scispace - formally typeset
Search or ask a question
Topic

Network traffic simulation

About: Network traffic simulation is a research topic. Over the lifetime, 4535 publications have been published within this topic receiving 74606 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The experimental results show that M2M traffic exhibits significantly different patterns than smartphone traffic in multiple aspects, and suggest that better protocol design, more careful spectrum allocation, and modified pricing schemes may be needed to accommodate the rise of M1M devices.
Abstract: Cellular network-based machine-to-machine (M2M) communication is fast becoming a market-changing force for a wide spectrum of businesses and applications such as telematics, smart metering, point-of-sale terminals, and home security and automation systems. In this paper, we aim to answer the following important question: Does traffic generated by M2M devices impose new requirements and challenges for cellular network design and management? To answer this question, we take a first look at the characteristics of M2M traffic and compare it to traditional smartphone traffic. We have conducted our measurement analysis using a week-long traffic trace collected from a tier-1 cellular network in the US. We characterize M2M traffic from a wide range of perspectives, including temporal dynamics, device mobility, application usage, and network performance. Our experimental results show that M2M traffic exhibits significantly different patterns than smartphone traffic in multiple aspects. For instance, M2M devices have a much larger ratio of uplink-to-downlink traffic volume, their traffic typically exhibits different diurnal patterns, they are more likely to generate synchronized traffic resulting in bursty aggregate traffic volumes, and are less mobile compared to smartphones. On the other hand, we also find that M2M devices are generally competing with smartphones for network resources in co-located geographical regions. These and other findings suggest that better protocol design, more careful spectrum allocation, and modified pricing schemes may be needed to accommodate the rise of M2M devices.

164 citations

Patent
27 Jun 1997
TL;DR: In this article, a system and a method are proposed to estimate degradation of performance of a wireless network such that degradation in performance, as measured by such performance parameters as data throughput and service availability is estimated accurately on a real time basis.
Abstract: A system and method monitors a wireless network such that degradation of performance, as measured by such performance parameters as data throughput and service availability is estimated accurately on a real time basis. The system (102) and method scan each cell of MDIS (106) in each location (104) of a wireless telecommunications network for cell statistics data. Using the scanned cell statistics data (108), the system and method generate a model of the performance of the telecommunications network by modeling each cell in the network. The model is based on a control system relationship. Using the control system relationship, the system and method forecast the performance of the cells between actual data collection times. Forecasting the state of the cells reduces the amount of data required to monitor the telecommunications network.

162 citations

Journal ArticleDOI
James Roberts1
TL;DR: It is argued that traffic theory, an essential component in the design of traditional telecommunications networks, should be increasingly applied in the development of the multiservice Internet.
Abstract: We argue that traffic theory, an essential component in the design of traditional telecommunications networks, should be increasingly applied in the development of the multiservice Internet. We discuss the statistical characteristics of Internet traffic at different time scales. Modeling is facilitated on identifying the notion of flow and distinguishing the categories of streaming and elastic traffic. We review mathematical modeling approaches useful for predicting the relationship between demand, capacity and performance for both streaming and elastic flows. Derived results indicate the limitations of service differentiation as a means for guaranteeing QoS and highlight the importance of traditional traffic engineering approaches in ensuring that the network has sufficient capacity to handle offered demand.

160 citations

Journal ArticleDOI
TL;DR: This article proposes a multi-agent behavioral model based on the opportunistic individual behaviors that describe the norm violation and the anticipatory individual abilities of simulated drivers that allow critical situations to be detected that has been validated for different traffic scenarios.

155 citations

Journal ArticleDOI
05 Jul 2006
TL;DR: With these tools, researchers no longer need make arbitrary decisions on how traffic is generated in simulations and can instead easily generate TCP traffic that represents the use of a net-work by the full mix of applications measured on actual network links of interest.
Abstract: In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "looks like" traffic found on an actual network. We describe such a traffic generation system for the widely used ns-2 simulator. The system takes as input a packet header trace taken from a network link of interest. The trace is "reverse compiled" into a source-level characterization of each TCP connection present in the trace. The characterization, called a connection vector, is then used as input to an ns module called tmix that emulates the socket-level behavior of the source application that created the corresponding connection in the trace. This emulation faithfully reproduces the essential pattern of socket reads and writes that the original application performed without knowledge of what the original application actually was. When combined with a network path emulation component we have constructed called DelayBox, the resulting traffic generated in the simulation is statistically representative of the traffic measured on the real link. This approach to synthetic traffic generation allows one to automatically repro-duce in ns the full range of TCP connections found on an arbitrary link. Thus with our tools, researchers no longer need make arbitrary decisions on how traffic is generated in simulations and can instead easily generate TCP traffic that represents the use of a net-work by the full mix of applications measured on actual network links of interest. The method is evaluated by applying it to packet header traces taken from campus and wide-area networks and comparing the statistical properties of traffic on the measured links with traffic generated by tmix in ns.

155 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
85% related
Server
79.5K papers, 1.4M citations
83% related
Wireless network
122.5K papers, 2.1M citations
83% related
Wireless sensor network
142K papers, 2.4M citations
83% related
Node (networking)
158.3K papers, 1.7M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202312
202255
20212
20202
20195
201815