Contribution of the application, transport and network layers to the self-similarity of Internet traffic

被引:0
|
作者
Racz, PI [1 ]
Matsuda, T [1 ]
Yamamoto, M [1 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita, Osaka 5650871, Japan
关键词
self-similarity; Internet traffic; application layer; transport layer; network layer;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been few studies evaluating the dominant factor responsible for generating self-similar network traffic while many researchers have discussed the causes of self-similarity. In this paper, we have isolated and compared the effects of the application, transport and network layers on the self-similarity of TCP flows and their aggregates. With a simple computer simulation scenario, we show that in networks where congestion frequently occurs the transport layer dominates the self-similarity of single TCP flows over the application layer. Next we focus on the interactions between the transport and network layer. We show that on high packet loss rates the exponential backoff technique of the TCP is responsible for the elevated level of self-similarity while on low packet loss rates, the synchronization between the TCP flows may induce high degree of self-similarity of the aggregated TCP sessions. To support this conjecture on synchronization, we show synchronization is only present when the TCP flows of the the aggregate operate mostly in congestion avoidance mode.
引用
收藏
页码:760 / 763
页数:4
相关论文
共 50 条
  • [21] Self-similarity and Internet performance
    Gopal, D
    Abdulkadir, T
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (02): : 171 - 180
  • [22] Critical behaviors and self-similarity in models of computer network traffic
    Nakayama, A
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2001, 293 (1-2) : 285 - 296
  • [23] Network Traffic Detection Based on Histogram and Self-similarity Matrix
    Yang, Penglin
    Tao, Limin
    Wang, Haitao
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 207 - 209
  • [24] An Intrusion Alarming System Based on Self-Similarity of Network Traffic
    YU Fei 1
    2. Computer and Communication Institute
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 169 - 173
  • [25] Ad hoc wireless network traffic - Self-similarity and forecasting
    Liang, QL
    [J]. IEEE COMMUNICATIONS LETTERS, 2002, 6 (07) : 297 - 299
  • [26] Reduction of self-similarity by application-level traffic shaping
    Christensen, KJ
    Ballingam, V
    [J]. LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 511 - 518
  • [27] Self-similarity control of the aggregate traffic
    Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2007, 30 (05): : 13 - 18
  • [28] A cause of self-similarity in TCP traffic
    Fukuda, K
    Takayasu, M
    Takayasu, H
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2005, 18 (06) : 603 - 617
  • [29] Explaining BitTorrent traffic self-similarity
    Liu, G
    Hu, MZ
    Fang, BX
    Zhang, HL
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 839 - 843
  • [30] Self-similarity of Internet packet delay
    Borella, MS
    Uludag, S
    Brewster, GB
    Sidhu, I
    [J]. ICC'97: 1997 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - TOWARDS THE KNOWLEDGE MILLENNIUM, CONFERENCE RECORD - VOLS 1-3, 1997, : 513 - 517