Models and tools for the high-level simulation of a name-based interdomain routing architecture

Kari Visala, Andrew Keating, Rasib Hassan Khan

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)


    The deployment and operation of global network architectures can exhibit complex, dynamic behavior and the comprehensive validation of their properties, without actually building and running the systems, can only be achieved with the help of simulations. Packet-level models are not feasible in the Internet scale, but we are still interested in the phenomena that emerge when the systems are run in their intended environment. We argue for the high-level simulation methodology and introduce a simulation environment based on aggregate models built on state-of-the-art datasets available while respecting invariants observed in measurements. The models developed are aimed at studying a clean slate name-based interdomain routing architecture and provide an abundance of parameters for sensitivity analysis and a modular design with a balanced level of detail in different aspects of the model. In addition to introducing several reusable models for traffic, topology, and deployment, we report our experiences in using the high-level simulation approach and potential pitfalls related to it.

    Original languageEnglish
    Title of host publication2014 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2014
    Number of pages6
    ISBN (Print)9781479930883
    Publication statusPublished - 2014
    MoE publication typeA4 Article in a conference publication
    EventIEEE Conference on Computer Communications - Toronto, Canada
    Duration: 27 Apr 20142 May 2014
    Conference number: 33


    ConferenceIEEE Conference on Computer Communications
    Abbreviated titleINFOCOM

    Fingerprint Dive into the research topics of 'Models and tools for the high-level simulation of a name-based interdomain routing architecture'. Together they form a unique fingerprint.

    Cite this