A selective-abstraction modeling approach for simplifying computer network studies

Xianhui Che, Ian Wells

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Modeling and simulation technique is an essential skill on the pathway of learning and researching computer networks. However, the complexity and scale of the network nowadays often challenges the modeling techniques, as high-specification hardware environment is usually required and the simulation can be inevitably time-consuming. The selective abstraction technique leaves out redundant codes and only implements mandatory threads that can have impact on the simulation results. The investigation of this technique is done through a case study of a star-topology local area network which offers collision-free packet switching. Results show that the abstraction approach effectively reduces the length and complication of the source code and also makes the program-debugging process much easier, hence brings users valuable experience in time-saving learning and research throughout computer network study based on modeling and simulations.
    Original languageEnglish
    Title of host publicationProcs 2009 Int Conf on Ultra Modern Telecommunications and Workshops
    PublisherInstitute of Electrical and Electronics Engineers (IEEE)
    ISBN (Electronic)978-1-4244-3941-6
    ISBN (Print)978-1-4244-3942-3
    DOIs
    Publication statusPublished - 1 Dec 2009
    Event2009 International Conference on Ultra Modern Telecommunications and Workshops - St. Petersburg, Russian Federation
    Duration: 12 Oct 200914 Oct 2009

    Conference

    Conference2009 International Conference on Ultra Modern Telecommunications and Workshops
    Country/TerritoryRussian Federation
    CitySt. Petersburg
    Period12/10/0914/10/09

    Keywords

    • Modeling study
    • Selective abstraction
    • Simulation

    Fingerprint

    Dive into the research topics of 'A selective-abstraction modeling approach for simplifying computer network studies'. Together they form a unique fingerprint.

    Cite this