{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:09Z","timestamp":1750307889806,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2010,8,1]],"date-time":"2010-08-01T00:00:00Z","timestamp":1280620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EIA\/73072\/2006","SFRH\/BDE\/15592\/2006SFRH\/BDE\/15643\/2006"],"award-info":[{"award-number":["PTDC\/EIA\/73072\/2006","SFRH\/BDE\/15592\/2006SFRH\/BDE\/15643\/2006"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2010,8]]},"abstract":"<jats:p>Traffic modeling and simulation plays an important role in the area of Network Monitoring and Analysis, for it provides practitioners with efficient tools to evaluate the performance of networks and of their elements. This article focus on the traffic generated by a single source, providing an overview of what was done in the field and studying the statistical properties of the traffic produced by a personal computer, including analysis of the autocorrelation structure. Different distributions were fitted to the interarrival times, packet sizes, and byte count processes with the goal of singling out the ones most suitable for traffic generation.<\/jats:p>","DOI":"10.1145\/1823746.1823755","type":"journal-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:05:55Z","timestamp":1283259955000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Source traffic analysis"],"prefix":"10.1145","volume":"6","author":[{"given":"Jo\u00e3o V. P.","family":"Gomes","sequence":"first","affiliation":[{"name":"Nokia Siemens Networks Portugal, Amadora, Portugal and University of Beira Interior Covilh\u00e3, Portugal"}]},{"given":"Pedro R. M.","family":"In\u00e1cio","sequence":"additional","affiliation":[{"name":"Nokia Siemens Networks Portugal, Amadora, Portugal and University of Beira Interior Covilh\u00e3, Portugal"}]},{"given":"Branka","family":"Lakic","sequence":"additional","affiliation":[{"name":"University of Coimbra and Institute of Telecommunications, Aveiro, Portugal"}]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[{"name":"University of Beira Interior and Institute of Telecommunications, Covilha, Portugal"}]},{"given":"Henrique J. A.","family":"Da Silva","sequence":"additional","affiliation":[{"name":"University of Coimbra and Institute of Telecommunications, Coimbra, Portugal"}]},{"given":"Paulo P.","family":"Monteiro","sequence":"additional","affiliation":[{"name":"Nokia Siemens Networks Portugal and Institute of Telecommunications, Aveiro, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2010,8,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2002.806794"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277897"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.380206"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.285304"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cao J. Cleveland W. S. Lin D. and Sun D. X. 2002. Internet traffic tends toward poisson and independent as the load increases. In Nonlinear Estimation and Classification C. Holmes D. Denison M. Hansen B. Yu and B. Mallick Eds. Springer NY 83--109.  Cao J. Cleveland W. S. Lin D. and Sun D. X. 2002. Internet traffic tends toward poisson and independent as the load increases. In Nonlinear Estimation and Classification C. Holmes D. Denison M. Hansen B. Yu and B. Mallick Eds. Springer NY 83--109.","DOI":"10.1007\/978-0-387-21579-2_6"},{"volume":"3079","volume-title":"High Speed Networks and Multimedia Communications. Lecture Notes in Computer Science","author":"Casilari E.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of the 3rd International Symposium On Communication Systems, Networks and Digital Signal Processing. 411--414","author":"Casilari E.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","unstructured":"Cisco Document Server. 2002. Traffic analysis for VoIP. Tech. rep. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/cisintwk\/intsolns\/voipsol\/ta_isd.htm.  Cisco Document Server. 2002. Traffic analysis for VoIP. Tech. rep. http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/cisintwk\/intsolns\/voipsol\/ta_isd.htm."},{"volume-title":"Statistics: An Appraisal","author":"Cox D. R.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","unstructured":"Crovella M. E. and Bestavros A. 1995. Explaining World Wide Web traffic self-similarity. Tech. rep. 1995-015 Computer Science Department Boston University.   Crovella M. E. and Bestavros A. 1995. Explaining World Wide Web traffic self-similarity. Tech. rep. 1995-015 Computer Science Department Boston University."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.748173"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285256"},{"edition":"4","volume-title":"Telecommunication System Engineering","author":"Freeman R. L.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190339"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649513"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.134371"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/217391.217420"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2319095.2321799"},{"volume-title":"FTP traffic generator. Tech. rep","author":"Ishac J.","key":"e_1_2_1_19_1"},{"volume-title":"Proceedings of the 9th IEEE International Conference on Computer Communications and Networks. 82--87","author":"Jiang W.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.700909"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"volume":"2","volume-title":"Proceedings of The Global Telecommunications Conference (GLOBECOM'99)","author":"Liu H.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","unstructured":"Liu X.-G. and Babiarz J. 2007. Simulation results for explicit PCN marking and flow termination (Preemption). White paper Nortel.  Liu X.-G. and Babiarz J. 2007. Simulation results for explicit PCN marking and flow termination (Preemption). White paper Nortel."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.2812"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.328944"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"volume":"2","volume-title":"Proceedings of the INFOCOM Annual Joint Conference of the IEEE Computer and Communications Societies.","author":"Ramamurthy G.","key":"e_1_2_1_28_1"},{"volume":"306","volume-title":"Proceedings of the 14th International Teletraffic Congress.","author":"Reininger D.","key":"e_1_2_1_29_1"},{"volume-title":"Simple and efficient models for variable bit rate MPEG video traffic. Tech. rep","author":"Rose O.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/788011.788316"},{"key":"e_1_2_1_32_1","unstructured":"Rose O. and Frater M. R. 1993. A comparison of models for VBR video traffic sources in B-ISDN. Tech. rep. University of Wuerzburg.  Rose O. and Frater M. R. 1993. A comparison of models for VBR video traffic sources in B-ISDN. Tech. rep. University of Wuerzburg."},{"volume-title":"Proceedings of the 1st International Workshop on Inter-domain Performance and Simulation.","year":"2003","author":"Seger J.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.32350"},{"key":"e_1_2_1_35_1","unstructured":"TCPDUMP. 2008. TCPDUMP public repository.  TCPDUMP. 2008. TCPDUMP public repository."},{"volume-title":"Heavy Tails: Statistical Techniques and Applications","year":"1998","author":"Willinger W.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.554723"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1823746.1823755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1823746.1823755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:17Z","timestamp":1750258037000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1823746.1823755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["10.1145\/1823746.1823755"],"URL":"https:\/\/doi.org\/10.1145\/1823746.1823755","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2010,8]]},"assertion":[{"value":"2008-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}