Learn More
Abstrac(We demonstrate that Ethernet LAN traffic is statistically se~-simi/ar, that none of the commonly used traffic models is able to capture this fra([al-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks, and that aggregating streams of such traffic typically intensifies(More)
A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is <i>self-similar</i> or <i>long-range dependent</i> in nature (i.e., bursty over a wide range of time scales) - in sharp contrast to commonly made traffic modeling assumptions. In this paper, we(More)
We demonstrate that Ethernet local area network (LAN) traffic is statistically <i>self-similar,</i> that none of the commonly used traffic models is able to capture this fractal behavior, and that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks. Intuitively, the critical characteristic of this(More)
We present a detailed statistical analysis of a 2-hour long empirical sample of VBR video. The sample was obtained by applying a simple intraframe video compression code to an action movie. The main findings of our analysis are (1) the tail behavior of the marginal bandwidth distribution can be accurately described using &#8220;heavy-tailed&#8221;(More)
We state and prove the following key mathematical result in self-similar traffic modeling: the superposition of many <i>ON/OFF</i> sources (also known as <i>packet trains</i>) with strictly alternating <i>ON</i>- and <i>OFF</i>-periods and whose <i>ON</i>-periods or <i>OFF</i>-periods exhibit the <i>Noah Effect</i> (i.e., have high variability or infinite(More)
Critical network management applications increasingly demand fine-grained flow level measurements. However , current flow monitoring solutions are inadequate for many of these applications. In this paper, we present the design, implementation, and evaluation of CSAMP, a system-wide approach for flow monitoring. The design of CSAMP derives from three key(More)
A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. Previous studies of topology(More)
— In a recent paper, Faloutsos et al. [1] found that the inter Autonomous System (AS) topology exhibits a power-law vertex degree distribution. This result was quite unexpected in the networking community and stirred significant interest in exploring the possible causes of this phenomenon. The work of Barabasi and Albert [2] and its application to network(More)