skip to main content
10.1145/1731740.1731799acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

Algorithm for modeling self-similar ethernet traffic

Published: 18 June 2009 Publication History

Abstract

This paper is presented and analysed an algorithm for modeling self-similar Ethernet traffic, based on the fractional Gaussian noise (FGN) and wavelet transformation. The algorithm uses a second-order approximation for calculation of the power spectrum of FGN and Daubeshies wavelets. It is investigated in terms of the accuracy of Hurst parameter by using the wavelet-based statistical estimator. The simulated self-similar Ethernet traffic is compared with actual Ethernet traffic. The obtained results show that the algorithm for modeling of self-similar Ethernet traffic is with high degree of accuracy and it can be used in practical computer simulation studies.

References

[1]
Beran, J., R. Sherman. "Long-range dependence in variable-bit-rate video traffic". IEEE Transactions on Communications, vol. 43, 1995.
[2]
Gospodinov, M., E. Gospodinova. "Generator of fractional Gaussian noise for modeling self-similar network traffic", CompSysTech'2005.
[3]
Gospodinov, M., E. Gospodinova. "The graphical methods for estimating Hurst parameter of self-similar network traffic", CompSysTech'2005.
[4]
Ledesma, S., D. Liu. "Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic". Computer communication, vol. 30, 2000.
[5]
Paxson, V. "Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic". ACM SIGCOMM, 1997.
[6]
Veitch, D., P. Arby. "A wavelet based joint estimator of the parameters of long-range dependence". IEEE Transactions on Information Theory 45, 1999.
[7]
Willinger, W., M. S. Taqqu. "Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level". IEEE/ACM Transactions on Networking, vol. 5, 1993.
[8]
Xue, F., S. Yao. "Self-similar traffic shaping at the edge router in optical packet-switched networks", Proc. IEEE ICC 2002, New York, 2002.
[9]
ftp://ita.ee.lbl.gov/traces/BC-pAug89.TL.Z.

Cited By

View all
  • (2013)Implementing port security feature using SNMP protocolProceedings of the 14th International Conference on Computer Systems and Technologies10.1145/2516775.2516798(38-45)Online publication date: 28-Jun-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CompSysTech '09: Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
June 2009
653 pages
ISBN:9781605589862
DOI:10.1145/1731740
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Ethernet traffic
  2. Hurst parameter
  3. fractional Gaussian noise
  4. long-range dependence
  5. self-similar traffic
  6. wavelet transformation
  7. wavelet-based estimator

Qualifiers

  • Research-article

Conference

CompSysTech '09

Acceptance Rates

Overall Acceptance Rate 241 of 492 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Implementing port security feature using SNMP protocolProceedings of the 14th International Conference on Computer Systems and Technologies10.1145/2516775.2516798(38-45)Online publication date: 28-Jun-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media