Self-similarity Analysis and Application of Network Traffic

被引:0
|
作者
Xu, Yan [1 ]
Li, Qianmu [1 ,2 ]
Meng, Shunmei [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Wuyi, Peoples R China
关键词
Network traffic; Self-similarity; Echo State Network; PREDICTION;
D O I
10.1007/9.78-3-030-28468-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network traffic prediction is not only an academic problem, but also a concern of industry and network performance department. Efficient prediction of network traffic is helpful for protocol design, traffic scheduling, detection of network attacks, etc. In this paper, we propose a network traffic prediction method based on the Echo State Network. In the first place we prove that the network traffic data are self-similar by means of the calculation of Hurst exponent of each traffic time series, which indicates that we can predict network traffic utilizing nonlinear time series models. Then Echo State Network is applied for network traffic forecasting. Furthermore, to avoid the weak-conditioned problem, grid search algorithm is used to optimize the reservoir parameters and coefficients. The dataset we perform experiments on are large-scale network traffic data at different time scale. They come from three provinces and are provided by ZTE Corporation. The result shows that our approach can predict network traffic efficiently, which is also a verification of the self-similarity analysis.
引用
收藏
页码:112 / 125
页数:14
相关论文
共 50 条
  • [21] Ad hoc wireless network traffic - Self-similarity and forecasting
    Liang, QL
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (07) : 297 - 299
  • [22] Analysis and application of the self-similarity in network traffic - the performance test of clustered WWW servers with a single entry point
    Zhao, Xiaofang
    Liu, Xin
    Xu, Zhiwei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 1999, 36 (09): : 1032 - 1038
  • [23] Reduction of self-similarity by application-level traffic shaping
    Christensen, KJ
    Ballingam, V
    LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 511 - 518
  • [24] Self-similarity Tests for Internet Traffic
    Dobrescu, Radu
    Hossu, Daniela
    Ulrich, Roland
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2009, 11 (04): : 11 - 17
  • [25] Self-similarity control of the aggregate traffic
    Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2007, 30 (05): : 13 - 18
  • [26] A cause of self-similarity in TCP traffic
    Fukuda, K
    Takayasu, M
    Takayasu, H
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2005, 18 (06) : 603 - 617
  • [27] Explaining BitTorrent traffic self-similarity
    Liu, G
    Hu, MZ
    Fang, BX
    Zhang, HL
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 839 - 843
  • [28] A case for exploiting self-similarity of network traffic in TCP congestion control
    He, GH
    Gao, Y
    Hou, JC
    Park, KH
    COMPUTER NETWORKS, 2004, 45 (06) : 743 - 766
  • [29] Improved R/S algorithm based on network traffic self-similarity
    Zhang Dengyin
    Liu Yu
    Anant Adi
    Li Haibo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12600 - +
  • [30] Effects of upper-layer protocols on the self-similarity of network traffic
    Sumida, Y
    Ohsaki, H
    Murata, M
    Miyahara, H
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 2001, 84 (07): : 19 - 30