Traffic (1993-2000) Heavy tails (HT) in net traffic??? Careful measurements Appropriate statistics Connecting traffic to application behavior “optimal”

Slides:



Advertisements
Similar presentations
Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Advertisements

1 The ns-2 Network Simulator H Plan: –Discuss discrete-event network simulation –Discuss ns-2 simulator in particular –Demonstration and examples: u Download,
Computer Networking Lecture 20 – Queue Management and QoS.
Introduction 2 1: Introduction.
Network Simulation One tool to simulation network protocols for the Internet is the network simulator (NS) The simulation environment needs to be set-
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
Criticality and power laws Tuning 1-2 parameters  critical point In certain model systems (percolation, Ising, …) power laws and universality iff at criticality.
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Published in 2012 ACM’s Internet Measurement Conference (IMC) Five students from.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
On Modeling Feedback Congestion Control Mechanism of TCP using Fluid Flow Approximation and Queuing Theory  Hisamatu Hiroyuki Department of Infomatics.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Advanced Computer Networks: RED 1 Random Early Detection Gateways for Congestion Avoidance * Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
Are Forest Fires HOT? Jean Carlson, UCSB. Background Much attention has been given to “complex adaptive systems” in the last decade. Popularization of.
Power Laws, Highly Optimized Tolerance and generalized source coding John Doyle, J.M. Carlson Presented by Sumitra Ganesh.
High Performance All-Optical Networks with Small Buffers Yashar Ganjali High Performance Networking Group Stanford University
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
Multimedia Robert Grimm New York University. Content: Multimedia Overview  Multimedia = audio and video  Saroiu et al.—An Analysis of Internet Content.
Traffic Characterization Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda Traffic characterization Switching techniques Internetworking, again.
Random Early Detection Gateways for Congestion Avoidance
Lecture 5: Congestion Control l Challenge: how do we efficiently share network resources among billions of hosts? n Last time: TCP n This time: Alternative.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
CSI Uncertainty in A.I. Lecture 201 Basic Information Theory Review Measuring the uncertainty of an event Measuring the uncertainty in a probability.
Investigating Forms of Simulating Web Traffic Yixin Hua Eswin Anzueto Computer Science Department Worcester Polytechnic Institute Worcester, MA.
Diffusion Mechanisms for Active Queue Management Department of Electrical and Computer Engineering University of Delaware May 19th / 2004 Rafael Nunez.
Internet Queuing Delay Introduction How many packets in the queue? How long a packet takes to go through?
Diffusion Early Marking Department of Electrical and Computer Engineering University of Delaware May / 2004 Rafael Nunez Gonzalo Arce.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum – Faculty.
Network Traffic Modeling Punit Shah CSE581 Internet Technologies OGI, OHSU 2002, March 6.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
P2P Architecture Case Study: Gnutella Network
Lecturer: Ghadah Aldehim
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 7 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Computer Communications Before the Internet. Pre-Internet Networks and Protocols: Usenet Usenet was developed to allow regular users to transfer files,
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
John Doyle Control and Dynamical Systems Caltech Theory of Complex Networks.
Contents Causes and cost of congestion Three examples How to handle congestion End-to-end Network-assisted TCP congestion control ATM ABR congestion control.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
IT 210: Web-based IT Winter 2012 Measuring Speed on the Internet and WWW.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Probability Refresher COMP5416 Advanced Network Technologies.
Performance of Web Proxy Caching in Heterogeneous Bandwidth Environments IEEE Infocom, 1999 Anja Feldmann et.al. AT&T Research Lab 발표자 : 임 민 열, DB lab,
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Internet Measurement and Analysis Vinay Ribeiro Shriram Sarvotham Rolf Riedi Richard Baraniuk Rice University.
ECEN 619, Internet Protocols and Modeling Prof. Xi Zhang Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Graciela Perera Introduction Graciela Perera
An IP-based multimedia traffic generator
ECE 4450:427/527 - Computer Networks Spring 2017
Notices of the AMS, September 1998
Network Core and QoS.
Random Early Detection Gateways for Congestion Avoidance
CS Lecture 2 Network Performance
Communication Networks
Network Core and QoS.
Queueing Problem The performance of network systems rely on different delays. Propagation/processing/transmission/queueing delays Which delay is affected.
Presentation transcript:

Traffic ( ) Heavy tails (HT) in net traffic??? Careful measurements Appropriate statistics Connecting traffic to application behavior “optimal” web layout  HT files  HT traffic Traffic Verbal Data/stat Mod/sim Analysis Synthesis

Is streamed out on the net. Creating fractal Gaussian internet traffic (Willinger,…) Heavy tailed files time log(file size)  > 1.0 log(> size) p  s - 

Traffic (1993) Traffic is “bursty”? Traffic Verbal

Traffic ( ) Bursty??? Careful measurements Appropriate statistics Traffic Verbal Data/stat Why?

Heavy tailed files time Long space Becomes long time Why? Traffic Verbal Data/stat Mod/sim

Heavy tailed files time log(file size)  > 1.0 log(> size) p  s -  Traffic Verbal Data/stat Mod/sim Analysis

Heavy tailed files time log(file size)  > 1.0 log(> size) p  s -  What?

Size of events Frequency Decimated data Log (base 10) Forest fires 1000 km 2 (Malamud) WWW files Mbytes (Crovella) Data compression (Huffman) Cumulative

Probability that a file is bigger than x. Probability that a packet is in a file bigger than x.

Size of events Frequency Fires Web files Codewords Cumulative Log (base 10) -1/2

Size of events Frequency Forest fires 1000 km 2 WWW files Mbytes Data compression Cumulative -1/2 exponential

Size of events Frequency Forest fires 1000 km 2 WWW files Mbytes Data compression Cumulative exponential All events are close in size.

Size of events Frequency Forest fires 1000 km 2 WWW files Mbytes Data compression Cumulative -1/2 Most events are small But the large events are huge

FF WWW DC Data + Model/Theory

Size of events Frequency Decimated data Log (base 10) WWW files Mbytes (Crovella) CumulativeMost files are small (mice) Most packets are in large files (elephants)

Network Sources Mice Elephants Router queues Delay sensitive Bandwidth sensitive Unfortunate interaction of files with congestion control

Heavy tailed files time log(file size)  > 1.0 log(> size) p  s -  Why?

Size of events Frequency WWW files Mbytes Data compression Cumulative exponential All events are close in size.

Source coding for data compression Based on frequencies of source word occurrences, Select code words. To minimize message length.

DC Data How well does the model predict the data?

DC Data + Model How well does the model predict the data? Not surprising, because the file was compressed using Shannon theory. Small discrepancy due to integer lengths.

Generalized “coding” problems Minimize avg file transfer No feedback Discrete (0-d) topology Minimize avg file transfer Feedback 1-d topology Web Data compression

document split into N files to minimize download time A toy website model (= 1-d grid HOT design) Traffic Verbal Data/stat Mod/sim Analysis Synthesis

Probability of user access Wasteful Hard to navigate.

Wasteful Hard to navigate. Just right

More complete website models (Zhu, Yu) Detailed models –user behavior –content and hyperlinks Necessary for real web layout optimization Statistics consistent with simpler models Improved protocol design (TCP) Commercial implications still unclear

Traffic ( ) Heavy tails (HT) in net traffic??? Careful measurements Appropriate statistics Connecting traffic to application behavior “optimal” web layout  HT files  HT traffic Traffic Verbal Data/stat Mod/sim Analysis Synthesis

WWW DC Data

WWW DC Data + Model/Theory

WWW Data + Model/Theory Are individual websites distributed like this? Roughly, yes.

WWW DC Data + Model/Theory How has the data changed since 1995?

Traffic ( ) Traffic TopologyLayeringC&D Verbal Data/stat Mod/sim Analysis Synthesis

Theory and the Internet TrafficTopologyC&DLayering Verbal Data/stat Mod/sim Analysis Synthesis

Network Sources Mice Elephants Router queues

Network Sources Mice Elephants Router queues Delay sensitive Bandwidth sensitive Unfortunate interaction of files with congestion control

Network Sources Mice Elephants Router queues Delay sensitive Bandwidth sensitive Better Control Fortunate interaction of files with improved congestion control

High variability in context More high variability Heterogeneity Human behavior Actuating Today: Simplify/broaden Look back/sideways Extend Optimization Layer/distribute Dynamics/control Develop Delays Actuation