The monitoring of the network traffic based on queuing theory



Similar documents
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Research on the UHF RFID Channel Coding Technology based on Simulink

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

6.6 Scheduling and Policing Mechanisms

Quality of Service Routing Network and Performance Evaluation*

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Per-Flow Queuing Allot's Approach to Bandwidth Management

MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel ,

Comparative Analysis of Congestion Control Algorithms Using ns-2

Examining Self-Similarity Network Traffic intervals

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Network congestion, its control and avoidance

QoS issues in Voice over IP

Performance Evaluation of Active Queue Management Using a Hybrid Approach

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Design call center management system of e-commerce based on BP neural network and multifractal

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

How To Solve A Network Problem In An Ipa (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

VoIP QoS on low speed links

Research Article Average Bandwidth Allocation Model of WFQ

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

A Hysteretic Model of Queuing System with Fuzzy Logic Active Queue Management

Real-time apps and Quality of Service

Observingtheeffectof TCP congestion controlon networktraffic

COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS

CURRENT wireless personal communication systems are

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS

A Network Simulation Experiment of WAN Based on OPNET

Quality of Service (QoS)) in IP networks

Chapter 1. Introduction

Congestion Control Overview

Active Queue Management and Wireless Networks

Frame Metering in 802.1Q Version 01

A Passive Method for Estimating End-to-End TCP Packet Loss

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows

ECE 333: Introduction to Communication Networks Fall 2002

17: Queue Management. Queuing. Mark Handley

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Indepth Voice over IP and SIP Networking Course

A QOS BASED LOAD BALANCED SWITCH

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Performance improvement of active queue management with per-flow scheduling

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions

Network traffic monitoring system design based on the unconstrained

Requirements of Voice in an IP Internetwork

Active Queue Management

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

An Efficient Load Balancing Technology in CDN

A Proxy-based Architecture for Multimedia Transmission

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Rate-Based Active Queue Management: A Green Algorithm in Congestion Control

A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

Voice Service Support over Cognitive Radio Networks

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

PFS scheme for forcing better service in best effort IP network

Optical interconnection networks with time slot routing

A Novel Method to Defense Against Web DDoS

10CS64: COMPUTER NETWORKS - II

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

RBA-RIO Rate Based Adaptive Red With In and Out. Algorithm for DiffServ AF PHB

Transcription:

The 7th International Symposium on Operations Research and Its Applications (ISORA 08) Lijiang, China, October 31 Novemver 3, 2008 Copyright 2008 ORSC & APORC, pp. 60 65 The monitoring of the network traffic based on queuing theory Wang Jian-Ping 1,, Huang Yong 1, 1 School of Information Engineer, Henan Institute of Science and Technology, Xinxiang, 453003, china Abstract Network traffic monitoring is an important way for network performance analysis and monitor. The article explains how to build the basic model of network traffic analysis based on Queuing Theory, using this, we can obtain the network traffic forecasting ways and the stable congestion rate formula, combining the general network traffic monitor parameters, we can realize the estimation and monition process for the network traffic rationally. Keywords 1 Foreword Queuing Theory; M/M/1 queue; traffic monitor; congestion rate; Markov Process Queuing Theory, also called random service theory, is a branch of Operation Research in Maths, it s a subject which researches the random regulation of queuing phenomenon, and builds up the maths model by analyzing the date of the network. Through the prediction of the system, we can reveal the regulation about the queuing probability and choose the optimal method for the system. Adopting Queuing Theory to estimate the network traffic, which becomes the important ways of network performance prediction, analysis and estimation, through this way, we can imitate the true network, it s useful and reliable for organizing, monitoring and defending the network. 2 The maths model of the Queuing theory In network communication, from sending, transferring to receiving datačňthe proceeding of the data coding, decoding and sending to the higher layer, With all these process,we can find a simple queuing model. According to the Queuing Theory, this correspond procedure can be abstracted as Queuing theory model [9], like figure 1 showing to us. Supposing this kind of simple data transmitting system satisfies the queue model M/M/1[5]. Supported by the natural science foundation of Education Department of Henan province grant NO. 2007520017 He was born in 1981, in BaoJi, ShaanXi province of china, he is a master candidate, his research area is Computer Network and Operation Research. He was born in 1970, in ChangSha, Hunan province of China, he is a lecturer, his research area is Computer Graphics and Computer Software.

The Monitoring of the Network Traffic based on Queuing Theory 61 Figure 1: The abstract model of communication process From the figure above, λ stands for the sending rate of the sender, T N is regarded as transportation delay time, λ means the arriving speed of the data packets,n q is the quantity of data packets stored in the buffer,γis the lost rate of the receiver,and T S = T J + T D + T C is the service time of data packets in the queue. T J, T D and T C stand for the decoding, dispatching and handling time separately. The sender is abstracted to be a queue, whose sending rate is λ. In model M/M/1, the two M represent the sending process of the sender and the receiving process of the receiver separately. They both follow the Markov Process[2], also keep to Poisson Distribution, while the number 1 stands for the channel. Using N(t)=t as the length of the queue at the moment of t, so the probability of the queue whose length is n,can be shown as the following formula. According to the formula 1,we can know the equation 2: p n (t) = p[n(t) = n] (1) { p n(t) = λ p n 1 (t) + µ p n+1 (t) (λ + µ)p n (t),n = 0,1,2... p 0 (t) = µ p 1(t) λ p 0 (t) (2) In equation 2, supposing λ as the arrival rate while µ as the service rate, when t, we can get the stable solution of the equation p n (t). p n (t) = ρ(1 ρ)n = 0,1,2,... (3) In formula 3, using ρ = λ/µ 1 as the probability of the service. N stands for the length of the queue under the balanced condition, It includes the average volume of all the data packets which enter the processing module and store in the buffer. N = n=0 np n = n=0 p n (1 ρ) = ρ 1 ρ If N q shows the average volume of the buffer s data packets, We can conclude the following formula N q = N ρ = ρ 1 ρ ρ = ρ2 1 ρ If the processing module is regarded as a closed region, the parameter is brought into the formula 5,using the Little Law, we can get the equation(6) (4) (5)

62 The 7th International Symposium on Operations Research and Its Applications { ρ = λts λ = λ (6) After putting equation (6) into the equation (5) and sorting it out, we can get the formula(7) (λ T s ) 2 + λt S N q N q = 0 (7) According to the derivative formula (7), we make a conclusion, among three variables, the service time,the sending rate, and the buffer, if we know any two variables,it is easy to gain the numerical value of the third one.so these three variables are the key parameters for measuring the performance of the transmission system. 3 Queuing theory and the network traffic monitor 3.1 The method of monitoring the network traffic Traffic monitoring is the basic way for scheduling, concerting and operating the net[7]. Network usually uses Peak Information Rate(PIR),Peak Burst Length(PBL),Commitment Information Rate(CIR),Commitment Burst Length(CBL),Extra Information Rate(EIR)and Extra Burst Length(EBL),the six parameters as the network traffic monitoring parameters. Using the six parameters above, we can realize two kinds of Bandwidth Measurement Algorithms, they are PIR/CIR Algorithms and CIR/EIR Algorithms[8], PIR/CIR uses four parameters, they are PIR,PBL,CIR and CBL.CIR/EIR also uses four parameters, they are CIR,CBL, EIR and EBL. In these algorithms, each of the PIR/PBL,CIR/CBL, EIR/EBL informs a Token Bucket partly[6],from this we know that every algorithms contains two token buckets, so they are called dual-token buckets algorithms. 3.2 Forecasting the network traffic using Queuing Theory The network traffic is very common[4], What s worse, when the traffic becomes under extreme situation, it will lead to the net s paralysis[1]. There are a great deal of research about monitoring the congestion at present,besides, the documents which make use of Queuing Theory to research the traffic rate appear more and more. for forecasting the traffic rate, we often test the data disposal function of the router used in the network. Supposing a router s arrival rate of data flow in groups is λ, and the average time which the routers use to dispose each group is 1 µ, the buffer of the routers is C, if a certain group arrives, the waiting length of the queue in groups has already reached, so the group has to be lost. When the arriving time of group timeouts, the group has to resend, Supposing the group s average waiting time is 1 µ, we identify p i(t) to be the arrival probability of the queue length for the routers group at the moment of t, supposing the queue length is i: p(t) = (p 0 (t), p 1 (t),..., p n 1 (t)),i = 0,1,...,C + 1 (8) Then the queuing system of the router s date groups satisfies simple Markov Process[10], according to Markov Process, we can make the diversion strength of matrix as follow:

The Monitoring of the Network Traffic based on Queuing Theory 63 Q = λ λ µ (λ + µ + ν) λ + ν µ (λ + µ + 2ν) λ + 2ν.... 3.3 Network Congestion Rate µ (λ + µ +Cν) λ +Cν µ µ Network congestion rate is changing all the time [3], the instantaneous congestion rate and the stable congestion rate are often used to analysis the network traffic in network monitor. The instantaneous rate A C (t) is the congestion rate at the moment of t.the A C (t) can be obtained by solving the system length of the queue s probability distributing, which called p n 1 (t).according to some properties of Markov Process, we know thatp i (t)(i = 0,...,C + 1)satisfies the following differential equation systems: p 0 (t) λ p 0(t) + µ p 1 (t) p λ (t) = [λ + (k 1)ν]p k 1(t) [λ + µ + kν]p k (t) + µ p k+1(t), k = 1,...,C P C+1 (t) = [λ +Cν]p (10) C(t) µ p C+1 (t) p 0 (0) = 1, p 2 (0) = p 3 (0) =... = p C+1(0)=0 By solving this differential equation systems, we get the instantaneous congestion rate A 0 (t) is A 0 (t) = P 1 (t) = (9) λ µ + λ (1 e (µ+λ)t ) (11) The instantaneous congestion rate can t be used to measure the stable operating condition of the system, so we must obtain the stable congestion rate of the system. The so-called stable congestion rate means it will not change with the time changing, when the system works in a stable operating condition. The definition of the stable congestion rate is A C (t) = lim t A C (t) (12) Supposing ρ = lim p(t) as the distributing of the stable length of the queue, C as t the buffer of the router, the stable congestion rate can be obtained in two ways: firstly, we obtain the instantaneous congestion rate,then make its limit out. According to its definition, it can be obtained with the distributing of the length of the queue. Secondly, according to the Markov Process, we know that the distributing of the stable length of queue can be get through evaluating equation (13) pq = 0 C+1 P i = 1 i=n (13)

64 The 7th International Symposium on Operations Research and Its Applications In the equation p = (p 0, p 1,..., p C+1 ), When C=0, the equation (13) s evaluation is A 0 = P 1 + When C=1, the equation (13) s evaluation is A 1 = P 2 = When C =2, the equation (13) s evaluation is A 3 = P 4 = 1 λ µ + λ λ(λ + ν) λ(λ + ν) + µ(µ + λ) µ (λ + µ + 2ν)A 2 (λ + ν)(1 A 1 )A 0 + µ on the analogy of this, we conclude that,the stable congestion rate is (14) (15) (16) A C = P C+1 = 1 µ (λ + µ +Cν)A C 1 (λ + (C 1)ν(1 A c 1 )A C 1 + µ (17) 4 Conclusion The article explains how to build the queue model based on the Queuing Theory, how to realize calculation and analyzing the network traffic through M/M/1 Queuing Theory, and then gets the forecast way and the formula of the stable congestion rate of the network traffic. The network traffic monitoring model which is tested, experimented and analyzed by the actually system,shows that using the Queuing Theory will optimize the network traffic, it s convenient and simple for calculating and monitoring the network traffic properly. References [1] Wang Ting, Wang Yu. Survey on a Queue Theory Based Handover Scheme for UAVS Communication Network. Chinese Journal of Sensors and Actuators, 2007, 04 [2] Li Da-Qi, Shen Jun-Yi. Queuing Theory Supervising K-Means Clustering Algorithm and ITS Application in Optimized Design of TTC Network.Journal of Astronautics, 2007, 03 [3] Han Jing, Guo Fang, Shi Jin-Hua. Research on the traffic monitoring of the distributed network based on human immune algorithm. Microcomputer Information, 2007, 18 [4] Wang Pei-Fa, Zhang Shi-wei, Li Jun. The Application and Achievement of SVG in Network Netflow Monitor Field. Microelectronics & Computer, 2005, 04 [5] Ren Xiang-Cai, Xiong Qi-Bang. An Application of Mobile Agent for IP Network Traffic Management.Computer Engineering, 2002, 11 [6] Davison B D. A Web Caching Primer. IEEE Internet Computing, 2001, 5(4) [7] Guo Yang, Gong Wei-Bo, Don Towsley. Timestepped Hybrid Simulation (TSHS) for Large Scale Networks. In: Proceedings of IEEE Infocom 2000. Israel: IEEE, 2000

The Monitoring of the Network Traffic based on Queuing Theory 65 [8] Jong Suk Ahn, Peter B Danzig. Packet Network Simulation: Speed up and Accuracy Versus Timing Granularity. IEEE/ACM Trans on Networking, 1996, 4(5) [9] Vern Paxson, Sally Floyd. Why We Don t Know How To Simulate the Internet. In: Proceedings of the 1997 Winter Simulation Conference. USA: ACM, 1997 [10] Gunther N. The Practical Performance Analyst. New York: McGraw-Hill, 1998 [11] ITU-T G.729A. Coding of Speech at 8kbps using Conjugate-Structure Algebraic Code-excited Linear-prediction Coding. USA: ITU-T, 1998