Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/190314.190338acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Wide-area traffic: the failure of Poisson modeling

Published: 01 October 1994 Publication History

Abstract

Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. We evaluate 21 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTPDATA connection arrivals within FTP sessions, and TELNET packet arrivals) to determine the error introduced by modeling them using Poisson processes. We find that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson processes with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson; that modeling TELNET packet interarrivals as exponential grievously underestimates the burstiness of TELNET traffic, but using the empirical Tcplib[DJCME92] interarrivals preserves burstiness over many time scales; and that FTPDATA connection arrivals within FTP sessions come bunched into “connection burst”, the largest of which are so large that they completely dominate FTPDATA traffic. Finally, we offer some preliminary results regarding how our findings relate to the possible self-similarity of wide-area traffic.

References

[1]
B. Arnold., Pareto Distributions, International Cooperative Publishing House, Maryland, 1983.
[2]
J. Beran, "A Goodness-of-fit Test for Time Series with Long Range Dependence", Journal of the Royal Statistical Society B, 54(3), pp. 749-760, 1992.
[3]
J. Beran, "Statistical Methods for Data with Long-Range Dependence", with discussion, Statistical Science, 7(4), pp. 404-427, 1992.
[4]
K. Claffy, H.-W. Braun and G. Polyzos, "Long-term traffic aspects of the NSFNET", Proceedings of INET '93, SDSC Report GA-A21238, San Diego Supercomputer Center, 1993.
[5]
D.R. Cox, "Long-Range Dependence: A Review", in Statistics: An Appraisal, Proceedings 50th Anniversary Conference, Iowa State Statistical Library, H. A. David and H. T. David, editors, Iowa State University Press, pp. 55-74, 1984.
[6]
R. B. D'Agostino and M. A. Stephens, editors, Goodnessof-Fit Techniques, Marcel Dekker, Inc., 1986.
[7]
P. Danzig and S. Jamin, "tcplib: A Library ofTCP Intemetwork Traffic Characteristics", Report CS-SYS-91-O1, Computer Science Department, University of Southern California, 1991. Available via FTP to excalibur, usc.edu as pub/jamin/tcp lib/tcplib, tar. Z.
[8]
P. Danzig, S. Jamin, R. C~ceres, D. Mitzel, and D. Estrin, "An Empirical Workload Model for Driving Widearea TCP/IP Network Simulations", internetworking: Research and Experience, 3(I), pp. 1-26, 1992.
[9]
D. Duffy, A. McIntosh, M. Rosenstein, and W. Willinger, "Statistical Analysis of CCSN/SS7 Traffic Data from Working CCS Subnetworks", IEEE JSA C, 12(3), pp. 544- 551, April, 1994.
[10]
W. Feller, An Introduction w ?robability Theory and Its Applications, Volume H, John Wiley and Sons, 1966.
[11]
S. Floyd and V. Jacobson, "The Synchronization of Periodic Routing Messages," SIGCOMM '93, September 1993, pp. 33-44. Also to appear in IEEE/ACM Transactions on Networking.
[12]
H. Fowler and W. Leland, "Local Area Network Traffic Characteristics, with Implications for Broadband Network Congestion Management", IEEE JSAC, 9(7), pp. 1139- 1149, September, 1991.
[13]
V. Frost and B. Melamed, "Traffic Modeling for Telecommunications Networks", IEEE Communications Magazine, 32(3), pp. 70-80, March, 1994.
[14]
E. Fuchs and P. E. Jackson, "Estimates of Distributions of Random Variables for Certain Computer Communications Traffic Models", Communications of the A CM, 13(12), pp. 752-757, December, 1970.
[15]
M. Garrett and W. Willinger, "Analysis, Modeling and Generation of Self-Similar VBR Video Traffic", to appear in SIGCOMM '94.
[16]
R. Gusella, "A Measurement Study of Diskless Workstation Traffic on an Ethernet", IEEE Transactions on Communications, 38(9), pp. 1557-1568, September, 1990.
[17]
T. Hettmansperger, and M. Keenan, "Tailweight, Statistical Inference, and Families of Distributions - A Brief Survey'', in Statistical Distributions in Scientific Work, V. 1, G. P. Patii et al. (eds), Kluwer Boston, pp. 161-172, 1980.
[18]
G. Irlam (gordoni@netcom. com), "ufs'93 {Updated file size survey results}", USENET newsgroup comp.os.research, message 2ddp3bSjn5 @darkstar. UCSC.EDU, Nov. 29, 1993.
[19]
R. Jain and S. Routhier, "Packet Trains -- Measurements and a New Model for Computer Network Traffic", IEEE JSAC, 4(6), pp. 986-995, September, 1986.
[20]
S. Kauffman, The Origins of Order: Self-Organization and Selection in Evolution, Oxford University Press, 1993.
[21]
W. Leland, M. Taqqu, W. Willinger, and D. Wilson, "On the Self-Similar Nature of Ethernet Traffic (Extended Version)", IEEE/A CM Transactions on Networking, pp. 1-15, February 1994.
[22]
B. Mandelbrot, "New Methods in Statistical Economics", Journal of Political Economy, 71 (5), pp.421-440, October, 1963.
[23]
B. Mandelbrot, The Fractal Geometry of Nature, Freeman, New York, 1983.
[24]
W. Marshall and S. Morgan, "Statistics of Mixed Data Traffic on a Local Area Network", Computer Networks and ISDN Systems 10(3,4), pp. 185-194, 1985.
[25]
V. Paxson, "Empirically-Derived Analytic Models of Wide-Area TCP Connections: Extended Report", technical report LBL-34086, Lawrence Berkeley Laboratory, May, 1993. Available from ftp.ee.lbl.gov as papers/WAN- TCP-models.prelim. 1.ps.Z and papers/WAN- TCP-models.pre lim. 2.ps.Z.
[26]
V. Paxson, "Growth Trends in Wide-Area TCP Connections'', to appear in IEEE Network, July, 1994.
[27]
V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of l:'oisson Modeling (Extended Versiony', technical report LBL-35238, Lawrence Berkeley Laboratory, August, 1994. Available as papers/WAN-poissonextended, ps.Z from ftp.ee. Ibl.gov.
[28]
W. Richard Stevens, TCP/tP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994.
[29]
E. Willekens and J. Teugels, "Asymptotic expansions for waiting time probabilities in an M/G/i queue with longtailed service time", Queueing Systems 10, pp. 295-312, 1992.

Cited By

View all
  • (2024)Accurate Throughput Prediction for Improving QoE in Mobile Adaptive StreamingIEEE Transactions on Mobile Computing10.1109/TMC.2023.3313592(1-18)Online publication date: 2024
  • (2023)Access Control for Database Applications: Beyond Policy EnforcementProceedings of the 19th Workshop on Hot Topics in Operating Systems10.1145/3593856.3595905(223-230)Online publication date: 22-Jun-2023
  • (2022)Temporal Graph based Overcommitted Routing for Deterministic Networking2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)10.1109/VTC2022-Fall57202.2022.10013007(1-6)Online publication date: Sep-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '94: Proceedings of the conference on Communications architectures, protocols and applications
October 1994
328 pages
ISBN:0897916824
DOI:10.1145/190314
  • cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 24, Issue 4
    Oct. 1994
    318 pages
    ISSN:0146-4833
    DOI:10.1145/190809
    • Editor:
    • David Oran
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1994

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

COMM94
Sponsor:
COMM94: ACM SIGCOMM '94
August 31 - September 2, 1994
London, United Kingdom

Acceptance Rates

SIGCOMM '94 Paper Acceptance Rate 29 of 141 submissions, 21%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)179
  • Downloads (Last 6 weeks)40
Reflects downloads up to 27 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Accurate Throughput Prediction for Improving QoE in Mobile Adaptive StreamingIEEE Transactions on Mobile Computing10.1109/TMC.2023.3313592(1-18)Online publication date: 2024
  • (2023)Access Control for Database Applications: Beyond Policy EnforcementProceedings of the 19th Workshop on Hot Topics in Operating Systems10.1145/3593856.3595905(223-230)Online publication date: 22-Jun-2023
  • (2022)Temporal Graph based Overcommitted Routing for Deterministic Networking2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)10.1109/VTC2022-Fall57202.2022.10013007(1-6)Online publication date: Sep-2022
  • (2022)Temporal Graph based Overcommitted Routing for Deterministic Networking2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)10.1109/VTC2022-Fall57202.2022.10012700(1-6)Online publication date: Sep-2022
  • (2020)Comment on "Datacenter Congestion Control: Identifying what is essential and making it practical" by Aisha Mushtaq, et al, CCR, July 2019ACM SIGCOMM Computer Communication Review10.1145/3402413.340242350:2(64-64)Online publication date: 23-May-2020
  • (2020)Optimization of availability and resource utilisation in LAN based P2P storage distributed systems2020 19th International Symposium INFOTEH-JAHORINA (INFOTEH)10.1109/INFOTEH48170.2020.9066280(1-6)Online publication date: Mar-2020
  • (2019)Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst ExponentApplied Sciences10.3390/app92453199:24(5319)Online publication date: 6-Dec-2019
  • (2019)Lessons from "on the self-similar nature of ethernet traffic"ACM SIGCOMM Computer Communication Review10.1145/3371934.337195549:5(56-62)Online publication date: 8-Nov-2019
  • (2019)Infocommunication Networks Design with Self-Similar Traffic2019 IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)10.1109/CADSM.2019.8779314(24-27)Online publication date: Mar-2019
  • (2018)Modelling of Multiservice Networks with Separated Resources and Overflow of Adaptive TrafficWireless Communications and Mobile Computing10.1155/2018/78701642018:1Online publication date: 14-Aug-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media