Multifractality in TCP/IP traffic: the case against
نویسندگان
چکیده
The discovery of long-range dependence (a kind of asymptotic fractal scaling) in packet data from LANs and WANs, was followed by further work detailing evidence for multifractal behaviour in TCP/IP traffic in WANs. In terms of networking however, physical mechanisms for such behaviour have never been convincingly demonstrated, leaving open the question of whether multifractal traffic models are of black box type, or alternatively if there is anything real behind them. In this paper we review the evidence for multifractal behaviour of aggregate TCP traffic, and show that in many ways it is weak. Our study includes classic traces and very recent ones. We point out misunderstandings in the literature concerning the scales over which multifractality has been claimed. We explain other pitfalls which have led to the multifractal case being overstated, in particular the possibility of pseudo scaling being confused with true scaling, due to shortcomings in the statistical tools. We argue for an alternative point process model with strong physical meaning. It reproduces the higher order statistics of the data well, despite not being calibrated for them, yet is not multifractal. From its standpoint, the empirical multifractal behaviour is seen as a misinterpretation due to a lack of power in the statistical methodology. 2005 Elsevier B.V. All rights reserved.
منابع مشابه
Evaluating Multipath TCP Resilience against Link Failures
Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple ...
متن کاملQoS Metrics for Elastic IP Traffic
Definition and comparison of QoS metrics for TCP-based IP traffic (elastic traffic) with short TCP connections In this report, we introduce a variety of possible performance measures for elastic traffic and discuss how these measures simplify when they are applied to a processor sharing model and a packet-level model using TCP, respectively. Furthermore, case studies are presented in which we c...
متن کاملTCP Throughput and Buffer Management
There have been many debates about the feasibility of providing guaranteed Quality of Service (QoS) when network traffic travels beyond the enterprise domain and into the vast unknown of the Internet. Many mechanisms have been proposed to bring QoS to TCP/IP and the Internet (RSVP, DiffServ, 802.1p). However, until these techniques and the equipment to support them become ubiquitous, most enter...
متن کاملThrottling spoofed SYN flooding traffic at the source
3 Abstract TCP-based flooding attacks are a common form of Distributed Denial-of-Service 4 (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. 5 Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among 6 different IP spoofing techniques, which include random spoofing, subnet spoofing and fixed 7 spoofing, subnet s...
متن کاملTitle: Tbe and Tcp/ip Traffic Distribution: Atm Forum Technical Working Group Members (traffic Management)
The effect of TCP traffic over ATM ABR is studied with the ERICA switch algorithm. ABR implements its rate-based traffic control at switches (via ER algorithms like ERICA) and at sources (via source rules, such as, Rule 6, which uses TBE parameter). TCP implements its own traffic controls via slow start window control. We study the interaction between the two mechanisms. In particular, this con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Networks
دوره 48 شماره
صفحات -
تاریخ انتشار 2005