{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:51:09Z","timestamp":1771699869574,"version":"3.50.1"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,7,5]],"date-time":"2006-07-05T00:00:00Z","timestamp":1152057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,7,5]]},"abstract":"<jats:p>\n            In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that \"looks like\" traffic found on an actual network. We describe such a traffic generation system for the widely used\n            <jats:italic>ns-2<\/jats:italic>\n            simulator. The system takes as input a packet header trace taken from a network link of interest. The trace is \"reverse compiled\" into a source-level characterization of each TCP connection present in the trace. The characterization, called a connection vector, is then used as input to an\n            <jats:italic>ns<\/jats:italic>\n            module called\n            <jats:italic>tmix<\/jats:italic>\n            that emulates the socket-level behavior of the source application that created the corresponding connection in the trace. This emulation faithfully reproduces the essential pattern of socket reads and writes that the original application performed without knowledge of what the original application actually was. When combined with a network path emulation component we have constructed called\n            <jats:italic>DelayBox<\/jats:italic>\n            , the resulting traffic generated in the simulation is statistically representative of the traffic measured on the real link. This approach to synthetic traffic generation allows one to automatically repro-duce in\n            <jats:italic>ns<\/jats:italic>\n            the full range of TCP connections found on an arbitrary link. Thus with our tools, researchers no longer need make arbitrary decisions on how traffic is generated in simulations and can instead easily generate TCP traffic that represents the use of a net-work by the full mix of applications measured on actual network links of interest. The method is evaluated by applying it to packet header traces taken from campus and wide-area networks and comparing the statistical properties of traffic on the measured links with traffic generated by\n            <jats:italic>tmix<\/jats:italic>\n            in\n            <jats:italic>ns<\/jats:italic>\n            .\n          <\/jats:p>","DOI":"10.1145\/1140086.1140094","type":"journal-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T17:00:26Z","timestamp":1153760426000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Tmix"],"prefix":"10.1145","volume":"36","author":[{"given":"Michele C.","family":"Weigle","sequence":"first","affiliation":[{"name":"Clemson University"}]},{"given":"Prashanth","family":"Adurthi","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"F\u00e9lix","family":"Hern\u00e1ndez-Campos","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill"}]},{"given":"Kevin","family":"Jeffay","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill"}]},{"given":"F. Donelson","family":"Smith","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill"}]}],"member":"320","published-online":{"date-parts":[[2006,7,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948241"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/301453.301560"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/115992.116003"},{"key":"e_1_2_1_5_1","first-page":"1547","volume-title":"Proc. IEEE INFOCOM","author":"Cao J.","year":"2004","unstructured":"J. Cao , W.S. Cleveland , Y. Gao , K. Jeffay , F.D. Smith , and M.C. Weigle , Stochastic Models for Generating Synthetic HTTP Source Traffic , Proc. IEEE INFOCOM , Hong Kong , Mar. 2004 , pp. 1547 -- 1558 . J. Cao, W.S. Cleveland, Y. Gao, K. Jeffay, F.D. Smith, and M.C. Weigle, Stochastic Models for Generating Synthetic HTTP Source Traffic, Proc. IEEE INFOCOM, Hong Kong, Mar. 2004, pp. 1547--1558."},{"key":"e_1_2_1_6_1","unstructured":"Chariot Performance Evaluation Platform NetIQ Software Inc http:\/\/www.netiq.com\/products\/chr\/.  Chariot Performance Evaluation Platform NetIQ Software Inc http:\/\/www.netiq.com\/products\/chr\/."},{"key":"e_1_2_1_7_1","first-page":"87","volume-title":"Proc. USENIX Annual Technical Conference","author":"Cheng Y.-C.","year":"2004","unstructured":"Y.-C. Cheng , U. H\u00f6lzle , N. Cardwell , S. Savage , and G.M. Voelker , Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying , Proc. USENIX Annual Technical Conference , Boston, MA , June 2004 , pp. 87 -- 98 . Y.-C. Cheng, U. H\u00f6lzle, N. Cardwell, S. Savage, and G.M. Voelker, Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, Proc. USENIX Annual Technical Conference, Boston, MA, June 2004, pp. 87--98."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339413"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"issue":"1","key":"e_1_2_1_10_1","first-page":"1","volume":"3","author":"Danzig P.","year":"1992","unstructured":"P. Danzig , S. Jamin , R. Caceres , D. Mitzel , and D. Estrin , An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations, Internetworking: Research and Experience , 3 ( 1 ): 1 -- 26 , 1992 . P. Danzig, S. Jamin, R. Caceres, D. Mitzel, and D. Estrin, An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations, Internetworking: Research and Experience, 3(1):1--26, 1992.","journal-title":"An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations, Internetworking: Research and Experience"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316235"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1097871.1098154"},{"key":"e_1_2_1_14_1","first-page":"273","volume-title":"Proc. Computer Measurement Group Intl. Conf.","author":"Hern\u00e1ndez-Campos F.","year":"2004","unstructured":"F. Hern\u00e1ndez-Campos , F.D. Smith , K. Jeffay , Generating Realistic TCP Workloads , Proc. Computer Measurement Group Intl. Conf. , Las Vegas, NV , Dec 2004 , pp. 273 -- 284 . F. Hern\u00e1ndez-Campos, F.D. Smith, K. Jeffay, Generating Realistic TCP Workloads, Proc. Computer Measurement Group Intl. Conf., Las Vegas, NV, Dec 2004, pp. 273--284."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.503760"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637208"},{"key":"e_1_2_1_19_1","unstructured":"http:\/\/netflow.internet2.edu\/.  http:\/\/netflow.internet2.edu\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.588085"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/643114.643117"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863986"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/839292.843009"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832178"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028798"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378789"},{"key":"e_1_2_1_28_1","volume-title":"http:\/\/www.net.informatik.tu-muenchen.de\/~jw\/nsweb\/","author":"Wallerich J.","year":"2004","unstructured":"J. Wallerich , NSWEB - A HTTP\/1.1 Extension to the NS-2 Network Simulator , http:\/\/www.net.informatik.tu-muenchen.de\/~jw\/nsweb\/ , 2004 . J. Wallerich, NSWEB - A HTTP\/1.1 Extension to the NS-2 Network Simulator, http:\/\/www.net.informatik.tu-muenchen.de\/~jw\/nsweb\/, 2004."},{"key":"e_1_2_1_29_1","unstructured":"M.C. Weigle DelayBox: Per-flow Delay and Loss in ns in \"The ns manual \" K. Fall K. Varadhan eds http:\/\/www.isi.edu\/nsnam\/ns\/doc\/.  M.C. Weigle DelayBox: Per-flow Delay and Loss in ns in \"The ns manual \" K. Fall K. Varadhan eds http:\/\/www.isi.edu\/nsnam\/ns\/doc\/."},{"key":"e_1_2_1_30_1","volume-title":"April","author":"Patent Application USA","year":"2006","unstructured":"USA Patent Application , 20060083231 , Methods, Systems, and Computer Program Products for Modeling and Simulating Application-Level Traffic Characteristics in a Network Based on Transport and Network Layer Header Information , April 2006 . USA Patent Application, 20060083231, Methods, Systems, and Computer Program Products for Modeling and Simulating Application-Level Traffic Characteristics in a Network Based on Transport and Network Layer Header Information, April 2006."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140086.1140094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1140086.1140094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:32Z","timestamp":1750259192000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140086.1140094"}},"subtitle":["a tool for generating realistic TCP application workloads in ns-2"],"short-title":[],"issued":{"date-parts":[[2006,7,5]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,7,5]]}},"alternative-id":["10.1145\/1140086.1140094"],"URL":"https:\/\/doi.org\/10.1145\/1140086.1140094","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2006,7,5]]},"assertion":[{"value":"2006-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}