Integrated Fluid and Packet Network Simulations

نویسندگان

  • George F. Riley
  • Talal M. Jaafar
  • Richard M. Fujimoto
چکیده

A number of methods exist that can be used to create simulation models for measuring the performance of computer networks. The most commonly used method is packet level simulation, which models the detailed behavior of every packet in the network, and results in a highly accurate picture of overall network behavior. A less frequently used, but sometimes more computationally efficient, method is the fluid model approach. In this method, aggregations of flows are modeled as fluid flowing through pipes, and queues are modeled as fixed capacity buckets. The buckets are connected via pipes, where the maximum allowable flow rate of fluid in the pipes represents the bandwidth of the communication links being modeled. Fluid models generally result in a less accurate picture of the network’s behavior since they rely on aggregation of flows and ignore actions specific to individual flows. We introduce a new hybrid simulation environment that leverages the strong points of each of these two modeling methods. Our hybrid method uses fluid models to represent aggregations of flows for which less detail is required, and packet models to represent individual flows for which more detail is needed. The result is a computationally efficient simulation model that results in a high level of accuracy and detail in some of the flows, while abstracting away details of other flows. We show a computational speedup of more than twenty in some cases, with little reduction in accuracy of the simulation results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Parallel Hybrid Network Traffic Models

Fluid-based network traffic models are attractive due to their execution efficiency. They run much faster than the corresponding discrete-event packet-oriented simulation, especially when we study the aggregate traffic behavior of large-scale network scenarios. The efficiency, however, comes at a cost—fluid modeling does not include packet-level details. The ability to accurately capture the in...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Integrated Admission Control for Streaming and Elastic Traffic

It is proposed to apply an integrated admission control scheme to both streaming flows and elastic flows. It is assumed that streaming flow packets are served with priority in network queues so that admission control ensures minimal delay for audio and video applications while preserving the throughput of document transfers. An implicit measurementbased implementation is proposed where admissib...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

Multimedia Network Simulation with a Fluid Flow Model

This work presents the modeling and design of a multimedia network simulation tool based on the fluid flow model. The tool uses continuous fluid flows instead of individual packets for network simulation and proposes their use to model multimedia network traffic. The main goal of the simulation using this approach is to produce a fewer number of events to reduce computational costs for large an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002