Characterizing Per-Application Network Traffic Using Entropy

被引:14
作者
Petkov, Vladislav [1 ]
Rajagopal, Ram [2 ]
Obraczka, Katia [1 ]
机构
[1] Univ Calif Santa Cruz, Santa Cruz, CA 95064 USA
[2] Stanford Univ, Stanford, CA 94305 USA
来源
ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION | 2013年 / 23卷 / 02期
基金
美国国家科学基金会;
关键词
Entropy estimator; self-similarity; traffic complexity; statistics; data analysis; SELF-SIMILARITY;
D O I
10.1145/2457459.2457463
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet has been evolving into a more heterogeneous internetwork with diverse new applications imposing more stringent bandwidth and QoS requirements. Already new applications such as YouTube, Hulu, and Netflix are consuming a large fraction of the total bandwidth. We argue that, in order to engineer future internets such that they can adequately cater to their increasingly diverse and complex set of applications while using resources efficiently, it is critical to be able to characterize the load that emerging and future applications place on the underlying network. In this article, we investigate entropy as a metric for characterizing per-flow network traffic complexity. While previous work has analyzed aggregated network traffic, we focus on studying isolated traffic flows. Per-application flow characterization caters to the need of network control functions such as traffic scheduling and admission control at the edges of the network. Such control functions necessitate differentiating network traffic on a per-application basis. The "entropy fingerprints" that we get from our entropy estimator summarize many characteristics of each application's network traffic. Not only can we compare applications on the basis of peak entropy, but we can also categorize them based on a number of other properties of the fingerprints.
引用
收藏
页数:25
相关论文
共 32 条
  • [1] Aimin Sang, 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P342, DOI 10.1109/INFCOM.2000.832204
  • [2] [Anonymous], 2003, Protocol Packet Capture and Dumper Program, P164
  • [3] [Anonymous], CAIDA ANONYMIZED 200
  • [4] APPLE, 2010, ICHAT WIK ENTR
  • [5] APPLE, 2010, ICHAT OS X LEOP
  • [6] Basharin G. P., 1959, Theory of Probability & Its Applications, V4, P333, DOI [10.1137/1104033, DOI 10.1137/1104033]
  • [7] LONG-RANGE DEPENDENCE IN VARIABLE-BIT-RATE VIDEO TRAFFIC
    BERAN, J
    SHERMAN, R
    TAQQU, MS
    WILLINGER, W
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1995, 43 (2-4) : 1566 - 1579
  • [8] Detailed Analysis of Skype Traffic
    Bonfiglio, Dario
    Mellia, Marco
    Meo, Michela
    Rossi, Dario
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (01) : 117 - 127
  • [9] Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
  • [10] Self-similarity in World Wide Web traffic: Evidence and possible causes
    Crovella, ME
    Bestavros, A
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 1997, 5 (06) : 835 - 846