Abstract
This chapter takes you on a journey on Internet traffic, from understanding its profile (i.e., by modeling and analysis) to generating packets or flows (either real or synthetic), in diverse environments. Usual decision network engineers and researchers find when designing performance evaluation experimental plans that are concerned with traffic generation. Suppose that you have measured and collected sufficient Internet traffic in your core network to derive a statistical model of the aggregate traffic. Now you want to use such analytical model for traffic prediction or capacity planning purposes in another what-if (a.k.a. sensitivity) analysis scenarios [14], via Systems Operational Dependency Analysis (SODA), for example [13]. If your further analysis will be conducted in a simulation environment, you either need to use the available models or to bring your traffic model into the environment as accurate as possible. If your sensitivity analysis will be done in a test bed, you have to assess the adequacy of your hardware- or software-based traffic generator. Sections 4.1 and 4.2 provide an overview of traffic analysis by looking at recent advances in traffic identification and classification and then discussing techniques and tools to effectively profile network traffic in a scalable fashion. Section 4.3 provides some examples of models that can be used to generate traffic. It is worth emphasizing that both traffic analysis and traffic modeling are very broad fields of investigation. Section 4.3 also deals with workload generation. There is a particular interest in methods that effectively and efficiently mimic network traffic in a certain layer of the Internet protocol stack. Last, but not the least, Sect. 4.4 discusses the world of simulation and emulation of computer network protocols and services. There is a massive amount of material in these topics that makes it impossible to condense them into a single book chapter. However, there will be lots of references, so the interested reader can delve into.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Merriam-Webster – Full Definition of identification – a: an act of identifying, the state of being identified; b: evidence of identity; http://www.merriam-webster.com/dictionary/identification .
- 2.
Merriam-Webster – Full Definition of classification – a: the act or process of classifying; b: systematic arrangement in groups or categories according to established criteria; http://www.merriam-webster.com/dictionary/classification .
- 3.
- 4.
- 5.
- 6.
At the time of writing this chapter.
- 7.
Term coined by SolarWind: Mohan, V., “Deep Packet Inspection: Unearthing Gold in Network Packets,” March 2014, available at https://thwack.solarwinds.com/community/solarwinds-community/geek-speak_tht/blog/2014/03/06/deep-packet-inspection-unearthing-gold-in-network-packets.
- 8.
NTOP’s PF_RING (http://www.ntop.org/products/packet-capture/pf_ring/).
- 9.
The genius of DAG – May 2016, http://www.endace.com/endace-dag-high-speed-packet-capture-cards.html.
- 10.
- 11.
Policy Traffic Switch (PTS) – available at https://www.sandvine.com/platform/policy-traffic-switch.html, accessed May 2016.
- 12.
Cisco Application Visibility and Control (AVC) – http://www.cisco.com/c/en/us/products/routers/avc_control.html .
- 13.
e.g., Nallatech’s FPGA network processing cards, http://www.nallatech.com/solutions/fpga-network-processing/, May 2016.
- 14.
Cavium’s NITROX DPI L7 Content Processor Family, http://www.cavium.com/processor_NITROX-DPI.html, May 2016.
- 15.
Broadcom’s 20 Gbps NETL7™ Knowledge-Based Processor, product code: NLS2008, http://www.broadcom.com/products/enterprise-and-network-processors/knowledge-based-processors/nls2008 .
- 16.
- 17.
PF_RING API Revision:7479, API documentation for PF_RING: high-speed packet capture, filtering, and analysis framework. http://www.ntop.org/pfring_api/files.html, available May 16, 2016.
- 18.
- 19.
- 20.
It was supposed to be a (horrible) pun, but indeed the term exists. Fort Collins-Loveland Municipal Airport (Northern Colorado) has used this term in its “Capacity Analysis and Facility Requirements” report, available at http://www.fortloveair.com/ .
- 21.
Definitions of managed objects for IP Flow Information Export – RFC 5815 – https://datatracker.ietf.org/doc/rfc5815/.
- 22.
Which is like the De Caprio’s Inception movie, since now I am classifying the classifiers.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
- 30.
- 31.
- 32.
I’m pretty sure there is a reality TV show related to this type of scene.
- 33.
Spirent’s appliances: www.spirent.com/Products/TestCenter/Platforms/Appliances .
- 34.
Spirent’s modules: www.spirent.com/Products/TestCenter/Platforms/Modules .
- 35.
IxLoad: www.ixiacom.com/products/ixload .
- 36.
Ixia’s PerfectStorm Family: www.ixiacom.com/products-services/ixia-test-hardware-products .
- 37.
There are different iperf versions available. iperfv3 has been recently developed and is maintained by ESnet. It is available at https://github.com/esnet/iperf.
- 38.
- 39.
- 40.
- 41.
IEEE Std 610.12 – 1990 IEEE Standard Glossary of Software Engineering Terminology.
- 42.
1730–2010 – IEEE Recommended Practice for Distributed Simulation Engineering and Execution Process.
- 43.
Information for Real-World Pilots – An aid for training and proficiency: available at https://www.microsoft.com/Products/Games/FSInsider/product/Pages/InfoRealworld.aspx .
- 44.
“Does flight simulation prepare pilots for flying a real plane?”, 14 Oct 2013, available at https://flyawaysimulation.com/news/4492/ .
- 45.
The Wachowskis’ The Matrix Movie – 1999.
- 46.
Merriam-Webster definition of simulacrum: http://www.merriam-webster.com/dictionary/simulacrum.
- 47.
“What Are the Odds We Are Living in a Computer Simulation?” by Joshua Rothman, The New Yorker, June 9, 2016, http://www.newyorker.com/books/joshua-rothman/what-are-the-odds-we-are-living-in-a-computer-simulation .
- 48.
- 49.
- 50.
- 51.
- 52.
- 53.
References
Economides, Nicholas, and Joacim Tåg. 2012. Network neutrality on the internet: A two-sided market analysis. Information Economics and Policy 24 (2): 91–104.
Krämer, Jan, and Lukas Wiewiorra. 2012. Network neutrality and congestion sensitive content providers: Implications for content variety, broadband investment, and regulation. Information Systems Research 23 (4): 1303–1321.
Kanuparthy, Partha, and Constantine Dovrolis. ShaperProbe: End-to-end detection of ISP traffic shaping using active methods. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011.
Dischinger, Marcel, et al. Glasnost: Enabling end users to detect traffic differentiation. NSDI. 2010.
Gupta, Mukta, Joel Sommers, and Paul Barford. Fast, accurate simulation for SDN prototyping. Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013.
Yao, Wei-Min, and Sonia Fahmy. 2014. Flow-based partitioning of network testbed experiments. Computer Networks 58: 141–157.
Gupta, Mukta, et al. pfs: Parallelized, flow-based network simulation. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems. Society for Computer Simulation International, 2015.
Chertov, Roman, and Sonia Fahmy. Forwarding devices: From measurements to simulations. ACM Transactions on Modeling and Computer Simulation (TOMACS) 21.2 (2011): 12.
Vishwanath, Kashi Venkatesh, and Amin Vahdat. 2009. Swing: Realistic and responsive network traffic generation. IEEE/ACM Transactions on Networking 17 (3): 712–725.
Hafsaoui, Aymen, Navid Nikaein, and Christian Bonnet. Analysis and experimentation with a realistic traffic generation tool for emerging application scenarios. Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2013.
Za.k.a.y, Netanel, and Dror G. Feitelson. Workload resampling for performance evaluation of parallel job schedulers. Concurrency and Computation: Practice and Experience 26.12 (2014): 2079–2105.
Sommers, Joel, and Paul Barford. Self-configuring network traffic generation. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM, 2004.
Vishwanath, Kashi Venkatesh, and Amin Vahdat. Evaluating distributed systems: Does background traffic matter?. USENIX annual technical conference. 2008.
Guariniello, Cesare, and Daniel DeLaurentis. 2016. Supporting design via the system operational dependency analysis methodology. Research in Engineering Design: 1–17.
Hummel, Karin Anna, Helmut Hlavacs, and Wilfried Gansterer, eds. Performance evaluation of computer and communication systems. Milestones and future challenges: IFIP WG 6.3/7.3 International Workshop, PERFORM 2010, in Honor of Günter Haring on the Occasion of His Emeritus Celebration, Vienna, Austria, October 14–16, 2010, Revised Selected Papers. Vol. 6821. Springer Science & Business Media, 2011.
Callado, Arthur, et al. 2009. A survey on internet traffic identification. IEEE Communication Surveys and Tutorials 11 (3): 37–52.
Nguyen, T.T. Thuy, and Grenville Armitage. 2008. A survey of techniques for internet traffic classification using machine learning. IEEE Communication Surveys and Tutorials 10 (4): 56–76.
Finsterbusch, Michael, et al. 2014. A survey of payload-based traffic classification approaches. IEEE Communication Surveys and Tutorials 16 (2): 1135–1156.
Dainotti, Alberto, Antonio Pescape, and Kimberly C. Claffy. 2012. Issues and future directions in traffic classification. IEEE Network 26 (1): 35–40.
Tongaonkar, Alok, et al. 2015. Towards self adaptive network traffic classification. Computer Communications 56: 35–46.
Zhang, Jun, et al. 2013. Unsupervised traffic classification using flow statistical properties and IP packet payload. Journal of Computer and System Sciences 79 (5): 573–585.
Fahad, Adil, et al. 2013. Toward an efficient and scalable feature selection approach for internet traffic classification. Computer Networks 57 (9): 2040–2057.
Zhang, Hongli, et al. 2012. Feature selection for optimizing traffic classification. Computer Communications 35 (12): 1457–1471.
Cherry, Steven. 2005. The VoIP backlash. IEEE Spectrum 42 (10): 61–63.
Santiago del Rio, Pedro M., et al. Wire-speed statistical classification of network traffic on commodity hardware. Proceedings of the 2012 ACM conference on Internet measurement conference. ACM, 2012.
Szabó, Géza, et al. Traffic classification over Gbit speed with commodity hardware. IEEE J. Communications Software and Systems 5 (2010).
Zhou, Shijie, Prashant Rao Nittoor, and Viktor K. Prasanna. High-performance traffic classification on gpu. Computer architecture and high performance computing (SBAC-PAD), 2014 IEEE 26th International Symposium on. IEEE, 2014.
Fernandes, Stênio, et al. Slimming down deep packet inspection systems. INFOCOM Workshops 2009, IEEE. IEEE, 2009.
Hullár, Béla, Sándor Laki, and András György. 2014. Efficient methods for early protocol identification. IEEE Journal on Selected Areas in Communications 32 (10): 1907–1918.
Bujlow, Tomasz, Valentín Carela-Español, and Pere Barlet-Ros. 2015. Independent comparison of popular DPI tools for traffic classification. Computer Networks 76: 75–89.
Lin, Po-Ching, et al. Using string matching for deep packet inspection. Computer 41.4 (2008): 23 − +.
Ahmad, Ijaz, et al. 2015. Security in software defined networks: A survey. IEEE Communication Surveys and Tutorials 17 (4): 2317–2346.
Adami, Davide, et al. Towards an SDN network control application for differentiated traffic routing. 2015 IEEE International Conference on Communications (ICC). IEEE, 2015.
Bouet, Mathieu, et al. 2015. Cost-based placement of vDPI functions in NFV infrastructures. International Journal of Network Management 25 (6): 490–506.
Xu, Chengcheng, et al. A survey on regular expression matching for deep packet inspection: Applications, algorithms and hardware platforms.
Shahbar, Khalid, and A. Nur Zincir-Heywood. Benchmarking two techniques for Tor classification: Flow level and circuit level classification. Computational Intelligence in Cyber Security (CICS), 2014 IEEE Symposium on. IEEE, 2014.
Lin, Ying-Dar, et al. 2009. Hardware-software codesign for high-speed signature-based virus scanning. IEEE Micro 29 (5): 56–65.
Nickolls, John, et al. 2008. Scalable parallel programming with CUDA. Quest 6 (2): 40–53.
Cook, Shane. CUDA programming: A developer’s guide to parallel computing with GPUs. Newnes, 2012.
Lee, Chun-Liang, Yi-Shan Lin, and Yaw-Chung Chen. 2015. A hybrid CPU/GPU pattern-matching algorithm for deep packet inspection. PloS One 10 (10): e0139301.
Cascarano, Niccolo, et al. 2010. iNFAnt: NFA pattern matching on GPGPU devices. ACM SIGCOMM Computer Communication Review 40 (5): 20–26.
Hsieh, Cheng-Liang, Lucas Vespa, and Ning Weng. 2016. A high-throughput DPI engine on GPU via algorithm/implementation co-optimization. Journal of Parallel and Distributed Computing 88: 46–56.
Intel, White Paper. Improving Network Performance in Multi-Core Systems. http://www.intel.com/content/dam/support/us/en/documents/network/sb/318483001us2.pdf. Accessed August 2016
Moreno, Victor, et al. 2015. Commodity packet capture engines: Tutorial, cookbook and applicability. IEEE Communication Surveys and Tutorials 17 (3): 1364–1390.
Karagiannis, Thomas, Konstantina Papagiannaki, and Michalis Faloutsos. 2005. BLINC: Multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review 35 (4): 229–240.
Conti, Mauro, et al. 2016. Analyzing android encrypted network traffic to identify user actions. IEEE Transactions on Information Forensics and Security 11 (1): 114–125.
Wang, Yong, Wenlong Ke, and Xiaoling Tao. 2016. A feature selection method for large-scale network traffic classification based on spark. Infection 7 (1): 6.
Fahad, Adil, et al. 2014. An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion. Future Generation Computer Systems 36: 156–169.
Jaber, Mohamad, Roberto G. Cascella, and Chadi Bara.k.a.t. Using host profiling to refine statistical application identification. INFOCOM, 2012 Proceedings IEEE. IEEE, 2012.
Zhang, Jun, et al. 2015. Robust network traffic classification. IEEE/ACM Transactions on Networking 23 (4): 1257–1270.
Alshammari, Riyad, and A. Nur Zincir-Heywood. An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. 2010 International Conference on Network and Service Management. IEEE, 2010.
Haddadi, Fariba, et al. Botnet behaviour analysis using ip flows: With http filters using classifiers. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.
Baer, Arian, et al. DBStream: A holistic approach to large-scale network traffic monitoring and analysis. Computer Networks (2016).
Karagiannis, Thomas, et al. Is p2p dying or just hiding?[p2p traffic measurement]. Global telecommunications conference, 2004. GLOBECOM’04. IEEE. Vol. 3. IEEE, 2004.
James, Gareth, et al. 2013. An introduction to statistical learning. Vol. 6. New York: springer.
John Lu, Z.Q. 2010. The elements of statistical learning: Data mining, inference, and prediction. Journal of the Royal Statistical Society: Series A (Statistics in Society) 173 (3): 693–694.
Vapnik, Vladimir. The nature of statistical learning theory. Springer Science & Business Media, 2013.
Callado, Arthur, et al. 2010. Better network traffic identification through the independent combination of techniques. Journal of Network and Computer Applications 33 (4): 433–446.
Casas, Pedro, Johan Mazel, and Philippe Owezarski. MINETRAC: Mining flows for unsupervised analysis & semi-supervised classification. Proceedings of the 23rd International Teletraffic Congress. International Teletraffic Congress, 2011.
de Souza, Erico N., Stan Matwin, and Stenio Fernandes. Network traffic classification using AdaBoost dynamic. 2013 IEEE International Conference on Communications Workshops (ICC). IEEE, 2013.
Zhang, Jun, et al. 2013. An effective network traffic classification method with unknown flow detection. IEEE Transactions on Network and Service Management 10 (2): 133–147.
———. 2013. Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems 24 (1): 104–117.
Grimaudo, Luigi, et al. 2014. SeLeCT: Self-learning classifier for internet traffic. IEEE Transactions on Network and Service Management 11 (2): 144–157.
Haddadi, Fariba, and A. Nur Zincir-Heywood. A closer look at the HTTP and P2P based botnets from a detector’s perspective. International symposium on foundations and practice of security. Springer International Publishing, 2015.
———. Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification. (2014).
Buczak, Anna L., and Erhan Guven. 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communication Surveys and Tutorials 18 (2): 1153–1176.
Sandvine, “Internet Traffic Classification – A Sandvine Technology Showcase”, White Paper, https://www.sandvine.com/downloads/general/sandvine-technology-showcases/traffic-classification-identifying-and-measuring-internet-traffic.pdf. Accessed August 2016
Team, Mininet. MiniNet. (2014).
Sommers, Joel, Hyungsuk Kim, and Paul Barford. Harpoon: A flow-level traffic generator for router and network tests. ACM SIGMETRICS Performance Evaluation Review. Vol. 32. No. 1. ACM, 2004.
Laurent, Nicolas, Stefano Vissicchio, and Marco Canini. SDLoad: An extensible framework for SDN workload generation. Proceedings of the third workshop on Hot topics in software defined networking. ACM, 2014.
Becchi, Michela, Mark Franklin, and Patrick Crowley. A workload for evaluating deep packet inspection architectures. Workload Characterization, 2008. IISWC 2008. IEEE International Symposium on. IEEE, 2008.
A Framework for Malicious Workload Generation, Joel Sommers, Vinod Yegneswaran, Paul Barford
Antonatos, Spyros, Kostas G. Anagnostakis, and Evangelos P. Markatos. Generating realistic workloads for network intrusion detection systems. ACM SIGSOFT Software Engineering Notes. Vol. 29. No. 1. ACM, 2004.
Valgenti, Victor C., and Min Sik Kim. Simulating content in traffic for benchmarking intrusion detection systems. Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2011.
Shiravi, Ali, et al. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31 (3): 357–374.
Siska, Peter, et al. A flow trace generator using graph-based traffic classification techniques. Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, 2010.
Sommers, Joel, et al. Efficient network-wide flow record generation. INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.
Tang, Wenting, et al. Medisyn: A synthetic streaming media service workload generator. Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, 2003.
Summers, Jim, et al. Methodologies for generating HTTP streaming video workloads to evaluate web server performance. Proceedings of the 5th Annual International Systems and Storage Conference. ACM, 2012.
Mosberger, David, and Tai Jin. 1998. httperf—a tool for measuring web server performance. ACM SIGMETRICS Performance Evaluation Review 26 (3): 31–37.
Pegus II, Patrick, Emmanuel Cecchet, and Prashant Shenoy. Video BenchLab: An open platform for realistic benchmarking of streaming media workloads. Proceedings of the 6th ACM Multimedia Systems Conference. ACM, 2015.
Botta, Alessio, Alberto Dainotti, and Antonio Pescapé. 2010. Do you trust your software-based traffic generator? IEEE Communications Magazine 48 (9): 158–165.
Groléat, Tristan, et al. Flexible, extensible, open-source and affordable FPGA-based traffic generator. Proceedings of the first edition workshop on High performance and programmable networking. ACM, 2013.
Megyesi, Péter, Géza Szabó, and Sándor Molnár. 2015. User behavior based traffic emulator: A framework for generating test data for DPI tools. Computer Networks 92: 41–54.
Leland, Will E., et al. 1994. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking 2 (1): 1–15.
Willinger, Walter, et al. 1997. Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking (ToN) 5 (1): 71–86.
Li, Ting, and Jason Liu. Cluster-based spatiotemporal background traffic generation for network simulation. ACM Transactions on Modeling and Computer Simulation (TOMACS) 25.1 (2015): 4.
Paxson, Vern, et al. Computing TCP’s retransmission timer. No. RFC 6298. 2011.
Chertov, Roman, Sonia Fahmy, and Ness B. Shroff. Emulation versus simulation: A case study of TCP-targeted denial of service attacks. 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. Tridentcom 2006.. IEEE, 2006.
Zeigler, Bernard P. Discrete event system specification framework for self-improving healthcare service systems. (2016).
Tsai, Wei-Tek, Wu Li, Hessam Sarjoughian, and Qihong Shao. 2011. SimSaaS: Simulation software-as-a-service. In Proceedings of the 44th Annual Simulation Symposium(ANSS’11). Society for Computer Simulation International, San Diego, 77–86.
Banks, B. Carson, J.S.I.I. Nelson, and B.L. Nicol. 2001. DM discrete-event system simulation. Saddle River: 489–459.
Cassandras, Christos G., and Stephane Lafortune. 2009. Introduction to discrete event systems. Secaucus: Springer Science & Business Media.
IEEE standard glossary of modeling and simulation terminology - IEEE Std 61 03–1989
Zeigler, B.P. 1976. Theory of modeling and simulation. New York: John Wiley & Sons.
Concepcion, Arturo I., and B. F. Zeigler. DEVS formalism: A framework for hierarchical model development. IEEE Transactions on Software Engineering 14.2 (1988): 228.
Wainer, Gabriel A., and Pieter J. Mosterman, eds. 2010. Discrete-event modeling and simulation: Theory and applications. Boca Raton: CRC Press.
Gibbs, Jonathan Douglas. An approach to evaluating computer network simulation tool support for verification and validation. Diss. Master’s thesis, Arizona State University, Tempe, AZ, 2009.
Kruchten, Philippe. 2004. The rational unified process: An introduction. Boston: Addison-Wesley Professional.
Fujimoto, R. M., Perumalla, K. S., and Riley, G. F., Network simulation, synthesis lectures on communication networks 2006 1:1, 1–72
Altman, Eitan, and Tania Jimenez. 2012. NS simulator for beginners. Synthesis Lectures on Communication Networks 5 (1): 1–184.
Małowidzki, Marek, et al. 2001. 01-Network Simulators: A developer’s perspective. ACM SIGCOMM Computer Communication Review 31 (2): 9–24.
Garrido, P. Pablo, Manuel P. Malumbres, and Carlos T. Calafate. ns-2 vs. OPNET: A comparative study of the IEEE 802.11 e technology on MANET environments. Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008.
García-Dorado, José Luis, et al. 2013. High-performance network traffic processing systems using commodity hardware. In Data traffic monitoring and analysis, 3–27. Berlin/Heidelberg: Springer.
Cellier, F., and E. Kofman. 2006. Discrete event simulation. In Continuous system simulation, 519–554. US: Springer.
Zeigler, B.P., H.S. Song, T.G. Kim, and H. Praehofer. 1995. In DEVS framework for modelling, simulation, analysis, and design of hybrid systems hybrid systems II, ed. P. Antsaklis, W. Kohn, A. Nerode, and S. Sastry, 529–551. Berlin/Heidelberg: Springer.
Bonaventura, MatÃas, Daniel Foguelman, and Rodrigo Castro. 2016. Discrete event modeling and simulation-driven engineering for the atlas data acquisition network. Computing in Science & Engineering 18 (3): 70–83.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Fernandes, S. (2017). Internet Traffic Profiling. In: Performance Evaluation for Network Services, Systems and Protocols . Springer, Cham. https://doi.org/10.1007/978-3-319-54521-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-54521-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54519-6
Online ISBN: 978-3-319-54521-9
eBook Packages: Computer ScienceComputer Science (R0)