Skip to main content

Currently Skimming:

1. Mother's Day, Victoria's Secret, and Napster: Network Traffic Modeling
Pages 1-6

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... There are usually multiple paths through the network, and routing between a particular source-destination pair can change suddenly, although it tends to be relatively stable over time. Long messages are partitioned into several packets for transmission, with the packet size determined by physical characteristics such as the bandwidth of the link.
From page 2...
... To date, single TCP sessions have been modeled as stationary ergodic loss processes. Many recently developed models assume that a single queue is the bottleneck, with several long-lived and homogeneous TCP sessions coming through; this results in a fluid-like model.
From page 3...
... Can we detect correlated traffic streams across the Internet in real time, transparent to legitimate uses, so that we can detect distributed denial-of-service attacks before they shut down targeted computers? The goal of Problem 3 is to identify patterns of behavior that are suspicious, when the individual components of the attack each look quite legitimate.
From page 4...
... , but the discrete nature of the problem is more akin to Radon transform tomography, leading workshop participant Tony Chan (UCLA) to ask whether there is a radon transform theory for graphs.
From page 5...
... Problems of this sort should also influence statistics curricula, whose focus today is often on how one extracts maximal information from small data sets rather than how one can deal with and extract information from huge amounts of ill-structured data. The network modeling attempts made to date also point up the compelling need for taking new approaches to stochastic modeling and suggest the possible value of involving operations researchers and experts in economic analysis.
From page 6...
... Summary of Network Trashy c Modeling Session As Ingrid Daubechies noted, work in network traffic modeling must be interdisciplinary, and there will not be much progress from mathematical scientists working in isolation. The federal Information Technology Research initiative is one funding program that recognizes this reality and encourages collaboration.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.