You are previewing Modeling and Simulation of Computer Networks and Systems.
O'Reilly logo
Modeling and Simulation of Computer Networks and Systems

Book Description

Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems.

Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss:

  • Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks
  • Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up
  • Different network performance metrics including, mobility, congestion, quality of service, security and more...

Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.



  • Discusses important and emerging topics in computer networks and Systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks
  • Provides the necessary methodologies, strategies and tools needed to build computer networks and systems modeling and simulation from the bottom up
  • Includes comprehensive review and evaluation of simulation tools and methodologies and different network performance metrics including mobility, congestion, quality of service, security and more

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. Preface
    1. Overview and goals
    2. Features of the book
    3. Organization and scanning of chapters
    4. Target audience
    5. Acknowledgements
  7. Part 1: Protocols and services in computer networks and systems
    1. Chapter 1. Wireless and mobile technologies and protocols and their performance evaluation
      1. 1 Introduction
      2. 2 Wireless and mobile technologies
      3. 3 LTE
      4. 4 LTE-advanced
      5. 5 Wireless local area network
      6. 6 Simulation of wireless networks
      7. 7 Conclusion
      8. References
    2. Chapter 2. Network planning and designing
      1. 1 Introduction
      2. 2 TCP in MANET
      3. 3 MANET routing protocols
      4. 4 Related work
      5. 5 Presentation of CL-TCP-OLSR
      6. 6 Evaluation of CL-TCP-OLSR
      7. 7 Conclusion and future work
      8. Acknowledgements
      9. References
    3. Chapter 3. Rate adaptation algorithms for reliable multicast transmissions in wireless LANs
      1. 1 Introduction
      2. 2 Related work
      3. 3 The 802.11aa group address transmission service
      4. 4 NS-2: Rate adaptation library and GATS extensions
      5. 5 Rate adaptation systems for multicast transmissions
      6. 6 Validation and numerical results
      7. 7 Conclusions
      8. Acknowledgment
      9. References
    4. Chapter 4. Simulation techniques for evaluating energy-efficient heuristics for backbone optical networks
      1. 1 Energy efficiency in optical backbone networks
      2. 2 Software simulator for energy-efficient optical networks
      3. 3 Object-oriented principles for design
      4. 4 Network environment
      5. 5 Exploiting traffic grooming and related heuristics
      6. 6 Adaptive methods to reduce complexity
      7. 7 A simple yet efficient heuristic: multirate-split bypass
      8. 8 Multirate-split bypass: simulation results
      9. Acknowledgements
      10. References
    5. Chapter 5. Wireless cognitive network technologies and protocols
      1. 1 Introduction
      2. 2 Cognitive Wireless Sensor Networks and Cognitive Wireless Body Area Networks
      3. 3 Analytical Models and Simulation Tools for Wireless Sensor Networks Based on Software-Defined Radio
      4. 4 Analytical Models and Simulation Tools for Wireless Body Area Networks Based on Software-Defined Radio
      5. 5 Routing Approaches for Wireless Cognitive Sensor Networks
      6. 6 Future directions
      7. 7 Conclusions
      8. Acknowledgements
      9. References
  8. Part 2: Approaches in performance evaluation
    1. Chapter 6. Generating realistic workload for web performance studies
      1. 1 Introduction
      2. 2 Workload models and the current web
      3. 3 Web workload generators overview
      4. 4 DWEB: Modeling User Dynamism on Web Workload Characterization
      5. 5 Summary
      6. Acknowledgments
      7. References
    2. Chapter 7. Computer networks performance modeling and simulation
      1. 1 Introduction
      2. 2 Performance modeling
      3. 3 Performance metrics in computer network simulation
      4. 4 Discrete-event simulation
      5. 5 Validation and verification
      6. 6 Network simulators
      7. 7 Case study: performance evaluation of an overlay network
      8. 8 Summary
      9. Glossary
      10. References
    3. Chapter 8. A new testbed for web performance evaluation
      1. 1 GUERNICA
      2. 2 Case study
      3. 3 Validation
      4. 4 Summary
      5. Acknowledgments
      6. References
    4. Chapter 9. The impact of dynamic user workloads on web performance: The e-commerce case study
      1. 1 Introduction
      2. 2 Considering dynamism on users’ navigations
      3. 3 One step ahead: evolving user’s profile using dynamic roles
      4. 4 Modeling the user-browser interaction
      5. 5 Summary and Conclusions
      6. Acknowledgements
      7. References
  9. Part 3: Modeling approaches of computer networks and systems
    1. Chapter 10. On the self-similarity of traffic generated by network traffic simulators
      1. 1 Introduction
      2. 2 Self-Similarity and the Hurst parameter
      3. 3 Self-Similarity in Network Traffic
      4. 4 Analysis of self-similarity in simulated network traffic
      5. 5 Conclusions and future work
      6. References
    2. Chapter 11. Performances evaluation and Petri nets
      1. 1 Introduction
      2. 2 Modeling and performance evaluation
      3. 3 Petri nets
      4. 4 Conclusion
      5. References
    3. Chapter 12. Towards correct and reusable Network-on-Chip architectures
      1. 1 Introduction
      2. 2 Network-On-Chip
      3. 3 Introduction to Event-B
      4. 4 NoC Models and properties
      5. 5 Four abstract models for the 3D NoC<em xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops">: M</em><sub xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops"><em>0</em></sub>, , <em xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops">M</em><sub xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops"><em>1</em></sub>, , <em xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops">M</em><sub xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops"><em>2</em></sub>, , <em xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops">M</em><sub xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops"><em>3</em></sub>
      6. 6 Reusability and extensibility of our models
      7. 7 Verification of models
      8. 8 Related work
      9. 9 Results
      10. 10 Conclusions
      11. References
      12. Further reading
    4. Chapter 13. Markov chain models and applications
      1. 1 Introduction
      2. 2 Strengths of Markov models
      3. 3 Analytical modeling techniques
      4. 4 Markov modeling
      5. 5 Markov regenerative process modeling
      6. 6 Conclusions
      7. Acknowledgement
      8. References
  10. Part 4: Simulation methodologies in computer networks and systems
    1. Chapter 14. A model-driven method for the design-time performance analysis of service-oriented software systems
      1. 1 Introduction
      2. 2 Related work
      3. 3 Background
      4. 4 Model-driven method
      5. 5 Example application
      6. 6 Conclusions
      7. References
    2. Chapter 15. Current and future trends in open source network simulators for wireless systems
      1. 1 Network simulation issues
      2. 2 Simulation frameworks overview
      3. 3 Open source network simulators
      4. 4 OS-oriented tools
      5. 5 NS-3 frameworks
      6. References
    3. Chapter 16. Simulating wireless and mobile systems: The Integration of DEUS and Ns-3
      1. 1 Introduction
      2. 2 Co-simulation of wireless and mobile systems
      3. 3 DEUS
      4. 4 Ns-3
      5. 5 Integration of DEUS and Ns-3
      6. 6 Evaluation
      7. 7 Conclusion
      8. References
    4. Chapter 17. Simulation methods, techniques and tools of computer systems and networks
      1. 1 Introduction
      2. 2 Simulation techniques, models and tools
      3. 3 Discrete event simulation
      4. 4 GPU-based simulations
      5. 5 Multi-Agent–Based Simulation
      6. 6 Classification of some discrete event simulation techniques
      7. 7 Conclusion
      8. References
    5. Chapter 18. An integrative approach for hybrid modeling, simulation and control of data networks based on the DEVS formalism
      1. 1 Introduction
      2. 2 Background and tools
      3. 3 Application to a problem of admission control
      4. 4 Application to a problem of congestion control
      5. 5 Conclusions
      6. References
  11. Part 5: Next generation wireless networks evaluations
    1. Chapter 19. An Ns-3 based simulative and emulative platform
      1. 1 Introduction
      2. 2 The evolved packet system
      3. 3 Differentiated services domain
      4. 4 The Ns-3 simulator
      5. 5 The developed tool
      6. 6 Conclusions and future development
      7. References
    2. Chapter 20. A random access model for M2M communications in LTE-advanced mobile networks
      1. 1 Introduction
      2. 2 M2M applications overview
      3. 3 Congestion control for M2M applications over LTE networks
      4. 4 Random access procedure and PRACH resources
      5. 5 RAN overload control
      6. 6 Random access model for M2M applications
      7. 7 Performance evaluation
      8. 8 Conclusion
      9. References
    3. Chapter 21. Analysis and performance evaluation of the next generation wireless networks
      1. 1 Introduction
      2. 2 The evolution of cellular wireless systems
      3. 3 Modeling and analysis of interference in the heterogeneous wireless networks
      4. 4 Simulation techniques for the next generation wireless heterogeneous networks
      5. 5 Conclusion
      6. Acknowledgement
      7. References
    4. Chapter 22. Evolutionary algorithms for wireless network resource allocation
      1. 1 Introduction
      2. 2 Related work and algorithms
      3. 3 System model and resource allocation problem
      4. 4 Evolutionary algorithms for resource allocation
      5. 5 Select results and comparison
      6. 6 Conclusions
      7. References
    5. Chapter 23. Modeling tools to evaluate the performance of wireless multi-hop networks
      1. 1 Introduction
      2. 2 Background
      3. 3 Performance models
      4. 4 Conclusion
      5. References
    6. Chapter 24. Modeling and performance evaluation of resource allocation for LTE femtocell networks
      1. 1 Introduction
      2. 2 LTE system overview
      3. 3 Resource allocation among femtocells
      4. 4 Resource allocation among UEs
      5. 5 Simulation modeling of LTE femtocell networks
      6. 6 LTE-S<span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="smallcaps">IM</span>
      7. 7 Implementation of resource allocation schemes in LTE-S<span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="smallcaps">IM</span>
      8. 8 Femtocell network modeling using LTE-S<span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="smallcaps">IM</span>
      9. 9 Performance evaluation using LTE-S<span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" class="smallcaps">IM</span>
      10. 10 Conclusion
      11. Glossary
      12. References
    7. Chapter 25. Multimedia transmission over wireless networks fundamentals and key challenges
      1. 1 Introduction
      2. 2 Multimedia transmission over wireless networks
      3. 3 QoS and QoE: the challenge generators
      4. 4 Layered analysis
      5. 5 Impact of Emerging Networking Paradigms from the Perspective of Multimedia
      6. 6 Major Challenges for Modeling and Simulation of Wireless Multimedia Networking
      7. 7 Conclusions
      8. References
    8. Chapter 26. Software-defined wireless network (SDWN): A new paradigm for next generation network management
      1. 1 Introduction
      2. 2 Literature survey
      3. 3 GoS Optimized Topology and Admission Control Model for Software Defined Mobile Wireless Networks
      4. 4 Software defined offloading mechanism
      5. 5 Conclusion
      6. References
    9. Chapter 27. Radio resource management for heterogeneous wireless networks: Schemes and simulation analysis
      1. 1 Introduction
      2. 2 Definitions and Operating Principle
      3. 3 CAC in wireless networks
      4. 4 Scheduling
      5. 5 Modeling of RRM schemes
      6. 6 Performance evaluation of RRM schemes
      7. 7 Conclusion
      8. References
  12. Part 6: Modeling and simulation for system security
    1. Chapter 28. DoS detection in WSNs: Energy-efficient designs and modeling tools for choosing monitoring nodes
      1. 1 Introduction
      2. 2 Related work
      3. 3 Pseudo-random self-election of the cNodes
      4. 4 Modeling with markovian processes and GSPN model
      5. 5 Energy-based designation of the cNodes
      6. 6 Conclusion
      7. References
    2. Chapter 29. Formal methods of attack modeling and detection
      1. 1 Introduction to computer system threats
      2. 2 Modeling computer system attacks
      3. 3 Analysis and detection of computer system attacks
      4. 4 Case studies
      5. 5 Conclusions
      6. References
    3. Chapter 30. Security analysis of computer networks: Key concepts and methodologies
      1. 1 Introduction
      2. 2 Fundamental security objectives in computer networks
      3. 3 Vulnerability and malware in computer networks
      4. 4 Security threats and attacks in computer networks
      5. 5 Defense mechanisms against security attacks
      6. 6 Security analyses of computer networks
      7. 7 Emerging topics and research challenges for security analysis
      8. 8 Conclusion
      9. Acknowledgement
      10. References
  13. Index