Performance Evaluation for Impact of Self-Similarity in Control Network

被引:0
|
作者
Zhou Sen-xin [1 ]
Han Jiang-hong [1 ]
Tang Hao [1 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Anhui, Peoples R China
来源
关键词
Performance evaluation; Self-similar traffic; Raw packet generator (RPG) model; Opnet;
D O I
10.4028/www.scientific.net/AMR.268-270.1574
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The impacts of self-similar traffic on network performance has received much attention recently, however the effects of control network on self-similar traffic networks has not been fully investigated yet. Therefore, the objective of this paper is to to understand self-similarity on physical grounds in a realistic network environment. This understanding is important when developing efficient and integrated network frameworks within which end-to-end QoS guarantees are fully supported. We first introduce the techniques that we use to generate self-similar network traffic. Then we compare the performance of an Ethernet segment run with heavy-tail traffic and with exponential traffic. Our study results show that self-similar traffic, compared with traditional short-range dependent models, requires longer queues and thus larger buffers in the control network design.
引用
收藏
页码:1574 / 1578
页数:5
相关论文
共 50 条
  • [21] Self-similarity Analysis and Application of Water Network Traffic
    Xu, Yan
    Shamrooz, Summera
    Li, Qianmu
    Hou, Jun
    2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 257 - 261
  • [22] Network Calculus Based on Priority in Self-Similarity Flow
    Li Qing-hua
    Cao Hong
    Wu Yu-feng
    Xia Zhuo-qun
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 43 (13): : 264 - 270
  • [23] Queue management algorithms and network traffic self-similarity
    Sikdar, B
    Chandrayana, K
    Vastola, KS
    Kalyanaraman, S
    HPSR 2002: WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, PROCEEDINGS: MERGING OPTICAL AND IP TECHNOLOGIES, 2002, : 319 - 323
  • [24] Self-similarity characteristic analysis of the network redundant traffic
    Dong, Zengwen
    Deng, Xiaohua
    Xing, Ling
    Journal of Computational Information Systems, 2015, 11 (09): : 3395 - 3400
  • [25] Host identification based on self-similarity of network activity
    Huang, Lisheng
    Zhao, Guanling
    Li, Lu
    Zhang, Fengjun
    COMPUTER COMMUNICATIONS, 2022, 191 : 467 - 476
  • [26] Using Traffic Self-Similarity for Network Anomalies Detection
    Popa, Sorin Mihai
    Manea, George Marian
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 639 - 644
  • [27] Self-similarity and network perspective of the Chinese fund market
    Deng, Weibing
    Li, Wei
    Cai, Xu
    Wang, Qiuping A.
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2011, 390 (21-22) : 3826 - 3834
  • [28] Detecting DDOS attack based on network self-similarity
    Xiang, Y
    Lin, Y
    Lei, WL
    Huang, SJ
    IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (03): : 292 - 295
  • [29] Self-similarity in wide-area network traffic
    Isopi, M
    OPTICAL NETWORKS: DESIGN AND MODELLING, 1999, 19 : 123 - 130
  • [30] Self-Similarity of Data Traffic in a Delay Tolerant Network
    Pramanik, Somreeta
    Datta, Raja
    Chatterjee, Puspal
    2017 WIRELESS DAYS, 2017, : 39 - 42