John Heidemann / Papers / Generation of High Bandwidth Network Traffic Traces

Generation of High Bandwidth Network Traffic Traces
Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister and Joe Touch
USC/Information Sciences Institute

Citation

Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister and Joe Touch. Generation of High Bandwidth Network Traffic Traces. Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Fort Worth, Texas, USA, Oct. 2002), 401–410. [PDF] [alt PDF]

Abstract

High bandwidth network traffic traces are needed to understand the behavior of high speed networks (such as the Internet backbone). However, the implementation of a mechanism to collect such traces is difficult in practice. In the absence of real traces, tools to generate high bandwidth traces would aid the study of high speed network behavior. We describe three methods of generating high bandwidth network traces: scaling low bandwidth network traffic traces, merging multiple low bandwidth traces and generating traces through simulation by scaling a structural model of real world traces. We evaluate the generated traces and discuss the advantages and disadvantages of each method. We also discuss some of the issues involved in generating traces by the structural model method.

Bibtex Citation

@inproceedings{Kamath02a,
  author = {Kamath, Purushotham and Lan, Kun-chan and Heidemann, John and Bannister, Joe and Touch, Joe},
  title = {Generation of High Bandwidth Network Traffic Traces},
  booktitle = {Proceedings of the  International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems},
  year = {2002},
  sortdate = {2002-10-01},
  project = {ant, saman, conser},
  jsubject = {traffic_modeling},
  publisher = {IEEE},
  address = {Fort Worth, Texas, USA},
  month = oct,
  pages = {401--410},
  jlocation = {johnh: pafile},
  keywords = {RAMP, trace generation},
  copyrightterms = {
  	Personal use of this material is permitted.  However,
  	permission to reprint/republish this material for advertising
  	or promotional purposes or for creating new collective works
          for resale or redistribution to servers or lists,
  	or to reuse any copyrighted component of this work in other works
  	must be obtained from the IEEE.
  },
  url = {https://ant.isi.edu/%7ejohnh/PAPERS/Kamath02a.html},
  pdfurl = {https://ant.isi.edu/%7ejohnh/PAPERS/Kamath02a.pdf},
  psurl = {https://ant.isi.edu/%7ejohnh/PAPERS/Kamath02a.ps.gz},
  myorganization = {USC/Information Sciences Institute},
  usessoftware = {stream_merger}
}

Copyright

Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Copyright © by John Heidemann