Common practice to determine the required bandwidth capacity for a network link is to measure the 5 minute average link load and then add a safety margin to cater for traffic bursts on small time-scales. Because of the substantial measurement effort required to appropriately determine the effect of these bursts, network managers often rely on rules of thumb to find the safety margin, e.g. 'the mean plus 50%'. In this paper we propose a novel method to accurately determine the burstiness of traffic on small time-scales, without requiring measurements on such small time-scales. Instead, our method is based on coarse-grained polling of the occupancy of a buffer in front of the network link, and 'inverting' the resulting statistical distributio...
We study the effects of bursty Internet Traffic through simulations. Both short-range dependency (SR...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
Common practice to determine the required bandwidth capacity for a network link is to measure the 5 ...
Link dimensioning, i.e., selecting a (minimal) link capacity such that the users' performance requir...
Abstract—Link dimensioning, i.e., selecting a (minimal) link ca-pacity such that the users ’ perform...
Network link dimensioning is commonly performed through rules of thumb, using only five minute traff...
To dimension network links, such that they will not become QoS bottle- necks, the peak rate on these...
Bursty traffic causes excessive queuing delay and packet losses. Many researchers have proposed the ...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Link dimensioning is used by network operators to properly provision the capacity of their network l...
Available bandwidth knowledge is very useful to network protocols. Unfortunately, available bandwidt...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Packet sampling is needed to measure network traffic scalably at high speeds. While many sampled-bas...
We study the effects of bursty Internet Traffic through simulations. Both short-range dependency (SR...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...
Common practice to determine the required bandwidth capacity for a network link is to measure the 5 ...
Link dimensioning, i.e., selecting a (minimal) link capacity such that the users' performance requir...
Abstract—Link dimensioning, i.e., selecting a (minimal) link ca-pacity such that the users ’ perform...
Network link dimensioning is commonly performed through rules of thumb, using only five minute traff...
To dimension network links, such that they will not become QoS bottle- necks, the peak rate on these...
Bursty traffic causes excessive queuing delay and packet losses. Many researchers have proposed the ...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Link dimensioning is used by network operators to properly provision the capacity of their network l...
Available bandwidth knowledge is very useful to network protocols. Unfortunately, available bandwidt...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Traditional traffic measurements meter throughput on time scales in the order of 5 minutes, e.g., us...
Packet sampling is needed to measure network traffic scalably at high speeds. While many sampled-bas...
We study the effects of bursty Internet Traffic through simulations. Both short-range dependency (SR...
One of the tasks of network management is to dimension the capacity of access and backbone links. Ru...
Current bandwidth provisioning procedures for IP network links are mostly based on simple rules of t...