428 11 Modeling Network Traffic
error probability between 0.001 < e < 0.9. Plot the system throughput and
comment on your results.
11.26 Consider Example 11.15 and suppose that there is an upper limit on the
number of retransmissions before the frame is considered lost. Obtain the
resulting Markov transition diagram and the associated transition matrix.
11.27 Consider Example 11.15 again and suppose that no transmissions are al-
lowed. This could be the case for real-time data or best-effort traffic. Obtain
the resulting Markov transition diagram and the associated transition matrix.
11.28 Consider Example 11.15 again, but this time assume that number of errors
per frame varies between 0 and 5. A forward error correction (FEC) scheme
is used and frame is considered to be error free if it contains up to two packets
in error. Obtain the resulting Markov transition diagram and the associated
transition matrix.
11.29 Assume an adaptive forward error correction (FEC) scheme where three lev-
els of error correction are employed:
FEC level 1: can correct one error in received frame only.
FEC level 2: can correct up to three errors.
FEC level 3: can correct up to five errors.
When the errors in the received frame can be corrected, the next frame is
transmitted using the next lower FEC level. When the errors in the received
frame cannot be corrected, the frame is retransmitted using the next higher
FEC level. Assume each frame to contain no more than five errors in it due
to packet size limitations. Derive the Markov chain transition diagram and
the associated transition matrix.
References
1. D. Denterneer and V. Pronk, “Traffic models for telecommunication”, 13th Symposium on
Computational Statistics, Bristol, Great Britain, pp. 269–274, 1998.
2. W. Leland, M. Taqqu, W. Willinger, and D. Wilson, “On the self-similar nature of Ethernet
traffic”, IEEE/ACM Trans. on Networking, vol. 2, pp. 1–15, 1994.
3. J. Beran, R. Sherman, M.S. Taqqu and W. Willinger, “Variable-bit-rate video traffic and long-
range dependence”, IEEE/ACM Transactions on Networking, vol. 2, pp. 1–15, 1994.
4. V. Paxson and S. Floyd, “Wide-area traffic: The failure of Poisson modeling”, Proceedings
of the conference on communications architectures protocols and applications, ACM Sig-
gcomm’94, pp. 257–268, 1994.
5. S. Molnar and A. Vidas, “On modeling and shaping self-similar ATM traffic, teletraffic con-
tributions for the information age”, Proc. 15th International Teletraffic Congress, Washington
D. C., June 1997, pp. 1409–1420, 1997.
6. Z. Sahinoglu and S. Tekinay, “On multimedia networks: Self-similar traffic and network per-
formance”, IEEE Communications Magazine, Jan. 1999.
7. M. Corvella and A. Bestavros, “Self-similarity in World Wide Web traffic: evidence and pos-
sible causes”, IEEE/ACM Transactions on Networking, vol. 5, pp. 835–846, 1996.
8. J.D. McCabe, Practical Computer Network Analysis and Design, Morgan Kaufmann, San
Francisco, 1998.
9. J.M. Pitts and J.A. Schormans, Introduction to ATM Design and Performance, John Wiley,
New York, 1996.