Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/06 2004.

Slides:



Advertisements
Similar presentations
Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
Advertisements

Connection-level Analysis and Modeling of Network Traffic understanding the cause of bursts control and improve performance detect changes of network state.
Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similar Network Traffic The original paper on network traffic self-similarity.
Lesson 17: Models for Traffic Sources Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights.
Network and Service Assurance Laboratory Analysis of self-similar Traffic Using Multiplexer & Demultiplexer Loaded with Heterogeneous ON/OFF Sources Huai.
2014 Examples of Traffic. Video Video Traffic (High Definition) –30 frames per second –Frame format: 1920x1080 pixels –24 bits per pixel  Required rate:
Finding Self-similarity in People Opportunistic Networks Ling-Jyh Chen, Yung-Chih Chen, Paruvelli Sreedevi, Kuan-Ta Chen Chen-Hung Yu, Hao Chu.
2  Something “feels the same” regardless of scale 4 What is that???
1 Self-Similar Ethernet LAN Traffic Carey Williamson University of Calgary.
CMPT 855Module Network Traffic Self-Similarity Carey Williamson Department of Computer Science University of Saskatchewan.
On the Self-Similar Nature of Ethernet Traffic - Leland, et. Al Presented by Sumitra Ganesh.
October 14, 2002MASCOTS Workload Characterization in Web Caching Hierarchies Guangwei Bai Carey Williamson Department of Computer Science University.
Small scale analysis of data traffic models B. D’Auria - Eurandom joint work with S. Resnick - Cornell University.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Self-Similarity in Network Traffic Kevin Henkener 5/29/2002.
1 Interesting Links
CSE 561 – Traffic Models David Wetherall Spring 2000.
Origins of Long Range Dependence Myths and Legends Aleksandar Kuzmanovic 01/08/2001.
Long Range Dependent Traffic and Leaky Buckets CS215-winter ’01 Demetrios Laios 3/22/2001.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Connection Admission Control Schemes for Self-Similar Traffic Yanping Wang Carey Williamson University of Saskatchewan.
Introduction to Queuing Theory. 2 Queuing theory definitions  (Kleinrock) “We study the phenomena of standing, waiting, and serving, and we call this.
Self-Similar through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level Walter Willinger, Murad S. Taqqu, Robert Sherman,
Internet Queuing Delay Introduction How many packets in the queue? How long a packet takes to go through?
CS 6401 Network Traffic Characteristics Outline Motivation Self-similarity Ethernet traffic WAN traffic Web traffic.
Buffer Management for Shared- Memory ATM Switches Written By: Mutlu Apraci John A.Copelan Georgia Institute of Technology Presented By: Yan Huang.
Self-Similar Traffic COMP5416 Advanced Network Technologies.
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
Panel Topic: After Long Range Dependency (LRD) discoveries, what are the lessons learned so far to provide QoS for Internet advanced applications David.
References for M/G/1 Input Process
Network Traffic Modeling Punit Shah CSE581 Internet Technologies OGI, OHSU 2002, March 6.
Traffic Modeling.
Queueing Theory Queueing theory definitions (Bose) “the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for.
Network Analysis A brief introduction on queues, delays, and tokens Lin Gu, Computer Networking: A Top Down Approach 6 th edition. Jim Kurose.
Introduction to Queuing Theory
Probability Review Thinh Nguyen. Probability Theory Review Sample space Bayes’ Rule Independence Expectation Distributions.
1 FARIMA(p,d,q) Model and Application n FARIMA Models -- fractional autoregressive integrated moving average n Generating FARIMA Processes n Traffic Modeling.
MIT Fun queues for MIT The importance of queues When do queues appear? –Systems in which some serving entities provide some service in a shared.
ECEN4533 Data Communications Lecture #2125 February 2013 Dr. George Scheets n Read 11.4 n Problems: Chapter 11.2, 4, & 5 n Quiz #2, 25 March (Live) < 1.
Introduction to Operations Research
CS433 Modeling and Simulation Lecture 12 Queueing Theory Dr. Anis Koubâa 03 May 2008 Al-Imam Mohammad Ibn Saud University.
Link Dimensioning for Fractional Brownian Input Chen Jiongze PhD student, Electronic Engineering Department, City University of Hong Kong Supported by.
1 Self Similar Traffic. 2 Self Similarity The idea is that something looks the same when viewed from different degrees of “magnification” or different.
Queuing Theory and Traffic Analysis Based on Slides by Richard Martin.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
Self-generated Self-similar Traffic Péter Hága Péter Pollner Gábor Simon István Csabai Gábor Vattay.
CS352 - Introduction to Queuing Theory Rutgers University.
Burst Metric In packet-based networks Initial Considerations for IPPM burst metric Tuesday, March 21, 2006.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
Internet Applications: Performance Metrics and performance-related concepts E0397 – Lecture 2 10/8/2010.
MODELING THE SELF-SIMILAR BEHAVIOR OF PACKETIZED MPEG-4 VIDEO USING WAVELET-BASED METHODS Dogu Arifler and Brian L. Evans The University of Texas at Austin.
Risk Analysis Workshop April 14, 2004 HT, LRD and MF in teletraffic1 Heavy tails, long memory and multifractals in teletraffic modelling István Maricza.
1 Why is the Internet traffic bursty in short time scales? Constantine Dovrolis Hao Jiang College of Computing Georgia Institute of Technology.
Queuing Theory.  Queuing Theory deals with systems of the following type:  Typically we are interested in how much queuing occurs or in the delays at.
Notices of the AMS, September Internet traffic Standard Poisson models don’t capture long-range correlations. Poisson Measured “bursty” on all time.
Ó 1998 Menascé & Almeida. All Rights Reserved.1 Part VIII Web Performance Modeling (Book, Chapter 10)
1 Interesting Links. On the Self-Similar Nature of Ethernet Traffic Will E. Leland, Walter Willinger and Daniel V. Wilson BELLCORE Murad S. Taqqu BU Analysis.
OPERATING SYSTEMS CS 3502 Fall 2017
Al-Imam Mohammad Ibn Saud University
Internet Traffic Modeling
Interesting Links.
Minimal Envelopes.
CPSC 531: System Modeling and Simulation
Notices of the AMS, September 1998
Presented by Chun Zhang 2/14/2003
Buffer Management for Shared-Memory ATM Switches
Queueing Theory 2008.
CPSC 641: Network Traffic Self-Similarity
Course Description Queuing Analysis This queuing course
Presentation transcript:

Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/

2 Table of Content Network Traffic Study –Motivation –Measurement –Modeling Classic Model, Poisson or Markovian Self-Similar Model –What’s Self-Similarity –Definition of Self-Similarity –Explanation of Self-Similarity –Impact on network performance –Adapting to Self-Similarity

3 Understanding network traffic behavior is essential for all aspects of network design and operation –Component design –Protocol design –Provisioning –Management –Modeling and simulation Motivation for Network Traffic Study

4 Network Traffic Measurement Collect data or packet traces showing packet activity on the network for different network applications Purpose –Understand the traffic characteristics of existing networks –Develop models of traffic for future networks –Useful for simulations, planning studies

5 Traffic modeling in the world of telephony was the basis for initial network models –Assumed Poisson arrival process –Assumed Exponential call duration –Well established queuing literature based on these assumptions –Enabled very successful engineering of telephone networks Network Traffic Modeling In the past…

6 Classic Model Poisson Process Markov Chain ON-OFF model Interrupted Poisson Process 01  ON Fixed rate arrival OFF   Active Poisson arrival Idle   2 

7 The Story Begins with Measurement In 1989, Leland and Wilson begin taking high resolution traffic traces at Bellcore –Ethernet traffic from a large research lab –Mostly IP traffic (a little NFS) –Four data sets over three year period

8 Actual Network Traffic v.s. Poisson [Chun Zhang 2003] Network Traffic Measurement Poisson Traffic Model 5,8,2 mean 5

9 What’s Self-Similarity Self-similarity describes the phenomenon where a certain property of an object is preserved with respect to scaling in space and/or time. (also called fractals) If an object is self-similar, its parts, when magnified, resemble the shape of the whole.

10 Definition of Self-Similarity Self-similar long-range dependenceSelf-similar processes are the simplest way to model processes with long-range dependence The autocorrelation function  k of a process with long-range dependence is not summable: –   k  . e.g.  k  k -  as k  . for 0 <  < 1 Autocorrelation function follows a power law Slower decay than exponential process –If   k < . Long Range Dependence Short Range Dependence

11 Self-Similarity contd. Zero-mean stationary time series X = (X t ;t = 1,2,3,…), m- aggregated series X (m) = (X k (m) ;k = 1,2,3,…) by summing X over blocks of size m. X is H-self-similar (distributional self-similarity), if for all positive m, X (m) has the same distribution as X rescaled by m H. –PDF{X at }=PDF{ m H {X t } }. X is Second-order-self-similar, if  (m) (k) of the series X (m) for all m. – Var(X (m) ) =  2 m -β, and –  (m) (k) =  (k), k  0 [Asymptotically:  (m) (k)   (k), m  Degree of self-similarity is expressed as the speed of decay of series autocorrelation function using the Hurst parameter

12  =1,H=0.5 SRD  =0.6,H=0.7 LRD Log( Var(X (m) ) ) = log(  2 m -β ) =2log  - βlog m Y X Graphic Tests, e.g. Variance-time plots The variance of X (m) is plotted v.s. m on log-log plot Slope (-  > –1 indicates of SS H = 1 -  /2 –LRD, ½ < H < 1 –Degree of SS\LRD increases as H  1 H increases, more bursty

13 Modeling Self-Similarity Superposition of High Variability ON-OFF Sources –Extension to traditional ON-OFF models by allowing the ON and OFF periods to have infinite variance (high variability or Noah Effect) X 1 (t)offon X 2 (t)on X 3 (t)off S 3 (t) time

14 Explanation of Self-Similarity Consider a set of processes which are either ON or OFF –The distribution of ON time is heavy tailed (wide range of different values, including large values with non-negligible probability) The size of files on a server are heavy-tail The transfer times also have the same type of characteristics. –The distribution of OFF time is heavy tailed Since some source model phenomena that are triggered by humans (e.g. HTTP sessions) have extremely long period of latency.

15 Impact on Network Performance Self-similar burstiness can lead to the amplification of packet loss. The burstiness cannot be smoothed. Limited effectiveness of buffering –queue length distribution decays slower than exponentially v.s. the exponential decay associated with Markovian input

16 [Kihong Park, Walter Willinger] Mean queue length v.s. buffer capacity at a bottleneck router when fed with self-similar input with varying degrees of LRD but equal traffic intensity   2 : weak Long Range Correlation, buffer capacity of about 60kB suffices to contain the input’s variability, the average buffer occupancy remains below 5kB   1:strong LRC, increase in buffer capacity accompanied by increase in buffer occupancy Impact, contd.

17 Adapt to self-similarity Flexible resource allocation –Increase bandwidth to accommodate periods of “ burstiness ”. Could be wasteful in times of low traffic intensity  adaptive adjustment can be effective counter measure. –Increase the buffer size to absorb periods of “ burstiness ”. –Tradeoff, increase both appropriately.

18 Current Status Many people (vendors) chose to ignore self- similarity People want to blame the protocols for observed behavior Multi-resolution analysis may provide a means for better models Lots of opportunity!!

19 Questions?