背景流量生成模型综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Summary of background traffic generation model
  • 作者:方熙 ; 曾剑平 ; 吴承荣
  • 英文作者:FANG Xi;ZENG Jianping;WU Chengrong;School of Computer Science, Fudan University;Engineering Research Center of Cyber Security Auditing and Monitoring of Ministry of Education (Fudan University);
  • 关键词:背景流量模型 ; 流量时间流量模型 ; 空间流量模型 ; 时空流量模型
  • 英文关键词:background traffic model;;temporal traffic model;;spatial traffic model;;spatio-temporal traffic model
  • 中文刊名:JSJY
  • 英文刊名:Journal of Computer Applications
  • 机构:复旦大学计算机科学技术学院;网络信息安全审计与监控教育部工程研究中心(复旦大学);
  • 出版日期:2019-07-20
  • 出版单位:计算机应用
  • 年:2019
  • 期:v.39
  • 基金:国家重点研发计划项目(2017YFB0803203)
  • 语种:中文;
  • 页:JSJY2019S1027
  • 页数:8
  • CN:S1
  • ISSN:51-1307/TP
  • 分类号:129-136
摘要
在网络流量分析中,对网络协议和应用的实验和模拟是最常用的方法,而背景流量模型对于实验和模拟网络协议和应用有着重要的意义和作用。首先,介绍了背景流量模型的背景知识,并且从流量到达离开的时间角度、网络拓扑链路的空间角度以及两者结合的时空角度对背景流量的发展作了简单介绍;然后,按照时间、空间、时空这3个分类阐述了背景流量相关的模型以及近些年的研究进展;最后,分析了现有背景流量模型的优缺点、存在的难点和问题,并展望了背景流量模型研究的未来发展趋势。
        In traffic analysis, experiments and simulations of network protocols and applications are the most common methods, to which background traffic model has important significance.Firstly, the background knowledge of background traffic model was introduced, then the development of background traffic was recommended from the temporal angle of traffic arrival and departure, the spatial angle of network topology link, and the spatio-temporal angle of the combination. Secondly, the models and research progress of background traffic in recent years were expounded and classfified into temporal, spatial, spatial-temporal ones. Finally, the advantages, disadvantages, difficulties and problems of the existing background traffic models were pointed out, and the development trends of the models were also predicted.
引文
[1] VISHWANATH K V,VAHDAT A.Evaluating distributed systems:does background traffic matter?[C]// Proceedings of USENIX 2008 Annual Technical Conference.Berkeley:USENIX Association,2008:227-240.
    [2] 张宾,杨家海,吴建平.Internet流量模型分析与评述[J].软件学报,2011,22(1):115-131.
    [3] LELAND W E,WILLINGER W,TAQQU M S,et al.On the self-similar nature of Ethernet traffic[J].ACM SIGCOMM Computer Communication Review,1995,25(1):202-213.
    [4] 曾剑平,张世永.网络论坛的自相似性及其模型[J].计算机工程,2009,35(6):63-65.
    [5] RIEDI R H,VEHEL J L.Multifractal properties of TCP traffic:a numerical study,RR-3129[R].Le Chesnay Cedex,France:INRIA Rocquencourt,1997.
    [6] SHAH-HEYDARI S,LE-NGOC T.MMPP modeling of aggregated ATM traffic[C]// Proceedings of the 1998 IEEE Canadian Conference on Electrical and Computer Engineering.Piscataway,NJ:IEEE,1998,1:129-132.
    [7] RAJABI A,WONG J W.MMPP characterization of Web application traffic[C]// Proceedings of 2012 IEEE 20th International Conference on Modeling,Analysis and Simulation of Computer and Telecommunication Systems.Piscataway,NJ:IEEE,2012:107-114.
    [8] SHIM C,RYOO I,LEE J,et al.Modeling and call admission control algorithm of variable bit rate video in ATM networks[J].IEEE Journal on Selected Areas in Communications,1994,12(2):332-344.
    [9] KOHN R,ANSLEY C F.Estimation,prediction,and interpolation for ARIMA models with missing data[J].Journal of the American Statistical Association,1986,81(395):751-761.
    [10] PAXSON V,FLOYD S.Wide area traffic:the failure of Poisson modeling[J].IEEE/ACM Transactions on Networking,1995,3(3):226-244.
    [11] GAO J,HU J,MIN G,et al.Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic[J].Concurrency and Computation:Practice and Experience,2013,25(1):85-93.
    [12] KRUNZ M M,MAKOWSKI A M.Modeling video traffic using M/G/∞ input processes:a compromise between Markovian and LRD models[J].IEEE Journal on Selected Areas in Communications,2015,16(5):733-748.
    [13] LIU X,OH Y S,RYU S K,et al.Bandwidth configuration for fractional Brownian motion traffic[C]// Proceedings of the 7th International ICST Conference on Communications and Networking in China.Washington,DC:IEEE Computer Society,2012:7-11.
    [14] DETHE C G,WAKDE D G.On the prediction of packet process in network traffic using FARIMA time-series model[J].Journal of the Indian Institute of Science,2013,84(1/2):31-39.
    [15] 丛锁,韩良秀,刘岩,等.基于离散小波变换的网络流量多重分形模型[J].通信学报,2003,24(5):43-48.
    [16] BARFORD P,CROVELLA M.Generating representative Web workloads for network and server performance evaluation[C]// Proceedings of 1998 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems.New York:ACM;1998:151-160.
    [17] WALDMANN S,MILLER K,WOLISZ A.Traffic model for HTTP-based adaptive streaming[C]// Proceedings of the 2017 IEEE Conference on Computer Communications Workshops.Piscataway,NJ:IEEE,2017:683-688.
    [18] SOMMERS J,BARFORD P.Self-configuring network traffic generation[C]// Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement.New York:ACM,2004:68-81.
    [19] VISHWANATH K V,VAHDAT A.Realistic and responsive network traffic generation[J].ACM SIGCOMM Computer Communication Review—Proceedings of the 2006 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications,2006,36(4):111-122.
    [20] WEIGLE M C,ADURTHI P,HERNáNDEZ-CAMPOS F,et al.Tmix:a tool for generating realistic TCP application workloads in ns-2[J].ACM SIGCOMM Computer Communication Review,2006,36(3):65-76.
    [21] BARTLETT G,MIRKOVIC J.Expressing different traffic models using the LegoTG framework[C]// Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops.Piscataway,NJ:IEEE,2015:56-63.
    [22] NICOL D M,YAN G.Discrete event fluid modeling of background TCP traffic[J].ACM Transactions on Modeling and Computer Simulation,2004,14(3):211-250.
    [23] QIAN Y,GUAN X,JIANG M,et al.Modeling and generating realistic background traffic by hybrid approach[J].China Communications,2015,12(10):147-157.
    [24] ZHANG Y,ROUGHAN M,DUFFIELD N,et al.Fast accurate computation of large-scale IP traffic matrices from link loads[J].ACM SIGMETRICS Performance Evaluation Review,2003,31(1):206-217.
    [25] ZHANG Y,ROUGHAN M,LUND C,et al.An information-theoretic approach to traffic matrix estimation[C]// Proceedings of the 2003 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.New York:ACM,2003:301-312.
    [26] ZHANG Y,ROUGHAN M,LUND C,et al.Estimating point-to-point and point-to-multipoint traffic matrices:an information-theoretic approach[J].IEEE/ACM Transactions on Networking,2005,13(5):947-960.
    [27] MEDINA A,TAFT N,SALAMATIAN K,et al.Traffic matrix estimation:existing techniques and new directions[C]// Proceedings of the 2002 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.New York:ACM,2002:161-174.
    [28] ERRAMILL V,CROVELLA M,TAFT N.An independent-connection model for traffic matrices[C]// Proceedings of the 6th ACM SIGCOMM 2006 Conference on Internet Measurement.New York:ACM,2006:251-256.
    [29] BHARTI V,KANKAR P,SETIA L,et al.Inferring invisible traffic[C]// Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies (CoNEXT).New York:ACM,2010:Article No.22.
    [30] ROUGHAN M,GREENBERG A,KALMANEK C,et al.Experience in measuring internet backbone traffic variability:models metrics,measurements and meaning[C]// Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement.New York:ACM,2002:91-92.
    [31] ZHANG Y,ROUGHAN M,WILLINGER W,et al.Spatio-temporal compressive sensing and Internet traffic matrices[C]// Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication.New York:ACM,2009:267-278.
    [32] SOMMERS J,BOWDEN R,ERIKSSON B,et al.Efficient net-work-wide flow record generation[C]// Proceedings of 2011 IEEE INFOCOM.Piscataway,NJ:IEEE,2011:2363-2371.
    [33] LI T,LIU J.Cluster-based spatiotemporal background traffic generation for network simulation[J].ACM Transactions on Modeling and Computer Simulation,2014,25(1):Article No.4。

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700