Traffic profiles and application signatures

  • Authors:
  • G. Mueller;P. Sanders;J. Allen

  • Affiliations:
  • SECEE, University of Plymouth, 363 Birmingham Road, Bordesley, Redditch B97 6RP, UK;SECEE, University of Plymouth, 363 Birmingham Road, Bordesley, Redditch B97 6RP, UK;Netscient Limited, UK

  • Venue:
  • Computer Communications
  • Year:
  • 1999

Quantified Score

Hi-index 0.24

Visualization

Abstract

Our hypothesis is that data applications leave a signature when used over networks. Data that is sent from the original source and travels to the destination utilises the network in a very similar manner, if no strong congestion is experienced. Should the network experience congestion, the unavoidable frame losses will alter the signature of the application and change the statistical property of the data. However, certain properties remain the same, even after a network disruption and congestion. These properties can together be used to create an ''application signature'', which is unique to the specific application. This is due to the protocols used and the parameters set in the environment of the traffic source. We think that these findings could help to understand the traffic characterisation and the processes involved. The traffic profiles could then be used for the dynamic resource allocation (e.g. Resource ReServation Protocol) in future networks as well as with the simulation of such networks.