Modeling and Simulation of Complex Communication Networks
Modern network systems such as Internet of Things, Smart Grid, VoIP traffic, Peer-to-Peer protocol, and social networks, are inherently complex. They require powerful and realistic models and tools not only for analysis and simulation but also for prediction. This book covers important topics and approaches related to the modeling and simulation of complex communication networks from a complex adaptive systems perspective. The authors present different modeling paradigms and approaches as well as surveys and case studies. With contributions from an international panel of experts, this book is essential reading for networking, computing, and communications professionals, researchers and engineers in the field of next generation networks and complex information and communication systems, and academics and advanced students working in these fields.
Inspec keywords: complex networks; telecommunication computing; computer simulation; computer networks; multi-agent systems; adaptive systems
Other keywords: realistic modeling; network topology; complex communication networks; IoT; multiagent systems; Cognitive Agent-based Computing; Simeo; large-scale networks; CABC framework; simulation; Internet of Things; P2P protocols; complex adaptive system; CACOONS; Complex Adaptive Communication Networks and Environments; smart grid communications; VoIP; cybersecurity; CAS
Subjects: General electrical engineering topics; Expert systems and other AI software and techniques; Communication system theory; Communications computing; General and management topics; Computer networks and techniques; Computer communications
- Book DOI: 10.1049/PBPC018E
- Chapter DOI: 10.1049/PBPC018E
- ISBN: 9781785613555
- e-ISBN: 9781785613562
- Page count: 500
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
Part I - Modeling and simulation
1 Modeling and simulation: the essence and increasing importance
- + Show details - Hide details
-
p.
3
–26
(24)
The technical aspects of the essence of simulation are elaborated based on the following definition: simulation is performing a goal-directed experimentation or gaining experience under controlled conditions by using dynamic models either to develop/enhance skills or for entertainment; where a dynamic model denotes a model for which behaviour and/or structure is variable over time. Hence, experimentation and experience aspects are explained. Several taxonomies, ontologies, and some ontology-based dictionaries are cited for a comprehensive and integrative perception of simulation. Finally, the evolution and increasing importance of simulation is explained.
2 Flexible modeling with Simio
- + Show details - Hide details
-
p.
27
–53
(27)
Simio is an object-oriented (OO), general-purpose modeling tool that can be applied in abroad set of applications including manufacturing, transportation, logistics, healthcare, and communication networks. Simio includes a comprehensive tool set for building models, providing 3D animation, verifying and validating the model, experimenting and optimizing results, and real-time planning and scheduling. In this chapter, we describe the general purpose modeling features and capabilities of Simio but, where appropriate, describe these concepts as they relate to modeling of communication networks.
3 A simulation environment for cybersecurity attack analysis based on network traffic logs
- + Show details - Hide details
-
p.
55
–79
(25)
The continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.
-
Part II - Surveys and reviews
4 Demand-response management in smart grid: a survey and future directions
- + Show details - Hide details
-
p.
83
–110
(28)
Nowadays, one of the key areas of research in smart grid (SG) is demand-response management (DRM). DRM assists in simplifying interactions between the customers and the utility-service providers. It also helps in the improvement of energy efficiency as well as effects on load balancing. Studies on DRM have brought a number of interesting, technical discussions and research contributions. Many of these studies work toward making energy-efficient systems. However, there is a need to work in the domain of customer satisfaction; this area needs considerable new advances. From past few decades, a number of studies have been carried out in SG regarding DRM. However, there is no such work that presents a comprehensive analysis of these works. There is a need to investigate different techniques, their advantages, as well as limitations. By focusing on DRM from a customer satisfaction perspective, in this chapter, we present a detailed overview of different solutions for developing DRM. We also group existing solutions and identify trends and challenges in an SG domain from DRM perspective.
5 Applications of multi-agent systems in smart grid: a survey and taxonomy
- + Show details - Hide details
-
p.
111
–144
(34)
Multi-agent systems (MASs) in the smart-grid area have received a great deal of attention from the research community in recent years. Studies on MAS to the smart grid have brought a number of interesting technical discussions on simulation and modeling of the smart grid and research contributions. Researchers are trying to bring energy efficiency and load balancing in the smart grid. Many of these research works have achieved efficiency in power-system domain, while the social system and consumer satisfaction still need improvement. By focusing on the MAS in smart grid, in this part, we survey the body of knowledge and discuss the challenges of simulation and modeling of MAS in the smart grid. We investigate and group the existing solutions and highlight open-research problems.
6 Shortest path models for scale-free network topologies: literature review and cross comparisons
- + Show details - Hide details
-
p.
145
–172
(28)
The chapter focuses on Internet topology models. First, it investigated topology representations provided at different levels of granularity. Second, it reviewed topology models based on the graph theory and related topology generator tools. Third, it studied analytical models showing average shortest path and distribution of the shortest path length for scale-free networks. In fact, starting from these concepts, the accuracy of reference models for the shortest path are studied and compared through computer simulations. Obtained results demonstrate that available models are able to catch the average value and the distribution of the shortest path distribution over a very broad set of conditions. More specifically, when m = 1, the Gamma distribution shows the lowest distance for all N values. When m = 2 and m = 3, instead, the Weibull distribution provides the lowest error. The lognormal distribution always registers the worst behavior. On the contrary, all the evaluated models require a case-by-case tuning of their parameters, which represents an important limit to be solved in future research activities.
-
Part III - Case studies and more
7 Accurate modeling ofVoIP traffic in modern communication
- + Show details - Hide details
-
p.
175
–208
(34)
The chapter presents the jitter and packet-loss modeling onVoIP traffic by means of network measurements. We basically modeled the main QoS parameters of VoIP traffic which could be related with regular VoIP communications over regular-wired networks as well as for mVoIP (which functions as an application that runs over any wireless network technology that provides data access to the Internet). Hence, our modeling work is basically relevant to both regular VoIP and mVoIP technologies.
8 Exploratory and validated agent-based modeling levels case study: Internet of Things
- + Show details - Hide details
-
p.
209
–238
(30)
This book chapter discusses two of the agent-based modeling (ABM) levels, i.e. exploratory agent-based modeling (EABM) and validated agent-based modeling (VABM). In first part of this chapter, we shall briefly explain EABM with the help of a case study of 5G networks modeled in an agent-based simulator called NetLogo [1] of the use cases of 5G networks is Internet ofThings (IoT). We designed, implemented and experimented this case study to explore the futuristic approaches to ease the implementation of this under-developing 5G network which still needs to be explored. Next, we discuss another important level of modeling, i.e., VABM. Since ABM approach has turned into an attractive and efficient way for displaying large-scale complex systems, verification and validation (V&V) of these models have become questionable. Here, we shall briefly explain VABM with the help of the same case study of 5G networks modeled as in EABM. Using VABM, we shall validate the case study if it is a credible solution.
9 Descriptive agent-based modeling of the "Chord" P2P protocol
- + Show details - Hide details
-
p.
239
–284
(46)
In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.
10 Descriptive agent-based modeling of Kademlia peer-to-peer protocol
- + Show details - Hide details
-
p.
285
–331
(47)
The objective of writing this chapter is twofold. First, ABM model for the Kademlia is being proposed using complex networks-based and agent-based approaches combination. While developing the model of Kademlia, we will use the already developed complex networks like Line-walking Turtles, Communication-T-T network and Random Network. For validation purpose, we will present a hybrid routing algorithm based on centrality. By this, we can say that a communication has taken place end to end between users. Second, ODD and DREAM are two techniques that we have used for ABM specification. Then, we will also give a comparative analysis of ODD and DREAM. Some of our main contributions are as follows: To model and simulate Kademlia, an agent-based and complex network modeling approach is proposed. ODD specification technique for Kademlia's ABM model. DREAM specification technique for Kademlia's ABM model. An algorithm based on hybrid centrality measure. A comparative analysis of ODD and DREAM specification techniques.
11 Descriptive agent-based modeling of the "BitTorrent" P2P protocol
- + Show details - Hide details
-
p.
333
–380
(48)
Among many P2P networks, BitTorent is very famous for sharing files over a network. In this chapter, we proposed modeling and simulation of the BitTorrent protocol by using a combination of agent-based and complex network-based approaches. The simulation results demonstrate that our proposed ABM-based BitTorrent model performedbetter. Furthermore, forABM specification, we followed two approaches, first is ODD and the second one is DREAM methodology. We presented qualitative as well as a quantitative comparison of both ODD and DREAM specification techniques. The comparative study of ODD and DREAM proved that DREAM methodology is the more useful approach for documenting an ABM not only in terms of modeling but also for replication of the models, specifically for P2P networks.
12 Social networks - a scientometric visual survey
- + Show details - Hide details
-
p.
381
–412
(32)
In this study, CiteSpace-a key visual analytic tool is used to trace the emerging trends, temporal patterns, and development in the domain of “social networks.” To this end, we use a methodology involving the use of complex networks to visually analyze recent data from WoS in the social network domain. We took bibliographic records from the period of 2001 to 2018 and applied analysis on the data. We have visualized co-citation networks of cited references and journals, collaboration networks of authors, institutions, and countries and co-occurrence networks of keywords and subject categories. We have identified key turning points, pivot nodes, landmark publications, central articles, active articles, key journals, most productive and influential organizations, active organizations, core countries, central countries, most productive countries, popular keywords, central keywords, active keywords, key subject categories, central subject categories, and bursty subject categories. Additionally, major clusters in the cited reference co-citation network are also revealed. A future research may conduct a visual analysis of hybrid networks, such as author-country network, institution-country network, author-institution network, author-document network, and document-category network.
-
Back Matter
- + Show details - Hide details
-
p.
(1)