Realistic Network Traffic Profile Generation: Theory and Practice

Published on Feb 18, 2014in Computer and Information Science
· DOI :10.5539/CIS.V7N2P1
Antoine Varet4
Estimated H-index: 4
(École nationale de l'aviation civile),
Nicolas Larrieu11
Estimated H-index: 11
(École nationale de l'aviation civile)
Network engineers and designers need additional tools to generate network traffic in order to test and evaluate application performances or network provisioning for instance. In such a context, traffic characteristics are the very important part of the work. Indeed, it is quite easy to generate traffic but it is more difficult to produce traffic which can exhibit real characteristics such as the ones you can observe in the Internet. With the lack of adequate tools to generate data flows with “realistic behaviors” at the network or transport level, we needed to develop our tool entitled “SourcesOnOff”. The emphasis of this article is on presenting this tool, how we implemented it and which methodology it follows to produce traffic with realistic characteristics. To do so, we chose to consider different stochastic processes in order to model the complexity of the different original traffics we wanted to replay. In our approach, we are able to consider several statistical laws and to combine their effects to model accurately the original behavior we analyzed in the real data. We then select the right parameters to consider as inputs for our SourcesOnOff tool. This approach gives really good traffic characteristics and, consequently, the generated traffic is really closed to reality as results presented at this end of this paper demonstrate it.
📖 Papers frequently viewed together
1 Author (Thorsten Neumann)
1 Citations
Apr 24, 2012 in ICNS (Integrated Communications, Navigation and Surveillance Conference)
#1Antoine Varet (École nationale de l'aviation civile)H-Index: 4
#2Nicolas Larrieu (École nationale de l'aviation civile)H-Index: 11
Aeronautical communications are growing in complexity: avionic systems are more and more connected together through complex networks inside and outside the aircraft. This increase of connections requires highly secure systems to solve the constraints of such network topologies. In this paper, we present the IP based Secure Next Generation Router (SNG router) we have developed, providing regulation, routing, secure merging of different data sources and preserving of their segregation. During the ...
8 CitationsSource
#1Steffen Gebert (University of Würzburg)H-Index: 11
#2Rastin Pries (University of Würzburg)H-Index: 17
Last. K. HeckH-Index: 10
view all 4 authors...
The fast changing application types and their behavior require consecutive measurements of access networks. In this paper, we present the results of a 14-day measurement in an access network connecting 600 users with the Internet. Our application classification reveals a trend back to HTTP traffic, underlines the immense usage of flash videos, and unveils a participant of a Botnet. In addition, flow and user statistics are presented, which resulting traffic models can be used for simulation and ...
67 CitationsSource
#1tcpdumpH-Index: 1
75 Citations
#1Philippe Olivier (Orange S.A.)H-Index: 3
#2N. Benameur (Orange S.A.)H-Index: 1
In this paper we perform a detailed statistical analysis of IP traffic at flow level, based on data traces collected on the France Telecom wide area IP network. We particularly focus on the assessment of assumptions commonly used in flow level performance models, i. e. Poisson flow arrival process, both for UDP and TCP traffic. We first discuss the concept of flow and present a method to estimate an adequate Time Out value to distinguish different flows within a traffic stream. To model the flow...
20 CitationsSource
#1Randall StewartH-Index: 25
#2Qiaobing XieH-Index: 6
Last. Vern PaxsonH-Index: 100
view all 10 authors...
This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.
1,993 Citations
#1Darryl VeitchH-Index: 32
#2Patrice Abry (École normale supérieure de Lyon)H-Index: 50
A joint estimator is presented for the two parameters that define the long-range dependence phenomenon in the simplest case. The estimator is based on the coefficients of a discrete wavelet decomposition, improving a wavelet-based estimator of the scaling parameter (Abry and Veitch 1998), as well as extending it to include the associated power parameter. An important feature is its conceptual and practical simplicity, consisting essentially in measuring the slope and the intercept of a linear fi...
466 CitationsSource
#1Walter Willinger (Bell Labs)H-Index: 73
#2Murad S. Taqqu (BU: Boston University)H-Index: 76
Last. Daniel V. WilsonH-Index: 6
view all 4 authors...
A number of empirical studies of traffic measurements from a variety of working packet networks have demonstrated that actual network traffic is self-similar or long-range dependent in nature-in sharp contrast to commonly made traffic modeling assumptions. We provide a plausible physical explanation for the occurrence of self-similarity in local-area network (LAN) traffic. Our explanation is based on convergence results for processes that exhibit high variability and is supported by detailed sta...
1,537 CitationsSource
#1Will E. LelandH-Index: 9
#2Murad S. Taqqu (BU: Boston University)H-Index: 76
Last. Daniel V. WilsonH-Index: 6
view all 4 authors...
Demonstrates that Ethernet LAN traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks, and that aggregating streams of such traffic typically intensifies the self-similarity ("burstiness") instead of smoothing it. These conclusions are supported by a rigorous statistical analysis of hundreds of millions o...
4,957 CitationsSource
#1Richard A. BeckerH-Index: 17
#2John ChambersH-Index: 58
Last. Allan R. WilksH-Index: 9
view all 3 authors...
631 CitationsSource
#1Richard A. BeckerH-Index: 1
#2John M. ChambersH-Index: 24
Last. Allan R. WilksH-Index: 9
view all 1 authors...
501 Citations
Cited By7
Last. Jun MuraiH-Index: 13
view all 4 authors...
#1Claude Mukatshung Nawej (TUT: Tshwane University of Technology)
#2Pius Adewale Owolawi (TUT: Tshwane University of Technology)H-Index: 11
Last. Tom Walingo (UKZN: University of KwaZulu-Natal)H-Index: 5
view all 3 authors...
Automobiles traffic has increased exponentially around the world, posing serious threats to road users almost everywhere. To mitigate these threats, and make life on the road more viable, Vehicular ad-hoc networks (VANET) technology is emerging as one of the ultimate solutions. However, it was observed that most VANETs work with relativity of the mobile user's movement instead of vehicles movement as required by VANET simulation. Moreover, it seems to be a great challenge to create or obtain rea...
#1Cristopher G. S. Freitas (UFAL: Federal University of Alagoas)H-Index: 1
#2Osvaldo A. Rosso (UFAL: Federal University of Alagoas)H-Index: 53
Last. Andre L. L. Aquino (UFAL: Federal University of Alagoas)H-Index: 14
view all 3 authors...
Network traffic plays a critical role in network planning and control. The researchers assume that traffic from Ethernet and other IP-related networks have a self-similar nature: high-variability and long-term correlations. Many studies try to model these characteristics for simulation and further optimization. One of the most straightforward approaches to model these characteristics is to consider ON/OFF sources (packet-train), where ON- and OFF-periods are i.i.d., generated with random heavy-t...
#1Mahmoud Abdelsalam (UTSA: University of Texas at San Antonio)H-Index: 8
#2Ram Krishnan (UTSA: University of Texas at San Antonio)H-Index: 19
Last. Ravi Sandhu (UTSA: University of Texas at San Antonio)H-Index: 75
view all 3 authors...
Organizations increasingly utilize cloud services such as Infrastructure as a Service (IaaS) where virtualized IT infrastructure are offered on demand by cloud providers. A major challenge for cloud providers is the security of virtual resources provided to its customers. In particular, a key concern is whether, for example, virtual machines (VMs) in the datacenter are performing tasks that are not expected of those machines. Given the scale of datacenters, continuous security monitoring of the ...
19 CitationsSource
#1Shahrudin Awang Nor (UUM: Universiti Utara Malaysia)H-Index: 6
#2Raaid Alubady (UUM: Universiti Utara Malaysia)H-Index: 4
Last. Wisam Abduladeem KamilH-Index: 1
view all 3 authors...
Abstract Forth Generation (4G) network support for wide geographical locations proves its use as a more advanced wireless technology. The Long-Term Evolution (LTE) is a 4G mobile communications standard set by International Communication Union (ITU), specifically ITU Radio communication Sector (ITU-R). At the moment, video traffic and telecommunications grow under the expansion of LTE, which is considered as the actual motivating access technology of 4G network. Throughout the deployment of LTE,...
3 CitationsSource
#1Weiqiang Wu (Beihang University)H-Index: 1
#2Ning Huang (Beihang University)H-Index: 9
Last. Yue Zhang (Beihang University)H-Index: 1
view all 3 authors...
Tactical Internet (TI) is the communication infrastructure of tactical level maneuver warfare forces; its reliability directly affects the military combat. Therefore, in the TI reliability test, how to generate the appropriate network traffic and get the most accurate evaluation results should be an important part of the TI reliability test research. This paper analyzes the characteristics of applications and traffic in TI, and proposes a new hybrid traffic model which can reflect TI mission pro...
Fourth Generation (4G) mobile systems has been used more widely than the older generations 3G and 2G. Among the reasons are that the 4G's transfer rate is higher and it supports all multimedia functions. Besides, its' supports for wide geographical locus makes wireless technology gets more advanced. The essential goal of 4G is to enable voice-based communication being implemented endlessly. This study tries to evaluate if the old protocols suit with this new technology. And which one has the bes...
1 Citations