Modeling and Simulation of Self-Similar Traffic in Wireless IP Networks

The article examines self-similar properties of real telecommunications network traffic data over a wide range of time scales. These self-similar properties are very different from the properties of traditional models based on Poisson and Markov-modulated Poisson processes. Simulation with stochastic and long range dependent traffic source models is performed, and the algorithms for buffer overflow simulation for finite buffer single server model under self-similar traffic load SSM/M/1/B are explained. The algorithms for modeling fixedlength sequence generators that are used to simulate self-similar behavior of wireless IP network traffic are developed and applied. Numerical examples are provided, and simulation results are analyzed.

[1]  Walter Willinger,et al.  Self-Similar Network Traffic and Performance Evaluation , 2000 .

[2]  D. Radev Stochastic Process Generation for Traffic Flow Simulation , 2005, TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services.

[3]  Martin Greenberger,et al.  Random number generators , 1959, ACM National Meeting.

[4]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[5]  Simon Heilesen,et al.  Designing for Networked Communications: Strategies and Development , 2007 .

[6]  Yogesh K. Dwivedi,et al.  Developing a Dynamic View of Broadband Adoption , 2008 .

[7]  Georg Strom Information and Function Chunks as Building Blocks in the Control Room of Life , 2007 .

[8]  Sumita Mishra,et al.  Wireless Sensor Networks: Emerging Applications and Security Solutions , 2011 .

[9]  Miklós Telek,et al.  Acyclic discrete phase type distributions: properties and a parameter estimation algorithm , 2003, Perform. Evaluation.

[10]  Jeremiah F. Hayes,et al.  Modeling and Analysis of Telecommunications Networks , 2004 .

[11]  J. Mehdi Stochastic Models in Queueing Theory , 1991 .

[12]  H. Kushner Heavy Traffic Analysis of Controlled Queueing and Communication Networks , 2001 .

[13]  F. Schreiber,et al.  The restart/lre method for rare event simulation , 1996, Proceedings Winter Simulation Conference.

[14]  José Villén-Altamirano,et al.  On the efficiency of RESTART for multidimensional state systems , 2006, TOMC.

[15]  Carmelita Görg,et al.  The RESTART/LRE method for rare event simulation , 1996, WSC.

[16]  Bruno Tuffin,et al.  Splitting for rare-event simulation , 2006, WSC.

[17]  Frédéric Morlot,et al.  How to Plan for an Upgrading Investment in a Data Network , 2009 .

[18]  Patrice Abry,et al.  Wavelets for the Analysis, Estimation, and Synthesis of Scaling Data , 2002 .

[19]  Brian Todd Kelley,et al.  A Complete Spectrum Sensing and Sharing Model for Cognitive Radio Ad Hoc Wireless Networks Using Markov Chain State Machine , 2011, Int. J. Interdiscip. Telecommun. Netw..

[20]  Basil S. Maglaris,et al.  Modelling the self-similar behaviour of network traffic , 2000, Comput. Networks.

[21]  Amund Kvalbein,et al.  An empirical comparison of generators for self similar simulated traffic , 2007, Perform. Evaluation.

[22]  Hae-Duck Joshua Jeong,et al.  Modelling of self-similar teletraffic for simulation , 2002 .

[23]  Rajab Faraj Modeling and analysis of self-similar traffic in ATM networks , 2000 .

[24]  Philip Heidelberger,et al.  Fast simulation of rare events in queueing and reliability models , 1993, TOMC.

[25]  Samir Chatterjee,et al.  International Journal of Business Data Communications and Networking , 2010 .

[26]  Pieter Ballon,et al.  Fostering Innovation in Networked Communications: Test and Experimentation Platforms for Broadband Systems , 2007 .

[27]  Jonathan Blackledge,et al.  Characterization of internet traffic using a fractal model , 2007 .

[28]  Alan D. Smith,et al.  Linking the Popularity of Online Trading with Consumers' Concerns for Reputation and Identity Theft , 2011, Int. J. Bus. Data Commun. Netw..

[29]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[30]  M. Falch Handbook of Research on Global Diffusion of Broadband Data Transmission , 2008 .

[31]  J. Medhi,et al.  Stochastic models in queueing theory , 1991 .

[32]  Izabella Lokshina,et al.  Modeling and simulation of self-similar wireless IP network traffic , 2009, 2009 Wireless Telecommunications Symposium.

[33]  Adrian Popescu,et al.  Traffic Self-Similarity , 2001 .

[34]  Giovanni Giambene,et al.  Queuing Theory and Telecommunications: Networks and Applications , 2005 .

[35]  Liming Chen,et al.  WebGuard: An Adult Content Detection and Filtering System , 2005, Int. J. Bus. Data Commun. Netw..

[36]  Christoph Lattemann,et al.  A Concept for Mobile Ad-Hoc Messaging Networks (AMNet) , 2009, Int. J. Inf. Technol. Web Eng..

[37]  Marco A. Casanova,et al.  Query Processing in a Mediator Based Framework for Linked Data Integration , 2011, Int. J. Bus. Data Commun. Netw..

[38]  Terry Williams,et al.  Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .

[39]  C. Görg,et al.  Simulating rare event details of ATM delay time distributions with RESTART/LRE , 1999 .

[40]  O. Wolfson Foreword to the Handbook of Research on " Mobile Peer-to-Peer Computing for Next Generation Distributed Environments : Advancing Conceptual and Algorithmic Applications " . , 2009 .

[41]  Gerardo Rubino,et al.  Introduction to Rare Event Simulation , 2009, Rare Event Simulation using Monte Carlo Methods.

[42]  Phaik-Hoon Tan,et al.  Statistical Analysis of Long-Range Dependent Processes via a Stochastic Intensity Approach, with Applications in Networking , 1999 .

[43]  Ingrid Daubechies,et al.  Ten Lectures on Wavelets , 1992 .