To dimension network links, such that they will not become QoS bottle- necks, the peak rate on these links should be known. To measure these peaks on sufficiently small time scales, special measurement tools are needed. Such tools can be quite expensive and complex. Therefore network operators often rely on more cheap, standard tools, like MRTG, which were designed to measure average traffic rates (m) on time scales such as 5 minutes. For estimating the peak traffic rate (p), operators often use simple rules, such as p = α · m. In this paper we describe measurements that we have performed to investigate how well this rule describes the relation between peak and average traffic rate. In addition, we pro- pose some more advanced rules, and co...
Getting good statistical models of traffic on network links is a well-known, often-studied problem. ...
htmlabstractOne of the tasks of network management is to dimension the capacity of access and backbo...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
Network link dimensioning is commonly performed through rules of thumb, using only five minute traff...
Common practice to determine the required bandwidth capacity for a network link is to measure the 5 ...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
To offer users a sufficient performance level, network links should be properly provisioned. The req...
Getting good statistical models of traffic on network links is a well-known, often-studied problem. ...
We present procedures and tools for the analysis of network traffic measurements. The tools consist ...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
We present procedures and tools for the analysis of network traffic measurements. The tools consist ...
The first part of the paper is devoted to a transient analysis of traffic generated by bursty source...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Getting good statistical models of traffic on network links is a well-known, often-studied problem. ...
htmlabstractOne of the tasks of network management is to dimension the capacity of access and backbo...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
Network link dimensioning is commonly performed through rules of thumb, using only five minute traff...
Common practice to determine the required bandwidth capacity for a network link is to measure the 5 ...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
To offer users a sufficient performance level, network links should be properly provisioned. The req...
Getting good statistical models of traffic on network links is a well-known, often-studied problem. ...
We present procedures and tools for the analysis of network traffic measurements. The tools consist ...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
We present procedures and tools for the analysis of network traffic measurements. The tools consist ...
The first part of the paper is devoted to a transient analysis of traffic generated by bursty source...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Getting good statistical models of traffic on network links is a well-known, often-studied problem. ...
htmlabstractOne of the tasks of network management is to dimension the capacity of access and backbo...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...