Document not found! Please try again

IP Bandwidth Allocation Management using Agents and ... - DPNM Lab

17 downloads 26972 Views 348KB Size Report
calculating the Hurst Parameter based on online monitoring of traffic at the VDSP access .... computing, an agent is an autonomous software component that acts ...
IP Bandwidth Allocation Management using Agents and Neural Network Approach Danielo G. Gomes*, Nazim Agoulmine*, and José N. de Souza#

1

* Laboratory of Complex Systems – LSC, University of Evry, France #Department of Electrical Engineering, University of Ceará, Brazil

1

Danielo G. Gomes and Nazim Agoulmine are with the Laboratory of Complex Systems – LSC, University of Evry, 40, Rue du Pelvoux – CE 1455 Courcouronnes 91020 Evry Cedex, France, e-mail: {dgomes,nazim}@iup.univ-evry.fr, José N. de Souza is with the Department of electrical Engineering, University of Ceará – UFC, Campus do Pici – Bloco 705, 60455-760, Fortaleza, CE, Brazi, e-mail: [email protected]

Abstract- Video and LAN traffic can be modeled as self-similar processes, whereas Internet traffic can be modeled by multifractal processes.. The Hurst parameter is a measure of the self-similarity of a process. The objective of this work is to use this characteristic of Internet traffic in order to allow future Video on Demand Service Providers (VDSP) to optimize their bandwidth utilization and consequently their communication cost. The work addresses one aspect of a global project that specify an intelligent agent architecture to manage the relationship between VDSP, ISPs and end customers. In this paper, we address the egress traffic aspect of the VDSP and propose a neuronal network approach to allow a VDSP agent to estimate the nature of the VADP egress traffic using the Hurst parameter. This approach is evaluate against statistical estimators

I. INTRODUCTION With the explosive growth of the Internet and of private networks attached to the Internet, a large number of new demands arises. Low-volume Telnet conversations are replaced by high-volume Web traffic, which is increasingly graphics intensive. At the same time, real-time applications demand an even quicker network response. In order to deal with these demands, it is not enough to increase internet capacity and accuracy methods for managing the traffic are needed. Several studies have claimed that different types of network can be accurately modeled using a self-similar process. A self-similar process is able to capture the long-range dependence (LRD) phenomenon exhibited by such traffic. Moreover, studies have demonstrated that the long range dependencies may have a pervasive effect on queuing performance. In fact, there is clear evidence that it can potentially cause massive cell losses. Furthermore, such a queuing system suffers from the buffer inefficacy phenomenon. Increasing the buffer size is not effective for decreasing the buffer overflow probability significantly [1]. The case study treated in this paper concerns future Value Added Service Providers and particularly Video on Demand VASP. The objective of this work is part of the work undertaken at the LSC Lab to define a global architecture based on intelligent agents. Par of the intelligence is on neural networks. The aim of the architecture is to allow VDSP to improve the use of the bandwidth while reducing the risk of Quality of Service Degradation. VDSP are connected to a particular ISP that provide the necessary bandwidth that permit to end customers to access video service. The egress traffic from the VDSP domain is composed by the sum of individual video streams that are sent to the end customers. The classical approach for VDSP to allow this communications is to establish a contract with an ISP that provide it with a certain bandwidth. However, the main problem with this approach is that usually the bandwidth is provided as leased line. Consequently, if the sum of traffic is inferior to the available bandwidth, the VDSP will pay for bandwidth that is not used. In the reverse, if the number of customer increase, it is possible that the allocated bandwidth is not sufficient and consequently the quality of service of the communication will be violated or the VDSP will have to refuse new connection. Thus, its is important for the VDSP to be able to control dynamically the ISP allocated bandwidth and have the possibility to increase it or reduce dependently on forecasting traffic. Because the Internet exhibit a long-range dependence, one possible approach to predict the traffic is to calculate in real time the nature of the VDSP egress traffic and detect whether it is possible or not to predict what will the future traffic look like. If the traffic is decreasing significantly than it is the advantage of the VDSP to negotiate online a decrease of its bandwidth reservation. In contrarly, if the traffic is going to increase over the maximum bandwidth reservation, the VDSP will negotiate

an increase of its bandwidth. In the other cases, the bandwidth allocation is optimal or it is not possible to have a clear view about the future. The Hurst parameter or parameter H characterizes the degree of self-similarity of a process degree. The calculation in real time of this parameter will give a good view about the type of traffic that flooding on a particular link. Thus the objective in this paper is identify the nature of the VDSP egress traffic by calculating the Hurst Parameter based on online monitoring of traffic at the VDSP access router. There are several statistical estimators for the Hurst parameter [2] but they need several samples for an accurate analysis and thus are not able to provide a fast an accurate calculation of the Hurst parameter. The objective of this work is to evaluate the possibility to use an Artificial Neural Networks (ANNs) to calculate in real time an estimation of the Hurst parameter. This neuronal network is managed by a agent that is placed in or near the VDSP access router and capable to take a decision regarding forecasting bandwidth reservation. The traffic for this analysis is generated by an algorithm and the results are compared with three other analytical estimators in order to evaluate the accuracy of the proposal. Results indicate that the neurocomputation approach provides reasonably accurate results and is proper for real time implementation. The remainder of this paper is organized as follows. Section II provides some notions about Internet traffic, Hurst parameter, agent technology and neural networks. The proposed architecture is presented in Section III, the statistical estimators in Section IV and the neural estimator in Section V. Numerical results are shown in Section VI and the Section VII concludes the paper.

II. BACKGROUND A. Internet Traffic The Internet Protocol (IP) is part of the TCP (Transmission Control Protocol)/IP protocol suite and is the most widely-used internetworking protocol. The IP function is to transfer data blocks, namely datagrams, transported from the source host to the destination host. IP is a connectionless network protocol. Every IP datagram is seen as an independent unit. The communication is unreliable, i.e., there is no end-to-end recognition nor between intermediate nodes. In addition, there is no mechanism of error control of the data transmitted and no flow control is used. In the old days, most of the data carried on networks was textual data. Today, with the rise of multimedia applications and network technologies, multimedia has become an indispensable feature on the Internet. Real-time voice and video applications become more and more popular on the Internet. However, multimedia networking is not a simple task and, so far, the Internet has been following the best-effort delivery model. There is no admission control and the network does its best to transmit information as quickly as possible but there is no assurance about the delivery of the packets. Most of the applications on the Internet were elastic [3] in nature, in that they tolerated packet delays and packet losses and they could be relatively served by the best-effort model. Nevertheless, the emerging multimedia traffic, such as voice and video, do not

perform well under extreme variations in the delay and excessive dropping of packets. In the current Internet model, the inelastic traffic does not perform adequately and interferes with the elastic traffic, leaving it with less bandwidth. Hence, to accommodate inelastic traffic, it is necessary to extend the Internet model in order to support the newer applications by providing QoS control [3][4][5].

C. Agent Technology

The agent concept has been widely proposed and adopted within both the telecommunications and Internet communities is a key tool in the creation of an open, heterogeneous and programmable network environment. This trend is motivated by the desire to use the agents to solve some of the problems encountered in large scale distributed and real-time systems such as the volume and complexity of the tasks, latency, B. The Hurst Parameter delays, and others. Generally, an agent can be regarded as an assistant or helper, which performs routine and complicated Let x(t), with t = 0, 1, 2, ..., a stationary stochastic process tasks on the user's behalf. In the context of distributed (m) [6]. For each m = 1,2,..., let x (k), k = 1,2,3,…, denote a new computing, an agent is an autonomous software component series obtained by averaging the original series x(t) over nonthat acts asynchronously on the user's behalf. Agent types can overlapping blocks of size m. be broadly categorized as static or mobile. A process X is called exactly second-order self-similar with parameter H = 1- β/2, 0< β < 1, if its autocorrelation function The majority of current communication system architectures is [6]: employ the client-server method that requires multiple transactions before a given task can be accomplished. This can lead to increased signaling traffic throughout the network. This [ ] problem can rapidly escalate in an open network environment and X is called asymptotically second-order self-similar with that spans multiple domains. As an alternative solution, mobile agents can migrate the computations or interactions to the parameter H = 1- β/2, 0< β < 1, if for all k=1,2,…, remote host by moving the execution there. For example, mobile agents can be delegated to complete specific tasks on 1 2− β 2− β ≡ y (k ) (2) lim r ( m) (k ) = (k + 1) − 2k 2− β + (k − 1) their own, providing that a certain set of constraints or rules m →∞ 2 have been defined for them [7]. They can then be dispatched across the network in the form of mobile program or mobile In self-similar processes, the autocorrelations decay hyperbolically implying in a non-summable autocorrelation code that can be recompiled and executed in the remote host. function Σ k r (k ) = ∞ (long-range dependences), The main motivation of the use of agent technology in this The Hurst parameter (H) gives the degree of self-similarity work is driven by the desire to automate the control and of a process, and, consequently, expresses the pattern of management processes by allowing for more programmability dependencies of a process. If 0.5 < H < 1, the process is a of the network to rapidly customize the provision of new long-range Dependent (LRD) process. If 0 < H < 0.5 it is an information and telecommunication services Hence, agents can anti-persistence process, and if H = 0.5 it is a short-range also be used to implement Service Level Agreements (SLAs) dependent (SRD) process between different actors of the network and service era. Agent Figure 1 illustrates the auto-correlation decay for different can then be used as brokers or mediators between end users and a service providers in order to implement the SLA. In this values of the Hurst parameter. way, complicated QoS metrics (from end user’s point of view) Autocorrelation 1 can be communicated in a simplified manner. Service provider H=0.9 H=0.8 and network provider agents can then negotiate with users’ 0.9 H=0.7 agents in order to meet the required service [8]. 0.8

1 2− β 2− β ≡ g(k), 0 < β < 1, k = 1,2,... (1) r ( m ) (k ) = (k + 1) − 2k 2− β + (k − 1) 2

[

]

D. Neural Networks

0.7

0.6 ) k( g

A neural network is a system composed by a high number of simple processors (neurons or nodes), highly interconnected and based on a simplified model of a neuron. Neural networks can adapt the computation taking into account previous knowledge of solutions for the problem under investigation (training) [9] [10].

0.5 0.4

0.3 0.2

0.1 0

0

5

10

15 k

20

25

30

Fig. 1. Autocorrelation function (1) of an exact second-order self-similar with parameter H = 1- β/2..

The capacity to learn information from models is the one of most important features of NNs. They learn where are inserted and modify their acting depend on this learning. In fact, the weights represent the knowledge of the NN at the end of the training process and the learning is the result of all the process. Therefore, the learning is a process where the synaptic connections of the neural network are adapted by a

continuous stimulus process from the environment where the network is inserted [11].

III. PROPOSED ARCHITECTURE The target architecture we attend to deploy is composed by a set of agents. In order to be operational, we suppose that all actors (VDSP, ISP and the end customer) will deploy an agent platform. At the ISP boundary, the platform will support four types of agents : a Policy agent which is responsible for the management of global ISP policies that defines high level specification of the system behavior (pricing rules, allocation rules, etc) , a Reservation agent that is responsible to interacting with physical equipments (routers) in order to configure them to provide the bandwidth agreed at the business level to the ISP customers (end customer and VDSP), an Accounting and Billing Agent that is responsible to accounting and billing network resource usage and allocating them to ISP customers and finally the Bandwidth Broker Agents that is responsible to interacting with ISP customer for the purpose of negotiating bandwidth allocation (Figure 2). SLA

ISP Management Agent Platform

Accouting Agent Policy Agent

BB Agent Reservation Agent

Bandwidth Negotiation Interface

Customer Premisse Video on Demande Service Provider Premisse TALK / DA TA TALK

R S CS TR RD TD C D

ISP Configuration Agent

TALK / DATA TALK

TALK / DA TA TALK

RS CS TR RD TD CD

R S C S TR RD TD C D

ISP Configuration Agent

POP

Therefore, the Intelligent VASP Agent is at the heart of the suggested architecture. Thus the objective of this work is to show whether it is possible to predict the nature of the traffic rapidly so that to permit to renegotiate the allocated bandwidth. In the architecture the renegotiation dialog is realized between the intelligent VDSP agent and the ISP BB agent. This aspect of the architecture and the internal interactions between the agent are not addressed in this paper. Only the intelligent VDSP behavior is addressed. Thus the objective is to use a neuronal network that permit the VDSP agent to take a decision regarding what to do in the near future. The idea is to train the neuronal network with existing traffic profile and determine whether it is capable to calculate the Hurst parameter that gives information about the nature of the traffic in a relatively short period. In the real situation, it is not false to say that we can train the neuronal network with the existing video streams as the VDSP have them already. Every time a new movie is included in the movie portfolio, the agent is trained with its traffic. To validate the usability of the approach, we have adopted the following methodology. We have taken some traffic examples for which we have the exact value of the Hurst parameters. Then we calculate the Hurst parameters using two methods the statistical approach and the neuronal approach and finally we make a comparison of the different approaches :

Gateway

POP

Registration Agent

TALK / DATA TALK

Intelligent VASP Agent

ISP Configuration Agent

to request or release resources to adapt to the new traffic profile.

Registration Agent

RSCS TR RD T D CD

SLA

Fig. 2.

Statistical Estimation

Multi-agents environment

Et the VASP VoD premise, the VASP intelligent agent is responsible for the monitoring of the egress traffic and the prediction of the forecasting traffic. At the end customers premise, a negotiation agent allows the end customer to register for the VoD service. The VDSP is responsible for the end customer bandwidth availability. The starting point of the process is a VASP VoD willing to offer on line a VoD service to a large number of end users. The VASP has contracted a line with a certain bandwidth to a particular ISP. We consider that initially end customers what a basic IP service with the same ISP using DSL technology. Hence, we suppose that the ISP is able to control the bandwidth allocation of the end user. The customer register online to the VoD VASP in order to receive a particular movie stream at a certain date/time. Because of the busty nature of the traffic that is sent by the servers when flooding videos, the interest of the VoD VASP is to adapt the bandwidth reservation with the ISP network to a level that is compatible with what is globally sent, thus to avoid underprovisioning or overprovisioning and then extra cost or quality of service degradation. This can be possible only if it is possible for the VADSP to predict what the traffic will look like in the near future. This task is affected to the Intelligent VASP agent. Once the agent detect an important change in the traffic, it informs the BB agent of the ISP management system in order

COMPARAISON

TRACES

NEURO ESTIMATION

Fig. 3.

Hurst Parameter CalculationMéthodologie

IV. STATISTICAL ESTIMATORS Three statistical estimators were used to validate results given by the neuro estimator: the R/S statistical, the Higuchi method and the Abry-Veitch estimator. A. The R/S Statistical Estimator The R/S estimator, defined by Hurst (1951), is one of the most well-known and simplest methods for estimation of dependence level of a series of samples [3]. For a stochastic process x(t) defined at discrete-time intervals {xt, t = 0, 1, 2, ...}, the rescaled range of x(t) over a time interval N is defined as the ratio R/S:

R = S

 j   j  max  ( X k − jM (N )) − min  ( X k − jM (N ))  1≤ j ≤ N   1≤ j ≤ N   k =1   k =1 





1 N

N

(3)

∑ (X j − M (N ))2 j =1

with M(N) being the sample mean over the time period N: M (N ) =

1 N

N

∑X

(4)

j

j =1

Fractal Brownian Motion samples [9] [10] were generated to train the neural network and to generate the statistical estimator inputs. The three statistical estimators described before were used for the verification of the precision of the neural network. Results were derived using the Stuttgart Neural Network Simulator was used in the experiment [11]. Sequences of 10 traffic samples to compose the input variables. The reasons for this choice are: (i). patterns appear at different levels of aggregation (selfsimilarity). Sequences of 10 samples have characteristics similar to sequences of 100, 1000 or 10000 samples; (ii). training time is short with little neurons.

There is no established procedure of choice for the optimum Let N be the sample size divided in K subsets where K is an input parameter. If we plot log(R/S) versus N on a log-log number of neuron. Then, experiments with 2,5,10 15 and 20 scale, then, the value of parameter H can be estimated by linear neurons were tried and the better results were the ones with 15 regression over the K points obtained from the data sets. hidden neurons (Table 2). The patterns were chosen in the following way: B. The Higuchi Estimator This method [7] considers the fractal dimension D of a time series such that H = 2+D. The method takes the partial sums • 200 traces sequences with H=0.5; • 100 traces sequences with H=0.6, H=0.7, H=0.8 and H=0.9 Y ( n) = ∑in=1 X i of a random sample series {Xi},i = 1,…,N and it calculates the normalized size of the curve defined by the Each sequence has 10 bursts of samples. For the trace with data as: H=0.5, it was necessary to have twice the number of samples due to short range dependences.After the learning phase the −1 ( N − i ) m  m performance of the neural network was checked. These N −1 N −i L(m) = ⋅ ⋅ Y(i + km) − Y(i + (k −1 )m) , (5) patterns should not have been presented to the network before.   3 m m

∑ i =1





∑ k =1

C. The Abry-Veitch Estimator

For the definition of the number of neurons and of the activation function, the first training used a stopping criterion of 1000 epochs. Each epochs contains one complete cycle (sweeping) through all training pattern set This training allows to selection of the neural network topology which is more adapted to the problem. The second training considered another stopping criterion: a small error.

The Abry-Veitch estimator is based on wavelets theory. It decomposes a sequence of samples in approach coefficients (low-pass filter) and detail coefficients (high-pass filter). These coefficients are obtained by projected digital filters. From the original sample sequence, successive approaches and detail After the training phase, 600 sequences of the test set were sequences are calculated which are obtained by recursive applied to NN. These sequences are not known by the network digital filtering. In other words, the output of a digital filter is since it is necessary to verify the generalization capacity of the applied again (feedback) to the same digital filter. A detailed neural network. explanation of this method can be found in [8, 9]. The AbryVeitch estimator is the most accurate H estimator known up to VI. RESULTS AND DISCUSSION date and presents low computational complexity. Estimations of H and respective errors of the three statistical methods are shown in Table 1.

V. A NEURAL NETWORK ESTIMATOR A neural network target to the solution of a specific problem requires training during which the network learns by adjusting the weights of the network connections. In fact, the weights represent the knowledge of the neural network at the end of the training process, i.e., learning is a process in which the synaptic connections of the neural network are adapted by a continuous stimulus process from the environment where the network is inserted.

TABLE I STATISTICAL ESTIMATORS ERRORS Hidden layer activation function Hidden neurons number

Logistic Mean-Square Error (1000 epochs)

Hyperbolic tangent Mean-Square Error (1000 epochs)

2 5 10 15 20

0.3371 0.3219 0.3190 0.1355 0.2008

0.2191 0.1225 0.0197 0.0060 0.0131

A feedforward network architecture with backpropagation momentum training algorithm was used. The backpropagation algorithm was considered since it is the most successful algorithm for the design of multilayer feedforward networks. Table 2 presents different scenarios used in the experiments. The number of neurons in the input-output layers was defined The difference of magnitude of the mean-square error given by according to the structure of the problem. The output variable the hyperbolic tangent and the logistics activation function is is the parameter H, i.e., the neural network presents one neuron evident. on the output layer. TABLE 2 MEAN-SQUARE ERROR OF THE INITIAL TRAINING

H value

Higuchi method

R/S Statistical

Abry-Veitch

Estimation

Error

Estimation

Error

Estimation

Error

0.4859 0.5652 0.637 0.7056 0.7827

0.0141 0.0347 0.063 0.0943 0.1172

0.5437 0.5780 0.6749 0.7672 0.8542

-0.0437 0.0219 0.0250 0.0327 0.0457

0.5006 0.5916 0.6911 0.7987 0.9181

-0.0006 0.0083 0.0088 0.0012 -0.0181

0.5 0.6 0.7 0.8 0.9

For both in logistic and hyperbolic tangent functions, the worst and the best cases happened with 2 and 15 neurons, respectively. Table 2 reveals that the neural network with a hidden layer of 15 neurons and with hyperbolic tangent activation function is the best option. After choosing the neural network topology chosen (10 input neurons, 15 hidden neurons and 1 output neuron), the real training was persued. The stopping criterion used for the learning process was an error less than 0.0010 (0.1%). The NN was trained with 2616 epochs (Fig. 4). Six hundred 600 sequences of the test set were applied to neural network in the execution phase. These sequences had never been known by the network. The neural estimator error for different values of the parameter H can be seen in the Fig. 5. Notice that the error has an initial increase, from H=0.5 to H=0.6, and then decreases. The three statistical estimators have used the complete traces (10000 samples) to make their calculations. Training error 0.16

Final error: 0.0010

0.14

It can be seen in Figure 4 that for values of the Hurst parameter close to 0.5 (SRD), the neural network estimator produces the least accurate results. However, for the range of interest for network traffic (H > 0.7), the neural network estimator gives more precise results than the R/S and the Higuchi estimators. For the range of interest of the Hurst parameter, the neural network produces values of H which differ at most 0.02 from the results produced by the Abry-Veitch estimator which is the most precise one. The difference between the results by these two estimators decreases as H increases. Moreover, the neural networks demanded half of the number of the samples required by the statistical estimators, i.e., the neural network estimator can generate quite accurate results much faster than the statistical estimators which is specially advantageous to quickly detect variations of the Hurst parameter in real time. The drawback of the neural networks is the delay in learning which impact, however, decreases for large traces.

0.12

0.1 r or r e er a u q sn a e m

Fig. 5. Neural estimator evolution error.

0.08

0.06

0.04

0.02

0

0

500

1000

1500 epoch number

2000

2500

Fig. 4. Training error with the selected topology. The neural network needed only one tenth of the total trace, 1000 samples, for each LRD trace (H = 0.6, H = 0.7, H = 0.8 and H = 0.9). When the input samples were doubled duplicated for the SRD trace (H = 0.5), i.e., 2000 samples, there was considerable improvement in the error (Fig. 3). In other words, the neural networks enhanced the precision of the estimations given that sample size increase needed by the statistical estimators.

Fig. 6 .Comparison between statisticals and neuro estimators.

VI. CONCLUSION Long-range dependences have a significant impact on both network dimensioning and traffic management. The Hurst parameter is a measure of self-similarity of a process, and, thus, the intensity of the long-range dependences of a process.

Small variations in the Hurst parameter value may lead to considerable changes on traffic control. Therefore, an accurate and quick evaluation of the Hurst parameter is of paramount importance. The statistical estimators requires large sample size. Consequently, it presents limitations for real time evaluation of H. The present work investigated the effectiveness of a neural network estimator for the Hurst parameter. Neural networks, even demanding a significant time for training, represent an accurate and fast estimation of the parameter H. The presented approach aims to use this neuronal network as the intelligent part of an agent that permit a Video on Demand Service Provider to predict its traffic. The global architecture will permit in a competitive telecommunication market to an ISP to provide a new type of on-demand bandwidth provisioning. This will help future VASP to reduce their communication cost while preserving the required QoS. The future work is to introduce this neuronal network in the agent and to realize the overall loop provisioning i.e. allocation of bandwidth, monitoring of traffic, predicting future traffic, renegotiating bandwidth allocation, reallocation resources. Then the deployed architecture will be evaluated in term of accuracy of the decision algorithm as well as the impact of the these reconfiguration on the final QoS visible to the end customers.

REFERENCES [1] K. Park and W. Willinger, Self Similar Network Traffic and Performance Evaluation, Willey, 2000. [2] M.Taqqu, V. Teverovsky, and W. Willinger, Estimators for Long-Range Dependence: an Empirical Study, Fractals, vol 3, No 4, pp. 785-788, 1995. [4] M. Taqqu, and V. Teverovsky, Robustness of Whittle-type Estimators for Time Series with Long-Range Dependence. Stochastic Models 13 (1997) pp 723-757. http://math.bu.edu/people/murad/articles.html [5] Braden, R., Clark, D. and Shenker, S. RFC 1633: Integrated Services in the Internet Architecture: An Overview, July 1994. fttp://ftp.isi.edu/in-notes/rfc1633.ps. [6] Braden, R., Zhang, L., Berson, S., Herzog, S. and Jamin, S., Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification, RFC 2205, Network Working Group, IETF, September 1997. (www.ietf.org). [7] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and Weiss, W., An Architecture for Differentiated Services, RFC 2475, Network Working Group, IETF, December 1998. (www.ieft.org)

[6] W. Leland, M. Taqqu, W. Willinger and D. Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transaction on Networking,vol 2, no 1, pp. 1-15, February 1994.

[7] David Chieng et al., “A Mobile Agent Brokering Environment for The Future Open Network Marketplace”, Seventh International Conference On Intelligence in Services and Networks (IS&N2000), Athens, Greece, Feb 2000. [8] N. Agoulmine, D. Dragan, T. Gringel, J. Hall, E. Rosa, M. Tschichholz, "Trouble Management for Multimedia Services in Multi-Provider Environments", International Journal on Network and Service Management, Wiley publisher, Vol n°8, January 2000, pp99-123.

[9] R. Hect-Nielsen, neurocomputing, Addison-Wesley Publishing Company, 1990.. [10] L. Fausset, Fundamentals of neural networks, PrenticeHall International, new jersey, 1994

[11]P. Abry, and D. Veitch, Wavelet Analysis of Long-Range Dependence Traffic. IEEE Transactions on Informations Theory, vol. 44, No. 1, pp. 2-15, 1998. [12]D.Veitch, and P. Abry, A Wavelet-Based Joint Estimator of the Parameters of Long-Range Dependence. IEEE Transactions on Informations, vol. 45, No. 3, pp. 878-897, 1998. [13]. M. Chi, E. Neal, and G. Young, Practical Applications of Fractional Brownian Motion and Noise to Synthetic Hydrology. Water Resources Research, 9:1523-1533, December, 1973. [14]. B. Mandelbrot, and J.W. Ness, Fractional brownian motions, fractional noises and applications. SIAM Review, 10:422-437, October 1968. [15]U. of Stuttgart, SNNS - Stuttgart Neural Network Simulator - User Manual, Version 4.1, 1995( http://www-ra.informatik.unituebingen.de/SNNS/.).

Suggest Documents