<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0120-6230</journal-id>
<journal-title><![CDATA[Revista Facultad de Ingeniería Universidad de Antioquia]]></journal-title>
<abbrev-journal-title><![CDATA[Rev.fac.ing.univ. Antioquia]]></abbrev-journal-title>
<issn>0120-6230</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad de Antioquia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0120-62302013000200005</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Performance of multivariable traffic model that allows estimating Throughput mean values]]></article-title>
<article-title xml:lang="es"><![CDATA[Desempeño de un modelo de tráfico multivariable que permita estimar el valor medio del Throughput]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[Cesar]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salgado]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salcedo]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Autónoma de San Luis Potosí Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[San Luis Potosí ]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Francisco José de Caldas District University Technological Faculty ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Francisco José de Caldas District University Engineering Faculty ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2013</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2013</year>
</pub-date>
<numero>67</numero>
<fpage>52</fpage>
<lpage>62</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0120-62302013000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0120-62302013000200005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0120-62302013000200005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The present paper is aimed at developing a multi-variable traffic model of a Wi-Fi data network that allows estimating throughput mean values. In order to construct the model, data corresponding to an 8-host wireless ad- hoc network were collected using a software package called WireShark; the network was specially designed for modeling purposes. Subsequently, the most convenient multi-variable models were estimated according to the traffic features extracted from the collected data. Results were the evaluated using a software package called STATA, leading to the establishment of significant explanatory variables for the model and its performance levels. For our Wi-Fi network, results show that the analyzed traffic exhibits self- similarity features. Additionally, model coefficients and their corresponding significance levels are shown in various Tables. Finally, an explanatory multivariable model consisting of four variables was produced on the basis of ordinary least-squares methodologies (with a per-cent error of 22.16). The findings suggest that the multi-variable traffic model produced in this study allows a reliable analysis of throughput mean values; however, the model is limited when predicting traffic values for data outside the selected estimation set.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[El presente trabajo de investigación tiene por objetivo desarrollar un modelo multivariable de tráfico para una red de datos Wi-Fi que permita estimar el valor medio de throughput; para lograr lo anterior se procedió a capturar los datos correspondientes con el software WireShark de una red inalámbrica Ad Hoc compuesta por ocho host, diseñada e implementada para tal fin. A continuación se estimaron los modelos multivariados más convenientes de acuerdo a las características del tráfico capturado y posteriormente se evaluaron los resultados obtenidos a partir del software STATA, determinando las variables explicativas más significativas dentro del modelo y su nivel desempeño. Los resultados arrojados por este proyecto de investigación demuestran la autosimilaridad presente en el tráfico capturado de la red Wi-Fi, además, se muestran en diferentes tablas los coeficientes de los modelos y sus respectivos niveles de significancia. Finalmente se desarrolló un modelo multivariado de cuatro variables explicativas a partir de la metodología de mínimos cuadrados ordinarios con un error porcentual del 22,16. Como conclusión, el modelo multivariado de tráfico desarrollado permite realizar un análisis de los valores medios del throughput con suficientes niveles de confiabilidad, sin embargo, no realiza una buena predicción de los valores de tráfico para datos que estén fuera del conjunto seleccionado para su estimación.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Traffic model]]></kwd>
<kwd lng="en"><![CDATA[multi-variable model]]></kwd>
<kwd lng="en"><![CDATA[Wi-Fi networks]]></kwd>
<kwd lng="en"><![CDATA[throughput]]></kwd>
<kwd lng="es"><![CDATA[Modelo de tráfico]]></kwd>
<kwd lng="es"><![CDATA[Modelo Multivariable]]></kwd>
<kwd lng="es"><![CDATA[Redes Wi-Fi]]></kwd>
<kwd lng="es"><![CDATA[Throughput]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="right"><b>ART&Iacute;CULO ORIGINAL</b></p>     <p align="right">&nbsp;</p>     <p align="center"><font size="4"> <b>Performance of multivariable traffic model that allows estimating Throughput mean values</b></font></p>     <p align="center">&nbsp;</p>     <p align="center"><font size="3"> <b>Desempe&ntilde;o de un modelo de tr&aacute;fico multivariable que permita estimar el valor medio del Throughput</b></font></p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p>     <p> <i><b>Cesar Hern&aacute;ndez<sup>1*</sup>, C. Salgado<sup>2</sup>, O. Salcedo<sup>2</sup></b></i></p>       <p><sup>1</sup>Facultad de Ingenier&iacute;a, Universidad  Aut&oacute;noma de San Luis Potos&iacute;. Av. Dr. Manuel Nava no. 8. Zona Universitaria.  C.P. 78290 San Luis Potos&iacute;, SLP, M&eacute;xico.</p>      <p><sup>2</sup>Technological Faculty. Francisco  Jos&eacute; de Caldas District University. Transversal 70 B No. 73 A - 35 Sur. Bogot&aacute;,  Colombia. </p>      ]]></body>
<body><![CDATA[<p><sup>3</sup>Engineering Faculty.  Francisco Jos&eacute; de Caldas District University. Carrera 7 No. 40 - 53. Bogot&aacute;,  Colombia.</p>      <p><sup>*</sup>Autor de correspondencia:  tel&eacute;fono: + 57 + 311+ 218 6635, correo electr&oacute;nico: <a href="mailto:cahernandezs@udistrital.edu.co">cahernandezs@udistrital.edu.co</a> (C. Hern&aacute;ndez)</p>     <p>&nbsp;</p>     <p align="center">(Recibido el 24 de  Septiembre de 2012. Aceptado el 11 de Marzo del 2013)</p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p> <hr noshade size="1">      <p><font size="3"><b>Abstract</b></font></p>       <p>The  present paper is aimed at developing a multi-variable traffic model of a Wi-Fi  data network that allows estimating throughput mean values. In order to  construct the model, data corresponding to an 8-host wireless ad- hoc network  were collected using a software package called WireShark; the network was  specially designed for modeling purposes. Subsequently, the most convenient  multi-variable models were estimated according to the traffic features  extracted from the collected data. Results were the evaluated using a software  package called STATA, leading to the establishment of significant explanatory  variables for the model and its performance levels. For our Wi-Fi network,  results show that the analyzed traffic exhibits self- similarity features.  Additionally, model coefficients and their corresponding significance levels  are shown in various Tables. Finally, an explanatory multivariable model  consisting of four variables was produced on the basis of ordinary  least-squares methodologies (with a per-cent error of 22.16). The findings  suggest that the multi-variable traffic model produced in this study allows a  reliable analysis of throughput mean values; however, the model is limited when  predicting traffic values for data outside the selected estimation set.</p>        <p><i>Keywords:</i> Traffic model; multi-variable model; Wi-Fi networks; throughput</p>   <hr noshade size="1">      <p><font size="3"><b>Resumen</b></font></p>     ]]></body>
<body><![CDATA[<p>El presente trabajo de investigaci&oacute;n tiene por objetivo desarrollar un  modelo multivariable de tr&aacute;fico para una red de datos Wi-Fi que permita estimar  el valor medio de throughput; para lograr lo anterior se procedi&oacute; a capturar los datos  correspondientes con el software WireShark de una red  inal&aacute;mbrica Ad Hoc compuesta por ocho host, dise&ntilde;ada e implementada para tal  fin. A continuaci&oacute;n se estimaron los modelos multivariados m&aacute;s convenientes de  acuerdo a las caracter&iacute;sticas del tr&aacute;fico capturado y posteriormente se  evaluaron los resultados obtenidos a partir del software STATA, determinando  las variables explicativas m&aacute;s significativas dentro del modelo y su nivel  desempe&ntilde;o. </p>     <p>Los resultados arrojados por este proyecto de investigaci&oacute;n demuestran la  autosimilaridad presente en el tr&aacute;fico capturado de la red Wi-Fi, adem&aacute;s, se  muestran en diferentes tablas los coeficientes de los modelos y sus respectivos  niveles de significancia. Finalmente se desarroll&oacute; un modelo multivariado de  cuatro variables explicativas a partir de la metodolog&iacute;a de m&iacute;nimos cuadrados  ordinarios con un error porcentual del 22,16. </p>     <p>Como conclusi&oacute;n, el modelo multivariado de tr&aacute;fico desarrollado permite  realizar un an&aacute;lisis de los valores medios del throughput con  suficientes niveles de confiabilidad, sin embargo, no realiza una buena  predicci&oacute;n de los valores de tr&aacute;fico para datos que est&eacute;n fuera del conjunto  seleccionado para su estimaci&oacute;n. </p>      <p><i>Palabras clave: </i>Modelo de tr&aacute;fico, Modelo Multivariable, Redes Wi-Fi, Throughput</p>  <hr noshade size="1">      <p>&nbsp;</p>     <p>&nbsp;</p>     <p><font size="3"><b>Introduction</b></font></p>      <p>Nowadays  communications networks must offer a variety of services in addition to  traditional services such as voice and data. The new services include  specialized video and audio services together with images, text, control and so  on; each of these services requires particular QoS requirements. QoS has become  ever more important in terms of service competitiveness in our current society  and it represents a compelling aspect regarding the different network  requirements in demand &#91;1&#93;.</p>       <p>These  new characteristics associated to network capacity and network requirements  permitted spotting inconsistencies between the traditional models that were  based on non-correlated traffic and the behavior (measurements) of the new  traffic, particularly regarding correlation-wise structures that appear at  different time scales &#91;2&#93;.</p>       <p>Since  the new traffic behavior of wireless communication networks is too complex to  be designed using non-correlated traffic models, it is necessary to develop  statistical models that allow forecasting traffic on current communication  networks and, for our purposes, forecasting the traffic over a Wi-Fi network,  since these networks are widely used and permit easy access to data downloads.</p>       ]]></body>
<body><![CDATA[<p>In  the last century, network development has involved various proposals for  traffic models; each of these models has proved useful in its own particular  context. Only until recently - and due to the need for service integration into  a single network structure - traffic modeling became a comprehensive research  field, where the main goal is to develop predictive models that allow  foreseeing the impact of traffic load (from different applications) on network  resources and then assess the supply of QoS &#91;2&#93;.</p>       <p>The  reasons above highlight the importance of having accurate traffic models,  therefore the present study attempts to develop a Wi-Fi- network multi-variable  traffic model that permits estimating throughput mean values.</p>       <p>Since  time intervals between packet arrivals were considered to be independent for  the case of a telephone network, it was possible to consolidate a whole  mathematical theory that models the effects of such demands on communication  limited resources. This is the case of queuing theory, which is widely used  when modeling traditional communications networks. The most remarkable  contribution from this type of non-correlated models is represented in Erlang  loss formula (1); this formula has permitted both designing and scaling  telephone networks for almost a century &#91;2&#93;.</p>          <p><img src="img/revistas/rfiua/n67/n67a05e01.gif"></p>          <p>However,  modern communication networks must offer not only voice-and-data services but  also many other services (e.g. images, video, audio, text, control and so on).  Each of these new services is associated to different criteria in terms of QoS,  and so the network should meet different types of requirements.</p>         <p>These  new characteristics, in terms of network capacity and network demand, begin to  reveal a lack of consistency between traditional models and the actual behavior  observed from measuring network performance, particularly when considering  correlated structures that extend throughout different time scales. These facts  disproved the results obtained from traditional traffic theory, which is based  on non-correlated models. The new type of traffic flowing on networks is too  complex to be modeled using the techniques that once were successfully applied  to telephone networks &#91;2&#93;.</p>         <p>Apart  from using single-variable models, conventional analysis does not integrate all  the relevant information associated with data networks, hence multi-variable  traffic models represent a good choice to model data-networks traffic. These  alternative models provide a more accurate forecast. Therefore, it has been  necessary to develop additional traffic models that permit capturing the  greatest amount of significant information possible and considering real  traffic features, particularly the existing correlations between arrival-time  intervals, which were absent from non-correlated models &#91;2&#93;.</p>         <p>When  foreseeing the future needs of any complex system, having an accurate traffic  forecast is really important in order to define future requirements in terms of  capacity and also to plan the possible changes. A very precise model should  predict situations in future years, and this very ability represents an  advantage when planning future requirements &#91;3&#93;.</p>         <p>Therefore,  multivariable traffic models are advantageous to: coverage planning, resource  reservation, network monitoring, anomaly detection, and the creation of more  precise simulation models - in terms of traffic forecast for a given time scale  &#91;4&#93;.</p>         <p>The  present proposal will be presented in a sequential fashion by using four  methodological approaches. The first approach is of an exploratory type and is  intended to document all the necessary information. The second approach is of a  descriptive type and permits detailing each of the characteristics found in the  variables of interest. The third approach is of an analytical type and allows  defining the influence of each of the variables within the model. The fourth  approach is of a predictive type and attempts to apply solutions found in other  situations to the context of interest.</p> 	       ]]></body>
<body><![CDATA[<p>&nbsp;</p>     <p><font size="3"><b>Metodology</b></font></p>          <p>The  methodology followed in this study can be described in four stages, namely:  traffic generation and traffic capture, Wi-Fi network design and  implementation, traffic model estimation and selection, and traffic model  evaluation.</p>        <p><b><i>Traffic generation and traffic capture</i></b></p>        <p>The  method to capture the traffic generated in the Wi-Fi network was based on the  software package called ''WireShark'', which is an open- source Sniffer  that allows capturing all incoming and outgoing traffic through a network  adapter (card) installed on a computer &#91;5, 6&#93;.</p>      <p>A Wi-Fi network was  implemented and a traffic generation pattern was designed for the network.  Since the main idea of our study was to build a multivariable traffic model  that allowed a more accurate description of current traffic, we decided to analyze the traffic patterns of one entity  throughout a complete working day, starting at 8:00 a.m. up until 5:00 p.m.  (nine working hours). During this time interval, the behavior of the traffic  generated by eight employees was analyzed by observing (on a 30-minute basis)  what applications were used on their desktop computers. By using this  information, the following step was to emulate the same type of traffic  generation through the design of seven independent traffic generation profiles,  working for the same nine-hour period (see <a href="#Tabla1">table 1</a> and <a href="#Tabla2">table 2</a>).</p>        <p align="center"><a name="Tabla1"></a><img src="img/revistas/rfiua/n67/n67a05t01.gif" ></p>      <p align="center"><a name="Tabla2"></a><img src="img/revistas/rfiua/n67/n67a05t02.gif" ></p>        <p>The  profiles described in table 1 also correspond to the explanatory variables that  were initially intended to be included in the model, namely time, number of  users and applications. These variables were chosen because (according to the  theory) they are closely related with the volume of traffic that is generated  within a data network.</p>        <p><b><i>Design and implementation of the Wi-Fi network</i></b></p>        ]]></body>
<body><![CDATA[<p>In  order to continue with this study and so meet the remaining objectives, it was  necessary to design and implement a Wi-Fi network. Initially, and after  studying the characteristics of Wi-Fi networks, it was clear that two possible  types of networks were possible, namely infrastructure- based networks and  ad-hoc networks &#91;5, 6&#93;.</p>        <p>Using  an infrastructure-based Wi-Fi network would imply having to capture traffic on  each data node (each PC) independently and then put these data together, which  requires a big effort in terms of data organization. Hence we decided to  implement a Wi-Fi ad-hoc network and set one of the laptop computers as  internet gateway; thus all the incoming/outgoing traffic would necessary go through  such server. Based on this network and configuration choice, the remaining task  was to gather (capture) traffic data in only one computer, namely the server  &#91;7, 8&#93;.</p>        <p>Once  the Wi-Fi network was implemented, local- interconnection and internet-access tests  were conducted. Then, traffic capture tests were carried out using Sniffer  WireShark. Subsequently, applications were installed on the network nodes  (computers) as required (<a href="#Tabla2">table 2</a>), application tests were also conducted to  guarantee proper operation.</p>          <p><b><i>Selection and estimation of the traffic model</i></b></p>        <p>Once  data were captured, it was necessary to export data and organize information  using spreadsheets (Excel file). WireShark captures traffic data in real time;  on average, WireShark captures a packet every ten milliseconds (10 ms),  therefore the number of packets that can be stored in nine hours is extremely  large, in this particular case the number of packets was 3,103,201.</p>        <p>For  every packet stored, WireShark also saves variables such as the elapsed time  (in seconds) after the first capture, the corresponding capture number, the  protocol involved, the source and destination IP addresses, the packet size,  and a brief description of the information contained in packets &#91;9&#93;. However,  the study would not be as meaning full if it were to be based on the direct  information provided by WireShark only. The fact that each packet is generated  at a single source (IP address) implies that the variable associated to the  number of users is always ''1'', and so this value would not be as  significant in a multivariable model &#91;10 -12&#93;.</p>        <p>Hence,  a decision was made to reorganize the data from captured packets by fixing time  intervals where all the information within becomes a single traffic datum. The  value for the time interval in question was fixed to be one minute so as to  obtain consistent pieces of information as well as a representative amount of  traffic data. According to the time intervals selected, the initial number of  packets (3,103,200) became (9h*60min/h) 540 traffic samples.</p>        <p>In  order to carry out the necessary statistical analysis, the 540 traffic samples  were organized as described in <a href="#Tabla3">table 3</a>.</p>            <p align="center"><a name="Tabla3"></a><img src="img/revistas/rfiua/n67/n67a05t03.gif" ></p>            <p>The  first column corresponds to the number of the traffic sample - from 1 to 540.  The second column corresponds to the time of the day when the data was  captured; this value was obtained from the original Time value, which indicates  the amount of elapsed seconds starting at the first capture until the current  capture; thus we obtained our values only by adding up the initial time value  (eight in the morning). The third column corresponds to the original Time  variable. Column 4 holds the number of transmitted bytes during the  corresponding one- minute period. Column 5 contains the number of transmitted  packets during the corresponding one-minute period. It is worth mentioning that  packets are not of the same length, since they come from different  applications. If all packets had the same length then perfect co-linearity  would exist, and so one of the variables should be eliminated. Column number 6  contains traffic data (dependent variable or explained variable) measured in  bytes per minute.</p>          ]]></body>
<body><![CDATA[<p>Column  7 corresponds to traffic measured in packets per minute. Usually, measurement  units such as bps, Kbps or Mbps, are consider suitable to represent traffic -  instead of packets per minute - since the length of packets may vary, and so  packets would not represent the exact volume of information flowing throughout  the network. Column 8 contains the number of users sending traffic within a  given one-minute period. The last four columns show the application protocols  being used, namely HTTP, FTP, PNRT and DNS. In these 4 columns, ''1''  indicates that such a protocol was used during the one-minute period;  conversely, ''0'' means the protocol was not used. Application layer  protocols are considered, since they are directly associated with applications  themselves &#91;1&#93;.</p>          <p>The  protocols that produce the largest amount of traffic regardless of the data are  the following: HTTP, FTP, PNRT, DNS, SSL and ICMP; however, SSL e ICMP are not  application-layer protocols, thus we focused on the first four protocols  mentioned above. The traffic associated to these four protocols accounts for  88% of the whole traffic and their individual percentages are significant,  hence it was decided to regard this type of traffic as independent dichotomous  variables (defined in a concept framework).</p> 	       <p><b><i>Traffic model assessment</i></b></p>         <p>Once  the model was estimated, it had to be assessed; initially using 80% of the data  that served model estimation, and then using the remaining 20%. This evaluation  consisted in determining statistical indices such as adjustment quality &#91;1, 13&#93;.</p>  Finally, an estimate of  throughput mean values was given based on the proposed traffic model.      <p>&nbsp;</p>      <p><font size="3"><b>Analysis and results</b></font></p>        <p>The  result analysis was divided into six stages, namely: traffic analysis, traffic  characterization, traffic-model variables, multi-variable traffic model,  traffic-model assessment, and Throughput mean-value estimation.</p>        <p><b><i>Traffic analysis</i></b></p>        <p>Once  traffic had been captured, WireShark yielded a summary of the data (<a href="#Tabla4">table 4</a>).</p>        <p align="center"><a name="Tabla4"></a><img src="img/revistas/rfiua/n67/n67a05t04.gif" ></p>       ]]></body>
<body><![CDATA[<p>According  to the distribution of the entire flow of traffic generated by the different  protocols, it can be observed that, because of encapsulation processes, each  packet (and byte) is counted more than once, depending on the number of  protocols involved in each layer of the TCP/IP model.</p>        <p>A  packet generated from an FTP application adds not only to the FTP flow  (application layer), but also to the TCP flow (transport layer), IP flow  (network layer) and Ethernet flow (physical layer).</p>        <p>Hence,  the most relevant protocols are: HTTP, FTP, PNRT and DNS. The traffic flow from  these protocols accounts for 88% of the application- layer traffic &#91;14&#93;.</p>        <p>It is interesting to see that some applications are already  generating traffic flows using IPv6. Traffic distributions used by both IPv4  and IPv6 can be observed in <a href="#Tabla5">table 5</a>.</p>        <p align="center"><a name="Tabla5"></a><img src="img/revistas/rfiua/n67/n67a05t05.gif" ></p>          <p><b><i>Traffic characterization</i></b></p>        <p>The  traffic suggests the presence of self-similarity in the traffic that was  captured for this study, indicating that the traffic in question is correlated.</p>        <p><b><i>Traffic model variables</i></b></p>        <p>The proposed model is a multi-variable model where traffic  represents the dependent (explained) variable, whereas variables such as the number  of users, time and application protocols constitute the independent  (explanatory) variables (<a href="#Tabla6">table 6</a>).</p>        <p align="center"><a name="Tabla6"></a><img src="img/revistas/rfiua/n67/n67a05t06.gif" ></p>        ]]></body>
<body><![CDATA[<p>According  to the captured data, the dependent variable (traffic) can be measured in  either packets per second or bytes per second. In the result-analysis stage,  traffic measured in packets per second will be considered.</p>      <p><a href="#Tabla7">Table 7</a>, shows the results obtained from the correlation  analysis between each of the explanatory variables and the explained variable.</p>        <p align="center"><a name="Tabla7"></a><img src="img/revistas/rfiua/n67/n67a05t07.gif" ></p>          <p>The  results in <a href="#Tabla7">table 7</a> show percentages (decimal fractions) of how much independent  variables actually explain the dependent variable; for example, it can be said  that the number of users variable explains the variable traffic (measured in  packets per second) up to 32%.</p>       <p>The  correlation coefficients displayed in <a href="#Tabla7">table 7</a> are relatively low for an  acceptable model; however, these figures are large enough not to be negligible.  Thus it will be worth analyzing the behavior of these variables as a whole.</p>        <p><b><i>Multi-variable traffic model</i></b></p>        <p>As  explained earlier (methodology section), there is only one multi-variable model  chosen as suitable for the captured traffic data, namely the panel data model.  This model is the one that best fits our context since it permits modeling longitudinal  and cross-sectional information data. Cross-sectional means that there is a set  of data captured during at the same time, e.g. number of users and protocols.  Longitudinal means that there are various data samples along a timeline. If  such a timeline were long enough, it would be possible to apply time  multivariable models such as VAR and VARMA. However, since variable time in  this particular experiment changes on a single-minute basis for nine hours  only, the most suitable choice is the panel data model; except for the case of neural  networks, which will be reported in future papers &#91;11, 12&#93;.</p>        <p>The model to be  estimated is described by (2).</p>        <p><img src="img/revistas/rfiua/n67/n67a05e02.gif"></p>          <p>Where  Trafpaq represents traffic in packets per second, Time, Users, HTTP, FTP, PNRT  and DNS are the explanatory variables of the model; i is the variable  (sub-index) that indicates the sample set/ captured data, so i takes value from  1 to 540; &epsilon;<sub>i</sub> represents the non-observable  component of the model.</p>      ]]></body>
<body><![CDATA[<p><a href="#Tabla8">Table 8</a> shows the results from the model estimation described in ''equation  (2)'' - using Ordinary Least Squares (OLS).</p>        <p align="center"><a name="Tabla8"></a><img src="img/revistas/rfiua/n67/n67a05t08.gif" ></p>          <p>Based  on the results in <a href="#Tabla8">table 8</a>, it is possible to calculate coefficients for each of  the explanatory variables, together with their significance level and trust  interval. By analyzing the different significance levels, it can be stated that  variables HTTP and PNRT are not as significant for this model. According to the  results shown in <a href="#Tabla8">table 8</a>, the estimated model is described by (3) and the <a href="#Tabla9">table 9</a> shows the statistical criteria for this model.</p>        <p><img src="img/revistas/rfiua/n67/n67a05e03.gif"></p>        <p align="center"><a name="Tabla9"></a><img src="img/revistas/rfiua/n67/n67a05t09.gif" ></p>         <p>Considering  now the significance of each explanatory variable within the selected model,  the following step was to eliminate non-significant variables and to estimate  the model once again. In <a href="#Tabla8">table 8</a>, it can be observed that variable HTTP, as  well as variables PNRT and constant, exhibit low levels of significance within  the model; therefore these variables were discarded as negligible. <a href="#Tabla10">Table 10</a>  shows the results obtained from estimating the selected model without variables  HTTP, PNRT, and constant.</p>        <p align="center"><a name="Tabla10"></a><img src="img/revistas/rfiua/n67/n67a05t10.gif" ></p>        <p>Based  on the results shown in <a href="#Tabla10">table 10</a>, it is possible to determine the coefficient  of all explanatory variables, as well as their significance levels and trust  interval. By analysing significance levels, it can be stated that all the  included variables are significant in the model. According to the results shown  in <a href="#Tabla10">table 10</a>, the estimated model corresponds to the description provided by  (4), the final model.</p>        <p><img src="img/revistas/rfiua/n67/n67a05e04.gif"></p>        <p><b><i>Traffic model assessment</i></b></p>        ]]></body>
<body><![CDATA[<p>Model  assessment was conducted in two stages. The first stage deals with an ex-ante  assessment, where only 80% of the captured data were considered; these are the  same data that served model estimation. <a href="#Tabla11">Table 11</a> shows the results obtained  when applying the same statistical criteria (considered in table 9) on these  data.</p>        <p align="center"><a name="Tabla11"></a><img src="img/revistas/rfiua/n67/n67a05t11.gif" ></p>        <p>The  second stage corresponds to an ex-post assessment, where only the remaining 20%  of captured data were considered. These data were not involved in model  estimation so as to clearly determine the model's capacity to predict future  traffic values. Likewise, <a href="#Tabla12">table 12</a> shows the results obtained when applying the  same statistical criteria on these data.</p>        <p align="center"><a name="Tabla12"></a><img src="img/revistas/rfiua/n67/n67a05t12.gif" ></p>        <p>As  shown in <a href="#Tabla11">tables 11</a> and <a href="#Tabla12">12</a>, fair comparison parameters are goodness of fit and  adjustment quality since these parameters are weighted by the number of samples  available, whereas the remaining parameter exhibits significant variations  depending on the number of samples (amount of data).</p>        <p><b><i>Throughput mean value estimation</i></b></p>        <p>According  to the multi-variable traffic model already built and described in (4),  Throughput mean values can be estimated; to do so, it is only necessary to  define a time period in which a particular mean value is to be calculated, then  add all traffic values obtained during the same period (in packets per second),  and divide this sum by the number of data obtained using the model. The  equation (5) summarizes the whole process &#91;15&#93;.</p>        <p><img src="img/revistas/rfiua/n67/n67a05e05.gif"></p>        <p>In  equation (5), i represent a value index of each explanatory (independent)  variable.</p>        <p><b><i>Comparison with ARIMA model</i></b></p>          ]]></body>
<body><![CDATA[<p>For  an even more objective result, it was decided to compare the multivariate model  developed with a time series model as ARIMA. To develop the ARIMA model was  used Box Jenkins methodology. After performing the corresponding correlograms,  the results suggested using an AR (2) and MA (10), from here and after four  iterations was obtained performing an ARIMA (1,1,10) described by equation (6).</p>        <p><img src="img/revistas/rfiua/n67/n67a05e06.gif"></p>        <p><a href="#Tabla13">Tables 13</a> and <a href="#Tabla14">14</a> show the results of the ex-ante and ex-post, following the same  methodology used above, these results can be compared with those in tables <a href="#Tabla11">11</a>  and <a href="#Tabla12">12</a>.</p>        <p align="center"><a name="Tabla13"></a><img src="img/revistas/rfiua/n67/n67a05t13.gif" ></p>      <p align="center"><a name="Tabla14"></a><img src="img/revistas/rfiua/n67/n67a05t14.gif" ></p>        <p>A  comparison of the results in <a href="#Tabla13">tables 13</a> and <a href="#Tabla14">14</a>, shows a better performance of  the models based on time series regarding multivariate linear models, this  performance is about 43% better.</p>      <p>&nbsp;</p>     <p><font size="3"><b>Conclusions</b> </font></p>         <p>The  multi-variable traffic model presented permits analyzing throughput mean values  at reliable levels; however, the model is unable to produce accurate  predictions of future traffic values for data outside the selected estimation  data set.</p>        <p>Although  it was clear from the results that a large percentage of the generated traffic  was associated to HTTP and PNRT, the impact of these two protocols was not as  significant within the model itself. This might be explained by considering  that protocol HTTP is very often present in the generation of current Internet  traffic and also that most applications use P2P in the case of PNRT.</p>        ]]></body>
<body><![CDATA[<p>After  plotting the traffic generated by the Wi- Fi network using different time  scales, - both in packets per second and in bytes per second - it was clear  that self-similarity patterns were present in each representation. This  reinforces the ideas found in current studies about modern traffic  characterization.</p>        <p>Although  both the traffic measured in packets per second and the traffic measured in  bytes per second are relatively important when planning and controlling data  networks, the first sort of units (packet per second) adjust better to  explanatory variables than the latter.</p>        <p>There  are some of the disadvantages to the multi&shy;variable traffic models such as the  one presented in this study, particularly when estimating the model itself;  namely determining independent variables, which are not easy to model. This  suggests that there is a comprehensive field of research topics that need to be  studied regarding traffic models. The results of the present study demonstrate  how important it is to use correlated models when modeling Internet traffic on  a wireless data network.</p>          <p>&nbsp;</p>        <p><font size="3"><b>References</b> </font></p>       <!-- ref --><p>1. C.  Hern&aacute;ndez, O. Salcedo, A. Escobar. ''An ARIMA model for forecasting Wi-Fi data networks  traffic values''. <i>Revista Ingenier&iacute;a e Investigacion</i>. Vol. 29.  2009. pp. 65-69.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000128&pid=S0120-6230201300020000500001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>        <!-- ref --><p>2. M. Alzate. ''Modelos  de tr&aacute;fico en an&aacute;lisis y control de redes de Comunicaciones''. <i>Colombia  Ingenier&iacute;a</i>.  Vol. 9. 2004. pp. 63-87.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000130&pid=S0120-6230201300020000500002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>        <!-- ref --><p>3. M. Tiep, G. Bidisha, W.  Simon. ''Multivariate short- term traffic flow forecasting using Bayesian  vector autoregressive moving average model''. <i>Transportation  Research Board</i>.  Vol. 12. 2012. pp. 16.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000132&pid=S0120-6230201300020000500003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>4. M.  Papadopouli, H. Shen, E. Raftopuulos, M. Ploumidis, F. Hern&aacute;ndez. <i>Short-term traffic  forecasting in a campus-wide g&iacute;reles network</i>. in IEEE 16<sup>th</sup>  International Symposium on Personal, Indoor and Mobile Radio Communications.  Berlin, Germany. 2005. pp. 1446-1452&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000134&pid=S0120-6230201300020000500004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p>5. D. Mark, R. McDonald, R.  Antoon.  <i>Aspectos Basicos de Networking</i>. Ed. Cisco Press. Madrid, Espa&ntilde;a. 2008. pp. 606.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000135&pid=S0120-6230201300020000500005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>        <!-- ref --><p>6. P. Fierens. <i>Introducci&oacute;n a  las Redes Wi-Fi</i>. Instituto Tecnol&oacute;gico de Buenos Aires. Bolet&iacute;n electr&oacute;nico: Comisi&oacute;n  Intramericana de Telecomunicaciones. No. 14. Agosto. 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000137&pid=S0120-6230201300020000500006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>7. N. Torres,  L. Pedraza, C. Hern&aacute;ndez. ''Redes neuronales y predicci&oacute;n de tr&aacute;fico''. <i>Tecnura</i>. Vol. 15. 2011. pp. 90-97.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000139&pid=S0120-6230201300020000500007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>8. J. Sa Silva,  R. Ruivo, T. Camilo. <i>IP in wireless sensor networks Issues and lessons learnt</i>. In Proceedings of the 3<sup>rd</sup>  International Conference on Communication Systems Software and Middleware and  Workshops. Bangalore, India. 2008. pp. 496-502.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000141&pid=S0120-6230201300020000500008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>        ]]></body>
<body><![CDATA[<!-- ref --><p>9. A. Feria. <i>Modelo OSI</i>. Ed. El Cid  Editor. Santa  Fe, Argentina. 2009. pp. 14.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000143&pid=S0120-6230201300020000500009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>10. G. Box, G.  Jenkins, G. Reinsel. ''Forecasting and Control''. <i>Time Series  Analysis</i>.  3<sup>rd</sup> ed. Ed. Prentice- Hall. Englewood Cliffs. San Francisco, USA.  pp. 75. 1994.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000145&pid=S0120-6230201300020000500010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>11. Y. Chia, J. Shyu.  ''Applying multivariate time series models to technological product sales  forecasting''. <i>International Journal of Technology Management</i>. Vol. 27. 2004. pp. 306-319.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000147&pid=S0120-6230201300020000500011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>12. M. Ari&ntilde;o, P. Franses.  ''Forecasting the levels of vector autoregressive log-transformed time  series''. <i>International Journal of Forecasting</i>. Vol. 16. 1999. pp. 111-116.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000149&pid=S0120-6230201300020000500012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>13. J. Carroll, C. Hern&aacute;ndez. ''Comparaci&oacute;n  del modelo FARIMA y SFARIMA para obtener la mejor estimaci&oacute;n del tr&aacute;fico en una  red Wi-Fi''. <i>Tecnura</i>. Vol. 16. 2012. pp. 84-90.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000151&pid=S0120-6230201300020000500013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        ]]></body>
<body><![CDATA[<!-- ref --><p>14. A.  Dainotti, A. Pescap&eacute;, P. Rossi, F. Palmieri, G. Ventre. ''Internet traffic  modeling by means of Hidden Markov Models''. <i>Computer  Networks</i>.  Vol. 52. 2008. pp. 2645-2662.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000153&pid=S0120-6230201300020000500014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>        <!-- ref --><p>15. K. Balaji. <i>Forecasting  models and adaptive quantized bandwidth provisioning for nonstationary network  traffic</i>.  PhD. Dissertation. University of Missouri. Kansas City, United States. 2006.  pp. 173.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000155&pid=S0120-6230201300020000500015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>          <p>&nbsp;</p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Salcedo]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Escobar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[''An ARIMA model for forecasting Wi-Fi data networks traffic values'']]></article-title>
<source><![CDATA[Revista Ingeniería e Investigacion]]></source>
<year>2009</year>
<volume>29</volume>
<page-range>65-69</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alzate]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[''Modelos de tráfico en análisis y control de redes de Comunicaciones'']]></article-title>
<source><![CDATA[Colombia Ingeniería]]></source>
<year>2004</year>
<volume>9</volume>
<page-range>63-87</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tiep]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bidisha]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[''Multivariate short- term traffic flow forecasting using Bayesian vector autoregressive moving average model'']]></article-title>
<source><![CDATA[Transportation Research Board]]></source>
<year>2012</year>
<volume>12</volume>
<page-range>16</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Papadopouli]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Raftopuulos]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ploumidis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Short-term traffic forecasting in a campus-wide gíreles network]]></source>
<year>2005</year>
<page-range>1446-1452</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mark]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Antoon]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Aspectos Basicos de Networking]]></source>
<year>2008</year>
<page-range>606</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Ed. Cisco Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fierens]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introducción a las Redes Wi-Fi]]></source>
<year>2005</year>
<volume>14</volume>
<publisher-name><![CDATA[Instituto Tecnológico de Buenos Aires]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Pedraza]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[''Redes neuronales y predicción de tráfico'']]></article-title>
<source><![CDATA[Tecnura]]></source>
<year>2011</year>
<volume>15</volume>
<page-range>90-97</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sa Silva]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruivo]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Camilo]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[IP in wireless sensor networks Issues and lessons learnt]]></source>
<year>2008</year>
<page-range>496-502</page-range><publisher-loc><![CDATA[Bangalore ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B9">
<label>9.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Feria]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modelo OSI]]></source>
<year>2009</year>
<page-range>14</page-range><publisher-loc><![CDATA[Santa Fe ]]></publisher-loc>
<publisher-name><![CDATA[Ed. El Cid Editor]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Box]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Reinsel]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[''Forecasting and Control'': Time Series Analysis]]></source>
<year>1994</year>
<edition>3</edition>
<page-range>75</page-range><publisher-loc><![CDATA[San Francisco ]]></publisher-loc>
<publisher-name><![CDATA[Ed. Prentice- Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chia]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Shyu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[''Applying multivariate time series models to technological product sales forecasting'']]></article-title>
<source><![CDATA[International Journal of Technology Management]]></source>
<year>2004</year>
<volume>27</volume>
<page-range>306-319</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ariño]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Franses]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[''Forecasting the levels of vector autoregressive log-transformed time series'']]></article-title>
<source><![CDATA[International Journal of Forecasting]]></source>
<year>1999</year>
<volume>16</volume>
<page-range>111-116</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carroll]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="es"><![CDATA[''Comparación del modelo FARIMA y SFARIMA para obtener la mejor estimación del tráfico en una red Wi-Fi'']]></article-title>
<source><![CDATA[Tecnura]]></source>
<year>2012</year>
<volume>16</volume>
<page-range>84-90</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dainotti]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pescapé]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Palmieri]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ventre]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[''Internet traffic modeling by means of Hidden Markov Models'']]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2008</year>
<volume>52</volume>
<page-range>2645-2662</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balaji]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Forecasting models and adaptive quantized bandwidth provisioning for nonstationary network traffic]]></source>
<year>2006</year>
<page-range>173</page-range><publisher-loc><![CDATA[Kansas City ]]></publisher-loc>
<publisher-name><![CDATA[University of Missouri]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
