Abstract
In 1993, it was found out that there are modeling problems with using Markovian statistics to describe data traffic. A series of experiments on Ethernet traffic revealed that the traffic behavior was fractal-like in nature and exhibit self-similarity, i.e. the statistical behavior was similar across many different time scales (seconds, hours, etc.) [1, 3]. Also, several research studies on traffic on wireless networks revealed that the existence of self-similar or fractal properties at a range of time scale from seconds to weeks. This scale-invariant property of data or video traffic means that the traditional Markovian traffic models used in most performance studies do not capture the fratal nature of computer network traffic. This has implications in buffer and network design. For example, the buffer requirements in multiplexers and switches will be incorrectly predicted. Thus, self-similar models, which can capture burstiness (see Fig. 10.1) over several time scales, may be more appropriate.
Everybody wants to live longer but nobody wants to grow old.
—Jules Rostand
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. E. Leland et al., “On the self-similar nature of Ethernet traffic,” Computer Communications Review, vol. 23, Oct. 1993, pp. 183-193.
--, “On the self-similar nature of Ethernet traffic (extended version),” IEEE/ACM Transactions on Networking, vol. 5, no. 6, Dec. 1997, pp. 835-846.
M. E. Crovella and A. Bestavros, “Self-similarity in World Wide Web traffic: Evidence and possible causes,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, Dec. 1997, pp. 835-846.
C. D. Cairano-Gilfedder and R. G. Cleggg, “A decade of internet research—advances in models and practices,” BT Technology Journal, vol. 23, no. 4, Oct. 2005, pp. 115-128.
B. Tsybakov and N. D. Georganas, “On self-similar traffic in ATM queues: definitions, overflow probability bound, and cell delay distribution,” IEEE/ACM Transactions on Networking, vol. 5, no. 3, June 1997, pp. 397-409.
W. Stallings, High-Speed Networks and Internets: Performance and Quality of Service. Upper Saddle, NJ: Prentice Hall, 2nd ed., 2002, pp. 219-247.
W. Jiangto and Y. Geng, “An intelligent method for real-time detection of DDOS attack based on fuzzy logic,” Journal of Electronics (China), vol. 25, no. 4, July 2008, pp. 511-518.
D. Kouvatsos (ed.), Performance Evaluation and Applications of ATM Networks. Boston, MA: Kluwer Academic Publishers, 2000, pp. 355-386.
A. Ost, Performance of Communication Systems. New York: Springer Verlag, 2001, pp. 171-177.
K. Park and W. Willinger (eds.), Self-similar Network Traffic and Performance Evaluation. New York: John Wiley & Sons, 2000.
J.M. Pitts and J. A. Schormans, Introduction to IP and ATM Design and Performance. Chichester, UK: John Wiley & Sons, 2000, pp. 287-298.
Z. Harpantidou and M. Paterakis, “Random multiple access of broadcast channels with Pareto distributed packet interarrival times,” IEEE Personal Communications, vol. 5, no. 2, April 1998, pp. 48-55.
Z. Hadzi-Velkov and L. Gavrilovska, “Performance of the IEEE 802.11 wireless LANs under influence of hidden terminals and Pareto distributed packet traffic,” Proceedings of IEEE International Conference on Personal Wireless Communication, 1999, pp. 221-225.
W. Willinger et al., “Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, 1997, pp. 71-86.
A. R. Prasad, B. Stavrov, and F. C. Schoute, “Generation and testing of self-similar traffic in ATM networks,” IEEE International Conference on Personal Wireless Communications, 1996, pp. 200-205.
N. Bhatnagar, “Model of a queue with almost self-similar or fractal-like traffic,” Proc. IEEE GLOBECOM ‘97, 1997, pp. 1424-1428.
E. Y. Peterson and P. M. Ulanov, “Methods for simulation of self-similar traffic in computer networks,” Automatic Control and Computer Science, vol. 36, no. 6, 2002, pp. 62-69.
M. S. Taqqu, “The modeling of Ethernet data and of signals that are heavy-tailed with infinite variance.” Scandinavian Journal of Statistics, vol. 29, 2002, pp. 273-295.
R. Yeryomin and E. Petersons, “Generating self-similar traffic for wireless network simulation,” Proc. of Baltic Congress of Future Internet and Communications, 2011, pp. 218-220.
Y. Fei et al., “An intrusion alarming system based on self-similarity of network traffic,” Wuhan University Journal of Natural Sciences (WUJNS), vol. 10, no. 1, 2005, pp. 169-173.
Author information
Authors and Affiliations
Problems
Problems
-
10.1
(a) Explain the concept of self-similarity.
(b) What is a self-similar process?
-
10.2
Show that the Brownian motion process B(t) with parameter H = 1/2 is self-similar. Hint: Prove that B(t) satisfy conditions in Eqs. (10.1) to (10.3).
-
10.3
Show that the Eq. (10.14) is valid and that the variance of Pareto distribution is infinite.
-
10.4
If X is a random variable with a Pareto distribution with parameters α and δ, then show that the random variable Y = ln (X/δ) has an exponential distribution with parameter α.
-
10.5
Evaluate and plot σ in Eq. (10.24) for 0 < ρ < 0.2 with r = 0.01.
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Sadiku, M.N.O., Musa, S.M. (2013). Self-Similarity of Network Traffic. In: Performance Analysis of Computer Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-01646-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-01646-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01645-0
Online ISBN: 978-3-319-01646-7
eBook Packages: Computer ScienceComputer Science (R0)