Examining Self-Similarity Network Traffic Intervals
نویسندگان
چکیده
منابع مشابه
Self-similarity in network traffic
Recent studies have shown that various types of network traffic exhibit long-term dependency or self-similarity, or fractal-like behavior. Thus, to say that network traffic exhibits self-similarity means that if we look at the network traffic during a given time interval and choose a subinterval at random, the graph of the network traffic vs. time in the subinterval looks like the graph of netw...
متن کاملTraffic Self-Similarity
Statistical analysis of high-resolution traffic measurements from a wide range of working packet networks (e.g., Ethernet LANs, WANs, CCSN/SS7, ISDN and VBR video over ATM) have convincingly shown the presence of fractal or self-similar properties in both local area and wide area traffic traces [2, 3, 5, 15, 19]. That means that similar statistical patterns may occur over different time scales ...
متن کاملQueue Management Algorithms and Network Traffic Self-Similarity
The self-similarity of network traffic has been established in a variety of environments and it is well known that self-similar traffic can lead to larger queueing delays, higher drop rates and extended periods of congestion. In this paper, we investigate the impact of various buffer management algorithms on the self-similarity of network traffic. In this paper we investigate the impact of acti...
متن کاملOn the Relevance of Self-Similarity in Network Traffic Prediction
Self-similarity is an important characteristic of traffic in high speed networks which can not be captured by traditional traffic models. Traffic predictors based on non-traditional long-memory models are computationally more complex than traditional predictors based on short-memory models. Even online estimation of their parameters for actual traffic traces is not trivial work. Based on the ob...
متن کاملSelf-Similarity in Tactical Network Traffic and Tactical Radio Experimentation
NOTICES Disclaimers The findings in this report are not to be construed as an official Department of the Army position unless so designated by other authorized documents. Citation of manufacturer's or trade names does not constitute an official endorsement or approval of the use thereof. Destroy this report when it is no longer needed. Do not return it to the originator. Approved for public rel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing and Digital Systems
سال: 2015
ISSN: 2210-142X
DOI: 10.12785/ijcds/040201