Yuan Yuan, Zheng Bao-Yu, Yan Zhen-Ya. A Novel Cooperative Routing Protocols in Ad hoc Networks and Performance Analysis[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2238-2241. doi: 10.3724/SP.J.1146.2007.00215
Citation:
Zhang Yi, Li Le-min. A Stable Multifractal Model of Network Traffic and Its Verification[J]. Journal of Electronics & Information Technology, 2006, 28(6): 1124-1128.
Yuan Yuan, Zheng Bao-Yu, Yan Zhen-Ya. A Novel Cooperative Routing Protocols in Ad hoc Networks and Performance Analysis[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2238-2241. doi: 10.3724/SP.J.1146.2007.00215
Citation:
Zhang Yi, Li Le-min. A Stable Multifractal Model of Network Traffic and Its Verification[J]. Journal of Electronics & Information Technology, 2006, 28(6): 1124-1128.
There have been two a priori models up till now concerning network traffic: self-similar and multifractal models. The self-similar model is simple enough to characterize network traffic with the single exponent H, however it can not thoroughly describe the contents. The multifractal model, which is more accurate, is not practical because it uses multifractal spectra as functions to represent signals. Therefore, on the basis of the framework of IDC theory, this paper proposes a stable multifractal model of network traffic. It is tested on several traces by using the method of wavelet transforms that the model fits traffic precisely in terms of both scale behaviors and marginal distributions. As a specific case of multifractal processes, this model, by estimations of four parameters, can specify the representation of the multifractal exponent.
Yuan Yuan, Zheng Bao-Yu, Yan Zhen-Ya. A Novel Cooperative Routing Protocols in Ad hoc Networks and Performance Analysis[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2238-2241. doi: 10.3724/SP.J.1146.2007.00215
Yuan Yuan, Zheng Bao-Yu, Yan Zhen-Ya. A Novel Cooperative Routing Protocols in Ad hoc Networks and Performance Analysis[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2238-2241. doi: 10.3724/SP.J.1146.2007.00215