Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessStop Using Elaborate Personas: Research Shows They Degrade Claude Code OutputDEV CommunityAn Engineering-grade breakdown of RAG PipelineDEV CommunityUnlock the Power of Private AI: Build a Local RAG Pipeline with LangGraph, Ollama & Vector DatabasesDEV CommunityDeepSource for Python: Static Analysis and AutofixDEV CommunityI tried to destroy this AirTag alternative, but it wouldn't crack - unlike othersZDNet AIHow I built an AI that reads bank contracts the way bankers do (not the way customers do)DEV CommunityBuffer Overflows on x64 Windows: A Practical Beginners Guide (Part 2): ExploitationDEV CommunityImplementing Zero Trust Architecture in IoT-Heavy Enterprise NetworksDEV CommunityTransforming Raspberry Pi into an AI-Native Edge IDS for SMBsDEV CommunityWhich countries use ChatGPT the most? New study reveals top 5 - Deseret NewsGoogle News: ChatGPTThe Stages of AI GriefDEV CommunityImplementing Zero Trust Architecture for Unmanaged IoT at the Network EdgeDEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessStop Using Elaborate Personas: Research Shows They Degrade Claude Code OutputDEV CommunityAn Engineering-grade breakdown of RAG PipelineDEV CommunityUnlock the Power of Private AI: Build a Local RAG Pipeline with LangGraph, Ollama & Vector DatabasesDEV CommunityDeepSource for Python: Static Analysis and AutofixDEV CommunityI tried to destroy this AirTag alternative, but it wouldn't crack - unlike othersZDNet AIHow I built an AI that reads bank contracts the way bankers do (not the way customers do)DEV CommunityBuffer Overflows on x64 Windows: A Practical Beginners Guide (Part 2): ExploitationDEV CommunityImplementing Zero Trust Architecture in IoT-Heavy Enterprise NetworksDEV CommunityTransforming Raspberry Pi into an AI-Native Edge IDS for SMBsDEV CommunityWhich countries use ChatGPT the most? New study reveals top 5 - Deseret NewsGoogle News: ChatGPTThe Stages of AI GriefDEV CommunityImplementing Zero Trust Architecture for Unmanaged IoT at the Network EdgeDEV Community

From Simulation to Deep Learning: Survey on Network Performance Modeling Approaches

arXivMarch 31, 202610 min read0 views
Source Quiz

arXiv:2603.28394v1 Announce Type: cross Abstract: Network performance modeling is a field that predates early computer networks and the beginning of the Internet. It aims to predict the traffic performance of packet flows in a given network. Its applications range from network planning and troubleshooting to feeding information to network controllers for configuration optimization. Traditional network performance modeling has relied heavily on Discrete Event Simulation (DES) and analytical methods grounded in mathematical theories such as Queuing Theory and Network Calculus. However, as of lat — Carlos G\"uemes-Palau, Miquel Ferriol-Galm\'es, Jordi Paillisse-Vilanova, Pere Barlet-Ros, Albert Cabellos-Aparicio

View PDF HTML (experimental)

Abstract:Network performance modeling is a field that predates early computer networks and the beginning of the Internet. It aims to predict the traffic performance of packet flows in a given network. Its applications range from network planning and troubleshooting to feeding information to network controllers for configuration optimization. Traditional network performance modeling has relied heavily on Discrete Event Simulation (DES) and analytical methods grounded in mathematical theories such as Queuing Theory and Network Calculus. However, as of late, we have observed a paradigm shift, with attempts to obtain efficient Parallel DES, the surge of Machine Learning models, and their integration with other methodologies in hybrid approaches. This has resulted in a great variety of modeling approaches, each with its strengths and often tailored to specific scenarios or requirements. In this paper, we comprehensively survey the relevant network performance modeling approaches for wired networks over the last decades. With this understanding, we also define a taxonomy of approaches, summarizing our understanding of the state-of-the-art and how both technology and the concerns of the research community evolve over time. Finally, we also consider how these models are evaluated, how their different nature results in different evaluation requirements and goals, and how this may complicate their comparison.

Comments: Preprint, final accepted version published on Computer Networks (DOI: https://doi.org/10.1016/j.comnet.2026.112253). 87 pages, 3 figures

Subjects:

Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

Cite as: arXiv:2603.28394 [cs.NI]

(or arXiv:2603.28394v1 [cs.NI] for this version)

https://doi.org/10.48550/arXiv.2603.28394

arXiv-issued DOI via DataCite (pending registration)

Related DOI:

https://doi.org/10.1016/j.comnet.2026.112253

DOI(s) linking to related resources

Submission history

From: Carlos Güemes Palau [view email] [v1] Mon, 30 Mar 2026 13:03:19 UTC (236 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
From Simula…researchpaperarxivaiartificial-…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 174 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers