Internet Traffic Source Based on Hidden Markov Model

  • Joanna Domańska
  • Adam Domański
  • Tadeusz Czachórski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6869)


This article shows how to use Hidden Markov Models to generate self-similar traffic. The well-known Bellcore traces are used as a training sequence to learn HMM model parameters. Performance of trained model are tested on the remaining portions of the sequences.Then we can use the HMM trained with the Bellcore data as the traffic source model.


Hide Markov Model Vector Quantization Fractional Brownian Motion Interarrival Time Hurst Parameter 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Andersen, A.T., Nielsen, B.F.: A Markovian approach for modeling packet traffic with long-range dependence. IEEE Journal on Selected Areas in Communications 16(5), 719–732 (1998)CrossRefGoogle Scholar
  2. 2.
    Willinger, W., Leland, W.E., Taqqu, M.S.: On the self-similar nature of ethernet traffic. IEEE/ACM Transactions on Networking (1994)Google Scholar
  3. 3.
    Klemm, A., Lindemann, C., Lohmann, M.: Modeling IP traffic using the batch Markovian arrival process. Performance Evaluation 54(2), 149–173 (2003)CrossRefzbMATHGoogle Scholar
  4. 4.
    Veitch, D., Abry, P., Flandrin, P., Chainais, P.: Infinitely Divisible Cascade Analysis of Network Traffic Data. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000), Istanbul, Turkey, vol. 1 (June 2000)Google Scholar
  5. 5.
    Erramilli, A.: Chaotic maps as models of packet traffic. ITC 14 (June 1994)Google Scholar
  6. 6.
    Baiocchi, A., Melazzi, N.B., Listanti, M., Roveri, A., Winkler, R.: Loss Performance Analysis of an ATM Multiplexer Loaded with High-Speed ON-OFF Sources. IEEE-JSAC 9(3) (April 1991)Google Scholar
  7. 7.
    De Vendictis, A., Baiocchi, A.: Wavelet Based Synthetic Generation of Internet Packet Delays. In: Proceedings of International Teletraffic Conference ITC17, Salvador, Brasil (December 2001)Google Scholar
  8. 8.
    Paxson, V., Floyd, S.: Wide Area Traffic: A Failure of Poisson Modeling. IEEE/ACM Transactions on Networking (June 1995)Google Scholar
  9. 9.
    Crovella, M., Bestavros, A.: Self-similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking (December 1997)Google Scholar
  10. 10.
    Li, S.Q., Hwang, C.L.: Queue response to input correlation functions: continuous spectral analysis. IEEE//ACM Trans. Networking 1(3), 678–692 (1993)Google Scholar
  11. 11.
    Garret, M., Willinger, W.: Analysis, modeling and generation of self-similar VBR video traffic. In: ACM SIGCOMM, London (September 1994)Google Scholar
  12. 12.
    Kleinrock, L.: Queueing Systems, vol. II. Wiley, New York (1976)zbMATHGoogle Scholar
  13. 13.
    Mandelbrot, B., Ness, J.V.: Fractional Brownian Motions, Fractional Noises and Applications. SIAM Review 10 (October 1968)Google Scholar
  14. 14.
    Beran, J.: Statistics for Long-Memory Processes. Chapman and Hall, Boca Raton (1994)zbMATHGoogle Scholar
  15. 15.
    Cox, D.R.: Long-range dependance: A review. Statistics: An Appraisal (1984)Google Scholar
  16. 16.
    Iannello, G., Palmieri, F., Pescap, A., Salvo Rossi, P.: End-to-end packet-channel Bayesian model applied to heterogeneous wireless networks. In: IEEE GLOBECOM, pp. 484–489 (November 2005)Google Scholar
  17. 17.
    Dainotti, A., Pescape, A., Salvo Rossi, P., Palmieri, F., Ventre, G.: Internet Traffic Modeling by means of Hidden Markov Models. Computer Networks 52(14), 2645–2662 (2008)CrossRefzbMATHGoogle Scholar
  18. 18.
    Colonnese, S., Rinauro, S., Rossi, L., Scarano, G.: H.264 Video Traffic Modeling via Hidden Markov Process. In: 17th European Signal Processing Conference (EUSIPCO 2009), Glasgow, Scotland, August 24-28 (2009)Google Scholar
  19. 19.
    Stallings, W.: High-Speed Networks: TCP/IP and ATM Design Principles. Prentice-Hall, Englewood Cliffs (1998)Google Scholar
  20. 20.
    Salamatian, K., Vaton, S.: Hidden Markov Modeling for network communication channels. In: ACM SIGMETRICS 2001, vol. 29, pp. 92–101 (2001)Google Scholar
  21. 21.
    Salvo Rossi, P., Romano, G., Palmieri, F., Iannello, G.: Joint end-to-end loss-delay Hidden Markov Model for periodic UDP traffic over the Internet. IEEE Transactions on Signal Processing 54(2), 530–541 (2006)CrossRefGoogle Scholar
  22. 22.
    Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proceedings of the IEEE 77(2) (1989)Google Scholar
  23. 23.
    Bilmes, J.A.: A Gentle Tutorial od the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models. University of Berkeley (1998)Google Scholar
  24. 24.
    Norros, I.: On the use of fractional Brownian motion in the theory of connectionless networks. Technical contribution, TD94-33 (September 1994)Google Scholar
  25. 25.
    Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communication Com-28 (1980)Google Scholar
  26. 26.
    Romaszewski, M., Głomb, P.: 3D Mesh Approximation Using Vector Quantization. Advances in Soft Computing 57 (2009)Google Scholar
  27. 27.
    Robert, S.: Modélisation Markovienne du Trafic dans Réseaux de Communication. PhD thesis, Ecole Polytechnique Fédérale de Lausanne, Nr 1479 (1996)Google Scholar
  28. 28.
    Robert, S., Boudec, J.Y.L.: New models for pseudo self-similar traffic. Performance Evaluation 30(1-2) (1997)Google Scholar
  29. 29.
    Salvador, P., Valadas, R., Pacheco, A.: Multiscale fitting procedure using markov modulated poisson processes. Telecommunication Systems Journal 23(1-2), 123–148 (2003)CrossRefGoogle Scholar
  30. 30.
    The Cooperative Association for Internet Data Analysis,
  31. 31.
    Horvath, A., Telek, M.: A Markovian Point Process Exhibiting Multifractal Behavior and its Application to Traffic Modeling. In: Proceedings of Fourth International Conference on Matrix-analytic Methods in Stochastic Models, Adelaide, Australia (July 2002)Google Scholar
  32. 32.
    Wei, W., Wang, B., Towsley, D.: Continuous-time Hidden Markov Models for network performance evaluation. Performance Evaluation 49(1-4), 129–146 (2002)CrossRefzbMATHGoogle Scholar
  33. 33.
    Domańska, J.: Procesy Markowa w modelowaniu nateżenia ruchu w sieciach komputerowych. PhD thesis, IITiS PAN, Gliwice (2005)Google Scholar
  34. 34.
    Domańska, J., Domański, A., Czachórski, T.: The Drop-From-Front Strategy in AQM. In: Koucheryavy, Y., Harju, J., Sayenko, A. (eds.) NEW2AN 2007. LNCS, vol. 4712, pp. 61–72. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  35. 35.
    Domański, A., Domańska, J., Czachórski, T.: The impact of self-similarity on traffic shaping in wireless LAN. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN 2008. LNCS, vol. 5174, pp. 156–168. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Joanna Domańska
    • 1
  • Adam Domański
    • 2
  • Tadeusz Czachórski
    • 1
    • 2
  1. 1.Institute of Theoretical and Applied InformaticsPolish Academy of SciencesGliwicePoland
  2. 2.Institute of InformaticsSilesian Technical UniversityGliwicePoland

Personalised recommendations