A MECHANISM FOR TRANSIENT DETECTION IN METRICS ESTIMATED WITH THE NS 3 NETWORK SIMULATOR

Similar documents
Circuit Simulators: A Revolutionary E-Learning Platform

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Python Machine Learning

Data Fusion Models in WSNs: Comparison and Analysis

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

Bluetooth mlearning Applications for the Classroom of the Future

Planning a research project

CS Machine Learning

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016

Smart Grids Simulation with MECSYCO

Using a PLC+Flowchart Programming to Engage STEM Interest

Moderator: Gary Weckman Ohio University USA

The open source development model has unique characteristics that make it in some

Predatory Reading, & Some Related Hints on Writing. I. Suggestions for Reading

TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD *

Machine Learning and Data Mining. Ensembles of Learners. Prof. Alexander Ihler

Computer Science 141: Computing Hardware Course Information Fall 2012

LIBRARY AND RECORDS AND ARCHIVES SERVICES STRATEGIC PLAN 2016 to 2020

XXII BrainStorming Day

ENEE 302h: Digital Electronics, Fall 2005 Prof. Bruce Jacob

Computer Science. Embedded systems today. Microcontroller MCR

CS 100: Principles of Computing

Test Effort Estimation Using Neural Network

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

Higher education is becoming a major driver of economic competitiveness

UNIVERSITY OF DERBY JOB DESCRIPTION. Centre for Excellence in Learning and Teaching. JOB NUMBER SALARY to per annum

Infrared Paper Dryer Control Scheme

Bluetooth mlearning Applications for the Classroom of the Future

On the implementation and follow-up of decisions

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

LEGO MINDSTORMS Education EV3 Coding Activities

CS 3516: Computer Networks

Requirements-Gathering Collaborative Networks in Distributed Software Projects

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

CLASS EXODUS. The alumni giving rate has dropped 50 percent over the last 20 years. How can you rethink your value to graduates?

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

Summary results (year 1-3)

similar to the majority ofcomputer science courses in colleges and universities today. Classroom time consisted of lectures, albeit, with considerable

The Use of Statistical, Computational and Modelling Tools in Higher Learning Institutions: A Case Study of the University of Dodoma

UCEAS: User-centred Evaluations of Adaptive Systems

Effective practices of peer mentors in an undergraduate writing intensive course

Strategic Goals, Objectives, Strategies and Measures

Title:A Flexible Simulation Platform to Quantify and Manage Emergency Department Crowding

MYCIN. The MYCIN Task

LEt s GO! Workshop Creativity with Mockups of Locations

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

Rover Races Grades: 3-5 Prep Time: ~45 Minutes Lesson Time: ~105 minutes

DESIGN, DEVELOPMENT, AND VALIDATION OF LEARNING OBJECTS

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Human Emotion Recognition From Speech

Summary BEACON Project IST-FP

An Introduction to Simulation Optimization

Three Strategies for Open Source Deployment: Substitution, Innovation, and Knowledge Reuse

Version Number 3 Date of Issue 30/06/2009 Latest Revision 11/12/2015 All Staff in NAS schools, NAS IT Dept Head of Operations - Education

Seminar - Organic Computing

Dublin City Schools Broadcast Video I Graded Course of Study GRADES 9-12

Major Milestones, Team Activities, and Individual Deliverables

FY16 UW-Parkside Institutional IT Plan Report

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

Master s Programme in Computer, Communication and Information Sciences, Study guide , ELEC Majors

GACE Computer Science Assessment Test at a Glance

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Study Center in Prague, Czech Republic

Institutionen för datavetenskap. Hardware test equipment utilization measurement

Chapter 10 APPLYING TOPIC MODELING TO FORENSIC DATA. 1. Introduction. Alta de Waal, Jacobus Venter and Etienne Barnard

PROJECT RELEASE: Towards achieving Self REgulated LEArning as a core in teachers' In-SErvice training in Cyprus

Computer Organization I (Tietokoneen toiminta)

MARKETING ADMINISTRATION MARK 6A61 Spring 2016

ATENEA UPC AND THE NEW "Activity Stream" or "WALL" FEATURE Jesus Alcober 1, Oriol Sánchez 2, Javier Otero 3, Ramon Martí 4

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method

Historical maintenance relevant information roadmap for a self-learning maintenance prediction procedural approach

State Parental Involvement Plan

Education the telstra BLuEPRint

Implementing a tool to Support KAOS-Beta Process Model Using EPF

GRADUATE STUDENT HANDBOOK Master of Science Programs in Biostatistics

Word Segmentation of Off-line Handwritten Documents

Unit: Human Impact Differentiated (Tiered) Task How Does Human Activity Impact Soil Erosion?

Rule Learning With Negation: Issues Regarding Effectiveness

Filing RTI Application by your own

LIFELONG LEARNING PROGRAMME ERASMUS Academic Network

Danielle Dodge and Paula Barnick first

Stakeholder Engagement and Communication Plan (SECP)

Third Misconceptions Seminar Proceedings (1993)

How to make your research useful and trustworthy the three U s and the CRITIC

K 1 2 K 1 2. Iron Mountain Public Schools Standards (modified METS) Checklist by Grade Level Page 1 of 11

UNIVERSIDAD DEL ESTE Vicerrectoría Académica Vicerrectoría Asociada de Assessment Escuela de Ciencias y Tecnología

STT 231 Test 1. Fill in the Letter of Your Choice to Each Question in the Scantron. Each question is worth 2 point.

UNIVERSITY OF UTAH VETERANS SUPPORT CENTER

SYLLABUS- ACCOUNTING 5250: Advanced Auditing (SPRING 2017)

CNS 18 21th Communications and Networking Simulation Symposium

ProFusion2 Sensor Data Fusion for Multiple Active Safety Applications

ns-2 Tutorial Running Simulations

On the Combined Behavior of Autonomous Resource Management Agents

e-portfolios in Australian education and training 2008 National Symposium Report

How to Do Research. Jeff Chase Duke University

Tun your everyday simulation activity into research

Rule Learning with Negation: Issues Regarding Effectiveness

Transcription:

BUCKNELL UNIVERSITY UNDERGRADUATE RESEARCH PROPOSAL SUMMER 2010 A MECHANISM FOR TRANSIENT DETECTION IN METRICS ESTIMATED WITH THE NS 3 NETWORK SIMULATOR TALI SASON CLASS OF 2013 BOX C1686 (201) 956 7312 BU ID: 10969598 Tjs024@bucknell.edu LUIZ FELIPE PERRONE (FACULTY MENTOR) ASSISTANT PROFESSOR DEPARTMENT OF COMPUTER SCIENCE perrone@bucknell.edu

PART A PROJECT DESCRIPTION As society continues to develop and grow, the ability to network has become a vital skill. Computer networks are a crucial means of sharing information and data. As the public becomes more dependent on information and connectivity, they demand more of computer networks. The two types of computer networks are hard wired and wireless. Although hard wired are more reliable, they are not portable and conflict with the need for mobility while accessing and sharing information. As the nodes in wireless networks have weaker connections, their protocols continue to be developed and enhanced so that the communication channels are reliable. While these improvements to wireless networks progress, research to test and analyze the predicted behavior of these connections is essential. In order to determine the behavior and/ or the performance of networks, simulations are beneficial because they create a controlled environment. To predict network behavior, complicated mathematical processes and computer simulations must be applied. Users of these methodologies often introduce errors in the process, which stand as road blocks on the way to successful simulation of network behavior. Researchers use a wide range of methodologies including a mix of simulations, and mathematics to compile and analyze output data. Results of simulations often have little credibility because researchers often overlook the random nature and the need for proper statistical analysis of simulation output data [3]. Therefore, it has become increasingly difficult for data to be confirmed and standardized for dissemination of scientific results. On top of that, the collection process can be exhausting, consuming of time and resources, which renders few people able to compile trustworthy results. This faulty research has lead to an influx of flawed results and conclusions, as evidenced in the literature [1,2,3]. It is a research requirement that any scientific activity should be based on controlled and independently repeatable experiments but as researchers became more impatient they used a brute force approach to these simulations, which led to many unacceptable results [1]. The combination of these issues has lead to a crisis of credibility in the network simulation field. In response to this confusion, the ns 3 network simulator was created so that it could be widely used and applied as a standardized system. Ns 3 is free software that is distributed, modified, and redistributed by any user allowing it to have a greater user base. Although the

simulator has proven to be a big improvement in the research of computer networking, it is complicated, especially for inexperienced users. Professor Perrone is developing an architecture that will allow novice users to create successful network simulation experiments, while also enhancing the capabilities of more advanced users [5]. He used an analogy to describe his work which I believe helps to justify the development of an experiment automation framework for ns 3. He said that ns 3 is like a bike and although it moves relatively smoothly, the rider still needs training wheels to help keep them stable so they do not fall off and get hurt. I will help with the creation of those training wheels by focusing my efforts on the application of valid statistical methods for output data processing. Transient data is data which does not follow the general trend of results. This data is not an accurate representation of the whole and therefore must be detected and discarded before statistical metrics are computed. Transient data can bias the statistical results, skewing the findings and making them unreliable. This is one of the main causes of the credibility crisis in network simulations. Although a reliable network simulator now exists, it doesn t include transient detection and deletion in the output data stream. Through the research I will to do with Prof. Perrone, I will work on a mechanism for the detection and deletion of transient data to improve the reliability of the simulator s results. This research with Prof. Perrone will be a unique opportunity to develop new skills in computer programming and enhance my ability as I continue with Bucknell s Computer Engineering degree program. METHODS To do this work I will use statistical processes and analyze the data generated. I will run simulations using ns 3 and use its facilities for collecting data. I will use previously developed mathematical technology referred to as variance reduction techniques [3] and other resources including stochastic steady state simulation to create a program that will allow me to analyze data [1,3]. In addition to adding to my knowledge of statistics, I will be learning two programming languages that are currently not covered in the core Computer Science curriculum (C++ and Python). My goal is to create a program that will analyze that data to detect the end of the transient results so that we can compute valid statistics on this body of simulation data. Such a program was developed to work with an earlier network simulator, ns 2, but I will create a new program that works with the ns 3 simulator and within the larger context of Prof. Perrone s automation framework. This program will be user friendly and widely accepted in everyday experiments.

TIME LINE Week 1: review of literature on statistical methods Week 2 and 3: studying of programming languages used in the ns 3 simulator Week 4 to 6: implementation of prototype Week 7 to 8: validation and debugging of code OUTCOMES This project fits well within Prof. Perrone s research agenda. We believe that my results will help to create a more stable method of analyzing and using network simulations in an effort to make the field more reliable and constructive. I will work on writing a computer program for the ns 3 simulator that will take a series of measurements, go through a statistical process, and tell the user whether or not a data point is part of the transient data. I will produce a program that will fit in the larger context of a framework to automate experiments in ns 3. Prof. Perrone and I believe that my work will be beneficial to the entire user base of ns 3. We expect that this work will result in material that can be submitted as conference publication. REASEARCH ENVIRONMENT PART B I will be working closely with Prof. Perrone throughout my summer research. He will be working on campus regularly during the summer as well. We will have three regularly scheduled meetings every week. Additionally, since Prof. Perrone believes strongly in an open door policy, I will be able to speak with him about any questions or problems that I may have while doing my work at any time. I will be using standard computer science labs, which have both Linux and Macintosh machines to develop code and execute experiments to evaluate results.

REFERENCES [1] K. Pawlikowski, H. D. J. Jeong, and J. S. R. Lee, On credibility of simulation studies of telecommunication networks, IEEE Communications Magazine, vol. 40, January 2002. [2] D. McNickle, G. Ewing, and K. Pawlikowski, Transient deletion and the quality of sequential steady state simulation, in Proceedings of the 21 st European Conference on Modeling and Simulation, Prague, Czech Republic, June 2007. [3] K. Pawlikowski, Steady state simulation of queuing processes: a survey of problems and simulations, ACM Computing Surveys, vol. 22, no. 2, pp. 123 170, 1990. [4] T. R. Henderson, S. Roy, S. Floyd, and G. F. Riley, ns 3 project goals, in Proceedings from the 2006 workshop on ns 2: the IP network simulator (WNS2 06), 2006. [5] L. F. Perrone, C. Cicconetti, G. Stea, and B. C. Ward. On the automation of computer network simulators. In Simutools 09: Proceedings of the 2 nd International Conference on Simulation Tools and Techniques, pages 1 10, 2009.