Direct Code Execution: Realistic Protocol Simulation with Running Code
نویسندگان
چکیده
We propose the demonstration of Direct Code Execution (DCE), a framework of network simulation running with both existing Linux kernel space protocol stack and POSIX socket based protocol implementations, to achieve a set of requirements for reproducible network experiment: 1) experimentation realism, 2) topology flexibility, 3) easy and low cost replication, 4) experimentation scalability, and 5) easy debugging. Our demonstration showcases the typical use cases of DCE: content centric networking over mobile ad hoc network with CCNx, and seamless handoff experiment with Linux the Multipath TCP implementation.
منابع مشابه
Siemens primus accelerator simulation using EGSnrc Monte Carlo code and gel dosimetry validation with optical computed tomography system by EGSnrc code
Monte Carlo method is the most accurate method for simulation of radiation therapy equipment. The linear accelerators (linac) are currently the most widely used machines in radiation therapy centers. Monte Carlo modeling of the Siemens Primus linear accelerator in 6 MeV beams was used. Square field size of 10 × 10 cm2 produced by the jaws was compared with TLD. Head simulation of Siemens accele...
متن کاملSimulation a Natural Gas Direct Injection Stratified Charge with Spark Ignition Engine
The purpose of present paper is simulation a direct injection stratified charge natural gas engine. The KIVA-3V code was used for gaseous fuel injection simulation. Compression and expansion stroke of engine cycle is simulated using KIVA-3V code. In cylinder fuel equivalence ratio distribution criterion is used for studying mesh independency. The results show that 550000 cells number is suff...
متن کاملTtp Sim : a Versatile Simulation Environment for Ttp/c
Future electronic systems for the implementation of safety-critical applications on-board automotive vehicles will be based on distributed embedded systems. The most critical component in such systems is the communication network that connects the individual electronic modules. For reasons of costs, composability, ease of validation, and certiication the use of time-triggered communication prot...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملExtending a serial 3D two-phase CFD code to parallel execution over MPI by using the PETSc library for domain decomposition
To leverage the last two decades’ transition in HighPerformance Computing (HPC) towards clusters of compute nodes bound together with fast interconnects, a modern scalable CFD code must be able to efficiently distribute work amongst several nodes using the Message Passing Interface (MPI). MPI can enable very large simulations running on very large clusters, but it is necessary that the bulk of ...
متن کامل