On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.

Slides:



Advertisements
Similar presentations
Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Advertisements

Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similar Network Traffic The original paper on network traffic self-similarity.
Speaker: Yu-Fu Huang Advisor: Dr. Kai-Wei Ke Date : 2014, Mar. 17 A page-oriented WWW traffic model for wireless system simulations.
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
Toyota InfoTechnology Center U.S.A, Inc. 1 Mixture Models of End-host Network Traffic John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft.
2014 Examples of Traffic. Video Video Traffic (High Definition) –30 frames per second –Frame format: 1920x1080 pixels –24 bits per pixel  Required rate:
Finding Self-similarity in People Opportunistic Networks Ling-Jyh Chen, Yung-Chih Chen, Paruvelli Sreedevi, Kuan-Ta Chen Chen-Hung Yu, Hao Chu.
Trace-based Network Bandwidth Analysis and Prediction Yi QIAO 06/10/2002.
2  Something “feels the same” regardless of scale 4 What is that???
Chen Chu South China University of Technology. 1. Self-Similar process and Multi-fractal process There are 3 different definitions for self-similar process.
1 Network Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
October 14, 2002MASCOTS Workload Characterization in Web Caching Hierarchies Guangwei Bai Carey Williamson Department of Computer Science University.
Performance Analysis and Monitoring Facilities in CPN Tools Tutorial CPN’05 October 25, 2005 Lisa Wells.
Finding Self-similarity in Opportunistic People Networks Yung-Chih Chen 1 Ling-Jyh Chen 1, Yung-Chih Chen 1, Tony Sun 2 Paruvelli Sreedevi 1, Kuan-Ta Chen.
Small scale analysis of data traffic models B. D’Auria - Eurandom joint work with S. Resnick - Cornell University.
Understanding and Predicting Host Load Peter A. Dinda Carnegie Mellon University
無線區域網路中自我相似交通流量之 成因與效能評估 The origin and performance impact of self- similar traffic for wireless local area networks 報 告 者:林 文 祺 指導教授:柯 開 維 博士.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Descriptive statistics Experiment  Data  Sample Statistics Experiment  Data  Sample Statistics Sample mean Sample mean Sample variance Sample variance.
Probability By Zhichun Li.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
1 End-to-End Detection of Shared Bottlenecks Sridhar Machiraju and Weidong Cui Sahara Winter Retreat 2003.
1 Interesting Links
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
CSE 561 – Traffic Models David Wetherall Spring 2000.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
CS 6401 Network Traffic Characteristics Outline Motivation Self-similarity Ethernet traffic WAN traffic Web traffic.
The Effects of Systemic Packets Loss on Aggregate TCP Flows Thomas J. Hacker May 8, 2002 Internet 2 Member Meeting.
Self-Similar Traffic COMP5416 Advanced Network Technologies.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum – Faculty.
References for M/G/1 Input Process
Network Traffic Modeling Punit Shah CSE581 Internet Technologies OGI, OHSU 2002, March 6.
Traffic Modeling.
Dr. Nawaporn Wisitpongphan. What do you need in order to conduct a PhD Research? A lot of reading in order to Find a PhD thesis topic Find out what other.
BPS - 3rd Ed. Chapter 211 Inference for Regression.
Lecture 12 Statistical Inference (Estimation) Point and Interval estimation By Aziza Munir.
1 FARIMA(p,d,q) Model and Application n FARIMA Models -- fractional autoregressive integrated moving average n Generating FARIMA Processes n Traffic Modeling.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Hung X. Nguyen and Matthew Roughan The University of Adelaide, Australia SAIL: Statistically Accurate Internet Loss Measurements.
COMPSAC'14 - N. Larrieu /07/ How to generate realistic network traffic? Antoine VARET and Nicolas LARRIEU COMPSAC – Vasteras – July the 23.
Link Dimensioning for Fractional Brownian Input Chen Jiongze PhD student, Electronic Engineering Department, City University of Hong Kong Supported by.
1 Self Similar Traffic. 2 Self Similarity The idea is that something looks the same when viewed from different degrees of “magnification” or different.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Burst Metric In packet-based networks Initial Considerations for IPPM burst metric Tuesday, March 21, 2006.
Performance Evaluation of Long Range Dependent Queues Performance Evaluation of Long Range Dependent Queues Chen Jiongze Supervisor: Moshe ZukermanCo-Supervisor:
Risk Analysis Workshop April 14, 2004 HT, LRD and MF in teletraffic1 Heavy tails, long memory and multifractals in teletraffic modelling István Maricza.
Ch 8 Estimating with Confidence 8.1: Confidence Intervals.
DOWNLINK SCHEDULING IN CDMA NETWORKS GUIDE : Mrs. S.Malarvizhi Group : A5 G.R Brijesh ( ) Deepu K. Pillai ( ) Regi Thomas George ( )
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
BPS - 5th Ed. Chapter 231 Inference for Regression.
1 Interesting Links. On the Self-Similar Nature of Ethernet Traffic Will E. Leland, Walter Willinger and Daniel V. Wilson BELLCORE Murad S. Taqqu BU Analysis.
Estimating the Value of a Parameter Using Confidence Intervals
CMPE 252A: Computer Networks
Internet Traffic Modeling
Interesting Links.
Minimal Envelopes.
Notices of the AMS, September 1998
Self-similar Distributions
Mark E. Crovella and Azer Bestavros Computer Science Dept,
Presented by Chun Zhang 2/14/2003
CPSC 641: Network Traffic Self-Similarity
Presentation transcript:

On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh

Overview Demonstrate the self-similar nature of Ethernet LAN traffic Study the degree of self-similarity in various data sets using the Hurst parameter as a measure of “burstiness” High resolution data collected over several years and across several networks Discusses models for traffic sources, methods for measuring self-similarity and simulating self-similar traffic.

Structure of presentation Traffic Measurements Self-Similar Stochastic Processes Analysis of Ethernet Traffic Measurements Source Models Implications and Conclusions Comments

Traffic Measurements Traffic monitor records for each packet a timestamp (accurate to within microsec, packet length, header information Study conducted from Network underwent changes during this period Data sets with External traffic analyzed separately

Relevant Network Changes Aug 89/Oct 89 – host to host workgroup traffic Jan 1990 – host-host and router-to- router Feb 1992 – predominantly router-to- router traffic

Self-similarity Slowly Decaying Variances : Variance of the sample mean decreases slower than the reciprocal of the sample size. Long Range Dependence : The autocorrlations decay hyperbolically rather than exponentially. Power Law: Spectral density obeys a power law near the origin

Hurst parameter For a given set of observations

Mathematical Models Fractional Gaussian noise – rigid correlation structure ARIMA processes – more flexible for simultaneous modeling of short-term and long-term behavior Construction by Mandelbrot : aggregation of renewal reward processes with inter-arrival times exhibiting infinite variances

Estimating the Hurst parameter H Time domain analysis based on the R/S statistic – robust against changes in the marginal distributions Analysis of the variances for the aggregated processes Periodogram based Maximum Likelihood Estimate analysis in the frequency domain – yields confidence intervals

Ethernet traffic (27 hour) Compare variance-time plot, R/S plot and periodogram for number of bytes during normal hour in Aug 89. H is approx. 0.8 Estimate is constant over different levels of aggregation Conclusion : The Ethernet traffic over a 24- hour period is self-similar with the degree of self-similarity increasing as the utilization of the Ethernet increases.

(a)R/S plot (b) Variance-time (c)Periodogram (d)Different levels Analysis for data set AUG89.MB

Four Year period Estimate for H is quite stable ( ) Ethernet traffic during normal traffic hours is exactly self-similar Estimates from R/S and variance-time plots are accurate

(a)-(d) Aug 89, Oct 89, Jan 90, Feb 92. Analysis for packet count Normal hour traffic

(a)– packet count (b)- number of bytes Low-Normal-High for each

Observations (4-year) H increases from low to normal to high traffic hours As number of sources increased the aggregate traffic does not get smoother – rather the burstiness increases Low traffic hours : gets smoother in 90s because of router-to-router traffic Confidence intervals wider for low traffic hours – process is asymptotically self-similar

External Traffic Normal/High – H is slightly smaller Low traffic hours – H is 0.55 and confidence interval contains 0.5. Therefore coventional short-range Poisson based models describe this traffic accurately 87 % of the packets were TCP

Source Model Renewal reward process in which the inter- arrival times are heavy-tailed With relatively high probability the active- inactive periods are very long The heavier the tail -> the greater the variability -> Burstier the traffic Not analyzed the traffic generated by individual Ethernet users.

Conclusions Ethernet LAN traffic is statistically self-similar Degree of self-similarity (the Husrt parameter H) is typically a function of the overall utilization of the Ethernet Normal and Busy hour traffic are exactly self- similar. Low hour traffic is asymptotically self- similar External traffic / TCP traffic share the same characteristics Conventional packet traffic models are not able to capture the self-similarity

Implications Congestion ? Queueing ? …

Comments Convincing analysis and interpretation of results Poor graphs for a paper that relies on them so heavily