Download presentation
Presentation is loading. Please wait.
Published byEmery Robert Day Modified over 9 years ago
1
NETW 707 Modeling and Simulation Amr El Mougy Maggie Mashaly
2
Lecture (6) Traffic Modeling and Simulation
4
Why is it Needed? Router design relies heavily on traffic modeling Quality of service support can be significantly improved if the traffic can be predicted Congestion control can be optimized by learning about traffic Realistic simulations need realistic traffic Traffic intensity La/R < 1
5
Traffic Modeling Objective: to simulate network traffic What is the purpose of the simulation? Which layer is of interest
6
Traffic at the PHY Layer 01000110101010101011000100111100101011 Sequence of bits The bits are either there or not (ON/OFF) Simulations at the PHY layer are usually concerned with BER and channel quality Often simulations at the PHY layer assume constant stream of bits
7
Traffic at the MAC Layer Starting at the MAC layer, packets are seen as black boxes If medium access is to be investigated, then interference may need to be modeled What is the MAC protocol used (ACKs, NACKs, GoBackN, Selective Repeat, etc.) Is random access employed (are collisions possible)
8
Traffic at the Network Layer IP traffic can also be modeled as an ON/OFF process What is the routing protocol used
9
Traffic at the Transport Layer time to transmit file initiate TCP connection RTT request file RTT file received time A packet is usually followed by an ACK in the other direction, typically after one half RTT
10
Traffic at the Application Layer Application layer protocols have different characteristics Client-server or peer-to-peer architectures client/server peer-peer
11
1-11 Introduction 2
12
HTTP Web browsing Uses TCP persistent or non-persistent connections GET /somedir/page.html HTTP/1.1 Host: www.someschool.edu User-agent: Mozilla/4.0 Connection: close Accept-language:fr (extra carriage return, line feed) request line (GET, POST, HEAD commands) header lines Carriage return, line feed indicates end of message HTTP/1.1 200 OK Connection close Date: Thu, 06 Aug 1998 12:00:15 GMT Server: Apache/1.3.0 (Unix) Last-Modified: Mon, 22 Jun 1998 …... Content-Length: 6821 Content-Type: text/html data data data data data... status line (protocol, status code, status phrase) header lines data, e.g., requested HTML file
13
S: 220 smtp.example.com C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you C: MAIL FROM: S: 250 Ok C: RCPT TO: S: 250 Ok C: RCPT TO: S: 250 Ok C: DATA S: 354 End data with. C: From: "Bob Example" bob@example.org C: To: "Alice Example" C: Cc: theboss@example.com C: Date: Tue, 15 January 2008 16:02:43 -0500 C: Subject: Test message C: C: Hello Alice. C: This is a test message with 5 header fields and 4 lines in the message body. C: Your friend, C: Bob C:. S: 250 Ok: queued as 12345 C: QUIT S: 221 Bye {The server closes the connection} SMTP SMTP uses TCP connections
14
Other Applications Uses HTTP for pages and RTMP for streaming videos May use TCP or UDP Can be an example of Constant Bit Rate (CBR) traffic YouTube Skype Uses TCP and UDP Proprietary protocols Can be an example of Variable Bit Rate (VBR) traffic
15
Parameters for Traffic Modeling Two parameters are needed to model traffic of any type Packet size Inter-arrival times Packet size is easy to model. May be subject to protocol restrictions Inter-arrival times are more challenging
16
Classic Traffic Modeling: The Poisson Distribution
17
Aggregate Arrivals Properties of the Poisson Distribution The superposition of independent Poisson processes results in a new Poisson process with a rate equal to the sum of the rates of the independent processes
18
Packet Generation using Poisson
20
Trouble with Poisson Does not show traffic burstiness over extended time scales
21
Compound Poisson Traffic The model is extended to deliver batches of traffic at once. The inter-batch arrival times are exponentially distributed, while the batch sizes are geometric. The model has two parameters: The mean inter-batch arrival time 1/λ The batch parameters ρ (between 0 and 1) Thus, mean packet arrival over time period t is tλ/ρ Disadvantages: Back to back packet arrivals may not be realistic (although now it is more likely) The model is still essentially Poisson, which is memoryless
22
Markov Modulated Poisson Traffic Model Motivated by the need to generate packet arrivals at different rates A continuous-time Markov chain varies the arrival rate of a Poisson model Each state in the Markov chain has an associated arrival rate For example, a two state MC has four parameters (λ1, λ2, r1, r2). To determine these parameters, real traffic traces must be used The model is designed to fit the real trace based on metrics such as: mean packet arrival rate, variance-to-mean ratio of the number of arrivals over a short period, or long-term variance-to-mean ratio of the number of arrivals λ1λ1λ2λ2 1-r1 r1 1-r2 r2
23
The Packet Train Model Recognizes the fact that address locality applies to routing decisions, i.e. packets generated by the same source with small inter-arrival times are probably bound to the same destination and thus will probably follow the same route Packet trains are characterized by tandem trailers: a group of packets going in one direction, followed by one or more packets in the other direction Characterized by 4 parameters: inter-train arrival time, inter-car arrival time, mean train size, mean car size Does not make any decisions about the protocols and their nature
24
ON/OFF and the Interrupted Poisson Process Two-state systems used to model the channel Packet arrivals occur during the ON state according to a Poisson distribution The time the channel spends in each state is called the transition time
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.