Statistical models of network traffic
DOI: 10.31673/2412-9070.2021.012734
DOI:
https://doi.org/10.31673/2412-9070.2021.012734Abstract
The article considers the issues of statistical modeling of traffic in telecommunication networks with packet switching. The simulation results are used in the development of network technical condition management systems, in particular, diagnostics, troubleshooting and network configuration management. The peculiarities of congestion control of separate network segments are emphasized. With improper analysis the overload condition can be mistaken for equipment failure. Therefore, control and elimination of congestion is a statistical task. The concept of end-to-end network diagnostics is considered. This concept provides for effective assessment of the quality of functioning of all network components taking into account their interrelationships. The main issues are the interaction of equipment, inefficient configuration, improper network organization and user operation. Methods of traffic statistical control characteristics based on perforated and marker bucket algorithms are analyzed. A feature of these algorithms is the formation of a strict output stream at a rate that does not depend on the non-uniformity of the input stream. The possibility of improving the token bucket algorithm by adapting to changes in the statistical characteristics of traffic is shown. To solve this problem, statistical mathematical models of network traffic are built. Data traffic circulating in telecommunication networks by packet switching has self-similar (fractal) properties. The self-similar process retains its properties when considered at different time scales (invariance to scale changes). The degree of statistical stability of the process with multiple scaling is determined by the Hirst parameter (the self-similarity parameter). Graphs of statistical characteristics of low-speed and high-speed data traffic are obtained. Their comparative analysis is carried out.
Keywords: telecommunication network; control; network status monitoring; end-to-end diagnostics; overload; self-similar traffic; perforated and marker bucket algorithms.
References
1. Stallings W. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud. Pearson Education, Inc., Old Tappan, New Jersey, 2016. 538 p.
2. Tanenbaum A. S., David J. Wetherall. Computer Networks / 5th Ed. Prentice Hall, Cloth, 2011. 960 p.
3. Виноградов Н. А., Зембицкая А. С. Анализ и расчет характеристик прохождения трафика данных в конвергированных сетях // Проблеми системного підходу в економіці. 2004. Вип. 9. С. 18–26.
4. Микитишин А. Г., Митник М. М., Стухляк П. Д. Телекомунікаційні системи та мережі. Тернопіль: Тернопіл. нац. техн. ун-т імені Івана Пулюя, 2017. 384 с.
5. ITU-T M.3010. Principles for a telecommunications management network. 2000.
6. ITU-T M.3400. TMN management function. 2000.
7. Стеклов В. К., Кільчицький Є. В. Основи керування мережами та послугами телекомунікацій. Київ: Техніка, 2002. 438 с.
8. Дымарский Я. С., Крутякова Н. П., Яновский Г. Г. Управление сетями связи: принципы, протоколы, прикладные задачи. Москва: ИТЦ «Мобильные коммуникации», 2003. 384 с.
9. Бестугин А. Р., Богданова А. Ф., Стогов Г. В. Контроль и диагностирование телекоммуникационных сетей. Санкт-Петербург: Политехника, 2003. 174 с.
10. Торошанко Я. И., Танцюра Л. И., Дёмина Л. А. Ретроспективная идентификация информационных и управляющих сигналов в интеллектуальных сетях связи // Наук. праці ОНАЗ ім. О. С. Попова. 2015. №2. С. 111–115.
11. Эйкхофф П. Основы идентификации систем управления. Москва: Мир, 1975. 683 с.
12. Бигелоу С. Сети: поиск неисправностей, поддержка и восстановление. Санкт-Петербург: БХВ-Петербург, 2005. 1200 с.
13. Крук Б. И., Попантонопуло В. Н., Шувалов В. П. Телекоммуникационные системы и сети. Т. 1 – Современные технологии / под ред. проф. В. П. Шувалова. Москва: Горячая линия – Телеком, 2003. 647 с.
14. Гельфандбейн Я. А., Колосов Л. В. Ретроспективная идентификация возмущений и помех. Москва: Сов. радио, 1972. 232 с.
15. Идентифицируемые модели [Електронний ресурс]. URL: http://www.sardismusic.com/topics/t5r4part3.html.
16. Уилсон Э. Мониторинг и анализ сетей. Методы выявления неисправностей. Москва: Лори, 2002. 363 с.
17. Policing and Shaping Overview // Cisco IOS QoS Solutions Configuration Guide QC-222 [Електронний ресурс]. URL: https://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfpolsh.pdf.
18. Comparing Traffic Policing and Traffic Shaping for Bandwidth Limiting [Електронний ресурс]. URL: https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-policing/19645-policevsshape.html.
19. A Service Curve of Hierarchical Token Bucket Queue Discipline on Soft-Ware Defined Networks Based on Deterministic Network Calculus: An Analysis and Simulation / Shuangyin Ren, Quanyou Feng, Yu Wang, Wenhua Dou // J. of Advances in Computer Networks. June 2017. Vol. 5, No. 1. P. 8–12.
20. Столлингс В. Современные компьютерные сети. Санкт-Петербург: Питер, 2003. 783 с.
21. Internet traffic archive [Електронний ресурс]. URL: http://ita.ee.lbl.gov.
22. On the Self-Similar Nature of Ethernet Traffic (Extended Version) / W. Leland, M. Taqqu, W. Willinger, D. Wilson // IEEE/ACM Transactions on Networking. February. 1994. No. 2(1). P. 1–15.