765,958 research outputs found

    Scalable BGP Prefix Selection for Effective Inter-domain Traffic Engineering

    Full text link
    Inter-domain Traffic Engineering for multi-homed networks faces a scalability challenge, as the size of BGP routing table continue to grow. In this context, the choice of the best path must be made potentially for each destination prefix, requiring all available paths to be characterised (e.g., through measurements) and compared with each other. Fortunately, it is well-known that a few number of prefixes carry the larger part of the traffic. As a natural consequence, to engineer large volume of traffic only few prefixes need to be managed. Yet, traffic characteristics of a given prefix can greatly vary over time, and little is known on the dynamism of traffic at this aggregation level, including predicting the set of the most significant prefixes in the near future. %based on past observations. Sophisticated prediction methods won't scale in such context. In this paper, we study the relationship between prefix volume, stability, and predictability, based on recent traffic traces from nine different networks. Three simple and resource-efficient methods to select the prefixes associated with the most important foreseeable traffic volume are then proposed. Such proposed methods allow to select sets of prefixes with both excellent representativeness (volume coverage) and stability in time, for which the best routes are identified. The analysis carried out confirm the potential benefits of a route decision engine

    Structural Analysis of Network Traffic Matrix via Relaxed Principal Component Pursuit

    Full text link
    The network traffic matrix is widely used in network operation and management. It is therefore of crucial importance to analyze the components and the structure of the network traffic matrix, for which several mathematical approaches such as Principal Component Analysis (PCA) were proposed. In this paper, we first argue that PCA performs poorly for analyzing traffic matrix that is polluted by large volume anomalies, and then propose a new decomposition model for the network traffic matrix. According to this model, we carry out the structural analysis by decomposing the network traffic matrix into three sub-matrices, namely, the deterministic traffic, the anomaly traffic and the noise traffic matrix, which is similar to the Robust Principal Component Analysis (RPCA) problem previously studied in [13]. Based on the Relaxed Principal Component Pursuit (Relaxed PCP) method and the Accelerated Proximal Gradient (APG) algorithm, we present an iterative approach for decomposing a traffic matrix, and demonstrate its efficiency and flexibility by experimental results. Finally, we further discuss several features of the deterministic and noise traffic. Our study develops a novel method for the problem of structural analysis of the traffic matrix, which is robust against pollution of large volume anomalies.Comment: Accepted to Elsevier Computer Network

    Monitoring Challenges and Approaches for P2P File-Sharing Systems

    Get PDF
    Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University of Washington campus network found that file-sharing accounted for more than treble the volume of Web traffic observed, thus affirming the significance of P2P in the context of Internet traffic. Empirical studies of P2P traffic are essential for supporting the design of next-generation P2P systems, informing the provisioning of network infrastructure and underpinning the policing of P2P systems. The latter is of particular significance as P2P file-sharing systems have been implicated in supporting criminal behaviour including copyright infringement and the distribution of illegal pornograph

    Dynamic 3D Network Data Visualization

    Get PDF
    Monitoring network traffic has always been an arduous and tedious task because of the complexity and sheer volume of network data that is being consistently generated. In addition, network growth and new technologies are rapidly increasing these levels of complexity and volume. An effective technique in understanding and managing a large dataset, such as network traffic, is data visualization. There are several tools that attempt to turn network traffic into visual stimuli. Many of these do so in 2D space and those that are 3D lack the ability to display network patterns effectively. Existing 3D network visualization tools lack user interaction, dynamic generation, and intuitiveness. This project proposes a user-friendly 3D network visualization application that creates both dynamic and interactive visuals. This application was built using the Bablyon.js graphics framework and uses anonymized data collected from a campus network

    A measure theoretic approach to traffic flow optimization on networks

    Full text link
    We consider a class of optimal control problems for measure-valued nonlinear transport equations describing traffic flow problems on networks. The objective isto minimise/maximise macroscopic quantities, such as traffic volume or average speed,controlling few agents, for example smart traffic lights and automated cars. The measuretheoretic approach allows to study in a same setting local and nonlocal drivers interactionsand to consider the control variables as additional measures interacting with the driversdistribution. We also propose a gradient descent adjoint-based optimization method, ob-tained by deriving first-order optimality conditions for the control problem, and we providesome numerical experiments in the case of smart traffic lights for a 2-1 junction.Comment: 20 pages, 6 figure

    Characteristics of Vehicular Traffic Flow at a Roundabout

    Full text link
    We construct a stochastic cellular automata model for the description of vehicular traffic at a roundabout designed at the intersection of two perpendicular streets. The vehicular traffic is controlled by a self-organized scheme in which traffic lights are absent. This controlling method incorporates a yield-at-entry strategy for the approaching vehicles to the circulating traffic flow in the roundabout. Vehicular dynamics is simulated within the framework of the probabilistic cellular automata and the delay experienced by the traffic at each individual street is evaluated for specified time intervals. We discuss the impact of the geometrical properties of the roundabout on the total delay. We compare our results with traffic-light signalisation schemes, and obtain the critical traffic volume over which the intersection is optimally controlled through traffic light signalisation schemes.Comment: 10 pages, 17 eps figures. arXiv admin note: text overlap with arXiv:cond-mat/040107

    Euclidean versus hyperbolic congestion in idealized versus experimental networks

    Full text link
    This paper proposes a mathematical justification of the phenomenon of extreme congestion at a very limited number of nodes in very large networks. It is argued that this phenomenon occurs as a combination of the negative curvature property of the network together with minimum length routing. More specifically, it is shown that, in a large n-dimensional hyperbolic ball B of radius R viewed as a roughly similar model of a Gromov hyperbolic network, the proportion of traffic paths transiting through a small ball near the center is independent of the radius R whereas, in a Euclidean ball, the same proportion scales as 1/R^{n-1}. This discrepancy persists for the traffic load, which at the center of the hyperbolic ball scales as the square of the volume, whereas the same traffic load scales as the volume to the power (n+1)/n in the Euclidean ball. This provides a theoretical justification of the experimental exponent discrepancy observed by Narayan and Saniee between traffic loads in Gromov-hyperbolic networks from the Rocketfuel data base and synthetic Euclidean lattice networks. It is further conjectured that for networks that do not enjoy the obvious symmetry of hyperbolic and Euclidean balls, the point of maximum traffic is near the center of mass of the network.Comment: 23 pages, 4 figure

    Pilots' use of a traffic alert and collision-avoidance system (TCAS 2) in simulated air carrier operations. Volume 2: Appendices

    Get PDF
    Pilots' use of and responses to a traffic alert and collision-avoidance system (TCAS 2) in simulated air carrier line operations are discribed in Volume 1. TCAS 2 monitors the positions of nearby aircraft by means of transponder interrogation, and it commands a climb or descent which conflicting aircraft are projected to reach an unsafe closest point-of-approach within 20 to 25 seconds. A different level of information about the location of other air traffic was presented to each of three groups of flight crews during their execution of eight simulated air carrier flights. A fourth group of pilots flew the same segments without TCAS 2 equipment. Traffic conflicts were generated at intervals during the flights; many of the conflict aircraft were visible to the flight crews. The TCAS equipment successfully ameliorated the seriousness of all conflicts; three of four non-TCAS crews had hazardous encounters. Response times to TCAS maneuver commands did not differ as a function of the amount of information provided, nor did response accuracy. Differences in flight experience did not appear to contribute to the small performance differences observed. Pilots used the displays of conflicting traffic to maneuver to avoid unseen traffic before maneuver advisories were issued by the TCAS equipment. The results indicate: (1) that pilots utilize TCAS effectively within the response times allocated by the TCAS logic, and (2) that TCAS 2 is an effective collision avoidance device. Volume 2 contains the appendices referenced in Volume 1, providing details of the experiment and the results, and the text of two reports written in support of the program

    Automatic Estimation of the Exposure to Lateral Collision in Signalized Intersections using Video Sensors

    Full text link
    Intersections constitute one of the most dangerous elements in road systems. Traffic signals remain the most common way to control traffic at high-volume intersections and offer many opportunities to apply intelligent transportation systems to make traffic more efficient and safe. This paper describes an automated method to estimate the temporal exposure of road users crossing the conflict zone to lateral collision with road users originating from a different approach. This component is part of a larger system relying on video sensors to provide queue lengths and spatial occupancy that are used for real time traffic control and monitoring. The method is evaluated on data collected during a real world experiment
    corecore