Abstract
We propose a representation of wireless workload patterns as large, sparse matrices and provide a method for stochastically generating experimental workloads from a given matrix. The essential property of the algebraic representation is that the summation of vectors naturally yields a faithful description of the aggregate behavior of the corresponding flows. This deceptively simple property allows us to express many common concepts from traffic modeling succinctly in terms of a few linear transformations. The algebraic representation has many benefits: (1) it makes the meaning of generally understood but vague concepts, such as “uniform behavior,” mathematically precise and unambiguous; (2) it allows us to see clearly, through the lens of linear algebra, the implications of common modeling assumptions; (3) the implementation of traffic models becomes unprecedentedly simple and orthogonal, requiring only a handful of high-level matrix operations, which can be freely composed; (4) the vast body of algebraic theory and highly optimized numerical software may immediately be applied to traffic modeling. We use the paired differential simulation methodology introduced by the authors in previous work to experimentally demonstrate that the general matrix model accurately reproduces realistic network performance (Karpinski et al. 2007a, b). We use the same experimental methodology to explore the implications of various assumptions and simplifications that are commonly made in traffic modeling.





Similar content being viewed by others
Notes
We use the common definition of a flow as a sequence of packets sharing the same “5-tuple”: IP protocol type, source and destination nodes, and TCP/UDP port numbers.
The statistical term “marginal” refers to the margins of actuarial tables formerly used for statistical computations. The rows and columns of the table represent possible values of two properties. Each entry in a table contains a count of the number of events falling into the joint category for that row and column. The margins contain sums of the rows and columns, thus giving the unconditional distributions of each property.
This is violated by some quality of service (QoS) schemes. However, we can simply add QoS metadata—such as traffic classes or urgency flags—to our models of user behavior and the rest of our arguments remain valid. The network is still disinterested in the exact content of the data being transported; only the QoS metadata is relevant.
Even this is unclear: generated traffic is only compared with trace traffic using the very same metrics that are explicitly specified as part of the model. Unsurprisingly, the distributions of sampled metrics closely match the distributions those metrics were sampled from. Realism is not double-checked using other statistical metrics or actual performance metrics.
There are many schemes to correct the discrepancy in bytes when p does not divide b evenly. The simplest is to ignore it; we leave more complex schemes to the reader.
Through out this paper, 1 denotes a matrix of all ones; dimensions of the matrix are inferred by context. Where necessary, we disambiguate the dimensions by explicitly specifying the dimensions of the final matrix product, as we do here.
References
Avallone S, Emma D, Pescap A, Ventre G (2004) A distributed multiplatform architecture for traffic generation. In: International symposium on performance evaluation of computer and telecommunication systems, San Jose, CA, USA, July
Clark D (1988) The design philosophy of the DARPA internet protocols. In: ACM Sigcomm. ACM, New York
Hernández-Campos F (2006) Generation and validation of empirically-derived TCP application workloads. PhD thesis, Univ. of North Carolina, Chapel Hill
Hernández-Campos F, Karaliopoulos M, Papadopouli M, Shen H (2006) Spatio-temporal modeling of traffic workload in a campus WLAN. In: 2nd annual international workshop on wireless internet, Boston, MA, USA, August
Karpinski S, Belding E, Almeroth K (2007a) Towards realistic models of wireless workload. In: 3rd workshop on wireless network neasurements (WinMee), Limassol, Cyprus, April
Karpinski S, Belding E, Almeroth K (2007b) Wireless traffic: the failure of CBR modeling. In: 4th international conference on broadband communications, networks, and systems (Broadnets). Raleigh, NC, USA, September
Lee D, Seung H (2001) Algorithms for non-negative matrix factorization. Adv Neural Inform Process 13:556–562
Paxson V, Floyd S (1995) Wide-area traffic: the failure of poisson modeling. IEEE/ACM Trans Networking 3(3):226–244, June
Perkins C, Belding-Royer E, Das R (2003) Ad hoc on-demand distance vector (AODV) routing. Request for comments (Experimental) 3561, Internet Engineering Task Force, July
Rudin W (1987) Real and complex analysis, 3rd edn. McGraw Hill, New York, NY
Sommers J, Barford P (2004) Self-configuring network traffic generation. In: ACM/USENIX internet measurement conference, Taormina, Sicily, Italy, pp 68–81 October
Weigle M, Adurthi R, Hernández-Campos F, Jeffay K, Smith F (2006) Tmix: a tool for generating tcp application workloads in ns-2. In: ACM/SIGCOMM computer communication review, Pisa, Italy, July
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Karpinski, S., Belding, E.M., Almeroth, K.C. et al. Linear Representation of Network Traffic. Mobile Netw Appl 14, 368–386 (2009). https://doi.org/10.1007/s11036-008-0110-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-008-0110-0