16.11.2012 Views

Wireless Network Design: Optimization Models and Solution ...

Wireless Network Design: Optimization Models and Solution ...

Wireless Network Design: Optimization Models and Solution ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12 Simulation-Based Methods for <strong>Network</strong> <strong>Design</strong> 275<br />

operate together. Link-level simulation generally focuses on single transmitter-toreceiver<br />

link performance. The results from the link-level simulation are usually<br />

adopted as inputs to the system-level simulation. System-level simulation has been<br />

widely used to evaluate system performance with incorporation of link-level simulation<br />

curves. In order to reduce the simulation complexity, the effects of link-level<br />

technologies are abstracted into several curves that are used in a system-level simulation.<br />

An example of this mapping is covered in the WiMAX case study in Section<br />

12.5.2.<br />

After identifying which type of simulation is most suitable or available to solve<br />

the specific problem, the next step is to choose the specific modeling <strong>and</strong> simulation<br />

tool. It is always possible to build one’s own simulation tool but normally<br />

in-house development is more time consuming than using commercially available<br />

tools. When using a commercial tool, it is necessary to first make a comprehensive<br />

reading of the main limitations <strong>and</strong> assumptions of the simulation framework<br />

<strong>and</strong> the specific model to be used in the simulation. After analyzing specific model<br />

features, it is good practice to test model limitations <strong>and</strong> verify major assumptions.<br />

Often a specific tool is chosen because it has a mature simulation model for the specific<br />

communication technology that is the subject of the simulation study. This is<br />

the case in the Host Identity Protocol (HIP) case study introduced in Section 12.5.4<br />

in this chapter.<br />

To summarize, Figure 12.2 groups the different available simulation tools in accordance<br />

with the OSI layer they cover [10].<br />

Fig. 12.2 Simulation Tools

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!