RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT



Similar documents
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

MATCHDAY September 2014

Observingtheeffectof TCP congestion controlon networktraffic

Examining Self-Similarity Network Traffic intervals

Time Series Analysis of Network Traffic

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS

Academic Calendar for Faculty

MODELLING AND FORECASTING OF CLOUD DATA WAREHOUSING LOAD

ARTIFICIAL NEURAL NETWORKS FOR ADAPTIVE MANAGEMENT TRAFFIC LIGHT OBJECTS AT THE INTERSECTION

Network Performance Measurement and Analysis

Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Characteristics of Network Traffic Flow Anomalies

Connection-level Analysis and Modeling of Network Traffic

Research Article Average Bandwidth Allocation Model of WFQ

International University of Monaco 27/04/ :55 - Page 1. Monday 30/04 Tuesday 01/05 Wednesday 02/05 Thursday 03/05 Friday 04/05 Saturday 05/05

International University of Monaco 21/05/ :01 - Page 1. Monday 30/04 Tuesday 01/05 Wednesday 02/05 Thursday 03/05 Friday 04/05 Saturday 05/05

Application Layer Traffic Analysis of a Peer-to-Peer System

DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC

Analysis of VDI Workload Characteristics

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Trading Calendar - East Capital UCITS Funds

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

Network traffic: Scaling

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

THE UNIVERSITY OF AUCKLAND

Network Considerations for IP Video

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS

5. Multiple regression

IP PBX system USER MANUAL. ver

A Passive Method for Estimating End-to-End TCP Packet Loss

Analysis of Internet Topologies: A Historical View

PFS scheme for forcing better service in best effort IP network

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

On Traffic Types and Service Classes in the Internet

Adaptive Parameter Setting for QoS Aware Load Balancing Algorithm

Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

International University of Monaco 11/06/ :27 - Page 1. Monday 30/04 Tuesday 01/05 Wednesday 02/05 Thursday 03/05 Friday 04/05 Saturday 05/05

Connection-level Analysis and Modeling of Network Traffic

A Catechistic Method for Traffic Pattern Discovery in MANET

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

User Guide for the Orchid Key Phones KP416 & KP832

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA

CAMI Education linked to CAPS: Mathematics

Written by CiscoNET Thursday, 07 May :57 - Last Updated Wednesday, 02 December :50

The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET

Univariate Regression

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

Low-rate TCP-targeted Denial of Service Attack Defense

Competitive Analysis of QoS Networks

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

International University of Monaco 12/04/ :50 - Page 1. Monday 30/01 Tuesday 31/01 Wednesday 01/02 Thursday 02/02 Friday 03/02 Saturday 04/02

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

Analysis of Internet Topologies

For extra services running behind your router. What to do after IP change

DATA PROCESSING SOFTWARE

IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

Maximum Power from a Solar Panel

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Research on Errors of Utilized Bandwidth Measured by NetFlow

4 Internet QoS Management

Strata CTX IP Telephone Programming Guidelines

LAN CONTROLLER instruction from 2.30

pathchar a tool to infer characteristics of Internet paths

FINAL EXAM SECTIONS AND OBJECTIVES FOR COLLEGE ALGEBRA

Helsinki University of Technology Department of Electrical and Communications Engineering Networking Laboratory

CSCI Topics: Internet Programming Fall 2008

ON-GUARD. Guard Management System. Table of contents : Introduction Page 2. Programming Guide Page 5. Frequently asked questions Page

PROFINET the Industrial Ethernet standard. Siemens AG Alle Rechte vorbehalten.

Academic Calendar - UNDERGRADUATE. All Other Classes Begin; Late Registration Begins. Last Day to Drop a Class without a W on Transcript;

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

PLCM-T1 / PLCM-T2 Torch height controller

Transcription:

RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT Sergejs Ilnickis Keywords: network traffic, self-similar traffic, traffic analysis. Abstract - Last scientific publication shows that real network traffic is self-similar and its properties differs from exponential traffic. The goals of this paper were: - Analyzing real computer network traffic selecting one of the self-similarity grade determination methods and using gathered from experiments data to prove the selfsimilar nature of the real network traffic. - Developing a model, which describes this input self-similar traffic with variable selfsimilarity grade, and compare results with model with exponential input traffic.. Introduction Last scientific publication shows that real network traffic is self-similar and its properties differ from exponential traffic. The goals of this paper are: - Analyze real computer network traffic selecting one of the self-similarity grade determination methods and using gathered from experiments data to prove the self-similar nature of the real network traffic. - Develop a model, which describes this input self-similar traffic with variable selfsimilarity grade, and compare results with model with exponential input traffic. - Compare working parameters for the M/M/ system (with a Poison input flow) and G/M/ system with self-similar input flow. Analyze queue average length, average waiting time in the queue and the maximal length of the queue in case of different input data flows. 2. Computer network server traffic analysis 2.. Description of the researched network Analysis was done in the corporate network of the company X, which is software Development Company and widely using databases inside and outside of corporate network. Maximum network speed was 0 Mbit/s. From a wide range of available servers there was selected the one, which was highly loaded most of the time. The main functions of this server in the network were the following: WEB server, DataBase server and File and Print server. Results of the measured traffic for this server were gathered using Multi Router Traffic Grapher (MRTG). Data was collected whole month, 24 hours a day with a 5 minutes interval. For further analysis data was divided into groups: one-day traffic, one-week traffic, onemonth traffic. Daily traffic also was divided into smaller subgroups depending on network load intensity: from 02:00 until 08:00 low traffic intensity; from 08:00 until 4:00 average traffic intensity; from 4:00 until 20:00 high traffic intensity; from 20:00 until 02:00 maximal traffic intensity;

2.2. Results of the measurement Max 6622.5 kb/saverage In: (66.2%) In: Max 6057.7 kb/saverage Out: (60.6%) Out: Figure : Daily traffic 966.3 kb/s (9.7%) 200. kb/s (20.%) Max 5805.9 kb/saverage In: (58.%) In: Max 7373. kb/saverage Out: (73.7%) Out: Figure 2: Weekly traffic 504.2 kb/s (5.0%) 3647.7 kb/s (36.5%) Max 878. kb/saverage In: (8.8%) In: Max 7282.0 kb/saverage Out: (72.8%) Out: Figure 3: Monthly traffic 507.3 kb/s (5.%) 323.4 kb/s (32.3%) 2.3. The methods of researching of traffic self-similarity We assume that traffic is self-similar. Our goal is to prove this statement. For this purpose we will use an absolute moments method. In given method researched sequence with a length N is divided into blocks with a length of m. For each block we calculate average value X (m) and mean value X for whole sequence. After this for each block we find n sequence moment: ( m) N / m n ( m) () AM n = X ( k) X. N / m k= In this equation n= (absolute average value). Then let s designate our sequence as m and plot the graph average values sequence moments dependency from m. With a help of plotted points of the graph we construct a smallest square line. The inclination of this line will be named β. From β we can find self-similarity coefficient H = β.

It is necessary that each block s length and blocks quantity will be high. If the sequence hasn t a process with slowly changing dependency, that H=0.5 and approximation line s inclination will be 0.5. If the process is self-similar, then 0.5<H<.0 and approximation line s inclination will be less than 0.5. This method was programmed using MatLab 5.0. With a help of this program the following graphs were plotted: log-log, dispersion dependency from coefficient m, and was defined Hurst s parameter for each day of the week, whole week, whole month and Hurst s parameter depending from the network load for the entire day. One of the results are shown on the Figure 4. 0.4 0.2 0 log0(var) -0.2-0.4-0.6-0.8-0 0.5.5 2 2.5 3 3.5 4 4.5 5 log0(m) Figure 4. Dispersion-time graph for Monday s data. Hurst s coefficients calculated with a help of absolute moments method for different time intervals are shown in the Table and 2. Name of Hurst s Abs(β) he day coefficient Monday 0.845 0.82 Tuesday 0.2206 0.78 Wednesda y 0.2537 0.75 Thursday 0.620 0.84 Friday 0.220 0.79 Saturday 0.58 0.85 Sunday 0.244 0.76 Whole week traffic 0.23 0.79 Table : Hurst s coefficient for the week traffic Time interval Abs(β) 02:00-08:00 Low intensity 08:00 4:00 Average intensity 0.845 0.7 0.2206 0.73 Hurst s coefficient

4:00 20:00 High intensity 20:00 02:00 Maximal intensity Whole day traffic 0.2537 0.76 0.620 0.8 0.284 0.75 Table 2: Hurst s coefficient for one-day traffic. Daily traffic was specially divided into time groups. There is an opinion that the effect of the self-similarity is depending from traffic intensity and from the type of transmitted information. In the time interval 02:00 08:00 traffic intensity is very low and in the same time the Hurst s parameter has the least value. On the working days from 08:00 am traffic intensity are growing up, Hurst s parameter growing up too. After 20:00 till 02:00 when programmers are starting to check produced code in the automatic mode, the flow to the measured server are growing very high and Hurst s parameter is growing up to 0.8. Network traffic in case of maximal intensity (20:00 02:00) has very high grade of self-similarity. After analyzing results, we can make some conclusions: traffic in the LAN is self-similar process. effect of the self-similarity appears on the wide time scale: from some hours till some months. self-similarity coefficient of the traffic differs 0.7 0.85. when the intensity of the traffic is growing up, the self-similarity coefficient is growing up too. for the one-day traffic Hurst s coefficient is the same for each intensity; for the one-month traffic Hurst s coefficient is 0.8. We can conclude, that server traffic has self-similarity in the wide range of the time and it is necessary to predict this cases when networks are projected. 2.4. Modelling of self-similar traffic in GPSS environment Our goal is to compare working parameters for M/M/ and G/M/ systems with a self-similar input traffic using real network state and gathered experimental data. For self-similar input traffic modelling it is necessary to set up all the main parameters, which are characteristic for this type of the traffic.

ws ws... ROUTER (SWITCH) Server ws Figure 5. Simplified schema of the analyzed network. As a sample we will take one-day traffic: Max In: Max Out: 6622.5 kb/s (66.2%) 6057.7 kb/s (60.6%) Average In: Average Out: 966.3 kb/s (9.7%) 200. kb/s (20.%) Figure 6. One-day traffic. As we see, average output traffic is up to 2 Mb/s. That means, that channel is loaded for 20 %. We will take this value as average ON-OFF source s working intensity. That means that ON time is 5 times smaller than OFF time. GPSS integrated function allow to generate Pareto distribution with a parameter α. In our experiment parameter α =.4, which corresponds with Hurst s coefficient H = 0.8. Averaging coefficient m we will change from till 0000. The source code of the self-similar traffic modelling program is listed below: Let s check that modelled flow is self-similar with a Hurst s coefficient H=0.8 (was calculated by absolute moments method). m log(m) Var(x) log[var] 0 2,37 0,37493 2 2 0,3003 2,334 0,3680 3 0,4772 2,305 0,36267

Table 3: Dispersion time dependency 5 0,69897 2,25 0,35237 5 0 2,5 0,3253 20,3003,843 0,26552 5 50,69897,297 0,294 0,00774 00 2,08 8 200 2,3003 0,826-0,08302 500 2,69897 0,632-0,9928 00 0 3 0,5-0,3003 200 0 3,3003 0,396-0,4023 500 0 3,69897 0,28-0,5529 00 00 4 0,222-0,65365 Using data from the Table 3 we create Diespersion Time graph, which is shown on the Figure 7. 0.6 0.4 0.2 log0(var) 0-0.2-0.4-0.6-0.8 0 0.5.5 2 2.5 3 3.5 4 log0(m) Figure 7. Modelled traffic dispersion graph, β=-0.2744, H=0.8628 The corner of a straight line is -0.2744 and this means that Hurst s parameter s value is equal by 0.8628. This statement is approximately the same, as was measured for the real server traffic in the LAN. This gives us an opportunity to use developed model for researching the real network and compare working parameters of the flow in case, when on the input we have a self-similar traffic or Poison input flow. References [] Leland W.E., Taqqu M.S., Willinger W. and Wilson D.V. On The Self-Similar Nature Of Ethernet Traffic.- Proc. ACM SIGCOMM 93, San-Fransisco, 993, p 83-93. [2] Walter Willinger, Murad S. Taqqu, Robert Sherman and Daniel V. Wilson, Self- Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the

Source Level. IEEE/ACM Transactions on Networking, Vol. 5, No., 997 [3] Adrian Popescu, Traffic Self-Similarity, Department of Telecommunications and Signal Processing, University of Karlskrona/Ronneby [4] Paxson V., Fast Approximation of Self-Similar Network Traffic, preprint Lawrence Berkely Laboratory and EECS Disvision, University of California, 996 [5] P.Ulanovs, E.Petersons, Modeling of Self-similar traffic in high-performance Computer Networks, RTU, report collection for 42 International Conference, Riga, 200 [6] Цыбаков Б.С. Модель телетрафика на основе самоподобного случайного процесса. Радиотехника, 999 г., 5. Sergejs Ilnickis, Riga Technical University, Lomonosova str., Riga, LATVIA, E-mail: Sergey_Ilnitsky@canada.com