Describing and Simulating Internet Routes Jérémie Leguay Université Pierre et Marie Curie (LIP6 /CNRS)
Collaboration with: Matthieu Latapy, Timur Friedman, Kavé Salamatian
Contribution Simulating internet routes, avoiding: – Shortest path model – Simulating routing algorithms
Because – Shortest path model not realistic – Simulating routing algorithms costly
Outline Characteristics of internet routes Route models Model evaluation
Characteristics of internet routes Relevant characteristics – Route lengths – Node degree evolution – Hop direction
Data – from CAIDA’s skitter project – 7 million traceroutes
Route lengths
Node degree evolution
Hop direction
Forward Stable Backward 87.3%
8.1%
4.6%
Outline Characteristics of internet routes Route models Model evaluation
Random deviation model Idea: – Routes usually follow shortest paths. – Occasionally they deviate.
Implementation: – At each hop, route deviates from shortest path with a probability p
Node degree model Idea: – routes tend towards higher degree nodes
Implementation: – Start simultaneously at the source and at the destination – At each hop choose the highest degree neighbour – The two paths would either meet or end in loops – If they end in loops, join the two loops with a shortest path
Node degree model
Outline Characteristics of internet routes Route models Model evaluation
Route lengths Real
Random deviation
Node degree
Node degree evolution Real
Random deviation
Node degree
Hop direction Real
Random deviation
Node degree
Conclusion New alternatives for simulation of routes. – Simple to implement – Capture essential characteristics
Future work Capture route dynamics Capture other properties. E.g.: coefficient of clustering
Nov 16, 2006 - law of exponent 1.97 (the fraction of nodes of .... degrees, well fitted by power laws. ...... routes similar to real ones (in the sense of the statis-.
Realistic modeling of routes in the internet is a challenge for network ... CAIDA's skitter [HPMc02, CAI] infrastructure, for instance, produces an extensive graph suitable ... When a packet travels from one router to another, it may move closer to i
properties as shortest paths, as already pointed out by Paxson [2], because of routing policies [3, 4] mainly at the autonomous system (AS) level. As described in ...
... will offer new means for the provision of Future Internet services on road transport. ..... Some of these primitives are listed in Table 1; the primitives are ... DEACTIVATE_CAM_TXON are used to start and stop the periodic transmission of CAM ...
Abstract Wireless Sensor Networks (WSN) users often use simulation ... runs over the COOJA simulator, but has been built to be easily adapted to other ...
the extension of the WSN-SOA [1] stack to support the dynamic deployment of .... Agilla but provides an easier C-style scripting language and service-oriented.
System Engineering Architectures. 160 Boulevard de ... supported by the INHOME Project EU IST-045061-STP, ... From the healthcare delivery system point of view, an evolving ... management module of the residential gateway and will be ..... organized
unique stored data; (b) retrieved data for several values of R, with I =2s; (c) retrieved data for several values of I, with R = 1. To summarize, the percentage of ...
... in a real OpenFlow controller demonstrate the viability of SOFIA as a solution in ... tween latency-sensitive mice flows in interactive applications and bulky ..... Note that this policy does not suffer .... the flow distribution p, e.g., via his
Sec. III introduces the system model as well as the assumptions considered in our work, while Sec. IV formalizes the problem and provides closed-form formula ...
ports, one of which hosts a MICAz mote to provide Zigbee connectivity. Despite the fact that the bridge can offer one-to-one service translation, we propose to ...
be used to optimally configure system parameters under realistic performance constraints. I. INTRODUCTION. Wireless Sensor Networks (WSNs) are formed by ...
AbstractâIn this paper, we investigate the ability of using. DTNs in Public Safety networks, where bandwidth and storage are constrained. We formalize the ...
An ad hoc transfer will fail if either the nodes move out of range of each other ..... is particularly tricky during the first 10 seconds when no copies have yet begun ...
Each node is an RT Linux based PC equipped with the Dual Channel PCMCIA card. ⢠Each one implements the full IP/MAC/PHY stack. ⢠Nodes run VoIP (for ...
while the GC uses a min-cost MCF solver. The numbers on links indicate the link costs, while all link capacities are 1Mb/s. In the example two demands arrive ...
1 Introduction ... from different layers of the ad hoc network stack, the system is expected to be more reac ... Section 3 describes the XIAN programming interfaces.
to enable content sharing among users on the move [1], [2],. [3]. In our daily .... When two nodes ni and nj meet, they exchange their corresponding Ëc. ...... [1] J. LeBrun and C. N. Chuah, âBluetooth content distribution stations on public trans
Moreover, in extreme cases, the sur- round indicator reaches 212 in RollerNet and 378 in Infocom. Even if the surround indicator is just an indication of potential.
networks, nodes are equipped with two radio interfaces: one being a terminal, the other one being an access point. In this context, attachment decisions based ...
is denoted as V. (i). 1 . The i-th node has a finite local buffer of size Bi (dimension: [data units]) and sens- ing rate ri (dimension: [data units/s]). Each node.
Mote connector: implements the platform-specific driver required to use the ZigBee radio. It provides two low-level services allowing packet transmission and.