skip to main content
10.1145/3603781.3603811acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Research and implementation of network impairment simulation system

Published: 27 July 2023 Publication History

Abstract

Network impairment simulation is designed to simulate different Internet network environments on a local area network(LAN) and provide testing environments for different services under various network conditions (latency, bandwidth limitations, network conflicts, etc.). This verifies the application in a real network environment. In this paper, we implement a system based on the Linux platform which communicate with the Linux kernel through netlink to achieve network damage simulation using the traffic control mechanism in Linux. In this simulation system, it also implements simulation according to certain network loss policies in besides implementing network delay, packet loss, speed limit, repetition, chaos, jitter, etc. For network delay simulation, we proposed to use sparrow search algorithm-optimized long short-term memory(SSA-LSTM) algorithm to predict future delays using past network delay data. And to perform accurate simulation in the network impairment simulation system based on the results obtained from the prediction, which makes the network impairment simulation about delay more consistent with the real WAN environment. Finally, the experiment verifies the function of the network impairment simulation system.

References

[1]
Chen F, Zhang J, Chen Z, Buffer-driven rate control and packet distribution for real-time videos in heterogeneous wireless networks[J]. IEEE Access, 2019, 7: 27401-27415.
[2]
https://www.spirent.com/assets/u/spirent_attero_datasheet
[3]
Lawrence E. Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger[M]. Eric Lawrence, 2012.
[4]
Carbone M, Rizzo L.Dummynet revisited[J]. ACM SIGCOMM Computer Communication Review, 2010, 40(2): 12-20.
[5]
jagt.clumsy[EB/OL].2016(201607)[202003].https://github.com/jagt/clumsy.
[6]
Lucas Nussbaum, Olivier Richard. A Comparative Study of Network Link Emulators. Communications and Networking Simulation Symposium (CNS'09), Mar 2009, San Diego, United States. inria-00425613
[7]
Hubert B. Linux advanced routing & traffic control HOWTO[J]. Netherlabs BV, 2002, 1: 99-107.
[8]
Zhichun Li. Research on self-similarity of network delay [J]. Internet of Things technology,2015,5(04):38-41.
[9]
Hemminger S. Network emulation with NetEm[C]//Linux conf au. 2005, 5: 2005.
[10]
LI Q,MILLS D L.Jitter based delay boundary prediction of wide-area networks[J] IEEE /ACM Trans.Networ-king,2001:578-590.
[11]
Qin Y, Song D, Chen H, A dual-stage attention-based recurrent neural network for time series prediction[J]. arXiv preprint arXiv:1704.02971, 2017.
[12]
Hochreiter S, Jü, Schmidhuber R A . Long Short-Term Memory[J]. Neural Com-putation, 1997.
[13]
Yamak P T, Yujian L, Gadosey P K. A comparison between arima, lstm, and gru for time series forecasting[C]//Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence. 2019: 49-55.
[14]
Xue J, Shen B. A novel swarm intelligence optimization approach: sparrow search algorithm[J]. Systems Science & Control Engineering, 2020, 8(1): 22-34.
[15]
Zhigljavsky A. Singular spectrum analysis for time series: Introduction to this special issue[J]. Statistics and its Interface, 2010, 3(3): 255-258.
[16]
Goyal P, Goyal A. Comparative study of two most popular packet sniffing tools-Tcpdump and Wireshark[C]//2017 9th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2017: 77-81.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CNIOT '23: Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things
May 2023
1025 pages
ISBN:9798400700705
DOI:10.1145/3603781
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 July 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SSA-LSTM
  2. network damage strategy
  3. network impairment simulation
  4. traffic control

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CNIOT'23

Acceptance Rates

Overall Acceptance Rate 39 of 82 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 21
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media