DMCA
Dynamics of IP traffic: A study of the role of variability and the impact of control (1999)
Cached
Download Links
- [www.net.uni-sb.de]
- [whistler.cmcl.cs.cmu.edu]
- [conferences.sigcomm.org]
- DBLP
Other Repositories/Bibliography
Citations: | 271 - 12 self |
Citations
2722 | Congestion avoidence and control
- Jacobson
- 1988
(Show Context)
Citation Context ...scales by reducing it to and pointing out a plausible explanation in terms of previously observed phenomena in the dynamics of TCP-type congestion control, among them ACK-compression; see for example =-=[12, 27, 26, 32, 17]-=-, or the more recent study [20]. This empirical observation begs for a simple mathematical construction that incorporates the essence of flow control phenomena and leads to multifractal scaling behavi... |
2598 |
Lectures on Wavelets.
- Ten
- 1992
(Show Context)
Citation Context ...j) and scale j that extends over a range of fine time scales, where 1 We use the Haar wavelets primarily for exposition and we use more general wavelets (e.g., compactly supported Daubechies wavelets =-=[6]-=-) for the scaling analysis. 2 In practice, we slide a window of length five (this parameter can be varied) over the coefficients at each scale, extracting the local maxima. Scale log2(Energy(j)) pinch... |
2210 | On the self-similar nature of ethernet traffic
- Leland, Taqqu, et al.
- 1993
(Show Context)
Citation Context ... in detail in Section 2. Over the last few years, network-related measurementshave become a rich source for observing interesting and at times surprising scaling behaviors; e.g., self-similar scaling =-=[15, 21, 9]-=- and multifractal scaling [24, 8]. Intuitively, the ubiquity with which some of these scaling phenomena occur in measurements from today's IP networks is related to the absence of an intrinsic scale w... |
1771 | Wide-area traffic: the failure of Poisson modeling
- Paxson, Floyd
- 1994
(Show Context)
Citation Context ... in detail in Section 2. Over the last few years, network-related measurementshave become a rich source for observing interesting and at times surprising scaling behaviors; e.g., self-similar scaling =-=[15, 21, 9]-=- and multifractal scaling [24, 8]. Intuitively, the ubiquity with which some of these scaling phenomena occur in measurements from today's IP networks is related to the absence of an intrinsic scale w... |
1416 | Self-similarity in world wide web traffic: Evidence and possible causes
- Crovella, Bestavros
- 1996
(Show Context)
Citation Context ...ame time, in today's Web-dominated Internet, the sizes or durations of sessions, number of HTTP requests/responses, TCP connections or IP-flows typically span up to six orders of magnitude (e.g., see =-=[5, 29, 9]-=-). Mathematically, the absence of an intrinsic scale is equivalent to high variability and can be captured in a parsimonious manner using heavy-tailed (also known as scale-invariant) distributions wit... |
944 | Generating representative web workloads for network and server performance evaluation
- Barford, Crovella
- 1998
(Show Context)
Citation Context ...parameters required for these distributions and used in our studies can be found in the Appendix. We base our choice of distributions (including the specific parameters) on the work surrounding SURGE =-=[4]-=-, a Web workload generator designed to generate realistic Web traffic patterns, and upon [7, 18]. Note that we simulate HTTP without pipelining and without persistent connections. The protocol stack, ... |
843 | End-to-end Internet packet dynamics
- Paxson
- 1999
(Show Context)
Citation Context ...usible explanation in terms of previously observed phenomena in the dynamics of TCP-type congestion control, among them ACK-compression; see for example [12, 27, 26, 32, 17], or the more recent study =-=[20]-=-. This empirical observation begs for a simple mathematical construction that incorporates the essence of flow control phenomena and leads to multifractal scaling behavior. Unfortunately, we have not ... |
742 | Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level
- Willinger, Taqqu, et al.
- 1995
(Show Context)
Citation Context ...ng phenomenon of measured IP traffic over small time scales that may be as plausible, intuitive, appealing and relevant as the one that has recently been found for the self-similar scaling (e.g., see =-=[30, 29, 9]-=-). This and other open problems, together with some practical applications of our scaling analysis and some limitations of our study and of the underlying network configurations are discussed in Secti... |
465 | The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss.
- Lakshman, Madhow
- 1997
(Show Context)
Citation Context ...our simulations by simpler versions which in essence equate a session with an infinite file transfer. While such simplifications are often convenient for analytical studies of TCP dynamics (e.g., see =-=[14]-=- and references therein), they lead in general to very different behaviors of the resulting traffic, especially in a reasonably heterogeneous network environment. To illustrate, Figure 12 shows the lo... |
383 | Some observations on the dynamics of a congestion control algorithm,”
- Shenker, Zhang, et al.
- 1990
(Show Context)
Citation Context ...scales by reducing it to and pointing out a plausible explanation in terms of previously observed phenomena in the dynamics of TCP-type congestion control, among them ACK-compression; see for example =-=[12, 27, 26, 32, 17]-=-, or the more recent study [20]. This empirical observation begs for a simple mathematical construction that incorporates the essence of flow control phenomena and leads to multifractal scaling behavi... |
278 | The synchronization of periodic routing messages
- Floyd, Jacobson
- 1993
(Show Context)
Citation Context ...ability, network-related variability), others remain untouched or sufficiently obscure. For example, we have not yet systematically explored issues related to traffic synchronization (see for example =-=[31, 10]-=-). Although we have observed a significant amount of synchronization effects in simulations that assume infinite sources (see Section 4.5), very little of this phenomenonseems to show up when assuming... |
268 | Wavelet analysis of long range dependent traffic”,
- Abry, Veitch
- 1998
(Show Context)
Citation Context ... and determine qualitatively over what range of scales there exists a linear relationship between log(E j ) and scale j; that is, over what range of time scales there exists self-similar scaling (see =-=[1]-=- for more details). In all of the figures in this paper, the scale j is on the bottom axis and the corresponding time (in seconds) is plotted on the top axis for reference. The local scaling analysis ... |
267 | On the relationship between file sizes, transport protocols, and self-similar network traffic
- Park, Kim, et al.
- 1996
(Show Context)
Citation Context ...similar scaling behavior over large time scales is mainly caused by user/session characteristics and has little to do with network-specific aspects" (e.g., see [8]; for related earlier work, see =-=also [19]). In supp-=-ort of yet another conjecture that can be found in [8], we also present empirical evidence demonstrating that time scales on the order of a "typical" roundtrip time within the network are di... |
232 | Why we don’t know how to simulate the Internet
- Paxson, Floyd
- 1997
(Show Context)
Citation Context ...estigations also has an impact on the problem related to simulation of "realistic " Internet scenarios. The challenges associated with simulating Internet-like environments are clearly spell=-=ed out in [22]-=- but our empirical work points towards an approach that does away with traditional simulation modeling and coincides with a number of arguments put forward in [22]. In particular, we have demonstrated... |
231 |
TCP/IP Illustrated: Volume 1;
- Stevens
- 1996
(Show Context)
Citation Context ...scales by reducing it to and pointing out a plausible explanation in terms of previously observed phenomena in the dynamics of TCP-type congestion control, among them ACK-compression; see for example =-=[12, 27, 26, 32, 17]-=-, or the more recent study [20]. This empirical observation begs for a simple mathematical construction that incorporates the essence of flow control phenomena and leads to multifractal scaling behavi... |
220 | Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic.
- Feldmann, Gilbert, et al.
- 1998
(Show Context)
Citation Context ...s meant by statements of the form “Self-similar scaling behavior over large time scales is mainly caused by user/session characteristics and has little to do with network-specific aspects” (e.g., see =-=[8]-=-; for related earlier work, see also [19]). In support of yet another conjecture that can be found in [8], we also present empirical evidence demonstrating that time scales on the order of a “typical”... |
216 | Potential benefits of delta encoding and data compression for HTTP. In:
- Mogul, Douglis, et al.
- 1997
(Show Context)
Citation Context ...ndix. We base our choice of distributions (including the specific parameters) on the work surrounding SURGE [4], a Web workload generator designed to generate realistic Web traffic patterns, and upon =-=[7, 18]-=-. Note that we simulate HTTP without pipelining and without persistent connections. The protocol stack, network topology (including delays and bandwidths), and the sequence of Web requests define a si... |
204 | A multifractal wavelet model with application to network traffic,”
- Riedi, Crouse, et al.
- 1999
(Show Context)
Citation Context ...caling analysis, we begin with a time series derived from a conservative cascade with fixed generator W (we take W to be a truncated normal on [0; 1] with mean 1=2 and variance 0.01; for details, see =-=[8, 11, 23]). From th-=-is sequence, we construct the toy example time series "fold" by targeting a selected range of scales and replacing the wavelet coefficients at those scales by appropriately chosen fixed (pos... |
178 | Congestion Avoidance in Computer Networks with a Connectionless Network Layer
- Jain, Ramakrishnan
- 1988
(Show Context)
Citation Context ...congestion control, retransmission, ACK compression), we have gained access to a substantial body of knowledge about various aspects of the dynamics of congestion control mechanisms; for example, see =-=[13, 12, 25, 26, 32]-=- and the empirical studies of Internet traffic dynamics [17, 20]. As a result, we believe to have set the stage for a physical explanation and understanding of the multifractal scaling phenomenon of m... |
144 | The Changing Nature of Network Traffic: Scaling Phenomena”.
- Feldmann, Gilbert, et al.
- 1998
(Show Context)
Citation Context ... physical explanation of the self-similar scaling of network traffic over large time scales in terms of the infinite variance or high-variability property of user session sizes (for details, e.g. see =-=[21, 9]-=-). In this sense, global scaling plots such as the ones shown in Figure 4 (see also below for global scaling plots where we explicitly change a variety of network-related features, without any signifi... |
128 | Observing TCP Dynamics in Real Networks,”
- Mogul
- 1992
(Show Context)
Citation Context ...scales by reducing it to and pointing out a plausible explanation in terms of previously observed phenomena in the dynamics of TCP-type congestion control, among them ACK-compression; see for example =-=[12, 27, 26, 32, 17]-=-, or the more recent study [20]. This empirical observation begs for a simple mathematical construction that incorporates the essence of flow control phenomena and leads to multifractal scaling behavi... |
122 | Improving Simulation for Network Research,
- Bajaj, Breslau, et al.
- 1999
(Show Context)
Citation Context ...nderlying network configuration. Our work relies on a set of measured traffic traces from an ISP environment and on various traces collected from a simulation environment that uses the ns-2-simulator =-=[3]-=- and exploits its ability to implement different network configurations. The ISP traces serve as benchmarks and are used for reality checks, while the ns-2-generated traces allow us to identify the ef... |
99 | Performance of Web proxy caching in heterogeneous bandwidth environments
- Feldmann, Cáceres, et al.
- 1999
(Show Context)
Citation Context ...ndix. We base our choice of distributions (including the specific parameters) on the work surrounding SURGE [4], a Web workload generator designed to generate realistic Web traffic patterns, and upon =-=[7, 18]-=-. Note that we simulate HTTP without pipelining and without persistent connections. The protocol stack, network topology (including delays and bandwidths), and the sequence of Web requests define a si... |
66 |
A Theoretical Analysis of Feedback Flow Control
- SHENKER
- 1990
(Show Context)
Citation Context ...congestion control, retransmission, ACK compression), we have gained access to a substantial body of knowledge about various aspects of the dynamics of congestion control mechanisms; for example, see =-=[13, 12, 25, 26, 32]-=- and the empirical studies of Internet traffic dynamics [17, 20]. As a result, we believe to have set the stage for a physical explanation and understanding of the multifractal scaling phenomenon of m... |
62 |
Oscillation behavior of network traffic: a case study simulation
- Zhang, Clark
- 1990
(Show Context)
Citation Context ...ability, network-related variability), others remain untouched or sufficiently obscure. For example, we have not yet systematically explored issues related to traffic synchronization (see for example =-=[31, 10]-=-). Although we have observed a significant amount of synchronization effects in simulations that assume infinite sources (see Section 4.5), very little of this phenomenonseems to show up when assuming... |
56 | Scaling analysis of conservative cascades, with applications to network traffic.
- Gilbert, Willinger, et al.
- 1999
(Show Context)
Citation Context ...nd define the partition function S(q; j) as the sum over the local maxima of the (normalized) wavelet coefficients raised to the qth power at each scale j: S(q; j) = X max j2 \Gammaj=2 d j;k j q (see =-=[8, 11]-=- and the references therein) 2 . Although we need several additional transformations of the partition function to quantify rigorously the distribution of scaling exponents, for an intuitive picture an... |
36 | TCP traffic is multifractal: a numerical study.
- RIEDI, VÉHEL, et al.
- 1997
(Show Context)
Citation Context ...t few years, network-related measurementshave become a rich source for observing interesting and at times surprising scaling behaviors; e.g., self-similar scaling [15, 21, 9] and multifractal scaling =-=[24, 8]-=-. Intuitively, the ubiquity with which some of these scaling phenomena occur in measurements from today's IP networks is related to the absence of an intrinsic scale wherever one looks: link speedsspa... |
25 |
Multifractal analysis of real ATM traffic: a first look.
- MANNERSALO, NORROS
- 1997
(Show Context)
Citation Context ...ividual TCP connections where it has been shown to conform to multifractal scaling. At the aggregate level, multifractal scaling has been observed in a 7 number of measured Internet traces (e.g., see =-=[24, 16, 8]-=-). Given this empirical connection with multifractal scaling behavior over fine time scales, our aim in this subsection is to provide initial insights into and a first physical understanding for what ... |
12 |
A Practical Guide to Heavy Tails: Statistical Techniques and Applications, chapter Self-similarity and Heavy Tails: Structural Modeling of Network Traffic
- Willinger, Paxson, et al.
- 1998
(Show Context)
Citation Context ...ame time, in today's Web-dominated Internet, the sizes or durations of sessions, number of HTTP requests/responses, TCP connections or IP-flows typically span up to six orders of magnitude (e.g., see =-=[5, 29, 9]-=-). Mathematically, the absence of an intrinsic scale is equivalent to high variability and can be captured in a parsimonious manner using heavy-tailed (also known as scale-invariant) distributions wit... |
3 |
Web Characterization Working Group
- W3C
- 1998
(Show Context)
Citation Context ...ipelining and without persistent connections. The protocol stack, network topology (including delays and bandwidths), and the sequence of Web requests define a simulation. Since TCP Reno and HTTP 1.0 =-=[28]-=- are assumed to be the predominant protocols in the ISP environment at hand, we emulate them in our simulations. We vary the number of sessions from 100 (low load scenarios) to 300 or 400 for high loa... |
2 |
Wavelets: Theory and Application, Wavelet analysis of fractals: From the mathematical concept to experimental reality
- Arneodo
- 1996
(Show Context)
Citation Context ...and the goal of a local scaling analysis is to collect characteristic information about the strengths and locations of the various scaling exponents (for a more detailed presentation see, e.g. [8] or =-=[2]-=-). To gather the statistics of the local scaling exponents, we again use the discrete wavelet transform of the underlying data and define the partition function S(q; j) as the sum over the local maxim... |
2 |
Data networks as cascades: Investigatingthe multifractal nature of Internet WAN traffic
- Feldmann, Gilbert, et al.
- 1998
(Show Context)
Citation Context ...s meant by statements of the form "Self-similar scaling behavior over large time scales is mainly caused by user/session characteristics and has little to do with network-specific aspects" (=-=e.g., see [8]; for rela-=-ted earlier work, see also [19]). In support of yet another conjecture that can be found in [8], we also present empirical evidence demonstrating that time scales on the order of a "typical"... |