{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:27Z","timestamp":1761611427733,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T00:00:00Z","timestamp":1501459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Grant-in-Aid for Scientific Research","award":["26280028 and 15H02697"],"award-info":[{"award-number":["26280028 and 15H02697"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Model. Comput. Simul."],"published-print":{"date-parts":[[2017,7,31]]},"abstract":"<jats:p>The recent popularization of mobile devices has increased the amount of communication traffic. Hence, it is necessary both in academia and industry to research load distribution methods for mobile networks. An evaluation environment for large-scale networks that behaves like a practical system is necessary to evaluate these methods, and either a physical environment or simulation environment can be used. However, physical and simulation environments each have their advantages and disadvantages. A physical environment is suitable for practical operation because it is possible to obtain data from a real environment. In contrast, the cost for a large number of nodes and the difficulty of field preparation are its disadvantages. Reproducing radio propagation is also a challenge. Network simulators solve the disadvantages of the physical environment by modeling the entire evaluation environment. However, they do not exactly reproduce the physical environment because the nodes are abstracted. This article presents an evaluation environment that combines a network simulator and virtual machines with virtual wireless Local Area Network (LAN) devices. The virtual machines reproduce the physical environment with high fidelity by running the programs of the physical machines, and the virtual wireless LAN devices make it possible to emulate wireless LAN communication using default operating system drivers. A network simulator and virtual machines also reduce the cost for nodes, ease the burden of field preparation, and reproduce radio propagation by modeling the evaluation environment. In the evaluation, the proposed method decreased the difference from the physical environment to 5% in terms of transmission control protocol throughput. In the case of user datagram protocol, the proposed method decreased the difference from the physical environment down to 1.7%. The number of virtual machines available on a host machine and the practical use of the proposed method are also discussed.<\/jats:p>","DOI":"10.1145\/3067664","type":"journal-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:12Z","timestamp":1501702572000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Virtual WLAN Device Model for High-Fidelity Wireless Network Emulation"],"prefix":"10.1145","volume":"27","author":[{"given":"Takaaki","family":"Kawai","sequence":"first","affiliation":[{"name":"Graduate School of Informatics, Shizuoka University, Shizuoka, Japan"}]},{"given":"Shigeru","family":"Kaneda","sequence":"additional","affiliation":[{"name":"Space-Time Engineering, LLC, Rolling Hills Estates, CA, USA"}]},{"given":"Mineo","family":"Takai","sequence":"additional","affiliation":[{"name":"Osaka University, Japan\/University of Califonia, Los Angeles, CA, USA"}]},{"given":"Hiroshi","family":"Mineno","sequence":"additional","affiliation":[{"name":"College of Informatics, Academic Institute, Shizuoka University, Shizuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6507401"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.647"},{"volume-title":"Retrieved","year":"2015","author":"Dugan Jon","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2717308"},{"volume-title":"Proc. SIGCOMM\u201908","author":"Henderson Thomas R.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287767.1287774"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"volume-title":"Linux kernel backports. Retrieved","year":"2015","author":"Linux","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641798.2655182"},{"key":"e_1_2_1_13_1","first-page":"1541","article-title":"Implementation and evaluation of a wireless system emulator","volume":"55","author":"Mano Hiroshi","year":"2014","journal-title":"IPSJ Journal"},{"volume-title":"Proc. TRIDENTCOM\u201911","year":"2011","author":"Miyachi Toshiyuki","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2007.4297409"},{"volume-title":"Retrieved","year":"2015","author":"National Institute of Information and Communications Technology. 2015. StarBED3.","key":"e_1_2_1_16_1"},{"volume-title":"EMANE User Manual 0.8.1. Retrieved","year":"2015","author":"Communication Systems Branch Networks","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263140"},{"volume-title":"The network simulator - ns-2. Retrieved","year":"2015","key":"e_1_2_1_19_1"},{"volume-title":"open80211s. Retrieved","year":"2015","key":"e_1_2_1_20_1"},{"volume-title":"Retrieved","year":"2015","author":"QEMU.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"volume-title":"Retrieved","year":"2015","author":"Technology Riverbed","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"volume-title":"Retrieved","year":"2015","author":"Network Technologies SCALABLE","key":"e_1_2_1_25_1"},{"volume-title":"Retrieved","year":"2015","author":"Network Technologies SCALABLE","key":"e_1_2_1_26_1"},{"volume-title":"Retrieved","year":"2015","author":"Engineering Space-Time","key":"e_1_2_1_27_1"},{"volume-title":"Scenargie dot eleven module. Retrieved","year":"2015","author":"Engineering Space-Time","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","first-page":"1","article-title":"VirtualMesh: An emulation framework for wireless mesh networks in OMNeT++. In Proc. SIMUTools\u201909","volume":"64","author":"Staub Thomas","year":"2009","journal-title":"ICST"},{"key":"e_1_2_1_30_1","first-page":"1","article-title":"An overview of the OMNeT++ simulation environment. In Proc. SIMUTools\u201908","volume":"60","author":"Varga Andr\u00e1s","year":"2008","journal-title":"ICST"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093273"},{"volume-title":"Proc. SIMUTools\u201911","year":"2011","author":"Weing\u00e4rtner Elias","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.simutools.2014.254623"},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952706"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/278009.278027"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513813"}],"container-title":["ACM Transactions on Modeling and Computer Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3067664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3067664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:18Z","timestamp":1750217418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3067664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,31]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7,31]]}},"alternative-id":["10.1145\/3067664"],"URL":"https:\/\/doi.org\/10.1145\/3067664","relation":{},"ISSN":["1049-3301","1558-1195"],"issn-type":[{"type":"print","value":"1049-3301"},{"type":"electronic","value":"1558-1195"}],"subject":[],"published":{"date-parts":[[2017,7,31]]},"assertion":[{"value":"2016-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}