ArticlePDF Available

Abstract and Figures

Jitter is recognized as an important phenomenon that degrades the communication performance. Particularly, in real time services such as voice and video over the Internet, there is evidence that jitter departs from already proposed Laplacian models and that it has a heavy tail behavior. In this paper, we show that an Alpha-Stable jitter model is adequate, and that in some cases the Cauchy distribution provides a satisfactory approximation. Furthermore, this work shows how the jitter dispersion increases with the number of hops in the path, following a power law with scaling exponent dependent on the index of stability ¿. This allows us to predict the expected QoS in terms of the number of nodes and traffic parameters.
Content may be subject to copyright.
IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 2, FEBRUARY 2010 1
Jitter in IP Networks: A Cauchy Approach
L. Rizo-Dominguez, D. Torres-Roman, D. Munoz-Rodriguez, and C. Vargas-Rosales, Senior Member, IEEE
Abstract—Jitter is recognized as an important phenomenon
that degrades the communication performance. Particularly, in
real time services such as voice and video over the Internet, there
is evidence that jitter departs from already proposed Laplacian
models and that it has a heavy tail behavior. In this paper, we
show that an Alpha-Stable jitter model is adequate, and that
in some cases the Cauchy distribution prov ides a satisfactory
approximation. Furthermore, this work shows how the jitter
dispersion increases with the number of h ops in the path,
following a power law with scaling exponent dependent on the
index of stability 𝛼. This allows us to predict the expected QoS
in terms of the number of nodes and trafc parameters.
Index Terms—Alpha-stable model, jitter, QoS.
I. INTRODUCTION
A
S mistiming is a major concern in telecommu nication
systems; it has been addressed, in the literature, from
different perspectives. Since jitter impair s severely real-time
applications such as videoconferencing, network g aming, VoIP
(Voice over IP) and VIP (Video over IP), among others, delay
and packet loss have been studied extensively. For instance,
Fulton and Li, [1], deal with delay in ATM networks, while
Qiong and Mills, [2], consider the jitter-bound estimation
problem from the TCP perspective; and Daniel, et. al., [3],
consider the Round Trip Time (RTT) in the Internet environ-
ment and suggest a Laplacian model.
For this study an ample data set of network delay measure-
ments was obtained and examined. Conducted observations
show that jitter has a behavior that departs from the Laplacian
distribution, [3], thus a jitter model that matches the heavy
tail behavior exhibited by packets traveling in the network
is proposed. The model helps to determine the maximum
number of allowable hops in an end-to-end path maintaining
a specied QoS. This information is relevant for routing
purposes, and for resource assignment and reservation. We
describe the heavy tail jitter observations by a general alpha-
stable representation, and show a description based on the
Cauchy distribution that provides an accurate approximation.
Applicability to QoS is also presented, and r esults comparing
against network measurements, show strong agreement. The
proposed jitter model is described in Section II. The evaluation
scenarios are presented in Section III. The jitter accumulation
law and its validation are introduced in Section IV. QoS based
Manuscript received March 24, 2009. The associate editor coordinating the
re view of this letter and approving it for publication was N. Nikolaou.
This work was partially sponsored by CONACyT
L. Rizo and D. Torres are with Research Center and Advanced
Studies, CINVESTAV, Guadalajara, Jal., Mxico (e-mail: {lrizo, dtor-
res}@gdl.cinvestav.mx).
D. Munoz and C. Vargas-Rosales are with ITESM-Campus Monterrey,
Monterrey, N.L., 64849, Mexico (e-mail: {dmunoz, cvar gas}@itesm.mx).
Digital Object Identier 10.1109/LCOMM.2010.02.090702
on the proposed model is discussed in Section V. Concluding
remarks are given in Section VI.
II. J
ITTER MODEL
Jitter is dened as the difference of the trip d elays of
consecutive packets in an end-to-end connection. Under ideal
conditions, all packets should undergo the same delay. How-
ever, due to trafc queueing, processing time variations in the
nodes and even route changes, packets experience jitter, which
can be expressed as
𝐽
𝑁
(𝑘)=𝐷
𝑁
(𝑘) 𝐷
𝑁
(𝑘 1), (1)
where 𝐷
𝑁
(𝑘) is the delay of the 𝑘-th packet as observed in the
𝑁-th node. A negative jitter is known as a packet clustering
phenomenon, and a positive is known as packet spreading. Let
𝜉
𝑖
(𝑘) be the 𝑖-th stage deterministic delay (i.e., propagation,
and processing times), and 𝑊
𝑖
(𝑘) be the 𝑖-th stage random
delay (i.e., queueing and route change phenomena), then the
end-to-end delay through the 𝑁 hops of the path is given by
𝐷
𝑁
(𝑘)=
𝑁
𝑖=1
[𝜉
𝑖
(𝑘)+𝑊
𝑖
(𝑘)]. (2)
Several studies have shown that network trafc exhibits
long range dependence, [4]; this implies, according to [5],
that the waiting time 𝑊
𝑖
(𝑘) in the queue is he avy tailed.
This has been revealed through delay measurements whose
distribution exhibits a Paretian behavior, [7]; and in 1925 L´evy
showed, [8], that Pareto laws belong to the so-called stable-
Paretian or stable non-Gaussian distribu tions. This implies that
𝑊
𝑖
(𝑘) can be modeled by an alpha-stable distribution
1
[6], and
then 𝐷
𝑁
(𝑘), in (2), converges to an alpha-stable distribution
[6] as well when 𝑊
𝑖
(𝑘) are independent. This independence
assumption is discussed in Section IV.
It is known that if two alpha-stable random variables are
independent, then their difference is also alpha-stable, [6].
Thus, jitter becomes alph a -stable with characteristic function
given by a symmetrical distribution with 𝜇 =1,𝛽=0,as
𝐶
𝛾,𝜇
𝛼,𝛽
(𝜁)
𝐽
𝑁
(𝑘)
= 𝑒𝑥𝑝(𝛾
𝛼
𝜁
𝛼
). (3)
1
𝐷
𝑁
(𝑘) has an alpha-stable distribution if its characteristic function is, [6],
𝐶
𝛾,𝜇
𝛼,𝛽
(𝜁)
𝐷
𝑁
(𝑘)
= exp(𝑗𝜇𝜁 𝛾
𝛼
𝜁
𝛼
[1 𝑗𝛽𝑠𝑖𝑔𝑛(𝜁)𝜔(𝜁, 𝛼)]),
𝜔(𝜁, 𝛼)=
{
𝑡𝑎𝑛
(
𝛼𝜋
2
)
,𝛼=1,
2
𝜋
𝑙𝑜𝑔𝜁,𝛼=1,
where 𝛼 is the index of stability, 𝛾 the dispersion parameter, 𝛽 the skewness
parameter and 𝜇 the shift parameter . There are three closed forms of alpha-
stable distributions: the Gaussian distribution when 𝛼 =2, the Cauchy dis-
tribution when 𝛼 =1,𝛽=0, and Levy distribution when 𝛼 =0.5,𝛽=1.
1089-7798/10$25.00
c
2010 IEEE
2 IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 2, FEBRUARY 2010
-20
-15
-10
-5
0
i
tter CCDF
M easurem ent
lh tbl (Ch)
-8 -6 -4 -2 0 2 4 6
-40
-35
-30
-25
log jitter (ms
)
log J
i
a
l
p
h
a-s
t
a
bl
e
(C
auc
h
y
)
G aussian
E xponential
Fig. 1. Jitter survival tting.
III. EVA L UAT I O N SCENARIOS
In order to present a realistic jitter model, extensive delay
measurements were conducted for several hops and p aths. The
observation setup involved international destinations located
at six countries in different continents: Argentina, Australia,
Japan, Mexico, France and USA. All packets traveled through
the USA. A set of some 7.2 million measur ements taken
along a 24-day period was examined. A description o f the
experiment and r ecorded data are available in [9]. The survival
tail was studied, and typical results are presented in Figure 1;
it can be seen that jitter does not t the Laplacian nor Gaussian
models, but tail exhibits a slow decay.
From a practical perspective, system performance forecast
based on alpha-stable modeling can be cumbersome due to
the inverse transform of the characteristic function, which
does not have a close expression, but for very limited values
of the stability indexes. However, observations show that the
parameter can be close to one, thus Cauchy distribution can be
considered, [10]. Figure 2 shows an example of a normalized
histogram of the parameter alpha in a 21-node path, where the
mean stability index is 𝐸(𝛼)=0.9716
IV. J
ITTER ACCUMULATION LAW
The packet delay experienced in a hop is dependent upon
the previous unprocessed trafc in the node. However, only a
proportion of the arriving packets will have that node as nal
destination, while the remaining packets will be forwarded to
other routes [11]. Since, only a fraction of the packets travels
to the next node of the path, and due to the process of cross
trafc sources, the delay from node to node exhibits a small
correlation .
The multiplexing process at the nodes allows rebuilding an
independence assumption, [12], so that the delays in the nodes
tend to be independent as trafc and connectivity increase.
Then, according to (2) and (3), the jitter accumulated in an
𝑁 hop path will have a dispersion 𝛾
𝑝
= 𝛾𝑁
1/𝛼
,where𝛾 is
the jitter d ispersion in a single node, in a homogeneous jitter
scenario, i.e., 𝛾
𝑖
= 𝛾. The experimental observations show that
although, the network environment may not be homogeneous,
0.08
0.1
0.12
0.14
e
Frecuenc
y
0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
0.02
0.04
0.06
α
Relativ
e
Fig. 2. Normalized histogram of alpha.
0.15
0.2
0.25
γ
M easurem ents M ex-USA-Australia
pow er law
γ
p
=E(
γ
i
)N
1/E(
α
)
M easurem ents M ex-USA-Japan
pow er law
γ
p
=E(
γ
i
)N
1/E(
α
)
0 5 10 15 20 25
0
0.05
0.1
hop
Fig. 3. Jitter dispersion (𝛾) vs. number of hops (𝑁).
jitter disp ersion grows as a power law function of the number
of nodes in the path. Figure 3 shows the comparison of the
observed jitter dispersion growth along a 21-node path and
the proposed model, note that 𝛾 Σ𝛾
𝑖
/𝑁 ,and𝛼 Σ𝛼
𝑖
/𝑁 .
This is 𝛾
𝑝
= 𝐸(𝛾
𝑖
)𝑁
1/𝐸(𝛼)
.
V. J
ITTER-QOSBASED ON PROPOSED MODEL
To illustrate the use of the model, we consider as QoS,
among other criteria, [13], that the mean jitter be less than 30
ms for VoIP, and be kept under a maximum value 𝐽
𝑚𝑎𝑥
for
at least 99% of the transmitted packets. 𝐽
𝑚𝑎𝑥
is set at 30 ms
for VIP services. However, in heavy tail environments mean
and variance may diverg e and constraint 𝐽
𝑚𝑎𝑥
may be more
appropriately described in terms of distribution percentiles.
This is 𝑄
𝑜
𝑆 𝑃 (𝐽
𝑁
∣≤𝐽
𝑚𝑎𝑥
). For alpha-stable jitter
distributions, this can be expressed as the innite series, [14],
𝑃 (𝐽
𝑁
∣≤𝐽
𝑚𝑎𝑥
)=
2
𝜋𝛼
𝑘=1
Γ(1+𝜓(𝛼,𝑘))(𝐽
𝑚𝑎𝑥
𝛾
𝑝
(𝑛))
𝛼𝑘
𝑘𝑘!
sin
𝛼𝜋𝑘
2
,
(4)
RIZO-DOMINGUEZ et al.: JITTER IN IP NETWORKS: A CAUCHY APPROACH 3
0.97
0.98
0.99
1
e
r
|
<=30m s
)
M easurem ents Mex-USA-France
C auchy Approach
0 5 10 15 20 2
0.94
0.95
0.96
hop (N)
P(
|
jitt
e
Fig. 4. 𝑃 (𝐽
𝑁
∣≤𝐽
𝑚𝑎𝑥
) vs Number of nodes.
Fig. 5. Regions of jitter-QoS, for 𝐽
𝑚𝑎𝑥
=30ms.
𝜓(𝛼, 𝑘)=
𝛼𝑘, 0 <𝛼<1,
𝑘/𝛼, 1 𝛼<2,
(5)
where Γ is the gamma function. It has been shown that when
𝛼 1, a Cauchy distribution is an adequate approximation
and the QoS requirement can be expressed as
𝑄
𝑜
𝑆 𝑃 (𝐽
𝑁
∣≤𝐽
𝑚
𝑎𝑥)=
2arctan(𝐽
𝑚𝑎𝑥
/𝛾
𝑝
(𝑁))
𝜋
. (6)
Figure 4 sh ows the percent of observed packets with a jitter
below 30 ms for a given hop length in path Mex-USA-France;
we see that (6) provides a good QoS approximation.
Also, substituting in (6) the cumulative dispersion 𝛾
𝑝
(𝑁)=
𝐸(𝛾
𝑖
)𝑁
1/𝐸(𝛼)
, the maximum number of hops 𝑁 to guarantee
a jitter-QoS level is given by
𝑁<
𝐽
𝑚𝑎𝑥
𝐸(𝛾
𝑖
)𝑡𝑎𝑛(𝜋𝑄
𝑜
𝑆/2)
𝐸(𝛼)
. (7)
Since we consider the Cauchy distribution, 𝐸(𝛼)=1.
In practice, routing protocols must consider the maximum
number of hops 𝑁 permitted in a path as a QoS criterion.
This relationship is illustrated in Figure 5 fo r a QoS = 0.99,
0.96, 0.98 and 0.94 as a f unction of the mean jitter dispersion.
The presented model captures the heavy tail behavior and the
dispersion of jitter for different nodes in a path, and describes
as well the jitter-QoS for N nodes.
VI. C
ONCLUSIONS
In this paper, an IP network alpha-stable jitter model that
exhibits a better t than that of the exponential formulation
was p resented. It was shown through measurements that jitter
is better described with our alpha-stable model by comparing
it to network measurements.
When the stability index has a mean value close to one, a
simplied model based on the Cauchy distribution is adequate.
Jitter dispersion follows a power law of the number of nodes
in the path with scaling exponent given by the stability index.
The proposed models permit the estimation of jitter-QoS as
a function of the number of nodes in the path, the stability
index and the jitter dispersion.
R
EFERENCES
[1] C. A. Fulton, and S. Li, “Delay jitter rst-order and second-order
statistical functions of general trafc on high-speed multimedia networks,
IEEE/ACM Trans. Networking, vol. 6, pp. 150-163, Apr. 1998.
[2] L. Qiong and D. Mills, “Jitter-based delay-boundary prediction of wide-
area networks, IEEE/ACM Trans. Networking, vol. 9, pp. 578590, Oct.
2001.
[3] E. J. Daniel, C. M. White, and K.A. T eague, An inter-arrival delay jitter
model using multi-structure network delay characteristics for packet net-
works, in Proc. Conf. on Signals, Systems and Computers, pp. 17381742,
2003
[4] W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, “On the self-
similar nature of Ethernet trafc (extended version), IEEE/ACM Trans.
Networking, vol. 2, pp. 1-15, Feb. 1994.
[5] S. Resnick and G. Samorodnitsky, “Performance decay in a single server
exponential queueing model with long range dependence, Operations
Research, pp. 235-243, Mar.Apr. 1997.
[6] G. Samorodnistsky and M. S. Taqqu, Stable Non-Gaussian Random Pr o-
cesses: Stochastic Models with Innite Variance. Chapman and Hall/CRC,
1994.
[7] SLAC (July 2009), Round Trip Delay Distribution between SLAC and
CERN. [Online]. Ava ilable: http://www.slac.stanford.edu/comp/net/wan-
mon/resp-jitter.html
[8] N. Johnson, S. Kotz, and N. Balakrishnan, Continuous Univariate Dis-
tributions, vol. 1. John Wiley and Sons, pp. 56-60, 1994.
[9] L. Rizo-Dominguez, “Jitter modeling for wide area networks, Technical
Report CVSTV 0809, Guadalajara, Mexico, CINVESTAV, Aug. 2008.
[10] L. Rizo, D. Torres, J. Dehesa, and D. Muoz, “Cauchy distribution
for jitter in IP networks, in Proc. 18th International Conference on
Electronics, Communications and Computers (CONIELECOMP ’08), pp.
35-40, 2008.
[11] R. Pastor-Satorras, A. Vzquez, and A. Vespignani, “Dynamical and
correlation properties of the Internet, Physical Review Lett.,vol.87,pp.
1-4, Dec. 2001.
[12] M. Schwartz, BroadBand Integr ated Networks. Prentice Hall, 1996.
[13] The Cisco website (Oct. 2007), Enterprise QoS Solution
Reference Network Design Guide. [Online]. Available:
http://www.cisco.com/univercd/cc/td/doc/solution/esm/qossrnd.pdf
[14] W. Feller, An Introduction to Probability Theory and its Applications,
vol. 2. New York: Wiley, pp. 581-583, 1970.
... Rizo-Dominguez et al. [19] focus on RTT jitter, that is, the difference between consecutive measurements, of RTT. Jitter is particularly important for real-time services such as video or voice transmission, since fluctuations in the intervals between arrivals of packets impact user experience as well as buffer requirements. ...
... We further isolated all measurements between this AS and its most accessed provider in order to study the distribution of RTT jitter. We want to confirm the Cauchy behavior as mentioned in [19], which is relevant for real-time applications in particular. ...
Conference Paper
End-to-end round-trip times (RTTs), which measure the time when the source transmitted data and when it received confirmation that the data was received, have been used by several Internet applications and protocols as a way to estimate network load and congestion. However, the Internet's ever increasing size and complexity pose many challenges to the study of the RTT. RTT's stochastic nature combined with diverse network topologies, technologies, and workloads are part of the problem, as well as difficulty in acquiring representative RTT samples or testing how RTT measurements are affected by changes in protocols. As part of the answer to these challenges, this paper presents a characterization study of RTT traces collected from both real- as well as simulated networked environments. We verify that temporal- and spatial factors cause RTT behavior to exhibit particular trends. Using rigorous analytical methodology, we also confirm that RTT distributions can be modeled as a power law. We then use RTT power law statistics to validate and fine-tune simulation environments.
... In this case, the throughput of each routing protocol in terms of the number of messages delivered per second is evaluated.  Jitter: It is the variation in latency measured in the variability over time of the packet latency across a [16]. Jitter is a significant QoS factor in the calculation of network performance. ...
Article
Full-text available
A heterogeneous network offers multiple devices to connect with different network architectures, protocols, and operating systems. These networks can serve a small firm or organization efficiently. A heavy network set-up can be a significant financial burden for small organizations. This paper suggests a heterogeneous network model that can serve a small organization. The model is designed and simulated in OMNET++ 4.6. End-to-end delay and the packet error rate are used to estimate the performance evaluation of the proposed model. A simulation study reveals that the model can serve better when the number of users is 50 to 75. Since the minimum end-to-end delay is observed as 4.854*10-3 s and the packet error rate is 0.126*10-4 s for several 50 users.
... Jitter, t j , as the deviation in latency, t l , can be determined by the standard deviation of latency as (15). This is because packets traversing the same network experience different amounts of latency [35]. ...
Article
Full-text available
This paper examines the quantitative and qualitative situation of the current fixed and mobile Internet and its expected future. It provides a detailed insight into the past, present, and future of the Internet along with the development of technology and the problems that have arisen in accessing and using broadband Internet. First, the number of users and penetration rate of the Internet, the various types of services in different countries, the ranking of countries in terms of the mean and median download and upload Internet data speeds, Internet data volume, and number and location of data centers in the world are presented. The second task introduces and details twelve performance evaluation metrics for broadband Internet access. Third, different wired and wireless Internet technologies are introduced and compared based on data rate, coverage, type of infrastructure, and their advantages and disadvantages. Based on the technical and functional criteria, in the fourth work, two popular wired and wireless Internet platforms, one based on optical fiber and the other based on the 5G cellular network, are compared in the world in general and Australia in particular. Moreover, this paper has a look at Starlink as the latest satellite Internet candidate, especially for rural and remote areas. The fifth task outlines the latest technologies and emerging broadband Internet-based services and applications in the spotlight. Sixthly, it focuses on three problems in the future Internet in the world, namely the digital divide due to the different qualities of available Internet and new Internet-based services and applications of emerging technologies, the impact of the Internet on social interactions, and hacking and insecurity on the Internet. Finally, some solutions to these problems are proposed.
... However, there are also many noise phenomena observed in communication channels that are decidedly non-Gaussian. For instance, jitter in Internet Protocol (IP) networks, shot noise, underwater acoustic noise in sonar communications, low-frequency atmospheric noise in satellite communications (see [4], [5] and the references therein) and many other types of man-made noise demonstrate heavy-tailed/impulsive characteristics. Recent studies show that stable distributions are rather successful in modeling impulsive noise, especially for power-law distributions [6] with probability density function (PDF) tail decreasing as Θ(1/|x| α+1 ) where 0 < α < 2. ...
Preprint
Full-text available
Recent studies show that stable distributions are successful in modeling heavy-tailed or impulsive noise. Investigation of the stability of a probability distribution can be greatly facilitated if the corresponding characteristic function (CF) has a closed-form expression. We explore a new family of distribution called the Vertically-Drifted First Arrival Position (VDFAP) distribution, which can be viewed as a generalization of symmetric alpha-stable (Sα\alphaS) distribution with stability parameter α=1\alpha=1. In addition, VDFAP distribution has a clear physical interpretation when we consider first-hitting problems of particles following Brownian motion with a driving drift. Inspired by the Fourier relation between the probability density function and CF of Student's t-distribution, we extract an integral representation for the VDFAP probability density function. Then, we exploit the Hankel transform to derive a closed-form expression for the CF of VDFAP. From the CF, we discover that VDFAP possesses some interesting stability properties, which are in a weaker form than Sα\alphaS. This calls for a generalization of the theory on alpha-stable distributions.
Preprint
Full-text available
This paper examines the quantitative and qualitative situation of the current fixed and mobile Internet and its expected future. First, the number of users and penetration rate of the Internet, various types of services in different countries, the ranking of countries in terms of the mean and median download and upload Internet data speeds, Internet data volume, and number and location of data centers in the world are presented. The second task introduces and details twelve performance evaluation metrics for broadband Internet access. Third, different wired and wireless Internet technologies are introduced and compared based on data rate, coverage, type of infrastructure, and their advantages and disadvantages. Based on the technical and functional criteria, in the fourth work, two popular wired and wireless Internet platforms, one based on optical fiber and the other based on the 5G cellular network, are compared in the world in general and Australia in particular. Moreover, this paper has a look at Starlink as the latest satellite Internet candidate, especially for rural and remote areas. The fifth task outlines the latest technologies and emerging broadband Internet-based services and applications in the spotlight. Sixthly, it focuses on three problems in the future Internet in the world, namely the digital divide due to the different quality of the Internet and new Internet-based services and applications of emerging technologies, the impact of the Internet on social interactions, and hacking and insecurity on the Internet. Finally, some solutions to these problems are proposed.
Chapter
In this chapter, we present a solution for evaluating the Quality of Services (QoS) of Voice over Internet Protocol (VoIP). First, we present an introduction to the main concepts and mathematical background relating to QoS and Internet Protocol (IP) traffic nature, which subsequently are used in the measurements, analysis, and modeling of VoIP traffic. Secondly, we analyze network measurements and the result of the simulation in order to characterize the VoIP traffic nature. As results of this analysis, it is shown that VoIP jitter can be modeled by alpha-stable distributions and self-similar processes, with either Short or Long Range Dependence (i.e., SRD or LRD). Thirdly, we investigate the packet loss effects on the VoIP jitter, and present a methodology for simulating packet loss on VoIP jitter. Finally, we found an empirical relationship between the Hurst parameter (H) and the Packet Loss Rate (PLR); this relationship is based on voice traffic measurements and can be modeled by means of a power-law function with three fitted parameters.
Article
Full-text available
Analyzing the characteristics of scanning activities generated by compromised Internet-of-Things (IoT) devices is instrumental for early detection of IoT malware propagation. In this letter, we leverage about 3 TB of empirical passive network measurements to investigate IoT-generated scanning activities. Specifically, we exploit stochastic processes to model low-rate scans by incorporating the effect of random sampling and jitter on the observed packet Inter-Arrival Times (IAT). We verify the derived formulations using simulated results and empirically explore scans targeting common services (Telnet and HTTP) to demonstrate the effectiveness of our approach towards modeling low-rate scans while generating practical cyber threat intelligence.
Article
Full-text available
The description of the Internet topology is an important open problem, recently tackled with the introduction of scale-free networks. We focus on the topological and dynamical properties of real Internet maps in a three-year time interval. We study higher order correlation functions as well as the dynamics of several quantities. We find that the Internet is characterized by non-trivial correlations among nodes and different dynamical regimes. We point out the importance of node hierarchy and aging in the Internet structure and growth. Our results provide hints towards the realistic modeling of the Internet evolution.
Article
Scitation is the online home of leading journals and conference proceedings from AIP Publishing and AIP Member Societies
Conference Paper
We demonstrate that Ethernet local area network (LAN) traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal behavior, and that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks. Intuitively, the critical characteristic of this self-similar traffic is that there is no natural length of a "burst": at every time scale ranging from a few milliseconds to minutes and hours, similar-looking traffic bursts are evident; we find that aggregating streams of such traffic typically intensifies the self-similarity ("burstiness") instead of smoothing it.Our conclusions are supported by a rigorous statistical analysis of hundreds of millions of high quality Ethernet traffic measurements collected between 1989 and 1992, coupled with a discussion of the underlying mathematical and statistical properties of self-similarity and their relationship with actual network behavior. We also consider some implications for congestion control in high-bandwidth networks and present traffic models based on self-similar stochastic processes that are simple, accurate, and realistic for aggregate traffic.