2010
DOI: 10.15837/ijccc.2010.5.2240
|View full text |Cite
|
Sign up to set email alerts
|

Discussion of the Analysis of Self-similar Teletraffic with Long-range Dependence (LRD) at the Network Layer Level

Abstract: Traffic streams, sources as well as aggregated traffic flows, often exhibit long-range-dependent (LRD) properties. This paper presents the theoretical foundations to justify that the behavior of traffic in a high-speed computer network can be modeled from a self-similar perspective by limiting its scope of analysis to the network layer, since the most relevant properties of self-similar processes are consistent for use in the formulation of traffic models when performing this specific task.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
20
0
14

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 24 publications
(34 citation statements)
references
References 41 publications
0
20
0
14
Order By: Relevance
“…This paper presents an experimental application that validates the hypothesis of [1]. Considering a real network scenario implemented under IEEE standard 802.3u, traffic capture experiments are performed and then analyzed, restricting the results according to the precepts presented above as well as in [1]. This paper is therefore centered on showing the validity of the analysis of restricted self-similar traffic at the network layer level as a simple and efficient tool to study the behavior of traffic flow in present day high speed computer networks.…”
Section: Introductionmentioning
confidence: 54%
See 2 more Smart Citations
“…This paper presents an experimental application that validates the hypothesis of [1]. Considering a real network scenario implemented under IEEE standard 802.3u, traffic capture experiments are performed and then analyzed, restricting the results according to the precepts presented above as well as in [1]. This paper is therefore centered on showing the validity of the analysis of restricted self-similar traffic at the network layer level as a simple and efficient tool to study the behavior of traffic flow in present day high speed computer networks.…”
Section: Introductionmentioning
confidence: 54%
“…Also, application level self-similar traffic can be managed in the context of the resource assignment admission control subjected to service quality guarantees, since it is independent of the network conditions through which it is sent. This paper presents an experimental application that validates the hypothesis of [1]. Considering a real network scenario implemented under IEEE standard 802.3u, traffic capture experiments are performed and then analyzed, restricting the results according to the precepts presented above as well as in [1].…”
Section: Introductionmentioning
confidence: 91%
See 1 more Smart Citation
“…Las propiedades que evidencian la naturaleza de origen fractal de los flujos de tráfico en las redes de computadoras de alta velocidad, es un tema que ha sido ampliamente reportado en la literatura durante las últimas dos décadas; constituyendo una opinión generalizada el hecho de que su comportamiento dinámico re-escalado debe ser cuidadosamente atendido en los análisis de rendimiento y control. Existen, de esta forma, numerosas explicaciones y modelos que intentan entregar una respuesta a este origen [1]- [3].…”
Section: Introductionunclassified
“…Las propiedades que evidencian la naturaleza de origen fractal de los flujos de tráfico en las redes de computadoras de alta velocidad son un tema que ha sido ampliamente estudiado y reportado en la literatura durante las últimas dos décadas, constituyendo una opinión generalizada el hecho de que su comportamiento dinámico reescalado debe ser cuidadosamente atendido en los análisis de rendimiento y control. Existen, de esta forma, numerosas explicaciones y modelos que intentan responder a este origen [1][2][3].…”
Section: Introductionunclassified