Functional and performance analysis of discrete event network simulation tools

Journal article


Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
AuthorsMusa, A. and Awan, I.
Abstract

Researchers have used the simulation technique to develop new networks and test, modify, and optimize existing ones. The scientific community has developed a wide range of network simulators to fulfil these objectives and facilitate this creative process. However, selecting a suitable simulator appropriate for a given purpose requires a comprehensive study of network simulators. The current literature on network simulators has limitations. Limited simulators have been included in the studies with functional and performance criteria appropriate for comparison not been considered, and a reasonable selection model for selecting the suitable simulator has not been presented. To overcome these limitations, we studied twenty-three existing network simulators with classifications, additional comparison parameters, system limitations, and comparisons using several criteria.

KeywordsDiscreet event; Simulation; Network simulators; Structures; Unstructured
Year2022
JournalSimulation Modelling Practice and Theory
Journal citation116, p. 102470
PublisherElsevier
ISSN1569-190X
Digital Object Identifier (DOI)https://doi.org/10.1016/j.simpat.2021.102470
Official URLhttps://www.sciencedirect.com/science/article/pii/S1569190X2100157X
Publication dates
Online22 Dec 2021
Publication process dates
Accepted13 Dec 2021
Deposited23 Jan 2023
Accepted author manuscript
License
Output statusPublished
Permalink -

https://repository.canterbury.ac.uk/item/939y4/functional-and-performance-analysis-of-discrete-event-network-simulation-tools

Download files


Accepted author manuscript
SIMPAT.pdf
License: CC BY-NC-ND 4.0

  • 80
    total views
  • 56
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

Data security and governance in multi-cloud computing environment
Yeboah-Ofori, Abel, Jafar, Alameen, Abisogun, Toluwaloju, Hilton, Ian, Oseni, Waheed and Musa, Ahmad 2024. Data security and governance in multi-cloud computing environment. 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). pp. 215-222. https://doi.org/10.1109/ficloud62933.2024.00040
Comprehensive analysis of security issues in cloud-based Internet of Things: A survey
Gimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L. 2023. Comprehensive analysis of security issues in cloud-based Internet of Things: A survey. Journal of Computer Science & Computational Mathematics. 13 (2). https://doi.org/10.20967/jcscm.2023.02.004
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Machine learning for intrusion detection and network performance
Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
An investigation into peer-to-peer network security using Wireshark
Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
Transfer learning based histopathologic image classification for burns recognition
Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.