A network application model with operational process feature

Abstract A network application serves as the response process to the user request. The network application, taking the traffic as operation carrier, is closely related with process features. The existing investigations mainly focus on the traffic generation by capturing request feature, which is insufficient to characterize the application operation with specific processes. Thus, this paper presents a network application model with operational process feature, where the operation process is introduced in network applications in addition to characterizing traffic element from request feature. And the process feature is represented by the random, customized and routine processes, while request feature is described by the heavy-tailed ON/OFF source. Our analysis and simulation show that the traffic of our model admits the ubiquitous statistical laws: the self-similarity and the mean-variance relationship, which further validate our model. Moreover, compared with the traffic generation model without considering complex process features, where traffic distribution is found being positively correlated with node betweenness centrality (BC), the traffic of our model is both positively related with node BC, and much higher on nodes in the specific processes. The proposed model is thus beneficial for traffic control and network enhancement with complex process features.

[1]  Yvon Savaria,et al.  Determinism Enhancement of AFDX Networks via Frame Insertion and Sub-Virtual Link Aggregation , 2014, IEEE Transactions on Industrial Informatics.

[2]  Zhikun She,et al.  A Decomposition Approach for Synchronization of Heterogeneous Complex Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[3]  James Lam,et al.  Positive Edge-Consensus for Nodal Networks via Output Feedback , 2019, IEEE Transactions on Automatic Control.

[4]  David L. Jagerman,et al.  The gi/m/1 processor-sharing queue and its heavy traffic analysis , 1991 .

[5]  M. Barthelemy Betweenness centrality in large complex networks , 2003, cond-mat/0309436.

[6]  Rosario Delgado,et al.  A reflected fBm limit for fluid models with ON/OFF sources under heavy traffic , 2007 .

[7]  A. Adas,et al.  Traffic models in broadband networks , 1997, IEEE Commun. Mag..

[8]  Yang Chen,et al.  Application reliability for communication networks and its analysis method , 2011 .

[9]  Zi-Gang Huang,et al.  Universal flux-fluctuation law in small systems , 2014, Scientific Reports.

[10]  Meixia Tao,et al.  Delay-aware energy-efficient communications over Nakagami-m fading channel with MMPP traffic , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[11]  Dimitrios Makrakis,et al.  Probabilistic envelope processes for alpha-stable self-similar traffic models and their application to resource provisioning , 2005, Perform. Evaluation.

[12]  Zhigang Zeng,et al.  Controllability of Two-Time-Scale Discrete-Time Multiagent Systems , 2020, IEEE Transactions on Cybernetics.

[13]  Ning Huang,et al.  A new bandwidth allocation strategy considering the network applications , 2017, 2017 Second International Conference on Reliability Systems Engineering (ICRSE).

[14]  A Díaz-Guilera,et al.  Self-similar community structure in a network of human interactions. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Fotios C. Harmantzis,et al.  Fractional Lévy motion and its application to network traffic modeling , 2002, Comput. Networks.

[16]  Bengt Ahlgren,et al.  Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..

[17]  Lei Wang,et al.  Connectivity-Based Accessibility for Public Bicycle Sharing Systems , 2018, IEEE Transactions on Automation Science and Engineering.

[18]  Gerhard P Hancke,et al.  Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.

[19]  Keith M. Martin,et al.  An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..

[20]  Geyong Min,et al.  Analytical Modelling and Optimization of Congestion Control for Prioritized Multi-Class Self-Similar Traffic , 2013, IEEE Transactions on Communications.

[21]  Shanjiang Zhu,et al.  Do People Use the Shortest Path? An Empirical Test of Wardrop’s First Principle , 2015, PloS one.

[22]  Bo Liu,et al.  Second-order controllability of two-time-scale multi-agent systems , 2019, Appl. Math. Comput..

[23]  Lili Wang,et al.  Theoretical mean-variance relationship of IP network traffic based on ON/OFF model , 2009, Science in China Series F: Information Sciences.

[24]  Wolfgang Kellerer,et al.  MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication , 2007, Adv. Multim..

[25]  Timothy K. Shih,et al.  Application-oriented offloading in heterogeneous networks for mobile cloud computing , 2018, Enterp. Inf. Syst..

[26]  Sergio Gómez,et al.  Congestion induced by the structure of multiplex networks , 2016, Physical review letters.

[27]  Yanjie Fu,et al.  LATTE: Application Oriented Social Network Embedding , 2017, 2019 IEEE International Conference on Big Data (Big Data).

[28]  Hsun-Jung Cho,et al.  Chaos and control of discrete dynamic traffic model , 2005, J. Frankl. Inst..

[29]  Gary D. Bader,et al.  Cytoscape Web: an interactive web-based network browser , 2010, Bioinform..

[30]  Tho Le-Ngoc,et al.  MMPP models for multimedia traffic , 2000, Telecommun. Syst..

[31]  David W. Coit,et al.  Combined effects of load dynamics and dependence clusters on cascading failures in network systems , 2018, Reliab. Eng. Syst. Saf..

[32]  Reginald D. Smith,et al.  The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena , 2008, Adv. Complex Syst..

[33]  Qinghua Zhu,et al.  Investigating user switching intention for mobile instant messaging application: Taking WeChat as an example , 2016, Comput. Hum. Behav..

[34]  Florin Ciucu,et al.  Delay Bounds in Communication Networks With Heavy-Tailed and Self-Similar Traffic , 2009, IEEE Transactions on Information Theory.

[35]  Der-Horng Lee,et al.  Taxi Dispatch System Based on Current Demands and Real-Time Traffic Conditions , 2003 .

[36]  Biswanath Mukherjee,et al.  A Survey of User Behavior in VoD Service and Bandwidth-Saving Multicast Streaming Schemes , 2012, IEEE Communications Surveys & Tutorials.

[37]  Yue Zhang,et al.  A novel application classification and its impact on network performance , 2016 .

[38]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.

[39]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[40]  Shahrokh Valaee,et al.  Reliable Periodic Safety Message Broadcasting in VANETs Using Network Coding , 2014, IEEE Transactions on Wireless Communications.

[41]  Huaxi Gu,et al.  A highly efficient dynamic router for application-oriented network on chip , 2018, The Journal of Supercomputing.

[42]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[43]  Wolfgang Kellerer,et al.  Application-driven cross-layer optimization for video streaming over wireless networks , 2006, IEEE Communications Magazine.

[44]  Hao Zhang,et al.  Performance analysis of IAF relaying mobile D2D cooperative networks , 2017, J. Frankl. Inst..

[45]  Nong Ye,et al.  Onset of traffic congestion in complex networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[46]  Yannis A. Dimitriadis,et al.  Anomaly Detection in Network Traffic Based on Statistical Inference and \alpha-Stable Modeling , 2011, IEEE Transactions on Dependable and Secure Computing.