2012 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2012
DOI: 10.1109/hpcsim.2012.6266937
|View full text |Cite
|
Sign up to set email alerts
|

DEVS simulation of peer-to-peer file-sharing

Abstract: Abstract-We present a framework to simulate a peer-topeer (P2P) file-sharing network, based on the Discrete Event Systems Specification (DEVS) formalism. Our framework models a file-sharing network as a coupled model, comprising a network model and a large number of peer models. While most available network simulation tools focus on transportlevel dynamics, we provide extensible and reusable models for the file-sharing protocol and for the behavior of peers. These models, implemented using the CD++ toolkit, ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…In (Chuan et al 2007) the authors present an event-driven intrusion detection architecture using the DEVS formalism and DEVS-Java for the implementation and the validation of the model. In (Davoust et al 2012), the authors introduced a DEVS framework for the simulation of peer-to-peer (P2P) file sharing that provides extensible and reusable models for the file sharing protocol and for the behavior of the peers. In (Ahmed et al 2005), a tool for the modeling and simulation of networks was presented.…”
Section: Related Workmentioning
confidence: 99%
“…In (Chuan et al 2007) the authors present an event-driven intrusion detection architecture using the DEVS formalism and DEVS-Java for the implementation and the validation of the model. In (Davoust et al 2012), the authors introduced a DEVS framework for the simulation of peer-to-peer (P2P) file sharing that provides extensible and reusable models for the file sharing protocol and for the behavior of the peers. In (Ahmed et al 2005), a tool for the modeling and simulation of networks was presented.…”
Section: Related Workmentioning
confidence: 99%
“…Following this approach would have nonetheless been feasible: we published [150] a preliminary study using data from another domain: it is detailed in appendix A.…”
Section: Approachmentioning
confidence: 99%