Claims
- 1. A method for network simulation, comprising the steps of:
decomposing said network into individual parts; simulating each said part independently and concurrently with other said parts; freezing said simulation of said parts; exchanging and comparing information between said parts at a predetermined interval along a path within each said part until said exchanged information changes less than a predetermined tolerance level; and resuming said simulation.
- 2. The method of claim 1 further comprising the step of recording said information by said part prior to said exchange.
- 3. The method of claim 1 wherein said information comprises packet delays and drop rates.
- 4. The method of claim 1 wherein said part represents a subnet/subdomain of said network.
- 5. The method of claim 1 wherein said method is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 6. The method of claim 1 wherein said path is a communication link between said parts.
- 7. The method of claim 1 wherein said method is based on an ns network simulator.
- 8. The method of claim 1 wherein said predetermined interval is user defined based upon speed and precision of said simulation.
- 9. The method of claim 1 further comprising the step of identifying individual sources within said part that generates said information to be exchanged with said other parts.
- 10. The method of claim 9 wherein said source is a fake source.
- 11. The method of claim 9 wherein said source is connected to said parts by a fake link.
- 12. A method for network simulation comprising the steps of:
freezing said simulation of a decomposed network and exchanging and comparing information between said decomposed network at a predetermined interval along a path within each said decomposed network until said exchanged information changes less than a predetermined tolerance level and resuming simulation.
- 13. The method of claim 12 wherein said simulation of said decomposed network is performed independently and concurrently with each other.
- 14. The method of claim 12 further comprising the step of recording said information by said decomposed network prior to said exchange.
- 15. The method of claim 12 wherein said information comprises packet delays and drop rates.
- 16. The method of claim 12 wherein said decomposed network represents a subnet/subdomain of said network.
- 17. The method of claim 12 wherein said method is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 18. The method of claim 12 wherein said path is a communication link between said decomposed network.
- 19. The method of claim 12 wherein said method is based on a ns network simulator.
- 20. The method of claim 12 further comprising the step of identifying individual sources within said decomposed network that generates said information to be exchanged with other parts of said decomposed network.
- 21. The method of claim 20 wherein said source is a fake source.
- 22. The method of claim 20 wherein said source is connected to said parts by a fake link.
- 23. A method for network simulation comprising the steps of:
decomposing a network into a first domain and a second domain; simulating each said domain independently and concurrently; pausing said simulation of said domain; passing information from said first domain to said second domain at a predetermined interval along a path; comparing said passed information with information in said second domain; and resuming said simulation if said compared information changes less than a predetermined tolerance level.
- 24. The method of claim 23 further comprising the step of repeating said simulation if said compared information changes more than a predetermined tolerance level.
- 25. The method of claim 23 further comprising the step of recording said information by said first domain prior to said passing step.
- 26. The method of claim 23 wherein said information comprises packet delays and drop rates.
- 27. The method of claim 23 wherein said domain represents a subnet/subdomain of said network.
- 28. The method of claim 23 wherein said method is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 29. The method of claim 23 wherein said path is a communication link between said domains.
- 30. The method of claim 23 wherein said method is based on a ns network simulator.
- 31. The method of claim 23 wherein said tolerance level is user defined based upon speed and precision of said simulation.
- 32. The method of claim 23 further comprising the step of identifying individual sources within said first domain that generates said information to be passed to said second domain.
- 33. The method of claim 32 wherein said source is a fake source.
- 34. The method of claim 32 wherein said source is connected to said second domain by a fake link.
- 35. A system for network simulation comprising a decomposed network comprising individual parts connected by a path, said system being programmed to:
independently and concurrently simulate each said part with other said parts; freeze said simulation of said parts; exchange and compare information between said parts at a predetermined interval along a path within each said part until said exchanged information changes less than a predetermined tolerance level; and resume said simulation.
- 36. The system of claim 35 further being programmed to record said information by said part prior to said exchange.
- 37. The system of claim 35 wherein said information comprises packet delays and drop rates.
- 38. The system of claim 35 wherein said part represents a subnet/subdomain of said network.
- 39. The system of claim 35 wherein said system is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 40. The system of claim 35 wherein said path is a communication link between said parts.
- 41. The system of claim 35 wherein said system is based on a ns network simulator.
- 42. The system of claim 35 wherein said predetermined interval is user defined based upon speed and precision of said simulation.
- 43. The system of claim 35 further being programmed to identify individual sources within said part that generates said information to be exchanged with said other parts.
- 44. The system of claim 43 wherein said source is a fake source.
- 45. The system of claim 43 wherein said source is connected to said parts by a fake link.
- 46. A system for network simulation comprising a decomposed network comprising individual parts connected by a path, said system being programmed to:
freeze said simulation of said decomposed network and exchanged and compare information between said decomposed network at a predetermined interval along said path within each said decomposed network until said exchanged information changes less than a predetermined tolerance level and resume simulation.
- 47. The system of claim 46 wherein said simulation of said decomposed network is performed independently and concurrently with each other.
- 48. The system of claim 46 comprising being programmed to record said information by said decomposed network prior to said exchange.
- 49. The system of claim 46 wherein said information comprises packet delays and drop rates.
- 50. The system of claim 46 wherein said decomposed network represents a subnet/subdomain of said network.
- 51. The system of claim 46 wherein said system is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 52. The system of claim 46 wherein said path is a communication link between said decomposed network.
- 53. The system of claim 46 wherein said system is based on a ns network simulator.
- 54. The system of claim 46 further being programmed to identify individual sources within said decomposed network that generates said information to be exchanged with other parts of said decomposed network.
- 55. The system of claim 54 wherein said source is a fake source.
- 56. The system of claim 54 wherein said source is connected to said parts by a fake link.
- 57. A system for network simulation comprising a decomposed network comprising at least a first domain and a second domain connected by a path, said system being programmed to:
simulate each said domain independently and concurrently; pause said simulation of said domain; pass information from said first domain to said second domain at a predetermined interval along said path; compare said passed information with information in said second domain; and resume said simulation if said compared information changes less than a predetermined tolerance level.
- 58. The system of claim 57 further being programmed to repeat said simulation if said compared information changes more than a predetermined tolerance level.
- 59. The system of claim 57 further being programmed to recording said information by said first domain prior to said passing step.
- 60. The system of claim 57 wherein said information comprises packet delays and drop rates.
- 61. The system of claim 57 wherein said domain represents a subnet/subdomain of said network.
- 62. The system of claim 57 wherein said system is utilized in applications consisting of on-line network simulation, network management, ad-hoc network design, emergency network planning, large network simulation and network protocol verification.
- 63. The system of claim 57 wherein said path is a communication link between said domains.
- 64. The system of claim 57 wherein said system is based on a ns network simulator.
- 65. The system of claim 57 wherein said tolerance level is user defined based upon speed and precision of said simulation.
- 66. The system of claim 57 further being programmed to identify individual sources within said first domain that generates said information to be passed to said second domain.
- 67. The system of claim 66 wherein said source is a fake source.
- 68. The system of claim 66 wherein said source is connected to said second domain by a fake link.
Government Interests
[0001] The United States Government has certain rights in this invention pursuant to the Defense Advanced Research Projects Agency (DARPA) Contract Number F30602-00-2-0537 between the Department of Defense and Rensselaer Polytechnic Institute.
PCT Information
Filing Document |
Filing Date |
Country |
Kind |
PCT/US01/45109 |
12/3/2001 |
WO |
|