Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yougu Yuan is active.

Publication


Featured researches published by Yougu Yuan.


modeling analysis and simulation of wireless and mobile systems | 2004

Experimental evaluation of wireless simulation assumptions

David Kotz; Calvin C. Newport; Robert S. Gray; Jason Liu; Yougu Yuan; Chip Elliott

All analytical and simulation research on ad~hoc wireless networks must necessarily model radio propagation using simplifying assumptions. We provide a comprehensive review of six assumptions that are still part of many ad hoc network simulation studies, despite increasing awareness of the need to represent more realistic features, including hills, obstacles, link asymmetries, and unpredictable fading. We use an extensive set of measurements from a large outdoor routing experiment to demonstrate the weakness of these assumptions, and show how these assumptions cause simulation results to differ significantly from experimental results. We close with a series of recommendations for researchers, whether they develop protocols, analytic models, or simulators for ad~hoc wireless networks.


modeling, analysis, and simulation on computer and telecommunication systems | 2002

A mixed abstraction level simulation model of large-scale Internet worm infestations

Michael Liljenstam; Yougu Yuan; Brian J. Premore; David M. Nicol

Large-scale worm infestations, such as last years Code Red, Code Red II, and Nimda, have led to increased interest in modeling these events to assess threat levels, evaluate countermeasures and investigate possible influence on the Internet infrastructure. However the inherently large scale of these phenomena pose significant challenges for models that include infrastructure detail. We explore the use of selective abstraction through epidemiological models in conjunction with detailed protocol models as a means to scale up simulations to a point where we can ask meaningful questions regarding a hypothesized link between worms and inter-domain routing instability. We find that this approach shows significant promise, in contrast to some of our early attempts using all-out packet level models. We also describe some approaches we are taking to collect the underlying data for our models.


Simulation | 2007

Experimental Evaluation of Wireless Simulation Assumptions

Calvin C. Newport; David Kotz; Yougu Yuan; Robert S. Gray; Jason Liu; Chip Elliott

All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard response to this problem is a call for more realism in designing radio models. But how much realism is enough? This study is the first to approach this question by validating simulator performance (both at the physical and application layers) with the results of real-world data. Referencing an eXtensive set of measurements from a large outdoor routing eXperiment, we start by evaluating the relative realism of common assumptions made in radio model design, identifying those which provide a reasonable approXimation of reality. Although several such investigations have been made for static sensor networks, radio behavior in mobile network deployments is a much less-studied topic. We then reproduce our eXperimental setup in our simulator, and generate the same application-layer metrics under progressively smaller sets of these assumptions. By comparing the simulated outcome to the outcome of our eXperiment, we are able to discern at what point our balance of simplification and realism captures the real behavior of our target environment.


workshop on parallel and distributed simulation | 2004

Simulation validation using direct execution of wireless Ad-Hoc routing protocols

Jason Liu; Yougu Yuan; David M. Nicol; Robert S. Gray; Calvin C. Newport; David Kotz; Luiz Felipe Perrone

Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One should not underestimate the importance of validation, as inaccurate models can lead to wrong conclusions. In this paper, we use direct-execution simulation to validate radio models used by ad-hoc routing protocols, against real-world experiments. This paper documents a common testbed that supports direct execution of a set of ad-hoc routing protocol implementations in a wireless network simulator. The testbed reads traces generated from real experiments, and uses them to drive direct-execution implementations of the routing protocols. Doing so we reproduce the same network conditions as in real experiments. By comparing routing behavior measured in real experiments with behavior computed by the simulation, we are able to validate the models of radio behavior upon which protocol behavior depends. We conclude that it is possible to have fairly accurate results using a simple radio model, but the routing behavior is quite sensitive to one of this models parameters. The implication is that one should: i) use a more complex radio model that explicitly models point-to-point path loss; or ii) use measurements from an environment typical of the one of interest; or iii) study behavior over a range of environments to identify sensitivities.


workshop on parallel and distributed simulation | 2005

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises

Michael Liljenstam; Jason Liu; David M. Nicol; Yougu Yuan; Guanhua Yan; Chris Grier

The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of LANs. The simulator must be able to present a realistic rendering of network behavior as attacks are launched and players diagnose events and try counter measures to keep network services operating. We describe the architecture and function of RINSE and outline how techniques like multiresolution traffic modeling and new routing simulation methods are used to address the scalability challenges of this application. We also describe in more detail new work on CPU/memory models necessary for the exercise scenarios and a latency absorption technique that help when extending the range of client tools usable by the players.


Simulation | 2005

Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols

Jason Liu; Yougu Yuan; David M. Nicol; Robert S. Gray; Calvin C. Newport; David Kotz; Luiz Felipe Perrone

Computer simulation has been used extensively as an effective tool in the design and evaluation of systems. One should not, however, underestimate the importance of validation—the process of ensuring whether a simulation model is an appropriate representation of the real-world system. Validation of wireless network simulations is difficult due to strong interdependencies among protocols at different layers and uncertainty in the wireless environment. The authors present an approach of coupling direct-execution simulation and traces from real outdoor experiments to validating simple wireless models that are used commonly in simulations of wireless ad hoc networks. This article documents a common testbed that supports direct execution of a set of ad hoc routing protocol implementations in a wireless network simulator. By comparing routing behavior measured in the real experiment with behavior computed by the simulation, the authors validate the models of radio behavior upon which protocol behavior depends.


Simulation | 2006

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)

Michael Liljenstam; Jason Liu; David M. Nicol; Yougu Yuan; Guanhua Yan; Chris Grier

The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of local-area networks (LANs). The simulator must be able to present a realistic rendering of network behavior as attacks are launched and players diagnose events and try counter measures to keep network services operating. The authors describe the architecture and function of RINSE and outline how techniques such as multiresolution traffic modeling, multiresolution attack models, and new routing simulation methods are used to address the scalability challenges of this application. They also describe in more detail new work on CPU/memory models necessary for the exercise scenarios and a latency absorption technique that will help when extending the range of client tools usable by the players.


modeling analysis and simulation of wireless and mobile systems | 2004

Outdoor experimental comparison of four ad hoc routing algorithms

Robert S. Gray; David Kotz; Calvin C. Newport; Nikita Dubrovsky; Aaron Fiske; Jason Liu; Christopher Masone; Susan P. McGrath; Yougu Yuan


Archive | 2001

Global routing instabilities during code red ii and nimda worm propagation

James H. Cowie; Andrew T. Ogielski; Brian J. Premore; Yougu Yuan


Storage and Retrieval for Image and Video Databases | 2002

Internet Worms and Global Routing Instabilities

James H. Cowie; Andrew T. Ogielski; Brian J. Premore; Yougu Yuan

Collaboration


Dive into the Yougu Yuan's collaboration.

Top Co-Authors

Avatar

Jason Liu

Florida International University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chris Grier

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge