SlideShare une entreprise Scribd logo
1  sur  15
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
DOI : 10.5121/ijcnc.2013.5302 17
PROBABILITY DENSITY FUNCTIONS OF THE
PACKET LENGTH FOR COMPUTER NETWORKS
WITH BIMODAL TRAFFIC
Ewerton R. S. Castro1
, Marcelo S. Alencar2
and Iguatemi E. Fonseca3
1
Federal Institute of Paraíba, Patos, Brazil
ewerton.castro@ifpb.edu.br
2
Federal University of Campina Grande, Iecom, DEE, Brazil
malencar@dee.ufcg.edu.br
3
Federal University of of Paraíba, Brazil
iguatemi@ci.ufpb.br
ABSTRACT
The research on Internet traffic classification and identification, with application on prevention of attacks
and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of
the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their
probability density functions, are popular. This paper presents a new statistical modeling for packet length,
which shows that it can be modeled using a probability density function that involves a normal or a beta
distribution, according to the traffic generated by the users. The proposed functions has parameters that
depend on the type of traffic and can be used as part of an Internet traffic classification and identification
strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well
as to generate synthetic traffic and estimate the packets processing capacity of Internet routers
KEYWORDS
Packet-switching networks, Measurement, Modeling, Statistical methods & Packet length.
1. INTRODUCTION
The evolution of the Internet in the last few years has been characterized by changes in the way
users behave, interact and utilize the network. The availability of broadband connections,
particularly those based on cable TV and ADSL technologies, and new applications and dynamics
of the Internet traffic, such as P2P applications and video sharing, have caused changes in various
network management activities, such as capacity planning and provisioning, traffic engineering,
application performance, anomaly detection and pricing. The correct identification of user
applications may give valuable information for network operators to develop new traffic
engineering policies and for providers to offer services based on user demand. Diagnosing
anomalies is critical for both network operators and end users in terms of data security and
service availability. Anomalies, such as the ones produced by worms or Denial of Service (DoS)
attacks, may have unexpected behavior and may cause significant changes in the network traffic.
Besides that, knowledge of the applications used by the subscribers may be of interest for
application-based accounting and charging or even for the Internet Service Provider (ISP) to offer
new products [1]-[6].
Characterization of Internet traffic is an important issue for telecommunications networks [7].
The literature presents several traffic identification techniques, and those using packet length
(size) are important strategies [1]-[24]. The research usually involves experimental measurements
[13],[14],[17]-[23], because this information can be used to design and estimate the network
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
18
infrastructure and application attributes. Li Bo, for example, indicates that the packet size (or
length) distribution can be used to identify many Transport Control Protocol (TCP) applications
[18]. Alfonso Iacovazzi reports that statistical traffic classification is possible based on some
features of the Internet Protocol (IP) flow and that the packet length is a key feature to classify the
application level content of a packet flow and that this classification can be useful for security
policies, traffic filtering and support to the quality of service mechanisms [7]. Mushtaq mentioned
that the probability density function and the cumulative distribution function can be used to
design, control, manage, interpolate and extrapolate the network traffic. It enables to develop
professional simulators and fast, efficient and robust algorithms for the optimization of computer
and communication systems, along with applications [22].
Therefore, the analysis and characterization of those parameters is important to design new
methods for traffic identification and classification. Traffic classification based on packet length
was attempted by some authors in recent papers [1]-[5]. The main contribution of this paper is to
propose a new probability density function for the packet length which can be used to identify
and classify the Internet traffic. This paper also summarizes results from the literature on packet
size distribution. Using these results, mathematical models for the packet distribution are
presented and compared with actual measurements of packet size. The analysis of the results
suggests that the model can be used to estimate the distribution of packet traffic in computer
networks. Besides, this investigation shows that it is possible to relate parameters of the proposed
distribution function with the traffic type or network application.
The remaining of the paper is organized as follows. Section 2 presents mathematical models to
estimate the length distribution of the packets. Section 3 compares the measured values with the
proposed mathematical models. Section 4 shows a summary of applications. Section 5 presents
the conclusions of the paper.
2. MATHEMATICAL MODELS
The usual configuration for a Local Area Network (LAN) with Internet access is shown in Figure
1. Using this configuration some mathematical models for the packet length in computer
networks can be derived.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
19
Figure 1. Packet aggregation by the network server
The packet length was measured between the network server and the Internet connection, as
illustrated in Figure 1, to obtain the packet length relative frequency distribution. The results are
discussed in Section 3 and show that the packet length has a bimodal traffic distribution. Similar
results are found in [13]-[23]. Using the measured values, one can derive two equations to
describe this bimodal traffic distribution, which can be obtained using a mathematical procedure
presented in this paper. In the absence of a priori information, the Uniform (Figure 1a) is usually
considered for the packet length generated by the computers (users). The Normal (Figure 1b) and
Beta (Figure 1c) distributions are considered when additional information can be obtained. The
discussion and mathematical analysis are presented in the Section 2.1, for the Uniform and the
Normal distribution, and in the Section 2.2 for the Beta distribution.
2.1. Model based on the Normal distribution
Consider that the traffic produced by a computer (user) presents, originally, a uniform distribution
(Figure 1a) for the packet length, as shown in Figure 2a. When the data traffic flows through the
aggregation point (router, gateway or server) it suffers a non-linear transformation (Figure 1d),
which produces a bimodal distribution [13]-[23] (Figure 1f). Figure 2b shows this non-linear
transformation at the aggregation point, which generates the bimodal distribution (Figure 2c), in
accordance with the published results.
However, considering that the packets are produced by several computers one can invoke the
Central Limit Theorem, and infer that the aggregate traffic has a Gaussian distribution (Figure
1b), as shown in Figure 3a [27]. Therefore, when the data traffic flows through the aggregation
point, it suffers a non-linear transformation (Figure 1e) and the network servers group the packets
(bytes) according to the adopted protocol (IP, ICMP, TCP or UDP), as depicted in Figure 1, and
this produces a non-uniform distribution for the packet size, as shown in Figure 3c (or Figure 1f).
The probability density function transformation (illustrated in Figure 3b), at the aggregation point
can be obtained using
ℓ=
cos x+M
2 (1)
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
20
in which, M is the normalized MTU (1500 bytes/1500 bytes), ℓ is the output that represents the
packet length (size) and it is function of the x, the input random variable. This is the traffic
generated by the user and it is not known previously. Equation (1) is responsible for the non-
linear transformation that appears in the following.
Rewriting x as a function of ℓ, gives
M)(=x ℓ2arccos (2)
in which ℓ is the non-linear transformation used in Figure 3b and
2
ℓ21
2
1ℓ
ℓ
M)(
(x)p
=
dx
d
(x)p
=)(p LL
N





(3)
in which )(pN ℓ is the probability density function of a packet length after the aggregation point
[27].
Considering that the traffic produced by a single computer presents a Normal distribution for the
packet length, then
Figure 2. Non-linear transformation of probability density function. (a) Uniform distribution, (b) Non-
linear transformation and (c) Probability density function.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
21
Figure 3. Non-linear transformation of probability density function. (a) Normal distribution. (b) Non-
linear transformation and (c) Probability density function.
2
2
2σ
2
1
m)(x
e
σ
=(x)pL


(4)
in which, x is given by Equation (2), E[x]=m is the mean and σ2
is the variance.
Using equations (3) and (4) with m=0, the following equation is proposed to model the network
traffic distribution
2
2
2
ℓ21
2σ
ℓ2arccos
2π
2
ℓ
M)(
M))((
e
σ
=)(pN



(5)
in which, )(pN ℓ is the probability density function of the packet length at the output of the
aggregation point, ℓ and σ are parameters of the distribution function related to the traffic type.
Notice that σ2
is the variance of the Normal distribution, which is related with the traffic
generated by the computers [27]. This is an important parameter and, as seen in the Section 5,
may be associated with the type of traffic in the network. Paper [27] presents the comparison
between )(pN ℓ and experimental measurements.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
22
2.2. Model based on the Beta distribution
The Normal distribution (Figure 3a) is useful, but has a long tail which does not properly adjust to
the limited range of packet length defined by the Internet transport protocols.
The Beta distribution provides better approximations, that match the practical results, considering
that the limited range of the random packets, Figure 4a, and Figure 1c. This leads, after the non-
linear transformation (Figure 1e or Figure 4b ), to the new model discussed in the following,
originally proposed by Castro et al [28]. The initial conditions to derive the mathematical packet
length model, to obtain the probability density function presented in Figure 4, are:
 Consider that x is a random variable, with 0≤ x≤ 1 ;
 The minimum and maximum normalized packet length are Lm and LM defined by:
10 <Lm (6)
e 10 <LM , Lm<LM (7)
the parameters are the ratio between the minimum (maximum) packet length, in terms of bits or
bytes that can be sent through a network interface, and N Max . N Max is the maximum number
of bits or bytes that can be send through a network interface in a time interval t.
Definition 1: consider that ℓ(x), or simply ℓ, is the random variable that represents the normalized
packet length sent through a network interface in a time interval t, and that it is possible to
express ℓ by

















 
 1cos
2
ℓ +
n
πxLL
L= mM
M , Nn (8)
and from Equation (8), one can obtain the random variable x as a function of the packet length ℓ














1
ℓ
2arccos
1
mM
M
LL
L
π
=x (9)
Equation (8) or (9), presented in Figure 4b, represent the non-linear transformation of the Beta
distribution and that transformation gives the bimodal distribution illustrated in Figure 4c [13]-
[23] illustrated in Figure 4c. This equation is obtained from Equation (1) [27] after some
simulations and curve fitting [26].
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
23
Figure 4. Aggregated packet length non-uniform distribution. (a) Beta distribution B(2,2), (b)
Non-linear transformation and (c) Probability density function.
Initially, the possibility of obtaining a consistent probability density function using curve fitting
by software, as for example Matlab, was investigated. A few models were obtained, but they had
several tuning parameters (the minimum number was four parameters, and the approximation was
poor). With this number of parameters is it difficult to associate each of them with the use of the
probability density function in methods for traffic identification or classification. Therefore, the
mathematical approach was preferred.
For the Ethernet network standard the Maximum Traffic Unit (MTU) is N Max = 1500 bytes.
The maximum packet length that can be sent through a network interface is 1492 bytes, because
eight bytes are used in the LLC header [25]. This gives 0.9946
1500
1492






=LM , but for
computation purposes one considers 0.994
1500
1491
==LM 





. The minimum packet length is 28
bytes (20 bytes for the IP header + 8 bytes used in the LLC header), that can be sent through a
network interface, this means 0.0186
1500
28






=Lm or 0.018
1500
27
==Lm 





for
computation purposes. Other values for Lm are also possible depending on how the protocols
are combined.
The following formula, obtained from the non-linear transformation (8), with the bimodal traffic
distribution, is proposed to model the packet length probability density function after the
aggregation point.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
24
 
   
11
22
1
ℓ
2arccos
1
1.1
ℓ
2arccos
1
.
2
ℓ
2
1
ℓ





































































 
β
mM
M
α
mM
M
mMmM
B
LL
L
πLL
L
π
βΓαΓ
β+αΓ
L+LLL
π
=)(p
(10)
ou
 
 
   
11
2221
1.
1
.
1
ℓ 







βα
B x)((x)
βΓαΓ
β+αΓ
βα,BAAπ
=)(p (11)
in which, x is given by (9), 




 
2
1
mM LL
=A is the midpoint of the interval,













2
ℓ2
mM L+L
=A is the mean, B(.) is the Beta function, .Γ is the Gama function, ℓ is a
random variable that represents the packet length (or size) after the aggregation point, pB ℓ is
the probability density function of a packet length ℓ obtain from the Beta distribution, α nd β are
parameters of the distribution function related to the traffic type, LM is the maximum packet
length, Lm is the minimum packet length, 0>Lm , 0>LM and Lm<ℓ<LM .
The cumulative distribution function of the packet length is
β)(ααI=)(P xL ℓ (12)
is modeled as a regularized incomplete Beta function, in which, 00 =β)(ααI , 11 =β)(ααI and
y=x(ℓ ) is given by














1
ℓ
2arccos
mM
M
LL
L
π
n
=x (13)
One can obtain Equation (13) as a function of the packet length ℓ, given by Equation (8), with
n=1.
3. Comparison Results
This section shows a comparison between the proposed models and some measurements. The
measurements are obtained from: backbones with different bit rates [20], [21], ISP with Wi-Fi
access [14], data traffic between cities (Chicago and Seattle) [21], and measurements made by the
authors [27]-[30].
The proposed probability density function is compared with measurements presented in several
articles [14]-[16], [20], [21], which were obtained from different networks scenarios, as, for
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
25
example, backbones with different bit rates [20], [21], ISP with Wi-Fi access [14], and data traffic
between cities (Chicago and Seattle) [21].
3.1 Tafvelin measurements
A comparison between the measurements found in the literature and results obtained from the
proposed models for the cumulative distribution function of the packet length is shown in the
following figures and tables.
Figure 5. Tafvelin [15] measurements versus )(PB ℓ function and other cumulative distributions.
Table 1. Tafvelin [15] measurements versus, )(PB ℓ and other cumulative distributions.
Dist. Par.1 Par.2 SSE RMSE RS ARS
Exp λ = 1.6 - 0.59 0.21 0.17 0.17
Log μ = 4e−13 σ = 7.0 0.54 0.19 0.24 0.24
Par α = 0.18 β = 0.003 0.03 0.05 0.87 0.86
Wei α = 0.26 β = 0.79 0.02 0.05 0.89 0.88
PB ℓ α = 0.089 β = 0.097 0.01 0.03 0.97 0.97
The dashed lines are the cumulative measurements obtained from the literature [13]-[15],[20],
[21]. The continuous lines are the cumulative measurements obtained from the CDF model,
)(PB ℓ, adjusted by the least squares method to find the best value for the parameters α and β,
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
26
considering α, β > 0. The adjusted curve )(PB ℓ is plotted along with measured data found in the
literature. The other lines are the Exponential, Log-normal, Pareto and Weibull distributions.
The metrics Sum of Squares due to Error (SSE), Root Mean Square Error (RMSE), R-square
(RS) and Adjusted R-square (ARS) were used to compute the difference between the analytic and
experimental data. SSE and RMSE values close to zero indicate that the model has a small error
component. RS is the square of the correlation between the response and the predicted response
values. RS can take any value between 0 and 1, a value closer to 1 indicates that a large
proportion of variance is accounted by the model. The ARS statistics can take on any value less
than or equal to 1, a value closer to 1 indicates a better fit [26].
Tafvelin et al [15], collected data during 20 consecutive days, in April 2006, for a bidirectional
traffic on an OC-192 backbone link (10 Gbit/s bit rate). For this link, the author used optical
splitters attached to two Endace DAG6 2SE cards. The dashed bold line in Figure 5 illustrates the
cumulative distribution of IPv4 packet lengths. Table 1 and Figure 5 summarize the comparison
between Tafvelin measurements, )(PB ℓ and other distributions.
As one can see in Figure 5, the CDF model, )(PB ℓ, is the nearest curve of the dashed line,
cumulative measurements obtained from Tafvelin et al [15]. This result is confirmed by Table 1
results. SSE and RMSE is very close to zero, the best theoric value is zero. For RS and ARS, the
best value is one. In this comparison we obtain 0.97 for both (SSE and RMSE). The numeric and
graphically results for )(PB ℓ model presents very good results. For this comparison, the second
best results are presented by Weibull distribution. In both, α and β are the distribuition parameters
adjusted using the Matlab fitting tool [26].
A important point to be noted is the presence of two jumps. The first, near zero, and the second
near 1500 (MTU). These two points of rapid growth is present in the collected values, but the
Exponential, Log-Normal, Pareto and Weibull distribuitions can not capture both. Only the first
one, near zero. This not happen in the proposed model.
3.2 Rastin measurements
The paper by Rastin Pries [14] presents measurements taken from an ISP switching center
providing access to 250 households. The customers access the wireless LAN from several access
points, and then the traffic is multiplexed using an IEEE 802.11a radio link. A comparison
between Pries measurements, )(PB ℓ and other distributions is summarized in Table 10 and
Figure 12.
Table 2. Rastin [14] measurements versus, )(PB ℓ and other cumulative distributions.
Dist. Par.1 Par.2 SSE RMSE RS ARS
Exp λ = 5.65 - 0.85 0.22 - -
Log μ = 4e−10 σ = 10 1,36 0.27 - -
Par α = 0.36 β = 0.01 0.27 0.13 0.66 0.64
Wei α = 0.24 β = 0.18 0.09 0.08 0.65 0.63
PB ℓ α = 0.086 β = 0.18 0.03 0.05 0.9 0.89
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
27
Figure 6. Rastin [14] measurements versus )(PB ℓ function and other cumulative distributions.
The Exponential distribution, with λ distribuition parameter, presents the worst results in
comparsion with Rastin Pries [14] measurements. In Figure 6, the Exponential distribuition is far
from the measured values and in Table 2, the SSE and RSME is very distant from zero. For RS
and ARS, Matlab fitting tool [26] can not obtain any value. The Log-normal distribuition has
same results, μ and σ are the distribuition parameters adjusted using the Matlab fitting tool [26].
The difference is that Exponential is very far for up values and Log-normal is very far for down
values. This results confirm that Exponential distribution can not modeled computers packts
traffic.
3.3 CAIDA measurements
The comparison shown in Figure 7 is from the Cooperative Association for Internet Data
Analysis (CAIDA), the measurements were taken from an OC-192 IP backbone link, in march
2008, a link between Chicago and Seattle [21]. Figure 7 and Table 3 summarize the comparison
between the CAIDA measurements, )(PB ℓ and other distributions. The comparison results show
a good fit between the measured values and the )(PB ℓ curve.
The Pareto and Weibull distributions, both with α and β parameters adjusted using the Matlab
fitting tool [26], presents better results than Exponential and Log-Normal distribution in
comparsion with CAIDA [21] measurements. In Figure 7, the Pareto and Weibull distributions
are very near between then and both have a small distance from the dash-line. In Table3, values
of SSE and RSME are small and near zero as expected. For RS and ARS values are near 1.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
28
Table 3. CAIDA [21] measurements versus, )(PB ℓ and other cumulative distributions.
Dist. Par.1 Par.2 SSE RMSE RS ARS
Exp λ = 2.03 - 0.82 0.21 0.03 0.03
Log μ = 3e−12 σ = 9.28 0.79 0.20 0.06 0.06
Par α = 0.21 β = 0.004 0.08 0.07 0.76 0.75
Wei α = 0.29 β = 0.55 0.07 0.06 0.79 0.79
PB ℓ α = 0.10 β = 0.13 0.03 0.04 0.95 0.94
Figure 7. CAIDA [21] measurements versus )(PB ℓ function and other cumulative distributions.
3.4 Sprint measurements
The Sprint (Sprint Academic Research Group) measurements were collected, in February 2004,
from the San Jose 84 Mbit/s IP backbone link [20]. Sprint measurements, )(PB ℓ and other
distributions are summarized in Figure 8 and Table 4. The first Sprint set of measurements
indicates that )(PB ℓ has better results then other cumulative distributions.
For Sprint measurements [20], Exponential and Log-Normal distributions are far from the
measured values, as presented in Figure 8 and in Table 4. Pareto and Weibull distributions are
better. These explain why both are used in computers traffic-analysis. But for this comparison,
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
29
using the proposed model )(PB ℓ , the results is improved and this new distribution can be used
to modeled computers packts traffic.
Table 4. Sprint [20] measurements versus, )(PB ℓ and other cumulative distributions.
Dist. Par.1 Par.2 SSE RMSE RS ARS
Exp Λ = 3.3 - 0.84 0.19 0.14 0.14
Log μ=1.5e−10 σ =23.2 1.45 0.26 - -
Par α = 0.29 β = 0.006 0.05 0.05 0.87 0.86
Wei α = 0.32 β = 0.24 0.05 0.05 0.88 0.88
PB ℓ α = 0.11 β = 0.21 0.04 0.04 0.92 0.92
Figure 8. Sprint [20] measurements versus )(PB ℓ function and other cumulative distributions.
4. Conclusion
The analysis of the results suggests that the models can be used to estimate the distribution of
packet traffic on computer networks. This important information can be used as part of a strategy
of traffic identification, application level traffic classification and performance measurement of
the routers. Future work in this direction is expected. Besides, the numerical results show that
)(PB ℓ has a good fitting and that it performs better then the Exponential, Log-normal, Pareto or
Weibull distributions, for bimodal traffic. This result is important because one of these
distributions may be used in network traffic simulators.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
30
Two different equations were also obtained to model the packet length probability density
function using the Matlab fitting tool [26]. The equations use a sum of two Exponential two
Normal distributions. The disadvantage is that, with the Exponential, four parameters are needed
to adjust, and the use of Normal distribution implies six parameters to adjust. In both cases, the
results are better then )(pB ℓ, but the increase in the number of parameters, makes it more
difficult to associate the measured parameters and the variables present in the computer network
traffic.
Some new possible application for the proposed cumulative distributions are improve the metrics
for measuring the performance of routers, strategy to be used in the characterization of Internet
traffic and help to discover denial-of-service (DoS) attacks characteristics. In papers [27] and
[28], some preliminary results and models are presented.
It was also found that many of the measurements made on 10 Gbit/s (OC-192) links made by
[15], [21], [20] and for the access network by [14] used cumulative packet length data. Thus, this
paper also presented a cumulative distribution to compare the measured data with the proposed
model.
As suggestions for future work, it is possible to perform more measurements of packet lengths in
the network layer for other specific applications (Skype, games on-line, etc) to classify the traffic
based on the values of α and β of the new proposed distribution. The traffic classification, based
on the packet lengths has already been done by some other authors in recent papers [1]--[5].
REFERENCES
[1] Jaber, M. and Cascella, R. G. and Barakat, C., Using host profiling to refine statistical application
identification, Proceedings of the IEEE INFOCOM 2012, 2746--2750, 2012.
[2] Rocha, E. and Salvador, P. and Nogueira, A., Detection of Illicit Network Activities based on
Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics, Proceedings of the IEEE ICC 2011, 1--
6, 2011.
[3] Jaber, M. and Cascella, R. G. and Barakat, C., Can we trust the inter-packet time for traffic
classification?, Proceedings of the IEEE ICC 2011, 1--5, 2011.
[4] Dainotti, A. and Pescape, A. and Kim, Hyun-chul, Traffic Classification through Joint Distributions of
Packet-level Statistics, Proceedings of the IEEE GLOBECOM 2011, 1--6, 2011.
[5] Wen Zhang, Peer-to-Peer Traffic Anti-identification Based on Packet Size, Proceedings of the IEEE
International Conference on Computer Science and Network Technology 2011, 2277--2280, 2011.
[6] Callado, A. and Kamienski, C. and Szabo, G. and Gero, B. and Kelner, J. and Fernandes, S. and Sadok,
D., A Survey on rm{I}nternet Traffic Identification, IEEE Communications Surveys Tutorials, 11, 37--52,
2009.
[7] Alfonso Iacovazzi and Andrea Baiocchi, Optimum packet length masking, 22nd International
Teletraffic Congress (ITC), 2010, Amsterdam, The Netherlands, 7-9, September, 2010.
[8] Thomas Karagiannis and Andre Broibo and Nevil Brownlee and K. C. Claffy and Michalis Faloutsos,
File-sharing in the Internet: A characterization of P2P traffic in the backbone, University of California,
Riverside, USA, CA 92521, Tech. Rep., November, 2003.
[9] F. Liu and Z. Li and J. Yu, P2P Applications Identification Based On the Statistics Analysis of Packet
Length, IEEE International Symposium on Information Engineering and Electronic Commerce, 160--163,
2009.
[10] D. Pan and Y. Yang, Localized Independent Packet Scheduling for Buffered Crossbar Switches, IEEE
Transactions on Computers, 58, 260--274, February, 2009.
[11] Z. Cucej and M. Fras, Data Source Statistics Modeling based on Measured Packet Traffic: A Case
Study of Protocol Algorithm and Analytical Transformation Approach, IEEE International Conference on
Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2009, 54--64, 2009.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
31
[12] N. Duffield and C. Lund and M. Thorup, Learn More, Sample Less: Control of Volume and Variance
in Network Measurement, IEEE Transactions on Information Theory, 51, 1756--1775, May, 2005.
[13] Cheng Yu and V. Ravindran and A. Leon-Garcia, Internet Traffic Characterization Using Packet-Pair
Probing, 26th IEEE International Conference on Computer Communications. INFOCOM 2007, 1766--
1774, 2007.
[14] Rastin Pries and F. Wamser and D. Staehle and P. Tran-Gia, Traffic Measurement and Analysis of a
Broadband Wireless Internet Access, IEEE 69th Vehicular Technology Conference. VTC Spring, 1--5,
April, 2009.
[15] W. John and S. Tafvelin, Analysis of Internet Backbone Traffic and Header Anomalies Observed, IMC
'07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, New York, NY, USA,
111--116, 2007.
[16] R. Beverly and K. C. Claffy, Wide-area IP multicast traffic characterization, IEEE Network, 17, 8--15,
2003.
[17] Andrej Kos and Matevz Pustisek and Janez Bester, Characteristics of real packet traffic captured at
different network locations, Computer as a Tool. The IEEE Region 8 EUROCON, 1, 164--168, 2003.
[18] Li Bo and David J. Parish and J. M. Sandford, Using TCP Packet Size Distributions for Application
Detection, The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications,
Networking and Broadcasting, 2006.
[19] Rishi Sinha and Christos Papadopoulos and John Heidemann, Internet Packet Size Distributions: Some
Observations, USC/Information Sciences Institute, 2007.
[20] Sprintlabs, Sprint Academic Research Group -- Packet Size Distribution, 2004. Access in Jun 2010,
https://research.sprintlabs.com/packstat/packetoverview.php
[21] The Cooperative Association for Internet Data Analysis -- Packet size distribution comparison between
Internet links in 1998 and 2008, 2008. Access in October 2010,www.caida.org/research/traffic-
analysis/pkt_size_distribution/graphs.xml
[22] Sajjad Ali Mushtaq and Azhar A. Rizvi, Statistical analysis and mathematical modeling of network
(segment) traffic, Proceedings of the IEEE Symposium on Emerging Technologies, 246--251, September,
2005.
[23] Sean McCreary and K. C. Claffy, Trends in Wide Area IP Traffic Patterns -- A View from Ames
Internet Exchange, Proceedings of the 13th ITC Specialist Seminar on Internet Traffic Measurement and
Modeling, Monterey, CA, 2000.
[24] Ville Mattila, Traffic Analysis -- A review of Internet traffic packet size distributions, 2010. Accessed
November 2010, http://poliisi.iki.fi/~{}ville/sekalaiset/Internet/traffic_ analysis/packet_ size_
distribution
[25] RFC-1042, A Standard for the Transmission of rm{IP} Datagrams over IEEE 802 Networks,
February, 1988. Acess in October 2010.http://www.faqs.org/rfcs/rfc1042.html .
[26] Matlab, Matlab -- The Language of Technical Computing,
http://www.mathworks.com/products/matlab/, 2010, Accessed October 2010.
[27] Ewerton Castro and Iguatemi E. Fonseca and Ajey Kumar and Marcelo S. Alencar, A Packet
Distribution Traffic Model for Computer Networks, The International Telecommunications Symposium,
ITS 2010, Manaus, Brazil. September, 2010.
[28] Ewerton Castro and Iguatemi E. Fonseca and Marcelo S. Alencar, Comparison Results of a
Mathematical Model and Experimental Measurements for the Distribution Function of the Packet Length
in Computer Networks, International Workshop on Telecommunications 2011 -- IWT 2011.
[29] Ewerton Castro and Iguatemi E. Fonseca and Ajey Kumar and Marcelo S. Alencar, A New Packet
Distribution Model for Computer Networks with Bimodal Traffic, Journal of Communication and
Computer, pg 208--216, number 2, 2012, ISSN 1548-7709.
[30] Ewerton Romulo Silva Castro, Modelo para a Distribuição de Probabilidade do Comprimento dos
Pacotes em Redes de Computadores, Phd Thesis, UFCG, Campina Grande, PB. Brazil, 2011.

Contenu connexe

Tendances

Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerIOSR Journals
 
Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DTELKOMNIKA JOURNAL
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network IJECEIAES
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesIJERA Editor
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksCSCJournals
 
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY IJNSA Journal
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETIOSR Journals
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionCSCJournals
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...ijceronline
 
A041203010014
A041203010014A041203010014
A041203010014IOSR-JEN
 
Green wsn optimization of energy use
Green wsn  optimization of energy useGreen wsn  optimization of energy use
Green wsn optimization of energy useijfcstjournal
 

Tendances (18)

Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
 
Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...Comparative study between metaheuristic algorithms for internet of things wir...
Comparative study between metaheuristic algorithms for internet of things wir...
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
 
9517cnc03
9517cnc039517cnc03
9517cnc03
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic Matrices
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
 
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANET
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts Prediction
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...
 
A041203010014
A041203010014A041203010014
A041203010014
 
Green wsn optimization of energy use
Green wsn  optimization of energy useGreen wsn  optimization of energy use
Green wsn optimization of energy use
 

En vedette

A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesIJCNCJournal
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsIJCNCJournal
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
 

En vedette (19)

A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast trees
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
 

Similaire à Probability Density Functions of the Packet Length for Computer Networks With Bimodal Traffic

Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
 
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELS
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELSFORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELS
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELSijaia
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...IJECEIAES
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...IJECEIAES
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...IJMER
 
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelChannel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelIJCNCJournal
 
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelChannel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelIJCNCJournal
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
 
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...IJECEIAES
 

Similaire à Probability Density Functions of the Packet Length for Computer Networks With Bimodal Traffic (20)

Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
 
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELS
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELSFORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELS
FORECASTING THE WIMAX TRAFFIC VIA MODIFIED ARTIFICIAL NEURAL NETWORK MODELS
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1075460
H1075460H1075460
H1075460
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
 
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelChannel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
 
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelChannel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
 

Plus de IJCNCJournal

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Plus de IJCNCJournal (20)

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Probability Density Functions of the Packet Length for Computer Networks With Bimodal Traffic

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 DOI : 10.5121/ijcnc.2013.5302 17 PROBABILITY DENSITY FUNCTIONS OF THE PACKET LENGTH FOR COMPUTER NETWORKS WITH BIMODAL TRAFFIC Ewerton R. S. Castro1 , Marcelo S. Alencar2 and Iguatemi E. Fonseca3 1 Federal Institute of Paraíba, Patos, Brazil ewerton.castro@ifpb.edu.br 2 Federal University of Campina Grande, Iecom, DEE, Brazil malencar@dee.ufcg.edu.br 3 Federal University of of Paraíba, Brazil iguatemi@ci.ufpb.br ABSTRACT The research on Internet traffic classification and identification, with application on prevention of attacks and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their probability density functions, are popular. This paper presents a new statistical modeling for packet length, which shows that it can be modeled using a probability density function that involves a normal or a beta distribution, according to the traffic generated by the users. The proposed functions has parameters that depend on the type of traffic and can be used as part of an Internet traffic classification and identification strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well as to generate synthetic traffic and estimate the packets processing capacity of Internet routers KEYWORDS Packet-switching networks, Measurement, Modeling, Statistical methods & Packet length. 1. INTRODUCTION The evolution of the Internet in the last few years has been characterized by changes in the way users behave, interact and utilize the network. The availability of broadband connections, particularly those based on cable TV and ADSL technologies, and new applications and dynamics of the Internet traffic, such as P2P applications and video sharing, have caused changes in various network management activities, such as capacity planning and provisioning, traffic engineering, application performance, anomaly detection and pricing. The correct identification of user applications may give valuable information for network operators to develop new traffic engineering policies and for providers to offer services based on user demand. Diagnosing anomalies is critical for both network operators and end users in terms of data security and service availability. Anomalies, such as the ones produced by worms or Denial of Service (DoS) attacks, may have unexpected behavior and may cause significant changes in the network traffic. Besides that, knowledge of the applications used by the subscribers may be of interest for application-based accounting and charging or even for the Internet Service Provider (ISP) to offer new products [1]-[6]. Characterization of Internet traffic is an important issue for telecommunications networks [7]. The literature presents several traffic identification techniques, and those using packet length (size) are important strategies [1]-[24]. The research usually involves experimental measurements [13],[14],[17]-[23], because this information can be used to design and estimate the network
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 18 infrastructure and application attributes. Li Bo, for example, indicates that the packet size (or length) distribution can be used to identify many Transport Control Protocol (TCP) applications [18]. Alfonso Iacovazzi reports that statistical traffic classification is possible based on some features of the Internet Protocol (IP) flow and that the packet length is a key feature to classify the application level content of a packet flow and that this classification can be useful for security policies, traffic filtering and support to the quality of service mechanisms [7]. Mushtaq mentioned that the probability density function and the cumulative distribution function can be used to design, control, manage, interpolate and extrapolate the network traffic. It enables to develop professional simulators and fast, efficient and robust algorithms for the optimization of computer and communication systems, along with applications [22]. Therefore, the analysis and characterization of those parameters is important to design new methods for traffic identification and classification. Traffic classification based on packet length was attempted by some authors in recent papers [1]-[5]. The main contribution of this paper is to propose a new probability density function for the packet length which can be used to identify and classify the Internet traffic. This paper also summarizes results from the literature on packet size distribution. Using these results, mathematical models for the packet distribution are presented and compared with actual measurements of packet size. The analysis of the results suggests that the model can be used to estimate the distribution of packet traffic in computer networks. Besides, this investigation shows that it is possible to relate parameters of the proposed distribution function with the traffic type or network application. The remaining of the paper is organized as follows. Section 2 presents mathematical models to estimate the length distribution of the packets. Section 3 compares the measured values with the proposed mathematical models. Section 4 shows a summary of applications. Section 5 presents the conclusions of the paper. 2. MATHEMATICAL MODELS The usual configuration for a Local Area Network (LAN) with Internet access is shown in Figure 1. Using this configuration some mathematical models for the packet length in computer networks can be derived.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 19 Figure 1. Packet aggregation by the network server The packet length was measured between the network server and the Internet connection, as illustrated in Figure 1, to obtain the packet length relative frequency distribution. The results are discussed in Section 3 and show that the packet length has a bimodal traffic distribution. Similar results are found in [13]-[23]. Using the measured values, one can derive two equations to describe this bimodal traffic distribution, which can be obtained using a mathematical procedure presented in this paper. In the absence of a priori information, the Uniform (Figure 1a) is usually considered for the packet length generated by the computers (users). The Normal (Figure 1b) and Beta (Figure 1c) distributions are considered when additional information can be obtained. The discussion and mathematical analysis are presented in the Section 2.1, for the Uniform and the Normal distribution, and in the Section 2.2 for the Beta distribution. 2.1. Model based on the Normal distribution Consider that the traffic produced by a computer (user) presents, originally, a uniform distribution (Figure 1a) for the packet length, as shown in Figure 2a. When the data traffic flows through the aggregation point (router, gateway or server) it suffers a non-linear transformation (Figure 1d), which produces a bimodal distribution [13]-[23] (Figure 1f). Figure 2b shows this non-linear transformation at the aggregation point, which generates the bimodal distribution (Figure 2c), in accordance with the published results. However, considering that the packets are produced by several computers one can invoke the Central Limit Theorem, and infer that the aggregate traffic has a Gaussian distribution (Figure 1b), as shown in Figure 3a [27]. Therefore, when the data traffic flows through the aggregation point, it suffers a non-linear transformation (Figure 1e) and the network servers group the packets (bytes) according to the adopted protocol (IP, ICMP, TCP or UDP), as depicted in Figure 1, and this produces a non-uniform distribution for the packet size, as shown in Figure 3c (or Figure 1f). The probability density function transformation (illustrated in Figure 3b), at the aggregation point can be obtained using ℓ= cos x+M 2 (1)
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 20 in which, M is the normalized MTU (1500 bytes/1500 bytes), ℓ is the output that represents the packet length (size) and it is function of the x, the input random variable. This is the traffic generated by the user and it is not known previously. Equation (1) is responsible for the non- linear transformation that appears in the following. Rewriting x as a function of ℓ, gives M)(=x ℓ2arccos (2) in which ℓ is the non-linear transformation used in Figure 3b and 2 ℓ21 2 1ℓ ℓ M)( (x)p = dx d (x)p =)(p LL N      (3) in which )(pN ℓ is the probability density function of a packet length after the aggregation point [27]. Considering that the traffic produced by a single computer presents a Normal distribution for the packet length, then Figure 2. Non-linear transformation of probability density function. (a) Uniform distribution, (b) Non- linear transformation and (c) Probability density function.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 21 Figure 3. Non-linear transformation of probability density function. (a) Normal distribution. (b) Non- linear transformation and (c) Probability density function. 2 2 2σ 2 1 m)(x e σ =(x)pL   (4) in which, x is given by Equation (2), E[x]=m is the mean and σ2 is the variance. Using equations (3) and (4) with m=0, the following equation is proposed to model the network traffic distribution 2 2 2 ℓ21 2σ ℓ2arccos 2π 2 ℓ M)( M))(( e σ =)(pN    (5) in which, )(pN ℓ is the probability density function of the packet length at the output of the aggregation point, ℓ and σ are parameters of the distribution function related to the traffic type. Notice that σ2 is the variance of the Normal distribution, which is related with the traffic generated by the computers [27]. This is an important parameter and, as seen in the Section 5, may be associated with the type of traffic in the network. Paper [27] presents the comparison between )(pN ℓ and experimental measurements.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 22 2.2. Model based on the Beta distribution The Normal distribution (Figure 3a) is useful, but has a long tail which does not properly adjust to the limited range of packet length defined by the Internet transport protocols. The Beta distribution provides better approximations, that match the practical results, considering that the limited range of the random packets, Figure 4a, and Figure 1c. This leads, after the non- linear transformation (Figure 1e or Figure 4b ), to the new model discussed in the following, originally proposed by Castro et al [28]. The initial conditions to derive the mathematical packet length model, to obtain the probability density function presented in Figure 4, are:  Consider that x is a random variable, with 0≤ x≤ 1 ;  The minimum and maximum normalized packet length are Lm and LM defined by: 10 <Lm (6) e 10 <LM , Lm<LM (7) the parameters are the ratio between the minimum (maximum) packet length, in terms of bits or bytes that can be sent through a network interface, and N Max . N Max is the maximum number of bits or bytes that can be send through a network interface in a time interval t. Definition 1: consider that ℓ(x), or simply ℓ, is the random variable that represents the normalized packet length sent through a network interface in a time interval t, and that it is possible to express ℓ by                     1cos 2 ℓ + n πxLL L= mM M , Nn (8) and from Equation (8), one can obtain the random variable x as a function of the packet length ℓ               1 ℓ 2arccos 1 mM M LL L π =x (9) Equation (8) or (9), presented in Figure 4b, represent the non-linear transformation of the Beta distribution and that transformation gives the bimodal distribution illustrated in Figure 4c [13]- [23] illustrated in Figure 4c. This equation is obtained from Equation (1) [27] after some simulations and curve fitting [26].
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 23 Figure 4. Aggregated packet length non-uniform distribution. (a) Beta distribution B(2,2), (b) Non-linear transformation and (c) Probability density function. Initially, the possibility of obtaining a consistent probability density function using curve fitting by software, as for example Matlab, was investigated. A few models were obtained, but they had several tuning parameters (the minimum number was four parameters, and the approximation was poor). With this number of parameters is it difficult to associate each of them with the use of the probability density function in methods for traffic identification or classification. Therefore, the mathematical approach was preferred. For the Ethernet network standard the Maximum Traffic Unit (MTU) is N Max = 1500 bytes. The maximum packet length that can be sent through a network interface is 1492 bytes, because eight bytes are used in the LLC header [25]. This gives 0.9946 1500 1492       =LM , but for computation purposes one considers 0.994 1500 1491 ==LM       . The minimum packet length is 28 bytes (20 bytes for the IP header + 8 bytes used in the LLC header), that can be sent through a network interface, this means 0.0186 1500 28       =Lm or 0.018 1500 27 ==Lm       for computation purposes. Other values for Lm are also possible depending on how the protocols are combined. The following formula, obtained from the non-linear transformation (8), with the bimodal traffic distribution, is proposed to model the packet length probability density function after the aggregation point.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 24       11 22 1 ℓ 2arccos 1 1.1 ℓ 2arccos 1 . 2 ℓ 2 1 ℓ                                                                        β mM M α mM M mMmM B LL L πLL L π βΓαΓ β+αΓ L+LLL π =)(p (10) ou         11 2221 1. 1 . 1 ℓ         βα B x)((x) βΓαΓ β+αΓ βα,BAAπ =)(p (11) in which, x is given by (9),        2 1 mM LL =A is the midpoint of the interval,              2 ℓ2 mM L+L =A is the mean, B(.) is the Beta function, .Γ is the Gama function, ℓ is a random variable that represents the packet length (or size) after the aggregation point, pB ℓ is the probability density function of a packet length ℓ obtain from the Beta distribution, α nd β are parameters of the distribution function related to the traffic type, LM is the maximum packet length, Lm is the minimum packet length, 0>Lm , 0>LM and Lm<ℓ<LM . The cumulative distribution function of the packet length is β)(ααI=)(P xL ℓ (12) is modeled as a regularized incomplete Beta function, in which, 00 =β)(ααI , 11 =β)(ααI and y=x(ℓ ) is given by               1 ℓ 2arccos mM M LL L π n =x (13) One can obtain Equation (13) as a function of the packet length ℓ, given by Equation (8), with n=1. 3. Comparison Results This section shows a comparison between the proposed models and some measurements. The measurements are obtained from: backbones with different bit rates [20], [21], ISP with Wi-Fi access [14], data traffic between cities (Chicago and Seattle) [21], and measurements made by the authors [27]-[30]. The proposed probability density function is compared with measurements presented in several articles [14]-[16], [20], [21], which were obtained from different networks scenarios, as, for
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 25 example, backbones with different bit rates [20], [21], ISP with Wi-Fi access [14], and data traffic between cities (Chicago and Seattle) [21]. 3.1 Tafvelin measurements A comparison between the measurements found in the literature and results obtained from the proposed models for the cumulative distribution function of the packet length is shown in the following figures and tables. Figure 5. Tafvelin [15] measurements versus )(PB ℓ function and other cumulative distributions. Table 1. Tafvelin [15] measurements versus, )(PB ℓ and other cumulative distributions. Dist. Par.1 Par.2 SSE RMSE RS ARS Exp λ = 1.6 - 0.59 0.21 0.17 0.17 Log μ = 4e−13 σ = 7.0 0.54 0.19 0.24 0.24 Par α = 0.18 β = 0.003 0.03 0.05 0.87 0.86 Wei α = 0.26 β = 0.79 0.02 0.05 0.89 0.88 PB ℓ α = 0.089 β = 0.097 0.01 0.03 0.97 0.97 The dashed lines are the cumulative measurements obtained from the literature [13]-[15],[20], [21]. The continuous lines are the cumulative measurements obtained from the CDF model, )(PB ℓ, adjusted by the least squares method to find the best value for the parameters α and β,
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 26 considering α, β > 0. The adjusted curve )(PB ℓ is plotted along with measured data found in the literature. The other lines are the Exponential, Log-normal, Pareto and Weibull distributions. The metrics Sum of Squares due to Error (SSE), Root Mean Square Error (RMSE), R-square (RS) and Adjusted R-square (ARS) were used to compute the difference between the analytic and experimental data. SSE and RMSE values close to zero indicate that the model has a small error component. RS is the square of the correlation between the response and the predicted response values. RS can take any value between 0 and 1, a value closer to 1 indicates that a large proportion of variance is accounted by the model. The ARS statistics can take on any value less than or equal to 1, a value closer to 1 indicates a better fit [26]. Tafvelin et al [15], collected data during 20 consecutive days, in April 2006, for a bidirectional traffic on an OC-192 backbone link (10 Gbit/s bit rate). For this link, the author used optical splitters attached to two Endace DAG6 2SE cards. The dashed bold line in Figure 5 illustrates the cumulative distribution of IPv4 packet lengths. Table 1 and Figure 5 summarize the comparison between Tafvelin measurements, )(PB ℓ and other distributions. As one can see in Figure 5, the CDF model, )(PB ℓ, is the nearest curve of the dashed line, cumulative measurements obtained from Tafvelin et al [15]. This result is confirmed by Table 1 results. SSE and RMSE is very close to zero, the best theoric value is zero. For RS and ARS, the best value is one. In this comparison we obtain 0.97 for both (SSE and RMSE). The numeric and graphically results for )(PB ℓ model presents very good results. For this comparison, the second best results are presented by Weibull distribution. In both, α and β are the distribuition parameters adjusted using the Matlab fitting tool [26]. A important point to be noted is the presence of two jumps. The first, near zero, and the second near 1500 (MTU). These two points of rapid growth is present in the collected values, but the Exponential, Log-Normal, Pareto and Weibull distribuitions can not capture both. Only the first one, near zero. This not happen in the proposed model. 3.2 Rastin measurements The paper by Rastin Pries [14] presents measurements taken from an ISP switching center providing access to 250 households. The customers access the wireless LAN from several access points, and then the traffic is multiplexed using an IEEE 802.11a radio link. A comparison between Pries measurements, )(PB ℓ and other distributions is summarized in Table 10 and Figure 12. Table 2. Rastin [14] measurements versus, )(PB ℓ and other cumulative distributions. Dist. Par.1 Par.2 SSE RMSE RS ARS Exp λ = 5.65 - 0.85 0.22 - - Log μ = 4e−10 σ = 10 1,36 0.27 - - Par α = 0.36 β = 0.01 0.27 0.13 0.66 0.64 Wei α = 0.24 β = 0.18 0.09 0.08 0.65 0.63 PB ℓ α = 0.086 β = 0.18 0.03 0.05 0.9 0.89
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 27 Figure 6. Rastin [14] measurements versus )(PB ℓ function and other cumulative distributions. The Exponential distribution, with λ distribuition parameter, presents the worst results in comparsion with Rastin Pries [14] measurements. In Figure 6, the Exponential distribuition is far from the measured values and in Table 2, the SSE and RSME is very distant from zero. For RS and ARS, Matlab fitting tool [26] can not obtain any value. The Log-normal distribuition has same results, μ and σ are the distribuition parameters adjusted using the Matlab fitting tool [26]. The difference is that Exponential is very far for up values and Log-normal is very far for down values. This results confirm that Exponential distribution can not modeled computers packts traffic. 3.3 CAIDA measurements The comparison shown in Figure 7 is from the Cooperative Association for Internet Data Analysis (CAIDA), the measurements were taken from an OC-192 IP backbone link, in march 2008, a link between Chicago and Seattle [21]. Figure 7 and Table 3 summarize the comparison between the CAIDA measurements, )(PB ℓ and other distributions. The comparison results show a good fit between the measured values and the )(PB ℓ curve. The Pareto and Weibull distributions, both with α and β parameters adjusted using the Matlab fitting tool [26], presents better results than Exponential and Log-Normal distribution in comparsion with CAIDA [21] measurements. In Figure 7, the Pareto and Weibull distributions are very near between then and both have a small distance from the dash-line. In Table3, values of SSE and RSME are small and near zero as expected. For RS and ARS values are near 1.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 28 Table 3. CAIDA [21] measurements versus, )(PB ℓ and other cumulative distributions. Dist. Par.1 Par.2 SSE RMSE RS ARS Exp λ = 2.03 - 0.82 0.21 0.03 0.03 Log μ = 3e−12 σ = 9.28 0.79 0.20 0.06 0.06 Par α = 0.21 β = 0.004 0.08 0.07 0.76 0.75 Wei α = 0.29 β = 0.55 0.07 0.06 0.79 0.79 PB ℓ α = 0.10 β = 0.13 0.03 0.04 0.95 0.94 Figure 7. CAIDA [21] measurements versus )(PB ℓ function and other cumulative distributions. 3.4 Sprint measurements The Sprint (Sprint Academic Research Group) measurements were collected, in February 2004, from the San Jose 84 Mbit/s IP backbone link [20]. Sprint measurements, )(PB ℓ and other distributions are summarized in Figure 8 and Table 4. The first Sprint set of measurements indicates that )(PB ℓ has better results then other cumulative distributions. For Sprint measurements [20], Exponential and Log-Normal distributions are far from the measured values, as presented in Figure 8 and in Table 4. Pareto and Weibull distributions are better. These explain why both are used in computers traffic-analysis. But for this comparison,
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 29 using the proposed model )(PB ℓ , the results is improved and this new distribution can be used to modeled computers packts traffic. Table 4. Sprint [20] measurements versus, )(PB ℓ and other cumulative distributions. Dist. Par.1 Par.2 SSE RMSE RS ARS Exp Λ = 3.3 - 0.84 0.19 0.14 0.14 Log μ=1.5e−10 σ =23.2 1.45 0.26 - - Par α = 0.29 β = 0.006 0.05 0.05 0.87 0.86 Wei α = 0.32 β = 0.24 0.05 0.05 0.88 0.88 PB ℓ α = 0.11 β = 0.21 0.04 0.04 0.92 0.92 Figure 8. Sprint [20] measurements versus )(PB ℓ function and other cumulative distributions. 4. Conclusion The analysis of the results suggests that the models can be used to estimate the distribution of packet traffic on computer networks. This important information can be used as part of a strategy of traffic identification, application level traffic classification and performance measurement of the routers. Future work in this direction is expected. Besides, the numerical results show that )(PB ℓ has a good fitting and that it performs better then the Exponential, Log-normal, Pareto or Weibull distributions, for bimodal traffic. This result is important because one of these distributions may be used in network traffic simulators.
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 30 Two different equations were also obtained to model the packet length probability density function using the Matlab fitting tool [26]. The equations use a sum of two Exponential two Normal distributions. The disadvantage is that, with the Exponential, four parameters are needed to adjust, and the use of Normal distribution implies six parameters to adjust. In both cases, the results are better then )(pB ℓ, but the increase in the number of parameters, makes it more difficult to associate the measured parameters and the variables present in the computer network traffic. Some new possible application for the proposed cumulative distributions are improve the metrics for measuring the performance of routers, strategy to be used in the characterization of Internet traffic and help to discover denial-of-service (DoS) attacks characteristics. In papers [27] and [28], some preliminary results and models are presented. It was also found that many of the measurements made on 10 Gbit/s (OC-192) links made by [15], [21], [20] and for the access network by [14] used cumulative packet length data. Thus, this paper also presented a cumulative distribution to compare the measured data with the proposed model. As suggestions for future work, it is possible to perform more measurements of packet lengths in the network layer for other specific applications (Skype, games on-line, etc) to classify the traffic based on the values of α and β of the new proposed distribution. The traffic classification, based on the packet lengths has already been done by some other authors in recent papers [1]--[5]. REFERENCES [1] Jaber, M. and Cascella, R. G. and Barakat, C., Using host profiling to refine statistical application identification, Proceedings of the IEEE INFOCOM 2012, 2746--2750, 2012. [2] Rocha, E. and Salvador, P. and Nogueira, A., Detection of Illicit Network Activities based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics, Proceedings of the IEEE ICC 2011, 1-- 6, 2011. [3] Jaber, M. and Cascella, R. G. and Barakat, C., Can we trust the inter-packet time for traffic classification?, Proceedings of the IEEE ICC 2011, 1--5, 2011. [4] Dainotti, A. and Pescape, A. and Kim, Hyun-chul, Traffic Classification through Joint Distributions of Packet-level Statistics, Proceedings of the IEEE GLOBECOM 2011, 1--6, 2011. [5] Wen Zhang, Peer-to-Peer Traffic Anti-identification Based on Packet Size, Proceedings of the IEEE International Conference on Computer Science and Network Technology 2011, 2277--2280, 2011. [6] Callado, A. and Kamienski, C. and Szabo, G. and Gero, B. and Kelner, J. and Fernandes, S. and Sadok, D., A Survey on rm{I}nternet Traffic Identification, IEEE Communications Surveys Tutorials, 11, 37--52, 2009. [7] Alfonso Iacovazzi and Andrea Baiocchi, Optimum packet length masking, 22nd International Teletraffic Congress (ITC), 2010, Amsterdam, The Netherlands, 7-9, September, 2010. [8] Thomas Karagiannis and Andre Broibo and Nevil Brownlee and K. C. Claffy and Michalis Faloutsos, File-sharing in the Internet: A characterization of P2P traffic in the backbone, University of California, Riverside, USA, CA 92521, Tech. Rep., November, 2003. [9] F. Liu and Z. Li and J. Yu, P2P Applications Identification Based On the Statistics Analysis of Packet Length, IEEE International Symposium on Information Engineering and Electronic Commerce, 160--163, 2009. [10] D. Pan and Y. Yang, Localized Independent Packet Scheduling for Buffered Crossbar Switches, IEEE Transactions on Computers, 58, 260--274, February, 2009. [11] Z. Cucej and M. Fras, Data Source Statistics Modeling based on Measured Packet Traffic: A Case Study of Protocol Algorithm and Analytical Transformation Approach, IEEE International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2009, 54--64, 2009.
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 31 [12] N. Duffield and C. Lund and M. Thorup, Learn More, Sample Less: Control of Volume and Variance in Network Measurement, IEEE Transactions on Information Theory, 51, 1756--1775, May, 2005. [13] Cheng Yu and V. Ravindran and A. Leon-Garcia, Internet Traffic Characterization Using Packet-Pair Probing, 26th IEEE International Conference on Computer Communications. INFOCOM 2007, 1766-- 1774, 2007. [14] Rastin Pries and F. Wamser and D. Staehle and P. Tran-Gia, Traffic Measurement and Analysis of a Broadband Wireless Internet Access, IEEE 69th Vehicular Technology Conference. VTC Spring, 1--5, April, 2009. [15] W. John and S. Tafvelin, Analysis of Internet Backbone Traffic and Header Anomalies Observed, IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, New York, NY, USA, 111--116, 2007. [16] R. Beverly and K. C. Claffy, Wide-area IP multicast traffic characterization, IEEE Network, 17, 8--15, 2003. [17] Andrej Kos and Matevz Pustisek and Janez Bester, Characteristics of real packet traffic captured at different network locations, Computer as a Tool. The IEEE Region 8 EUROCON, 1, 164--168, 2003. [18] Li Bo and David J. Parish and J. M. Sandford, Using TCP Packet Size Distributions for Application Detection, The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 2006. [19] Rishi Sinha and Christos Papadopoulos and John Heidemann, Internet Packet Size Distributions: Some Observations, USC/Information Sciences Institute, 2007. [20] Sprintlabs, Sprint Academic Research Group -- Packet Size Distribution, 2004. Access in Jun 2010, https://research.sprintlabs.com/packstat/packetoverview.php [21] The Cooperative Association for Internet Data Analysis -- Packet size distribution comparison between Internet links in 1998 and 2008, 2008. Access in October 2010,www.caida.org/research/traffic- analysis/pkt_size_distribution/graphs.xml [22] Sajjad Ali Mushtaq and Azhar A. Rizvi, Statistical analysis and mathematical modeling of network (segment) traffic, Proceedings of the IEEE Symposium on Emerging Technologies, 246--251, September, 2005. [23] Sean McCreary and K. C. Claffy, Trends in Wide Area IP Traffic Patterns -- A View from Ames Internet Exchange, Proceedings of the 13th ITC Specialist Seminar on Internet Traffic Measurement and Modeling, Monterey, CA, 2000. [24] Ville Mattila, Traffic Analysis -- A review of Internet traffic packet size distributions, 2010. Accessed November 2010, http://poliisi.iki.fi/~{}ville/sekalaiset/Internet/traffic_ analysis/packet_ size_ distribution [25] RFC-1042, A Standard for the Transmission of rm{IP} Datagrams over IEEE 802 Networks, February, 1988. Acess in October 2010.http://www.faqs.org/rfcs/rfc1042.html . [26] Matlab, Matlab -- The Language of Technical Computing, http://www.mathworks.com/products/matlab/, 2010, Accessed October 2010. [27] Ewerton Castro and Iguatemi E. Fonseca and Ajey Kumar and Marcelo S. Alencar, A Packet Distribution Traffic Model for Computer Networks, The International Telecommunications Symposium, ITS 2010, Manaus, Brazil. September, 2010. [28] Ewerton Castro and Iguatemi E. Fonseca and Marcelo S. Alencar, Comparison Results of a Mathematical Model and Experimental Measurements for the Distribution Function of the Packet Length in Computer Networks, International Workshop on Telecommunications 2011 -- IWT 2011. [29] Ewerton Castro and Iguatemi E. Fonseca and Ajey Kumar and Marcelo S. Alencar, A New Packet Distribution Model for Computer Networks with Bimodal Traffic, Journal of Communication and Computer, pg 208--216, number 2, 2012, ISSN 1548-7709. [30] Ewerton Romulo Silva Castro, Modelo para a Distribuição de Probabilidade do Comprimento dos Pacotes em Redes de Computadores, Phd Thesis, UFCG, Campina Grande, PB. Brazil, 2011.