Network arrivals are often modeled as Poisson processes for ana-lytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. We eval-uate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTP data con-nection arrivals within FTP sessions, and TELNET packet arrivals) to determine the error introduced by modeling them using Poisson processes. We find that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson pro-cesses with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson; that modeling TELNET packet interarrivals as expone...
In this thesis, we reexamine the long discussion on which model is suitable for studying Internet tr...
Marcel Neuts Prize 2003International audienceThe infinite source Poisson model is a fluid queue appr...
We study the burstiness of TCP flows at the packet level. We aggregate packets into entities we call...
Network arrivals are often modeled as Poisson processes for ana-lytic simplicity, even though a numb...
Network arrivals are often modeled as Poisson processes for ana-lytic simplicity, even though a numb...
Numerous studies have shown that the process of packet arrivals from Web traffic exhibits strong lon...
Measurements of local and wide-area network trafc in the 90's established the relation between ...
We propose a two level model for TCP connection ar-rivals in local area networks. The first level ar...
We analyze 2.5 million TCP connections that occurred during 14 wide-area traffic traces. The traces ...
In this paper, we characterize wide-area network applications that use the TCP transport protocol. W...
Abstract—The relation between burstiness and self-similarity of network traffic was identified in nu...
The infinite source Poisson model is a fluid queueapproximation of network data transmission thatass...
Abstract- It is now well known that Internet traffic exhibits self-similarity, which cannot be descr...
This paper discusses the dimensioning of buffers and the bandwidth allocation for data traffic in th...
In this paper, we characterize wide-area network applications that use the TCP transport protocol. W...
In this thesis, we reexamine the long discussion on which model is suitable for studying Internet tr...
Marcel Neuts Prize 2003International audienceThe infinite source Poisson model is a fluid queue appr...
We study the burstiness of TCP flows at the packet level. We aggregate packets into entities we call...
Network arrivals are often modeled as Poisson processes for ana-lytic simplicity, even though a numb...
Network arrivals are often modeled as Poisson processes for ana-lytic simplicity, even though a numb...
Numerous studies have shown that the process of packet arrivals from Web traffic exhibits strong lon...
Measurements of local and wide-area network trafc in the 90's established the relation between ...
We propose a two level model for TCP connection ar-rivals in local area networks. The first level ar...
We analyze 2.5 million TCP connections that occurred during 14 wide-area traffic traces. The traces ...
In this paper, we characterize wide-area network applications that use the TCP transport protocol. W...
Abstract—The relation between burstiness and self-similarity of network traffic was identified in nu...
The infinite source Poisson model is a fluid queueapproximation of network data transmission thatass...
Abstract- It is now well known that Internet traffic exhibits self-similarity, which cannot be descr...
This paper discusses the dimensioning of buffers and the bandwidth allocation for data traffic in th...
In this paper, we characterize wide-area network applications that use the TCP transport protocol. W...
In this thesis, we reexamine the long discussion on which model is suitable for studying Internet tr...
Marcel Neuts Prize 2003International audienceThe infinite source Poisson model is a fluid queue appr...
We study the burstiness of TCP flows at the packet level. We aggregate packets into entities we call...