Constructing network models from workflows

W. E. Wong, D. Mulcare, P. Vilela, J. J. Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The rapid growth of the Internet has spurred development of new protocols and algorithms to meet changing operational requirements such as security, multicast transport, mobile networking, policy management, and quality-of-service support. Development and evaluation of these operational tools requires answering many design questions. Building testbeds and labs is expensive, reconfiguring and sharing them are difficult, and they are relatively inflexible. Networking research increasingly depends on simulation to investigate new network design, protocol behavior, performance, and interactions. Simulation relies on network models. This paper provides an automatic method for constructing simulation models from network scenario workflows. Our experiments show that automatic construction of simulation models allows online simulation that can be adjusted dynamically and promptly.

Original languageEnglish
Title of host publicationProceedings - 10th International Conference on Computer Communications and Networks, ICCCN 2001
EditorsRonald Luijten, E.K. Park, Jenny Li
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages368-373
Number of pages6
ISBN (Electronic)0780371283
DOIs
StatePublished - 2001
Event10th International Conference on Computer Communications and Networks, ICCCN 2001 - Scottsdale, United States
Duration: 15 Oct 200117 Oct 2001

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2001-January
ISSN (Print)1095-2055

Conference

Conference10th International Conference on Computer Communications and Networks, ICCCN 2001
Country/TerritoryUnited States
CityScottsdale
Period15/10/0117/10/01

Keywords

  • Buildings
  • IP networks
  • Multicast algorithms
  • Multicast protocols
  • Quality management
  • Quality of service
  • Testing
  • Transport protocols

Fingerprint

Dive into the research topics of 'Constructing network models from workflows'. Together they form a unique fingerprint.

Cite this