Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
|
|
|
- Kristopher Norton
- 10 years ago
- Views:
Transcription
1 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
2 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins in telecommunication voice traffic Smoother aggregate traffic. Simpler and traditional (tried and tested) congestion management (OR principles) Self-Similarity An orthogonal approach The Ethernet measurements at Bellcore and their subsequent statistical analysis.
3 Prior Models Poisson processes or Markov-modulated Poisson processes Multi-state Markov models Voice traffic (two state Markov model) Silence and Talking states Video traffic (multi-state Markov model) Variable bit-rate video traffic (I, B and P frames) IDC, Peak-to-Mean Ratio, coefficient of variation are inadequate to illustrate the burstiness
4 On the Self-Similar Nature of Ethernet Traffic Leland, Taqqu, Willinger, Wilson. IEEE/ACM ToN, Vol. 2, pp 1-15, 1994 Establish self-similar nature of Ethernet traffic Illustrate the differences between selfsimilar and standard models Serious implications of self-similar traffic for design, control and performance analysis of packet-based communication systems
5 Self similarity Definition If X be a covariance stationary stochastic process with µand σ 2 and auto-correlation function r β X = ( X t : t = 0,1,2... ) r ( k) ~ k L1 ( k), k For each m=1,2,3. If X m denotes a new time series obtained by averaging the original series over nonoverlapping blocks of m ( m) X / m( X X k = 1 km m+ 1 km ) Process X is self similar with self-similarity parameter H = 1-β/2 if ( ) r m ( k) = r( k), m = 1,2,3...
6
7 Statistical tests for Self-Similarity Variance-time plots Analysis of the variances of the aggregated processes R/S Statistic Time-domain analysis of the data Periodogram Analysis Frequency domain analysis (~ FFT)
8 Variance-time plot of sequence AUG89.MB. The asymptotic slope is clearly larger than the slope -1.0 of the dotted reference line and is readily estimated to be about H=0.80
9 Significance of self-similarity Nature of traffic generated by individual Ethernet users. Aggregate traffic study provides insights into traffic generated by individual users. Commonly used measures of burstiness like IDC, peak-to-mean ratio etc. are not meaningful for self-similar traffic and can be replaced by Hurst parameter. Nature of congestion produced by self-similar models differs drastically from that predicted by standard formal models
10 Why is Ethernet traffic self-similar? Plausible physical explanation of selfsimilarity in Ethernet traffic Convergence results for processes that exhibit high variability (i.e., infinite variance) Willinger, Taqqu, Sherman and Wilson: Self similarity through high variability: Statistical Analysis of Ethernet LAN traffic at Source Level ACM SIGCOMM 1995
11 Mathematical Result Superposition of many ON/OFF sources whose ON-periods and OFF-periods exhibit the Noah-effect ( i.e., have high variability or infinite variance) produces aggregate network traffic that features the Joseph effect (i.e., is self-similar or longrange dependent). Terminology attributed to Mandelbrot
12 Idealized ON/OFF Model Theorem 1. For large enough source Number M and Block aggregation size b, the cumulative load behaves statistically as { *, ( j), j W M b H 1/ 2 + b M GH, σ ( j) 0} 1 bm 2 3 α where H = and 2 2 σ = 1 4E( U )2( α 1)(2 α)(3 α)
13 Measurements and Analysis Two sets of Ethernet measurements from the Bellcore measurements. (89 & 94) Unlike previous studies, data has been classified according to source-destination pairs by looking at headers to verify The ON/OFF traffic model assumption The Noah Effect for the corresponding ON and OFF periods
14 Textured plots of a source-cumulative and individual source-destination pairs
15 Checking for the Noah Effect Complementary distribution plots log( P ( U > u)) ~ log( c) α log( u), as u Hill s estimate Let U 1, U 2,, U n denote the observed ON-(or OFF-)periods and write U (1) U (2) U (n) for the corresponding order statistics ˆ α n = 1 i k = k 1 i= 0 (logu ( n 1) logu ( n k )) 1
16
17
18 Robustness of the Noah Effect As far as the Noah effect is concerned it doesn t matter how the OFF-periods or the inter-train distances (or for that matter ON-periods or the train lengths) are defined. (choice of threshold t) Why?? Distributions that satisfy the hyperbolic tail condition are scalable. for sufficiently large u,t and u > t α u P( U > u U > t) ~, 1< α < t 2
19
20 Implications of Noah Effect Traffic Modeling and Synthetic traffic generation Parsimonious modeling is still possible despite the complexity of network traffic since a single parameter needs to be estimated. Performance and Protocol Analysis Fewer meaningful parameters that need to be investigated
21 Column1: Actual trace; Column 2: Synthetic trace from appropriate traditional model; Column 3: synthetic trace from a self-similar model with one parameter.
22 Column1: Actual trace; Column 2: Synthetic trace from appropriate traditional model; Column 3: synthetic trace from a self-similar model with one parameter.
23 What is the impact of LRD on queuing in a packet network? Queuing Performance When incoming traffic is fractal in nature Conditions under which parsimonious traffic models are appropriate A. Erramilli, O.Narayan and W. Willinger, Experimental Queuing Analysis with Long Range Dependent Packet Traffic IEEE/ACM Trans. Networking, vol. 4, no. 2, Apr 1996
24 Experimenting with Traces A single 30-min trace. Variability of relevant traffic statistics is within confidence limits Experiment with inter-arrival traces to preserve inter-arrival time distributions Queuing System Characteristics Infinite waiting room, deterministic service time and single server
25 Experimenting with traces(2) Three sets of experiments Original trace QNA based approximations (two-moment approximation for the mean waiting time in a GI/G/1 queue) Synthetic trace obtained by shuffling the time series of inter-arrival times Vary the service time of the server to obtain different utilizations of the queue
26 Check the knee of the curve Differences between A and C suggest that even the best renewal model will underestimate the delays at moderate to high utilizations
27 Two more experiments Divide the inter-arrival times Ethernet trace into blocks of size m External shuffle order of the blocks is shuffled preserving the sequence within. preserves short-range correlations Internal shuffle Sequence within each block is randomized Order of blocks is preserved Destroys short-range correlations
28 m=25; average block duration=76ms, varying from ms; The internally shuffled trace is almost coincident with the original trace The LRD is not only important for queuing performance but is a dominant characteristic for determining several issues in traffic engineering
29 Correlations over extremely long time scales in the data have measurable practical consequences A description in terms of arrival counts over a small time interval is adequate even though it won t include traffic characteristics below this scale
30 Observations Tails of queue length distributions obtained with actual data traces are heavier than indicated by exponential delay (due to LRD). Experiments with counts are more in tune with the past LRD studies. (similar results are expected from data sets with time series of counts in datasets)
31 Why does WWW traffic (subset of network traffic) looks self-similar? Mark E, Crovella, and Azer Bestavros, Self- Similarity in World Wide Web Traffic: Evidence and Possible Causes IEEE/ACM Trans. Networking, vol. 5, no. 6, Dec 1997 Different from the earlier work which decomposed the whole traffic as generated from different sources
32 How is this different? Since the focus is on only web traffic, the busiest four hours are taken Less busy hours do not show self similar characteristics Possibly because the traffic demand is too less in the logs of data collected
33 Data Collection Modified NCSA Mosaic browser URL, Session, User, Machine, Request Time, Document size, Object Retrieval time Convert logs to traffic time series, bytes transferred in each request are allocated into bins spanning the transfer duration
34 Explaining self-similarity Superposition of Heavy-Tailed Renewal Processes ON times correspond to the transmission duration of individual web objects (assumption that transmission rate is constant during ON times) OFF times correspond to the intervals between transmissions Examining Transmission Times Distribution of web transmission times
35 The value of α using the Whittle estimator 1.2
36 Explaining self-similarity Why are transmission times variable? Size distribution of web objects (files) α=1.15
37 Explaining Self-Similarity Rather than the set of file requests made by users, the transmission times are more strongly determined by the set of available files.
38 Explaining Self-Similarity Using the www-stat tool, file size distribution at web servers can be obtained This distribution closely matches Unique files distribution
39 Explaining Self-Similarity Why are available file-sizes heavy-tailed? Probably a property of most data storage systems
40 Examining Self-Similarity The Off-times distribution( α=1.5) Weibull & Pareto distributions for active and inactive times
41 Future Work Parsimonious modeling is good enough but it doesn t quantify the effects of various factors in traffic management Multi-resolution signal processing using Wavelets as used for quakes prediction may be used for traffic prediction too!! Choice of wavelet and the subsequent math
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Connection-level Analysis and Modeling of Network Traffic
ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS
ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: [email protected] Helmut E. Bez Department of Computer
Network Performance Measurement and Analysis
Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
Connection-level Analysis and Modeling of Network Traffic
Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling studies lump all connections together into
Measurement and Modelling of Internet Traffic at Access Networks
Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,
A Compound Model for TCP Connection Arrivals
A Compound Model for TCP Connection Arrivals Carl J Nuzman Dept of Electrical Engineering Princeton University Iraj Saniee Wim Sweldens Alan Weiss Bell Laboratories, Lucent Technologies Murray Hill, NJ
Fortschritt-Berichte VDI
Fortschritt-Berichte VDI Reihe 10 Informatik/ Kommunikation Dipl.-lnform. Helmut Gogl, Munchen Nr. 670 Measurement and Characterization of Traffic Streams in High-Speed Wide Area Networks VDI Verlag V
Analysis of VDI Workload Characteristics
Analysis of VDI Workload Characteristics Jeongsook Park, Youngchul Kim and Youngkyun Kim Electronics and Telecommunications Research Institute 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Republic of
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT
RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT Sergejs Ilnickis Keywords: network traffic, self-similar traffic, traffic analysis. Abstract - Last scientific publication shows that
Workload Generation for ns. Simulations of Wide Area Networks
1 Workload Generation for ns Simulations of Wide Area Networks and the Internet 1 M. Yuksel y, B. Sikdar z K. S. Vastola z and B. Szymanski y y Department of Computer Science z Department of Electrical
MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD
STaaS, modelling, cloud computing Rostyslav STRUBYTSKYI * MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD Abstract Cloud data storages in their internal structure are not using their full potential
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC Boris Bellalta 1, Miquel Oliver 1, David Rincón 2 1 Universitat Pompeu Fabra, Psg. Circumval lació 8, 83 - Barcelona, Spain, boris.bellalta,
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,
Fractal Analysis and Modeling of VoIP Traffic
Fractal Analysis and Modeling of VoIP Traffic Trang Dinh Dang, Balázs Sonkoly, Sándor Molnár High Speed Networks Lab, Dept. of Telecommunications & Media Informatics Budapest Univ. of Technology & Economics,
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais
EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS by Arthur L. Blais B.A., California State University, Fullerton, 1982 A thesis submitted to the Graduate Faculty
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
Network Traffic Modeling and Prediction with ARIMA/GARCH
Network Traffic Modeling and Prediction with ARIMA/GARCH Bo Zhou, Dan He, Zhili Sun and Wee Hock Ng Centre for Communication System Research University of Surrey Guildford, Surrey United Kingdom +44(0)
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
Analysis of Public Safety Traffic on Trunked Land Mobile Radio Systems
Analysis of Public Safety Traffic: JSAC Special Issue on Quality of Service Delivery in Variable Topology Networks 1 Analysis of Public Safety Traffic on Trunked Land Mobile Radio Systems Duncan Sharp,
WEB CONFERENCING TRAFFIC AN ANALYSIS USING DIMDIM AS EXAMPLE
WEB CONFERENCING TRAFFIC AN ANALYSIS USING DIMDIM AS EXAMPLE Patrick Seeling Department of Computing and New Media Technologies, University of Wisconsin- Stevens Point, Stevens Point, WI 54481, USA [email protected]
Application Layer Traffic Analysis of a Peer-to-Peer System
Application Layer Traffic Analysis of a Peer-to-Peer System Dietmar Tutsch Technical University Berlin Institute of Computer Engineering and Microelectronics Berlin, Germany [email protected] Gilbert
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Voice Over IP Traffic - A Review of this Paper
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16, NO. 5, SEPTEMBER 2005 1019 Load Characterization and Anomaly Detection for Voice Over IP Traffic Michel Mandjes, Iraj Saniee, Member, IEEE, and Alexander
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
Time Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out
Modeling and Analysis of Wireless LAN Traffic *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 5, 1783-1801 (009) Modeling and Analysis of Wireless LAN Traffic * DASHDORJ YAMKHIN AND YOUJIP WON + Department of Electronics and Computer Engineering Hanyang
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
SIMULATION AND ANALYSIS OF QUALITY OF SERVICE PARAMETERS IN IP NETWORKS WITH VIDEO TRAFFIC
SIMULATION AND ANALYSIS OF QUALITY OF SERVICE PARAMETERS IN IP NETWORKS WITH VIDEO TRAFFIC by Bruce Chen THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF BACHELOR OF APPLIED
Geist: A Generator for E-Commerce & Internet Server Traffic
Geist: A Generator for E-Commerce & Internet Server Traffic Krishna Kant, Vijay Tewari and Ravi Iyer Technology & Research Labs Intel Corporation Beaverton, OR {krishna.kant vijay.tewari ravishankar.iyer}.intel.com
CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION
31 CHAPTER 3 CALL CENTER QUEUING MODEL WITH LOGNORMAL SERVICE TIME DISTRIBUTION 3.1 INTRODUCTION In this chapter, construction of queuing model with non-exponential service time distribution, performance
Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk
Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Jose Blanchet and Peter Glynn December, 2003. Let (X n : n 1) be a sequence of independent and identically distributed random
MODELING OF MEASURED SELF-SIMILAR NETWORK TRAFFIC IN OPNET SIMULATION TOOL
UDK621.3:(53+54+621+66), ISSN0352-9045 Informacije 40(2010)3, Ljubljana MODELING OF MEASURED SELF-SIMILAR NETWORK TRAFFIC IN OPNET SIMULATION TOOL M. Fras 1, J. Mohorko 2, Ž. Čučej 2 1 Margento R&D, Maribor,
Statistical analysis and modeling of Internet VoIP traffic for network engineering
Electronic Journal of Statistics Vol 4 (2010) 58 116 ISSN: 1935-7524 DOI: 101214/09-EJS473 Statistical analysis and modeling of Internet VoIP traffic for network engineering Bowei Xi Department of Statistics,
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation
Ten Fallacies and Pitfalls on End-to-End Available Bandwidth Estimation Manish Jain Georgia Tech [email protected] Constantinos Dovrolis Georgia Tech [email protected] ABSTRACT The area of available
IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport
IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport Paul Julian Harper Turin Networks, 5 N McDowell Ave, Petaluma CA 995, USA Email: [email protected] Abstract The
Traffic Modelling for Fast Action Network Games
to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering
Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008
Internet Evolution, Measurement WG, APAN 26, 2008 p. 1/32 Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008 Nevil Brownlee
Bandwidth Estimation for Best-Effort Internet Traffic
Bandwidth Estimation for Best-Effort Internet Traffic Jin Cao Statistics and Data Mining Research Bell Labs Murray Hill, NJ William S Cleveland Department of Statistics Purdue University West Lafayette,
Characterization of E-Commerce Traffic
Characterization of E-Commerce Traffic Udaykiran Vallamsetty Advanced Micro Devices Sunnyvale, CA 9486 [email protected] Krishna Kant Intel Corporation Hillsboro, OR 97124 [email protected]
Fractal Network Traffic Analysis with Applications
Fractal Network Traffic Analysis with Applications A Dissertation by Jian Liu In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the School of Electrical and Computer
On the Use of Traffic Monitoring and Measurements for Improving Networking
On the Use of Traffic Monitoring and Measurements for Improving Networking Sílvia Farraposo 1, Philippe Owezarski 2, Edmundo Monteiro 3 1 Escola Superior de Tecnologia e Gestão de Leiria, Morro do Lena
Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
How performance metrics depend on the traffic demand in large cellular networks
How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling
Drop Call Probability in Established Cellular Networks: from data Analysis to Modelling G. Boggia, P. Camarda, A. D Alconzo, A. De Biasi and M. Siviero DEE - Politecnico di Bari, Via E. Orabona, 4-7125
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Simple Queuing Theory Tools You Can Use in Healthcare
Simple Queuing Theory Tools You Can Use in Healthcare Jeff Johnson Management Engineering Project Director North Colorado Medical Center Abstract Much has been written about queuing theory and its powerful
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport
