Measurement and Modelling of Internet Traffic at Access Networks
|
|
|
- Damon Parrish
- 10 years ago
- Views:
Transcription
1 Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering, Pfaffenwaldring 47, D Stuttgart, {faerber bodamer}@ind.uni-stuttgart.de 2 Siemens AG, Public Communication Networks, Hofmannstraße 5, D-8359 München, [email protected] Abstract With the growing popularity of the Internet, more and more users access the Internet from their homes via the public switched telephone network. Today s traffic load can not be described accurately by classical methods and therefore new traffic models are needed to allow proper network design and dimensioning. In this paper the dialup session behaviour of home users is discussed. Based on the log data of the modem pool of the University of Stuttgart we present typical traffic characteristics and suggest a simple traffic description for use in traffic models on session level for performance analysis or simulation. Introduction The behaviour of Internet users has a major impact on the performance of networks and services. Especially telephone network operators are interested in descriptions of user generated Internet traffic to be able to adjust their current networks to the growing demand. Such traffic descriptions must be based on measurements of real traffic. The modem pool at the University of Stuttgart offers the possibility to observe the users session behaviour in large scale and for a sufficiently long period. With around 4000 subscribed students and 800 subscribed staff members, the user population is large enough to draw conclusions on general user behaviour. In this paper we present the results of an evaluation of the modem pool log data from May to October 997 with sessions. The log data contain information on the login and holding times for access sessions. In contrast to many other publications concentrating on the packet level, we focus on this session level, i.e. the characteristics of the users dialup sessions without regarding the type and quantity of information transmitted during the sessions. In Section 2 we describe this observed traffic behaviour. For performance evaluation of network components, traffic load has to be modelled under which the system performance can be measured. In Section 3 we present a simple modelling approach that allows to generate traffic with characteristics similar to the monitored traffic. 2 Session behaviour The automatic monitoring of the user login times at the modem pool of the University of Stuttgart allows the evaluation of characteristic measures on session level. Since students and members of staff are assigned two separate modem pools, we distinguish between these two user groups. Note, that there is no way to specify the type of session the user has started. While in
2 most cases it can be expected to be a World Wide Web session, it may also be a telnet session, an ftp or a simple retrieval or a mix of those traffic types. In the following sections we describe the holding time of the sessions, the interarrival time between session starts and the mean daily traffic profile for traffic load. These measures allow to characterize the frequency and duration of a typical user session. 2. Holding time Under the holding time of a session we understand the duration of the seizure of a modem. The mean holding time was around 2 minutes for students and 20 minutes for staff members. However the holding time shows a high variability. When comparing the students of different subjects the observed mean holding time varies from 8 to 3 minutes. Single users have even been online for several days. The maximum holding time was days. The holding time varies strongly during the course of the day. Figure shows the holding time of sessions (of both user groups) associated with the time of the session start. Although this representation has to be regarded with caution (the average during the night is calculated from a relatively small number of calls), it allows the conclusion that long sessions start mainly during the night and early morning hours. Also the mean session length at night is significantly larger than during the day time. The average sessions in the mornings or during the day of nonworkdays are longer. In [6] Morgan reports a significant peak in holding time at 4 am. If the holding time would have been drawn associated with the session endings we would have obtained a peak at 4 am as well. This means that among sessions that end in the early morning, most have lastet for a long time and only few are of a short duration. The high variability of the holding time is visible in the complementary cumulative distribution function (CCDF) which is depicted in Figure 2. The function shows the probability of a holding time being greater than the value on the horizontal axis. While there is a high probability for holding times of less than 2 hours the logarithmic presentation reveals that there is a small but not negligible probability for long sessions of 20 hours and more. This so-called heavy tail is an indication for high variability of large values ([2]). The coefficient of variation of the holding time data is around 2.8 (i.e. the standard deviation is of the magnitude of 2.8 times the mean value) workdays non-workdays 30 mean holding time [min] hour of day Figure : Mean holding time during the day
3 CDF = P{holding time > t} stud staff CCDF = P { interarrival time * number of users > t} stud staff time t [hours] time t [days] Figure 2: Complementary cumulative distribution function of the holding time Figure 3: Complementary cumulative distribution function of the interarrival time 2.2 Interarrival time The interarrival time is the time between two consecutive session beginnings. This time can be measured either for sessions of individual users or for the sessions of all users. The first case leads to a description of the login frequency of a user while the latter one allows a description of the aggregate session arrivals as seen by the access provider. For the aggregate traffic of 4900 subscribers the mean session interarrival time was 40 seconds. In contrast to the holding time discussed above, the interarrival time of aggregate sessions depends strongly on the number of participating users. The CCDF of the interarrival time of the aggregate traffic would be only a description of the behaviour of a group of 4900 users. To allow a comparison with other data we have scaled this CCDF to describe the interarrival time per user (Figure 3). The scaled curves for 400 students and 800 staff members fit amazingly well. Again a high variability is found for longer interarrival times which is indicated by the tail of the CCDF. Figure 4 shows the mean session arrival rate per user during the course of the day for a typical weekday and on weekends. It is obvious that most sessions start during the afternoon and evening. In the early morning far less sessions are originated. If the interarrival time is measured between sessions of individual users, a completely different distribution is received. Figure 5 shows the resulting complementary cumulative distribution function (average of all individual interarrival times of students as well as of members of staff). The curve shows characteristic steps in regular distances of 24 hours for both user groups. The same behaviour can also be found when regarding smaller user groups like students of certain fields. It is explained by the preferences of the users who tend to go online at a certain time of the day although not necessarily every day. Many users prefer for example to make use of cheaper telephone tariffs starting at 6 pm and 9 pm. Although this periodic behaviour is mostly due to telephone tariffs it is also caused by personal habits or work times of users. Obviously there is a strong impact of the natural day and night shift, the working hours, individual preferences and tariffing schemes that leads to a periodic behaviour of end users. This periodicity may lead to unfortunate aggregation of traffic load but it may also be useful in influencing user behaviour in order to shift busy hours and balance network load.
4 weekday weekend arrival rate per user [/day] hour of day Figure 4: Mean arrival rate per user during the day staff stud CCDF = P { interarrival time > t} time t [days] Figure 5: Complementary cumulative distribution function of the session interarrival time for individual users 2.3 Traffic load To cope with the originated traffic, a telephone network must offer sufficient resources in terms of bandwidth (i.e. telephone lines) and connection setup capacity (i.e. processing power). Therefore we distinguish between traffic load related to user traffic (the seizure of the modem lines) and signalling load corresponding to the call arrival rate (see also Figure 4) to describe the actual load of the access network. The average values for user traffic load and signalling traffic load for all days of the observed period are shown in the mean daily traffic profile in Figure 6. To allow a better comparison, both values are depicted in the same figure and are drawn in relation to their maximum values (the actual maximum values are 49 Erlang for the mean traffic load and 30 calls per hour for the mean arrival rate - note that only successful calls and no rejected calls could be
5 00 mean seizure successful arrival rate 80 traffic load (in % of maximum) hour of day Figure 6: Mean daily traffic profile for traffic load and arrival rate (students only) detected at the modem pool). For this evaluation only the student modem pool with 56 modems and 400 subscribers is taken into account. The general shape of the traffic profile is almost complementary to the classic telephone traffic profile which has its busiest hours during the day and decreases at the end of the day. The shown traffic profile is certainly not typical for dialup sessions in general, but it is typical for the behaviour of home users who usually dial up after work hours. The most obvious characteristics of the mean seizure are the two steps at 6 pm and 9 pm. As already mentioned above, these times mark the beginning of cheaper telephone tariffs during the observed period. A small peak is also visible right before 9 am when the expensive day tariff starts. On weekends and holidays the day tariff is the same as in the evening and morning hours and therefore no such steps are visible at 9 am and 6 pm. The user behaviour follows these tariffing scheme amazingly accurate. The flat shape around midnight is due to the limited number of modems. It is interesting that there is a lot of traffic during late night and early morning hours. A comparison with the arrival rate indicates that this traffic is caused by few but long sessions (see Figure ). The time consistent busy hour for user traffic load is found at :45 pm to 0:45 am and for the arrival rate it is found at 6 pm. In [] Bolotin points out, that these two busy hours are significantly shifted against each other for Internet traffic compared to telephone traffic. This phenomenon is caused by much longer holding times of around 20 minutes (compared to 3 minutes for classical telephone calls). For design and dimensioning of network components, traffic load has to be evaluated carefully for both busy hours. 3 Modelling dialup session behaviour For performance evaluation of communication systems by performance analysis or simulation, source traffic has to be modelled to assess the system behaviour. Complex traffic is best described with the help of empirical data. Either a logged traffic trace is replayed into the system model or a mathematical description can be found to generate stochastic traffic of similar characteristics.
6 To describe traffic load on session level it is important to know about the holding time and the session interarrival time. The complementary cumulative distribution functions of these measures capture their most important characteristics. If mathematical functions can be found that describe the CCDFs, they can be used to parameterize a random generator. This generator may then provide a simulation with values for the measure of interest according to that CCDF. While classic telephone traffic is well described with negative exponentially distributed holding times and call interarrival times this is not true for Internet access session traffic any more. The high variability of the measures described above is not captured by this distribution. For the description of Internet traffic other distributions have been proposed like Pareto, hyperexponential or Weibull distributions (e.g. [3], [4], [5], [7]). In the following sections these distributions are fitted to the empirical distributions of the traces and the resulting parameters are presented (see Table ). We use the Marquardt-Levenberg algorithm to find a set of parameters for each function. This iterative algorithm performs a non linear least square fit. Table : Cumulative distribution functions of Pareto, Weibull and the hyperexponential distributions Pareto distribution Weibull distribution hyperexponential distribution (order k) k P{ X x} = -- x α with k x 3. Holding time x -- β α P{ X x} = e k λ i x k P{ X x} = p e i with p = i i = i = Figure 7 shows the results of the fitting operations to the CCDF of the session holding time. Obviously the Pareto distribution is not suited to describe this measure. The Weibull distribution, on the other hand, leads to a rather good fit and also the hyperexponential distribution describes the behaviour accurately to a certain point. The resulting parameters of the fit can be found in Table trace Weibull(a,b) Pareto(a,k) hyperexponential 3 CCDF = P{holding time > t} e time t [min] Figure 7: Fitting of several functions to the CCDF of the holding time
7 Table 2: Resulting parameters of the fitting operation for the holding time distribution parameters mean [min] CoV Trace Pareto α = 0.649, k =.265 Weibull α = 0.584, β = hyperexponential p = 0.436, p 2 = 0.257, λ = 0.072, λ 2 = 0.020, λ 3 = The table also shows the resulting mean value and the coefficient of variation of the parameterized functions in case they do exist. While the mean values for the Weibull and hyperexponential functions are close to the empirical mean, the variability of the real measure is still significantly higher. 3.2 Interarrival time As depicted in Figure 8 the scaled CCDF of the interarrival time (of the summary traffic of all subscribers) is best approximated by a Pareto or a hyperexponential distribution. The Weibull distribution can be fitted either to head or tail of the empirical distribution and is not well suited for its description. Table 3 shows the resulting parameters for all fitted functions as well as the corresponding mean values and the coefficients of variation. Table 3: Resulting parameters of the fitting operation for the interarrival time distribution parameters mean [days] CoV Trace Pareto α =.453, k = Weibull α = 0.879, β = hyperexponential p = 0.926, p 2 = 0.064, λ = 0.528, λ 2 = 0.37, λ 3 = CCDF = P{interarrival time * number of users > t} trace fitted Weibull fitted Weibull (day 0-200) fitted Pareto fitted hyperexp 3 e time t [days] Figure 8: Fitting of several functions to the CCDF of the interarrival time
8 For the interarrival time as for the holding time, the hyperexponential distribution is difficult to fit to the CCDF because of its numerous parameters. The choice of the starting values is significant and the characteristic heavy tail is not captured accurately. If a hyperexponential distribution is chosen to describe the traffic, a more systematic approach would be preferable as is suggested by Feldmann and Whitt in [4]. 4 Conclusion We have presented the traffic characteristics of dialup sessions monitored at the modem pool of the University of Stuttgart. The long holding times and the high variability of holding time and interarrival time can be found in other publications as well and seem to be typical for Internet traffic. We have also shown that the user behaviour is heavily influenced by the employed telephone tariffing scheme. Finally a simple mathematical description of the holding time as well as of the interarrival time was presented. Note that the current modelling approach captures the overall behaviour of the traffic. As depicted in Figure 6 the traffic characteristics vary during the course of the day. Therefore, a model describing traffic load only during the busy hours of internet traffic as well as of telephone traffic would be helpful for network dimensioning. We like to point out, that our results are based on empirical data of a special user group (students and university staff members) and might not describe general Internet traffic. Also the behaviour was strongly influenced by the telephone tariffing scheme in Germany and it should be mentioned that the fast Internet access itself was provided for free. References [] Bolotin V.A.: New Subscriber Traffic Variability Patterns for Network Traffic Engineering, Proceedings of the 5th International Teletraffic Congress - ITC 5, Vol 2, pp , 997 [2] Crovella M., Bestavros A.: Performance Characteristics of World Wide Web Information Systems, Tutorial at the SIGMETRICS 97, 997 [3] Crovella M., Bestavros A.: Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes, Proceedings of the ACM SIGMETRICS, pp , 996 [4] Feldmann A., Whitt, W.: Fitting mixtures of exponentials to long-tailed distributions to analyze network performance models, Performance Evaluation 3, pp , 998 [5] Mah, B.A.: An Empirical Model of HTTP Network Traffic, Proceedings of the IEEE INFO- COM 97, Vol 2, pp , 997 [6] Morgan, S.: The Internet and the Local Telephone Network: Conflicts and Opportunities, IEEE Communications Magazine, pp , January 998 [7] Shuang D.: Empirical Model of WWW Document Arrivals at Access Link, ICC International Communication Conference, 996
The Dependence of Internet User Traffic Characteristics on Access Speed
University of Würzburg Institute of Computer Science Research Report Series The Dependence of Internet User Traffic Characteristics on Access Speed Norbert Vicari*, Stefan Köhler* and Joachim Charzinski
Traffic Modelling for Fast Action Network Games
to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
A Statistically Customisable Web Benchmarking Tool
Electronic Notes in Theoretical Computer Science 232 (29) 89 99 www.elsevier.com/locate/entcs A Statistically Customisable Web Benchmarking Tool Katja Gilly a,, Carlos Quesada-Granja a,2, Salvador Alcaraz
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
Characterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling G. Boggia, P. Camarda, A. D Alconzo, A. De Biasi and M. Siviero DEE - Politecnico di Bari, Via E. Orabona, 4-7125
Tracking the Evolution of Web Traffic: 1995-2003 *
Tracking the Evolution of Web Traffic: 995-23 * Félix Hernández-Campos Kevin Jeffay F. Donelson Smith University of North Carolina at Chapel Hill Department of Computer Science Chapel Hill, NC 27599-375
Introduction to time series analysis
Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples
A Compound Model for TCP Connection Arrivals
A Compound Model for TCP Connection Arrivals Carl J Nuzman Dept of Electrical Engineering Princeton University Iraj Saniee Wim Sweldens Alan Weiss Bell Laboratories, Lucent Technologies Murray Hill, NJ
INTERNET TRAFFIC ANALYSIS WITH GOODNESS OF FIT TEST ON CAMPUS NETWORK
INTERNET TRAFFIC ANALYSIS WITH GOODNESS OF FIT TEST ON CAMPUS NETWORK Murizah Kassim, Mohd Azrul Abdullah and Maizura Mohd Sani Faculty of Electrical Engineering, Universiti Teknologi MARA, UiTM Shah Alam,
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: [email protected] Helmut E. Bez Department of Computer
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
QoS of Internet Access with GPRS
Dept. of Prof. Dr. P. Tran-Gia QoS of Internet Access with GPRS Dirk Staehle 1, Kenji Leibnitz 1, and Konstantin Tsipotis 2 1 [staehle,leibnitz]@informatik.uni-wuerzburg.de 2 Libertel-Vodafone [email protected]
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Skewness and Kurtosis in Function of Selection of Network Traffic Distribution
Acta Polytechnica Hungarica Vol. 7, No., Skewness and Kurtosis in Function of Selection of Network Traffic Distribution Petar Čisar Telekom Srbija, Subotica, Serbia, [email protected] Sanja Maravić Čisar
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
400B.2.1 CH2827-4/90/0000-0350 $1.OO 0 1990 IEEE
Performance Characterizations of Traffic Monitoring, and Associated Control, Mechanisms for Broadband "Packet" Networks A.W. Berger A.E. Eckberg Room 3R-601 Room 35-611 Holmde1,NJ 07733 USA Holmde1,NJ
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Waiting Times Chapter 7
Waiting Times Chapter 7 1 Learning Objectives Interarrival and Service Times and their variability Obtaining the average time spent in the queue Pooling of server capacities Priority rules Where are the
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
Realizing quality of service guarantees in multiservice networks
Realizing quality of service guarantees in multiservice networks J. W. Roberts France Télécom - CNET 38-40, rue du Général Leclerc 92794 Issy Moulineaux Cedex 9 France ([email protected])
2WB05 Simulation Lecture 8: Generating random variables
2WB05 Simulation Lecture 8: Generating random variables Marko Boon http://www.win.tue.nl/courses/2wb05 January 7, 2013 Outline 2/36 1. How do we generate random variables? 2. Fitting distributions Generating
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS
382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:
Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
SES Business Broadband Fair Use Policy
SES Business Broadband Fair Use Policy The Fair Use Policy (FUP) system is a network management tool (controlled by SES Broadband) to monitor and administer network resources to ensure all our customers
CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION
31 CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION 3.1 INTRODUCTION In this chapter, construction of queuing model with non-exponential service time distribution, performance
Workload Characteristics of the DAS-2 Supercomputer
Workload Characteristics of the DAS-2 Supercomputer Hui Li Lex Wolters David Groep Leiden Institute of Advanced Computer National Institute for Nuclear and High Science (LIACS), Leiden University Energy
Traffic Forecasting Models for the Incumbent Based on New Drivers in the Market
Traffic Forecasting Models for the Incumbent Based on New Drivers in the Market KJELL STORDAHL Kjell Stordahl (58) received his M.S. in statistics from Oslo University in 1972. He worked with Telenor R&D
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD
STaaS, modelling, cloud computing Rostyslav STRUBYTSKYI * MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD Abstract Cloud data storages in their internal structure are not using their full potential
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
How performance metrics depend on the traffic demand in large cellular networks
How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented
ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand
Proceedings of the 2009 Industrial Engineering Research Conference Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand Yasin Unlu, Manuel D. Rossetti Department of
Cumulative Diagrams: An Example
Cumulative Diagrams: An Example Consider Figure 1 in which the functions (t) and (t) denote, respectively, the demand rate and the service rate (or capacity ) over time at the runway system of an airport
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS by Arthur L. Blais B.A., California State University, Fullerton, 1982 A thesis submitted to the Graduate Faculty
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
The Case for Quality of Service On Demand
The Case for Quality of Service On Demand Empirical Evidence from the INDEX Project Jörn Altmann Björn Rupp Pravin Varaiya 1 Introduction In order to ensure further Internet growth and efficiently support
A Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation Manish Jain Georgia Tech [email protected] Constantinos Dovrolis Georgia Tech [email protected] ABSTRACT The area of available
Industry Environment and Concepts for Forecasting 1
Table of Contents Industry Environment and Concepts for Forecasting 1 Forecasting Methods Overview...2 Multilevel Forecasting...3 Demand Forecasting...4 Integrating Information...5 Simplifying the Forecast...6
A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture
A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, [email protected],
Measuring the Performance of Prefetching Proxy Caches
Measuring the Performance of Prefetching Proxy Caches Brian D. Davison [email protected] Department of Computer Science Rutgers, The State University of New Jersey The Problem Traffic Growth User
Cable Access Q&A - Part One
Cable Access Q&A - Part One Accessing the Internet using a Cable Network (and a cable modem) is becoming increasingly more popular due to the much greater speed than is available through telephone-modem
A security analysis of the SecLookOn authentication system
Institut f. Statistik u. Wahrscheinlichkeitstheorie 1040 Wien, Wiedner Hauptstr. 8-10/107 AUSTRIA http://www.statistik.tuwien.ac.at A security analysis of the SecLookOn authentication system K. Grill Forschungsbericht
COMMON CORE STATE STANDARDS FOR
COMMON CORE STATE STANDARDS FOR Mathematics (CCSSM) High School Statistics and Probability Mathematics High School Statistics and Probability Decisions or predictions are often based on data numbers in
Network Traffic #5. Traffic Characterization
Network #5 Section 4.7.1, 5.7.2 1 Characterization Goals to: Understand the nature of what is transported over communications networks. Use that understanding to improve network design Characterization
A Complex Network Structure Design for Load Balancing and Redundant
A Complex Network Structure Design for Load Balancing and Redundant Fengming M. Chang Department of Industrial Engineering and Management Tungfang Institute of Technology, Kaohsiung, Taiwan [email protected]
Marketing Mix Modelling and Big Data P. M Cain
1) Introduction Marketing Mix Modelling and Big Data P. M Cain Big data is generally defined in terms of the volume and variety of structured and unstructured information. Whereas structured data is stored
Data Preparation and Statistical Displays
Reservoir Modeling with GSLIB Data Preparation and Statistical Displays Data Cleaning / Quality Control Statistics as Parameters for Random Function Models Univariate Statistics Histograms and Probability
Traffic Analysis and Modeling for World of Warcraft
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. Traffic Analysis and Modeling for World of Warcraft
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
