nem:: A software for network topology analysis and modeling

被引:21
|
作者
Magoni, D [1 ]
机构
[1] Univ Strasbourg 1, LSIIT, F-67400 Illkirch Graffenstaden, France
关键词
D O I
10.1109/MASCOT.2002.1167097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The design of network protocols is greatly accelerated by the use of simulators particularly when studying a protocol's behavior in a large internetwork topology. However the accuracy of the simulation results are heavily affected by the input network topology. As taking a real map as an input is not always feasible, artificially created topologies are often used There exist many network topology generators available but recent discoveries on the Internet topology have made most of them obsolete when it comes to model a typical part of the Internet. This paper presents a free open source software designed for network topology analysis and modeling called network manipulator (nem). It is capable of creating realistic Internet-like topologies and it can check proof them on the fly by a thorough topology analysis. The paper especially focuses on the architecture and the capabilities of the software.
引用
收藏
页码:364 / 371
页数:8
相关论文
共 50 条
  • [31] Network topology analysis by solving equations
    Yao, Yubin
    Wang, Dan
    Wu, Zhiliang
    Xu, Weike
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2010, 30 (01): : 79 - 83
  • [32] ANALYSIS ON THE METHODS OF NETWORK TOPOLOGY DISCOVERY IN IP NETWORK
    Fang, Li
    Yu, Xia
    Jun, Cheng
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 600 - 604
  • [33] Research on Anonymous Network Topology Analysis
    Kang, Shiyu
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 2080 - 2085
  • [34] Vulnerability Analysis on the Cloud Network Topology
    Chen, Ke
    Zhang, Hua
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3007 - 3012
  • [35] Analysis of corporation competition network topology
    Business School, University of Shanghai for Science and Technology, Shanghai 200093, China
    Shanghai Ligong Daxue Xuebao, 2007, 1 (37-41):
  • [36] Towards An Analysis of Anonymous Network Topology
    Lu, Tianbo
    Du, Shixian
    Li, Yang
    Dong, Peiyuan
    Zhang, Xiaoyan
    2014 7th International Conference on Security Technology (SecTech), 2014, : 34 - 37
  • [37] Analysis of the Autonomous System network topology
    Magoni, D
    Pansiot, JJ
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (03) : 26 - 37
  • [38] Software rejuvenation - Modeling and analysis
    Trivedi, KS
    Vaidyanathan, K
    INFORMATION TECHNOLOGY: SELECTED TUTORIALS, 2004, 157 : 151 - 182
  • [39] Predictive Flow Modeling in Software Defined Network
    Kumari, Abha
    Chandra, Joydeep
    Sairam, Ashok Singh
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1494 - 1498
  • [40] On the neural network approach in software reliability modeling
    Cai, KY
    Cai, L
    Wang, WD
    Yu, ZY
    Zhang, D
    JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (01) : 47 - 62