A Historical View of Network Traffic Models
نویسنده
چکیده
Network traffic models have evolved significantly over the lifetime of the Internet. The earliest models were largely Poisson-based, designed for ease of analysis. The discovery of traffic self-similarity and long-range dependence required significant changes to traffic models. We examine this evolution from the early models, through the discovery of self-similarity, to the modern systems that account for complexities such as the impact of TCP congestion control, and practical modeling of arbitrary network traffic.
منابع مشابه
Different Network Performance Measures in a Multi-Objective Traffic Assignment Problem
Traffic assignment algorithms are used to determine possible use of paths between origin-destination pairs and predict traffic flow in network links. One of the main deficiencies of ordinary traffic assignment methods is that in most of them one measure (mostly travel time) is usually included in objective function and other effective performance measures in traffic assignment are not considere...
متن کاملPotential measurement of pedestrian traffic in Kashan city with emphasis on urban planning indicators
According to Jane Jacobs, the main part of the concept of "street life" lies in its pedestrians. From his point of view, these are busy and vibrant walkways that give meaning to the city center by providing a social interactive environment. The existence of communities to achieve sustainable transport goals is obvious because it improves displacement, reduces the negative environmental impacts...
متن کاملOn Calibration and Application of Logit-Based Stochastic Traffic Assignment Models
There is a growing recognition that discrete choice models are capable of providing a more realistic picture of route choice behavior. In particular, influential factors other than travel time that are found to affect the choice of route trigger the application of random utility models in the route choice literature. This paper focuses on path-based, logit-type stochastic route choice models, i...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملAn Alternative Approach to Centroids and Connectors Pattern: Random Intra-Zonal Travel Time
In traditional traffic assignment procedure, each traffic analysis zone is represented by one point in its geometric center which is connected to the network by several connectors. Results of studies show that different connector patterns would result up to 10% change in estimated volume and up to 20% change in total travel time. Also the different patterns of connectors can change the priority...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006