You are previewing Simulation in Computer Network Design and Modeling.
O'Reilly logo
Simulation in Computer Network Design and Modeling

Book Description

Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has increased alongside advancements in information technology. Given this, efforts have been put forward by researchers, designers, managers, analysts, and professionals to optimize network performance and satisfy the varied groups that have an interest in network design and implementation.  Simulation in Computer Network Design and Modeling: Use and Analysis reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation. This reference will inform the work and research of academics, post-graduate students, developers, network designers, network analysts, telecommunication system designers, and others who are interested in using simulation in computer network design and modeling.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  5. Dedication
  6. Preface
  7. Acknowledgment
  8. Chapter 1: Modelling and Simulation of Game Applications in Ad Hoc Wireless Networks Routing
    1. ABSTRACT
    2. INTRODUCTION
    3. AUCTION THEORY: A BRIEF HISTORY
    4. PROPOSED AUCTION MECHANISM
    5. MODELLING OF TRADITIONAL ROUTING TECHNIQUES
    6. SELFISH BEHAVIOUR IN FORWARDING PACKETS
    7. PRICE AND POWER-BASED ROUTING ALGORITHM
    8. IMPROVEMENT SCHEMES FOR AUCTION AND ROUTING ALGORITHMS
    9. SIMULATION RESULTS
    10. CONCLUSION
  9. Chapter 2: Simulating Game Applications in Mobile IPv6 Protocol
    1. ABSTRACT
    2. INTRODUCTION
    3. RECENT DEVELOPMENT to MIPv6 PROTOCOL
    4. GAME-BASED DYNAMIC NETWORK SELECTION MECHANISM
    5. SIMULATION SCENARIO AND RESULTS
    6. CONCLUSION
  10. Chapter 3: Evaluation Model for Vertical Handoff Algorithms
    1. AbstracT
    2. INTRODUCTION
    3. Background
    4. A NEW MODEL FOR EVALUATION OF VERTICAL HANDOFF ALGORITHMS
    5. VERTICAL HANDOFF ALGORITHMS EVALUATION PROCESS
    6. CASE STUDY
    7. Conclusion
    8. FuTURE rESEARCH dIRECTIONS
  11. Chapter 4: Simulation of Vertical Handoff Algorithms for Heterogeneous Wireless Networks
    1. AbstracT
    2. INTRODUCTION
    3. VERTICAL HANDOFF ALGORITHMS (VHAS)
    4. SIMULATION OF VHAS AND SIMULATION APPROACHES
    5. CASE STUDY: SIMULATION OF VHAS USING NCTUNS
    6. CASE STUDY: SIMULATION OF VHAS USING MATLAB
    7. ANALYSIS AND RESULTS
    8. CONCLUSION
  12. Chapter 5: Modeling and Simulation of IEEE 802.11 Wireless LANs
    1. ABSTRACT
    2. INTRODUCTION
    3. THE ns-2 SIMULATOR
    4. CASE STUDY
    5. STRENGTHS AND WEAKNESSES OF ns-2
    6. CONCLUSION AND FUTURE WORK
  13. Chapter 6: OPNET Simulation Setup for QoE Based Network Selection
    1. ABSTRACT
    2. INTRODUCTION
    3. Background
    4. Conclusion
  14. Chapter 7: Simulation of Multihop Wireless Networks in OMNeT++
    1. ABSTRACT
    2. INTRODUCTION
    3. THE OMNeT++ SIMULATION TOOL
    4. EXTENDING OMNeT ++ FUNCTIONALITY: OMNeT ++ FRAMEWORKS
    5. InetManet FRAMEWORK: SIMULATING 802.11-BASED MULTI-HOP NETWORKS
    6. HOW TO RUN A WIRELESS-BASED SIMULATION IN OMNeT++
    7. CONCLUSION
  15. Chapter 8: Simulation of a Dynamic-Noise-Dependent Probabilistic Algorithm in MANETs
    1. ABSTRACT
    2. INTRODUCTION
    3. PREVIOUS WORK
    4. WIRELESS NETWORK ENVIRONMENTS
    5. ROUTE DISCOVERY IN MANET
    6. PURE FLOODING
    7. PROBABILISTIC FLOODING ALGORITHM
    8. DETERMINATION OF DYNAMIC RETRANSMISSION PROBABILITY
    9. RESULTS AND DISCUSSIONS
    10. CONCLUSION
  16. Chapter 9: A Location-Based Power Conservation Scheme for MANETs
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. LITERATURE REVIEW
    5. THE LBPC SCHEME
    6. SIMULATION RESULTS AND DISCUSSION
    7. CONCLUSION
    8. RECOMMENDATIONS FOR FUTURE WORK
  17. Chapter 10: Comparing Various Route Discovery Algorithms in Ad Hoc Wireless Networks
    1. Abstract
    2. INTRODUCTION
    3. DESCRIPTION OF THE ROUTE DISCOVERY ALGORITHMS
    4. CONCLUSION
  18. Chapter 11: Simulation in Amateur Packet Radio Networks
    1. Abstract
    2. INTRODUCTION
    3. BACKGROUND
    4. SIMULATIONS OF INTERACTIONS IN A RADIO NETWORK
    5. FUTURE RESEARCH DIRECTIONS
    6. Conclusion
    7. APPENDIX A
    8. APPENDIX B
    9. APPENDIX C
  19. Chapter 12: Modeling of TCP Reno with Packet-Loss and Long Delay Cycles
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MODELING OF TCP
    5. THE PFTK MODEL
    6. IMPLEMENTATION
    7. RESULTS AND DISCUSSION
    8. CONCLUSION
  20. Chapter 13: Wireless Identity Management
    1. Abstract
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. IDM PROPOSED MODEL
    5. MODEL IMPLEMENTATION
    6. CONCLUSION
  21. Chapter 14: Security Management and Simulation of Mobile Ad Hoc Networks (MANET)
    1. ABSTRACT
    2. INTODUCTION
    3. MOBILE AD HOC NETWORKS (MANETS)
    4. NETWORK SECURITY
    5. MANET SIMULATION STUDIES
    6. CONCLUSION
  22. Chapter 15: Investigating the Performance of the TSS Scheme in Noisy MANETs
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. WIRELESS NETWORK ENVIRONMENTS
    5. CONCEPT OF SHAMIR’S SECRET SHARING SCHEME
    6. THE TSS SCHEME
    7. The MANET SIMULATOR (MANSim)
    8. RESULTS AND DISCUSSIONS
    9. CONCLUSION
  23. Chapter 16: A Hybrid Port-Knocking Technique for Host Authentication
    1. ABSTRACT
    2. INTRODUCTION
    3. PREVIOUS WORK
    4. THE HYBRID PORT-KNOCKING (HPK) TECHNIQUE
    5. IMPLEMENTING THE HPK TECHNIQUE
    6. TESTING PLATFORM AND TOOLS
    7. CONCLUSION
  24. Chapter 17: The State of the Art and Future Prospective of the Network Security
    1. ABSTRACT
    2. INTRODUCTION
    3. NETWORK SECURITY PROBLEMS
    4. SECURITY SERVICES
    5. NETWORK PROTECTION METHODS
    6. FIREWALLS
    7. E-Mail SECURITY
    8. FUTURE RESEARCH AND DEVELOPMENT
  25. Chapter 18: Toward Distributed QoS Driven Wireless Messaging Infrastructure
    1. Abstract
    2. INTRODUCTION
    3. Mobile Telecom: From Technology to Services
    4. Quality Challenges of Messaging Systems
    5. Distributed AND Autonomous Systems
    6. The Class of Problems for Distributed Messaging Systems
    7. CONCLUSION
  26. Chapter 19: A Simulation Model for Large Scale Distributed Systems
    1. Abstract
    2. INTRODUCTION
    3. SPECIFIC SIMULATION REQUIREMENTS FOR MODERN LSDs
    4. A REALISTIC SIMULATION MODEL FOR EVALUATION OF LSDs
    5. CRITICAL ANALYSIS OF EXISTING WORK
    6. FUTURE TRENDS
    7. CONCLUSION
  27. Chapter 20: Future Approach of Next Generation Cellular Mobile Communications
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND ON ITU
    4. MAIN FOCUS OF THE CHAPTER
    5. CONCLUSION
  28. Chapter 21: Evaluation of Simulation Models
    1. ABSTRACT
    2. INTRODUCTION
    3. SIMULATION METHODS
    4. DECOMPOSITION TECHNIQUES
    5. FAST SIMULATION METHODS
    6. CONCLUSION
  29. Chapter 22: Analyzing and Evaluating Current Computer Networks Simulation Models
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. PERFORMANCE MODELING
    5. 4. PERFORMANCE METRICS
    6. 5. PERFORMANCE MODELING TECHNIQUES
    7. 6. MATHEMATICAL FORMALISMS
    8. 7. SIMULATION
    9. 8. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  30. Chapter 23: Network Simulation Tools for Supporting Teaching in Computer Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. PHYSICAL LABORATORIES vs. SIMULATION SOFTWARE
    4. NETWORK SIMULATION TOOLS FOR TEACHING
    5. E-ASSESSMENTS FOR TEACHING
    6. CONCLUSION
  31. Chapter 24: Wire and Wireless Local Area Networks Simulation
    1. Abstract
    2. INTRODUCTION
    3. BACKGROUND: NETWORK SIMULATORS
    4. OPNET IT GURU ACADEMIC EDITION
    5. Conclusion
  32. Compilation of References
  33. About the Contributors