Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1811681.1811858guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On the role of flows and sessions in internet traffic modeling: an explorative toy-model

Published: 30 November 2009 Publication History

Abstract

In this work we present a simple toy-model that is able to explain certain empirical observations reported in a set of previous papers by Hohn et al. [1]-[3] about the wavelet spectrum of real traffic traces. Therein, the authors found that the wavelet spectrum is substantially invariant to flow scrambling and truncation. Such finding suggested that super-flow structures above the transport layer -- i.e., sessions -- can be ignored for modeling the packet arrival process. Based on the proposed toymodel, we offer an interpretation framework that goes in the opposite direction, indicating that sessions, not transport-layer flows, should be taken as the main structural entities in simplified on/off models.

References

[1]
N. Hohn, D. Veitch, P. Abry. Does Fractal Scaling at the IP Level depend on TCP Flow Arrival Processes? Internet Measurements Workshop, Marseille, France, November 2002.
[2]
N. Hohn, D. Veitch, P. Abry. Cluster processes, a natural language for network traffic. IEEE Transactions on Signal Processing, special issue on Signal Processing in Networking, 51(8):2229-2244, 2003.
[3]
N. Hohn, D. Veitch, P. Abry. The impact of the flow arrival process in Internet traffic. Proc. of IEEE Int. Conf. on Acoust. Speech and Sig. Proc., 2003.
[4]
B. Krishnamurty, M. Crovella. Internet Measurement: Infrastructure, Traffic and Applications. Wiley, 2006.
[5]
K. Park, W. Willinger. Self-similar Network Traffic and Performance Evaluation. Wiley, 2000.
[6]
P. Abry, D. Veitch. Wavelet analysis of long range dependent traffic. IEEE Trans. on Information Theory, 1(44):2-15, 1998.
[7]
M. Grossglauser, J.C. Bolot. On the relevance of Long-Range Dependence in Network Traffic. IEEE/ACM Trans. on Networking, 7(5), 1999.
[8]
W. Willinger, R. Govindan, S. Jamin, V. Paxson, S. Shenker. Scaling phenomena in the Internet: Critically examining criticality. Proceedings of the National Academy of Sciences, vol. 99, issue 90001, pp. 2573- 2580, February 2002.
[9]
P. Abry, P. Borgnat, F. Ricciato, A. Scherrer, D. Veitch. Revisiting and old friend: On the observability of the relation between long range dependence and heavy tail. Telecommunication Systems (Springer), Special issue on Traffic Modeling, Its Computations and Applications (to appear), 2009.
[10]
D. Veitch, P. Abry. Matlab code for the wavelet based analysis of scaling processes. Available from http:// www.cubinlab.ee.mu.oz.au/~darryl/secondorder_code.html.
[11]
F. Ricciato. Some remarks to recent papers on traffic analysis. editorial for CCR, July 2006.
[12]
M. Roughan, D. Veitch. Some remarks on unexpected scaling exponents. editorial for CCR, October 2007.
[13]
M. Allman, V. Pasxson, J. Terrell. A Brief History of Scanning. ACM Internet Measurement Conference (IMC'07), San Diego, October 2007.
[14]
F. Ricciato, E. Hasenleithner, P. Romirer-Maierhofer. Traffic analysis at short time-scales: an empirical case study from a 3G cellular network. IEEE Transactions on Network and Service Management, March 2008.
[15]
A. Bianco, G. Mardente, M. Mellia, M. Munafo, L. Muscariello. Web user session characterization via clustering techniques. Globecom, 2005.

Cited By

View all
  • (2013)Distribution-Based anomaly detection in network trafficDataTraffic Monitoring and Analysis10.5555/2555672.2555683(202-216)Online publication date: 1-Jan-2013
  • (2013)A methodological overview on anomaly detectionDataTraffic Monitoring and Analysis10.5555/2555672.2555681(148-183)Online publication date: 1-Jan-2013
  • (2013)RENETO, a realistic network traffic generator for OMNeT++/INETProceedings of the 6th International ICST Conference on Simulation Tools and Techniques10.5555/2512734.2512744(73-81)Online publication date: 5-Mar-2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
GLOBECOM'09: Proceedings of the 28th IEEE conference on Global telecommunications
November 2009
6643 pages
ISBN:9781424441471

Publisher

IEEE Press

Publication History

Published: 30 November 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Distribution-Based anomaly detection in network trafficDataTraffic Monitoring and Analysis10.5555/2555672.2555683(202-216)Online publication date: 1-Jan-2013
  • (2013)A methodological overview on anomaly detectionDataTraffic Monitoring and Analysis10.5555/2555672.2555681(148-183)Online publication date: 1-Jan-2013
  • (2013)RENETO, a realistic network traffic generator for OMNeT++/INETProceedings of the 6th International ICST Conference on Simulation Tools and Techniques10.5555/2512734.2512744(73-81)Online publication date: 5-Mar-2013
  • (2013)Distribution-based anomaly detection via generalized likelihood ratio testComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.07.02857:17(3446-3462)Online publication date: 1-Dec-2013

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media