Characterization of the busy-hour traffic of IP networks based on their intrinsic features

Internet traffic measurements collected during the busy hour constitute a key tool to evaluate the operation of networks under the heaviest-load case scenarios, and further provide a means to network dimensioning and capacity planning. In this light, this study provides a throughout analysis of the busy-hour traffic measurements of an extensive set of universities, regional networks, and Internet exchange points collected from the Spanish Research and Education Network, RedIRIS. After showing that the traffic volumes observed in the busy hour over time can be modeled by a white Gaussian process, this work takes one step further and examines the influence of the networks' intrinsic features, mainly population size and access link capacity, on the busy-hour traffic. Well-known statistical methodologies, such as ANOVA and ANCOVA, show that the network size in terms of number of users justifies most of the busy-hour traffic information. We further provide a linear-regression model that adjusts the amount of traffic that each network user contributes to the busy-hour traffic mean values, with a direct application to the problem of link capacity planning of IP networks.

[1]  Anja Feldmann,et al.  Deriving traffic demands for operational IP networks: methodology and experience , 2001, TNET.

[2]  Ilkka Norros,et al.  Testing the Gaussian approximation of aggregate traffic , 2002, IMW '02.

[3]  Michel Mandjes,et al.  QoS-aware bandwidth provisioning for IP network links , 2006, Comput. Networks.

[4]  Chase Cotton,et al.  Packet-level traffic measurements from the Sprint IP backbone , 2003, IEEE Netw..

[5]  Jalal Almhana,et al.  Empirical bandwidth provisioning models for high speed Internet traffic , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).

[6]  Murad S. Taqqu,et al.  A Practical Guide to Heavy Tails: Statistical Techniques for Analysing Heavy-Tailed Distributions , 1998 .

[7]  M. Allen Understanding Regression Analysis , 1997 .

[8]  Aiko Pras,et al.  Gaussian traffic everywhere? , 2006, 2006 IEEE International Conference on Communications.

[9]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.

[10]  Tobias Oetiker,et al.  MRTG: The Multi Router Traffic Grapher , 1998, LISA.

[11]  D. Cox,et al.  The statistical analysis of series of events , 1966 .

[12]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[13]  Sally Floyd,et al.  Difficulties in simulating the internet , 2001, TNET.

[14]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[15]  Simon Leinen Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX) , 2004, RFC.

[16]  Ralph B. D'Agostino,et al.  Goodness-of-Fit-Techniques , 2020 .

[17]  G. Glass,et al.  Consequences of Failure to Meet Assumptions Underlying the Fixed Effects Analyses of Variance and Covariance , 1972 .

[18]  Fouad A. Tobagi,et al.  Provisioning IP backbone networks to support latency sensitive traffic , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.

[20]  Konstantina Papagiannaki,et al.  Long-term forecasting of Internet backbone traffic , 2005, IEEE Transactions on Neural Networks.

[21]  James Algina,et al.  Parametric ANCOVA and the Rank Transform ANCOVA When the Data are Conditionally Non-Normal and Heteroscedastic , 1984 .

[22]  Yaakov Kogan,et al.  Dimensioning bandwidth for elastic traffic in high-speed data networks , 2000, TNET.

[23]  Javier Aracil,et al.  Discrete-time heavy-tailed chains, and their properties in modeling network traffic , 2007, TOMC.

[24]  Eddie Kohler,et al.  Internet research needs better models , 2003, CCRV.

[25]  Konstantina Papagiannaki,et al.  Toward the Accurate Identification of Network Applications , 2005, PAM.

[26]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[27]  Aiko Pras,et al.  Smart Dimensioning of IP Network Links , 2006, DSOM.

[28]  Odlyzko Andrew Data Networks are Lightly Utilized, and Will Stay That Way , 1999 .

[29]  Virgílio A. F. Almeida,et al.  A characterization of broadband user behavior and their e-business activities , 2004, PERV.

[30]  kc claffy,et al.  Understanding Internet traffic streams: dragonflies and tortoises , 2002, IEEE Commun. Mag..

[31]  Peter A. Forsyth,et al.  Managing capacity for telecommunications networks under uncertainty , 2002, TNET.

[32]  Sebastian Abeck Network management : know it all , 2009 .

[33]  Javier Aracil,et al.  On the duration and spatial characteristics of internet traffic measurement experiments , 2008, IEEE Communications Magazine.

[34]  Anja Feldmann,et al.  NetFlow: information loss or win? , 2002, IMW '02.

[35]  H. Lilliefors On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .