期刊文献+

网络流量建模的物理解读 被引量:1

A Physical Remark on Modeling Network Traffic
下载PDF
导出
摘要 对目前网络建模的若干热点模型进行必要的物理解释,对这些模型在反映实际流量的精确性方面给出评价。最后把注意力集中在一种多重结构的模型上,从网络运行的物理机制角度,论述这种建模方法的可行性。 Several popular models which have presented are physically explained. Their accuracy in reflecting the real network traffic will be evaluated. A model with multi-resolution structure is presented. The methodology and validity of the model will be demonstrated through network mechanism.
出处 《科学技术与工程》 2006年第9期1239-1247,共9页 Science Technology and Engineering
基金 广东省自然科学基金(31391)资助
关键词 网络流量 建模 INTERNET network traffic modeling internet
  • 相关文献

参考文献55

  • 1[1]Leland W S,Taqqu M,Willinger W,Wilson D.On the self-similar nature of ethernet traffic,IEEE/ACM Trans.Networking,1994; 2(1):1-15
  • 2[2]Leland W,Taqqu M S,Willinger W,Wilson D.On the self-similar nature of ethernet traffic (extended version) ACM/SIGCOMM 93.Computer Communication Review,1993 ;23:183-193
  • 3[3]Mannersalo P.Gaussian and multifractal processes in teletraffic Theory.PhD dissertation,ESPOO2003,VTT Publications 491,ISBN951-6037-X (URL:http://www.inf.vtt.inf/pdf/)
  • 4[4]Erramilli A,Roughan M,Veitch D,Willinger W.Self-similar traffic and network dynamics,Procedings of the IEEE,May 2002:90 (5):
  • 5[5]Capp O,Moulines E,et al,Long-range dependence and heavy-tail modeling for teletraffic data.January 23,2002,cappe@ tsi.enst.fr
  • 6[6]Wu G,Chong E K P,Givan R.Congestion control via online sampling.Proceedings of the 2001 IEEE Infocom Anchorage,AK,April22-26,2001 ;1271-1280
  • 7[7]Wang S,Xuan D,Bettati R,et al.Providing absolute differentiated services for real time application in static priority scheduling Net works.Proceedings of the 2001 IEEE Infocom Anchorage,AK,April 22-26,2001
  • 8[8]Feldmann A,Greenberg A,Lund C,et al.Net scop:traffic engineering for IP networks.IEEE Network Magazine,March 2000
  • 9[9]Hellerstein J L,Zhang F,Shahabuddin P.An approach to predictive dectection for service management.Proceedings of the IEEE International Conference on Systems and Network Management.1999
  • 10[10]Handley M,Kreibich C,Paxson V.Network intrusion detection:evasion,traffic normalization,and End 2 to 2 end protocol semantics.Proceedings of 10th USENIX Security Symposium,Washington DC,August 13-17.2001

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部