Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Cluster-Based Spatiotemporal Background Traffic Generation for Network Simulation

Published: 13 November 2014 Publication History

Abstract

To reduce the computational complexity of large-scale network simulation, one needs to distinguish foreground traffic generated by the target applications one intends to study from background traffic that represents the bulk of the network traffic generated by other applications. Background traffic competes with foreground traffic for network resources and consequently plays an important role in determining the behavior of network applications. Existing background traffic models either operate only at coarse time granularity or focus only on individual links. There is little insight on how to meaningfully apply realistic background traffic over the entire network. In this article, we propose a method for generating background traffic with spatial and temporal characteristics observed from real traffic traces. We apply data clustering techniques to describe the behavior of end hosts as a function of multidimensional attributes and group them into distinct classes, and then map the classes to simulated routers so that we can generate traffic in accordance with the cluster-level statistics. The proposed traffic generator makes no assumption on the target network topology. It is also capable of scaling the generated traffic so that the traffic intensity can be varied accordingly in order to test applications under different and yet realistic network conditions. Experiments show that our method is able to generate traffic that maintains the same spatial and temporal characteristics as in the observed traffic traces.

References

[1]
P. Abry and D. Veitch. 1998. Wavelet analysis of long-range dependent network traffic. IEEE Transactions on Information Theory 44, 1 (1998), 2--15.
[2]
J. S. Ahn and P. B. Danzig. 1996. Packet network simulation: Speedup and accuracy versus timing granularity. IEEE ACM TON 4 (1996), 743--757.
[3]
A. Anand, V. Sekar, and A. Akella. 2009. SmartRE: An architecture for coordinated network-wide redundancy elimination. In Proceedings of SIGCOMM’09. 87--98.
[4]
P. Barford and M. Crovella. 1998. Generating representative web workloads for network and server performance. In Proceedings of SIGMETRICS’98, Vol. 26. 151--160.
[5]
S. Bhandarkar, A. L. N. Reddy, Y. Zhang, and D. Loguinov. 2007. Emulating AQM from end hosts. In Proceedings of SIGCOMM’07. 349--360.
[6]
V. Bharti, P. Kankar, L. Setia, G. Gursun, A. Lakhina, and M. Crovella. 2010. Inferring invisible traffic. In Proceedings of Co-NEXT’10. 1--12.
[7]
CAIDA. 2011. CAIDA Internet Traces. Retrieved from http://www.caida.org/data/passive/passive_2011_dataset.xml.
[8]
A. Dainotti, A. Pescapè, P. Salvo Rossi, F. Palmieri, and G. Ventre. 2008. Internet traffic modeling by means of hidden markov models. Computer Networks: The International Journal of Computer and Telecommunications Networking 52, 14 (2008), 2645--2662.
[9]
A. Dainotti, A. Pescapè, and G. Ventre. 2009. A cascade architecture for DoS attacks detection based on the wavelet transform. Journal of Computer Security 17 (2009), 945--968.
[10]
M. A. Erazo and J. Liu. 2013. Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation. In Proceedings of PADS’13. 79--90.
[11]
V. Erramilli, M. Crovella, and N. Taft. 2006. An independent-connection model for traffic matrices. In Proceedings of IMC’06. 251--256.
[12]
A. Feldmann, A. Gilbert, P. Huang, and W. Willinger. 1999. Dynamics of IP traffic: A study of the role of variability and the impact of control. In Proceedings of SIGCOMM’99. 301--313.
[13]
Y. Guo, W. Gong, and D. Towsley. 2000. Time-stepped hybrid simulation (TSHS) for large scale networks. In Proceedings of INFOCOM’00, Vol. 2. 441--450.
[14]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. 2009. The WEKA data mining software: An update. SIGKDD Explorations 11 (2009), 10--18.
[15]
D. Han, R. Grandl, A. Akella, and S. Seshan. 2013. FCP: A flexible transport framework for accommodating diversity. In Proceedings of SIGCOMM’13. 135--146.
[16]
T. Karagiannis, K. Papagiannaki, and M. Faloutsos. 2005. BLINC: Multilevel traffic classification in the dark. In Proceedings of SIGCOMM’05. 229--240.
[17]
G. Kesidis, A. Singh, D. Cheung, and W. W. Kwok. 1996. Feasibility of fluid-driven simulation for ATM network. In Proceedings of GLOBECOM’96, Vol. 3. 2013--2017.
[18]
C. Kim, M. Caesar, and J. Rexford. 2008. Floodless in Seattle: A scalable ethernet architecture for large enterprises. In Proceedings of SIGCOMM’08. 3--14.
[19]
N. Kothari, R. Mahajan, T. Millstein, R. Govindan, and M. Musuvathi. 2011. Finding protocol manipulation attacks. In Proceedings of SIGCOMM’11. 26--37.
[20]
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. 2004. Structural analysis of network traffic flows. In Proceedings of SIGMETRICS’04. 61--72.
[21]
M. Lee, N. Duffield, and R. R. Kompella. 2010. Not all microseconds are equal: Fine-grained per-flow measurements with reference latency interpolation. In Proceedings of SIGCOMM’10. 27--38.
[22]
T. Li, N. Van Vorst, and J. Liu. 2013. A rate-based TCP traffic model to accelerate network simulation. Transactions of the Society for Modeling and Simulation International 89, 4 (2013), 466--480.
[23]
B. Liu, D. R. Figueiredo, Y. Guo, J. F. Kurose, and D. Towsley. 2001. A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation. In Proceedings of INFOCOM’01, Vol. 3. 1244--1253.
[24]
X. Liu, X. Yang, and Y. Xia. 2010. NetFence: Preventing internet denial of service from inside out. In Proceedings of SIGCOMM’10. 255--266.
[25]
J. B. MacQueen. 1967. Some methods for classification and analysis of multivariate observations. In Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, Vol. 1. 281--297.
[26]
MAWI. 2013. MAWI Traffic Archive. Retrieved http://tracer.csl.sony.co.jp/mawi/.
[27]
A. McGregor, M. Hall, P. Lorier, J. Brunskill, A. Mcgregor, M. Hall, P. Lorier, and J. Brunskill. 2004. Flow clustering using machine learning techniques. In Proceedings of PAM’04. 205--214.
[28]
A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot. 2002. Traffic matrix estimation: Existing techniques and new directions. In Proceedings of SIGCOMM’02. 161--174.
[29]
V. Misra, W. Gong, and D. Towsley. 2000. Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. In Proceedings of SIGCOMM’00. 151--160.
[30]
V. Misra, W. Gong, and D. Towsley. 2003. Fluid models and solutions for large-scale IP networks. In Proceedings of SIGMETRICS’03. 91--101.
[31]
D. M. Nicol. 2001. Discrete event fluid modeling of TCP. In Proceedings of n WSC’01.
[32]
D. M. Nicol and G. Yan. 2004. Discrete event fluid modeling of background TCP traffic. TOMACS 14, 3 (2004), 211--250.
[33]
A. Nucci, A. Sridharan, and N. Taft. 2005. The problem of synthetically generating IP traffic matrices: Initial recommendations. SIGCOMM Computer Communication Review 35, 3 (2005), 19--32.
[34]
P. Papageorge, J. Mccann, and M. Hicks. 2009. Passive aggressive measurement with MGRP. In Proceedings of SIGCOMM’09. 255--266.
[35]
K. Papagiannaki, N. Taft, Z. Zhang, and C. Diot. 2003. Long-term forecasting of internet backbone traffic: Observations and initial models. In Proceedings of INFOCOM’03. 1178--1188.
[36]
M. Podlesny and S. Gorinsky. 2008. RD network services: Differentiation through performance incentives. In Proceedings of SIGCOMM’08. 255--266.
[37]
M. Roughan, A. Greenberg, C. Kalmanek, M. Rumsewicz, J. Yates, and Y. Zhang. 2002. Experience in measuring backbone traffic variability: Models, metrics, measurements and meaning. In Proceedings of IMW’02. 91--92.
[38]
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield. 2004. Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In Proceedings of IMC’04. 135--148.
[39]
J. Sommers and P. Barford. 2004. Self-configuring network traffic generation. In Proceedings of IMC’04. 68--81.
[40]
J. Sommers, R. A. Bowden, B. Eriksson, P. Barford, M. Roughan, and N. G. Duffield. 2011. Efficient network-wide flow record generation. In Proceedings of INFOCOM’11.
[41]
N. Spring, R. Mahajan, D. Wetherall, and T. Anderson. 2004. Measuring ISP topologies with Rocketfuel. IEEE ACM TON 12, 1 (2004), 2--16.
[42]
P. Tune and M. Roughan. 2003. Internet traffic matrices: A primer. ACM SIGCOMM eBook: Recent Advances in Networking (2003).
[43]
V. C. Valgenti and M. S. Kim. 2012. An application-level content generative model for network applications. In Proceedings of SIMUTools’02. 47--56.
[44]
N. Vegh. 2013. NTools traffic generator/analyzer and network emulator package. http://norvegh.com/ntools. (2013).
[45]
K. V. Vishwanath and A. Vahdat. 2006. Realistic and responsive network traffic generation. In Proceedings of SIGCOMM’06. 111--122.
[46]
K. V. Vishwanath and A. Vahdat. 2008. Evaluating distributed systems: Does background traffic matter. In Proceedings of the 2008 USENIX Technical Conference. 227--240.
[47]
Y. Wang, H. Wang, A. Mahimkar, R. Alimi, Y. Zhang, L. Qiu, and Y. R. Yang. 2010. R3: Resilient routing reconfiguration. In Proceedings of SIGCOMM’10. 291--302.
[48]
S. Wei, J. Mirkovic, and E. Kissel. 2006. Profiling and clustering internet hosts. In DMIN. 269--275.
[49]
M. C. Weigle, P. Adurthi, F. Hernández-Campos, K. Jeffay, and F. D. Smith. 2006. Tmix: A tool for generating realistic TCP application workloads in ns-2. CCR 36, 3 (2006), 67--76.
[50]
K. Xu, Z. Zhang, and S. Bhattacharyya. 2005. Profiling Internet backbone traffic: Behavior models and applications. In Proceedings of SIGCOMM’05. 169--180.
[51]
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan. 2005a. Network anomography. In Proceedings of IMC’05. 317--330.
[52]
Y. Zhang, M. Roughan, N. Duffield, and A. Greenberg. 2003a. Fast accurate computation of large-scale IP traffic matrices from link loads. In Proceedings of SIGMETRICS’03. 206--217.
[53]
Y. Zhang, M. Roughan, C. Lund, and D. Donoho. 2003b. An information-theoretic approach to traffic matrix estimation. In Proceedings of SIGCOMM’03. 301--312.
[54]
Y. Zhang, M. Roughan, C. Lund, and D. Donoho. 2005b. Estimating point-to-point and point-to-multipoint traffic matrix: An information-theoretic approach. IEEE ACM TON 13 (2005), 947--960.
[55]
Y. Zhang, M. Roughan, W. Willinger, and L. Qui. 2009. Spatio-temporal compressive sensing and internet traffic matrices. In Proceedings of SIGCOMM’09. 267--278.

Cited By

View all
  • (2022)IQoR-LSE: An Intelligent QoS On-Demand Routing Algorithm With Link State EstimationIEEE Systems Journal10.1109/JSYST.2022.314999016:4(5821-5830)Online publication date: Dec-2022
  • (2021)Study on Model Adaptability Based on K-means Clustering Method and Exponential Continuous Time - Varying Characteristics2021 33rd Chinese Control and Decision Conference (CCDC)10.1109/CCDC52312.2021.9602077(1081-1084)Online publication date: 22-May-2021
  • (2020)Using GANs for Sharing Networked Time Series DataProceedings of the ACM Internet Measurement Conference10.1145/3419394.3423643(464-483)Online publication date: 27-Oct-2020
  • Show More Cited By

Index Terms

  1. Cluster-Based Spatiotemporal Background Traffic Generation for Network Simulation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Modeling and Computer Simulation
    ACM Transactions on Modeling and Computer Simulation  Volume 25, Issue 1
    January 2015
    141 pages
    ISSN:1049-3301
    EISSN:1558-1195
    DOI:10.1145/2661171
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2014
    Accepted: 01 August 2014
    Revised: 01 May 2014
    Received: 01 January 2014
    Published in TOMACS Volume 25, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Network simulation
    2. background traffic model
    3. network traffic clustering
    4. spatiotemporal network traffic characteristics

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)IQoR-LSE: An Intelligent QoS On-Demand Routing Algorithm With Link State EstimationIEEE Systems Journal10.1109/JSYST.2022.314999016:4(5821-5830)Online publication date: Dec-2022
    • (2021)Study on Model Adaptability Based on K-means Clustering Method and Exponential Continuous Time - Varying Characteristics2021 33rd Chinese Control and Decision Conference (CCDC)10.1109/CCDC52312.2021.9602077(1081-1084)Online publication date: 22-May-2021
    • (2020)Using GANs for Sharing Networked Time Series DataProceedings of the ACM Internet Measurement Conference10.1145/3419394.3423643(464-483)Online publication date: 27-Oct-2020
    • (2020)A Sum of Bernoulli Sources Approximation for Packet Switched Network Traffic in Backbone LinksIEEE Communications Letters10.1109/LCOMM.2019.294706024:1(141-145)Online publication date: Jan-2020
    • (2020)IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning2020 IEEE 45th Conference on Local Computer Networks (LCN)10.1109/LCN48667.2020.9314768(329-332)Online publication date: 16-Nov-2020
    • (2019)KeddahACM Transactions on Modeling and Computer Simulation10.1145/330150329:3(1-25)Online publication date: 19-Jun-2019
    • (2017)Internet Traffic ProfilingPerformance Evaluation for Network Services, Systems and Protocols10.1007/978-3-319-54521-9_4(113-152)Online publication date: 22-Mar-2017
    • (2016)Reproducible research in discrete event simulationProceedings of the 2016 Winter Simulation Conference10.5555/3042094.3042264(1301-1315)Online publication date: 11-Dec-2016
    • (2016)Panel — Reproducible research in discrete event simulation — A must or rather a maybe?2016 Winter Simulation Conference (WSC)10.1109/WSC.2016.7822185(1301-1315)Online publication date: Dec-2016
    • (2016)The impact of background traffic towards multimedia content delivery Quality on limited capacity network2016 10th International Conference on Telecommunication Systems Services and Applications (TSSA)10.1109/TSSA.2016.7871082(1-6)Online publication date: Oct-2016
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media