On the Use of Discrete-Event Simulation in Computer Networks Analysis and Design

Author(s):  
Hussein Al-Bahadili

This chapter presents a description of a newly developed research-level computer network simulator, which can be used to evaluate the performance of a number of flooding algorithms in ideal and realistic mobile ad hoc network (MANET) environments. It is referred to as MANSim. The simulator is written in C++ programming language and it consists of four main modules: network, mobility, computational, and algorithm modules. This chapter describes the philosophy behind the simulator and explains its internal structure. The new simulator can be characterized as: a process-oriented discrete-event simulator using terminating simulation approach and stochastic input-traffic pattern. In order to demonstrate the effectiveness and flexibility of MANSim, it was used to study the performance of five flooding algorithms, these as: pure flooding, probabilistic flooding, LAR-1, LAR-1P, and OMPR. The simulator demonstrates an excellent accuracy, reliability, and flexibility to be used as a cost-effective tool in analyzing and designing wireless computer networks in comparison with analytical modeling and experimental tests. It can be learned quickly and it is sufficiently powerful, comprehensive, and extensible to allow investigation of a considerable range of problems of complicated geometrical configuration, mobility patterns, probability density functions, and flooding algorithms.

2020 ◽  
pp. 137-146
Author(s):  
Rathish Radhakrishnan ◽  
Karpagavadivu Karuppusamy

Clustering is defined as grouping of nodes based on their energy levels. In each cluster, a gateway node is set depending on the node that has the highest energy level. This phenomenon is majorly implemented using LEACH protocol. LEACH is abbreviated as Low Energy Adaptive Clustering Hierarchy. It is a time division-based Media Access Control (MAC) protocol. In order to make it energy efficient a new protocol is defined to hold the sensors as long as possible. It balances the network load in minimal time. A more energy efficient node transfer is possible by means of the above protocol which attains the high residual energy. The major advantage of implementing this protocol is to reduce the energy and power consumption that is needed to create and maintain the cluster. In Mobile Ad-hoc Network (MANET), the vast consumption of power can be literally minimized by utilizing this clustering scheme. The simulation of our protocol is carried out in Network Simulator-2.


Author(s):  
Bjørnar Luteberget ◽  
Koen Claessen ◽  
Christian Johansen ◽  
Martin Steffen

AbstractThis paper proposes a new method of combining SAT with discrete event simulation. This new integration proved useful for designing a solver for capacity analysis in early phase railway construction design. Railway capacity is complex to define and analyze, and existing tools and methods used in practice require comprehensive models of the railway network and its timetables. Design engineers working within the limited scope of construction projects report that only ad-hoc, experience-based methods of capacity analysis are available to them. Designs often have subtle capacity pitfalls which are discovered too late, only when network-wide timetables are made—there is a mismatch between the scope of construction projects and the scope of capacity analysis, as currently practiced. We suggest a language for capacity specifications suited for construction projects, expressing properties such as running time, train frequency, overtaking and crossing. Such specifications can be used as contracts in the interface between construction projects and network-wide capacity analysis. We show how these properties can be verified fully automatically by building a special-purpose solver which splits the problem into two: an abstracted SAT-based dispatch planning, and a continuous-domain dynamics with timing constraints evaluated using discrete event simulation. The two components communicate in a CEGAR loop (counterexample-guided abstraction refinement). This architecture is beneficial because it clearly distinguishes the combinatorial choices on the one hand from continuous calculations on the other, so that the simulation can be extended by relevant details as needed. We describe how loops in the infrastructure can be handled to eliminate repeating dispatch plans, and use case studies based on data from existing infrastructure and ongoing construction projects to show that our method is fast enough at relevant scales to provide agile verification in a design setting. Similar SAT modulo discrete event simulation combinations could also be useful elsewhere where one or both of these methods are already applicable such as in bioinformatics or hardware/software verification.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


A Mobile Ad-hoc Network (MANET) is a wireless network created without any static infrastructure and works in a decentralized fashion. The nodes are independent and communicated with each other by self-organizing among those nodes to provide the global network functionality. It draws more attention in recent years because of enormous applications and its cost-effective implementation. The communication among these nodes entirely depends on the routing path and battery power. Many researches have concentrated only on finding the shortest path and throughput in this area. The energy-efficient routing has a lot of scope and important factor to be considered for routing in MANET’s. In this article, the current energy-efficient routing protocols will be extensively reviewed and results tabulated. Finally, the paper proposes open areas in which the performance of the network may be improved by considering energy-efficient networks, achieving stability in the network and finding better routes.


Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


Author(s):  
M. Fernanda Gleizes ◽  
Germán Herrero ◽  
Diego C. Cafaro ◽  
Carlos A. Méndez ◽  
Jaime Cerdá

The management of oil-product pipelines represents a critical task in the daily operation of petroleum supply chains. Efficient computational tools are needed to schedule pipeline operations in a reliable and cost-effective manner. This work presents a novel discrete event simulation system for the detailed scheduling of a multiproduct pipeline consisting of a sequence of pipes that connects a single input station to several receiving terminals. The pipeline is modeled as a non-traditional multi-server queuing system involving a number of servers at every pipe end that perform their tasks in a synchronized manner. By using alternative priority rules, the model decides which server should dispatch the entity waiting for service to the associated depot. Also, the model deals with the timely fulfillment of terminal demands and the system response to unexpected events. In combination with optimization tools, the proposed simulation technique permits to easily manage real-world pipelines operations with low computational effort.


2018 ◽  
Vol 38 (4) ◽  
pp. 439-451 ◽  
Author(s):  
Matthew J. Glover ◽  
Edmund Jones ◽  
Katya L. Masconi ◽  
Michael J. Sweeting ◽  
Simon G. Thompson ◽  
...  

Markov models are often used to evaluate the cost-effectiveness of new healthcare interventions but they are sometimes not flexible enough to allow accurate modeling or investigation of alternative scenarios and policies. A Markov model previously demonstrated that a one-off invitation to screening for abdominal aortic aneurysm (AAA) for men aged 65 y in the UK and subsequent follow-up of identified AAAs was likely to be highly cost-effective at thresholds commonly adopted in the UK (£20,000 to £30,000 per quality adjusted life-year). However, new evidence has emerged and the decision problem has evolved to include exploration of the circumstances under which AAA screening may be cost-effective, which the Markov model is not easily able to address. A new model to handle this more complex decision problem was needed, and the case of AAA screening thus provides an illustration of the relative merits of Markov models and discrete event simulation (DES) models. An individual-level DES model was built using the R programming language to reflect possible events and pathways of individuals invited to screening v. those not invited. The model was validated against key events and cost-effectiveness, as observed in a large, randomized trial. Different screening protocol scenarios were investigated to demonstrate the flexibility of the DES. The case of AAA screening highlights the benefits of DES, particularly in the context of screening studies.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


2016 ◽  
Author(s):  
Anthony Eccleston ◽  
Anthony Bentley ◽  
Matthew Dyer ◽  
Ann Strydom ◽  
Wim Vereecken ◽  
...  

AbstractObjectivesThe objective of this study was to evaluate the long-term cost-effectiveness of germline BRCA1 and BRCA2 (collectively termed ‘BRCA’) testing in women with epithelial ovarian cancer, and testing for the relevant mutation in first and second degree relatives of BRCA mutation-positive individuals, compared with no testing. Female BRCA mutation-positive relatives of ovarian cancer patients could undergo risk-reducing mastectomy and/or bilateral salpingo-oophorectomy.MethodsA discrete event simulation model was developed that included the risks of breast and ovarian cancer, the costs, utilities and effects of risk-reducing surgery on cancer rates, and the costs, utilities and mortality rates associated with cancer.ResultsBRCA testing all women with epithelial ovarian cancer each year is cost-effective at a UK willingness-to-pay threshold of £20,000/QALY compared with no testing, with an ICER of £4,339/QALY. The result was primarily driven by fewer cases of breast (142) and ovarian (141) cancer and associated reductions in mortality (77 fewer deaths) in relatives over the subsequent 50 years. Sensitivity analyses showed that the results were robust to variations in the input parameters. Probabilistic sensitivity analysis showed that the probability of germline BRCA mutation testing being cost-effective at a threshold of £20,000/QALY was 99.9%.ConclusionsImplementing germline BRCA testing in all ovarian cancer patients would be cost-effective in the UK. The consequent reduction of future cases of breast and ovarian cancer in relatives of mutation-positive individuals would ease the burden of cancer treatments in subsequent years and result in significantly better outcomes and reduced mortality rates for these individuals.


2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Robert A. Sowah ◽  
Kwadwo B. Ofori-Amanfo ◽  
Godfrey A. Mills ◽  
Koudjo M. Koumadi

A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges. These networks are more susceptible to attacks such as black hole and man-in-the-middle (MITM) than their corresponding wired networks. This is due to the decentralized nature of their overall architecture. In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for control of nodes attacked. The ANN classification algorithm for intrusion detection was evaluated using several metrics. The performance of the ANN as a predictive technique for attack detection, isolation, and reconfiguration was measured on a dataset with network-varied traffic conditions and mobility patterns for multiple attacks. With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. This work is intended to be an opening for future malicious software time signature creation, identification, isolation, and reconfiguration to supplement existing Intrusion Detection Systems (IDSs).


Sign in / Sign up

Export Citation Format

Share Document