Computer P u b l i s h e d b y t h e I E E E C o m p u t e r S o c i e t ycols because designers can use it to evaluate theoretical systems. However, if the simulation doesn't reflect an important aspect of reality, it can't give insight into the operating characteristics of the system the developers are studying. Generalization and lack of rigor can lead to inaccurate data, which can result in wrong conclusions or inappropriate implementation decisions.Consider, for example, the inappropriate exercise of feature isolation. Investigators can use simulation to isolate target features by varying only those features, while holding all other parameters constant. Many manet simulations compare protocols by varying only the protocol in each simulation run.Unfortunately, the constant factors can (passively) inject inaccuracies into the simulation. This type of unintended side effect can occur when, for example, investigators run a simulation with protocol A and subsequently run the identical simulation with protocol B. Intuitively, with all other settings the same, the protocol that performs the best head-to-head should have the better performance. However, this isn't necessarily true.In reality, static features can dominate performance. For example, protocol A might outperform B at 10-megabits-per-second (mbps) bandwidth, but the converse might be true at 100 mbps. Worse yet, even if the simulation results reflect these two situations, they'd say little about performance in a 50-mbps or 500-mbps network. Omitting such intermediate-valued tests can lead to false conclusions. Determining which features to vary, how much to vary them, and in what combinations with which other features to simulate them is difficult. Often, the volume of interaction possibilities precludes thorough simulation, leading to less than rigorous validaSimulation is useful for evaluating protocol performance and operation. However, the lack of rigor with which it's applied threatens the credibility of the published research within the manet research community. Todd R. Andel and Alec YasinsacFlorida State University M obile ad hoc networks (manets) allow rapid deployment because they don't depend on a fixed infrastructure. Manet nodes can participate as the source, the destination, or an intermediate router. This flexibility is attractive for military applications, disaster-response situations, and academic environments where fixed networking infrastructures might not be available.Simulation has proven to be a valuable tool in many areas where analytical methods aren't applicable and experimentation isn't feasible. Researchers generally use simulation to analyze system performance prior to physical design or to compare multiple alternatives over a wide range of conditions. Unfortunately, errors in simulation models or improper data analysis often produce incorrect or misleading results.The mainstream approach in the manet research community follows the development, simulation, and publish process. Manet publications typically include performance s...
This paper discusses the trust-management toolkit, which is a robust and configurable protection system augmentation, which can successfully function in the presence of an untrusted (malfunctioning) smart grid (i.e., communication-based, protection system nodes). The trust-management toolkit combines reputation-based trust with network-flow algorithms to identify and mitigate faulty smart-grid protection nodes. The toolkit assigns trust values to all protection nodes. Faulty nodes, attributed to component or communication system malfunctions (either intentional or unintentional), are assigned a lower trust value, which indicates a higher risk of failure to mitigate detected faults. The utility of the toolkit is demonstrated through simulations comparing "enhanced" backup and special protection systems to original "unenhanced" systems via an analysis of variance analysis. The results show promise for the toolkit in the smart-grid protection system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.