Yougu Yuan
Dartmouth College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yougu Yuan.
modeling analysis and simulation of wireless and mobile systems | 2004
David Kotz; Calvin C. Newport; Robert S. Gray; Jason Liu; Yougu Yuan; Chip Elliott
All analytical and simulation research on ad~hoc wireless networks must necessarily model radio propagation using simplifying assumptions. We provide a comprehensive review of six assumptions that are still part of many ad hoc network simulation studies, despite increasing awareness of the need to represent more realistic features, including hills, obstacles, link asymmetries, and unpredictable fading. We use an extensive set of measurements from a large outdoor routing experiment to demonstrate the weakness of these assumptions, and show how these assumptions cause simulation results to differ significantly from experimental results. We close with a series of recommendations for researchers, whether they develop protocols, analytic models, or simulators for ad~hoc wireless networks.
modeling, analysis, and simulation on computer and telecommunication systems | 2002
Michael Liljenstam; Yougu Yuan; Brian J. Premore; David M. Nicol
Large-scale worm infestations, such as last years Code Red, Code Red II, and Nimda, have led to increased interest in modeling these events to assess threat levels, evaluate countermeasures and investigate possible influence on the Internet infrastructure. However the inherently large scale of these phenomena pose significant challenges for models that include infrastructure detail. We explore the use of selective abstraction through epidemiological models in conjunction with detailed protocol models as a means to scale up simulations to a point where we can ask meaningful questions regarding a hypothesized link between worms and inter-domain routing instability. We find that this approach shows significant promise, in contrast to some of our early attempts using all-out packet level models. We also describe some approaches we are taking to collect the underlying data for our models.
Simulation | 2007
Calvin C. Newport; David Kotz; Yougu Yuan; Robert S. Gray; Jason Liu; Chip Elliott
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard response to this problem is a call for more realism in designing radio models. But how much realism is enough? This study is the first to approach this question by validating simulator performance (both at the physical and application layers) with the results of real-world data. Referencing an eXtensive set of measurements from a large outdoor routing eXperiment, we start by evaluating the relative realism of common assumptions made in radio model design, identifying those which provide a reasonable approXimation of reality. Although several such investigations have been made for static sensor networks, radio behavior in mobile network deployments is a much less-studied topic. We then reproduce our eXperimental setup in our simulator, and generate the same application-layer metrics under progressively smaller sets of these assumptions. By comparing the simulated outcome to the outcome of our eXperiment, we are able to discern at what point our balance of simplification and realism captures the real behavior of our target environment.
workshop on parallel and distributed simulation | 2004
Jason Liu; Yougu Yuan; David M. Nicol; Robert S. Gray; Calvin C. Newport; David Kotz; Luiz Felipe Perrone
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One should not underestimate the importance of validation, as inaccurate models can lead to wrong conclusions. In this paper, we use direct-execution simulation to validate radio models used by ad-hoc routing protocols, against real-world experiments. This paper documents a common testbed that supports direct execution of a set of ad-hoc routing protocol implementations in a wireless network simulator. The testbed reads traces generated from real experiments, and uses them to drive direct-execution implementations of the routing protocols. Doing so we reproduce the same network conditions as in real experiments. By comparing routing behavior measured in real experiments with behavior computed by the simulation, we are able to validate the models of radio behavior upon which protocol behavior depends. We conclude that it is possible to have fairly accurate results using a simple radio model, but the routing behavior is quite sensitive to one of this models parameters. The implication is that one should: i) use a more complex radio model that explicitly models point-to-point path loss; or ii) use measurements from an environment typical of the one of interest; or iii) study behavior over a range of environments to identify sensitivities.
workshop on parallel and distributed simulation | 2005
Michael Liljenstam; Jason Liu; David M. Nicol; Yougu Yuan; Guanhua Yan; Chris Grier
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of LANs. The simulator must be able to present a realistic rendering of network behavior as attacks are launched and players diagnose events and try counter measures to keep network services operating. We describe the architecture and function of RINSE and outline how techniques like multiresolution traffic modeling and new routing simulation methods are used to address the scalability challenges of this application. We also describe in more detail new work on CPU/memory models necessary for the exercise scenarios and a latency absorption technique that help when extending the range of client tools usable by the players.
Simulation | 2005
Jason Liu; Yougu Yuan; David M. Nicol; Robert S. Gray; Calvin C. Newport; David Kotz; Luiz Felipe Perrone
Computer simulation has been used extensively as an effective tool in the design and evaluation of systems. One should not, however, underestimate the importance of validation—the process of ensuring whether a simulation model is an appropriate representation of the real-world system. Validation of wireless network simulations is difficult due to strong interdependencies among protocols at different layers and uncertainty in the wireless environment. The authors present an approach of coupling direct-execution simulation and traces from real outdoor experiments to validating simple wireless models that are used commonly in simulations of wireless ad hoc networks. This article documents a common testbed that supports direct execution of a set of ad hoc routing protocol implementations in a wireless network simulator. By comparing routing behavior measured in the real experiment with behavior computed by the simulation, the authors validate the models of radio behavior upon which protocol behavior depends.
Simulation | 2006
Michael Liljenstam; Jason Liu; David M. Nicol; Yougu Yuan; Guanhua Yan; Chris Grier
The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of local-area networks (LANs). The simulator must be able to present a realistic rendering of network behavior as attacks are launched and players diagnose events and try counter measures to keep network services operating. The authors describe the architecture and function of RINSE and outline how techniques such as multiresolution traffic modeling, multiresolution attack models, and new routing simulation methods are used to address the scalability challenges of this application. They also describe in more detail new work on CPU/memory models necessary for the exercise scenarios and a latency absorption technique that will help when extending the range of client tools usable by the players.
modeling analysis and simulation of wireless and mobile systems | 2004
Robert S. Gray; David Kotz; Calvin C. Newport; Nikita Dubrovsky; Aaron Fiske; Jason Liu; Christopher Masone; Susan P. McGrath; Yougu Yuan
Archive | 2001
James H. Cowie; Andrew T. Ogielski; Brian J. Premore; Yougu Yuan
Storage and Retrieval for Image and Video Databases | 2002
James H. Cowie; Andrew T. Ogielski; Brian J. Premore; Yougu Yuan