A Visualized Parallel Network Simulator for Modeling Large-scale Distributed Applications
|
|
- Charleen Walker
- 5 years ago
- Views:
Transcription
1 Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies A Visualized Parallel Network Simulator for Modeling Large-scale Distributed Applications Siming Lin 1,2, Xueqi Cheng 1 and Jianming Lv 1,2 1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2. Graduate School of the Chinese Academy of Sciences, Beijing {linsiming, lujianming}@software.ict.ac.cn, cxq@ict.ac.cn Abstract Large-scale distributed systems, with thousands or even millions of nodes, produce complex and dynamic behaviors. Packet-level simulation is necessary to test and analyze these systems, such as grids, peer-to-peer (P2P) applications as well as worm and DDoS containment systems. However, the current network simulators are not convenient for application layer simulation. We present the NSME, a visualized parallel simulator that allows researchers to simulate their applications in a large virtual network with most details transparent to them. A hierarchical routing is used to enhance the fidelity of simulation and reduce the memory cost of network construction. A variation of CMB algorithm is implemented for parallel synchronization. We show the functions of NSME by three applications: 1) a self-similar background traffic model, 2) a Slammer worm spreading model, and 3) a P2P live streaming system, which demonstrate its effectiveness for simulating any large-scale distributed applications. The performance tests show that the memory cost of NSME is distinctly lower than NS2 and the parallel efficiency can reach about 60% in any of the above applications. 1. Introduction Grids and peer-to-peer (P2P) applications have become successful paradigms of distributed computing. On the other hand, as a special type of distributed systems, worm and DDoS attacks have become serious threats to the Internet. These systems are usually very large, and their behaviors are very complex and dynamic, which makes it unpractical to directly analyze or test their efficacy on the Internet. Packet-level network simulation is an available and low-cost approach to reach this goal. Through objectoriented programming, each host, router, link and packet are simulated independently, which makes them have their own attributes and interactive behaviors. By constructing realistic topologies and implementing necessary protocols, approximately real behaviors and data can be produced in a simulation system. At present, some well known network simulators, such as NS2 [1], OPNET [2] and GTNetS [3], have been proposed. However, these simulators are originally designed for communication protocols testing, such as MPLS, IP routing and TCP/IP. They are not convenient for application layer simulation, since they mostly focus on the details of lower layers of the network so that the functions of application layer are greatly simplified. In addition, these simulators are difficult to use for the researchers working with distributed applications. To configurate a simulation task, they have to know well the details of lower layers, simulation parameters, and even parallel computing, which is excessive to such researchers. In this paper, we propose a visualized parallel simulator NSME for dedicated simulation of largescale distributed applications. In our previous work [4], a sequential version was developed as Network Security Modeling Environment based on NS2. We keep its name for unification, but entirely redesigned its architecture. Now, it consists of two parts. One is a GUI management tool, XNSME, used to construct network topologies, deploy virtual applications, configurate simulation tasks, and review data traces. The other is a parallel simulation development kit, LibNSME, which is a C++ static library provided to researchers for virtual network programming. The LibNSME is also a core to construct the parallel simulation engine, which is totally transparent to researchers. The main features of NSME include: 1) application layer oriented simulation, 2) Internet hierarchical routing, 3) large-scale network topologies, 4) transparent parallel characteristics, and 5) visualized simulation management. We will illustrate its effectiveness by simulating three distributed applications. The performance evaluation shows the /07 $ IEEE DOI /
2 memory cost of the NSME is evidently lower than NS2, and the parallel efficiency of the above simulation instances can reach about 60%. The remainder of this paper is organized as follows. Section 2 provides related work. Section 3 describes the architecture of NSME. Section 4 describes the implementation in detail. Section 5 demonstrates three NSME simulation instances. Section 6 evaluates the performance. Section 7 gives some conclusions and future directions. 2. Related work There are many different simulators developed for network research. Most of them are based on the principle of discrete-event simulation. One of the well known commercial simulators is the OPNET. It has an abundant network component library and a visualized environment. However it is expensive. One of the widely used simulators is NS2 developed at UC Berkeley. It is a typical packet-level network simulator implemented in C++. It meanwhile is designed as an Otcl language parser. The new modules, so-called agents, can be described using both C++ and Otcl. Although NS2 is widely adopted, there are some limitations on it. First, it does not have the functions related with real IP addresses. Second, its agent mechanism makes it inconvenient to configure a simulation task, such as the TCP connection behaviors. The above simulators can only simulate the networks composed by thousands of nodes. In addition, since they are both sequential programs, the performance of simulation is deeply limited. Parallel and distributed network simulation has been studied for many years. Fujimoto, Riley and their team at Georgia Tech are contributive to the research of parallel discrete-event simulation [3, 5, 6]. They developed an extensive parallel library, libsynk. Based on it, they built a parallel simulator GTNetS. Furthermore, by adding this library, they extended a parallel version of NS2, called PDNS. However, to the best of our knowledge, the automatic configuration for task mapping is still deficient in it. The GloMoSim [7] is another well known parallel simulator developed by Lokesh Bajaj, Mineo Takai and their team at UCLA. Different from the above simulators, it was designed for simulation of large hybrid networks including wireless, wired, and satellite based communications. Unfortunately, there are very few tools convenient for the simulation of distributed applications. The grid researchers realized the situation and designed some grid simulators. The SimGrid [8], developed at UCSD, Task management / mapping is a tool for the simulation of application and resource scheduling. The MicroGrid [9] is an emulator for modeling virtual grid environment, on which the grid applications using Globus middleware can be executed. However, these toolkits are not universal for any other distributed applications. Also, their capability of simulating large networks is limited. 3. Architecture 3.1. Overview Graphic User Interface Log files Dump files Log files Dump files Log files Dump files Parallel synchronizations Review / data collection SimEngine SimEngine SimEngine Figure 1. NSME Architecture The NSME is designed for universal packet-level simulation of large-scale distributed applications. Its two-layer architecture is shown in Figure 1. The function of its upper layer is global management of simulation tasks, and the function of lower layer is the execution of actual simulation. More precisely, the global management includes constructing virtual network topologies, deploying virtual applications, partitioning/mapping subtasks for parallel execution, configurating data traces, and reviewing the data produced during simulation. We have developed a graphic user interface, XNSME, to integrate these management functions. In the lower layer, the actual simulation is undertaken by parallel engines, which are synchronized by certain conservative algorithms [6]. The NSME provide such parallel engines by a Visual C++ static library, LibNSME, whose details of implementation are transparent to the users. In their view, the LibNSME is only a programming interface to develop virtual applications. In addition, the NSME has extensive capability of data tracing. It can trace not only the normal statistics, such as link bandwidth, lost rate, and host state, but also the detailed packet loads in tcpdump format [4]. 340
3 (a) Inter-AS level (b) Inter-Area level (c) Intra-Area level Figure 2. The snapshots of the NSME network topology 3.2. Application layer oriented virtualization In the simulation space modeled by the NSME, there are two levels of virtualization, the virtual network infrastructure and the virtual applications. To researchers on distributed applications, the network infrastructure is usually expected to be a black-box. We have encapsulated most of the basic behaviors of lower layers of the network. We model hierarchical routing mechanism for such virtual network, which makes it homologous with the real Internet. A virtual network is also composed by Autonomous Systems (AS), and in each AS, multi-areas OSPF routing is employed at present, which means each AS consists of many OSPF areas. Consequently, there are three types of virtual routers, AS Border Routers (ASBR), Area Border Routers (ABR) and Internal Routers (IR). We also model the behaviors of virtual LANs and hosts. A virtual LAN is an abstract object that denotes a subnet segment. It consists of virtual hosts that share a virtual broadcast link. A virtual LAN can be connected to an IR by appointing its default gateway. Figure 2 shows the snapshots of a virtual network instance. Although the topology of a virtual network is complex, its configuration is quite simple. With the visualized tool XNSME, a virtual network can be constructed rapidly. The only parameters that need to be set are the bandwidth and delay of a link or a LAN. The IP addresses of each router interface and host will be automatically assigned. A virtual host can be treated as a virtual computer with a simple operating system installed. Each virtual application can be defined as a C++ class derived from the base class CApplication which provides some basic member functions, such as entry function (main), timer and pseudorandom number generator. We implement a dynamic TCP/IP protocol stack for each virtual host. Based on this, the LibNSME provides a set of socket base classes for virtual network programming, such as CRawSocket, CUDPSocket and CTCPSocket. They are very similar with the base class CAsyncSocket in Visual C++ MFC. Based on these socket classes, the requirements for developing virtual network programs with TCP, UDP or even raw IP communication can be satisfied. The virtualization of network applications makes the programming style in the NSME the same as that in the real world except the socket APIs, which means when the researchers are developing a prototype system they do not have to care where their system will be deployed. They are kept away from the excessive details of simulation Visualized Management Although the OPNET is a visualized simulator, it can only simulate a small or medium network. There are very few simulators providing an effective GUI. It is because a large topology with more than thousands of nodes is difficult to display on screen. Moreover, a simulation task is traditionally configured by certain script languages, which is a flexible but inefficient method. We solve the above two problems by using hierarchical display and object-oriented component library. Hierarchical display: Corresponding to the organization of virtual network, the display is defined in three levels, inter-as, inter-area and intra-area. (See Figure 2) Object-oriented component library: We define all visualized components, such as routers, links, LANs, OSPF areas and ASs, in object-oriented way. Basically, there are two types of component classes, statistics classes and sample classes. A statistics class allows including statistical behaviors and attributes, such as the class name, bandwidth, delay, or number and degree distribution of its member classes. A sample class can be automatically generated by the former in terms of its statistical information. By 341
4 can be assigned with IP addresses that have the same prefixion. In each virtual host, a mini TCP/IP protocol stack is designed elaborately, which allows a virtual program to access the underlying network transparently and dynamically. Its details are shown in Figure Task Mapping Figure 3. The graphic user interface combination and reusing of sample classes, a large virtual network can be constructed rapidly. Figure 3 shows the GUI of the XNSME. There are some other functions provided by it. Deployment of virtual applications: With a given probability, each virtual host can be assigned a virtual task ID, which is corresponding to a set of virtual applications implemented with the LibNSME. Task mapping: The XNSME adopts the METIS tool [10] to partition a given virtual network. It then generates the corresponding profiles to each computer that will execute this simulation. Review of data traces: The data traces can be reviewed in graphs when a simulation finishes. The tcpdump files generated by simulation can be further analyzed by other professional tools, such as Ethereal. 4. Implementation 4.1. Routing and TCP/IP protocol stack We implemented a hierarchical routing mechanism to forward virtual packets. In each normal OSPF area, there are many IRs, several ABRs or even ASBRs. A shortest path first (SPF) algorithm is used for computing the routes between them. All ABRs in an AS make up of a bone area (Area 0) for forwarding packets between different normal areas. Similarly, all ASs in the whole virtual network are connected by the ASBRs. A SPF based configurable BGP routing has been implemented. In each virtual router, a radix tree route table, the popular structure in real routers, has been implemented, which makes it capable of assigning real IP addresses in our virtual network. For reducing the size of route table in each ASBR or ABR, our implementation supports route summary in BGP and OSPF. Each router and host in the same AS or Area For improving the parallel performance, load balance have to be taken into account. More precisely, a simulation task should be mapped into many subtasks. Since the load of simulation is correlative with the traffic of the simulated network, a popular approach of task mapping is to partition such network topology into N subnets and to simulate them with different computers (or logical progresses, LPs) in parallel. With an assumption that the load on each virtual node is approximately equal, a partitioning algorithm should be capable of dividing a graph into N almost equal-size subgraphs such that the sum of the weight of the edges connecting nodes in different subgraphs is minimized. Considering the bandwidth of a virtual link can reflect the maximal amount of the events that need to be handled in one second of simulation time, and the delay of a virtual link can affect the value of lookahead of the synchronization algorithm, we define the weight of a virtual link as follows: α bandwidth weight =, where α and β are the β delay adjustment factors. Based on the definition of weight, we partition a simulation task with a graph partitioning tool, the virtual application layer virtual socket layer create TCP socket TCP listen tcp socket UDP socket raw socket socket tcp socket out_point udp_demuxer dport_bbtree icmp_handler ip_local_deliver tcp_demuxer sip_bbtree 7240 sport_bbtree dport_bbtree rawip_filter in_point Figure 4. NSME protocol stack 342
5 METIS [10]. The number of subtasks is decided by the list of real IP addresses of the computers undertaking this simulation. The remote virtual links between different computers can be configured automatically Parallel scheduling and synchronization To guarantee logical validity, all events should be scheduled according to their temporal order. For a sequential simulation, a non-descending local event list (LEL) is competent. However, for a parallel one, the synchronization of virtual time among the LEL and other external event lists (EEL) has to be considered. There are two types of synchronization algorithms, conservative and optimistic. The former guarantees the correct temporal order of events by asynchronous or synchronous negotiation, such as CMB algorithm [6]. The latter aggressively advances simulation time until receiving events with incorrect timestamps, and then invokes a serial of rollback operations. Considering the cost of rollback operations in optimistic method, we implemented a variation of CMB algorithm which uses null messages to avoid dead lock. The CMB is very simple, however, the number of null messages exchanging among different LPs is excessive, which greatly reduces the effective utilization rate of I/O and CPU. To reduce the number of null message, in our algorithm, any LP does not send a null message to one of its neighbors unless it is blocked or its local virtual clock is greater than the expected time of the neighbor. Each expected time can be updated independently when receiving any null or event messages from the corresponding neighbor. Each LP computes expected time T e for each its neighbor according to the following equation: () i Te = min{ f ( LEL),min{ f ( EELi)}} lookaheadi where function f gets the minimal timestamp of an event list. If the event list is empty, f returns the halt time. The value of lookahead i is equal the delay of the virtual link from the neighbor i. 5. Modeling distributed applications 5.1. Modeling the network topology Before simulating these different applications, we construct a virtual Internet. All virtual applications presented in this section will run on it. With the visualized tool XNSME, we construct a campus network, a benchmark topology mentioned in [11], as a normal OSPF area with one ABR assigned in it. We extend the number of hosts in each LAN in such an area, and then construct an AS consisting of 12 such areas. Finally, a virtual Internet is generated with 10 such ASs. There are total 3600 routers and active hosts. For convenient description, the bandwidth and delay of all inter-as links are set as 10Gbps and 1ms respectively, those of inter-area and intra-area links are 1Gbps and 1ms. The bandwidth and delay of each LAN are 100Mbps and 0.5ms. It is important to note that the NSME is capable of constructing any scale of virtual networks with the combination of three routing granularities. The memory cost to maintain a virtual network will be discussed in section Modeling the self-similar traffic For convictively simulate distributed applications, it is necessary to accurately simulate the background traffic. There are many researches on the modeling of network traffic. It is well known that the network traffic is self-similar and a large number of ON/OFF traffic generators with heavy-tailed distribution can synthesize such traffic [12]. The heavy-tailed distribution can be defined as P[ X > x] x α, as x, 0< α < 2. The Pareto distribution is a typical heavy-tailed distribution. Its cumulative distribution function is F( x) = P[ X x] = 1 ( k/ x) α To each generator, there are iterative two periods, ON or OFF. It sends packets at fixed bit rate in the ON period, and sleeps in the OFF period. The ON and OFF periods have independent Pareto distributions. The degree of self-similarity they can generate is described by Hurst parameter H. H = (3 min{ α1, α2}) / 2, where α 1 and α 2 are heavy tail parameters of the ON and OFF periods. We programmed a virtual application to undertake the function of an ON/OFF generator. It uses a raw socket to send packets in the ON periods, with the destination IP addresses and ports randomly assigned. We deploy the application on each virtual host. The simulated traffic on a certain Inter-Area link is shown in Figure 5 (a). It is very similar with the real traffic, captured from CAIDA [13], shown in Figure 5 (b) Modeling the spread of the Slammer worm The simulation of worm behavior is helpful for developing corresponding countermeasures. We used NSME to simulate the Slammer worm that has a very fast propagating speed with UDP transmission and not concerning whether the targets exist or not. Our virtual application acts as both a worm and a vulnerable host. It selects a target randomly and sends it a single attack packet at a scan rate R s. If the target is vulnerable and has not been infected, it will be infected after receiving 343
6 Traffic (Mbps) generated traffic Time (second) Time (second) (a) Traffic generated by NSME (b) Traffic from CAIDA Figure 5. The comparison of self-similarity traffic the attack packet. After a lurk period T l, it will break out. In addition, we add some active behaviors to each host. At each virtual second, a host has a probability P u to upgrade its safe measures, which will makes it immune to the worm. It also has another probability P r to reinstall its operating system, which will make it temporarily cured from the infection. However, its vulnerability still exists. We then deploy the traffic applications and the worm applications in the network. The infected rate of the network is shown in Figure 6. It is obvious that if active measures, such as firewalls and safe upgrade, are actively taken, the effect of worms will be reduced Modeling a P2P live streaming system The P2P live streaming applications are popular in the Internet. It is necessary to analyze the performance of such systems. We designed a simple P2P live streaming system based on the principle of the P2P file sharing systems (with TCP protocol). There are three roles, index servers, media sources and P2P clients. A media source is a special client that provides the raw Infected rate R s =30, T l =0.1, P u =0.02 P r =0.4 R s =30, T l =0.1, P u =0 P r = Time (second) Figure 6. The effect of active behaviors Traffic (Mbps) 350 real traffic video data. When starting, it will play a virtual TV program. The video stream it provides can be treated as a file consisting of a sequence of video packets labeled with serial IDs. The media source always caches the latest N packets that have been played, and notifies the index server about their IDs. There is a local ID indicator in each client. When a client logs on with a program name, the index server randomly provides it a group of neighbors caching the video packets of the same program with serial IDs. The indicator then is initialized by the minimal ID. The number of neighbors depends on the size of video cache in the requesting client. The client will try to connect to and download such packets from such neighbors. Once a video packet is completely downloaded, the client will notify the index server about its share. A client always tries to play the received packets according to the indicator. If a part of the packet with the indicated ID is received, the client plays it. Otherwise, it waits. When a packet is played completely, the client updates its indicator by plus 1 and drops the packet. Such change will be notified to the index server. Meanwhile, it tries to find a new neighbor by querying either its other neighbors or the index server. We design two neighbor selection policies, global and local, and compare them by analyzing the traffic (see Figure 7). When a local policy is adopt, the traffic on bone links is reduced obviously. We judge a local neighbor by its IP address. Any approaches can be tested in this model rapidly, which is useful to develop a practical P2P system. We further analyze the average wait rate when a user (client) watches a TV program through this P2P system. The relations among wait rate, the number of online clients and the cache size are shown in Figure 8. We find that the cache size of a client is more important to improve the play quality while a large number of online clients improve that. 344
7 P2P traffic (Mbps) 600 global neighbor policy 500 local neighbor policy Time (second) Figure 7. The traffic on an Inter-Area link Wait rate k clients, 2-packet cache 2k client, 6-pakcet cache 10k client, 2-packet cache 10k client, 6-packet cache Play time (second) Figure 8. The average wait rate 6. Evaluation 6.1. Size and memory cost of virtual network Considering the memory cost of virtual programs running on the virtual hosts is linearly dependent on the number of virtual hosts. Here, we only test the cost to construct a virtual network and its routing tables. We also compare the result with the well-known NS2 simulator. Since the NS2 uses a flat shortest path first (SPF) routing, the size of a network can be simply denoted by the number of routers. However, our simulator uses hierarchical routing, and the size of a network is complex to be described. We use a triple < As, Area, Router > to denote the size of a network, where x denotes the total number of x in the network. For convenient comparison, we use the same OSPF area sample class, consisting of 50 routers, to construct an AS. To obtain a network consisting of 100 routers, we construct a single AS network consisting of two such areas. Furthermore, we use the same ASs consisting of 20 such areas to construct networks consisting of 1000, and routers respectively. The memory costs are shown in Figure 9. It is obvious the hierarchical routing makes our simulator capable of constructing larger-scale virtual networks even in a single computer Parallel performance We use a metric speedup to evaluate the parallel performance. We find that it is different when the simulation instances change. Figure 10 shows the results corresponding to the applications mentioned in Section 5. The worm simulation obtains a high speedup, about 1.8, when running on two processors, and the corresponding parallel efficiency is 90%. The other two cases obtain a speedup of about 1.2. The corresponding parallel efficiency is 60%. The case of worm simulation is reasonable. It is because there is an excessive amount of events in worm simulation, which causes the performance descent of the sequential LEL operations while in parallel, the length of LEL is reduced by half, which relatively speeds up the LEL operations. The speedup of P2P simulation is slightly Memory (MB) NSME NS2 Speedup 8 Ideal Background traffic Worm+background 6 P2P+background The number of routers Figure 9. The comparison of basic memory cost Processors Figure 10. Speedup 345
8 higher than the background traffic simulation. We believe that the local neighbor policy used in P2P simulation is helpful for improving the parallel performance. In addition, the speedup slightly descends with the increasing of processors. There are many factors causing it, such as the quality of task mapping and the I/O performance. 7. Conclusion and future work In this paper, we propose a visualized parallel network simulator NSME. Different from the other traditional network simulators, the NSME simulator is application layer oriented. It provides APIs for virtual network programming and a GUI tool for simulation management. All details of simulation are transparent to researchers. We use a hierarchical routing to enhance the fidelity of simulation and meanwhile to reduce the basic memory cost to construct virtual networks. We also implement a variation of CMB algorithm for parallel synchronization. We then show the NSME by applying three distributed applications, a self-similar traffic model, a Slammer worm spreading model, and a simple P2P live streaming system. These simulation instances show that the NSME is convenient and effective to simulate any distributed applications. The performance evaluation shows the memory cost of the NSME is distinctly lower than NS2. The parallel efficiency of these simulation instances can reach about 60%. However, there are still some aspects to improve. We will continuatively enhance the parallel efficiency. The formalization of performance evaluation is also valuable to study in the future work. 8. Acknowledgments We would like to thank the anonymous reviewers for their valuable comments. This research is supported by the 973 National Basic Research Program of China (2004CB318109& 2007CB311100). 9. References [1] L. Breslau, D. Estrin, and K. Fall, et al, Advances in Network Simulation, IEEE Computer, [2] H. Akhtar, An Overview of Some Network Modeling, Simulation, & Performance Analysis Tools, Processings of the 2nd IEEE Symposium on Computers and Communications, [3] R. M. Fujimoto, K. Perumalla, A. Park, H. Wu, M. H. Ammar, Large-Scale Network Simulation: How Big? How Fast?, Processings of the 11TH IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS 03), 2003 [4] S. Lin and X. Cheng, NSME: A framework for Network Worm Modeling and Simulation, Processings of the 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility (Netcon'2006), 2006 [5] G. F. Riley, M. H. Ammar, and R. Fujimoto, A Federated Approach to Distributed Network Simulation, ACM Transactions on Modeling and Computer Simulation, 2004, pp [6] K. M. Chandy, J. Misra, Asynchronous Distributed Simulation via a Sequence of Parallel Computations, Communications of the ACM, 1981, 24(11): [7] L. Bajaj, M. Takai, R. Ahuja, K. Tang, R. Bagrodia, and M. Gerla, GloMoSim: A Scalable Network Simulation Environment, Technical Report , UCLA Computer Science Department, 1999 [8] H. Casanova, Simgrid: A Toolkit for the Simulation of Application Scheduling, Processings of the 1st IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2001), Brisbane, Australia, May. IEEE Computer Society Press, [9] H. Song, X. Liu, D. Jakobsen, R. Bhagwan, X. Zhang, K. Taura, A. Chien, The MicroGrid: A Scientific Tool for modeling computational Grids, Processings of IEEE Supercomputing (SC 2000), Dallas, TX, 4 10 November [10] G. Karypis. METIS: Family of Multilevel Partitioning Algorithms. [11] B. K. Szymanski, Yu Liu, R Gupta, Parallel Network Simulation under Distributed Genesis, Processings of the 17th Workshop on Parallel and Distributed Simulation (PADS'03). IEEE, [12] L. Song and G. A. Marin, Simulating Application Level Self-similar Network Using Hybrid Heavy-tailed Distributions, Processings of the 43rd ACM Southeast Conference, March 18-20, 2005 [13] CAIDA. Cooperative Association for Internet Data Analysis. Available at 346
IMPROVING PERFORMANCE OF PARALLEL SIMULATION KERNEL FOR WIRELESS NETWORK SIMULATIONS
IMPROVING PERFORMANCE OF PARALLEL SIMULATION KERNEL FOR WIRELESS NETWORK SIMULATIONS M. Thoppian, S. Venkatesan, H. Vu, R. Prakash, N. Mittal Department of Computer Science, The University of Texas at
More informationSIMULATIONS. PACE Lab, Rockwell Collins, IMPROVING PERFORMANCE OF PARALLEL SIMULATION KERNEL FOR WIRELESS NETWORK
IMPROVING PERFORMANCE OF PARALLEL SIMULATION KERNEL FOR WIRELESS NETWORK SIMULATIONS M. Thoppian, S. Venkatesan, H. Vu, R. Prakash, N. Mittal Department of Computer Science, The University of Texas at
More informationParallel Network Simulation under Distributed Genesis
Parallel Network Simulation under Distributed Genesis Boleslaw K. Szymanski, Yu Liu and Rashim Gupta Department of Computer Science, RPI, Troy, NY 1218, USA szymansk,liuy6,guptar @cs.rpi.edu Abstract We
More informationDistributed Packet-Level Simulation for BGP Networks under Genesis
Distributed Packet-Level Simulation for BGP Networks under Genesis Yu Liu and Boleslaw K. Szymanski Department of Computer Science, RPI, Troy, NY 12180, USA {liuy6, szymansk}@cs.rpi.edu Abstract The complexity
More informationWorm Detection, Early Warning and Response Based on Local Victim Information
Worm Detection, Early Warning and Response Based on Local Victim Information Guofei Gu, Monirul Sharif, Xinzhou Qin, David Dagon, Wenke Lee, and George Riley Georgia Institute of Technology ACSAC'04 1
More informationSimulation of Large-Scale Heterogeneous Communication Systems
Simulation of Large-Scale Heterogeneous Communication Systems Lokesh Bajaj, Mineo Takai, Rajat Ahuja, Rajive Bagrodia Computer Science Department University of California, Los Angeles Los Angeles, CA 995
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationVANS: Visual Ad hoc Network Simulator
VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,
More informationEXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR. Hao Wu Richard M. Fujimoto George Riley
Proceedings of the 2001 Winter Simulation Conference B. A. Peters, J. S. Smith, D. J. Medeiros, and M. W. Rohrer, eds. EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR Hao Wu Richard M. Fujimoto
More informationInter-Autonomous-System Routing: Border Gateway Protocol
Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga
More informationImplementing Hub and Spoke topologies in Virtual Private Network using Enhanced Interior Gateway Routing Protocol
Implementing Hub and Spoke topologies in Virtual Private Network using Enhanced Interior Gateway Routing Protocol Sree Vidya T R 1, Vasanthadev Suryakala S 2, Swarnalatha M 3 ECE Department, Valliammai
More informationLarge-Scale Network Simulation: How Big? How Fast?
Large-Scale Network Simulation: How Big? How Fast? Richard M. Fujimoto, Kalyan Perumalla, Alfred Park, Hao Wu, Mostafa H. Ammar, College Of Computing, Georgia Institute of Technology, Atlanta, GA 30332-0280
More informationMPLS VPN--Inter-AS Option AB
The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider
More informationReducing the Size of Routing Tables for Large-scale Network Simulation
Reducing the Size of Routing Tables for Large-scale Network Simulation Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higashino and Kenichi Taniguchi Graduate School of Engineering Science,
More informationMPLS VPN Inter-AS Option AB
First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol
More informationPARALLEL EXECUTION OF A SEQUENTIAL NETWORK SIMULATOR
Proceedings of the 2000 Winter Simulation Conference J. A. Joines, R. R. Barton, K. Kang, and P. A. Fishwick, eds. PARALLEL EXECUTION OF A SEQUENTIAL NETWORK SIMULATOR Kevin G. Jones Division of Computer
More informationDistributed simulation with MPI in ns-3. Josh Pelkey Dr. George Riley
Distributed simulation with MPI in ns-3 Josh Pelkey Dr. George Riley Overview Parallel and distributed discrete event simulation [1] Allows single simulation program to run on multiple interconnected processors
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationPerformance benchmark of a parallel and distributed network simulator
Performance benchmark of a parallel and distributed network simulator Samson Lee, John Leaney, Tim O Neill, Mark Hunter Institute for Information and Communication Technologies, University of Technology,
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationWhy dynamic route? (1)
Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update
More informationNETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*
NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.
More informationCSCD 433/533 Advanced Networks Spring 2016
CSCD 433/533 Advanced Networks Spring 2016 Lecture 13 Router Algorithms and Design Chapter 5 1 Topics Router Algorithms Routing in General Hierarchical routing Interior Gateway Protocols OSPF mention of
More informationDesign and Simulation Implementation of an Improved PPM Approach
I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt
More informationSimulating Internet Worms
Simulating Internet Worms George F. Riley 1 Monirul I. Sharif 2 Wenke Lee 2 1 Department of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 3332-25 riley@ece.gatech.edu
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationParallel and Distributed VHDL Simulation
Parallel and Distributed VHDL Simulation Dragos Lungeanu Deptartment of Computer Science University of Iowa C.J. chard Shi Department of Electrical Engineering University of Washington Abstract This paper
More informationImplementation of BGP in a Network Simulator
Implementation of BGP in a Network Simulator Tony Dongliang Feng Rob Ballantyne Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Road map Introduction
More informationA Federated Approach to Distributed Network Simulation
A Federated Approach to Distributed Network Simulation GEORGE F. RILEY College of Engineering School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250 and MOSTAFA
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationA Study of the Effect of Partitioning on Parallel Simulation of Multicore Systems
A Study of the Effect of Partitioning on Parallel Simulation of Multicore Systems Zhenjiang Dong, Jun Wang, George Riley, Sudhakar Yalamanchili School of Electrical and Computer Engineering Georgia Institute
More informationUnderstanding Networking Fundamentals
Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation
More informationIntroduction to OSPF
Introduction to OSPF 1 OSPF Open Shortest Path First Link state or SPF technology Developed by OSPF working group of IETF (RFC 1247) OSPFv2 standard described in RFC2328 Designed for: TCP/IP environment
More informationMobile host protocols support host
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical
More informationMulticast overview. Introduction to multicast. Information transmission techniques. Unicast
Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models
More informationIntroduction to OSPF
Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Agenda OSPF Primer OSPF in Service Provider Networks OSPF BCP - Adding Networks OSPF Command Summary 2 OSPF Primer 3
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationSimple Quality-of-Service Path First Protocol and Modeling Analysis*
Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084
More informationIP & DCN Planning for Microwave Networks
IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationPlanning for Information Network
Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including
More informationComputer Networking. Introduction. Quintin jean-noël Grenoble university
Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationCCNA 3 (v v6.0) Chapter 5 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-5-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationCSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100
CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationRouting Protocol comparison
Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate
More informationRouting Protocols --- Exterior Gateway Protocol
Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13
More informationComputer Science 461 Midterm Exam March 14, :00-10:50am
NAME: Login name: Computer Science 461 Midterm Exam March 14, 2012 10:00-10:50am This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor
More informationLM1000STXR4 Gigabit Ethernet Load Module
Gigabit Ethernet Load Module Gigabit Ethernet Load Module Ixia's Gigabit Ethernet Load Modules offer complete Layer 2-3 network and routing/bridging protocol testing functionality in a single platform.
More informationConfiguring MPLS L3VPN
Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationGloMoSim: A Scalable Network Simulation Environment
GloMoSim: A Scalable Network Simulation Environment Lokesh Bajaj, Mineo Takai, Rajat Ahuja, Ken Tang, Rajive Bagrodia, Mario Gerla Computer Science Department University of California, Los Angeles Los
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationApplications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,
More informationInternet Routing Protocols Tuba Saltürk
Internet Routing Protocols 15505068 Tuba Saltürk Outline Internet Routers Routing Protocol Interior Gateway Protocol (IGP) Distance- Vector Routing Protocol Routing Information Protocol (RIP) Interior
More informationMPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model
is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking
More informationSoftware-Defined Networking (SDN) Overview
Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it
More informationMaster s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006
Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology
More informationGlobal IP Network System Large-Scale, Guaranteed, Carrier-Grade
Global Network System Large-Scale, Guaranteed, Carrier-Grade 192 Global Network System Large-Scale, Guaranteed, Carrier-Grade Takanori Miyamoto Shiro Tanabe Osamu Takada Shinobu Gohara OVERVIEW: traffic
More informationNetwork Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture
Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction
More informationA Real-Time Network Simulation Application for Multimedia over IP
A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network
More informationBGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationLast time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm
Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost
More informationRouting Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI
International Conference on Computational Science and Engineering (ICCSE 2015) Routing Protocols Simulation of Wireless Self-organized Network Based on NS-2 Qian CAI School of Information Engineering,
More informationRouting in the Internet
Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationIntroduction to OSPF
Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 OSPF Dynamic Routing Protocol Link State technology Runs over IP, protocol 89 Designed by IETF for TCP/IP Supports VLSM
More informationHierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks
Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationUSER MANUAL. VIA IT Deployment Guide for Firmware 2.3 MODEL: P/N: Rev 7.
USER MANUAL MODEL: VIA IT Deployment Guide for Firmware 2.3 P/N: 2900-300631 Rev 7 www.kramerav.com Contents 1 Introduction 1 1.1 User Experience 2 1.2 Pre-Deployment Planning 2 2 Connectivity 3 2.1 Network
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationOperation Manual Routing Protocol. Table of Contents
Table of Contents Table of Contents Chapter 1 IP Routing Protocol Overview... 1-1 1.1 Introduction to IP Route and Routing Table... 1-1 1.1.1 IP Route... 1-1 1.1.2 Routing Table... 1-1 1.2 Routing Management
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationFIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats
Classful IP Addressing When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationNew research on Key Technologies of unstructured data cloud storage
2017 International Conference on Computing, Communications and Automation(I3CA 2017) New research on Key Technologies of unstructured data cloud storage Songqi Peng, Rengkui Liua, *, Futian Wang State
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationOSPF with Multi Area Adjacency Configuration Example
OSPF with Multi Area Adjacency Configuration Example Document ID: 118879 Contributed by Narra Naukwal, Cisco TAC Engineer. Mar 31, 2015 Contents Introduction Prerequisites Requirements Components Used
More informationOptimistic Parallel Simulation of TCP/IP over ATM networks
Optimistic Parallel Simulation of TCP/IP over ATM networks M.S. Oral Examination November 1, 2000 Ming Chong mchang@ittc.ukans.edu 1 Introduction parallel simulation ProTEuS Agenda Georgia Tech. Time Warp
More informationQuasi-Dynamic Network Model Partition Method for Accelerating Parallel Network Simulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-871 1-5 E-mail: {o-gomez,oosaki,imase}@ist.osaka-u.ac.jp QD-PART (Quasi-Dynamic network model PARTition
More informationLecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015
Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet
More informationTable of Contents 1 OSPF Configuration 1-1
Table of Contents 1 OSPF Configuration 1-1 Introduction to OSPF 1-1 Basic Concepts 1-2 OSPF Area Partition 1-4 Router Types 1-7 Classification of OSPF Networks 1-9 DR and BDR 1-9 OSPF Packet Formats 1-11
More informationReliable Mobile IP Multicast Based on Hierarchical Local Registration
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More informationA Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2014, Part 2, Lecture 1.2 Jens Andersson Internet Hierarchy 2014-11-10 ETSF05/ETSF05/ETSF10 - Internet Protocols 2 Hierarchical Routing aggregate routers
More informationInternetworking: Global Internet and MPLS. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
Internetworking: Global Internet and MPLS Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 10/19/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures
More informationMake Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET
DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationConfiguring multicast VPN
Contents Configuring multicast VPN 1 Multicast VPN overview 1 Multicast VPN overview 1 MD-VPN overview 3 Protocols and standards 6 How MD-VPN works 6 Share-MDT establishment 6 Share-MDT-based delivery
More informationSpace Parallel Network Simulations using Ghosts
Space Parallel Network Simulations using Ghosts George F. Riley 1 Talal M. Jaafar 1 Richard M. Fujimoto 2 Mostafa H. Ammar 2 1 Department of Electrical and Computer Engineering Georgia Institute of Technology
More information