Computer Network Simulation With ns-3 A Systematic
Computer Network Simulation With ns-3 A Systematic
Article
Computer Network Simulation with ns-3: A
Systematic Literature Review
Lelio Campanile 1 , Marco Gribaudo 2 , Mauro Iacono 1, * , Fiammetta Marulli 1 and
Michele Mastroianni 1
1 Dipartimento di Matematica e Fisica, Università degli Studi della Campania “Luigi Vanvitelli”,
81100 Caserta, Italy; [email protected] (L.C.); [email protected] (F.M.);
[email protected] (M.M.)
2 Dipartimento di Elettronica, Informatica e Bioingegneria, Politecnico di Milano, 20133 Milano, Italy;
[email protected]
* Correspondence: [email protected]
Received: 31 December 2019; Accepted: 28 January 2020; Published: 5 February 2020
Abstract: Complexity of current computer networks, including e.g., local networks, large structured
networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform
analysis and support design. Simulation is a tool of paramount importance to encompass all the
different aspects that contribute to design quality and network performance (including as well energy
issues, security management overheads, dependability), due to the fact that such complexity produces
several interactions at all network layers that is not easily modellable with analytic approaches. In
this systematic literature review we aim to analyze, basing our investigation on available literature,
the adoption of a popular network simulator, namely ns-3, and its use in the scientific community.
More in detail, we are interested in understanding what are the impacted application domains in
which authors prefer ns-3 to other similar tools and how extensible it is in practice according to the
experience of authors. The results of our analysis, which has been conducted by especially focusing on
128 papers published between 2009 to 2019, reveals that 10% of the evaluated papers were discarded
because they represented informal literature; most of the studies presented comparisons among
different network simulators, beyond ns-3 and conceptual studies related to performance assessment
and validation and routing protocols. Only about 30% of considered studies present extensions of
ns-3 in terms of new modules and only about 10% present effective case studies demonstrating the
effectiveness of employing network simulator in real application, except conceptual and modeling
studies.
Keywords: computer networks; simulation; ns-3; wireless sensor networks; network performance;
systematic literature review
1. Introduction
Computer networks are currently a cornerstone not only in traditional computing or business
environment, but also in many different application fields, such as cloud facilities, Industry 4.0,
Wireless Sensor Networks (WSN), CyberPhysical Systems (CPS), 5G communication systems, critical
infrastructures protection, automotive, railways, military applications such as ground support,
Command, Control, Communications and Intelligence (C3I), modern military air force systems, and
many other possible examples. Computer networking took the place of other traditional technologies
with the aim of providing richer services, adaptation to different conditions, reconfigurability,
system-wide and node-wide intelligence, flexibility, interoperability, thanks to the fact that network
architectures are layered, scalable, evolvable and adaptable, and to the intrinsic advantages of digital
data orientation. The modularity of network technologies allows the independent development of
standards that focus on individual problems and allow reuse of solutions and concurrent design
of different layers for the same architecture or for different architectures to be made compatible or
interoperable.
Modern networking technologies include hardware and software components. The availability of
more reliable and faster computing hardware is changing the balance between hardware and software
and the structure of network devices as well: currently, both embedded, mainly hardware-based
nodes may coexist with mainly software-based nodes, in which analogous functions are provided
with different tools, and Software Defined Networks (SDN) are spreading aside conventional
hardware-based infrastructures, basically reducing the logical portion of a network that is necessarily
implemented in hardware to the essential components that ensure the connection. This evolution,
mainly pushed by the needs of cloud infrastructures and large computing infrastructures in general,
such as warehouse scale computers, to allow easier deployment, control and management of complex
networks, in turn enables a change of paradigm from distributed network control and logic to a
centralized approach, including the ability of a nearly complete reconfiguration of all network nodes in
a large installation by a single control and management node. In some scenarios, moreover, the higher
levels of the network stacks might be completely implemented in the cloud, such as in the case of 5G
technologies that blur the communication and computing portions of the system, or, less extremely, 4G
technologies that delegate some functions from the cell antenna to the terminals.
When analyzing or integrating a computer network, this heterogeneity in hardware and software
and the wide transparency in the interoperability of components results in a potentially lower
knowledge of non-controllable nodes. The higher the number of vendors, the number of interacting
technologies, the dimension and extension of the network, the amount of numbers, the heterogeneity in
the services and layers, the security requirements, the survivability requirements, the more difficult is to
model and understand faithfully the dynamics of the network. A low fidelity impacts significantly the
results of assessments when the complexity of the network is not trivial, so the availability of modular
simulation-based tools to support the process is a real need to avoid dramatic underestimation of
network problems or erroneous assumptions on network behavior that may have serious consequences:
for example, in evaluating the extension of the attack surface in a IoT system, the reliability of an
Industry 4.0 installation or the performance of multimedia delivery systems.
The use of modular simulation allows building a coherent model of a network with different
levels of detail. The level of detail may, in principle, vary between high-level, behavioral
modeling and emulation. The availability of modular, extensible, programmable, open, open-source,
community-supported and community-driven simulation tools or simulation frameworks gives the
modeler the possibility of producing simulation scenarios with any desired level of detail, even with
an heterogeneous level in different simulated nodes, portions of network or subsystems, provided
that a component for the simulation tool is available or autonomously developed by the modeler for
the purpose. The extensibility allows the definition of new components for experimental or future
real-world networks components, as well as the implementation of different versions of the same
real-world networks component with a different inner complexity to manage with the duration of large
simulation runs or to interface, in case, real-world networks components with simulated components.
Modularity and extensibility enable component reuse, thus empowering the modeling process
with well-tested, well-documented third-party components with little effort by the modeler, faster
model development, incremental modeling strategies, comparative simulation for cross-validation
by means of alternative modules, parameterization of models, definition of semifinished models
or model portions, up to the support for structured modeling and analysis processes, including
standardized processes in the framework of industrial certifications. Openness guarantees the legal
rights needed for extension, while open-sourceness guarantees inspectability of code for debug,
verification or certification of simulations, or easy refactorization of components to evolve them with
the simulation software infrastructure, and portability between version. Community-supportedness
Electronics 2020, 9, 272 3 of 25
fosters the collective effort to produce or improve new components, to augment the usefulness of the
simulation tool and to strengthen the effectiveness of its use into simulation processes, or, together
with open-sourceness, the implementation of third-party tools to support or automate simulation
campaigns, simulation generation, model-based simulation development or other useful tools that
ease or empower the management of simulation and its application in structured development and
assessment processes and methodologies.
Many alternatives exist for computer network simulation: in this Systematic Literature Review
(SLR) we focus on ns-3 (www.nsnam.org/), a modular, programmable, extensible, open, open-source,
community-supported simulation framework for computer networks. Our choice is due to the fact
that the technical characteristics of ns-3 match the needs of our research activities, and to the increasing
popularity that this tool is gaining among the computer networks research community and, slowly,
among professionals.
ns-3 is an open computer networks simulation environment that is based on discrete-event
simulation. In such a simulator, each event is associated with its execution time, and the simulation
proceeds by executing events in the temporal order of simulation time. When an event is processed,
it may generate zero, one or more events. As a simulation executes, events are consumed, but more
events may (or may not) be generated. The simulation will stop automatically when no further events
are in the event queue, or when a special "Stop" event is found [1].
It is designed for research use, thinking of the needs of the research community, and fosters
a community-based collaboration model both to support the development of new modules and to
perform validation or peer review activities across different groups. ns-3 is distributed under an
open-source model and a free software paradigm. The simulation environment is designed to allow
its use as a real-time emulator as well, integrating simulated portions and physical portions in the
same network. This level of integration is provided by a real-time scheduler, besides the simulation
support, to enable simulation-in-the-loop. The simulator is intended to be used by means of its API
inside programmatic descriptions of users’ scenarios and configurations, which may be developed
following usual workflows and processes. The API is used to produce outputs in terms of traces that
are coherent with the traces that may be obtained by observing traffic in real-world networks with tools
like Wireshark (https://www.wireshark.org/) or TCPdump (https://www.tcpdump.org/), so that
they may be analyzed by the same tools that are already in use for experimental setups or diagnostics.
The authors of ns-3 explicitly state that they aim at allowing the reuse of real-world implementation
of protocols in ns-3, so that the effort for the design and production of very detailed simulation
components is reduced as much as possible. The goal is to provide a very realistic simulation support
for a large number of different type of network infrastructures, communication and routing protocols,
technologies, layers, allowing network-enabled software to run on top of the simulation with minimal
effort (e.g., virtual machines).
ns-3 is the result of a long experience that evolved through two previous simulators (namely ns-1
and ns-2): however, the development team decided to completely restart from scratch the design and
development process with ns-3 on different premises, with no backward compatibility, actually giving
birth to a completely new artifact but keeping and leveraging the experience from previous versions.
ns-3 simulations may be written in C++ and Python, and their basic setup and execution is guided by
a process suggested by the development team. ns-3 has been designed to be scalable.
We believe that ns-3 has a significant potential and we expect its community to grow. We
compared it against alternatives, and our internal evaluation led us to choose ns-3 over them. However,
after a test period on several scenarios that are in the scope of our research activities, we decided to
corroborate our evaluation with a SLR before using it to support the activities of a research project.
Our investigation aims to understand what are the actual diffusion and the actual use of ns-3 in
the research community, also to leverage literature to individuate possible weaknesses and limits of the
tool that may affect the progress and the result of our research activities, and to classify the application
areas in which adoption is wider and potential community support is stronger, more reactive and
Electronics 2020, 9, 272 4 of 25
more intense, as well as the practically available modules and extensions that have been published and
integrated. We also decided not to contact or involve the ns-3 development team while conducting
this SLR to avoid any bias, to actually rely on the scientific papers we were able to find, identify and
obtain by ourselves by using the main research papers search engines, listed in Table 2: by the way,
the development team does not provide a list of papers mentioning ns-3 to be used for a SLR. We
excluded non-indexed documents to be sure that our sources have been peer reviewed or at least
referred or considered to be reliable by the scientific community. We considered all scientific papers
indexed by the indexes between 2009 and mid October 2019.
This paper is organized as follows: in Section 2 a set of popular networking oriented simulators
is presented and examined; in Section 3 the review process is described and the methodology is
presented that has been used for this review; in Section 4 the research questions that guide this study
are presented and discussed; in Section 5 the methods for conducting the study are detailed; in Section 6
the results of the study are provided and commented; finally, Section 7 draws the conclusions resulting
from the study.
2. Related Work
Simulation is a widely accepted tool in the field of computer networks. Literature offers both free
and commercial simulation tools that aim at supporting, at different levels and with different purposes,
design and analysis of computer networks. With no claim to completeness, this Section presents some
relevant cases to provide a first reference to the readers.
Within the category of open-source simulators, besides ns-3 literature reports ns-2, OMNET++
and SWANS as noticeable examples.
ns-2 (https://www.isi.edu/nsnam/ns/), actually the previous version of ns-3, deserves to be
mentioned as a different tool, because it is still widely used notwithstanding it is not maintained
anymore and its last version has been released in 2011, since, as previously reported, ns-3 has been
completely redesigned on a different basis. ns-2 implements discrete-event simulation. ns-2 is
characterized by a separation between the approach to the definition of the simulated components and
the approach to the definition of simulation management and setup: the first is based on a compiled
software base, programmed in C++, including the components defined by the user or third parties,
if any, while the second is managed by interpreted code written in OTcl, an object-oriented extension
of the popular Tcl language, to ease the process. ns-2 has a significant base of available simulation
components, due both to its popularity and lifespan, including protocols, reusable simulation objects
that represent real-world equipment or routing algorithms. Support exist for wired and wireless
networks, mobile networks, generation of specific patterns of traffic and energy-oriented evaluation.
Its wide adoption fostered the development of third-party tools that partially compensate its limited
support for visual management and analysis.
OMNET++ (https://omnetpp.org/) is an event-based simulator that aims to provide a generic
support to all kind of networked systems, from mobile networks to on-chip networks. The core of the
simulator is a C++-based kernel that provides several services on which different application areas are
made available by additional third-party frameworks, including very different cases such as photonic
networks or sensor networks, or more abstract system performance modeling tools such as queuing
networks: the official website reports a very comprehensive list of domains that have been covered
by users and made publicly available under open-source licenses. OMNET++ provides a proprietary
scripting language to describe topologies in model setups and can be used both from the command
line and a rich graphical user interface. Models and components may be specified by an event-based
paradigm and a process-oriented paradigm. The simulation kernel, designed for portability, allows
distributed and parallel execution to support large simulation scenarios and speed up the runs. The
simulation definition process is integrated in Eclipse to ease setup and management, and interactive
simulation is provided. OMNET++ supports analysis of performance metrics by visual tools.
Electronics 2020, 9, 272 5 of 25
It is worth noting that literature also reports the implementation of network simulations based on
general purpose simulation frameworks that have not been considered in the scope of this analysis.
3. SLR Process
A SLR is a methodology designed to evaluate and obtain information about a specific argument
and about one or more punctual research question(s). A SLR should provide an accurate and rigorous
analysis of the topic of interest by means of a well-documented and standard process that evolves into
three main phases (see Figure 1):
• Planning
• Conducting
• Reporting the results
Electronics 2020, 9, 272 6 of 25
4. Research Questions
To manage the goals of our review, we defined two research questions to guide the process:
• RQ1: which are the impacted application domains, according to the literature?
• RQ2: how easily extensible did ns-3 prove to be with respect to its adaptation to new domains
or uses?
As we aim at providing a way to introduce to ns-3 to potential users (like our research group) that
do research activities on which it could have a positive impact, the purpose of the two questions is to
document that the scientific community actually uses it in several areas and that those areas have been
covered by native or third-party modules or extensions, so it is likely that other areas that may be of
interest for potential users may be easily covered in the future or by investing in the development of
new modules or extensions in first person.
RQ1 has been used to search and categorize the main research areas in which ns-3 has been
successfully adopted: from this question three other refining questions have been derived that help to
categorize with more details the use cases:
RQ2 tries and measures qualitatively how simple and effective is to implement custom modules
and extensions to use ns-3 in new application areas or in a way it was not designed for. This being a
qualitative measure, the related answer derives from an evaluation, done by this authoring team, that
is partially founded onto explicit elements provided in the papers by their authors, partially founded
on the technical descriptions provided in the papers and partially founded onto the number and
frequency of presented extensions in the literature. Two other refining questions have been derived:
5. Review Methods
To identify our set of documents, we submitted some “free keywords”-based queries in 4 Research
Documents Portals, namely Google Scholar Search Engine, Elsevier Search, Springer Open Access, IEEE
Explore Digital Library (IEEE E.D.L) and The ACM Digital Library. All the queries were submitted
filtering documents in the English language only. As first, we tried with the only keyword “ns3”: all of
these search portals provided research papers dealing with a unique topic related to medicine and
chemistry domain; almost in the most of these documents, the keyword "ns3" is an acronym standing
for a multifunctional inhibitor protein for the hepatitis C virus. Conversely, adopting the bi-gram
“ns-3”, which is the correct spelling of the name of the simulator, we just observed different behaviors
for the considered search portals. A numerical comparison between the number of documents retrieved
by adopting the “ns3” and “ns-3” keywords over the 4 considered sources, for the English language
and in the time interval in 2009–2019, is summarized in Table 3.
Elsevier and Springer exhibited the worst behaviors, since they were not able to provide a
fine-grained selection of documents, even if the keywords changed. Springer retrieved 21 documents
for the “ns3” keyword and only 2 over 21 were related to Computer Science (e.g., we retrieved the
2019 Lecture Notes in Networks and Systems), even if the research category filter “Engineering” was
applied. Conversely, looking for keyword “ns-3”, the number of retrieved documents amount to over
70 thousands but no matching documents to the network simulator were found yet. Documents
Electronics 2020, 9, 272 9 of 25
retrieved by Google Scholar well represented the discrepancy among the “ns3” and the “ns-3”
keywords. In the first case, the most of retrieved documents were related to the inhibitor protein; in
the latter case, the most of documents matched the network simulation domain and were compliant
to our research aim. Also results obtained by IEEE E.D.L. were interesting. Unlike Google Scholar,
it was able to retrieve a significant number of relevant documents to the network simulator ns-3 both
with “ns3” and “ns-3” keywords. The ACM Digital Library reported respectively 394 and 290,550
papers. Finally, we applied a cross selection strategy over all the relevant documents we retrieved
by submitting the described queries to the 5 sources; we adopted, in order to select the 112 analyzed
documents, as selection criteria the number of references and citation, the novelty of proposals for ns-3
modules extensions and the applications detailed in the following Sections.
The final search strategy followed to form the searching query makes use of the traditional
1998 version of the ACM Category classification as in Table 4 (available at https://www.acm.org/
publications/computing-classification-system/1998/ccs98). We decided to use this categorization
to leverage an authoritative, well known and widely accepted set of reference criteria and to avoid
any kind of bias that might have been influencing the selection process because of our knowledge
about the topic or our personal research experiences, points of view and perspectives. We wanted to
avoid a search strategy that could be too subject to our personal understanding of the topic, which is
driven by the way in which we approached it in the past, and may have suggested biased keywords
for queries. For the same reason, we decided to give a primary role to Scopus as main reference for
retrieving the starting set of papers, as Scopus indexes papers from different publishers, from different
kind of sources and from different disciplines, while others are limited to own publications and tend to
suggest more papers than the ones that seemed actually relevant to our purpose for us. Analogously,
we decided to use the old version of the ACM classification with respect to the new one because it
is used by other publishers and institutions than ACM, and it does not especially privilege papers
published by ACM in the considered period, as the new version has been adopted in 2012.
To obtain the standard set of keywords for the definition of queries, we selected
Topic C, “Computer Systems Organization”, with sub-topic C.2, "COMPUTER-COMMUNICATION
NETWORKS", so we performed our queries referring to the sub-sub-topics of C.2 listed in Table 4,
using the most significant words as keywords.
C.2.0 General
C.2.1 Network Architecture and Design
C.2.2 Network Protocols
C.2.3 Network Operations
C.2.4 Distributed Systems
C.2.5 Local and Wide-Area Networks
C.2.6 Internetworking
C.2.m Miscellaneous
Based on this classification, equivalent queries have been defined for each index with the needed
syntax. For example, the query defined for Scopus is:
“( TITLE-ABS-KEY ( ns3 AND computer AND communication AND networks ) AND (( network
AND architecture AND design ) OR (Network AND Protocols) OR (Network AND Operation) OR
(Distributed OR System) OR (local OR wide AND networks) OR (internetworking) ))”.
The query has been obtained by considering the keyword “ns3” and relevant keywords from
Table 4. As stated previously, Scopus has been chosen as the main reference because of its primary role,
because it indexes papers from different publishers and because its filtering mechanisms was a better
fit to obtain an appropriate coherence between resulting papers and relevance to the focus; the other
databases have been then manually searched with similar ad hoc queries to look for relevant results
not indexed by Scopus, as they tend to expand the results set with borderline or non-relevant papers.
Electronics 2020, 9, 272 10 of 25
implementation 31
implementing 2
improved 2
improvement 1
improving 2
enhancing 1
extending 2
extension 3
integration 1
integrating 1
These papers are not the only ones that are about implementations, improvements, extensions
or integrations. In general, the focus of the papers are very specific to ns-3 internals and technical
aspects, and rarely present other research related aspects, with some significant exception, so they are
more bound to the ns-3 development community than to a general audience, with respect to the rest
of the papers collected for our study. Out of the list of papers of the conference we isolated [3–24],
that showed to extend significantly the domains coverable by means of ns-3 or to show noticeable
research-oriented case studies.
Type Criteria
1 Exclusion Informal literature
2 Exclusion Duplicated papers
3 Exclusion Papers that did not comply research questions
4 Exclusion Papers not written in English language
5 Inclusion Papers that report any kind of use of ns-3
• the first part collects all general information about the paper, as from Table 7;
Electronics 2020, 9, 272 11 of 25
• the second part collects the information that is more related with the research questions, to address
the research questions (see Table 8):
– for RQ1 the questions characterize the field in which ns-3 is used in terms of networks
technologies, area of application and kind of problem;
– for RQ2 the answers are binary (yes/no), and describe if the paper presents a new module or
extension for ns-3 and if it uses an already existing module.
Id ...
Author ...
Title ...
Year ...
Venue ...
Citations ...
6. Results
After reading abstract and conclusion we excluded 2 papers of them based on exclusion criterion
2 [25,26], 3 based on exclusion criterion 3 [27–29], 2 based on exclusion criterion 4 [30,31] and 1 based
on exclusion criterion 1 [32]. In the end, we included in the study 94% (120/128) of examined papers
[1–24,33–128]. Figure 3 shows that in recent years there has been a significant growth of the number of paper
talking about ns-3 (the query was performed in October 2019, so the number of paper of year 2019 must be
considered partial because of the typical delays in indexing and actual availability of published papers).
25
20
15
10
0
2009
2011
2012
2013
2014
2015
2016
2017
2018
2019
Figure 3. Year distribution of selected papers.
Table 11 and Figure 4 show that the selected papers mainly aim to developing applications or to
perform conceptual study.
Application study 68
Module extension 5
Conceptual study 36
Survey 11
Electronics 2020, 9, 272 13 of 25
Applicative Study
Survey
Module Extension
Conceptual Study
6.3. RQ1
We wanted to address different side of this research question, basically to help the researchers
when they must choose a network simulation tool and help to evaluate if ns-3 is a good choice.
To achieve this goal, we examined the fields of application in which ns-3 was most used, both the
application field, intended as topic, and specific network technology applied, and also as specific
problem addressed.
Table 13 summarizes the information extracted from the papers that are related to this question.
Results reported in Table 13 suggest that the most of the application domains in networking are
covered, with a (unsurprising) peak for ordinary networking, which is anyway not prominent, followed
by VANET (Vehicle Ad Hoc Networks), MANET (Mobile Ad Hoc Networks) and common Mobile
Networks on similar positions (see Figure 5). The lowest percentage of application, corresponding
to WSN (Wireless Sensor Networks), yet a popular application field, may be due to the fact that
support for energy management, which is of paramount importance in this subdomain, is still under
development, and quite novel as a topic in the literature per se, and to the fact that the implementation
of the simulation stack for typical real-world configuration is recent and still to be completed: anyway,
the aggregation of all wireless networking related subdomains (WSN, Wireless Networks and Mobile
Networks) that share the most of the low layers of the ISO/OSI stack, constitutes more than one third
of all papers. The flexibility of the tool is witnessed by the composition of the group of papers labeled
as “others”, as it includes very peculiar and specialistic domains such as Delay Tolerant Network,
Named Data Network, Optical wireless, SDN, Visible Light Communication (VLC), while domains that
are still emerging as autonomous from more general topics have been included in the relevant general
topic (e.g., a paper about 5G mobile networks has been reported as belonging to Mobile Networks).
Electronics 2020, 9, 272 15 of 25
30
25
20
15
10
0
MANET
WSN
VANET
Others
Networking
Mobile Networks
Wireless Networks
Figure 5. RQ1–Q1.1.
Variety of problems is also rich: anyway, here the analysis shows that the detail of the simulation
stack fosters application to network assessment and protocol design, analysis and verification, and
minor attention is paid by researchers and practitioners interested into physical layer problems,
probably because of the closeness with the telecommunications domain, that also has proper specific
tools and simulation support capturing physical issues in deeper details (see Figure 6).
Unfortunately, the analysis did not provide enough information to answer Q1.2 with a significant
level of details, as the most of the papers were not especially focusing on specific application fields
that were not implicitly stated in the application domain.
Electronics 2020, 9, 272 16 of 25
35
30
25
20
15
10
Security
Performance
Physical layer
Assessment
Network Protocol
Figure 6. RQ1–Q1.3.
6.4. RQ2
The aim of the second research question is to address another kind of issue about simulation
in general. The question investigates the need and the availability of additional modules to cover
issues that are not natively dealt with by ns-3, to understand how much it is a good choice to approach
problems that exceed the original extent of modeling support included in ns-3. The research question
is articulated in two different yes/no questions, the first of which is oriented to quantify in how
many papers a new extension or module is proposed for ns-3 to cover a specific need (see Figure 7),
the second to quantify how many papers document cases in which additional modules or extensions
have been actually used to reach the goals (see Figure 8). In Table 14 we show the results, in Table 15
the distribution of papers over years.
Electronics 2020, 9, 272 17 of 25
Figure 7. RQ2–Q2.1.
Figure 8. RQ2–Q2.2.
Electronics 2020, 9, 272 18 of 25
2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
2 0 2 8 7 7 19 23 27 15 10
According to results, the practice of extending ns-3 is established, but not especially needed.
There is a non-negligible number of papers that present new modules or extensions, but in a good
majority of the cases, assuming that researchers that adopted this simulator consider it suitable for
their purposes, the standard package seems to be sufficient to satisfy the most of the needs. In fact,
considering the number of the papers that use extensions or contributed modules, almost one third of
the examined literature actually exploits additions. Jointly with the percentage of positive answers
to Q2.1, this seems to us to prove that the tool is easily and profitably extensible and needed, but the
standard package is sufficient for the most of the needs.
Author Contributions: All authors participated with the same effort and contribution to all phases in the
preparation of this paper. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Acknowledgments: This work has been partially funded by the internal competitive funding program “VALERE:
VAnviteLli pEr la RicErca” of Università degli Studi della Campania “Luigi Vanvitelli”.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Riley, G.F.; Henderson, T.R. The ns-3 Network Simulator. In Modeling and Tools for Network Simulation;
Wehrle, K., Güneş, M., Gross, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–34.
doi:10.1007/978-3-642-12331-3_2.
2. Barisic, A.; Amaral, V.; Goulao, M. Domain-Specific Language Domain Analysis and Evaluation: A Systematic
Literature Review; Technical report; Faculdade de Ciencias e Tecnologia, Universidade Nova de Lisboa, 2015.
doi:10.5281/zenodo.265487.
3. Piro, G.; Grieco, L.A.; Boggia, G.; Camarda, P. Nano-Sim: Simulating Electromagnetic-Based Nanonetworks
in the Network Simulator 3. In Proceedings of the 6th International ICST Conference on Simulation Tools
and Techniques, Cannes, France, 6–8 March, 2013; ICST (Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 203–210.
4. Raman, A.; Chou, K.; Mastorakis, S. A simulation framework for Peer-to-Peer file sharing in named data
networking. In Proceedings of the 2019 Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 57–64.
5. Bakshi, S. and Tahiliani, M.P. Recent Acknowledgement Support for ns-3 TCP. In Proceedings of the 2019
Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 9–16.
6. Rohrer, J.; Mauldin, A. Implementation of epidemic routing with IP convergence layer in ns-3. In Proceedings
of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp.
69–76.
Electronics 2020, 9, 272 19 of 25
7. Mittal, V., Jain,V., Tahiliani, M.P. Proportional Rate Reduction for ns-3 TCP. In Proceedings of the 10th
Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 9–15.
8. Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Exploiting the capture effect on DSC and BSS color in dense
IEEE 802.11ax deployments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017;
ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 47–54.
9. Fontes, H.; Campos, R.; Ricardo, M. A trace-based ns-3 simulation approach for perpetuating real-world
experiments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York,
NY, USA, 2017; Volume Part F128360, pp. 118–124.
10. Franchi, M.; Pecorella, T.; Ridolfi, A.; Fantacci, R.; Allotta, B. Kinematic constraints and ns-3 mobility models:
The AUV issue. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York,
NY, USA, 2017; Volume Part F128360, pp. 103–109.
11. Ford, R.; Zhang, M.; Dutta, S.; Mezzavilla, M.; Rangan, S.; Zorzi, M. A framework for end-to-end evaluation
of 5G mmWave cellular networks in ns-3. In Proceedings of the Workshop on ns-3, Seattle, USA, 15–16 June
2016; Volume Part F132163, pp. 85–92.
12. Dandoush, A.; Tuholukova, A.; Alouf, S.; Neglia, G.; Simoens, S.; Derouet, P.; Dersin, P. ns-3 Based framework
for simulating Communication Based Train Control (CBTC) systems. In Proceedings of the Workshop on
ns-3, Seattle, USA, 15–16 June 2016; Volume Part F132163, pp. 116–123.
13. Lehmann, A.; Kreuzer, M.; Deutschmann, J.; Berold, U.; Huber, J. Topology simulation for aeronautical
communication protocols with ns-3 and DCE. In Proceedings of the Workshop on ns-3, Seattle, USA, 15–16
June 2016; Volume Part F132163, pp. 132–138.
14. Hood, C.; Riley, G. On predicting the performance characteristics of the NS-3 distributed simulator for
scale-free internet models. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May
2015; ACM: New York, NY, USA, 2015; pp. 54–59.
15. Conceicao, S.; Ribeiro, F.; Campos, R.; Ricardo, M. Novel NS-3 model enabling simulation of electromagnetic
wireless underground networks. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14
May 2015; ACM: New York, NY, USA, 2015; pp. 9–16.
16. Gupta, R.; Bachmann, B.; Ford, R.; Rangan, S.; Kundargi, N.; Ekbal, A.; Rathi, K.; Sanchez, M.;
De La Oliva, A.; Morelli, A. Ns-3-based real-time emulation of LTE testbed using LabVIEW platform
for software defined networking (SDN) in CROWD project. In Proceedings of the 2015 Workshop on ns-3,
Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 91–97.
17. Cerqueira, T.; Albano, M. RoutesMobilityModel: Easy realistic mobility simulation using external
information services. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May
2015; ACM: New York, NY, USA, 2015; pp. 40–46.
18. Newton, B.; Aikat, J.; Jeffay, K. Simulating large-scale airborne networks with NS-3. In Proceedings of the
2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 32–39.
19. Gómez, D.; Rodríguez, E.; Agüero, R.; Muñoz, L. Reliable communications over wireless mesh networks
with inter and intra-flow network coding. In Proceedings of the 2014 Workshop on ns-3, Atlanta, USA, 7
May 2014.
20. Tariq, M.; Swenson, B.; Narasimhan, A.; Grijalva, S.; Riley, G.; Wolf, M. Cyber-physical co-simulation of
smart grid applications using NS-3. In Proceedings of the 2014 Workshop on ns-3, Atlanta, USA, May 7,
2014.
21. Zugno, T.; Polese, M.; Lecci, M.; Zorzi, M. Simulation of Next-generation Cellular Networks with ns-3: Open
Challenges and New Directions. In Proceedings of the 2019 Workshop on Next-Generation Wireless with
ns-3; ACM: New York, NY, USA, 2019; pp. 38–41.
22. Gawłowicz, P.; Baldo, N.; Miozzo, M. An extension of the ns-3 LTE module to simulate fractional frequency
reuse algorithms. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM:
New York, NY, USA, 2015; pp. 98–105.
23. Tian, L.; Šljivo, A.; Santi, S.; De Poorter, E.; Hoebeke, J.; Famaey, J. Extension of the IEEE 802.11 ah ns-3
Simulation Module. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM:
New York, NY, USA, 2018; pp. 53–60.
24. Bojovic, B.; Abrignani, M.D.; Miozzo, M.; Giupponi, L.; Baldo, N. Towards LTE-Advanced and LTE-A Pro
Network Simulations: Implementing Carrier Aggregation in LTE Module of ns-3. In Proceedings of the
Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; pp. 63–70.
Electronics 2020, 9, 272 20 of 25
25. Rahman, M.U.; Rehman, A.U.; Liu, H.; Chen, H.F. Inhibitory mechanism of 5-bromo-3-indoleacetic acid for
non-structural-3 helicase hepatitis C virus with dynamics correlation network analysis. Comput. Biol. Chem.
2018, 77, 167–177.
26. Kwo, P.Y.; Lawitz, E.J.; McCone, J.; Schiff, E.R.; Vierling, J.M.; Pound, D.; Davis, M.N.; Galati, J.S.;
Gordon, S.C.; Ravendhran, N.; et al. Efficacy of boceprevir, an NS3 protease inhibitor, in combination
with peginterferon alfa-2b and ribavirin in treatment-naive patients with genotype 1 hepatitis C infection
(SPRINT-1): An open-label, randomised, multicentre phase 2 trial. Lancet 2010, 376, 705–716.
27. Xu, L.; Wang, X.; Shen, J. Strategy and simulation of trust cluster based key management protocol for ad
hoc networks. In Proceedings of the 2009 4th International Conference on Computer Science & Education,
Nanning, China, 25–28 July, 2009; pp. 269–274.
28. Yu, F.; Jain, R. A Survey of Wireless Sensor Network Simulation Tools; Washington University: St. Louis, MI,
USA, 2011; pp. 1–10. Available online: https://www.cse.wustl.edu/~jain/cse567-11/ftp/sensor/ (accessed
on 3 September 2019).
29. Pereira, R.M.; Ruiz, L.B.; Ghizoni, M.L.A. MannaSim: A NS-2 extension to simulate wireless sensor network.
In Proceedings of the ICN 2015, Barcelona, Spain, 19–24 April 2015; p. 107.
30. Wang, Z.; Feng, X.; Qin, H.; Guo, H.; Han, G. An AUV-Aided routing protocol based on dynamic
gateway nodes for underwater wireless sensor networks. J. Internet Technol. 2017, 18, 333–343.
doi:10.6138/JIT.2017.18.2.20161122.
31. Melo, R.; Polisciuc, R.; Nogueira, M.; Santos, A. Access Decision System for Seamless Connectivity in
Heterogeneous Wireless Networks. In Proceedings of the 2015 XXXIII Brazilian Symposium on Computer
Networks and Distributed Systems, Vitoria, Brazil, 18–22 May 2015; pp. 60–69. doi:10.1109/SBRC.2015.18.
32. Maygua-Marcillo, L.; Urquiza-Aguiar, L.; Paredes-Paredes, M. Creating a New Model in NS3 Network Simulator;
2019; pp. 1–5. doi:10.20944/preprints201901.0106.v1.
33. Wang, Y.; Jiang, Y.N.; Ma, Q.; Tian, C.; Bai, B.; Zhang, G. RDMA load balancing via data partition.
In Proceedings of the 2019 28th International Conference on Computer Communication and Networks
(ICCCN), Valencia, Spain, 29 July-–1 August 2019; pp. 1–8. doi:10.1109/ICCCN.2019.8847077.
34. Ayaida, M.; Messai, N.; Najeh, S.; Boris Ndjore, K. A Macroscopic Traffic Model-based Approach for Sybil
Attack Detection in VANETs. Ad Hoc Netw. 2019, 90, 101845. doi:10.1016/j.adhoc.2019.01.010.
35. Abbas, M.; Song, W.C. THERA: Two-level hierarchical hybrid road-aware routing for vehicular networks.
KSII Trans. Internet Inf. Syst. 2019, 13, 3369–3385. doi:10.3837/tiis.2019.07.003.
36. Eder-Neuhauser, P.; Zseby, T.; Fabini, J. Malware propagation in smart grid networks: Metrics,
simulation and comparison of three malware types. J. Comput. Virol. Hacking Tech. 2019, 15, 109–125.
doi:10.1007/s11416-018-0325-y.
37. Fogwell, T.; Ochola, E. Comparison analysis of AODV and DSR under attack by black hole nodes in a NS3
simulation. In Proceedings of the International Conference on Cyber Warfare and Security, Stellenbosch,
South Africa, 28 February–1 March 2019; pp. 574–587.
38. Bhattacharya, H.; Chattopadhyay, S.; Chattopadhyay, M. NS3 Based HDFS data placement
algorithm evaluation framework. In Proceedings of the 2017 International Conference on Computer,
Electrical & Communication Engineering (ICCECE),Kolkata, India, 22–23 December 2017; pp. 1–8.
doi:10.1109/ICCECE.2017.8526204.
39. Anadu, D.; Mushagalusa, C.; Alsbou, N.; Abuabed, A. Internet of Things: Vehicle collision
detection and avoidance in a VANET environment. In Proceedings of the 2018 IEEE International
Instrumentation and Measurement Technology Conference (I2MTC), Houston, USA, 14–17 May 2018;
pp. 1–6. doi:10.1109/I2MTC.2018.8409861.
40. Tiennoy, S.; Saivichit, C. Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET
with the Named Data Architecture. IEEE Access 2018, 6, 32612–32623. doi:10.1109/ACCESS.2018.2840088.
41. Wang, T.; Hussain, A. PySNS3: A real-time communication interface and protocol for vehicular Ad-Hoc
networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications
Engineering, LNICST; Springer: Cham, Switzerland, 2018; pp. 163–171. doi:10.1007/978-3-319-78078-8_17.
42. Xie, X.; Wang, J.; Guo, X.; Wu, X. Performance evaluation of ad-hoc routing protocols in hybrid
MANET-satellite network. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and
Telecommunications Engineering, LNICST; Springer: Cham, Switzerland, 2018; Volume 251; pp. 500–509.
doi:10.1007/978-3-030-00557-3_49.
Electronics 2020, 9, 272 21 of 25
43. Tada, N.; Patalia, T.; Rupani, P. A new approach to mitigate jamming attack in wireless adhoc network using
ARC technique. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications
Engineering, LNICST; Springer: Cham, Switzerland, 2018; pp. 192–204. doi:10.1007/978-3-319-73712-6_20.
44. Liu, D.; Ni, J.; Li, H.; Shen, X. Achieving Adaptive Linkability for Cellular V2X Group Communications in
5G. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE,
9–13 December 2018; pp. 1–7. doi:10.1109/GLOCOM.2018.8647610.
45. Pospelova, I.; Chebotayev, P.; Klimenko, A.; Myakochin, Y.; Polyakov, I.; Shelupanov, A.; Zykov, D. Research
of G3-PLC net self-organization processes in the NS-3 modeling framework. AIP Conf. Proc. 2017, 1899,
060017. doi:10.1063/1.5009888.
46. Drissi, M.; Oumsis, M.; Aboutajdine, D. A Multi-Criteria Decision Framework for network selection over
LTE and WLAN. Eng. Appl. Artif. Intell. 2017, 66, 113–127. doi:10.1016/j.engappai.2017.08.019.
47. Abdelsalam, A.; Luglio, M.; Roseti, C.; Zampognaro, F. TCP Connection management through combined
use of terrestrial and satellite IP-based links. In Proceedings of the 2017 40th International Conference
on Telecommunications and Signal Processing (TSP), Barcelona, Spain, 5–7 July 2017; pp. 37–42.
doi:10.1109/TSP.2017.8075932.
48. Mao, Q.; Yue, P.; Xu, M.; Ji, Y.; Cui, Z. OCTMAC: A VLC based MAC protocol combining optical
CDMA with TDMA for VANETs. In Proceedings of the International Conference on Computer,
Information and Telecommunication Systems (CITS), Dalian, China, 21–23 July 2017; pp. 234–238.
doi:10.1109/CITS.2017.8035333.
49. Karimzadeh, M.; Valtulina, L.; Van Den Berg, H.; Pras, A.; Ortiz, P.; Sadre, R. MultiPath TCP to support
user’s mobility in future LTE network. In Proceedings of the 2017 10th IFIP Wireless and Mobile Networking
Conference (WMNC), Valencia, Spain, 25–27 September 2017; pp. 1–8. doi:10.1109/WMNC.2017.8248845.
50. Agarwal, R.; Shukla, P.; Goyal, S. A Practical Approach of Network Simulation, in R. Kumar, P. Pattnaik,
& P. Pandey (Eds.), Detecting and Mitigating Robotic Cyber Security Risks, IGI Global, 2017; pp. 12–27.
doi:10.4018/978-1-5225-2154-9.ch002.
51. Liu, Y.; Piao, X.; Hou, C.; Lei, K. A CUBIC-Based explicit congestion control mechanism in named
data networking. In Proceedings of the 2016 International Conference on Cyber-Enabled Distributed
Computing and Knowledge Discovery (CyberC), Chengdu, China, 13–15 October 2016; pp. 360–363.
doi:10.1109/CyberC.2016.75.
52. Chiu, J.C.; Liu, A.T.; Liao, C.C. Design the DNS-Like Smart Switch for Heterogeneous Network Base on
SDN Architecture. In Proceedings of the 2016 International Computer Symposium (ICS), Chiayi, Taiwan,
15–17 December 2016; pp. 187–191. doi:10.1109/ICS.2016.0045.
53. Wu, W.; Li, Z.; Zhang, Y.; Guo, J.; Zhao, J. Design and implementation of distributed broadcast algorithm
based on vehicle density for vanet safety-related messages. Commun. Comput. Inf. Sci. 2017, 728, 271–285.
doi:10.1007/978-981-10-6388-6_22.
54. Sahu, A.; Goulart, A.; Butler-Purry, K. Modeling AMI network for real-time simulation in NS-3.
In Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications (IPTComm),
Chicago, USA, 17–20 October 2016; pp. 1–8.
55. Yang, H.; Li, Z. A genetic-algorithm-based clustering protocol in MANET. In Proceedings of the 7th
International Conference on Computing Communication and Networking Technologies, Dallas, USA, 6–8
July 2016; pp. 1–5. doi:10.1145/2967878.2967914.
56. Deng, X.; He, L.; Li, X.; Liu, Q.; Cai, L.; Chen, Z. A reliable QoS-aware routing scheme for neighbor area
network in smart grid. Peer-to-Peer Netw. Appl. 2016, 9, 616–627. doi:10.1007/s12083-015-0331-5.
57. Zhuo, W.; Hongmei, G.; Longjie, J.; Xiaoning, F. AUV-aided communication method for underwater mobile
sensor network. In Proceedings of the OCEANS 2016-Shanghai, Shanghai, China, 10–13 April 2016; pp. 1–7.
doi:10.1109/OCEANSAP.2016.7485345.
58. Wang, S.; Sun, D.; Zhang, Y. Performance analysis for ALOHA protocol of underwater acoustic
networks with a serial route. Harbin Gongcheng Daxue Xuebao/J. Harbin Eng. Univ. 2016, 37, 360–367.
doi:10.11990/jheu.201501013.
59. Choudhury, A.; Maszczyk, T.; Math, C.; Li, H.; Dauwels, J. An integrated simulation environment for testing
V2X protocols and applications. Procedia Comput. Sci. 2016, 80, 2042–2052. doi:10.1016/j.procs.2016.05.524.
60. Kang, H.; Jiang, X.; Xiong, W. Research on wireless networking mode for the distributed satellite
communication system. J. Comput. Inf. Syst. 2015, 11, 4211–4220. doi:10.12733/jcis14457.
Electronics 2020, 9, 272 22 of 25
61. Aburumman, A.; Seo, W.; Islam, R.; Khan, M.; Choo, K.K. A secure cross-domain SIP solution for mobile ad
hoc network using dynamic clustering. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering, LNICST; Springer: Cham, Switzerland, 2015; Volume 164, pp. 649–664.
doi:10.1007/978-3-319-28865-9_43.
62. Guo, Y.; Ten, C.W.; Hu, S.; Weaver, W. Modeling distributed denial of service attack in advanced metering
infrastructure. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies
Conference (ISGT), Washington DC, USA,17–20 February 2015; pp. 1–5. doi:10.1109/ISGT.2015.7131828.
63. Mallissery, S.; Manohara Pai, M.; Ajam, N.; Pai, R.; Mouzna, J. Transport and traffic rule violation monitoring
service in ITS: A secured VANET cloud application. In Proceedings of the 2015 12th Annual IEEE Consumer
Communications and Networking Conference (CCNC), Las Vegas, USA, 9–12 January 2015; pp. 213–218.
doi:10.1109/CCNC.2015.7157979.
64. Tang, C.; Song, L.; Balasubramani, J.; Wu, S.; Biaz, S.; Yang, Q.; Wang, H. Comparative investigation on
CSMA/CA-based opportunistic random access for internet of things. IEEE Internet Things J. 2014, 1, 171–179.
doi:10.1109/JIOT.2014.2302534.
65. Molloy, T.; Yuan, Z.; Muntean, G.M. Real time emulation of an LTE network using NS-3. In Proceedings of
the 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on
Information and Communications Technologies (ISSC 2014/CIICT 2014), Limerick, Ireland, 26–27 June 2014;
Volume 2014, pp. 251–257. doi:10.1049/cp.2014.0694.
66. Satria, T.; Karimzadeh, M.; Karagiannis, G. Performance evaluation of ICN/CCN based service migration
approach in virtualized LTE systems. In Proceedings of the 2014 IEEE 3rd International Conference on Cloud
Networking (CloudNet), Luxembourg, 8–10 October 2014; pp. 461–467. doi:10.1109/CloudNet.2014.6969038.
67. Shukla, S.; Chan, S.; Tam, A.W.; Gupta, A.; Xu, Y.; Chao, H. TCP PLATO: Packet labelling to alleviate
time-out. IEEE J. Sel. Areas Commun. 2014, 32, 65–76. doi:10.1109/JSAC.2014.140107.
68. Marques, H.; Leguay, J.; Khalifé, H.; Conan, V.; Lavaux, D. Transparent IP proxy for tactical ad hoc networks.
In Proceedings of the MILCOM 2013-2013 IEEE Military Communications Conference, San Diego, USA,
17–20 November 2013; pp. 842–847. doi:10.1109/MILCOM.2013.148.
69. Wang, Y.; Rozhnova, N.; Narayanan, A.; Oran, D.; Rhee, I. An improved hop-by-hop interest shaper for
congestion control in named data networking. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 567–572.
doi:10.1145/2534169.2491233.
70. Tsokalo, I.; Mudriievskyi, S.; Lehnert, R. Development and calibration of a PLC simulation model
for UPA-compliant networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2013,
Volume 8115 LNCS, pp. 197–208. doi:10.1007/978-3-642-40552-5_18.
71. Meneguette, R.; Bittencourt, L.; Madeira, E. User-centric mobility management architecture for
vehicular networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and
Telecommunications Engineering, LNICST; Springer: Berlin/Heidelberg, Germany, 2013; Voulme 58, pp. 42–56.
doi:10.1007/978-3-642-37935-2_4.
72. Carvin, D.; Kremer, G.; Owezarski, P.; Berthou, P. Assessment and event based analysis of dynamic wireless
networks. In Proceedings of the 9th International Conference on Network and Service Management
(CNSM 2013), Zürich, Switzerland, 14–18 October 2013; pp. 175–179. doi:10.1109/CNSM.2013.6727832.
73. Biddlestone, S.; Redmill, K.; Miucic, R.; Ozguner, U. An integrated 802.11p WAVE DSRC and vehicle traffic
simulator with experimentally validated urban (LOS and NLOS) propagation models. IEEE Trans. Intell.
Transp. Syst. 2012, 13, 1792–1802. doi:10.1109/TITS.2012.2213816.
74. Vetrivelan, P.; Narayanasamy, P.; John Charlas, J. A multi-constraint real-time vehicular (MCRV) mobility
framework for 4G heterogeneous Vehicular Ad-Hoc Networks. In Proceedings of the International
MultiConference of Engineers and Computer Scientists, Hong Kong, 14–16 March 2012; Volume 2195,
pp. 423–428.
75. Vetrivelan, P.; Narayanasamy, P. SMIRT with call admission control (CAC) based vertical handover decision
for seamless mobility in multi-access 4G heterogeneous wireless overlav networks. In Proceeding of the
International Multiconference of Engineers & Computer Scientists, Hong Kong, 14–16 March 2012; Volume
2195, pp. 408–413.
Electronics 2020, 9, 272 23 of 25
76. Qwasmi, N.; Ahmed, F.; Liscano, R. Simulation of DDOS attacks on P2P metworks. In Proceedings of the
2011 IEEE International Conference on High Performance Computing and Communications, Banff, Canada,
2–4 September 2011; pp. 610–614. doi:10.1109/HPCC.2011.86.
77. Katkar, P.S.; Ghorpade, D.V.R. Comparative study of network simulator: NS2 and NS3. Int. J. Adv. Res.
Comput. Sci. Softw. Eng. 2016, 6, 608–612.
78. Siraj, S.; Gupta, A.; Badgujar, R. Network simulation tools survey. Int. J. Adv. Res. Comput. Commun. Eng.
2012, 1, 199–206.
79. Pan, J.; Jain, R. A Survey of Network Simulation Tools: Current Status and Future Developments. 2008.
Volume 2, p. 45 Available online: https://www.cse.wustl.edu/~jain/cse567-08/ftp/simtools/index.html
(accessed on 3 September 2019).
80. Korkalainen, M.; Sallinen, M.; Kärkkäinen, N.; Tukeva, P. Survey of wireless sensor networks simulation
tools for demanding applications. In Proceedings of the 2009 Fifth International Conference on Networking
and Services, Valencia, Spain, 20–25 April 2009; pp. 102–106.
81. Venkataramanan, V.; Lakshmi, S. A Case Study of Various Wireless Network Simulation Tools. Int. J.
Commun. Netw. Inf. Secur. 2018, 10, 389–396.
82. Mehta, S.; Ullah, N.; Kabir, M.H.; Sultana, M.N.; Kwak, K.S. A Case Study of Networks Simulation Tools for
Wireless Networks. In Proceedings of the 2009 Third Asia International Conference on Modelling Simulation,
Bali, Indonesia, 25–29 May 2009; pp. 661–666. doi:10.1109/AMS.2009.17.
83. Dorathy, I.; Chandrasekaran, M. Simulation tools for mobile ad hoc networks: A survey. J. Appl. Res. Technol.
2018, 16, 437–445.
84. Mallapur, S.V.; Patil, S.R. Survey on simulation tools for mobile ad-hoc networks. In. J. Comput. Netw. Wirel.
Commun. 2012, 2, 241–248.
85. Toor, A.S.; Jain, A. A survey on wireless network simulators. Bull. Electrical Eng. Inform. 2017, 6, 62–69.
86. Miozzo, M.; Bartzoudis, N.; Requena, M.; Font-Bach, O.; Harbanau, P.; López-Bueno, D.; Payaró, M.;
Mangues, J. SDR and NFV extensions in the ns-3 LTE module for 5G rapid prototyping. In Proceedings
of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18
April 2018; pp. 1–6.
87. Giupponi, L.; Henderson, T.; Bojovic, B.; Miozzo, M. Simulating LTE and Wi-Fi coexistence in unlicensed
spectrum with NS-3. arXiv 2016, arXiv:1604.06826.
88. Zhong, P.; Li, Y.; Huang, W.; Kui, X.; Zhang, Y.; Chen, Y. An Extension to ns-3 for Simulating Mobile Charging
with Wireless Energy Transfer. In In: Zou B., Han Q., Sun G., Jing W., Peng X., Lu Z. (eds) Data Science.
ICPCSEE 2017. Communications in Computer and Information Science, vol 728. Springer, Singapore, 2017;
pp. 256–270.
89. Alwahab, D.A.; Laki, S. A simulation-based survey of active queue management algorithms. In Proceedings
of the 6th International Conference on Communications and Broadband Networking, Singapore, 24–26
February 2018; pp. 71–77.
90. Jian, Y.; Krishnaswamy, B.; Austin, C.M.; Bicen, A.O.; Einolghozati, A.; Perdomo, J.E.; Patel, S.C.; Fekri,
F.; Akyildiz, I.F.; Forest, C.R.; et al. nanoNS3: A network simulator for bacterial nanonetworks based on
molecular communication. Nano Commun. Netw. 2017, 12, 1–11.
91. Bisio, I.; Delucchi, S.; Lavagetto, F.; Marchese, M.; Portomauro, G.; Zappatore, S. An Ns-3 based simulative
and emulative platform. In Modeling and Simulation of Computer Networks and Systems; Elsevier: Amsterdam,
The Netherlands, 2015; pp. 555–575.
92. Euna Kim, George F. Riley Automatic State Saving and Rollback in ns-3. In Proceedings of the 2017 ACM
SIGSIM Conference on Principles of Advanced Discrete Simulation, Singapore, 24–26 May 2017; pp. 263–266.
93. Maskooki, A.; Sabatino, G.; Mitton, N. Chapter 21 - Analysis and performance evaluation of the next
generation wireless networks. In Modeling and Simulation of Computer Networks and Systems; Obaidat,
M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 601–627.
doi:10.1016/B978-0-12-800887-4.00021-3.
94. Fernandes, D.A.; Neto, M.; Soares, L.F.; Freire, M.M.; Inácio, P.R. Chapter 10—On the self-similarity of
traffic generated by network traffic simulators. In Modeling and Simulation of Computer Networks and Systems;
Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 285–311.
doi:10.1016/B978-0-12-800887-4.00010-9.
Electronics 2020, 9, 272 24 of 25
95. Amoretti, M.; Picone, M.; Zanichelli, F.; Ferrari, G. Chapter 16—Simulating wireless and mobile
systems: The Integration of DEUS and Ns-3. In Modeling and Simulation of Computer Networks and Systems;
Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 465–484.
doi:10.1016/B978-0-12-800887-4.00016-X.
96. Tsioliaridou, A.; Liaskos, C.; Dedu, E.; Ioannidis, S. Packet routing in 3D nanonetworks: A lightweight,
linear-path scheme. Nano Commun. Netw. 2017, 12, 63–71.
97. Hossain, Z.; Xia, Q.; Jornet, J.M. TeraSim: An ns-3 extension to simulate Terahertz-band communication
networks. Nano Commun. Netw. 2018, 17, 36–44.
98. Barolli, A.; Oda, T.; Ikeda, M.; Barolli, L.; Xhafa, F.; Loia, V. Node placement for wireless mesh networks:
Analysis of WMN-GA system simulation results for different parameters and distributions. J. Comput. Syst.
Sci. 2015, 81, 1496–1507.
99. Habbal, A.; Goudar, S.I.; Hassan, S. A Context-aware Radio Access Technology selection mechanism in 5G
mobile network for smart city applications. J. Netw. Comput. Appl. 2019, 135, 97–107.
100. Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Ackerman, R.; Basuino, J.; Berreta, W.; Little, T.D.
Extending ns3 to simulate visible light communication at network-level. In Proceedings of the 2016 23rd
International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016; pp. 1–6.
101. Rajankumar, P.; Nimisha, P.; Kamboj, P. A comparative study and simulation of AODV MANET routing
protocol in NS2 & NS3. In Proceedings of the 2014 International Conference on Computing for Sustainable
Global Development (INDIACom), New Delhi, India, 5–7 March 2014; pp. 889–894.
102. Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Little, T.D. Visible light communication module:
An open source extension to the ns3 network simulator with real system validation. IEEE Access 2017,
5, 22144–22158.
103. Liu, W.; Wang, X.; Zhang, W.; Yang, L.; Peng, C. Coordinative simulation with SUMO and NS3 for vehicular
ad hoc networks. In Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC),
Yogyakarta, Indonesia, 25–27 August 2016; pp. 337–341.
104. Jha, R.K.; Kharga, P. A comparative performance analysis of routing protocols in MANET using NS3
simulator. Int. J. Comput. Netw. Inf. Security 2015, 7, 62–68.
105. Bhatia, D.; Sharma, D.P. A comparative analysis of proactive, reactive and hybrid routing protocols over
open source network simulator in mobile ad hoc network. Int. J. Appl. Eng. Res. 2016, 11, 3885–3896.
106. Naik, L.; Khan, R.; Mishra, R. Analysis of node velocity effects in MANET routing protocols using network
simulator (NS3). Int. J. Comput. Appl. 2016, 144, 1–5.
107. Aman, A.H.M.; Hashim, A.H.A.; Ramli, H.A.M. Simulation Analysis for Multicast Context Delivery Network
Mobility Management. Indonesian J. Electrical Eng. Inform. (IJEEI) 2017, 5, 390–394.
108. Saluja, A.; Dargad, S.; Mistry, K. A Detailed Analogy of Network Simulators—NS1, NS2, NS3 and NS4. Int.
J. Future Revolut. Comput. Sci. Commun. Eng 2017, 3, 291–295.
109. Spaho, E.; Bylykbashi, K.; Barolli, L.; Takizawa, M. Routing in a DTN: Performance evaluation for random
waypoint and steady state random waypoint using NS3 simulator. In In: Xhafa F., Caballé S., Barolli L.
(eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data
Engineering and Communications Technologies, vol 13. Springer, Cham, Switzerland, 2017; pp. 133–141.
110. Patel, R.; Patel, N.; Patel, S. An Approach to Analyze Behavior of Network Events in NS2 and NS3 Using
AWK and Xgraph. In Information and Communication Technology for Competitive Strategies; Springer: Cham,
Switzerland, 2019; pp. 137–147.
111. Amiri-Nezhad, M.; Guerrero-Zapata, M.; Bellalta, B.; Cerdà-Alabern, L. Simulation of multi-radio
multi-channel 802.11-based mesh networks in ns-3. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 118.
112. Nurchis, M.; Bellalta, B. Performance Evaluation of LAA-LTE and WiFi Coexistence in Unlicensed 5 GHz
Band Under Asymmetric Network Deployments Using NS3. In Proceedings of the International Workshop
on Multiple Access Communications; Springer: Cham, Switzerland, 2016, pp. 86–97.
113. Paliwal, G.; Taterh, S. Impact of Dense Network in MANET Routing Protocols AODV and DSDV
Comparative Analysis Through NS3. In Soft Computing: Theories and Applications; Springer: Cham,
Switzerland, 2018; pp. 327–335.
114. Khattak, R.; Chaltseva, A.; Riliskis, L.; Bodin, U.; Osipov, E. Comparison of wireless network simulators
with multihop wireless network testbed in corridor environment. In Madsen T., Nielsen J., Pratas N. (eds)
Electronics 2020, 9, 272 25 of 25
Multiple Access Communications. MACOM 2016. Lecture Notes in Computer Science, vol 10121. Springer,
Cham, Switzerland, 2011; pp. 80–91.
115. Nabou, A.; Laanaoui, M.D.; Ouzzif, M. The Effect of Transmit Power on MANET Routing Protocols Using
AODV, DSDV, DSR and OLSR in NS3. In Ezziyyani M. (eds) Advanced Intelligent Systems for Sustainable
Development (AI2SD’2018). AI2SD 2018. Advances in Intelligent Systems and Computing, vol 915. Springer,
Cham, Switzerland, 2018; pp. 274–286.
116. Henderson, T.R.; Lacage, M.; Riley, G.F.; Dowell, C.; Kopena, J. Network simulations with the ns-3 simulator.
SIGCOMM Demonstr. 2008, 14, 527.
117. Afanasyev, A.; Moiseenko, I.; Zhang, L.; others. ndnSIM: NDN Simulator for NS-3; University of California:
Los Angeles, CA, USA, 2012; Volume 4.
118. Mastorakis, S.; Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM 2: An updated NDN simulator for NS-3;
NDN, Technical Report NDN-0028; 2016; pp. 1–8. Available online: http://named-data.net/publications/
techreports/ndn-0028-2-ndnsim-v2/ (accessed on 3 September 2019).
119. Pei, G.; Henderson, T.R. Validation of OFDM error rate model in ns-3. Boeing Res. Technol. 2010, 1–15.
Available online: https://pdfs.semanticscholar.org/3f0a/b039b235bd0fa1e833876ba78e7ea99d9a04.pdf
(accessed on 3 September 2019).
120. Carneiro, G.; Fortuna, P.; Ricardo, M. FlowMonitor: A network monitoring framework for the network
simulator 3 (NS-3). In Proceedings of the Fourth International ICST Conference on Performance
Evaluation Methodologies and Tools, Pisa, Italy, 20–22 October 2009; ICST (Institute for Computer Sciences,
Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2009; p. 1-10.
121. Arbabi, H.; Weigle, M.C. Highway mobility and vehicular ad-hoc networks in ns-3. In Proceedings of the
Winter Simulation Conference, Baltimore, USA, 5–8 December 2010; pp. 2991–3003.
122. Stoffers, M.; Riley, G. Comparing the ns-3 propagation models. In Proceedings of the 2012 IEEE 20th
International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication
Systems, San Francisco, USA, 7–9 August 2012; pp. 61–67.
123. Narra, H.; Cheng, Y.; Cetinkaya, E.K.; Rohrer, J.P.; Sterbenz, J.P. Destination-sequenced distance vector
(DSDV) routing protocol implementation in ns-3. In Proceedings of the 4th International ICST Conference
on Simulation Tools and Techniques, Barcelona, Spain, 21–25 March 2011; ICST (Institute for Computer
Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2011; pp. 439–446.
124. Van den Abeele, F.; Haxhibeqiri, J.; Moerman, I.; Hoebeke, J. Scalability analysis of large-scale LoRaWAN
networks in ns-3. IEEE Internet Things J. 2017, 4, 2186–2198.
125. Wu, X.; Brown, K.N.; Sreenan, C.J.; Alvarez, P.; Ruffini, M.; Marchetti, N.; Payne, D.; Doyle, L. An XG-PON
module for the NS-3 network simulator. In Proceedings of the 6th International ICST Conference on
Simulation Tools and Techniques, Cannes, France, 5–7 March 2013; ICST (Institute for Computer Sciences,
Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 195–202.
126. Z. Lu, G. Qu and Z. Liu A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy.
IEEE Transactions on Intelligent Transportation Systems 2019, 20, 760-776.
127. Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng A Survey on Simulation Tools and Testbeds for Cognitive Radio
Networks Study. arXiv 2018, arXiv:1808.09858.
128. Mohammed J. F. Alenazi, Yufei Cheng, Dongsheng Zhang, James P. G. Sterbenz, Epidemic routing protocol
implementation in ns-3. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015;
ACM: New York, NY, USA, 2015; pp. 54–59.
c 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).