Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach

被引:63
作者
Cetinkaya, Egemen K. [1 ]
Broyles, Dan [1 ]
Dandekar, Amit [1 ]
Srinivasan, Sripriya [1 ]
Sterbenz, James P. G. [1 ,2 ]
机构
[1] Univ Kansas, Informat & Telecommun Technol Ctr, Lawrence, KS 66045 USA
[2] Univ Lancaster, InfoLab 21, Lancaster, England
关键词
Internet resilience; Survivability; Disruption tolerance; Dependability and performability; Reliability and availability; ns-3; simulation; Failure analysis; Challenge modeling; Threats and vulnerabilities; Network logical and physical topology; Correlated failures; FAILURES; TRENDS;
D O I
10.1007/s11235-011-9575-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Communication networks play a vital role in our daily lives and they have become a critical infrastructure. However, networks in general, and the Internet in particular face a number of challenges to normal operation, including attacks and large-scale disasters, as well as due to mobility and the characteristics of wireless communication channels. Understanding network challenges and their impact can help us to optimise existing networks and improve the design of future networks; therefore it is imperative to have a framework and methodology to study them. In this paper, we present a framework to evaluate network dependability and performability in the face of challenges. We use a simulation-based approach to analyse the effects of perturbations to normal operation of networks. We analyse Sprint logical and physical topologies, synthetically generated topologies, and present a wireless example to demonstrate a wide spectrum of challenges. This framework can simulate challenges on logical or physical topologies with realistic node coordinates using the ns-3 discrete event simulator. The framework models failures, which can be static or dynamic that can temporally and spatially evolve. We show that the impact of network challenges depends on the duration, the number of network elements in a challenge area, and the importance of the nodes in a challenge area. We also show the differences between modelling the logical router-level and physical topologies. Finally, we discuss mitigation strategies to alleviate the impact of challenges.
引用
收藏
页码:751 / 766
页数:16
相关论文
共 83 条
  • [1] [Anonymous], 2002, Proceedings of the 1st ACM workshop on Wireless security, DOI DOI 10.1145/570681.570685
  • [2] [Anonymous], 2004, REP COMM ASS THREAT
  • [3] [Anonymous], 2007, PAND INFL IMP COMM N
  • [4] [Anonymous], 2008, SEV SPAC WEATH EV UN
  • [5] [Anonymous], 2010, DESIGN ANAL 3 D GAUS
  • [6] [Anonymous], 2011, 2011 3 INT C COMM SY, DOI [10.1109/COMSNETS.2011.5716502, DOI 10.1109/COMSNETS.2011.5716502]
  • [7] [Anonymous], 2006, PAND INFL PREP RESP
  • [8] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [9] Bassiri Bijan., 2009, P 2 CANADIAN C COMPU, P83
  • [10] Brown A. B., 2004, ACM Queue, V2, P34, DOI 10.1145/1036474.1036497