A Fast Multifractal Model for Self-Similar Traffic Flows in High-Speed Computer Networks

被引:2
|
作者
Millan, G. [2 ]
Lefranc, G. [1 ]
机构
[1] Pontificia Univ Catolica Valparaiso, Av Brasil 2950, Valparaiso, Chile
[2] Univ Santiago Chile, Estn Cent, Santiago, Chile
关键词
High-speed computer networks; Hurst exponent (H); multifractals; self-similarity; traffic modeling;
D O I
10.1016/j.procs.2013.05.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new multifractal model, with the aim of providing a possible explanation for the locality phenomenon that appears in the estimation of the Hurst exponent in stationary second order temporal series representing self-similar traffic flows in current high-speed computer networks. It is shown analytically that this phenomenon occurs if the network flow consists of several components with different Hurst exponents. (C) 2013 The Authors. Published by Elsevier B.V.
引用
收藏
页码:420 / 425
页数:6
相关论文
共 50 条
  • [31] Flows in large, self-similar tree networks and their control
    Franco, Walfre
    Sen, Mihir
    Yang, K. T.
    PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 462 (2074): : 2907 - 2926
  • [32] On multimedia networks: Self-similar traffic and network performance
    Sahinoglu, Z
    Tekinay, S
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (01) : 48 - 52
  • [33] Generation and testing of self-similar traffic in ATM networks
    Prasad, AR
    Stavrov, B
    Schoute, FC
    1996 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS & EXHIBITION - FUTURE ACCESS, 1996, : 200 - 205
  • [34] A Dynamic Burst Assembly Approach for High-Priority and Self-Similar Traffic in High-Speed Optical Burst Switched Network
    Singh, Shamandeep
    Singh, Simranjit
    Kaur, Bikrampal
    Kaur Chahal, Prabhjot
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (07)
  • [35] The Simulation of Malicious Traffic Using Self-similar Traffic Model
    Kolbusz, J.
    Rozycki, P.
    Korniak, J.
    HUMAN-COMPUTER SYSTEMS INTERACTION: BACKGROUNDS AND APPLICATIONS 2, PT 1, 2012, 98 : 327 - 341
  • [36] The Study of Traffic Anomalies Using Self-similar Traffic Model
    Kolbusz, Janusz
    Korniak, Janusz
    Paszczynski, Stanislaw
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 467 - 471
  • [37] The simulation of malicious traffic using self-similar traffic model
    Kolbusz, J.
    Rozycki, P.
    Korniak, J.
    Advances in Intelligent and Soft Computing, 2012, 98 : 327 - 341
  • [38] Fast simulation of general LFSN self-similar network traffic
    Bai Yun
    Yu Li
    Zhu Guangxi
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 416 - 420
  • [39] Network intrusion detection systems in high-speed traffic in computer networks
    Bul'ajoul, Waleed
    James, Anne
    Pannu, Mandeep
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 168 - 175
  • [40] A Study Based on Self-similar Network Traffic Model
    An, Xiaoguang
    Qu, Liangliang
    HuiYan
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 73 - 76