Skip to main content

A Queueing-Based Approach to Overload Detection

  • Conference paper
Network Control and Optimization (NET-COOP 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5894))

Included in the following conference series:

Abstract

The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we develop such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For the situation of exponential holding times an explicit analysis can be performed in a large-deviations regime, leading to approximations of the test statistic of interest (and, in addition, to results for the transient of the M/M/∞ queue, which are of independent interest). This procedure being applicable to exponential holding times only, and also being numerically rather involved, we then develop an approximate procedure for general holding times. In this procedure we record the number of trunks occupied at equidistant points in time \({\it \Delta},2{\it \Delta},\ldots\), where \({\it \Delta}\) is chosen sufficiently large to safely assume that the samples are independent; this procedure is backed by results on the transient of the M/G/∞ queue. The validity of the testing procedures is demonstrated through an extensive set of numerical experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blanc, J., van Doorn, E.: Relaxation times for queueing systems. In: de Bakker, J., Hazewinkel, M., Lenstra, J.K. (eds.) Mathematics and Computer Science. CWI Monograph, vol. 1, pp. 139–162. North-Holland, Amsterdam (1984)

    Google Scholar 

  2. Bucklew, J.: Large Deviation Techniques in Decision, Simulation, and Estimation. Wiley, New York (1990)

    Google Scholar 

  3. Ho, L., Cavuto, D., Papavassiliou, S., Zawadzki, A.: Adaptive/automated detection of service anomalies in transaction-oriented WANS: Network analysis, algorithms, implementation, and deployment. IEEE Journal of Selected Areas in Communications 18, 744–757 (2000)

    Article  Google Scholar 

  4. Mandjes, M.: Large Deviations of Gaussian Queues. Wiley, Chichester (2007)

    Book  Google Scholar 

  5. Mandjes, M., Saniee, I., Stolyar, A.: Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. IEEE Transactions on Neural Networks 16, 1019–1028 (2005)

    Article  Google Scholar 

  6. van de Meent, R., Mandjes, M., Pras, A.: Gaussian traffic everywhere? In: Proc. 2006 IEEE International Conference on Communications, Istanbul, Turkey (2006)

    Google Scholar 

  7. Münz, G., Carle, G.: Application of forecasting techniques and control charts for traffic anomaly detection. In: Proc. 19th ITC Specialist Seminar on Network Usage and Traffic, Berlin, Germany (2008)

    Google Scholar 

  8. Shwartz, A., Weiss, A.: Large Deviations for Performance Analysis. Chapman and Hall, London (1995)

    MATH  Google Scholar 

  9. Siegmund, D.: Sequential Analysis. Springer, Berlin (1985)

    MATH  Google Scholar 

  10. Tartakovsky, A., Veeravalli, V.: Changepoint detection in multichannel and distributed systems with applications. In: Applications of Sequential Methodologies, pp. 331–363. Marcel Dekker, New York (2004)

    Google Scholar 

  11. Thottan, M., Ji, C.: Proactive anomaly detection using distributed intelligent agents. IEEE Network 12, 21–27 (1998)

    Article  Google Scholar 

  12. Żuraniewski, P., Rincón, D.: Wavelet transforms and change-point detection algorithms for tracking network traffic fractality. In: Proc. NGI 2006, pp. 216–223 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandjes, M., Żuraniewski, P. (2009). A Queueing-Based Approach to Overload Detection. In: Núñez-Queija, R., Resing, J. (eds) Network Control and Optimization. NET-COOP 2009. Lecture Notes in Computer Science, vol 5894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10406-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10406-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10405-3

  • Online ISBN: 978-3-642-10406-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics