Empirically derived analytic models of wide-area TCP connections
IEEE/ACM Transactions on Networking (TON)
Generating representative Web workloads for network and server performance evaluation
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Self-similarity and heavy tails: structural modeling of network traffic
A practical guide to heavy tails
End-to-end internet packet dynamics
IEEE/ACM Transactions on Networking (TON)
Dynamics of IP traffic: a study of the role of variability and the impact of control
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Critical path analysis of TCP transactions
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
What TCP/IP protocol headers can tell us about the web
Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Difficulties in simulating the internet
IEEE/ACM Transactions on Networking (TON)
A non-instrusive, wavelet-based approach to detecting network performance problems
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Traffic matrix estimation: existing techniques and new directions
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
On the characteristics and origins of internet flow rates
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Analyzing peer-to-peer traffic across large networks
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
MediSyn: a synthetic streaming media service workload generator
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
An Empirical Model of HTTP Network Traffic
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
The effects of active queue management on web performance
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A tool for RApid model parameterization and its applications
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Self-configuring network traffic generation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Packet trace manipulation rramework for test labs
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Packet-dispersion techniques and a capacity-estimation methodology
IEEE/ACM Transactions on Networking (TON)
An integrated experimental environment for distributed systems and networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Scalability and accuracy in a large-scale network emulator
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Internet traffic classification using bayesian analysis techniques
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Why is the internet traffic bursty in short time scales?
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Profiling internet backbone traffic: behavior models and applications
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Monkey see, monkey do: a tool for TCP tracing and replaying
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Wavelet analysis of long-range-dependent traffic
IEEE Transactions on Information Theory
Cloud control with distributed rate limiting
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Do you know what you are generating?
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Evaluating distributed systems: does background traffic matter?
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Using LiTGen, a realistic IP traffic model, to evaluate the impact of burstiness on performance
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Computer Networks: The International Journal of Computer and Telecommunications Networking
HttpTools: a toolkit for simulation of web hosts in OMNeT++
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Modeling and emulation of internet paths
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Automated pseudo-live testing of firewall configuration enforcement
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Effective high speed traffic replay based on IP space
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Techniques for simulation of realistic infrastructure wireless network traffic
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
LiTGen, a lightweight traffic generator: application to P2P and mail wireless traffic
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Catching IP traffic burstiness with a lightweight generator
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
A flow trace generator using graph-based traffic classification techniques
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A fluid background traffic model
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Do you trust your software-based traffic generator?
IEEE Communications Magazine
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Forwarding devices: From measurements to simulations
ACM Transactions on Modeling and Computer Simulation (TOMACS)
On campus beta site: architecture designs, operational experience, and top product defects
IEEE Communications Magazine
Characterizing and modeling internet traffic dynamics of cellular devices
Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Characterizing and modeling internet traffic dynamics of cellular devices
ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review
ExperimenTor: a testbed for safe and realistic tor experimentation
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Efficient and realistic generation of IP addresses
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Simulation-based study of botnets and defense mechanisms against them
Journal of Computer and Systems Sciences International
Workload resampling for performance evaluation of parallel job schedulers
Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering
RENETO, a realistic network traffic generator for OMNeT++/INET
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Flow-based partitioning of network testbed experiments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper presents Swing, a closed-loop, network-responsive traffic generator that accurately captures the packet interactions of a range of applications using a simple structural model. Starting from observed traffic at a single point in the network, Swing automatically extracts distributions for user, application, and network behavior. It then generates live traffic corresponding to the underlying models in a network emulation environment running commodity network protocol stacks. We find that the generated traces are statistically similar to the original traces. Further, to the best of our knowledge, we are the first to reproduce burstiness in traffic across a range of timescales using a model applicable to a variety of network settings. An initial sensitivity analysis reveals the importance of capturing and recreating user, application, and network characteristics to accurately reproduce such burstiness. Finally, we explore Swing's ability to vary user characteristics, application properties, and wide-area network conditions to project traffic characteristics into alternate scenarios.