[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1190095.1190162acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvaluetoolsConference Proceedingsconference-collections
Article

Analysis of traffic flow measurements by rate-interval curves

Published: 11 October 2006 Publication History

Abstract

In this paper we propose a method for the analysis of aggregate traffic by means of empirical rate-interval curves obtained from experimental data. The approach is related to the theory of Network Calculus, and is based on an algorithm which is different from the commonly employed approach based on wavelets, although it retains some of its multiresolution features. We present results, obtained both by simulation and in the analysis of real traffic traces, which provide an assessment of the strengths and weaknesses of the proposed method. Rate-interval curve analysis provides very robust and acceptably accurate estimates of the Hurst parameter value and, even in the presence of flow irregularities, results can be proved to be correct as far as scaling properties are concerned. Further analyses concerning peaks, bursts and similar localized phenomena that may have a significant impact on the performances of a network are allowed by considering maximal rate envelopes.

References

[1]
DAG Time-Stamping Whitepaper, Endace. http://www.endace.com.
[2]
P. Abry, M. S. Taqqu, and D. Veitch. Wavelets for the analysis, estimation and synthesis of scaling data. K. Park and W. Willinger (eds.): Self Similar Traffic Analysis and Performance Evaluation, Wiley, 2000.
[3]
R. Boorstyn, A. Burchard, J. Liebeherr, and C. Oottamakorn. Statistical service assurances for traffic scheduling algorithms. IEEE J. Selected Areas in Communications, 18(12):2651--2664, Dec. 2000.
[4]
E. Castillo. Extreme Value Theory in Engineering. Academic Press, New York, 1998.
[5]
L. Daubechies. Ten Lectures on Wavelets. SIAM Press, Philadelphia, 1992.
[6]
G. Ivchenko and Y. Medvedev. Mathematical Statistics. Mir, Moscow, 1990.
[7]
J. Kilpi and I. Norros. Testing the gaussian approximation of aggregate traffic. In Proc. ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.
[8]
W. Leland, M. Taqqu, W. Willinger, and D. Wilson. On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans. on Information Theory, 2(1):1--15, Feb. 1994.
[9]
C. Li, A. Burchard, and J. Liebeherr. A network calculus with effective bandwidth. Tech. Rep., Univ. of Virginia, CS-2003-20, Nov. 2003. Submitted to IEEE/ACM Trans. on Networking.
[10]
U. National Laboratory for Applied Network Reasearch. http://mna.nlanr.net.
[11]
C. Park, F. Campos, J. Marron, D. Rolls, and F. Smith. Long-range-dependence in a changing internet traffic mix. Tech. Rep. 2004-9, SAMSI, Res. Triangle Park, USA, Mar. 2004.
[12]
J. Qiu and W. Knightly. Measurement-based admission control with aggregate traffic envelopes. IEEE/ACM Trans. on Information Theory, 9(2):199--210, Apr. 2001.
[13]
S. Sarvotham, R. Riedi, and R. Baraniuk. Connection-level analysis and modeling of network traffic. In Proc. IEEE/ACM Internet Measurement Workshop, San Francisco, CA, USA, Nov. 2001.
[14]
S. Stoev, M. Taqqu, C. Park, and J. Marron. Strenghts and limmitations of the wavelet spectrum method in the analysis of internet traffic. Tech. Rep. 2004-8, SAMSI, Res. Triangle Park, USA, Mar. 2004.
[15]
D. Veitch and P. Abry. A wavelet-based joint estimator of the parameters of long-range dependence. IEEE Trans. on Information Theory, 45(3):878--897, Apr. 1999.
[16]
N. Z. WAND Network Research Group, University of Waikato. http://www.wand.net.nz.
[17]
Z. Zhang, V. Ribeiro, S. Moon, and C. Diot. Small-time scaling behaviors of internet backbone traffic: An empirical study. In Proc. IEEE INFOCOM 2003, pages 1826--1836, San Francisco, CA, USA, Apr. 2003. Vol. 3.

Cited By

View all
  • (2018)Distribution-based anomaly detection in 3G mobile networksInternational Journal of Network Management10.1002/nem.74720:5(245-269)Online publication date: 26-Dec-2018
  • (2009)A distribution-based approach to anomaly detection and application to 3G mobile trafficProceedings of the 28th IEEE conference on Global telecommunications10.5555/1811681.1811859(2888-2895)Online publication date: 30-Nov-2009
  • (2009)A Distribution-Based Approach to Anomaly Detection and Application to 3G Mobile TrafficGLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference10.1109/GLOCOM.2009.5425651(1-8)Online publication date: Nov-2009
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
valuetools '06: Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
October 2006
638 pages
ISBN:1595935045
DOI:10.1145/1190095
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. network calculus
  2. self-similarity
  3. traffic measurement

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 90 of 196 submissions, 46%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Distribution-based anomaly detection in 3G mobile networksInternational Journal of Network Management10.1002/nem.74720:5(245-269)Online publication date: 26-Dec-2018
  • (2009)A distribution-based approach to anomaly detection and application to 3G mobile trafficProceedings of the 28th IEEE conference on Global telecommunications10.5555/1811681.1811859(2888-2895)Online publication date: 30-Nov-2009
  • (2009)A Distribution-Based Approach to Anomaly Detection and Application to 3G Mobile TrafficGLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference10.1109/GLOCOM.2009.5425651(1-8)Online publication date: Nov-2009
  • (2007)On the Analysis of Communication and Computer Networks by Traffic Flow MeasurementsIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2007.90013156:4(1157-1164)Online publication date: Aug-2007
  • (2007)A Study of Measurement-Based Traffic Models for Network Diagnostics2007 IEEE Instrumentation & Measurement Technology Conference IMTC 200710.1109/IMTC.2007.379456(1-6)Online publication date: May-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media