Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similar Network Traffic The original paper on network traffic self-similarity.
Computer Networking Lecture 20 – Queue Management and QoS.
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Engineering Internet QoS
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
2014 Examples of Traffic. Video Video Traffic (High Definition) –30 frames per second –Frame format: 1920x1080 pixels –24 bits per pixel  Required rate:
2  Something “feels the same” regardless of scale 4 What is that???
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
無線區域網路中自我相似交通流量之 成因與效能評估 The origin and performance impact of self- similar traffic for wireless local area networks 報 告 者:林 文 祺 指導教授:柯 開 維 博士.
High-performance bulk data transfers with TCP Matei Ripeanu University of Chicago.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
1 Interesting Links
CSE 561 – Traffic Models David Wetherall Spring 2000.
Multimedia Applications r Multimedia requirements r Streaming r Phone over IP r Recovering from Jitter and Loss r RTP r Diff-serv, Int-serv, RSVP.
Streaming Video Gabriel Nell UC Berkeley. Outline Scalable MPEG-4 video – Layered coding method – Integrated transport-decoder buffer model RAP streaming.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
Connection Admission Control Schemes for Self-Similar Traffic Yanping Wang Carey Williamson University of Saskatchewan.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
CS 6401 Network Traffic Characteristics Outline Motivation Self-similarity Ethernet traffic WAN traffic Web traffic.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
The Effects of Systemic Packets Loss on Aggregate TCP Flows Thomas J. Hacker May 8, 2002 Internet 2 Member Meeting.
Internet Traffic Modeling Poisson Model vs. Self-Similar Model By Srividhya Chandrasekaran Dept of CS University of Houston.
Self-Similar Traffic COMP5416 Advanced Network Technologies.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
Panel Topic: After Long Range Dependency (LRD) discoveries, what are the lessons learned so far to provide QoS for Internet advanced applications David.
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum – Faculty.
References for M/G/1 Input Process
Traffic Modeling.
RTSP Real Time Streaming Protocol
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
1 FARIMA(p,d,q) Model and Application n FARIMA Models -- fractional autoregressive integrated moving average n Generating FARIMA Processes n Traffic Modeling.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
1 On Class-based Isolation of UDP, Short-lived and Long-lived TCP Flows by Selma Yilmaz Ibrahim Matta Computer Science Department Boston University.
Interacting Network Elements: Chaos and Congestion Propagation Gábor Vattay Department of Physics of Complex Systems Eötvös University, Budapest, Hungary.
Rate Adaptation Protocol for Real-time Streams Goal: develop an end-to-end TCP-friendly RAP for semi-reliable rate-based applications (e.g. playback of.
Link Dimensioning for Fractional Brownian Input Chen Jiongze PhD student, Electronic Engineering Department, City University of Hong Kong Supported by.
1 Self Similar Traffic. 2 Self Similarity The idea is that something looks the same when viewed from different degrees of “magnification” or different.
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
V. Fodor and Gy. Dan, KTH - Marholmen 2002 End-to-end control for audio-visual communication Viktoria Fodor and György Dán Laboratory for Communication.
Burst Metric In packet-based networks Initial Considerations for IPPM burst metric Tuesday, March 21, 2006.
Analysis of RED Goal: impact of RED on loss and delay of bursty (TCP) and less bursty or smooth (UDP) traffic RED eliminates loss bias against bursty traffic.
Risk Analysis Workshop April 14, 2004 HT, LRD and MF in teletraffic1 Heavy tails, long memory and multifractals in teletraffic modelling István Maricza.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
Ó 1998 Menascé & Almeida. All Rights Reserved.1 Part VIII Web Performance Modeling (Book, Chapter 10)
1 Interesting Links. On the Self-Similar Nature of Ethernet Traffic Will E. Leland, Walter Willinger and Daniel V. Wilson BELLCORE Murad S. Taqqu BU Analysis.
CMPE 252A: Computer Networks
Internet Traffic Modeling
Queue Dynamics with Window Flow Control
Interesting Links.
Minimal Envelopes.
CSE679: Multimedia and Networking
Lecture 19 – TCP Performance
Notices of the AMS, September 1998
Self-similar Distributions
Presented by Chun Zhang 2/14/2003
TCP Congestion Control
CPSC 641: Network Traffic Self-Similarity
Presentation transcript:

Self-Similarity in Network Traffic Kevin Henkener 5/29/2002

What is Self-Similarity? Self-similarity describes the phenomenon where a certain property of an object is preserved with respect to scaling in space and/or time. If an object is self-similar, its parts, when magnified, resemble the shape of the whole.

Pictorial View of Self-Similarity

The Famous Data Leland and Wilson collected hundreds of millions of Ethernet packets without loss and with recorded time-stamps accurate to within 100µs. Data collected from several Ethernet LAN’s at the Bellcore Morristown Research and Engineering Center at different times over the course of approximately 4 years.

Why is Self-Similarity Important? Recently, network packet traffic has been identified as being self-similar. Current network traffic modeling using Poisson distributing (etc.) does not take into account the self-similar nature of traffic. This leads to inaccurate modeling which, when applied to a huge network like the Internet, can lead to huge financial losses.

Problems with Current Models Current modeling shows that as the number of sources (Ethernet users) increases, the traffic becomes smoother and smoother Analysis shows that the traffic tends to become less smooth and more bursty as the number of active sources increases

Problems with Current Models Cont.’d Were traffic to follow a Poisson or Markovian arrival process, it would have a characteristic burst length which would tend to be smoothed by averaging over a long enough time scale. Rather, measurements of real traffic indicate that significant traffic variance (burstiness) is present on a wide range of time scales

Pictorial View of Current Modeling

Side-by-side View

Definitions and Properties Long-range Dependence  covariance decays slowly Hurst Parameter  Developed by Harold Hurst (1965)  H is a measure of “burstiness” also considered a measure of self-similarity  0 < H < 1  H increases as traffic increases

Definitions and Properties Cont.’d low, medium, and high traffic hours as traffic increases, the Hurst parameter increases  i.e., traffic becomes more self-similar

Self-Similar Measures Background  Let time series: X = (X t : t = 0, 1, 2, ….) be a covariance stationary stochastic process  autocorrelation function: r(k), k ≥ 0  assume r(k) ~ k -β L(t), as k  ∞ where 0 < β < 1 lim t  ∞ L(tx) / L(t) = 1, for all x > 0

Second-order Self-Similar Exactly  A process X is called (exactly) self-similar with self- similarity parameter H = 1 – β/2 if  for all m = 1, 2, …. var(X (m) ) = σ 2 m -β  r (m) (k) = r(k), k ≥ 0 Asymptotically  r (m) (k) = r(k), as m  ∞  aggregated processes are the same Current model shows aggregated processes tending to pure noise

Measuring Self-Similarity time-domain analysis based on R/S statistic analysis of the variance of the aggregated processes X (m) periodogram-based analysis in the frequency domain

Methods of Modeling Self-Similar Traffic Two formal mathematical models that yield elegant representations of self-similarity  fractional Gaussian noise  fractional autoregressive integrated moving- average processes

Results Ethernet traffic is self-similar irrespective of time Ethernet traffic is self-similar irrespective of where it is collected The degree of self-similarity measured in terms of the Hurst parameter h is typically a function of the overall utilization of the Ethernet and can be used for measuring the “burstiness” of the traffic Current traffic models are not capable of capturing the self-similarity property

Results Cont.’d There exists the presence of concentrated periods of congestion at a wide range of time scales This implies the existence of concentrated periods of light network load These two features cannot be easily controlled by traffic control.  i.e., burstiness cannot be smoothed

Results Cont.’d These two implications make it difficult to allocated services such that QOS and network utilization are maximized. Self-similar burstiness can lead to the amplification of packet loss.

Problems with Packet Loss Effects in TCP  TCP guarantees that packets will be delivered and will be delivered in order  When packets are lost in TCP, the lost packets must be retransmitted  This wastes valuable resources Effects in UDP  UDP sends packets as quickly as possible with no promise of delivery  When packets are lost, they are not retransmitted  Repercussions for packet loss in UDP include “jitter” in streaming audio/video etc.

Possible Methods for Dealing with the Self-Similar Property of Traffic Dynamic Control of Traffic Flow Structural resource allocation

Dynamic Control of Traffic Flow Predictive feedback control  identify the on-set of concentrated periods of either high or low traffic activity  adjust the mode of congestion control appropriately from conservative to aggressive

Dynamic Control of Traffic Flow Cont.’d Adaptive forward error correction  retransmission of lost information is not viable because of time-constraints (real-time)  adjust the degree of redundancy based on the network state increase level of redundancy when traffic is high  could backfire as too much of an increase will only further aggrevate congestion decrease level of redundancy when traffic is low

Structural Resource Allocation Two types:  bandwidth  buffer size Bandwidth  increase bandwidth to accommodate periods of “burstiness”  could be wasteful in times of low traffic intensity

Structural Resource Allocation Cont.’d  buffer size increase the buffer size in routers (et. al.) such that they can absorb periods of “burstiness” still possible to fill a given router’s buffer and create a bottleneck  tradeoff increase both until they complement each other and begin curtailing the effects of self-similarity