Learn More
Abstrac(We demonstrate that Ethernet LAN traffic is statistically se~-simi/ar, that none of the commonly used traffic models is able to capture this fra([al-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks, and that aggregating streams of such traffic typically intensifies(More)
A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is <i>self-similar</i> or <i>long-range dependent</i> in nature (i.e., bursty over a wide range of time scales) - in sharp contrast to commonly made traffic modeling assumptions. In this paper, we(More)
We demonstrate that Ethernet local area network (LAN) traffic is statistically <i>self-similar,</i> that none of the commonly used traffic models is able to capture this fractal behavior, and that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks. Intuitively, the critical characteristic of this(More)
We present a detailed statistical analysis of a 2-hour long empirical sample of VBR video. The sample was obtained by applying a simple intraframe video compression code to an action movie. The main findings of our analysis are (1) the tail behavior of the marginal bandwidth distribution can be accurately described using &#8220;heavy-tailed&#8221;(More)
We state and prove the following key mathematical result in self-similar traffic modeling: the superposition of many <i>ON/OFF</i> sources (also known as <i>packet trains</i>) with strictly alternating <i>ON</i>- and <i>OFF</i>-periods and whose <i>ON</i>-periods or <i>OFF</i>-periods exhibit the <i>Noah Effect</i> (i.e., have high variability or infinite(More)
Critical network management applications increasingly demand fine-grained flow level measurements. However , current flow monitoring solutions are inadequate for many of these applications. In this paper, we present the design, implementation, and evaluation of CSAMP, a system-wide approach for flow monitoring. The design of CSAMP derives from three key(More)
A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. Previous studies of topology(More)
Following the long-held belief that the Internet is hierarchical, the network topology generators most widely used by the Internet research community, Transit-Stub and Tiers, create networks with a deliberately hierarchical structure. However, in 1999 a seminal paper by Faloutsos et al. revealed that the Internet's degree distribution is a power-law.(More)