Preface |
|
xiii | |
|
Part I Modeling and simulation |
|
|
|
1 Modeling and simulation: the essence and increasing importance |
|
|
3 | (24) |
|
|
|
|
|
3 | (2) |
|
1.2 Experimentation aspects of simulation |
|
|
5 | (1) |
|
1.3 Experience aspects of simulation |
|
|
6 | (2) |
|
1.3.1 Simulation for training |
|
|
6 | (2) |
|
1.3.2 Simulation for entertainment |
|
|
8 | (1) |
|
1.4 Taxonomies and ontologies of simulation |
|
|
8 | (2) |
|
|
8 | (1) |
|
1.4.2 Taxonomies of simulation |
|
|
9 | (1) |
|
1.4.3 Ontologies of simulation |
|
|
10 | (1) |
|
1.5 Evolution and increasing importance of simulation |
|
|
10 | (1) |
|
|
11 | (1) |
|
Appendix A A list of over 750 types of simulation |
|
|
12 | (8) |
|
Appendix B A list of 120 types of input |
|
|
20 | (1) |
|
|
21 | (6) |
|
2 Flexible modeling with Simio |
|
|
27 | (28) |
|
|
|
|
27 | (1) |
|
2.2 Simio object framework |
|
|
27 | (3) |
|
|
30 | (1) |
|
|
31 | (2) |
|
2.5 Modeling physical components |
|
|
33 | (5) |
|
|
38 | (2) |
|
|
40 | (2) |
|
2.8 Experimentation with the model |
|
|
42 | (1) |
|
2.9 Application programming interface |
|
|
43 | (1) |
|
2.10 Applications in scheduling |
|
|
44 | (6) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (3) |
|
3 A simulation environment for cybersecurity attack analysis based on network traffic logs |
|
|
55 | (28) |
|
|
|
|
|
|
55 | (5) |
|
|
56 | (2) |
|
|
58 | (1) |
|
3.1.3 The application of network simulation and emulation in network security |
|
|
58 | (1) |
|
|
58 | (1) |
|
3.1.5 Virtualization using hypervisor |
|
|
58 | (1) |
|
3.1.6 Virtualization using container |
|
|
59 | (1) |
|
3.1.7 Virtual machines and simulation |
|
|
59 | (1) |
|
|
60 | (4) |
|
3.2.1 Network anomalies and detection methods |
|
|
60 | (1) |
|
3.2.2 Network workload generators |
|
|
61 | (1) |
|
3.2.3 Network simulation for security studies |
|
|
61 | (3) |
|
|
64 | (1) |
|
3.4 Defining a simulated and virtualized test bed for network anomaly detection researches |
|
|
64 | (4) |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
66 | (2) |
|
3.5 Simulated environment for network anomaly detection researches |
|
|
68 | (7) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
3.5.4 NAT and VMware host-only networks |
|
|
70 | (1) |
|
3.5.5 Traffic generator machine |
|
|
70 | (1) |
|
|
71 | (3) |
|
|
74 | (1) |
|
3.6 Discussion and results |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (7) |
|
Part II Surveys and reviews |
|
|
|
4 Demand-response management in smart grid: a survey and future directions |
|
|
83 | (28) |
|
|
|
|
83 | (1) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
85 | (1) |
|
4.3.2 Demand-response management |
|
|
86 | (1) |
|
|
87 | (1) |
|
4.3.4 Learning-based approaches |
|
|
87 | (1) |
|
4.4 A review of demand-response management in SG |
|
|
87 | (15) |
|
4.4.1 Learning-based approaches |
|
|
88 | (2) |
|
|
90 | (2) |
|
|
92 | (10) |
|
4.5 Open-research problems and discussion |
|
|
102 | (3) |
|
4.5.1 Open-research problems in learning system |
|
|
102 | (1) |
|
4.5.2 Open-research problems in complex system |
|
|
102 | (1) |
|
4.5.3 Open-research problems in other techniques |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
105 | (6) |
|
5 Applications of multi-agent systems in smart grid: a survey and taxonomy |
|
|
111 | (34) |
|
|
|
|
111 | (1) |
|
|
111 | (2) |
|
5.3 A review of multi-agent system to smart-grid application |
|
|
113 | (21) |
|
5.3.1 Communication management |
|
|
113 | (4) |
|
5.3.2 Demand-response management |
|
|
117 | (4) |
|
|
121 | (4) |
|
|
125 | (4) |
|
5.3.5 Storage and voltage management |
|
|
129 | (5) |
|
5.4 Open research problems and discussion |
|
|
134 | (3) |
|
|
137 | (1) |
|
|
138 | (7) |
|
6 Shortest path models for scale-free network topologies: literature review and cross comparisons |
|
|
145 | (30) |
|
|
|
|
6.1 Mapping the Internet topology |
|
|
146 | (8) |
|
|
147 | (4) |
|
|
151 | (1) |
|
|
152 | (2) |
|
6.1.4 Geographic network topologies |
|
|
154 | (1) |
|
6.2 Internet models based on the graph theory |
|
|
154 | (6) |
|
6.2.1 Fundamental notions from the graph theory |
|
|
155 | (1) |
|
|
156 | (2) |
|
6.2.3 Topology generator tools |
|
|
158 | (2) |
|
|
160 | (7) |
|
6.3.1 Parameters definition |
|
|
160 | (1) |
|
6.3.2 Shortest path models |
|
|
161 | (1) |
|
6.3.3 Cross-comparison among shortest path models |
|
|
162 | (1) |
|
6.3.4 Shortest path models applications |
|
|
163 | (4) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (7) |
|
Part III Case studies and more |
|
|
|
7 Accurate modeling of VoIP traffic in modern communication |
|
|
175 | (34) |
|
|
|
|
|
175 | (2) |
|
7.2 Modern communication networks: from simple packet network to multiservice network |
|
|
177 | (2) |
|
7.3 Voice over IP (VoIP) and quality of service (QoS) |
|
|
179 | (13) |
|
7.3.1 Basic structure of a VoIP system |
|
|
179 | (2) |
|
7.3.2 VoIP frameworks: H.323 and SIP |
|
|
181 | (5) |
|
7.3.3 Basic concepts of QoS |
|
|
186 | (1) |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (3) |
|
7.4 Self-similarity processes in modern communication networks |
|
|
192 | (3) |
|
7.4.1 Self-similar processes |
|
|
192 | (2) |
|
7.4.2 Haar wavelet-based decomposition and Hurst index estimation |
|
|
194 | (1) |
|
7.5 QoS parameters modeling on VoIP traffic |
|
|
195 | (9) |
|
7.5.1 Jitter modeling by self-similar and multifractal processes |
|
|
195 | (5) |
|
7.5.2 Packet-loss modeling by Markov models |
|
|
200 | (2) |
|
7.5.3 Packet-loss simulation and proposed model |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (4) |
|
8 Exploratory and validated agent-based modeling levels case study: Internet of Things |
|
|
209 | (30) |
|
|
|
|
209 | (20) |
|
8.1.1 Agent-based modeling framework |
|
|
210 | (1) |
|
8.1.2 Agent-based simulator |
|
|
211 | (2) |
|
8.1.3 Case study: 5G networks and Internet of Things |
|
|
213 | (8) |
|
8.1.4 Results and discussion |
|
|
221 | (8) |
|
|
229 | (1) |
|
8.2 Validated agent-based modeling level case study: Internet of Things |
|
|
229 | (8) |
|
|
229 | (1) |
|
8.2.2 Validated agent-based level |
|
|
230 | (3) |
|
8.2.3 Case study: 5G networks and Internet of Things |
|
|
233 | (2) |
|
8.2.4 Results and discussion |
|
|
235 | (1) |
|
8.2.5 Validation discussion |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (2) |
|
9 Descriptive agent-based modeling of the "Chord" P2P protocol |
|
|
239 | (46) |
|
|
|
|
|
239 | (1) |
|
9.2 Background and literature review |
|
|
240 | (10) |
|
|
240 | (1) |
|
9.2.2 Modeling and simulation of CACOONS |
|
|
240 | (1) |
|
|
241 | (1) |
|
9.2.4 Hashing and key mapping |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
9.2.8 Performance of chord |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (5) |
|
9.3 ODD model of a "Chord" |
|
|
250 | (4) |
|
|
251 | (1) |
|
9.3.2 Entities, state variables, and scales |
|
|
251 | (1) |
|
9.3.3 Process overview and scheduling |
|
|
252 | (1) |
|
|
252 | (2) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
9.4 DREAM model of a "Chord" |
|
|
254 | (13) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
9.4.4 Pseudo-code based specification |
|
|
256 | (11) |
|
9.5 Results and discussion |
|
|
267 | (13) |
|
9.5.1 Metrics (table and description) |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
270 | (1) |
|
9.5.4 Comparison of PeerSim and ABM |
|
|
271 | (1) |
|
9.5.5 DREAM network models |
|
|
272 | (6) |
|
9.5.6 Discussion (ODD vs. DREAM pros and cons of both) and which is more useful for modeling the chosen P2P protocol |
|
|
278 | (2) |
|
9.5.7 Chord and theory of computation |
|
|
280 | (1) |
|
9.6 Conclusions and future work |
|
|
280 | (1) |
|
|
280 | (5) |
|
10 Descriptive agent-based modeling of Kademlia peer-to-peer protocol |
|
|
285 | (48) |
|
|
|
|
285 | (1) |
|
10.2 Background and literature review |
|
|
286 | (12) |
|
10.2.1 Complex adaptive systems |
|
|
287 | (1) |
|
10.2.2 Cognitive agent-based computing |
|
|
287 | (1) |
|
10.2.3 Complex network modeling |
|
|
287 | (1) |
|
10.2.4 Architecture of the "Kademlia" protocol |
|
|
287 | (5) |
|
|
292 | (6) |
|
|
298 | (15) |
|
10.3.1 ODD model of "Kademlia" |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
10.3.5 Activity diagrams of "Kademlia" |
|
|
301 | (1) |
|
10.3.6 DREAM model of "Kademlia" |
|
|
301 | (1) |
|
|
301 | (1) |
|
10.3.8 Pseudo-code description |
|
|
301 | (12) |
|
10.4 Results and discussion |
|
|
313 | (15) |
|
10.4.1 Evaluation metrics |
|
|
313 | (1) |
|
10.4.2 Power law plots of centrality measures |
|
|
313 | (1) |
|
10.4.3 PeerSim simulation using existing code in PeerSim |
|
|
314 | (9) |
|
|
323 | (2) |
|
10.4.5 Comparison of PeerSim and ABM results |
|
|
325 | (1) |
|
|
325 | (3) |
|
10.5 Conclusion and future work |
|
|
328 | (1) |
|
|
328 | (5) |
|
11 Descriptive agent-based modeling of the "BitTorrent" P2P protocol |
|
|
333 | (48) |
|
|
|
|
|
333 | (3) |
|
|
335 | (1) |
|
11.2 Background and literature review |
|
|
336 | (2) |
|
11.2.1 Complex adaptive systems |
|
|
336 | (1) |
|
11.2.2 Modeling and simulation of CACOONS |
|
|
337 | (1) |
|
11.3 BitTorrent peer-to-peer protocol |
|
|
338 | (5) |
|
11.3.1 BitTorrent history overview |
|
|
339 | (1) |
|
11.3.2 Content publishing in BitTorrent |
|
|
340 | (1) |
|
11.3.3 Joining swarm and peers discovery in BitTorrent |
|
|
340 | (1) |
|
11.3.4 Delivery procedure BitTorrent |
|
|
340 | (1) |
|
11.3.5 BitTorrent architecture and working |
|
|
341 | (2) |
|
11.4 BitTorrent literature review |
|
|
343 | (6) |
|
|
348 | (1) |
|
|
349 | (26) |
|
|
349 | (2) |
|
11.5.2 Overview of the proposed model |
|
|
351 | (3) |
|
|
354 | (2) |
|
11.5.4 Pseudocode-based specification |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (4) |
|
|
362 | (3) |
|
11.5.8 Results and discussions |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
11.5.11 Comparison of both |
|
|
367 | (2) |
|
11.5.12 DREAM network models |
|
|
369 | (6) |
|
11.6 Discussion (ODD vs DREAM) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (5) |
|
12 Social networks--a scientometric visual survey |
|
|
381 | (32) |
|
|
|
|
381 | (1) |
|
|
382 | (2) |
|
12.2.1 Social networks--an overview |
|
|
382 | (1) |
|
|
383 | (1) |
|
12.2.3 Co-citation networks |
|
|
383 | (1) |
|
12.2.4 Bibliographic coupling |
|
|
383 | (1) |
|
12.2.5 Coauthorship networks |
|
|
384 | (1) |
|
12.2.6 Co-occurrence networks |
|
|
384 | (1) |
|
12.3 Materials and methods |
|
|
384 | (4) |
|
|
385 | (1) |
|
12.3.2 CiteSpace--a science mapping tool |
|
|
385 | (3) |
|
12.4 Results and discussion |
|
|
388 | (21) |
|
12.4.1 Cited-references co-citation network analysis |
|
|
388 | (5) |
|
12.4.2 Authors collaboration network analysis |
|
|
393 | (3) |
|
12.4.3 Institution collaboration network analysis |
|
|
396 | (4) |
|
12.4.4 Country collaboration network analysis |
|
|
400 | (3) |
|
12.4.5 Keywords co-occurrence network analysis |
|
|
403 | (2) |
|
12.4.6 Category co-occurrence network analysis |
|
|
405 | (4) |
|
12.4.7 Journal co-citation network analysis |
|
|
409 | (1) |
|
|
409 | (1) |
|
12.6 Conclusions and future work |
|
|
410 | (1) |
|
|
411 | (2) |
Index |
|
413 | |