skip to main content
article
Free Access

On the self-similar nature of Ethernet traffic (extended version)

Published:01 February 1994Publication History
First page image

References

  1. 1 D. Anick, D. Mitra, and M. M. Sondhi, "Stochastic theory of a datahandling system with multiple sources," Bell System Tech. J. vol. 61, pp. 1871-1894, 1982.Google ScholarGoogle Scholar
  2. 2 J. Beran, R. Sherman, M. S. Taqqu, and W. Willinger, "Variable-bitrate video traffic and long-range dependence," accepted for publication in IEEE Trans. Commun., 1993.Google ScholarGoogle Scholar
  3. 3 G. E. P. Box and G. M. Jenkins, Time Series Analysis: Forecasting and Control, 2nd ed. San Francisco, CA: Holden Day, 1976. Google ScholarGoogle Scholar
  4. 4 D. R. Cox, "Long-range dependence: A review," in Statistics: An Appraisal, H. A. David and H. T. David, eds. Ames, IA: The Iowa State University Press, 1984, pp. 55-74.Google ScholarGoogle Scholar
  5. 5 N. G, Duffield and N. O'Connell, "Large deviations and overflow probabilities for the general single-server queue, with applications," preprint, 1993.Google ScholarGoogle Scholar
  6. 6 A. Erramilli and R. P. Singh, "Chaotic maps as models of packet traffic," in Proc. 14th ITC, Antibes luan-les-Pins, France, 1994 (to appear).Google ScholarGoogle Scholar
  7. 7 H.J. Fowler and W. E. Leland, "Local area network traffic characteristics, with implications for broadband network congestion management," IEEEJ. Select. Areas Commun. vol. 9, pp. 1139-1149, 1991.Google ScholarGoogle Scholar
  8. 8 M. W. Garrett and W. Willinger, "Analysis, modelling, and generation of self-similar VBR video traffic," preprint, 1994.Google ScholarGoogle Scholar
  9. 9 C. W. J. Granger, "Long memory relationships and the aggregation of dynamic models," J. Econometr. vol. 14, pp. 227-238, 1980.Google ScholarGoogle Scholar
  10. 10 C. W. J. Granger and R. Joyeux, "An introduction to long-memory time series models and fractional differencing," J. Time Series Anal. vol. 1, pp. 15--29, 1980.Google ScholarGoogle Scholar
  11. 11 H. Heffes and D. M. Lucantoni, "A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance," IEEE J. Select. Areas Commun., vol. SAC-4, pp. 856-868, 1986.Google ScholarGoogle Scholar
  12. 12 J. R. M. Hosking, "Fractional differencing," Biometrika, vol. 68, pp. 165--176, 1981.Google ScholarGoogle Scholar
  13. 13 R. Jaln and S. A. Routhier, "Packet trains: Measurements and a new model for computer network traffic," IEEE J. Select. Areas Commun., vol. SAC-4, pp. 986-995, 1986.Google ScholarGoogle Scholar
  14. 14 W. E. Leland and D. V. Wilson, "High time-resolution measurement and analysis of LAN traffic: Implications for LAN interconnection," in Proc. IEEE INFOCOM '91, Bal Harbour, FL, 1991, pp. 1360-1366.Google ScholarGoogle Scholar
  15. 15 W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, "On the self-similar nature of Ethernet traffic," in Proc. ACM Sigcomm '93, San Francisco, CA, 1993, pp. 183-193. Google ScholarGoogle Scholar
  16. 16 --., "Statistical analysis of high time-resolution F.,themet LAN traffic measurements," in Proc. 25th Interface, San Diego, CA, 1993.Google ScholarGoogle Scholar
  17. 17 --, "Self-similarity in high-speed packet traffic: Analysis and modeling of Ethemet traffic measurements," Statistical Science, 1994 (to appear).Google ScholarGoogle Scholar
  18. 18 B.B. Mandelbrot, "Self-similar error clusters in commanication systems and the concept of conditional stationarity," IEEE Trans. Commun. Techn., vol. COM-13, pp. 71-90, 1965.Google ScholarGoogle Scholar
  19. 19 --, "Long-ran linearity, locally Gaussian processes, H-spectra and infinite variances," Intern. Econom. Rev., vol. 10, pp. 82-113, 1969.Google ScholarGoogle Scholar
  20. 20 , "A fast fractional Gaussian noise generator," Water Resources Research, vol. 7, pp. 543-553, 1971.Google ScholarGoogle Scholar
  21. 21 B. B. Mandelbrot and M. S. Taqqu, "Robust R/S analysis of long mn serial correlation," in Proc. 42nd Session ISI, 1979, pp. 69-99.Google ScholarGoogle Scholar
  22. 22 B. B. Mandelbrot and J. W. Van Ness, "Fractional Brownian motions, fractional noises and applications," SIAM Rev., vol. 10, pp. 422-437, 1968.Google ScholarGoogle Scholar
  23. 23 B. B. Mandelbrot and J. R. Wallis, "Computer experiments with fractional Ganssian noises," Water Resources Research, vol. 5, pp. 228-267, 1969.Google ScholarGoogle Scholar
  24. 24 K. Meier-Hellstern, P. E. Wirth, Y.-L. Yan, and D. A. Hoeflin, "Traffic models for ISDN data users: Office automation application," in Teletraffic and Datatraffic in a Period of Change (Proc. 13th ITC, Copenhagen, 1991), A. Jensen and V. B. Iversen, eds. Amsterdam, The Netherlands: North-Holland, 1991, pp. 167-172.Google ScholarGoogle Scholar
  25. 25 I. Norros, "Studies on a model for connectionless traffic, based on fractional Brownian motion," COST24TD(92)041, 1992.Google ScholarGoogle Scholar
  26. 26 E. H. Spafford, "The Intemet worm incident," in Proc. ESEC 89 and Lecture Notes in Computer Science 87. New York: Springer-Verlag, 1989. Google ScholarGoogle Scholar
  27. 27 M. S. Taqqu, "A bibliographical guide to self-similar processes and long-range dependence," in Dependence in Probability and Statistics, E. Eberlein and M. S. Taqqu, eds. Basel: Birkhauser, 1985, pp. 137-165.Google ScholarGoogle Scholar
  28. 28 M. S. Taqqu and J, B. Levy, "Using renewal processes to generate long-range dependence and high variability," in Dependence in Probability and Statistics, E. Eberlein and M. S. Taqqu, eds. Boston, MA: Birkhauser, 1986, vol. 1 !, pp. 7349.Google ScholarGoogle Scholar
  29. 29 D. Veitch, "Novel models of broadband traffic," in Proc. 7th Australian Teletraffic Research Seminar, Murray River, Australia, 1992.Google ScholarGoogle Scholar

Index Terms

  1. On the self-similar nature of Ethernet traffic (extended version)

          Recommendations

          Reviews

          Valentin Cristea

          Starting from the analysis of traffic data, accurately collected on an Ethernet network, the authors discovered a characteristic nobody expected: they demonstrate that Ethernet LAN traffic is statistically self-similar. None of the commonly used traffic models is able to capture this behavior, which has great implications for the design, control, and analysis of high-speed, cell-based networks. The paper contains a description of the available traffic measurements; a theoretical presentation of self-similarity; the statistical analysis of the collected data for self-similarity; and a discussion on the significance of self-similarity for traffic engineering of B-ISDN (broadband ISDN) environments. All the sections of the paper contribute to the demonstration of the traffic self-similarity characteristic. Details on the network environment at Bellcore are given. References to papers describing self-similarity are included. The statistical analysis is presented in detail. The impact of the self-similar nature of traffic on the engineering of high-speed networks is also highlighted. Network engineers will find this paper interesting and useful.

          Wai Sum Lai

          High-speed integrated-services networks require a high level of performance to support the fluctuating and heterogeneous demands from different users. The ability to predict performance accurately is crucial for the design and development of such networks. To achieve this goal, one major need is to model various traffic sources accurately so that their salient features can be reflected in the performance analysis and evaluation. Focusing primarily on one type of traffic—packet data from Ethernet LANs—the authors propose the use of a self-similar stochastic model for the modeling of aggregate data traffic sources. Based on the statistical analysis of a series of extensive measurements of Ethernet traffic spanning a four-year period (1989–92), they show that such a model can capture the bursty characteristics of this type of traffic more accurately than the existing Poisson-related models. This work is an important step toward a better understanding of the bursty nature of different traffic sources. Hopefully, it will be the starting point in the development of a new set of queueing models and tools for the performance analysis of broadband integrated networks.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image IEEE/ACM Transactions on Networking
            IEEE/ACM Transactions on Networking  Volume 2, Issue 1
            Feb. 1994
            101 pages

            Publisher

            IEEE Press

            Publication History

            • Published: 1 February 1994
            Published in ton Volume 2, Issue 1

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader