Queueing Systems

, Volume 28, Issue 1–3, pp 215–243 | Cite as

Macroscopic models for long-range dependent network traffic

  • Takis Konstantopoulos
  • Si-Jian Lin


A common way to inject long-range dependence in a stochastic traffic model possessing a weak regenerative structure is to make the variance of the underlying period infinite (while keeping the mean finite). This method is supported both by physical reasoning and by experimental evidence. We exhibit the long-range dependence of such a process and, by studying its second-order properties, we asymptotically match its correlation structure to that of a fractional Brownian motion. By studying a certain distributional limit theorem associated with such a process, we explain the emergence of an extremely skewed stable Lévy motion as a macroscopic model for the aforementioned traffic. Surprisingly, long-range dependence vanishes in the limit, being “replaced” by independent increments and highly varying marginals. The marginal distribution is computed and is shown to match the one empirically obtained in practice. Results on performance of queueing systems with Lévy inputs of the aforementioned type are also reported in this paper: they are shown to be in agreement with pre-limiting models, without violating experimental queueing analysis.

long-range dependence Lévy processes traffic modeling performance evaluation self-similarity regular variation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    V. Anantharam, On the sojourn time of sessions at an ATM buffer with long-range dependent input traffic, in: Proc. 34th IEEE CDC, New Orleans (December 1995).Google Scholar
  2. [2]
    V. Anantharam and T. Konstantopoulos, Burst reduction properties of the leaky bucket flow control scheme in ATM networks, IEEE Trans. Commun. 42 (1994) 3085-3089.CrossRefGoogle Scholar
  3. [3]
    J. Beran, R. Sherman, M.S. Taqqu and W. Willinger, Long-range dependence in variable bit rate video traffic, IEEE Trans. Commun. 43 (1995) 1566-1579.CrossRefGoogle Scholar
  4. [4]
    P. Billingsley, Convergence of Probability Measures (Wiley, New York, 1968).Google Scholar
  5. [5]
    N.H. Bingham, C.M. Goldie and J.L. Teugels, Regular Variation, Encyclopedia of Mathematics and Its Applications, Vol. 27 (Cambridge University Press, 1987).Google Scholar
  6. [6]
    J.M. Chambers, C.L. Mallows and B.M. Stuck, A method for simulating stable random variables, J. Amer. Statist. Assoc. 71 (1976) 340-344.CrossRefGoogle Scholar
  7. [7]
    D.R. Cox, Long-range dependence: a review, in: Statistics: An Appraisal, Proc. 50th Anniversary Conference (Iowa State Statistical Laboratory, 1983).Google Scholar
  8. [8]
    D.J. Daley, Asymptotic properties of stationary point processes with generalized clusters, Z. Wahrscheinlichkeitstheorie Verw. Geb. 21 (1972) 65-76.CrossRefGoogle Scholar
  9. [9]
    D.J. Daley and D. Vere-Jones, An Introduction to the Theory of Point Processes (Springer, Berlin, 1988).Google Scholar
  10. [10]
    N.G. Duffield and N. O'Connell, Large deviations and overflow probabilities for the general single-server queue, with applications, Math. Proc. Cambridge Philos. Soc. (1995) 363-375.Google Scholar
  11. [11]
    A. Erramilli, O. Narayan and W. Willinger, Experimental queueing analysis with long-range dependent packet traffic, IEEE/ACM Trans. Networking 4 (1996) 209-223.CrossRefGoogle Scholar
  12. [12]
    W. Feller, An Introduction to Probability Theory and its Applications, Vol. 2 (Wiley, New York, 1966).Google Scholar
  13. [13]
    M.W. Garrett and W. Willinger, Analysis, modeling and generation of self-similar VBR video traffic, in: ACM SigComm, London (1994).Google Scholar
  14. [14]
    B.V. Gnedenko and I.N. Kovalenko, Introduction to Queueing Theory (Birkhäuser, Boston, 1989).Google Scholar
  15. [15]
    J.M. Harrison, The supremum distribution of a Lévy process with no negative jumps, Adv. Appl. Probab. 9 (1977) 417-422.CrossRefGoogle Scholar
  16. [16]
    C. Klüppelberg and T. Mikosch, Explosive Poisson shot noise processes with applications to risk reserves, Bernoulli 1 (1995) 125-147.CrossRefGoogle Scholar
  17. [17]
    C. Klüppelberg and T. Mikosch, Delay in claim settlement and ruin probability approximation, Scand. Actuar. J. (1995) 154-168.Google Scholar
  18. [18]
    T. Konstantopoulos and V. Anantharam, Optimal flow control schemes that regulate the burstiness of traffic, IEEE/ACM Trans. Networking 3 (1995) 423-432.CrossRefGoogle Scholar
  19. [19]
    T. Konstantopoulos and S.J. Lin, Analysis of Lévy networks, in preparation.Google Scholar
  20. [20]
    T. Kurtz, Limit theorems for worload input models, Preprint, Department of Mathematics and Statistics, University of Wisconsin-Madison (1996).Google Scholar
  21. [21]
    J.A. Lane, The central limit theorem for the Poisson shot-noise process, J. Appl. Probab. 21 (1984) 287-301.CrossRefGoogle Scholar
  22. [22]
    W.E. Leland, M.S. Taqqu, W. Willinger and D.V. Wilson, On the self-similar nature of Ethernet traffic, IEEE/ACM Trans. Networking 2 (1994) 1-15.CrossRefGoogle Scholar
  23. [23]
    N. Likhanov, B. Tsybakov and N.D. Georganas, Analysis of an ATM buffer with self-similar (“fractal”) input traffic, in: Proc. IEEE INFOCOM '95, Boston (1995).Google Scholar
  24. [24]
    S.J. Lin, Lévy and fractional Brownian motions for modeling and performance analysis of self-similar traffic in high-speed communication networks, Ph.D. dissertation, ECE Department, University of Texas at Austin (1996).Google Scholar
  25. [25]
    B. Mandelbrot and J. Van Ness, Fractional Brownian motions, fractional noise and applications, SIAM Rev. 10 (1968) 422-437.CrossRefGoogle Scholar
  26. [26]
    I. Norros, A storage model with self-similar input, Queueing Systems 16 (1994) 387-396.CrossRefGoogle Scholar
  27. [27]
    G. Samorodnitsky and M.S. Taqqu, Stable Non-Gaussian Random Processes (Chapman & Hall, New York, 1994).Google Scholar
  28. [28]
    A.V. Skorokhod, Limit theorems for stochastic processes, Theory Probab. Appl. 1 (1957) 261-290.CrossRefGoogle Scholar
  29. [29]
    M.S. Taqqu and J. Levy, Using renewal processes to generate long-range dependence and high variability, in: Dependence in Probability and Statistics, eds. E. Eberlein and M.S. Taqqu (Boston, Birkhäuser, 1986) pp. 73-89.Google Scholar
  30. [30]
    W. Willinger, M.S. Taqqu and A. Erramilli, A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks, in: Stochastic Networks: Theory and Applications, eds. F.P. Kelly, S. Zachary and I. Ziedins (Oxford University Press, 1996).Google Scholar
  31. [31]
    W. Willinger, M.S. Taqqu, W.E. Leland and V. Wilson, Self-similarity in high-speed packet traffic: analysis and modeling of Ethernet traffic measurements, Statist. Sci. 10 (1995) 67-85.Google Scholar
  32. [32]
    W. Willinger, M.S. Taqqu, R. Sherman and D.V. Wilson, Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level, Computer Comm. Rev. 25 (1995) 110-113.Google Scholar
  33. [33]
    W. Willinger, M.S. Taqqu, R. Sherman and D.V. Wilson, Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level, IEEE Trans. Networking 5 (1997) 71-86.CrossRefGoogle Scholar
  34. [34]
    V. Zolotarev, One-dimensional Stable Distributions, Translations of Mathematical Monographs, Vol. 65 (Amer. Math. Soc., Providence, RI, 1986).Google Scholar

Copyright information

© Kluwer Academic Publishers 1998

Authors and Affiliations

  • Takis Konstantopoulos
    • 1
  • Si-Jian Lin
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of TexasAustinUSA

Personalised recommendations