Filling in the missing link between simulation and application in opportunistic networking

Adrián Sánchez-Carmona, Frédéric Guidec, Pascale Launay, Yves Mahéo, Sergi Robles

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Abstract

© 2018 Elsevier Inc. In the domain of opportunistic networking, just like in any other domain of computer science, the engineering process should span all stages between an original idea and the validation of its implementation in real conditions. Yet most researchers often stop halfway along this process: they rely on simulation to validate the protocols and distributed applications they design, and neglect to go further. Their algorithms are thus only rarely implemented for real, and when they are, the validation of the resulting code is usually performed at a very small scale. Therefore, the results obtained are hardly repeatable or comparable to others. LEPTON is an emulation platform that can help bridge the gap between pure simulation and fully operational implementation, thus allowing developers to observe how the software they develop (instead of pseudo-code that simulates its behavior) performs in controlled, repeatable conditions. In this paper we present LEPTON, an emulation platform we developed, and we show how existing opportunistic networking systems can be adapted to run with this platform. Taking two existing middleware systems as use cases, we also demonstrate that running demanding scenarios with LEPTON constitute an excellent stress test and a powerful tool to improve the opportunistic systems under test.
Original languageEnglish
Pages (from-to)57-72
JournalJournal of Systems and Software
Volume142
DOIs
Publication statusPublished - 1 Aug 2018

Keywords

  • Distributed systems
  • Emulation systems
  • Opportunistic networking
  • Software development process
  • Software evaluation

Fingerprint Dive into the research topics of 'Filling in the missing link between simulation and application in opportunistic networking'. Together they form a unique fingerprint.

Cite this