Advertisement

A Novel Self-Similar (S2) Traffic Filter to Enhance E-Business Success by Improving Internet Communication Channel Fault Tolerance

  • Allan K. Y. Wong
  • Wilfred W. K. Lin
  • Tharam S. Dillon
  • Jackei H. K. Wong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4671)

Abstract

Internet traffic patterns can cause serious buffer overflow in electronic business (e-business) systems. This leads to widespread retransmission that prolongs the service roundtrip time (RTT). As a result customers are unhappy and avoid returning to do more business. The previous Real-Time Traffic Pattern Detector (RTPD) was proposed to improve Internet channel fault tolerance. With RTPD support time-critical applications can identify the traffic patterns and invoke the corresponding measures to neutralize their ill effects in a dynamic manner. The extant RTPD, however, cannot detect self-similar traffic. This inspired the development of the novel self-similarity (S 2) filter proposed in this paper, which makes the RTPD capability more complete. The “RTPD + S 2” package is the enhanced RTPD or ERTPD package. The test results indicate that the addition of the S 2 mechanism can indeed contribute to improved e-business communication channels over the Internet.

Keywords

S2 filter e-business Internet traffic ERTPD dynamic buffer size tuning 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Thomas, S.F., Gillenson, M.L.: Mobile Commerce: What It Is and What It Could Be. Communications ACM 46(12), 33–34 (2003)CrossRefGoogle Scholar
  2. 2.
    Venkatesh, V., Ramesh, V., Massey, A.P.: Understanding Usability in Mobile Commerce. Communications of the ACM 46(12), 53–56 (2003)CrossRefGoogle Scholar
  3. 3.
    Garlan, D., Siewiorek, D.P., Smailagic, A., Steenkiste, P.: Project Aura: Toward Distraction-free Pervasive Computing. IEEE Pervasive Computing 1(2), 22–31 (2002)CrossRefGoogle Scholar
  4. 4.
    Wong, A.K.Y., Lin, W.W.K., Ip, M.T.W., Dillon, T.S.: Genetic Algorithm and PID Control Together for Dynamic Anticipative Marginal Buffer Management: An Effective Approach to Enhance Dependability and Performance for Distributed Mobile Object-Based Real-time Computing over the Internet. Journal of Parallel and Distributed Computing (JPDC) 62, 1433–1453 (2002)zbMATHCrossRefGoogle Scholar
  5. 5.
    Wu, R.S.L., Wong, A.K.Y., Dillon, T.S.: RDCT: A Novel Reconfigurable Dynamic Cache Size Tuner to Shorten Information Retrieval Time over the Internet International Journal of Computer Systems. Science & Engineering 19(6), 363–372 (2004)Google Scholar
  6. 6.
    Molnar, S., Dang, T.D., Vidacs, A.: Heavy-Tailedness, Long-Range Dependence and Self-Similarity in Data Traffic. In: Proc. of the 7th Int’l Conference on Telecommunication Systems, Modelling and Analysis, Nashville, USA, pp. 18–21 (1999)Google Scholar
  7. 7.
    Wong, A.K.Y., Dillon, T.S.: A Fault-Tolerant Data Communication Setup to Improve Reliability and Performance for Internet-Based Distributed Applications. In: Proc. of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), Hong Kong (SAR), pp. 268–275 (December 1999)Google Scholar
  8. 8.
    Wong, A.K.Y., Dillon, T.S., Ip, M.T.W., Lin, W.W.K., Wong, B.: A Collaboration Model for Better Reliability and Performance for Object-Based Distributed Applications over the Internet. International Journal of Computer Applications in Technology, 16, 78–86 (2002)CrossRefGoogle Scholar
  9. 9.
    Paxson, V., Floyd, S.: Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking 3(3), 226–244 (1995)CrossRefGoogle Scholar
  10. 10.
    Lin, W.W.K., Wong, A.K.Y., Dillon, T.S.: A Novel Fuzzy-PID Dynamic Buffer Tuning Model to Eliminate Overflow and Shorten the End-to-End Roundtrip Time for TCP Channels. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 783–787. Springer, Heidelberg (2004), http://www.springerlink.com/index/VF155CH38XFLLB4H Google Scholar
  11. 11.
    Lin, W.W.K., Wu, R.S.L., Wong, A.K.Y., Dillon, T.S.: A Novel Real-Time Traffic Pattern Detector for Internet Applications. In: Proc. of the Australasian Telecommunication Networks and Applications Conference, Sydney, Australia (ATNAC 2004), pp. 224–227 (December 2004)Google Scholar
  12. 12.
    Lewandowski, S.M.: Frameworks for Component-based Client/Server Computing. ACM Computing Surveys 30(1), 3–27 (1998)CrossRefGoogle Scholar
  13. 13.
    Medina, A., Matta, I., Byers, J.: On the Origin of Power Laws in Internet Topologies. ACM SIGCOMM 30(2), 18–28 (2000)CrossRefGoogle Scholar
  14. 14.
    Willinger, W., Paxson, V., Hiedi, R.H., Taqqu, M.S.: Long-Range Dependence and Data Network Traffic. In: Doukhan, P., et al. (eds.) Theory and Applications of Long-Range Dependence, Birkhäuser, pp. 373–408 (2003)Google Scholar
  15. 15.
    Taqqu, M.S.: Fractional Brownian Motion and Long-Range Dependence. In: Doukhan, P., et al. (eds.) Theory and Applications of Long-Range Dependence, pp. 5–38. Birkhäuser (2003)Google Scholar
  16. 16.
    Wong, A.K.Y., Wong, J.H.C.: A Convergence Algorithm for Enhancing the Performance of Distributed Applications Running on Sizeable Networks. The International Journal of Computer Systems, Science & Engineering 16(4), 229–236 (2001)Google Scholar
  17. 17.
    Intel’s VTune Performance Analyzer, http://ww.intel.com/support/performancetools/vtune/v5
  18. 18.
    Lin, W.W.K., Wong, A.K.Y., Dillon, T.S.: Application of Soft Computing Techniques to Adaptive User Buffer Overflow Control on the Internet. IEEE Transactions of Systems, Man and Cybernetics, Part C (2005)Google Scholar
  19. 19.
    Generator of Self-Similar Network Traffic, http://wwwcsif.cs.ucdavis.edu/~kramer/code/trf_gen1.html
  20. 20.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Allan K. Y. Wong
    • 1
  • Wilfred W. K. Lin
    • 2
  • Tharam S. Dillon
    • 2
  • Jackei H. K. Wong
    • 1
  1. 1.Department of Computing, Hong Kong Polytechnic University, Hong Kong S.A.R. 
  2. 2.Faculty of Information Technology, University of Technology SydneyAustralia

Personalised recommendations