29
A. Context Expression Functions The following set of functions is provided for the definition of context expressions in the UBA: Function Min. Args Max. Args Result/Comment abs(v) 1 1 Absolute value of v. abs(-4.3) returns 4.3 mod(v, d) 2 2 Remainder of v/d. mod(5.2,2.5) returns 0.2 ipart(v) 1 1 Integer part of v. ipart(3.2) returns 3 fpart(v) 1 1 Fractional part of v. fpart(3.2) returns 0.2 min(v, . . . ) 1 Minimum number passed. min(3,2,-5,-2,7) re- turns -5 max(v, . . . ) 1 Maximum number passed. max(3,2,-5,-2,7) re- turns 7 pow(a, b) 2 2 Value a raised to the power b. pow(3.2,1.7) returns 3.2 1.7 sqrt(a) 1 1 Square root of a. sqrt(16) returns 4 sin(a) 1 1 Sine of a radians. sin(1.5) returns around 0.997 sinh(a) 1 1 Hyperbolic sine of a. sinh(1.5) returns around 2.129 asin(a) 1 1 Arc-sine of a in radians. asin(0.5) returns around 0.524 cos(a) 1 1 Cosine of a radians. cos(1.5) returns around 0.0707 cosh(a) 1 1 Hyperbolic cosine of a. cosh(1.5) returns around 2.352 acos(a) 1 1 Arc-cosine of a in radians. acos(0.5) returns around 1.047 tan(a) 1 1 Tangent of a radians. tan(1.5) returns around 14.101 tanh(a) 1 1 Hyperbolic tangent of a. tanh(1.5) returns around 0.905 © Springer Fachmedien Wiesbaden GmbH 2017 A. Kolesnikov, Load Modelling and Generation in IP-based Networks, DOI 10.1007/978-3-658-19102-3

A. ContextExpressionFunctions - Springer978-3-658-19102-3/1.pdf · Network Processor”, book chapter in “Distributed Coopera- ... [Cisco2] Cisco Systems, “Traffic Analysis for

Embed Size (px)

Citation preview

A. Context Expression Functions

The following set of functions is provided for the definition of contextexpressions in the UBA:

Function Min.Args

Max.Args

Result/Comment

abs(v) 1 1 Absolute value of v. abs(-4.3) returns 4.3

mod(v, d) 2 2 Remainder of v/d. mod(5.2,2.5) returns 0.2

ipart(v) 1 1 Integer part of v. ipart(3.2) returns 3

fpart(v) 1 1 Fractional part of v. fpart(3.2) returns 0.2

min(v, . . . ) 1 – Minimum number passed. min(3,2,-5,-2,7) re-turns -5

max(v, . . . ) 1 – Maximum number passed. max(3,2,-5,-2,7) re-turns 7

pow(a, b) 2 2 Value a raised to the power b. pow(3.2,1.7)returns 3.21.7

sqrt(a) 1 1 Square root of a. sqrt(16) returns 4

sin(a) 1 1 Sine of a radians. sin(1.5) returns around 0.997

sinh(a) 1 1 Hyperbolic sine of a. sinh(1.5) returns around2.129

asin(a) 1 1 Arc-sine of a in radians. asin(0.5) returnsaround 0.524

cos(a) 1 1 Cosine of a radians. cos(1.5) returns around0.0707

cosh(a) 1 1 Hyperbolic cosine of a. cosh(1.5) returnsaround 2.352

acos(a) 1 1 Arc-cosine of a in radians. acos(0.5) returnsaround 1.047

tan(a) 1 1 Tangent of a radians. tan(1.5) returns around14.101

tanh(a) 1 1 Hyperbolic tangent of a. tanh(1.5) returnsaround 0.905

© Springer Fachmedien Wiesbaden GmbH 2017A. Kolesnikov, Load Modelling and Generation in IP-basedNetworks, DOI 10.1007/978-3-658-19102-3

288 A. Context Expression Functions

Function Min.Args

Max.Args

Result/Comment

atan(a) 1 1 Arc-tangent of a in radians. atan(0.3) returnsabout 0.291

atan2(y, x) 2 2 Arc-tangent of y/x, with quadrant correction.atan2(4,3) returns about 0.927

log(a) 1 1 Base 10 logarithm of a. log(100) returns 2

pow10(a) 1 1 10 raised to the power of a. pow10(2) returns100

ln(a) 1 1 Base e logarithm of a. ln(2.8) returns around1.030

exp(a) 1 1 e raised to the power of a. exp(2) returnsaround 7.389

logn(a, b) 2 2 Base b logarithm of a. logn(16,2) returns 4

ceil(a) 1 1 Rounds a up to the nearest integer. ceil(3.2)returns 4

floor(a) 1 1 Rounds a down to the nearest integer.floor(3.2) returns 3

rand() 0 0 Returns a uniformly distributed number be-tween 0 up to but not including 1.

random(a, b) 2 2 Returns a uniformly distributed number be-tween a up to and including b.

srand(a) 1 1 Seeds the random number generator with avalue. Return value is unknown

randomize() 0 0 Seed the random number generator with avalue based on the current time. Return valueis unknown

deg(a) 1 1 Returns a radians converted to degrees.deg(3.14) returns around 179.909

rad(a) 1 1 Returns a degrees converted to radians.rad(180) returns around 3.142

if(c, t, f) 3 3 Evaluates and returns t if c is not 0.0. Elseevaluates and returns f. if(0.1, 2.1, 3.9) returns2.1

select(c, n, z[,p]) 3 4 Returns n if c is less than 0.0. Returns z if c is0.0. If c is greater than 0.0 and only three ar-guments were passed, returns z. If c is greaterthan 0.0 and four arguments were passed, re-turns p. select(3, 1, 4, 5) returns 5

A. Context Expression Functions 289

Function Min.Args

Max.Args

Result/Comment

equal(a, b) 2 2 Returns 1.0 if a is equal to b. Else returns 0.0.equal(3,2) returns 0.0

above(a, b) 2 2 Returns 1.0 if a is above b. Else returns 0.0.above(3,2) returns 1.0

below(a, b) 2 2 Returns 1.0 if a is below b. Else returns 0.0.below(3,2) returns 0.0

avg(a, . . . ) 1 – Returns the average of the values passed.avg(3,3,6) returns 4

clip(v, min, max) 3 3 Clips v to the range from min to max. If v isless than min, it returns min. If v is greaterthan max it returns max. Otherwise it returnsv. clip(3,1,2) returns 2

clamp(v, min, max) 3 3 Clamps v to the range from min to max, loop-ing if needed. clamp(8.2,1.3,4.7) returns 1.4

poly(x, c1, . . . ) 2 – This function calculates the polynomial. x isthe value to use in the polynomial. c1, c2,and on are the coefficients. poly(4,6,9,3,1,4)returns 2168 same as 6 ∗ 44 + 9 ∗ 43 + 3 ∗ 42 +1 ∗ 41 + 4 ∗ 40

and(a, b) 2 2 Returns 0.0 if either a or b are 0.0. Else returns1.0. and(2.1,0.0) returns 0.0

or(a, b) 2 2 Returns 0.0 if both a and b are 0.0. Else re-turns 1.0. or(2.1,0.0) returns 1.0

not(a) 1 1 Returns 1.0 if a is 0.0. Else returns 0.0.not(0.3) returns 0.0

for(init, test, inc, a1,. . . )

4 – This function acts like a for loop in C. First initis evaluated. Then test is evaluated. As longas the test is not 0.0, the action statements (a1to an) are evaluated, the inc statement is eval-uated, and the test is evaluated again. Theresult is the result of the final action state-ment. for(x=0,below(x,11),x=x+1,y=y+x) re-turns 55.0 (if y was initially 0.0)

many(expr, . . . ) 1 – This function treats many subexpressions asa single object (function). It is mainlyfor the ’for’ function. for(many(j=5,k=1),above(j*k,0.001), many(j=j+5,k=k/2), 0)

Bibliography

[3GPP2] 3rd Generation Partnership Project 2 (“3GPP2”), 3GPP2C.R1002-0 v1.0. “cdma2000 Evaluation Methodology (V14)”,Revision 1.0, June 2003, available online http://www.3gpp2.

org/public_html/specs/C.R1002-0_v1.0_041221.pdf, lastrequested April 29, 2016.

[Aal11] W.M.P. van der Aalst, “Process Mining : Discovery, Con-formance and Enhancement of Business Processes”, VerlagSpringer, Berlin, Heidelberg, 2011.

[AbS10] A.Abhari, M. Soraya, “Workload generation for YouTube”,Multimedia Tools and Applications, Volume 46, Number 1,January 2010, pp. 91–118.

[ACC02] C.Amza, A.Chanda, A. L.Cox, et al., “Specification and Im-plementation of Dynamic Web Site Benchmarks”, Proc. of theIEEE International Workshop on Workload Characterization(WWC-5), Austin, Texas, USA, November 25, 2002, pp. 3–13.

[AcP12] G.Aceto and A.Pescape, “On the recent use of email throughtraffic and network analysis”, Performance Evaluation Review,Volume 39, Number 4, March 2012, pp. 61–70.

[AEPV04] S.Avallone, D.Emma, A.Pescape, G.Ventre, “A distributedmulti-platform architecture for traffic generation”, in Proc. ofthe 2004 International Symposium on Performance Evaluationof Computer and Telecommunication Systems, (SPECTS’04),San Jose, California, USA, July 25–29, 2004, pp. 659–670.

[AEPV05] S.Avallone, D.Emma, A.Pescape, G.Ventre, “Performanceevaluation of an open distributed platform for realistic trafficgeneration”, Int. Journal on Performance Evaluation, Volume60, 2005, pp. 359–392.

[AlA11] V.A. F.Almeida and J.M.Almeida, “Internet Workloads, Mea-surement, Characterization, and Modeling”, IEEE InternetComputing, March/April 2011, pp. 15–18.

© Springer Fachmedien Wiesbaden GmbH 2017A. Kolesnikov, Load Modelling and Generation in IP-basedNetworks, DOI 10.1007/978-3-658-19102-3

292 Bibliography

[AlD94] R.Alur, and D. L.Dill, “A theory of timed automata”, Theo-retical Computer Science, Volume 126, Number 2, 1994, pp.183–235.

[Alexa] Alexa service, online http://s3.amazonaws.com/

alexa-static/top-1m.csv.zip, retrieved February 10,2015.

[AnT06] A.H.Ang, W.H.Tang, “Probability Concepts in Engineering:Emphasis on Applications to Civil and Environmental Engi-neering”, John Wiley & Sons, 2. Edition, March 2006.

[APF08a] G.Antichi, A.Di Pietro, D. Ficara, S.Giordano, G. Procissi, andF.Vitucci, “BRUNO: A High Performance Traffic Generator forNetwork Processor”, Proc. of 2008 International Symposium onPerformance Evaluation of Computer and TelecommunicationSystems (SPECTS’08), Edinburgh, Scotland, UK, June 16–18,2008, pp. 526–533.

[APF08b] G.Antichi, A.Di Pietro, D. Ficara, S.Giordano, G.Procissi,and F.Vitucci, “Design of a High Performance Traffic Genera-tor on Network Processor”, Proc. of the 11th EUROMICROConference on Digital System Design Architectures, Methodsand Tools (DSD’08), Parma, Italy, September 3–5, 2008, pp.438–441.

[APV04] S.Avallone, A.Pescape, and G.Ventre, “Analysis and Exper-imentation of Internet Traffic Generator”, Proc. of the In-ternational Conference on Next Generation Teletraffic andWired/Wireless Advanced Networking (New2an’04), St. Pe-tersburg, Russia, February 02–06, 2004, pp. 70–75.

[ArW97] M.Arlitt and C.Williamson, “Internet Web Servers: WorkloadCharacterization and Performance Implications”, IEEE/ACMTransactions on Networking, Volume 5, Number 5, October1997, pp. 631–645.

[AWL12] A.Abdollahpouri, B. E.Wolfinger, J. Lai, and C.Vinti, “Mod-eling the Behaviour of IPTV Users with Application to CallBlocking Probability Analysis”, Praxis der Informationsverar-beitung und Kommunikation (PIK), Volume 35, Number 2,June 2012, pp. 75–81.

Bibliography 293

[AX4000] Spirent Federal Systems, AX/4000 Broadband Test Sys-tem, available online http://www.spirentfederal.com/IP/

Products/AX_4000/Overview/, last requested March 29, 2016.

[BAB11] A.C.Begen, T.Akgul, and M.Baugher, “Watching Video overthe Web, Part I, Streaming Protocols”, IEEE Internet Comput-ing, March/April 2011, pp. 54–63.

[BaC98] P.Barford, and M.Crovella, “Generating Representative WebWorkloads for Network and Server Performance Evaluation”,Proc. of SIGMETRICS’98, Madison, Wisconsin, USA, June24–26, 1998, pp. 151–160.

[BaF07] S. Bali and V. Frost, “An algorithm for fitting MMPP to IP traf-fic traces”, IEEE Communications Letters, Volume 11, Number2, 2007, pp. 207-209.

[Bai99] G. Bai, “Load Measurements and Modelling for Distributed Mul-timedia Applications in High-Speed Networks”, Dissertation,Fachbereich Informatik, Universitat Hamburg, 1999.

[BAS96] Bavarian Archive for Speech Signals (BAS), onlinehttp://www.phonetik.uni-muenchen.de/forschung/bay_

arch_sprsig/index.html.

[BASK75] F.Baskett, K.M.Chandy, R.R.Muntz, and F.G.Palacios,“Open, closed, and mixed networks of queues with differentclasses of customers”, Journal of the ACM, Volume 22, Number2, April 1975, pp. 248–260.

[BBB] “Big Buck Bunny” – free computer animated moviefrom the Peach open movie project, available onlinehttp://www.bigbuckbunny.org, last requested March 29,2016.

[BBCR06] R.Bolla, R.Bruschi, M.Canini, M.Repetto, “A High Perfor-mance IP Traffic Generation Tool Based On The Intel IXP2400Network Processor”, book chapter in “Distributed Coopera-tive Laboratories: Networking, Instrumentation, and Measure-ments”, Springer Berlin Heidelberg, 2006, pp. 127—142.

[BBM10] E.Brosh, S.A.Baset, V.Misra, D.Rubenstein, andH. Schulzrinne, “The Delay-Friendliness of TCP for Real-TimeTraffic”, IEEE/ACM Transactions on Networking, Volume 18,Number 5, October 2010, pp. 1478–1491.

294 Bibliography

[BDP10] A. Botta, A.Dainotti, A. Pescape, “Do You Trust Your Software-Based Traffic Generator?”, IEEE Communications Magazine,September 2010, pp. 158–165.

[BDP12] A. Botta, A.Dainotti, A. Pescape, “A tool for the generation ofrealistic network workload for emerging networking scenarios”,Computer Networks, Volume 56, 2012, pp. 3531–3547.

[Bei13] A.Beifuß, “Leistungs- und Prazisionssteigerung des Lastgener-ierungsprozesses von UniLoG unter Verwendung echtzeitfordern-der Maßnahmen durch das Betriebssystem”, Fachtagung desGI/GMA-Fachausschusses Echtzeitsysteme (real-time), Bop-pard am Rhein, November 21–22, 2013, pp. 39–48.

[BGPS05] N. Bonelli, S.Giordano, G. Procissi, and R. Secchi, “BRUTE: AHigh Performance and Extensible Traffic Generator”, Proc. ofthe 2005 International Symposium on Performance Evaluationof Computer and Telecommunication Systems (SPECTS’05),Cherry Hill, New Jersey, USA, July 24–28, 2005, pp. 839–845.

[BMPR10] R. Birke, M.Mellia, M. Petracca, D.Ross, “Experiences of VoIPtraffic monitoring in a commercial ISP”, International Journalof Network Management, Volume 20, Issue 5, September 2010,pp. 339–359.

[BMS11] M.Butkiewicz, H.V.Madhyastha, V. Sekar, “UnderstandingWebsite Complexity: Measurements, Metrics, and Implica-tions”, Proc. of the Internet Measurements Conference IMC’11,Berlin, Germany, November 2–4, 2011, pp. 313–328.

[BMS14] M.Butkiewicz, H.V.Madhyastha, V. Sekar, “CharacterizingWeb Page Complexity and Its Impact”, IEEE/ACM Transac-tions on Networking, Volume 22, Number 3, June 2014, pp.943–956.

[BMW05] S. Boyden, A.Mahanti, C.Williamson, “Characterizing the Be-haviour of Real Video Streams”, in Proc. of the 2005 Interna-tional Symposium on Performance Evaluation of Computer andTelecommunication Systems (SPECTS’05), Cherry Hill, NewJersey, USA, July 24–28, 2005, pp. 783–791.

[BPGP12] N.Bonelli, A.Di Pietro, S.Giordano, and G.Procissi, “Flexiblehigh performance traffic generation on commodity multi-coreplatforms”, Proc. of the 4th International Conference on Traffic

Bibliography 295

Monitoring and Analysis (TMA’12), LNCS 7189, 2012, pp.157–170.

[BRUNO] BRUTE The Browny and RobUst Traffic Engine (BRUTE),available online http://netgroup.iet.unipi.it/software/

brute/, last requested April 11, 2016.

[BRUTE] The Browny and RobUst Traffic Engine (BRUTE), available on-line http://netgroup.iet.unipi.it/software/brute/, lastrequested April 11, 2016.

[CAIDA] The CAIDA Anonymized Internet Traces 2015 Dataset, avail-able online http://www.caida.org/data/passive/passive_2015_dataset.xml, last requested June 18, 2015.

[CaM10] M.C.Calzarossa, L.Massari, “Analysis of web logs: challengesand findings”, in Proc. of the 2010 IFIP WG 6.3/7.3 Interna-tional Conference on Performance Evaluation of Computer andCommunication Systems (PERFORM’10), Lecture Notes inComputer Science, Vol. 6821, Springer, pp. 227–239.

[CCG04] J. Cao, W.Cleveland, Y.Gao, K. Jeffay, F. Smith, andM.Weigle, “Stochastic Models for Generating Synthetic HTTPSource Traffic”, Proc. of INFOCOM’04, Hong Kong, China,March 7–11, 2004, Volume 3, pp. 1546–1557.

[Cha10] J. Charzinski, “Traffic Properties, Client Side Cachability andCDN Usage of Popular Web Sites”, Proc. of MMB & DFT 2010,Essen, March 15-17, 2010, pp. 136–150.

[Cisco1] Cisco IOS NetFlow, online http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html,last requested April 6, 2016.

[Cisco2] Cisco Systems, “Traffic Analysis for Voice overIP”, Technology White Paper, available onlinehttp://www.cisco.com/c/en/us/td/docs/ios/solutions_

docs/voip_solutions/TA_ISD.html, last requested April 15,2016.

[CMCS08] G.Casale, N.Mi, L.Cherkasova, and E. Smirni, “How to Pa-rameterize Models with Bursty Workloads”, SIGMETRICSPerformance Evaluation Review, Volume 36, Number 2, August2008, pp. 38–44.

296 Bibliography

[CKR09] M.Cha, H.Kwak, P.Rodriguez, Y.-Y.Ahn, and S.Moon, “An-alyzing the Video Popularity Characteristics of Large-ScaleUser Generated Content Systems”, IEEE/ACM Transactionson Networking (TON), Volume 17, Number 5, October 2009,pp. 1357–1370.

[CMT90] M.Calzarossa, R.Marie, K. S.Trivedi, “System performancewith user behavior graphs”, Journal Performance Evaluation,Volume 11, Issue 3, September 1990, pp. 155–164.

[Con06] J. Cong, “Load Specification and Load Generation for Mul-timedia Traffic Loads in Computer Networks”, Dissertation,Fachbereich Informatik, Universitat Hamburg, 2006, erschienenin: B. E.Wolfinger (Hrsg.), Berichte aus dem Forschungsschw-erpunkt Telekommunikation und Rechnernetze, Shaker Verlag,Aachen, 2006.

[CrB96] M.Crovella, A.Bestavros, “Self-similarity in world wide webtraffic: Evidence and possible causes”, IEEE/ACM Transac-tions on Networking, Volume 5, Number 6, December 1997, pp.835–846.

[CrD05] N.Cranley, and M.Davis, “Performance Evaluation of VideoStreaming with Background Traffic over IEEE 802.11 WLANNetworks”, Proc. of WMuNeP’05, October 13, 2005, Montreal,Quebec, Canada, pp. 131–139.

[CRCM08] M.Cha, P.Rodriguez, J. Crowcroft, S.Moon, X.Amatriain,“Watching television over an IP network”, in Proc. of the8th ACM SIGCOMM Conference on Internet Measurement(IMC’08), Vouliagmeni, Greece, October 20–22, 2008, pp. 71–84.

[CSK11] Y.Choi, J. A. Silvester, H.Kim, “Analyzing and Modeling Work-load Characteristics in a Multiservice IP Network”, IEEE In-ternet Computing, March/April 2011, pp. 35–42.

[DBP07] A.Dainotti, A.Botta, and A.Pescape, “Do you know whatyou are generating?”, Proc. of the 3rd International Confer-ence on Emerging Networking Experiments and Technologies(CoNEXT’07), Poster Session, New York, USA, December 10-13,2007.

Bibliography 297

[DeM93] L.Deng and J.Mark, “Parameter estimation for markov mod-ulated poisson processes via the em algorithm with time dis-cretization”, Telecommunication Systems, Volume 1, Number1, 1993, pp. 321-338.

[Den95] S.Deng, “Traffic Characteristics of Packet Voice”, Proc. of theIEEE International Conference on Communications, Volume 3,pp. 1369–1374, 1995.

[DJCME92] P.Danzig, S. Jamin, R.Caceres, D.Mitzel and D.Estrin, “AnEmpirical Workload Model for Driving Wide-Area TCP/IP Net-work Simulations”, Wiley Journal of Internetworking: Researchand Experience, Volume 3, Number 1, March 1992.

[DPDK] Data Plane Development Kit, available online http://dpdk.

org/, last requested April 7, 2016.

[DPRPV08] A.Dainotti, A. Pescape, P. S. Rossi, F. Palmieri, G.Ventre, “In-ternet traffic modeling by means of Hidden Markov Models”,Computer Networks, Volume 52, 2008, pp. 2645–2662.

[DRR11] T.Dreibholz, E. P.Rathgeb, I. Rungeler, R. Seggelmann,M.Tuxen, R.R. Stewart, “Stream Control Transmission Pro-tocol: Past, Current, and Future Standardization Activities”,IEEE Communications Magazine, Volume 49, Number 4, pp.82–88, 2011.

[EBB10] G.Eason, E.Brosh, S.A.Baste, V.Misra, D.Rubenstein,H. Schulzrinne, “The Delay-Friendliness of TCP for Real-TimeTraffic”, ACM/IEEE Transactions on Networking, Volume 18,Number 5, pp. 1478–1491, 2010.

[EGRSS11] J. Erman, A.Gerber, K.K.Ramakrishnan, S. Sen, andO. Spatscheck, “Over The Top Video: The Gorilla in Cellu-lar Networks”, Proc. of the Internet Measurements ConferenceIMC’11, Berlin, Germany, November 2–4, 2011, 127–136.

[EGRWC15] P. Emmerich, S.Gallenmuller, D.Raumer, F.Wohlfart, andG.Carle, “MoonGen: A Scriptable High-Speed Packet Gen-erator”, in Proc. of the 2015 ACM Conference on InternetMeasurement (IMC’15), Tokyo, Japan, October 28–30, 2015,pp. 275–287.

[EGT11] J. Erman, A.Gerber, M.T.Hajiaghayi, D. Pei, S. Sen, andO. Spatscheck, “To Cache or Not to Cache – The 3G Case”,

298 Bibliography

IEEE Internet Computing, Volume 15, Number 2, March/April2011, 27–34.

[ENW96] A.Erramilli, O.Narayan, and W.Willinger, “Experimentalqueueing analysis with long-range dependent packet traffic”,IEEE/ACM Transactions On Networking, Volume 4, Number2, April 1996, pp. 209–223.

[FCS08] N. Fonseca, M.Crovella, K. Salamatian, “Long range mutualinformation”, ACM SIGMETRICS Performance EvaluationReview, Volume 36, Issue 2, September 2008, pp. 32–37.

[Fer72] D. Ferrari, “Workload Characterization and Selection in Com-puter Performance Measurement”, IEEE Computer, Volume 5,Number 4, July 1972, pp. 18–24.

[Fer84] D. Ferrari, “On the Foundations of Artificial Workload Design”,ACM SIGMETRICS Performance Evaluation Review, Volume12, Number 3, August 1984, pp. 8–14.

[FGB03] W.Feng, A.Goel, A. Bezzaz, W.Feng, J.Walpole, “TCPivo: AHigh-Performance Packet Replay Engine”, in Proc. of the ACMSIGCOMM 2003 Workshop on Models, Methods, and Tools forReproducible Network Research (MoMeTools’03), Karlsruhe,Germany, August 25–27, 2003, pp. 57–64.

[FGV06] A.M. Faber, M.Gupta, C.Viecco, “Revisiting Web Server Work-load Invariants in the Context of Scientific Web Sites”, in theProc. of the 2006 ACM/IEEE Conference on Supercomputing,Tampa, FL, USA, November 2006, article number 110.

[FlP01] S. Floyd and V.Paxson, “Difficulties in Simulating the Internet”,IEEE/ACM Transactions on Networking, Volume 9, Number 4,August 2001, pp. 392–403.

[G.711] G.711 : Pulse code modulation (PCM) of voice frequencies,ITU Recommendation G.711, online http://www.itu.int/

rec/T-REC-G.711/en.

[G.723.1] G.723.1 : Dual rate speech coder for multimedia communica-tions transmitting at 5.3 and 6.3 kbit/s, ITU RecommendationG.723.1, online http://www.itu.int/rec/T-REC-G.723.1/e.

[G.729.1] G.729.1 : G.729-based embedded variable bit-rate coder: An8-32 kbit/s scalable wideband coder bitstream interoperable

Bibliography 299

with G.729, ITU Recommendation G729.1, online http://www.itu.int/rec/T-REC-G.729.1/.

[Gah08] A.Gahr, “Bereitstellung und Einsatz von Modellen undWerkzeugen zur Erzeugung realitatsnaher synthetischerWebserver-Lasten”, Diploma Thesis, Computer Science Dept.,University of Hamburg, 2008.

[GaW94] M.W.Garrett, W.Willinger, “Analysis, Modelling and Gener-ation of Self-Similar VBR Video Traffic”, ACM SIGCOMMComputer Communication Review, Volume 24, Issue 4, October1994, pp. 269–280.

[GCR01] S.Gadde, J. Chase, and M.Rabinovich, “Web Caching andContent Distribution; A View from the Interior”, ComputerCommunications, Volume 24, Number 2, 2001, pp. 222–231.

[GJCG13] S.Gramatikov, F. Jaureguizar, J. Cabrera, N.Garcıa, “Stochas-tic modelling of peer-assisted VoD streaming in managed net-works”, Computer Networks, Volume 57, Number 9, June 2013,pp. 2058–2074 .

[GJR11] V.Gopalakrishnan, R. Jana, K.K.Ramakrishnan, D. F. Swayne,and V.A.Vaishampayan, “Understanding Couch Potatoes:Measurement and Modelling of Interactive Usage of IPTV atlarge scale”, Proc. of the 11th ACM SIGCOMM Conference onInternet Measurement (IMC’11), Berlin, Germany, November2–4, 2011.

[GrS05] C.Grimm and G. Schluchtermann, “Verkehrstheorie in IP-Netzen: Modelle, Berechnungen, statistische Methoden”, 1.Auflage, Bonn, Huthig, 2005.

[GSMAMR] 3GPP Specification series, ANSI-C code for the AdaptiveMulti Rate (AMR) speech codec, online, http://www.3gpp.org/DynaReport/26-series.htm.

[GTC06] L.Guo, E.Tan, S.Chen, Z.Xiao, O. Spatscheck, X. Zhang,“Delving into Internet Streaming Media Delivery: A Qualityand Resource Utilization Perspective”, Proc. of the InternetMeasurements Conference (IMC’06), October 25–27, 2006, Riode Janeiro, Brazil.

300 Bibliography

[Had06] L.Hadji, “A Unified Load Generator for Geographically Dis-tributed Generation of Network Traffic”, Master Thesis,Dalarna University, Sweden, October 2006.

[Has06] G.Hasslinger, “Validation of Gaussian Traffic Modeling UsingStandard IP Measurement”, Proc. of the 13th GI/ITG Confer-ence on Measurement, Modelling and Evaluation of Computerand Communication Systems (MMB’06), Nurnberg, Germany,March 27–29, 2006, pp. 1–16.

[Hec11] S.Heckmuller, “Einsatz von Lasttransformationen und ihreInvertierung zur realitatsnahen Lastmodellierung in Rechner-netzen”, Dissertation, Fakultat fur Mathematik, Informatik undNaturwissenschaften, Universitat Hamburg, 2011, erschienenin: B. E.Wolfinger (Hrsg.), Berichte aus dem Forschungsschwer-punkt Telekommunikation und Rechnernetze, Band 7, Shaker-Verlag, Aachen, 2011.

[Hef80] H.Heffes, “A Class of Data Traffic Processes – CovarianceFunction Characterization and Relating Queueing Results”,Bell Systems Technical Journal, Volume 59, 1980, pp. 437–488.

[HeL86] H.Heffes and D. Lucantoni, “A markov modulated characteriza-tion of packetized voice and data traffic and related statisticalmultiplexer performance”, IEEE Journal on Selected Areas inCommunications, Volume 4, Number 6, 1986, pp. 856–868.

[HGB06] H.Hassan, J.M.Garcia, and C.Bockstal, “Aggregate TrafficModels for VoIP Applications”, Proc. of the International Con-ference on Digital Telecommunications (ICDT’06), Cap Esterel,Cote d’Azur France, August 29–31, 2006, pp. 70-75.

[HHCW10] T.Y.Huang, P.Huang, K.T.Chen, P. JWang, “Could Skype BeMore Satisfying? A QoE-Centric Study of the FEC Mechanismin an Internet-Scale VoIP System”, IEEE Network, March/April2010, pp. 42–48.

[HLR07] C.Huang, J. Li, and K.W.Ross, “Can Internet Video-on-Demand Be Profitable?”, Proc. of the 2007 Conference onApplications, Technologies, Architectures, and Protocols forComputer Communications (SIGCOMM’07), Kyoto, Japan,August 27–31, 2007, pp. 133–144.

Bibliography 301

[HMS00] D.Hand, H.Mannila, and P. Smyth, “Principles of Data Min-ing”, MIT Press, 2000.

[HoW06] S.Hong, S. F.Wu, “On Interactive Internet Traffic Replay”,Chapter in “Recent Advances in Intrusion Detection”, LectureNotes in Computer Science Series, Volume 3858, 2006, pp.247–264.

[ICDD00] A. Iyengar, J. Challenger, D.Dias, P.Dantzig, “High-Performance Web Site Design Techniques”, Journal IEEEInternet Computing, Volume 4, Issue 2, March 2000, pp. 17–26.

[IEEE1588] Precision Time Protocol (PTP), online http://www.ieee1588.com/index.html, retrieved September 23, 2014.

[IEEE802.16] IEEE 802.16 Broadband Wireless Access Working Group,“Multi-hop Relay System Evaluation Methodology (Chan-nel Model and Performance Metric)”, proposal submitted19.02.2007, online http://www.ieee802.org/16/relay/docs/80216j-06_013r3.pdf, last requested April 29, 2016.

[IEEE802.3x] IEEE Standards for Local and Metropolitan Area Networks:Supplements to Carrier Sense Multiple Access With CollisionDetection (CSMA/CD) Access Method and Physical LayerSpecifications - Specification for 802.3 Full Duplex Operationand Physical Layer Specification for 100 Mbit/s Operation onTwo Pairs of Category 3 Or Better Balanced Twisted PairCable (100BASE-T2). Institute of Electrical and ElectronicsEngineers, ISBN 1-55937-905-7, 1997.

[IhP11] S. Ihm and V. S. Pai, “Towards Understanding Modern WebTraffic”, Proc. of the Internet Measurements Conference IMC’11,Berlin, Germany, November 2–4, 2011, pp. 295–312.

[Int14] ARK - Intel Product Information, Desktop Processors, onlinehttp://ark.intel.com/DesktopProducts, retrieved Septem-ber 22, 2014.

[iPerf3] iPerf - The network bandwidth measurement tool, Active mea-surements in TCP, UDP and SCTP, online https://iperf.fr/,last requested April 17, 2016.

[IPv6S] Google IPv6 statistics, online http://www.google.com/intl/en/ipv6/statistics.html, retrieved January 27, 2015.

302 Bibliography

[IXIA] Ixia Optixia 40- and 100-Gigabit Ethernet Test Mod-ule, available online http://www.ixiacom.com/products/

40100-gbe-load-modules, last requested March 29, 2016.

[IXIA2] “The World’s First 400GbE Test Solution”, Ixia 400GbELoad Modules, available online http://www.ixiacom.com/

products/400gbe-load-modules, last requested March 29,2016.

[IXP2400] “Intel IXP2400 Network Processor: Flexible, High-PerformanceSolution for Access and Edge Applications”, available onlinehttp://www.intel.com/design/network/papers/ixp2400.

pdf, last requested April 11, 2016.

[Jah10] S. Jahnke, “Last-/Verkehrsmessungen und realitatsnahe Last-generierung fur Web-Server-Zugriffe”, Diploma Thesis, Univer-sity of Hamburg, 2010.

[Jai91] R. Jain, “The Art of Computer Systems Performance Analysis –Techniques for Experimental Design, Measurement, Simulation,and Modeling”, Wiley-Interscience, 1991.

[JSZ14] J. Jiang, V. Sekar, and H. Zhang, “Improving Fairness, Effi-ciency, and Scalability in HTTP-Based Adaptive Video Stream-ing With Festive”, IEEE/ACM Transactions on Networking,Volume 22, Number 1, February 2014, pp. 326–340.

[KAB08] N.McKeown, T.Anderson, H., Balakrishnan, G.Parulkar,L. Peterson, J. Rexford, S. Shenker, and J.Turner, “OpenFlow:enabling innovation in campus networks”, in ACM SIGCOMMComputer Communication Review, Volume 38, Issue 2, April2008, pp. 69–74.

[KASS14] A. van Kesteren, J.Aubourg, J. Song, H.R.M. Steen, “XML-HttpRequest Level 1, W3C Working Draft 30 Jan-uary 2014”, W3C, available online http://www.w3.org/TR/

XMLHttpRequest/, last access May 3, 2015.

[KHF06] E.Kohler, M.Handley, S. Floyd, “Congestion Control with-out Reliability”, Proc. of the ACM SIGCOMM’06, Pisa, Italy,September 11–15, 2006, pp. 27–38.

[KiF08] E.Kienzle, and J. Friedrich, “Programmierung von Echtzeitsys-temen”, Carl Hanser Verlag, November 2008.

Bibliography 303

[Kin90] P. J. B.King, “Computer and Communication Systems Perfor-mance Modelling”, Prentice Hall International (UK) Ltd, 1990.

[KLL03] A.Klemm, C. Lindemann, M.Lohmann, “Modeling IP trafficusing the batch Markovian arrival process”, Performance Eval-uation Journal, Volume 54, Number 2, 2003, pp. 149–173.

[KoB13] A.Kolesnikov, A. Beifuss, “UniLoG: Lastgenerierung unter Ver-wendung eines Echtzeitbetriebssystems”, in: B. E.Wolfinger,K.D.Heidtmann (Hrg.), Leistungs-, Zuverlassigkeits- undVerlasslichkeitsbewertung von Kommunikationsnetzen undverteilten Systemen, 7. GI/ITG-Workshop MMBnet 2013, 5.-6. September 2013, Hamburg, Bericht 299 des FachbereichsInformatik an der Universitat Hamburg, 2013, pp. 93–94.

[KoK09] A.Kolesnikov, M.Kulas, “Lastgenerierung an IP-Schnittstellenmit dem UniLoG.IP-Adapter”, in: B. E.Wolfinger,K.D.Heidtmann (Hrg.), Leistungs-, Zuverlassigkeits- undVerlasslichkeitsbewertung von Kommunikationsnetzen undverteilten Systemen, 5. GI/ITG-Workshop MMBnet 2009,10.-11. September 2009, Hamburg, Bericht 287 des DepartmentsInformatik an der Universitat Hamburg, 2009, pp. 24–35.

[KoK10] A.Kolesnikov and M.Kulas, “Load Modeling and Generationfor IP-Based Networks: A Unified Approach and Tool Sup-port”, Proc. of the 15th International GI/ITG Conference onMeasurement, Modeling and Evaluation of Computing Systems,and Dependability and Fault Tolerance (MMB & DFT 2010),Essen, Germany, March 15–17, 2010, pp. 91–106.

[Kol12] A.Kolesnikov “UniLoG: A Unified Load Generation Tool”,Proc. of the 16th International GI/ITG Conference on “Mea-surement, Modelling and Evaluation of Computing Systemsand Dependability and Fault Tolerance”, MMB & DFT 2012,Kaiserslautern (Germany), March 19 – 21, 2012, pp. 253–257.

[Kon12] H.Konig, “Protocol Engineering”, Springer-Verlag Berlin Hei-delberg, 2012.

[KoW11] A.Kolesnikov and B.E.Wolfinger, “Web Workload GenerationAccording to the UniLoG Approach”, Proc. of the 17th GI/ITGConference on Communication in Distributed Systems, Kiel,Germany, March 8–11, 2011, pp. 49–60.

304 Bibliography

[KrH95] M.Krunz, H.Hughes, “A traffic model for MPEG-coded VBRstreams”, ACM SIGMETRICS Performance Evaluation Review,Volume 23, Issue 1, May 1995, pp. 47–55.

[KRL08] R.El Abdouni Khayari, M.Rucker, A. Lehmann, andA.Musovic, “ParaSynTG: A Parameterized Synthetic TraceGenerator for Representation of WWW Traffic”, Proc. of 2008International Symposium on Performance Evaluation of Com-puter and Telecommunication Systems (SPECTS’08), Edin-burgh, Scotland, UK, June 16-18, 2008, pp. 317–323.

[KUTE] KUTE – Kernel-based Traffic Engine, online http://caia.

swin.edu.au/genius/tools/kute/, last access January 19,2016.

[KuT06] S.Kunzli and L.Thiele, “Generating Event Traces Based onArrival Curves”, in Proc. of the 13th GI/ITG Conference onMeasuring, Modelling and Evaluation of Computer and Com-munications Systems (MMB’06), Nurnberg, Germany, March27–29, 2006, pp. 81–98.

[KWK09] A.Kolesnikov, B.E.Wolfinger, and M.Kulas, “UniLoG – einSystem zur verteilten Lastgenerierung in Netzen”, Fachtagungdes GI/GMA-Fachausschusses Echtzeitsysteme (real-time), Bop-pard am Rhein, November 19–20, 2009, pp. 11–20.

[LAJ07] L. Le, J. Aikat, K. Jeffay, and F.D. Smith, “The Effects of ActiveQueue Management and Explicit Congestion Notification onWeb Performance”, IEEE/ACM Transactions On Networking,Volume 15, Number 6, December 2007, pp. 1217–1230.

[LBFE09] G.Y. Lazarou, J. Baca, V. S. Frost, J. B. Evans, “Describing Net-work Traffic Using the Index of Variability”, IEEE/ACM Trans-actions On Networking, Volume 17, Number 5, October 2009,pp. 1672–1683.

[LCWT10] H. Luo, S.Ci, D.Wu, H.Tang, “End-to-end optimized TCP-friendly rate control for real-time video streaming over wirelessmulti-hop networks”, Journal on Visual Communication andImage Representation, Volume 21, Number 2, pp.98–106, 2010.

[Lea10] N. Leavitt, “Network-Usage Changes Push Internet Traffic tothe Edge”, IEEE Computer, Volume 43, Number 10, October2010, pp. 13–15.

Bibliography 305

[LeC08] S. Lee, and K.Chung, “Buffer-driven adaptive video streamingwith TCP-friendliness”, Computer Communications, Volume31, 2008, pp. 2621–2630.

[LFJ97] B.O. Lee, V. S. Frost, and R. Jonkman, “NetSpec Source Modelsfor telnet, ftp, voice, video, and WWW traffic”, technical reportITTC-TR-10980-19, January 1997, available online www.ittc.ku.edu/netspec/usage/traffic_netspec.ps, last requestedApril 15, 2016.

[LHC15] C.,F. Lai, R.H.Hwang, H.C.Chao, M.M.Hassan, andA.Alamri, “A Buffer-Aware HTTP Live Streaming Approachfor SDN-Enabled 5G Wireless Networks”, IEEE Network, Jan-uary/February 2015, pp. 49–55.

[LMN90] D. Lucantoni, K.Meier-Hellstern, M.Neuts, “A single serverqueue with server vacations and a class of non-renewal arrivalprocesses”, Advances in Applied Probability, Volume 22, 1990,pp. 676–705.

[loadstorm] LoadStorm PRO, A cloud load testing tool, online http://

loadstorm.com/pro/, last requested April 18, 2016.

[Low03] S.H. Low, “A Duality Model of TCP and Queue ManagementAlgorithms”, IEEE/ACM Transactions On Networking, Volume11, Number 4, August 2003, pp. 525–536.

[LTWW94] W.Leland, M.Taqqu, W.Willinger, D.Wilson, “On theself-similar nature of Ethernet traffic (extended version)”,IEEE/ACM Transactions On Networking, Volume 2, Number1, February 1994, pp. 1–15.

[Luc91] D. Lucantoni, “New results on the single server queue with abatch Markovian arrival process”, Stochastic Models, Volume7, Number 1, 1991, pp. 1–46.

[MAD04] D.Menasce, V.A. F.Almeida, and L.W.Dowdy, “Performanceby Design – Computer Capacity Planning by Example”, Pren-tice Hall, 2004.

[MAWI] MAWI Working Group Traffic Archive, available online http://mawi.wide.ad.jp/mawi/, last requested March 29, 2016.

[MBM09] M.Menth, A.Binzenhofer, and S.Muhleck, “Source Modelsfor Speech Traffic Revisited”, IEEE/ACM Transactions on

306 Bibliography

Networking (ToN), Volume 17, Number 4, August 2009, pp.1042–1051.

[Men03] D.A.Menasce, “Workload Characterization”, IEEE InternetComputing, September/October 2003, pp. 89–92.

[MeV00] D.A.Menasce, A. F.A.Virgilio, “Scaling for E-Business: Tech-nologies Models Performance and Capacity Planning”, PrenticeHall PTR, Upper Saddle River, NJ, USA, 2000.

[Mey15] D.Meyer, “University of Oregon Route Views Archive Project”,online http://archive.routeviews.org/, last access June 24,2015.

[MGEN] Multi-Generator (MGEN), U.S. Naval Research Laboratory,Networks and Communication Systems Branch, online http://www.nrl.navy.mil/itd/ncs/products/mgen, last access Jan-uary 19, 2016.

[MiG98] V.Misra, W.B.Gong, “A Hierarchical Model for Teletraffic”,in Proc. of the 37th IEEE Conference on Decision & Control,Tampa, Florida, USA, December 1998, pp. 1674–1679.

[Mil12] D. L.Mills, “Executive Summary: Computer Network TimeSynchronization”, available online at http://www.eecis.udel.edu/~mills/exec.html, last updated May 12, 2012, retrievedOctober 14, 2014.

[MJS08] A.Milani, J. Jasso, S. Suriani, “Soft User Behavior Modelingin Virtual Environments”, in Proc. of the 3rd InternationalConference on Convergence and Hybrid Information Technology(ICCIT’08), Busan, Korea, November 11–13, 2008, pp. 1182–1187.

[MMC-TR] M.Menth, A.Binzenhofer, and S.Muhleck, “MMC transitionmatrices for Source Models for Speech Traffic Revisited”, online,http://www3.informatik.uni-wuerzburg.de/TR/mmc/.

[MMV05] M.Meiss, F.Menczer, and A.Vespignani, “On the Lack of Typ-ical Behavior in the Global Web Traffic Network”, Proc. of the14th International World Wide Web Conference (WWW’05),Chiba, Japan, May 10–14, 2005, pp. 510–518.

[MPEG4IP] MPEG4IP - Open Streaming Video and Audio, available onlinehttp://mpeg4ip.sourceforge.net/.

Bibliography 307

[MSDN1] “Acquiring high-resolution time stamps”, Microsoft Devel-oper Network (MSDN), online http://msdn.microsoft.

com/en-us/library/windows/desktop/dn553408(v=vs.85)

.aspx, retrieved September 9, 2014.

[MSDN2] “Scheduling Priorities”, Microsoft Developer Network(MSDN), online http://msdn.microsoft.com/en-us/

library/ms685100(VS.85).aspx, retrieved September 20,2014.

[MSDN3] “TCP/IP Raw Sockets”, Microsoft Developer Network (MSDN),online https://msdn.microsoft.com/en-us/library/

windows/desktop/ms740548\%28v=vs.85\%29.aspx, re-trieved January 29, 2015.

[MSDN4] “IWebBrowser2 interface”, Microsoft Developer Network(MSDN), online https://msdn.microsoft.com/en-us/

library/aa752127\%28v=vs.85\%29.aspx, retrieved May 12,2015.

[MSKGE11] G.Mann, M. Sandler, D.Krushevskaja, S.Guha, E. Even-Dar,“Modeling the parallel execution of black-box services”, Proc. ofthe 3rd USENIX conference on Hot topics in cloud computing(HotCloud’11), 2011, pp. 20–25.

[MSS05] M.Mandjes, I. Saniee, and A. L. Stolyar, “LoadCharacterizationand Anomaly Detection for Voice Over IP Traffic”, IEEE Trans-actions on Neural Networks, Volume 16, Number 5, September2005, pp. 1019–1026.

[Napatech] Napatech Network Management Solutions, online http://

www.napatech.com/solutions/network-management, last re-quested April 16, 2016.

[netmap] L.Rizzo, “netmap - the fast packet I/O framework”, availableonline http://info.iet.unipi.it/~luigi/netmap/, last re-quested April 13, 2016.

[netperf] Netperf Homepage, online http://www.netperf.org/

netperf/, last requested April 17, 2016.

[NIST13] NIST/SEMATECH e-Handbook of Statistical Methods, http://www.itl.nist.gov/div898/handbook/, retrieved May 02,2014.

308 Bibliography

[ntop1] ntop, “Introducing PF RING DNA (Direct NIC Ac-cess)”, available online http://www.ntop.org/pf_ring/

introducing-pf_ring-dna-direct-nic-access/, last re-quested April 14, 2016.

[ntop2] ntop, “Building a 10 Gbit Traffic Generator using PF RING andOstinato”, available online http://www.ntop.org/pf_ring/

building-a-10-gbit-traffic-generator-using-pf_

ring-and-ostinato/, last requested April 14, 2016.

[Odv15] J.Odvarko, “HTTP archive specification”, online http://www.softwareishard.com/blog/har-12-spec/, retrieved May 26,2015.

[OhC05] R.Ohri, E. Chlebus, “Measurement Based E-mail Traffic Char-acterization”, in Proc. of the 2005 International Symposium onPerformance Evaluation of Computer and TelecommunicationSystems (SPECTS’05), Cherry Hill, New Jersey, USA, July24–28, 2005, pp. 761–771.

[OSPG05] R. Pena-Ortiz, J. Sahuquillo, A. Pont, J. A.Gil, “Modeling users’dynamic behaviour in e-business environments using naviga-tions”, International Journal of Electronic Business (IJEB),Volume 3, Number 3-4, 2005, pp. 225—242.

[OSPG09] R.Pena-Ortiz, J. Sahuquillo, A. Pont, J.A.Gil, “Dweb model:Representing Web 2.0 dynamism”, Computer Communications,Volume 32, Number 6, April 2009, pp. 1118–1128.

[PaF95] V. Paxson and S. Floyd, “Wide area traffic: the failure of Poissonmodeling”, IEEE/ACM Transactions on Networking, Volume3, Number 3, 1995, pp. 226–244.

[Pax94] V. Paxson, “Empirically derived analytic models of wide-areaTCP connections”, IEEE/ACM Transactions on Networking,Volume 2, Issue 4, August 1994, pp. 316 – 336.

[PDT09] R. S. Prasad, C.Dovrolis, and M.Thottan, “Router Buffer Sizingfor TCP Traffic and the Role of the Output/Input CapacityRatio”, IEEE/ACM Transactions on Networking, Volume 17,Number 5, October 2009, pp. 1645–1658.

[PEA05] P. Pragtong, T. Erke, and K.Ahmed, “Analysis and Modeling ofVoIP Conversation Traffic in the Real Network”, Proc. of the 5th

Bibliography 309

International Conference on Information, Communications andSignal Processing (ICICS’05), Bangkok, Thailand, December6–9, 2005, pp. 388-392.

[PFFG06] M.Paredes-Farrera, M.Fleury, M.Ghanbari, “Precision andaccuracy of network traffic generators for packet-by-packettraffic analysis”, in Proc. of the 2nd International Conference onTestbeds and Research Infrastructures for the Development ofNetworks and Communities (TRIDENTCOM 2006), Barcelona,Spain, 2006, pp. 32–37.

[PMW10] N.Parvez, A.Mahanti, and C.Williamson, “An AnalyticThroughput Model for TCP NewReno”, IEEE/ACM Transac-tions on Networking, Volume 18, Number 2, April 2010, pp.448–461.

[QGL09] T.Qiu, Z.Ge, S. Lee, J.Wang, J.Xu, and Q. Zhao, “ModelingUser Activities in a Large IPTV System”, Proc. of the 9th ACMSIGCOMM Conference on Internet Measurement (IMC’09),Chicago, Illinois, USA, November 4–6, 2009, pp. 430–441.

[Rab89] L.R.Rabiner, “A tutorial on Hidden Markov Models and se-lected applications in speech recognition”, Proceedings of theIEEE, Volume 77, Number 2, 1989, pp. 257–285.

[RBV12] H.Riiser, H. S. Bergsaker, P.Vigmostad, P.Halvorsen,C.Griwodz, “A Comparison of Quality Scheduling in Commer-cial Adaptive HTTP Streaming Solutions on a 3G Network”,Proc. of the MoVid’12, February 24, 2012, Chaper Hill, NorthCarolina, USA, pp. 25–30.

[RCW12] A.Rajabi, D.R.Cheriton, J.W.Wong, “MMPP Characteriza-tion of Web Application Traffic”, in Proc. of the 2012 IEEE20th International Symposium on Modeling, Analysis and Sim-ulation of Computer and Telecommunication Systems (MAS-COTS’2012), Washington, DC, USA, August 7–9, 2012, pp.107–114.

[RDC11] L.Rizzo, L.Deri, and A.Cardigliano, “10 Gbit/s Line RatePacket Processing Using Commodity Hardware: Survey andnew Proposals”, available online at http://luca.ntop.org/10g.pdf.

310 Bibliography

[Rec12] J. Rech, “Wireless LANs: 802.11-WLAN-Technologie und prak-tische Umsetzung im Detail”, 4th Edition, Hannover, Heise,2012.

[RFC791] J. Postel, “Internet Protocol”, RFC 791, September 1981.

[RFC792] J. Postel, “Internet Control Message Protocol”, RFC 792,September 1981.

[RFC793] J. Postel, “Transmission Control Protocol”, RFC 793, Septem-ber 1981.

[RFC1122] R. Braden, “Requirements for Internet Hosts – CommunicationLayers”, RFC 1122, October 1989.

[RFC1962] D.Rand, “The PPP Compression Control Protocol (CCP)”,RFC 1962, Juni 1996.

[RFC2003] C. Perkins, “IP Encapsulation within IP”, RFC 2003, October1996.

[RFC2326] H. Schulzrinne, A.Rao, and R. Lanphier, “Real Time StreamingProtocol (RTSP)”, RFC 2326, April 1998.

[RFC2474] K.Nichols, S. Blake, F. Baker, and D.Black, “Definition of theDifferentiated Services Field (DS Field) in the IPv4 and IPv6Headers”, RFC 2474, December 1998.

[RFC2616] R. Fielding, J.Gettys, J.Mogul, H. Frystyk, L.Masinter,P. Leach, T.Berners-Lee, “Hypertext Transfer Protocol –HTTP/1.1”, RFC 2616, June 1999.

[RFC2960] R. Stewart, Q.Xie, K.Morneault, C. Sharp, H. Schwarzbauer,T.Taylor, I. Rytina, M.Kalla, L. Zhang, V.Paxson, “StreamControl Transmission Protocol”, RFC 2960, October 2000.

[RFC3168] K.Ramakrishnan, S. Floyd, and D.Black, “The Addition ofExplicit Congestion Notification (ECN) to IP”, RFC 3168,September 2001.

[RFC3448] M.Handley, S. Floyd, J. Padhye, J.Widmer, “TCP FriendlyRate Control (TFRC): Protocol Specification”, RFC 3448, Jan-uary 2003.

[RFC3550] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “RTP:A Transport Protocol for Real-Time Applications”, RFC 3550,July 2003.

Bibliography 311

[RFC3692] T.Narten, “Assigning Experimental and Testing Numbers Con-sidered Useful”, RFC 3692, January 2004.

[RFC3951] S.Andersen, A.Duric, H.Astrom, R.Hagen, W.Kleijn,J. Linden, “Internet Low Bit Rate Codec (iLBC)”, RFC 3951,December 2004.

[RFC3954] B.Claise, “Cisco Systems NetFlow Services Export Version 9”,RFC 3954, October 2004.

[RFC3984] S.Wenger, M.M.Hannuksela, T. Stockhammer, M.Westerlund,D. Singer, “RTP Payload Format for H.264 Video”, RFC 3984,February 2005.

[RFC4960] R. Stewart, Ed., “Stream Control Transmission Protocol”, RFC4960, September 2007.

[RFC5246] T.Dierks, E.Rescorla, “The Transport Layer Security (TLS)Protocol Version 1.2”, RFC 3984, August 2008.

[RFC5348] S. Floyd, M.Handley, J. Padhye, J.Widmer, “TCP FriendlyRate Control (TFRC): Protocol Specification”, RFC 5348,September 2008.

[RFC5905] D.Mills, U.Delaware, J.Martin, J. Burbank, W.Kasch, “Net-work Time Protocol Version 4: Protocol and Algorithms Speci-fication”, RFC 5905, June 2010.

[RFC6176] S.Turner, T. Polk, “Prohibiting Secure Sockets Layer (SSL)Version 2.0”, RFC 6176, March 2011.

[RFC6184] Y.-K.Wang, R.Even, T.Kristensen, R. Jesup, “RTP PayloadFormat for H.264 Video”, RFC 6184, May 2011.

[RFC6864] J. Touch, “Updated Specification of the IPv4 ID Field”, RFC6864, February 2013.

[RLB11] A.Rao, Y. Lim, C.Barakat, A. Legout, D.Towsley, W.Dabbous,“Network Characteristics of Video Streaming Traffic”, Proc. ofthe ACM CoNEXT 2011, December 6–9, 2011, Tokyo, Japan,Article No. 25.

[ROB01] J.W.Roberts, “Traffic Theory and the Internet”, IEEE Com-munications Magazine, Volume 39, Number 1, January 2001,pp. 94–99.

312 Bibliography

[Ros95] O.Rose, “Statistical properties of MPEG video traffic and theirimpact on traffic modeling in ATM systems”, in Proc. of the20th Conference on Local Computer Networks, Minneapolis,MN, USA, October 16–19, 1995, pp. 397–406.

[RRB07a] C.Rolland, J.Ridoux, and B.Baynat, “Catching IP trafficburstiness with a lightweight generator”, Proc. IFIP NET-WORKING’07, Atlanta, May 14-18, 2007, pp. 924–934.

[RRB07b] C.Rolland, J. Ridoux, and B.Baynat, “LiTGen, a lightweighttraffic generator: application to P2P and mail wireless traffic”,in Proc. of the 8th International Conference on Passive andActive Network Measurement, PAM 2007, Louvain-la-neuve,Belgium, April 5–6, 2007, pp. 52–62.

[RSR09] F.Ramos, F. Song, P.Rodriguez, R.Gibbens, J. Crowcroft, andI. H.White, “Constructing an IPTV Workload Model”, PosterSession at the ACM SIGCOMM 2009 Conference (SIGCOMM2009), Barcelona, Spain, August 17-21.

[RTOS] On Time Informatik GmbH, Win32 API Compatible Embed-ded RTOS, online http://www.on-time.com/, last retrievedFebruary 16, 2016.

[RUDE] RUDE & CRUDE, Real-time UDP Data Emitter, online http://rude.sourceforge.net/, last access January 19, 2016.

[SAMFU12] F. Schneider, B.Ager, G.Maier, A. Feldmann, and S.Uhlig,“Pitfalls in HTTP Traffic Measurements and Analysis”, Proc.of the 13th Passive and Active Measurement Conference(PAMS’2012), Vienna, Austria, March 13–14th, 2012, pp. 242–251.

[SaV01] K. Salamatian, S. Vaton, “Hidden Markov Modeling for networkcommunication channels”, in Proc. of the ACM SIGMETRICS2001, Volume 29, 2001, pp. 92–101.

[Sch07] M. Schwengel, “Verteilte Lastgenerierung, Architekturen, Re-alisierungen und Fallstudien”, VDM Verlag Dr. Muller,Saarbrucken, 2007.

[SCK03] W. Shi, E.Collins, and V.Karamcheti, “Modeling object char-acteristics of dynamic Web content”, Journal of Parallel andDistributed Computing, Number 63, 2003, pp. 963–980.

Bibliography 313

[Sie09] G. Siegmund, “Technik der Netze 2. Neue Ansatze: SIP in IMSund NGN”, 6., vollig neu bearbeitete und erweiterte Auflage,Huthig Verlag Heidelberg, 2009.

[SKR07] P. Svoboda, W.Karner, M.Rupp, “Modeling E-Mail Traffic for3G Mobile Networks”, in Proc. of the 18th International Sym-posium on Personal, Indoor and Mobile Radio Communications,Athens, Greece, September 3–7, 2007, pp. 1–5.

[Skype] Skype softphone application, online http://www.skype.com/

en/.

[SoB04] J. Sommers and P.Barford, “Self-Configuring Network TrafficGeneration”, Proc. of the 4th ACM SIGCOMM Conferenceon Internet Measurement (IMC’04), Taormina, Sicily, Italy,October 25–27, 2004, pp. 68–81.

[SPT07] K. Sleurs, J. Potemans, J. Theunis, D. Li, E.Van Lil, A.Vande Capelle, “Evaluation of Network Traffic Workload ScalingTechniques”, Computer Communications, Volume 30, May 2007,pp. 3096–3106.

[SPV04] P. Salvador, A. Pacheco, R.Valadas, “Modeling IP traffic: jointcharacterization of packet arrivals and packet sizes usingBMAPs”, Elsevier Computer Networks, Volume 44, October2004, pp. 335–352.

[Sri16] P. Srivats, “OSTINATO - Packet Traffic Generator and Ana-lyzer”, available online http://ostinato.org/, last requestedApril 13, 2016.

[SRS03] U. Sarkar, S.Ramakrishnan, and D. Sarkar, “Modeling Full-Length Video Using Markov-Modulated Gamma-Based Frame-work”, IEEE/ACM Transactions on Networking (TON), Vol-ume 11, Number 4, August 2003, pp. 638-649.

[SrW86] K. Sriram and W.Whitt, “Characterizing superposition arrivalprocesses in packet multiplexers for voice and data”, IEEE Jour-nal on Selective Areas in Communications, Volume 4, Number6, September 1986, pp. 833–846.

[SSLL09] M.E. Sousa-Vieira, A. Suarez-Gonzalez, J. C. Lopez-Ardao, andC. Lopez-Garcıa, “Efficient On-Line Generation of the Corre-lation Structure of F-ARIMA Processes”, in Proc. of the 16th

314 Bibliography

International Conference on Analytical and Stochastic Mod-eling Techniques and Applications (ASMTA 2009), Madrid,Spain, June 9–12, 2009, LNCS 5513, Springer-Verlag, BerlinHeidelberg 2009, pp. 131–143.

[StW98] W.R. Stevens, G.R.Wright, “TCP/IP illustrated”, Volume 1:The protocols, Reading, Mass., Addison-Wesley, 1998.

[TCPrp] “Tcpreplay - Pcap editing and replaying utilities”, online athttp://tcpreplay.appneta.com/, last requested March 28,2016.

[TPC-W] TPC-W, a transactional web e-Commerce benchmark, avail-able online http://www.tpc.org/tpcw/default.asp, last re-quested April 18, 2016.

[ViV06] K.V.Vishwanath and A.Vahdat, “Realistic and ResponsiveNetwork Traffic Generation”, Proc. of the ACM SIGCOMM’06,Pisa, Italy, September 11–15 2006, pp. 111–122.

[ViV09] K.V.Vishwanath and A.Vahdat, “Swing: Realistic and Respon-sive Network Traffic Generation”, IEEE/ACM Transactions onNetworking, Volume 17, Number 3, June 2009, pp. 712–725.

[VNI15] Cisco Visual Networking Index: Forecast and Method-ology, 2014-2019 White Paper, available online athttp://www.cisco.com/c/en/us/solutions/collateral/

service-provider/ip-ngn-ip-next-generation-network/

white_paper_c11-481360.html, last requested March 3,2016.

[VYW02] A.Vahdat, K.Yocum, K.Walsh, P.Mahadevan, D.Kostic,J. Chase, and D.Becker, “Scalability and accuracy in a large-scale network emulator”, in Proc. of the 5th Symposium onOperating Systems Design and Implementation (OSDI), Boston,Massachusetts, USA, December 9–11, 2002.

[WAW05] A.Williams, M.Arlitt, C.Williamson, and K.Barker, “Webworkload characterization: Ten years later”, Springer, Heidel-berg, 2005.

[Wei12] M.Weinschenk, “Messung und Analyse von Lastcharakteris-tiken des Webverkehrs fur die Generierung realitatsnaher syn-thetischer Weblasten”, Bachelor Thesis, University of Hamburg,Department of Informatics, Hamburg, 2012.

Bibliography 315

[Wel11] M.Welsh, “Measuring the mobile Web is hard”, avail-able online http://matt-welsh.blogspot.com/2011/08/

measuring-mobile-web-is-hard.html, last retrieved Juli 22,2015.

[WeX06] J.Wei and C.Xu, “sMonitor: A Non-Intrusive Client-PerceivedEnd-to-End Performance Monitor of Secured Internet Services”,Proc. of USENIX’06, Boston, May 30 - June 3, 2006, pp. 243–248.

[WinPcap] WinPcap – The industry standard windows packet capturelibrary, online http://www.winpcap.org/, last access Septem-ber 2, 2014.

[Wire] WireShark – network protocol analyser, online http://www.

wireshark.org, retrieved February 11, 2015.

[WITS] “WITS: Waikato Internet Traffic Storage”, WAND NetworkResearch Group, available online http://wand.net.nz/wits/index.php, last requested March 29, 2016.

[WKST08] B.Wang, J.Kurose, P. Shenoy, D.Towsley, “Multimedia Stream-ing via TCP: An Analytic Performance Study”, ACM Transac-tions on Multimedia Computing, Communications and Appli-cations, Volume 4, Number 2, Article 16, May 2008.

[WoK90] B. E.Wolfinger and J. J.Kim, “Load Measurements as a Basisfor Modeling the Load of Innovative Communication Systemswith Service Integration”, Proc. of the 2nd IEEE Workshopon Future Trends of Distributed Computing Systems, Cairo,Egypt, September 30–October 2, 1990, pp. 14–21.

[Wol99] B. E.Wolfinger, “Characterization of Mixed Traffic Load inService-Integrated Networks”, System Science Journal, Volume25, Number 2, April 1999, pp. 65–86.

[WTSW95] W.Willinger, M. S.Taqqu, R. Sherman, D.V.Wilson, “Self-Similarity Through High-Variability: Statistical Analysis ofEthernet LAN Traffic at the Source Level”, in Proc. of theACM SIGCOMM, Philadelphia, PA, USA, August 1995, pp.100–113.

[Wu12] J.Wu, “Advances in K-means Clustering: A Data Mining Think-ing”, Verlag Springer, Berlin, Heidelberg, 2012.

316 Bibliography

[WWT02] W.Wei, B.Wang, D.Towsley, “Continuous-time Hidden MarkovModels for network performance evaluation”, Performance Eval-uation, Volume 49, Number 4, 2002, pp. 129–146.

[Xer13] “Xerces-C++ XML Parser”, http://xerces.apache.org/

xerces-c/, The Apache XML Project, retrieved June 27, 2013.

[XLite] CounterPath’s XLite 4.1 Softphone, available online http:

//www.counterpath.com/x-lite.html, retrieved March 15,2014.

[XML08] “Extensible Markup Language (XML) 1.0 (Fifth Edition)”,http://www.w3.org/TR/REC-xml/, W3C Recommendation,November 26, 2008, retrieved June 27, 2013.

[XSD12] “W3C XML Schema Definition Language (XSD) 1.1 Part 2:Datatypes”, http://www.w3.org/TR/xmlschema11-2/, W3CRecommendation, April 5, 2012, retrieved October 10, 2013.

[YZZZ06] H.Yu, D. Zheng, B.Y. Zhao, and W.Zheng, “UnderstandingUser Behavior in Large-Scale Video-on-Demand Systems”, Proc.of the 1st ACM SIGOPS/EuroSys European Conference onComputer Systems (EuroSys’06), Leuven, Belgium, April 18–21,2006, 333–344.

[ZKA05] S. Zander, D.Kennedy, G.Armitage, “KUTE - A High Perfor-mance Kernel-based UDP Traffic Engine”, Technical ReportCAIA-TR-050118A, Centre for Advanced Internet Architec-tures (CAIA), Swinburne University of Technology, Melbourne,Australia, January 2005.

[ZNA03] M. Zukerman, T.D.Neame, and R.G.Addie, “Internet TrafficModeling and Future Technology Implications”, in Proc. ofthe 22nd Annual Joint Conference of the IEEE Computer andCommunications IEEE Societies, (INFOCOM 2003), Volume 1,San Francisco, California, USA, March 30 – April 3, 2003, pp.587–596.