J4 ›› 2013, Vol. 48 ›› Issue (11): 36-43.

• Articles • Previous Articles     Next Articles

Design and implementation of a multi-path inter-domain
routing simulator based on Click and NS2

GUO Xiao-dong, JIAO Liang, QIU Yi-hong, GE Lian-sheng   

  1. Network and Information Center, Shandong University, Jinan 250100, Shandong, China
  • Received:2013-08-19 Online:2013-11-20 Published:2013-11-25

Abstract:

To meet the requirements for the simulation and performance evaluation of multi path inter domain routing protocols, a Click and NS2 based dedicated multi path inter domain routing simulator, named MIRS, is designed and implemented. MIRS is built by embedding the Click modular software router into the NS2 simulator. The source code with MIRS may run under a simulator as well as on existent actual systems with minor modifications, thereby efficiently shortening the period of experiment and evaluation. Moreover, MIRS can improve the accuracy of simulations by accurately describing the traffic forwarding behavior of multi path routers.  Simulation was conducted with a network topology as well as the real network topology of Shandong University respectively. The results not only indicate that multi path routing has a greater advantage in improving network performance than singlepath routing, but also show that MIRS is a useful and effective tool for evaluating multipath routing protocols.

Key words: multi-path inter-domain routing; simulator; Click; NS2

CLC Number: 

  • TP393
[1] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
[2] LIU Ai-Wen, LIU Fang-Ai. Research on a RP(k)based resource awareness model [J]. J4, 2009, 44(11): 57-62.
[3] SHU Zhi-Jiang, HU An-Yin, HU Lin, LIAN Jian. Research on the method of viral mobile communication cross entropy based on video service [J]. J4, 2009, 44(9): 32-34.
[4] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
[5] LIU Ying-Hui, WANG Yang-Long, GUO Jiang, LI Dong-Yue. Channel sampling strategy of PTF with minimum time [J]. J4, 2009, 44(9): 56-59.
[6] DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78.
[7] DU Xiao-jun, LIN Bo-gang, LIN Zhi-yuan, LI Ying. Research on multiple population genetic algorithm in security software fuzzy test [J]. J4, 2013, 48(7): 79-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!