sec, 0.1 sec, 0.01 sec and sec. and the sequence of packets inter-arrival times. The analysis of our trace demonestrated that the Internet traffic appeared to agree with the finding of previous studies, shwoing that fractal characteristics of internet For application of sending a digital file through the Internet we introduced a novel approach in which the fractal characteristics of internet traffic have been considered, in a way, that the synthetic trace of split files fit the actual trace of internet Indeed, to our knowledge, this approach is the first of its kind to use the self-affine nature of Internet traffic in order to camouflage the transmission of a digital file by splitting the file into a number blocks (files) whose size and submission times are compatible with the bursty lengths of Internet [6] E. Marke, M. Crovella and A. Bestavors, Explaining World Wide Web traffic Self-similarity, Technical Report TR , Boston University, Computer Scinece Department,1995. [7] M. Turner, J. M. Blackledge and P. Andrew, Fractal Geometry in Digital Imaging, (UK: Academic Press Ltd., 1998). [8] W. Willinger and V. Paxson, Where Mathematics meets the Internet,Notices of the American Mathematical Society, 45(8), 1998, [9] D. Chakraborty, A. Ashir, G. Suganuma, K. Mansfield, T.Roy and N. Shiratori, Self-similar and fractal nature of Internet traffic, International Journal of Network Management, 14(2), 2004, [10] Liu Shu-Gang, Wang Pei-Jin and Qu Lin-Jie, Modelling and simulation of self-similar data traffic, Proc. of the 4th International conference on machine learning Cyberetics, Guangzhou, 2005, [11] Bo R. and Lowen S., Fractal traffic models for Internet simulation, Proc. of fifth IEEE Symposium (ISCC 2000)2000, [12] Paxson V., Fast approximation of self-similar network traffic, Lawrence Berkeley National Lab., Tech. Rep., LBL , Berkeley, USA, Apr References [1] W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions on Networking, 2(1), 1994, [2] V. Paxon and S. Floyd, Wide-area traffic: The failure of Poisson modeling, IEEE/ACM Transactions on Networking, 3(3), 1995, [3] M. E. Crovella and A. Bestavros, Self-similarity in World Wide Web traffic: Evidence and possible causes, IEEE/ACM Transactions on networking, 5(6), 1997, [4] The internet traffic archive, Personal communication with Network manager at Computing Services Department/, [5] J. M. Blackledge, Digital Signal Processing:Mathematical and Computation Methods, Software Development and Applications, ( London: Horwood Publishing Limited, 2nd Edition, 2006).
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Burst (of packets) and Burstiness
66th IETF - Montreal, Quebec, Canada Burst (of packets) and Burstiness R. Krzanowski Ver 1.0 7/10/2006 1 Outline Objectives Definition of a phenomena Definition of Burst and burstiness Future research
Network Performance Measurement and Analysis
Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview
Analysis of VDI Workload Characteristics
Analysis of VDI Workload Characteristics Jeongsook Park, Youngchul Kim and Youngkyun Kim Electronics and Telecommunications Research Institute 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Republic of
Connection-level Analysis and Modeling of Network Traffic
ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
Time Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Measurement and Modelling of Internet Traffic at Access Networks
Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,
Connection-level Analysis and Modeling of Network Traffic
Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling studies lump all connections together into
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT Sergejs Ilnickis Keywords: network traffic, self-similar traffic, traffic analysis. Abstract - Last scientific publication shows that
Application Layer Traffic Analysis of a Peer-to-Peer System
Application Layer Traffic Analysis of a Peer-to-Peer System Dietmar Tutsch Technical University Berlin Institute of Computer Engineering and Microelectronics Berlin, Germany [email protected] Gilbert
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
A New Look at an Old Tool the Cumulative Spectral Power of Fast-Fourier Transform Analysis
A New Look at an Old Tool the Cumulative Spectral Power of Fast-Fourier Transform Analysis Sheng-Chiang Lee a and Randall D. Peters Physics Department, Mercer University, Macon, GA 31207 As an old and
ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out
Introduction to acoustic imaging
Introduction to acoustic imaging Contents 1 Propagation of acoustic waves 3 1.1 Wave types.......................................... 3 1.2 Mathematical formulation.................................. 4 1.3
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
SOFTWARE FOR GENERATION OF SPECTRUM COMPATIBLE TIME HISTORY
3 th World Conference on Earthquake Engineering Vancouver, B.C., Canada August -6, 24 Paper No. 296 SOFTWARE FOR GENERATION OF SPECTRUM COMPATIBLE TIME HISTORY ASHOK KUMAR SUMMARY One of the important
NRZ Bandwidth - HF Cutoff vs. SNR
Application Note: HFAN-09.0. Rev.2; 04/08 NRZ Bandwidth - HF Cutoff vs. SNR Functional Diagrams Pin Configurations appear at end of data sheet. Functional Diagrams continued at end of data sheet. UCSP
Bandwidth-dependent transformation of noise data from frequency into time domain and vice versa
Topic Bandwidth-dependent transformation of noise data from frequency into time domain and vice versa Authors Peter Bormann (formerly GeoForschungsZentrum Potsdam, Telegrafenberg, D-14473 Potsdam, Germany),
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Round-Trip Time Inference Via Passive Monitoring
Round-Trip Time Inference Via Passive Monitoring Ryan Lance Department of Mathematics University of Maryland College Park, Maryland [email protected] Ian Frommer Applied Mathematics and Scientific Computation
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS by Arthur L. Blais B.A., California State University, Fullerton, 1982 A thesis submitted to the Graduate Faculty
Signal Processing Methods for Denial of Service Attack Detection
0 Signal Processing Methods for Denial of Service Attack Detection Urbashi Mitra Ming Hsieh Department of Electrical Engineering Viterbi School of Engineering University of Southern California Los Angeles,
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Spectrum Level and Band Level
Spectrum Level and Band Level ntensity, ntensity Level, and ntensity Spectrum Level As a review, earlier we talked about the intensity of a sound wave. We related the intensity of a sound wave to the acoustic
Characterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
Workload Generation for ns. Simulations of Wide Area Networks
1 Workload Generation for ns Simulations of Wide Area Networks and the Internet 1 M. Yuksel y, B. Sikdar z K. S. Vastola z and B. Szymanski y y Department of Computer Science z Department of Electrical
Analog and Digital Signals, Time and Frequency Representation of Signals
1 Analog and Digital Signals, Time and Frequency Representation of Signals Required reading: Garcia 3.1, 3.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Data vs. Signal Analog vs. Digital Analog Signals
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones
Final Year Project Progress Report Frequency-Domain Adaptive Filtering Myles Friel 01510401 Supervisor: Dr.Edward Jones Abstract The Final Year Project is an important part of the final year of the Electronic
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
ESTIMATION OF TOKEN BUCKET PARAMETERS FOR VIDEOCONFERENCING SYSTEMS IN CORPORATE NETWORKS
ESTIMATION OF TOEN BUCET PARAMETERS FOR VIDEOCONFERENCING SYSTEMS IN CORPORATE NETWORS J.Glasmann, M. Czermin, A. Riedl Lehrstuhl für ommunikationsnetze, Technische Universität München, Arcisstr. 21, 80333
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Lab 1. The Fourier Transform
Lab 1. The Fourier Transform Introduction In the Communication Labs you will be given the opportunity to apply the theory learned in Communication Systems. Since this is your first time to work in the
Introduction to time series analysis
Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples
A Sound Analysis and Synthesis System for Generating an Instrumental Piri Song
, pp.347-354 http://dx.doi.org/10.14257/ijmue.2014.9.8.32 A Sound Analysis and Synthesis System for Generating an Instrumental Piri Song Myeongsu Kang and Jong-Myon Kim School of Electrical Engineering,
Traffic Modelling for Fast Action Network Games
to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering
RANDOM VIBRATION AN OVERVIEW by Barry Controls, Hopkinton, MA
RANDOM VIBRATION AN OVERVIEW by Barry Controls, Hopkinton, MA ABSTRACT Random vibration is becoming increasingly recognized as the most realistic method of simulating the dynamic environment of military
Probability and Random Variables. Generation of random variables (r.v.)
Probability and Random Variables Method for generating random variables with a specified probability distribution function. Gaussian And Markov Processes Characterization of Stationary Random Process Linearly
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
SIGNAL PROCESSING FOR EFFECTIVE VIBRATION ANALYSIS
SIGNAL PROCESSING FOR EFFECTIVE VIBRATION ANALYSIS Dennis H. Shreve IRD Mechanalysis, Inc Columbus, Ohio November 1995 ABSTRACT Effective vibration analysis first begins with acquiring an accurate time-varying
CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems
CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Whitepaper. 802.11n The Next Generation in Wireless Technology
Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed
Non-Data Aided Carrier Offset Compensation for SDR Implementation
Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID
SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID Renewable Energy Laboratory Department of Mechanical and Industrial Engineering University of
Metrol. Meas. Syst., Vol. XVII (2010), No. 1, pp. 119-126 METROLOGY AND MEASUREMENT SYSTEMS. Index 330930, ISSN 0860-8229 www.metrology.pg.gda.
Metrol. Meas. Syst., Vol. XVII (21), No. 1, pp. 119-126 METROLOGY AND MEASUREMENT SYSTEMS Index 3393, ISSN 86-8229 www.metrology.pg.gda.pl MODELING PROFILES AFTER VAPOUR BLASTING Paweł Pawlus 1), Rafał
IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport
IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport Paul Julian Harper Turin Networks, 5 N McDowell Ave, Petaluma CA 995, USA Email: [email protected] Abstract The
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)
Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques
The Calculation of G rms
The Calculation of G rms QualMark Corp. Neill Doertenbach The metric of G rms is typically used to specify and compare the energy in repetitive shock vibration systems. However, the method of arriving
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Timing Errors and Jitter
Timing Errors and Jitter Background Mike Story In a sampled (digital) system, samples have to be accurate in level and time. The digital system uses the two bits of information the signal was this big
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
Continuous One-Way Available Bandwidth Change Detection in High Definition Video Conferencing
Continuous One-Way Available Bandwidth Change Detection in High Definition Video Conferencing Aziz Khanchi, Mehdi Semsarzadeh, Abbas Javadtalab and Shervin Shirmohammadi Distributed and Collaborative Virtual
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Controller Design in Frequency Domain
ECSE 4440 Control System Engineering Fall 2001 Project 3 Controller Design in Frequency Domain TA 1. Abstract 2. Introduction 3. Controller design in Frequency domain 4. Experiment 5. Colclusion 1. Abstract
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
A Study of Internet Packet Reordering
A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 [email protected] 2 China Education
Jitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
Voice Over IP Traffic - A Review of this Paper
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16, NO. 5, SEPTEMBER 2005 1019 Load Characterization and Anomaly Detection for Voice Over IP Traffic Michel Mandjes, Iraj Saniee, Member, IEEE, and Alexander
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline
Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May
Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94
Appendix F Using Linear Fractal Interpolation Functions to Compress Video Images The paper in this appendix was presented at the Fractals in Engineering '94 Conference which was held in the École Polytechnic,
A Statistically Customisable Web Benchmarking Tool
Electronic Notes in Theoretical Computer Science 232 (29) 89 99 www.elsevier.com/locate/entcs A Statistically Customisable Web Benchmarking Tool Katja Gilly a,, Carlos Quesada-Granja a,2, Salvador Alcaraz
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC Boris Bellalta 1, Miquel Oliver 1, David Rincón 2 1 Universitat Pompeu Fabra, Psg. Circumval lació 8, 83 - Barcelona, Spain, boris.bellalta,
Measuring Line Edge Roughness: Fluctuations in Uncertainty
Tutor6.doc: Version 5/6/08 T h e L i t h o g r a p h y E x p e r t (August 008) Measuring Line Edge Roughness: Fluctuations in Uncertainty Line edge roughness () is the deviation of a feature edge (as
