An Embedded Network Simulator to

نویسنده

  • Luigi Rizzo
چکیده

The development of network protocols, especially if designed for use in very large scale networks, generally requires extensive simulation and tests in operational environments to assess their performance and correctness. Both approaches have limitations: simulation because of possible lack of accuracy in modeling the system (and, especially, traf-c generators), tests in operating networks because of the diiculty of setting up and controlling the experimental testbed. In this paper we propose to embed network simulators in operational systems , so as to get the advantages of both simulators and real testbeds. Such simulators can be built with minimal modiications to existing protocol stacks. They work by intercepting communications of the protocol layer under test and simulating the eeects of nite queues, bandwidth limitations, communication delays, noisy channels. As a result, experiments can be run on a standalone system, while simulating arbitrarily complex networks. Thanks to the ability of using real traac generators and protocol implementations, doing experiments becomes as simple as running the desired set of applications on a workstation. An implementation of such a simulator, targeted to TCP and compatible with BSD-derived systems, is available from the author.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Propagation Model Embedded In A Wireless Network Simulator

A propagation model has been added to the network simulator ns to achieve more accurate physical layer simulation. The model includes the capability to predict signal strength in the face of obstacles and varied terrain.

متن کامل

The efficiency of Artificial Neural Network, Neuro-Fuzzy and Multivariate Regression models for runoff and erosion simulation using rainfall simulator

1- INTRODUCTION According to the complexity of environmental factors related to erosion and runoff, correct simulation of these variables find importance under rain intensity domain of watershed areas.  Although modeling of erosion and runoff by Artificial Neural Network and Neuro-Fuzzy based on rainfall-runoff and discharge-sediment models were widely applied by researchers, scrutinizing Arti...

متن کامل

Comparative study of computer simulation softwares

One of the methods for analyzing systems is simulation. Network simulation is a technique that models the behavior of the network by performing transaction calculations between different network entities and using mathematical formulas and taking observations from network products. A network simulator is a piece of software or hardware that predicts the behavior of a computer network without a ...

متن کامل

Dynamic Evaluation of Server Placement within a Network Design Tool by using an Embedded Monte Carlo Simulator

This article presents a Monte Carlo simulator (MCS), which is embedded within iCAD, which is a design and analysis tool that concurrently synthesizes network topology, server placement, and file allocation for application-specific networks. We formulated the three problems as a single optimization problem, where the objective is to minimize the design cost, subject to the satisfactions of the d...

متن کامل

Real-time Scheduling of a Flexible Manufacturing System using a Two-phase Machine Learning Algorithm

The static and analytic scheduling approach is very difficult to follow and is not always applicable in real-time. Most of the scheduling algorithms are designed to be established in offline environment. However, we are challenged with three characteristics in real cases: First, problem data of jobs are not known in advance. Second, most of the shop’s parameters tend to be stochastic. Third, th...

متن کامل

Steganalysis of embedding in difference of image pixel pairs by neural network

In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997