Experimental queueing analysis with long-range dependent packet traffic
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
A flow-based model for internet backbone traffic
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Performance Preserving Network Downscaling
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
Modeling Internet backbone traffic at the flow level
IEEE Transactions on Signal Processing
Performance Preserving Topological Downscaling of Internet-Like Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in order to understand the performance of complex networks like the Internet: measurements, simulations, and deployments on small to medium-scale testbeds. This work considers a novel addition to this suite: a class of methods to scale down the topology of the Internet that enables researchers to create and observe a smaller replica, and extrapolate its performance to the expected performance of the larger Internet. The key insight that we leverage is that only the congested links along the path of each flow introduce sizable queueing delays and dependencies among flows. Hence, one might hope that the network properties can be captured by a topology that consists of the congested links only. We have verified this in [11, 12] using extensive simulations with TCP traffic and theoretical analysis. Further, we have also shown that simulating a scaled topology can be up to two orders of magnitude faster than simulating the original topology. However, a main assumption of our approach was that un-congested links are known in advance. We are currently working on establishing rules that can be used to efficiently identify uncongested links in large and complex networks like the Internet, when these are not known, and which can be ignored when building scaled-down network replicas.