Performance Impact of Wireless Mesh Networks with Mining Traffic Patterns

With mining traffic patterns, we evaluate the performance impact on wireless mesh networks. Genuine traffic traces are collected from the wireless mesh networks testbed, which tends to exhibit long-range dependent behavior under several Hurst index estimators. We analyze traffic traces and use clustering techniques to characterize patterns of individual users' behavior. After extracting traffic data from the raw data logs, we identify session clusters by employing the AutoClass tool and the K-means algorithm. Modeling and simulation were performed using the NS-2 tool. Based on the identified session clusters, we introduce source model based on wavelet. Simulation results indicate that traffic traces, compared to traditional traffic models, predict longer queues and, thus, require larger buffers in the network dimensioning.

[1]  Matthew Roughan,et al.  Measuring long-range dependence under changing traffic conditions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[2]  Hong Fei,et al.  A novel traffic model based on wavelet analysis , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[3]  Jie Wu,et al.  A unified framework for understanding network traffic using independent wavelet models , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[4]  Jan Beran,et al.  Statistics for long-memory processes , 1994 .

[5]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[6]  Hao Chen,et al.  Trunked radio systems: traffic prediction based on user clusters , 2004, 1st International Symposium onWireless Communication Systems, 2004..

[7]  Peter C. Cheeseman,et al.  Bayesian Classification (AutoClass): Theory and Results , 1996, Advances in Knowledge Discovery and Data Mining.

[8]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[9]  Murad S. Taqqu,et al.  On the Self-Similar Nature of Ethernet Traffic , 1993, SIGCOMM.