Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Computer network simulation with ns-3: a systematic literature review.

literature review computer network

1. Introduction

2. related work, 3. slr process.

  • Reporting the results

3.1. SLR Target

3.2. slr protocol, 4. research questions.

  • RQ1: which are the impacted application domains, according to the literature?
  • RQ2: how easily extensible did ns-3 prove to be with respect to its adaptation to new domains or uses?
  • RQ1.1: what kind of network technologies have been simulated?
  • RQ1.2: which are the related application field? (e.g., medicine, astrology, ...)
  • RQ1.3: what kind of problems have been addressed?
  • RQ2.1 Is it a new extension or module?
  • RQ2.2 Does it use an external module or extension?

5. Review Methods

5.1. data source and search strategy, the wns3 workshop on ns-3, 5.2. selection criteria, 5.3. data extraction form.

  • the first part collects all general information about the paper, as from Table 7 ;
  • the second part collects the information that is more related with the research questions, to address the research questions (see Table 8 ): - for RQ1 the questions characterize the field in which ns-3 is used in terms of networks technologies, area of application and kind of problem; - for RQ2 the answers are binary (yes/no), and describe if the paper presents a new module or extension for ns-3 and if it uses an already existing module.

6.1. Included and Excluded Studies

6.2. data synthesis, 7. conclusions and future works, author contributions, acknowledgments, conflicts of interest.

  • Riley, G.F.; Henderson, T.R. The ns-3 Network Simulator. In Modeling and Tools for Network Simulation ; Wehrle, K., Güneş, M., Gross, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–34. [ Google Scholar ] [ CrossRef ]
  • Barisic, A.; Amaral, V.; Goulao, M. Domain-Specific Language Domain Analysis and Evaluation: A Systematic Literature Review ; Technical Report; Faculdade de Ciencias e Tecnologia, Universidade Nova de Lisboa: Colombia, Portugal, 2015. [ Google Scholar ] [ CrossRef ]
  • Piro, G.; Grieco, L.A.; Boggia, G.; Camarda, P. Nano-Sim: Simulating Electromagnetic-Based Nanonetworks in the Network Simulator 3. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France, 6–8 March 2013; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 203–210. [ Google Scholar ]
  • Raman, A.; Chou, K.; Mastorakis, S. A simulation framework for Peer-to-Peer file sharing in named data networking. In Proceedings of the 2019 Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 57–64. [ Google Scholar ]
  • Bakshi, S.; Tahiliani, M.P. Recent Acknowledgement Support for ns-3 TCP. In Proceedings of the 2019 Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 9–16. [ Google Scholar ]
  • Rohrer, J.; Mauldin, A. Implementation of epidemic routing with IP convergence layer in ns-3. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 69–76. [ Google Scholar ]
  • Mittal, V.; Jain, V.; Tahiliani, M.P. Proportional Rate Reduction for ns-3 TCP. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 9–15. [ Google Scholar ]
  • Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Exploiting the capture effect on DSC and BSS color in dense IEEE 802.11ax deployments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 47–54. [ Google Scholar ]
  • Fontes, H.; Campos, R.; Ricardo, M. A trace-based ns-3 simulation approach for perpetuating real-world experiments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 118–124. [ Google Scholar ]
  • Franchi, M.; Pecorella, T.; Ridolfi, A.; Fantacci, R.; Allotta, B. Kinematic constraints and ns-3 mobility models: The AUV issue. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 103–109. [ Google Scholar ]
  • Ford, R.; Zhang, M.; Dutta, S.; Mezzavilla, M.; Rangan, S.; Zorzi, M. A framework for end-to-end evaluation of 5G mmWave cellular networks in ns-3. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 85–92. [ Google Scholar ]
  • Dandoush, A.; Tuholukova, A.; Alouf, S.; Neglia, G.; Simoens, S.; Derouet, P.; Dersin, P. ns-3 Based framework for simulating Communication Based Train Control (CBTC) systems. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 116–123. [ Google Scholar ]
  • Lehmann, A.; Kreuzer, M.; Deutschmann, J.; Berold, U.; Huber, J. Topology simulation for aeronautical communication protocols with ns-3 and DCE. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 132–138. [ Google Scholar ]
  • Hood, C.; Riley, G. On predicting the performance characteristics of the NS-3 distributed simulator for scale-free internet models. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 54–59. [ Google Scholar ]
  • Conceicao, S.; Ribeiro, F.; Campos, R.; Ricardo, M. Novel NS-3 model enabling simulation of electromagnetic wireless underground networks. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 9–16. [ Google Scholar ]
  • Gupta, R.; Bachmann, B.; Ford, R.; Rangan, S.; Kundargi, N.; Ekbal, A.; Rathi, K.; Sanchez, M.; De La Oliva, A.; Morelli, A. Ns-3-based real-time emulation of LTE testbed using LabVIEW platform for software defined networking (SDN) in CROWD project. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 91–97. [ Google Scholar ]
  • Cerqueira, T.; Albano, M. RoutesMobilityModel: Easy realistic mobility simulation using external information services. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 40–46. [ Google Scholar ]
  • Newton, B.; Aikat, J.; Jeffay, K. Simulating large-scale airborne networks with NS-3. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 32–39. [ Google Scholar ]
  • Gómez, D.; Rodríguez, E.; Agüero, R.; Muñoz, L. Reliable communications over wireless mesh networks with inter and intra-flow network coding. In Proceedings of the 2014 Workshop on ns-3, Atlanta, USA, 7 May 2014. [ Google Scholar ]
  • Tariq, M.; Swenson, B.; Narasimhan, A.; Grijalva, S.; Riley, G.; Wolf, M. Cyber-physical co-simulation of smart grid applications using NS-3. In Proceedings of the 2014 Workshop on ns-3, Atlanta, GA, USA, 7 May 2014. [ Google Scholar ]
  • Zugno, T.; Polese, M.; Lecci, M.; Zorzi, M. Simulation of Next-generation Cellular Networks with ns-3: Open Challenges and New Directions. In Proceedings of the 2019 Workshop on Next-Generation Wireless with ns-3, Florence, Italy, 19 June 2019; ACM: New York, NY, USA, 2019; pp. 38–41. [ Google Scholar ]
  • Gawłowicz, P.; Baldo, N.; Miozzo, M. An extension of the ns-3 LTE module to simulate fractional frequency reuse algorithms. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 98–105. [ Google Scholar ]
  • Tian, L.; Šljivo, A.; Santi, S.; De Poorter, E.; Hoebeke, J.; Famaey, J. Extension of the IEEE 802.11 ah ns-3 Simulation Module. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 53–60. [ Google Scholar ]
  • Bojovic, B.; Abrignani, M.D.; Miozzo, M.; Giupponi, L.; Baldo, N. Towards LTE-Advanced and LTE-A Pro Network Simulations: Implementing Carrier Aggregation in LTE Module of ns-3. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; pp. 63–70. [ Google Scholar ]
  • Rahman, M.U.; Rehman, A.U.; Liu, H.; Chen, H.F. Inhibitory mechanism of 5-bromo-3-indoleacetic acid for non-structural-3 helicase hepatitis C virus with dynamics correlation network analysis. Comput. Biol. Chem. 2018 , 77 , 167–177. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Kwo, P.Y.; Lawitz, E.J.; McCone, J.; Schiff, E.R.; Vierling, J.M.; Pound, D.; Davis, M.N.; Galati, J.S.; Gordon, S.C.; Ravendhran, N.; et al. Efficacy of boceprevir, an NS3 protease inhibitor, in combination with peginterferon alfa-2b and ribavirin in treatment-naive patients with genotype 1 hepatitis C infection (SPRINT-1): An open-label, randomised, multicentre phase 2 trial. Lancet 2010 , 376 , 705–716. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Xu, L.; Wang, X.; Shen, J. Strategy and simulation of trust cluster based key management protocol for ad hoc networks. In Proceedings of the 2009 4th International Conference on Computer Science & Education, Nanning, China, 25–28 July 2009; pp. 269–274. [ Google Scholar ]
  • Yu, F.; Jain, R. A Survey of Wireless Sensor Network Simulation Tools ; Washington University: St. Louis, MO, USA, 2011; pp. 1–10. Available online: https://www.cse.wustl.edu/~jain/cse567-11/ftp/sensor/ (accessed on 3 September 2019).
  • Pereira, R.M.; Ruiz, L.B.; Ghizoni, M.L.A. MannaSim: A NS-2 extension to simulate wireless sensor network. In Proceedings of the ICN 2015, Barcelona, Spain, 19–24 April 2015; p. 107. [ Google Scholar ]
  • Wang, Z.; Feng, X.; Qin, H.; Guo, H.; Han, G. An AUV-Aided routing protocol based on dynamic gateway nodes for underwater wireless sensor networks. J. Internet Technol. 2017 , 18 , 333–343. [ Google Scholar ] [ CrossRef ]
  • Melo, R.; Polisciuc, R.; Nogueira, M.; Santos, A. Access Decision System for Seamless Connectivity in Heterogeneous Wireless Networks. In Proceedings of the 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, Vitoria, Brazil, 18–22 May 2015; pp. 60–69. [ Google Scholar ] [ CrossRef ]
  • Maygua-Marcillo, L.; Urquiza-Aguiar, L.; Paredes-Paredes, M. Creating a New Model in NS3 Network Simulator. Preprints 2019 , 1–5. [ Google Scholar ] [ CrossRef ]
  • Wang, Y.; Jiang, Y.N.; Ma, Q.; Tian, C.; Bai, B.; Zhang, G. RDMA load balancing via data partition. In Proceedings of the 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain, 29 July–1 August 2019; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Ayaida, M.; Messai, N.; Najeh, S.; Boris Ndjore, K. A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs. Ad Hoc Netw. 2019 , 90 , 101845. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Abbas, M.; Song, W.C. THERA: Two-level hierarchical hybrid road-aware routing for vehicular networks. KSII Trans. Internet Inf. Syst. 2019 , 13 , 3369–3385. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Eder-Neuhauser, P.; Zseby, T.; Fabini, J. Malware propagation in smart grid networks: Metrics, simulation and comparison of three malware types. J. Comput. Virol. Hacking Tech. 2019 , 15 , 109–125. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Fogwell, T.; Ochola, E. Comparison analysis of AODV and DSR under attack by black hole nodes in a NS3 simulation. In Proceedings of the International Conference on Cyber Warfare and Security, Stellenbosch, South Africa, 28 February–1 March 2019; pp. 574–587. [ Google Scholar ]
  • Bhattacharya, H.; Chattopadhyay, S.; Chattopadhyay, M. NS3 Based HDFS data placement algorithm evaluation framework. In Proceedings of the 2017 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 22–23 December 2017; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Anadu, D.; Mushagalusa, C.; Alsbou, N.; Abuabed, A. Internet of Things: Vehicle collision detection and avoidance in a VANET environment. In Proceedings of the 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Houston, TX, USA, 14–17 May 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Tiennoy, S.; Saivichit, C. Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET with the Named Data Architecture. IEEE Access 2018 , 6 , 32612–32623. [ Google Scholar ] [ CrossRef ]
  • Wang, T.; Hussain, A. PySNS3: A real-time communication interface and protocol for vehicular Ad-Hoc networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; pp. 163–171. [ Google Scholar ] [ CrossRef ]
  • Xie, X.; Wang, J.; Guo, X.; Wu, X. Performance evaluation of ad-hoc routing protocols in hybrid MANET-satellite network. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; Volume 251, pp. 500–509. [ Google Scholar ] [ CrossRef ]
  • Tada, N.; Patalia, T.; Rupani, P. A new approach to mitigate jamming attack in wireless adhoc network using ARC technique. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; pp. 192–204. [ Google Scholar ] [ CrossRef ]
  • Liu, D.; Ni, J.; Li, H.; Shen, X. Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Pospelova, I.; Chebotayev, P.; Klimenko, A.; Myakochin, Y.; Polyakov, I.; Shelupanov, A.; Zykov, D. Research of G3-PLC net self-organization processes in the NS-3 modeling framework. AIP Conf. Proc. 2017 , 1899 , 060017. [ Google Scholar ] [ CrossRef ]
  • Drissi, M.; Oumsis, M.; Aboutajdine, D. A Multi-Criteria Decision Framework for network selection over LTE and WLAN. Eng. Appl. Artif. Intell. 2017 , 66 , 113–127. [ Google Scholar ] [ CrossRef ]
  • Abdelsalam, A.; Luglio, M.; Roseti, C.; Zampognaro, F. TCP Connection management through combined use of terrestrial and satellite IP-based links. In Proceedings of the 2017 40th International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, 5–7 July 2017; pp. 37–42. [ Google Scholar ] [ CrossRef ]
  • Mao, Q.; Yue, P.; Xu, M.; Ji, Y.; Cui, Z. OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs. In Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, China, 21–23 July 2017; pp. 234–238. [ Google Scholar ] [ CrossRef ]
  • Karimzadeh, M.; Valtulina, L.; Van Den Berg, H.; Pras, A.; Ortiz, P.; Sadre, R. MultiPath TCP to support user’s mobility in future LTE network. In Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25–27 September 2017; pp. 1–8. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Agarwal, R.; Shukla, P.; Goyal, S. A Practical Approach of Network Simulation. In Detecting and Mitigating Robotic Cyber Security Risks ; Kumar, R., Pattnaik, P., Pandey, P., Eds.; IGI Global: Hershey, Pennsylvania, 2017; pp. 12–27. [ Google Scholar ] [ CrossRef ]
  • Liu, Y.; Piao, X.; Hou, C.; Lei, K. A CUBIC-Based explicit congestion control mechanism in named data networking. In Proceedings of the 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chengdu, China, 13–15 October 2016; pp. 360–363. [ Google Scholar ] [ CrossRef ]
  • Chiu, J.C.; Liu, A.T.; Liao, C.C. Design the DNS-Like Smart Switch for Heterogeneous Network Base on SDN Architecture. In Proceedings of the 2016 International Computer Symposium (ICS), Chiayi, Taiwan, 15–17 December 2016; pp. 187–191. [ Google Scholar ] [ CrossRef ]
  • Wu, W.; Li, Z.; Zhang, Y.; Guo, J.; Zhao, J. Design and implementation of distributed broadcast algorithm based on vehicle density for vanet safety-related messages. Commun. Comput. Inf. Sci. 2017 , 728 , 271–285. [ Google Scholar ] [ CrossRef ]
  • Sahu, A.; Goulart, A.; Butler-Purry, K. Modeling AMI network for real-time simulation in NS-3. In Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, IL, USA, 17–20 October 2016; pp. 1–8. [ Google Scholar ]
  • Yang, H.; Li, Z. A genetic-algorithm-based clustering protocol in MANET. In Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, Dallas, TX, USA, 6–8 July 2016; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Deng, X.; He, L.; Li, X.; Liu, Q.; Cai, L.; Chen, Z. A reliable QoS-aware routing scheme for neighbor area network in smart grid. Peer-to-Peer Netw. Appl. 2016 , 9 , 616–627. [ Google Scholar ] [ CrossRef ]
  • Wang, Z.; Guo, H.; Jiang, L.; Feng, X. AUV-aided communication method for underwater mobile sensor network. In Proceedings of the OCEANS 2016-Shanghai, Shanghai, China, 10–13 April 2016; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Wang, S.; Sun, D.; Zhang, Y. Performance analysis for ALOHA protocol of underwater acoustic networks with a serial route. Harbin Gongcheng Daxue Xuebao/J. Harbin Eng. Univ. 2016 , 37 , 360–367. [ Google Scholar ] [ CrossRef ]
  • Choudhury, A.; Maszczyk, T.; Math, C.; Li, H.; Dauwels, J. An integrated simulation environment for testing V2X protocols and applications. Procedia Comput. Sci. 2016 , 80 , 2042–2052. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Kang, H.; Jiang, X.; Xiong, W. Research on wireless networking mode for the distributed satellite communication system. J. Comput. Inf. Syst. 2015 , 11 , 4211–4220. [ Google Scholar ] [ CrossRef ]
  • Aburumman, A.; Seo, W.; Islam, R.; Khan, M.; Choo, K.K. A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2015; Volume 164, pp. 649–664. [ Google Scholar ] [ CrossRef ]
  • Guo, Y.; Ten, C.W.; Hu, S.; Weaver, W. Modeling distributed denial of service attack in advanced metering infrastructure. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 17–20 February 2015; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Mallissery, S.; Manohara Pai, M.; Ajam, N.; Pai, R.; Mouzna, J. Transport and traffic rule violation monitoring service in ITS: A secured VANET cloud application. In Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2015; pp. 213–218. [ Google Scholar ] [ CrossRef ]
  • Tang, C.; Song, L.; Balasubramani, J.; Wu, S.; Biaz, S.; Yang, Q.; Wang, H. Comparative investigation on CSMA/CA-based opportunistic random access for internet of things. IEEE Internet Things J. 2014 , 1 , 171–179. [ Google Scholar ] [ CrossRef ]
  • Molloy, T.; Yuan, Z.; Muntean, G.M. Real time emulation of an LTE network using NS-3. In Proceedings of the 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), Limerick, Ireland, 26–27 June 2014; Volume 2014, pp. 251–257. [ Google Scholar ] [ CrossRef ]
  • Satria, T.; Karimzadeh, M.; Karagiannis, G. Performance evaluation of ICN/CCN based service migration approach in virtualized LTE systems. In Proceedings of the 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Luxembourg, 8–10 October 2014; pp. 461–467. [ Google Scholar ] [ CrossRef ]
  • Shukla, S.; Chan, S.; Tam, A.W.; Gupta, A.; Xu, Y.; Chao, H. TCP PLATO: Packet labelling to alleviate time-out. IEEE J. Sel. Areas Commun. 2014 , 32 , 65–76. [ Google Scholar ] [ CrossRef ]
  • Marques, H.; Leguay, J.; Khalifé, H.; Conan, V.; Lavaux, D. Transparent IP proxy for tactical ad hoc networks. In Proceedings of the MILCOM 2013-2013 IEEE Military Communications Conference, San Diego, CA, USA, 17–20 November 2013; pp. 842–847. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wang, Y.; Rozhnova, N.; Narayanan, A.; Oran, D.; Rhee, I. An improved hop-by-hop interest shaper for congestion control in named data networking. ACM SIGCOMM Comput. Commun. Rev. 2013 , 43 , 567–572. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tsokalo, I.; Mudriievskyi, S.; Lehnert, R. Development and calibration of a PLC simulation model for UPA-compliant networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8115 LNCS, pp. 197–208. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Meneguette, R.; Bittencourt, L.; Madeira, E. User-centric mobility management architecture for vehicular networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Berlin/Heidelberg, Germany, 2013; Volume 58, pp. 42–56. [ Google Scholar ] [ CrossRef ]
  • Carvin, D.; Kremer, G.; Owezarski, P.; Berthou, P. Assessment and event based analysis of dynamic wireless networks. In Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), Zürich, Switzerland, 14–18 October 2013; pp. 175–179. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Biddlestone, S.; Redmill, K.; Miucic, R.; Ozguner, U. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (LOS and NLOS) propagation models. IEEE Trans. Intell. Transp. Syst. 2012 , 13 , 1792–1802. [ Google Scholar ] [ CrossRef ]
  • Vetrivelan, P.; Narayanasamy, P.; John Charlas, J. A multi-constraint real-time vehicular (MCRV) mobility framework for 4G heterogeneous Vehicular Ad-Hoc Networks. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, China, 14–16 March 2012; Volume 2195, pp. 423–428. [ Google Scholar ]
  • Vetrivelan, P.; Narayanasamy, P. SMIRT with call admission control (CAC) based vertical handover decision for seamless mobility in multi-access 4G heterogeneous wireless overlav networks. In Proceedings of the International Multiconference of Engineers & Computer Scientists, Hong Kong, China, 14–16 March 2012; Volume 2195, pp. 408–413. [ Google Scholar ]
  • Qwasmi, N.; Ahmed, F.; Liscano, R. Simulation of DDOS attacks on P2P metworks. In Proceedings of the 2011 IEEE International Conference on High Performance Computing and Communications, Banff, AB, Canada, 2–4 September 2011; pp. 610–614. [ Google Scholar ] [ CrossRef ]
  • Katkar, P.S.; Ghorpade, D.V.R. Comparative study of network simulator: NS2 and NS3. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2016 , 6 , 608–612. [ Google Scholar ]
  • Siraj, S.; Gupta, A.; Badgujar, R. Network simulation tools survey. Int. J. Adv. Res. Comput. Commun. Eng. 2012 , 1 , 199–206. [ Google Scholar ]
  • Pan, J.; Jain, R. A Survey of Network Simulation Tools: Current Status and Future Developments. 2008, Volume 2, p. 45. Available online: https://www.cse.wustl.edu/~jain/cse567-08/ftp/simtools/index.html (accessed on 3 September 2019).
  • Korkalainen, M.; Sallinen, M.; Kärkkäinen, N.; Tukeva, P. Survey of wireless sensor networks simulation tools for demanding applications. In Proceedings of the 2009 Fifth International Conference on Networking and Services, Valencia, Spain, 20–25 April 2009; pp. 102–106. [ Google Scholar ]
  • Venkataramanan, V.; Lakshmi, S. A Case Study of Various Wireless Network Simulation Tools. Int. J. Commun. Netw. Inf. Secur. 2018 , 10 , 389–396. [ Google Scholar ]
  • Mehta, S.; Ullah, N.; Kabir, M.H.; Sultana, M.N.; Kwak, K.S. A Case Study of Networks Simulation Tools for Wireless Networks. In Proceedings of the 2009 Third Asia International Conference on Modelling Simulation, Bali, Indonesia, 25–29 May 2009; pp. 661–666. [ Google Scholar ] [ CrossRef ]
  • Dorathy, I.; Chandrasekaran, M. Simulation tools for mobile ad hoc networks: A survey. J. Appl. Res. Technol. 2018 , 16 , 437–445. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Mallapur, S.V.; Patil, S.R. Survey on simulation tools for mobile ad-hoc networks. In. J. Comput. Netw. Wirel. Commun. 2012 , 2 , 241–248. [ Google Scholar ]
  • Toor, A.S.; Jain, A. A survey on wireless network simulators. Bull. Electrical Eng. Inform. 2017 , 6 , 62–69. [ Google Scholar ]
  • Miozzo, M.; Bartzoudis, N.; Requena, M.; Font-Bach, O.; Harbanau, P.; López-Bueno, D.; Payaró, M.; Mangues, J. SDR and NFV extensions in the ns-3 LTE module for 5G rapid prototyping. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [ Google Scholar ]
  • Giupponi, L.; Henderson, T.; Bojovic, B.; Miozzo, M. Simulating LTE and Wi-Fi coexistence in unlicensed spectrum with NS-3. arXiv 2016 , arXiv:1604.06826. [ Google Scholar ]
  • Zhong, P.; Li, Y.; Huang, W.; Kui, X.; Zhang, Y.; Chen, Y. An Extension to ns-3 for Simulating Mobile Charging with Wireless Energy Transfer. In Communications in Computer and Information Science ; Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z., Eds.; Data Science. ICPCSEE 2017; Springer: Singapore, 2017; Volume 728, pp. 256–270. [ Google Scholar ]
  • Alwahab, D.A.; Laki, S. A simulation-based survey of active queue management algorithms. In Proceedings of the 6th International Conference on Communications and Broadband Networking, Singapore, 24–26 February 2018; pp. 71–77. [ Google Scholar ]
  • Jian, Y.; Krishnaswamy, B.; Austin, C.M.; Bicen, A.O.; Einolghozati, A.; Perdomo, J.E.; Patel, S.C.; Fekri, F.; Akyildiz, I.F.; Forest, C.R.; et al. nanoNS3: A network simulator for bacterial nanonetworks based on molecular communication. Nano Commun. Netw. 2017 , 12 , 1–11. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Bisio, I.; Delucchi, S.; Lavagetto, F.; Marchese, M.; Portomauro, G.; Zappatore, S. An Ns-3 based simulative and emulative platform. In Modeling and Simulation of Computer Networks and Systems ; Elsevier: Amsterdam, The Netherlands, 2015; pp. 555–575. [ Google Scholar ]
  • Kim, E.; Riley, G.F. Automatic State Saving and Rollback in ns-3. In Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, Singapore, 24–26 May 2017; pp. 263–266. [ Google Scholar ]
  • Maskooki, A.; Sabatino, G.; Mitton, N. Chapter 21—Analysis and performance evaluation of the next generation wireless networks. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 601–627. [ Google Scholar ] [ CrossRef ]
  • Fernandes, D.A.; Neto, M.; Soares, L.F.; Freire, M.M.; Inácio, P.R. Chapter 10—On the self-similarity of traffic generated by network traffic simulators. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 285–311. [ Google Scholar ] [ CrossRef ]
  • Amoretti, M.; Picone, M.; Zanichelli, F.; Ferrari, G. Chapter 16—Simulating wireless and mobile systems: The Integration of DEUS and Ns-3. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 465–484. [ Google Scholar ] [ CrossRef ]
  • Tsioliaridou, A.; Liaskos, C.; Dedu, E.; Ioannidis, S. Packet routing in 3D nanonetworks: A lightweight, linear-path scheme. Nano Commun. Netw. 2017 , 12 , 63–71. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hossain, Z.; Xia, Q.; Jornet, J.M. TeraSim: An ns-3 extension to simulate Terahertz-band communication networks. Nano Commun. Netw. 2018 , 17 , 36–44. [ Google Scholar ] [ CrossRef ]
  • Barolli, A.; Oda, T.; Ikeda, M.; Barolli, L.; Xhafa, F.; Loia, V. Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions. J. Comput. Syst. Sci. 2015 , 81 , 1496–1507. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Habbal, A.; Goudar, S.I.; Hassan, S. A Context-aware Radio Access Technology selection mechanism in 5G mobile network for smart city applications. J. Netw. Comput. Appl. 2019 , 135 , 97–107. [ Google Scholar ] [ CrossRef ]
  • Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Ackerman, R.; Basuino, J.; Berreta, W.; Little, T.D. Extending ns3 to simulate visible light communication at network-level. In Proceedings of the 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016; pp. 1–6. [ Google Scholar ]
  • Rajankumar, P.; Nimisha, P.; Kamboj, P. A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In Proceedings of the 2014 International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 5–7 March 2014; pp. 889–894. [ Google Scholar ]
  • Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Little, T.D. Visible light communication module: An open source extension to the ns3 network simulator with real system validation. IEEE Access 2017 , 5 , 22144–22158. [ Google Scholar ] [ CrossRef ]
  • Liu, W.; Wang, X.; Zhang, W.; Yang, L.; Peng, C. Coordinative simulation with SUMO and NS3 for vehicular ad hoc networks. In Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, Indonesia, 25–27 August 2016; pp. 337–341. [ Google Scholar ]
  • Jha, R.K.; Kharga, P. A comparative performance analysis of routing protocols in MANET using NS3 simulator. Int. J. Comput. Netw. Inf. Security 2015 , 7 , 62–68. [ Google Scholar ]
  • Bhatia, D.; Sharma, D.P. A comparative analysis of proactive, reactive and hybrid routing protocols over open source network simulator in mobile ad hoc network. Int. J. Appl. Eng. Res. 2016 , 11 , 3885–3896. [ Google Scholar ]
  • Naik, L.; Khan, R.; Mishra, R. Analysis of node velocity effects in MANET routing protocols using network simulator (NS3). Int. J. Comput. Appl. 2016 , 144 , 1–5. [ Google Scholar ] [ CrossRef ]
  • Aman, A.H.M.; Hashim, A.H.A.; Ramli, H.A.M. Simulation Analysis for Multicast Context Delivery Network Mobility Management. Indones. J. Electr. Eng. Inform. (IJEEI) 2017 , 5 , 390–394. [ Google Scholar ]
  • Saluja, A.; Dargad, S.; Mistry, K. A Detailed Analogy of Network Simulators—NS1, NS2, NS3 and NS4. Int. J. Future Revolut. Comput. Sci. Commun. Eng. 2017 , 3 , 291–295. [ Google Scholar ]
  • Spaho, E.; Bylykbashi, K.; Barolli, L.; Takizawa, M. Routing in a DTN: Performance evaluation for random waypoint and steady state random waypoint using NS3 simulator. In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2017 ; Xhafa, F., Caballé, S., Barolli, L., Eds.; Lecture Notes on Data Engineering and Communications Technologies; Springer: Cham, Switzerland, 2017; Volume 13, pp. 133–141. [ Google Scholar ]
  • Patel, R.; Patel, N.; Patel, S. An Approach to Analyze Behavior of Network Events in NS2 and NS3 Using AWK and Xgraph. In Information and Communication Technology for Competitive Strategies ; Springer: Cham, Switzerland, 2019; pp. 137–147. [ Google Scholar ]
  • Amiri-Nezhad, M.; Guerrero-Zapata, M.; Bellalta, B.; Cerdà-Alabern, L. Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3. EURASIP J. Wirel. Commun. Netw. 2014 , 2014 , 118. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Nurchis, M.; Bellalta, B. Performance Evaluation of LAA-LTE and WiFi Coexistence in Unlicensed 5 GHz Band Under Asymmetric Network Deployments Using NS3. In Proceedings of the International Workshop on Multiple Access Communications, Aalborg, Denmark, 21–22 November 2016; Springer: Cham, Switzerland, 2016; pp. 86–97. [ Google Scholar ]
  • Paliwal, G.; Taterh, S. Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3. In Soft Computing: Theories and Applications ; Springer: Cham, Switzerland, 2018; pp. 327–335. [ Google Scholar ]
  • Khattak, R.; Chaltseva, A.; Riliskis, L.; Bodin, U.; Osipov, E. Comparison of wireless network simulators with multihop wireless network testbed in corridor environment. In Proceedings of the Multiple Access Communications, Lecture Notes in Computer Science, MACOM 2016, Thessaloniki, Greece, 25–27 May 2016; Madsen, T., Nielsen, J., Pratas, N., Eds.; Springer: Cham, Switzerland, 2011; Volume 10121, pp. 80–91. [ Google Scholar ]
  • Nabou, A.; Laanaoui, M.D.; Ouzzif, M. The Effect of Transmit Power on MANET Routing Protocols Using AODV, DSDV, DSR and OLSR in NS3. In Advanced Intelligent Systems for Sustainable Development (AI2SD’2018), Proceedings of the Advances in Intelligent Systems and Computing AI2SD 2018, Tangier, Morocco, 12–14 July 2018 ; Ezziyyani, M., Ed.; Springer: Cham, Switzerland, 2018; Volume 915, pp. 274–286. [ Google Scholar ]
  • Henderson, T.R.; Lacage, M.; Riley, G.F.; Dowell, C.; Kopena, J. Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 2008 , 14 , 527. [ Google Scholar ]
  • Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM: NDN Simulator for NS-3 ; University of California: Los Angeles, CA, USA, 2012; Volume 4. [ Google Scholar ]
  • Mastorakis, S.; Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM 2: An Updated NDN Simulator for NS-3; NDN, Technical Report NDN-0028. 2016, pp. 1–8. Available online: http://named-data.net/publications/techreports/ndn-0028-2-ndnsim-v2/ (accessed on 3 September 2019).
  • Pei, G.; Henderson, T.R. Validation of OFDM error rate model in ns-3. Boeing Res. Technol. 2010 , 1–15. Available online: https://pdfs.semanticscholar.org/3f0a/b039b235bd0fa1e833876ba78e7ea99d9a04.pdf (accessed on 3 September 2019).
  • Carneiro, G.; Fortuna, P.; Ricardo, M. FlowMonitor: A network monitoring framework for the network simulator 3 (NS-3). In Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, Pisa, Italy, 20–22 October 2009; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2009; pp. 1–10. [ Google Scholar ]
  • Arbabi, H.; Weigle, M.C. Highway mobility and vehicular ad-hoc networks in ns-3. In Proceedings of the Winter Simulation Conference, Baltimore, MA, USA, 5–8 December 2010; pp. 2991–3003. [ Google Scholar ]
  • Stoffers, M.; Riley, G. Comparing the ns-3 propagation models. In Proceedings of the 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, USA, 7–9 August 2012; pp. 61–67. [ Google Scholar ]
  • Narra, H.; Cheng, Y.; Cetinkaya, E.K.; Rohrer, J.P.; Sterbenz, J.P. Destination-sequenced distance vector (DSDV) routing protocol implementation in ns-3. In Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, Barcelona, Spain, 21–25 March 2011; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2011; pp. 439–446. [ Google Scholar ]
  • Van den Abeele, F.; Haxhibeqiri, J.; Moerman, I.; Hoebeke, J. Scalability analysis of large-scale LoRaWAN networks in ns-3. IEEE Internet Things J. 2017 , 4 , 2186–2198. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wu, X.; Brown, K.N.; Sreenan, C.J.; Alvarez, P.; Ruffini, M.; Marchetti, N.; Payne, D.; Doyle, L. An XG-PON module for the NS-3 network simulator. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France, 5–7 March 2013; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 195–202. [ Google Scholar ]
  • Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2019 , 20 , 760–776. [ Google Scholar ] [ CrossRef ]
  • Dong, Q.; Chen, Y.; Li, X.; Zeng, K. A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study. arXiv 2018 , arXiv:1808.09858. [ Google Scholar ]
  • Alenazi, M.J.F.; Cheng, Y.; Zhang, D.; Sterbenz, J.P.G. Epidemic routing protocol implementation in ns-3. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 54–59. [ Google Scholar ]

Click here to enlarge figure

Toolns-3ns-3OMNET++SWANSNetSimQualNet
InterfaceC++/PythonC++/OTclC++/NEDJavaC/Java/.NETParsec (C Based)
LicenseFreeFreeFree for academicFreeCommercialCommercial
ParallelismNoNoMPI/PVMNo-SMP/Beowulf
O.S.Linux, FreeBSD, Mac OS X, WindowsLinux, FreeBSD, Mac OS X, WindowsLinux, Mac OS X, WindowsLinux, Mac OS X, WindowsWindowsLinux, Mac OS X, Windows, Unix
Mobility SupportYesYesNoYesYesYes
GUI SupportLimitedYesYesYesYesYes
Data SourceWeb Site
Scopus
The ACM Digital Library
IEEE Xplore
Springer
Elsevier Science Direct
SourceNumber of Docs for ns3Number of Docs for ns-3
1Google Scholar28,70032,500
2Elsevier727,109
3Springer2173,518
4IEEE Explore D.L.4571816
5The ACM Digital Library394290,550
C.2.0General
C.2.1Network Architecture and Design
C.2.2Network Protocols
C.2.3Network Operations
C.2.4Distributed Systems
C.2.5Local and Wide-Area Networks
C.2.6Internetworking
C.2.mMiscellaneous
implementation31
implementing2
improved2
improvement1
improving2
enhancing1
extending2
extension3
integration1
integrating1
TypeCriteria
1ExclusionInformal literature
2ExclusionDuplicated papers
3ExclusionPapers that did not comply research questions
4ExclusionPapers not written in English language
5InclusionPapers that report any kind of use of ns-3
Id...
Author...
Title...
Year...
Venue...
Citations...
RQ1Which are the impacted Application Domains?
Q1.1What kind of the network technologies are simulated? (e.g., WSN, wireless networks,
mobile networks, internetworking...)
Q1.2Which are the related application field? (e.g., medicine, astrology, ...)
Q1.3What kind of problem is addressed? (e.g., security, assessment, experimental methodology...)
RQ2How much is this approach extensible?
Q2.1Is it a new extension or module? yes/no
Q2.2Does it use an external module or extension? yes/no
200920102011201220132014
Query2%0%2%6%5%5%
search(3)(0)(3)(8)(7)(7)
Selected2%0%2%7%6%6%
papers(2)(0)(2)(8)(7)(7)
20152016201720182019TOTAL
Query16%19%23%13%9%100%
search(21)(23)(28)(17)(11)128
Selected16%19%22%12%8%100%
papers(19)(23)(27)(15)(10)120
Application study68
Module extension5
Conceptual study36
Survey11
IdQuality Assessment CriteriaScore
A1What is the relevance of the paper according to the
conference/journal where it was published?
A2What is the relevance of the citation according to its
related citations?
A3How clearly is the problem of the study described?
A4How clearly is the research context stated?
A5How explicitly are the contributions presented?
A6How explicitly are the insights and issues for future
work stated?
RQ1Which are the Impacted Application Domains?
Q1.1What kind of network technologies are simulated?%n
MANET14%16
WSN8%10
Wireless Networks12%14
Mobile Networks15%18
Networking27%32
VANET17%18
Other7%9
Q1.2Which are the related application fields?
Medicine
Physics
Astronomy
Other
Q1.3What kind of problem is addressed?
Security11%11
Assessment33%34
Network Protocol26%27
Physical Layer6%6
Performance24%24
RQ2How Much Is This Approach Extensible?
Q2.1Is it a new extension or module?%n
Yes17%20
No83%100
Q2.2Does it use an external module or extension?
Yes31%37
No89%83
20092010201120122013201420152016201720182019
2028771923271510

Share and Cite

Campanile, L.; Gribaudo, M.; Iacono, M.; Marulli, F.; Mastroianni, M. Computer Network Simulation with ns-3: A Systematic Literature Review. Electronics 2020 , 9 , 272. https://doi.org/10.3390/electronics9020272

Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M. Computer Network Simulation with ns-3: A Systematic Literature Review. Electronics . 2020; 9(2):272. https://doi.org/10.3390/electronics9020272

Campanile, Lelio, Marco Gribaudo, Mauro Iacono, Fiammetta Marulli, and Michele Mastroianni. 2020. "Computer Network Simulation with ns-3: A Systematic Literature Review" Electronics 9, no. 2: 272. https://doi.org/10.3390/electronics9020272

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

To read this content please select one of the options below:

Please note you do not have access to teaching notes, networking capability: a systematic review of literature and future research agenda.

Journal of Business & Industrial Marketing

ISSN : 0885-8624

Article publication date: 5 April 2021

Issue publication date: 3 January 2022

The purpose of this paper is to scrutinize the existing literature and provide a comprehensive overview by compiling and synthesizing the dispersed body of knowledge in the networking capability (NC) literature stream. Therefore, this review study contributes to the research by presenting a summary of the NC complex construct.

Design/methodology/approach

The authors have tried to cover the literature gap in the NC area through a systematic review.

The theoretical contributions of this study to the NC literature stream are fourfold. First, while critically reviewing existing definitions, the authors present an integrated definition of NC. Second, the authors delineate the conceptual boundary between NC and other similar capabilities. Third, the authors found that the focal firms’ NC consists of two key dimensions: network development capability (NDC) and network management capability (NMC). Fourth, they contribute to the literature by providing a set of suggestions for further research in the NC literature stream.

Research limitations/implications

This study has some limitations, like other review studies. First, although the authors have tried their best to conduct a comprehensive literature search, they may have missed a study. Second, it should be noted that this study has confined itself to a particular stream of literature. Undoubtedly, in other streams, there will be issues similar to the concepts discussed in this study. The main purpose of this study is to integrate a series of studies that have a common theoretical foundation and fall within a particular literature stream. Although the focus of this study may be positive, it can be said that the deprivation of achievements from other similar streams is one of the limitations of this study. Third, another limitation of this study is the lack of verification of the conceptual framework derived from the literature that needs to be addressed in future research.

Practical implications

This study suggests a set of practical implications for industrial managers. First, the authors summarize the firms’ capabilities needed to develop and manage networks in one single source. Based on the conceptual framework of this study, firms can develop managerial tools, technological options, checklists and questionnaires and monitor the status of NC in their surrounding network on an ongoing basis. Second, the present research shows that some NCs are more repetitive than others, and therefore, it can be said that managers should pay more attention to them. The critical NCs, such as determining network position, determining network size, partner selection and attraction, coordination, inter-firm knowledge sharing and conflict resolution, are included in this study. Third, the argument of this study that both NDC and NMC should be considered simultaneously can be thought of as an important practical implication. Although in terms of the network life cycle, NDC is required earlier than NMC, these two capabilities should be used in parallel. Managers should not expect network development to be perfect and then network management to begin; therefore, NMCs should be used during network development.

Originality/value

Research shows that most network studies focus more on network antecedents and outputs and less on processes and related capabilities. Some researchers have made few efforts to identify and scrutinize capabilities related to business relationships. In this context, IMP scholars have introduced NC to emphasize the network perspective. Despite the considerable conceptual and empirical richness, the existence of different nomenclatures and theoretical diversity in NC literature has led to conceptual ambiguity and a lack of consensus on this crucial complex construct.

  • Systematic review
  • Network perspective
  • Networking capability
  • Network development capability
  • Network management capability

Arasti, M. , Garousi Mokhtarzadeh, N. and Jafarpanah, I. (2022), "Networking capability: a systematic review of literature and future research agenda", Journal of Business & Industrial Marketing , Vol. 37 No. 1, pp. 160-179. https://doi.org/10.1108/JBIM-06-2020-0273

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

Methods in Teaching Computer Networks: A Literature Review

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations.

  • Doğan M Öztoprak K Tolun M (2024) Teaching computer architecture by designing and simulating processors from their bits and bytes PeerJ Computer Science 10.7717/peerj-cs.1818 10 (e1818) Online publication date: 19-Feb-2024 https://doi.org/10.7717/peerj-cs.1818
  • Akhmetov I Schmidt L (2024) Building Bridges in Computer Networks: A Nifty Assignment for Cross-Language Learning and Code Refactoring Proceedings of the 26th Western Canadian Conference on Computing Education 10.1145/3660650.3660665 (1-2) Online publication date: 2-May-2024 https://dl.acm.org/doi/10.1145/3660650.3660665
  • Minagar S Sakzad A Tack G Rudolph C Sheard J Stephenson B Stone J Battestilli L Rebelsky S Shoop L (2024) ALAN: Assessment-as-Learning Authentic Tasks for Networking Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 10.1145/3626252.3630774 (853-859) Online publication date: 7-Mar-2024 https://dl.acm.org/doi/10.1145/3626252.3630774
  • Show More Cited By

Index Terms

Social and professional topics

Professional topics

Computing education

Recommendations

Analysis and research on the teaching methods of vocational college teachers under the background of big data.

The teaching methods of vocational college teachers can not only reflect the comprehensive quality and professional level of teachers, but also highlight the innovative ability of teachers. Good teaching methods can not only help students learn ...

Comparing Teachers’ and Preservice Teachers’ Opinions on Teaching Methods in Computer Science Education

Teaching methods are a variety of pedagogical approaches that can be used by teachers to enable student learning in the classroom. While the efficiency of these methods largely depends on the characteristics of the individual learners and the classroom ...

Bilingual Teaching of Computer Networks: Research and Practice

Under the background of economic globalization, bilingual teaching became one of the hotspots of teaching reform in China. At first, the concept and essence of bilingual teaching is studied, the related education policies in China are analyzed, and the ...

Information

Published in.

cover image ACM Transactions on Computing Education

Washington State University, USA

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • Computer networks
  • literature survey
  • network simulators
  • teaching methods
  • Research-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 24 Total Citations View Citations
  • 971 Total Downloads
  • Downloads (Last 12 months) 163
  • Downloads (Last 6 weeks) 13
  • Andronovici D Nicolas D Turcanu I Sommer C (2024) Demo: Interactive Off-the-Shelf In-Car TSN Testbed 2024 IEEE Vehicular Networking Conference (VNC) 10.1109/VNC61989.2024.10575946 (267-268) Online publication date: 29-May-2024 https://doi.org/10.1109/VNC61989.2024.10575946
  • Asadi S Allison J Iranmanesh M Fathi M Safaei M Saeed F (2024) Determinants of Intention to Use Simulation-Based Learning in Computers and Networking Courses: An ISM and MICMAC Analysis IEEE Transactions on Engineering Management 10.1109/TEM.2024.3374517 71 (6015-6030) Online publication date: 2024 https://doi.org/10.1109/TEM.2024.3374517
  • Asadi S Allison J Khurana M Nilashi M (2024) Simulation-based learning for computer and networking teaching: A systematic literature review and bibliometric analysis Education and Information Technologies 10.1007/s10639-024-12476-7 Online publication date: 1-Feb-2024 https://doi.org/10.1007/s10639-024-12476-7
  • Zhang J Feng H Liu B Zhao D (2023) Survey of Technology in Network Security Situation Awareness Sensors 10.3390/s23052608 23 :5 (2608) Online publication date: 27-Feb-2023 https://doi.org/10.3390/s23052608
  • Woolcott G Bui V (2023) Design and implementation of a smart learning environment for teaching computer networking European Journal of Open, Distance and E-Learning 10.2478/eurodl-2023-0013 25 :1 (162-179) Online publication date: 31-Oct-2023 https://doi.org/10.2478/eurodl-2023-0013
  • Luo W Wang Q (2023) Exploration of Computer Teaching Reform in Colleges and Universities under the Background of Informatization Applied Mathematics and Nonlinear Sciences 10.2478/amns.2023.2.01263 9 :1 Online publication date: 27-Nov-2023 https://doi.org/10.2478/amns.2023.2.01263
  • Li J Yang B Dong X (2023) Discussion on SPOC online and offline blended mode of Computer Networks Proceedings of the 2023 7th International Conference on Education and E-Learning 10.1145/3637989.3637993 (103-108) Online publication date: 25-Nov-2023 https://dl.acm.org/doi/10.1145/3637989.3637993

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

HTML Format

View this article in HTML Format.

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

  • DOI: 10.2991/ICCMCEE-15.2015.222
  • Corpus ID: 55749006

A review of Network Topology

  • Ruojing Jiang
  • Published 28 November 2015
  • Computer Science

4 Citations

Internet of harvester nano things: a future prospects, wsn based advanced emergency fire alarm system using mqtt centric star topology, ai-based decision support system optimizing wireless sensor networks for consumer electronics in e-commerce, computer network design for universities in developing countries, 6 references, an end-connected dual bus topology for metropolitan area networks, a formal study on topology and floorplan characteristics of mesh and torus-based optical networks-on-chip.

  • Highly Influential

Information dissemination in VANETs based upon a tree topology

Investigation of wavelength division multiplexed hybrid ring-tree-star network topology to enhance the system capacity, a switchable high-speed fiber-optic ring net topology and its method of high-performance synchronization for large-capacity power electronics system, effect of linking topology on the properties of star-shaped derivatives of triazine and fluorene, related papers.

Showing 1 through 3 of 0 Related Papers

STARS

  • < Previous

Home > University Libraries > Digital Collections > IST > 137

Institute for Simulation and Training

Literature Review For Networking And Communication Technology

Michael Bassiouni Michael Georgiopoulos Jack Thompson

Contributors

University of Central Florida. Division of Sponsored Research; University of Central Florida. Institute for Simulation and Training

Computer networks -- Computer simulation; Distributed operating systems (Computers)

Report documents the results of a literature search performed in the area of networking and communication technology.

Table of Contents

Networking and communication technology laboratory literature review: Introduction -- Purpose -- Statement of the problem -- Investigation methodology -- Procedures -- Summary -- Appendix A Modeling of computer communication systems library listing -- Appendix B On-line search article titles -- Appendix C On-line search abstracts -- Appendix D DURRA library listing.

Publication Date

Place of publication.

Orlando (Fla.)

Number of Pages

Prepared for.

United States. Army. Project manager. Training Devices

IST Document Number

Document number statement.

IST technical report numbers are not necessarily unique document numbers.

Not to be used for commercial purposes except by permission.

Institute for Simulation and Training, University of Central Florida

097IST; DP0006203

Call Number

TK5105.5.B37 1989

Contract Number

N61339-98-C-0043

Document Type

Research Report

Recommended Citation

Bassiouni, Michael; Georgiopoulos, Michael; and Thompson, Jack, "Literature Review For Networking And Communication Technology" (1989). Institute for Simulation and Training . 137. https://stars.library.ucf.edu/istlibrary/137

Since August 20, 2015

Advanced Search

  • Notify me via email or RSS
  • Colleges & Departments
  • Disciplines
  • Expert Gallery
  • Submit Item
  • My STARS Account
  • Frequently Asked Questions
  • Follow STARS
  • About STARS

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Computer Network And Its Consequences -A Literature Survey

  • November 2019
  • 2(11):12-26

Pushparaj Pal at National Institute of Technical Teachers Training and Research, Chandigarh,India

  • National Institute of Technical Teachers Training and Research, Chandigarh,India

Abstract and Figures

MAN Structure Layouts 1.4 WAN and its Global standards Numerous WANs have been constructed, including public packet networks, large corporate networks, military networks, banking networks, stock brokerage networks, and airline reservation networks. Organizations supporting WANs using the Internet Protocol are known as Network Service Providers (NSPs). These form the core of the Internet. Clarify Global WANs and WLANs.

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • Satinderjeet Singh

Balvinder Singh

  • Natasha Dutta

Anthony Bisong

  • Sivakumar Sai Rela Muni
  • Frederick M. Avolio
  • Martin Casado

Tal Garfinkel

  • Aditya Akella
  • Scott Shenker
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

A Systematic Literature Review on Affective Computing Techniques for Workplace Stress Detection

Challenges, Future Directions, from Data Collection to Stress Detection

  • Conference paper
  • First Online: 08 September 2024
  • Cite this conference paper

literature review computer network

  • Iris Mezieres 10 ,
  • Abir Gorrab 11 ,
  • Rébecca Deneckère 10 ,
  • Nourhène Ben Rabah 10 &
  • Bénédicte Le Grand 10  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2165))

Included in the following conference series:

  • International Conference on Computational Collective Intelligence

In a world where work significantly impacts daily life, its influence on well-being is undeniable. The prevalence of stress at work has gain an increased attention due to its profound effects on both individual health and corporate performance. Addressing and detecting stress has become an essential challenge in fostering a healthy work environment. Technological innovations, especially in the field of affective computing, which involves various IT resources for analyzing human behavior and emotions, offer promising solutions for measuring employee stress. This paper provides a Systematic Literature Review (SLR) focusing on the existing scientific research in stress at work assessment using affective computing technologies. What distinguishes our work from others is that we deeply focus on each phase of the stress quantification process. We start by reviewing application contexts, before detailing the data collection process, including data sources and collection devices. We then highlight data analysis techniques used in the literature. Finally, we emphasize the challenges discussed by researchers during their work and give insight into future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

EU-OSHA Homepage, https://osha.europa.eu/fr . Accessed 10 Feb 2024.

ESENER Homepage, https://osha.europa.eu/fr/facts-and-figures/esener . Accessed 10 Feb 2024.

The American Institute of Stress https://www.stress.org/workplace-stress . Accessed 1 March 2024.

Jeanguenat, A.M., Dror, I.E.: Human factors effecting forensic decision making: workplace stress and well-being. J. Forensic Sci. 63 (1), 258–261 (2018)

Article   Google Scholar  

Mittal, S., Mahendra, S., Sanap, V., Churi, P.: How can machine learning be used in stress management: a systematic literature review of applications in workplaces and education. Int. J. Inf. Manage. Data Insights 2 (2), 100110 (2022)

Google Scholar  

Carneiro, D., Novais, P., Augusto, J.C., Payne, N.: New methods for stress assessment and monitoring at the workplace. IEEE Trans. Affect. Comput. 10 (2), 237–254 (2017)

Munoz, S., Iglesias, C.Á., Mayora, O., Osmani, V.: Prediction of stress levels in the workplace using surrounding stress. Inf. Process. Manage. 59 (6), 103064 (2022)

Richardson, S.: Affective computing in the modern workplace. Bus. Inf. Rev. 37 (2), 78–85 (2020)

Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering (2007)

Lopes, L., Rodrigues, A., Cabral, D., Campos, P.: From monitoring to assisting: a systematic review towards healthier workplaces. Int. J. Environ. Res. Public Health 19 (23), 16197 (2022)

Can, Y.S., Arnrich, B., Ersoy, C.: Stress detection in daily life scenarios using smart phones and wearable sensors: a survey. J. Biomed. Inform. 92 , 103139 (2019)

Khakurel, J., Melkas, H., Porras, J.: Tapping into the wearable device revolution in the work environment: a systematic review. Inf. Technol. People 31 (3), 791–818 (2018)

Aiello, J.R., Kolb, K.J.: Electronic performance monitoring and social context: impact on productivity and stress. J. Appl. Psychol.  80 (3), 339 (1995)

Lawanot, W., Inoue, M., Yokemura, T., Mongkolnam, P., Nukoolkit, C.: Daily stress and mood recognition system using deep learning and fuzzy clustering for promoting better well-being. In: IEEE International Conference on Consumer Electronics (ICCE), pp. 1–6 (2019)

Banholzer, N., Feuerriegel, S., Fleisch, E., Bauer, G.F., Kowatsch, T.: Computer mouse movements as an indicator of work stress: longitudinal observational field study. J. Med. Internet Res. 23 (4), e27121 (2021)

Ubilluz, C., Delgado, R., Marcillo, D., Noboa, T.: Brain waves processing, analysis and acquisition to diagnose stress level in the work environment. In: Rocha, Á., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2018. AISC, vol. 746, pp. 859–866. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77712-2_81

Chapter   Google Scholar  

Leone, A., Rescio, G., Siciliano, P., Papetti, A., Brunzini, A., Germani, M.: Multi sensors platform for stress monitoring of workers in smart manufacturing context. In: IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 1–5. IEEE (2020)

Androutsou, T., Angelopoulos, S., Kouris, I., Hristoforou, E., Koutsouris, D.: A smart computer mouse with biometric sensors for unobtrusive office work-related stress monitoring. In: 43rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 7256–7259 (2021)

Pepa, L., Sabatelli, A., Ciabattoni, L., Monteriu`, A., Lamberti, F., Morra, L.: Stress detection in computer users from keyboard and mouse dynamics. IEEE Trans. Consum. Electron. 67 (1), 12–19 (2020)

Yu, B., Zhang, B., An, P., Xu, L., Xue, M., Hu, J.: An unobtrusive stress recognition system for the smart office. In: 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 1326–1329 (2019)

Rahman, M.F.A., Giovanni, V.C., Warnars, H.L.H.S., Aryono, G.D.P., Megantoro, B.: Facial recognition development to detect corporate employees stress level. In: IEEE International Conference on Engineering, Technology and Education (TALE), pp. 1–6 (2019)

Morshed, M.B., et al.: Advancing the understanding and measurement of workplace stress in remote information workers from passive sensors and behavioral data. In: 10th International Conference on Affective Computing and Intelligent Interaction (ACII), pp. 1–8 (2022)

Kuroha, M., Ban, Y., Fukui, R., Warisawa, S.I.: Chronic stress level estimation focused on motion pattern changes acquired from seat pressure distribution. In: IEEE International Conference on Cyberworlds (CW), pp. 135–142 (2019)

Stefanescu, V.A., Radoi, I.E.: Stress level prediction using data from wearables. In: 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1–6 (2019)

Akbar, F., Mark, G., Pavlidis, I., Gutierrez-Osuna, R.: An empirical study comparing unobtrusive physiological sensors for stress detection in computer work. Sensors 19 (17), 3766 (2019)

Xue, M., Liang, R.H., Hu, J., Yu, B., Feijs, L.: Understanding how group workers reflect on organizational stress with a shared, anonymous heart rate variability data visualization. In: CHI Conference on Human Factors in Computing Systems Extended Abstracts, pp. 1–7 (2022)

Fauzi, M.A., Yang, B.: Continuous stress detection of hospital staff using smartwatch sensors and classifier ensemble. In: pHealth, pp. 245–250. IOS Press (2021)

Makowska-Tlomak, E., Nielek, R., Skorupska, K., Paluch, J., Kopec, W.: Evaluating a sentiment analysis tool to detect digital transformation stress. In: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 103–111 (2021)

Chodan, W., et al.: The SEBA system: a novel approach for assessing psychological stress continuously at the workplace. In: Proceedings of the 6th International Workshop on Sensor-based Activity Recognition and Interaction, pp. 1–6 (2019)

Raj, J.V., Sarath, T.V.: An IoT based real-time stress detection system for fire-fighters. In: International Conference on Intelligent Computing and Control Systems (ICCS), pp. 354–360. IEEE (2019)

Tsuji, S., Sato, N., Ara, K., Yano, K.: Estimating group stress level by measuring body motion. Front. Psychol. 12 , 634722 (2021)

Gavas, R.D., et al.: A sensor-enabled digital trier social stress test in an enterprise context. In: 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 1321–1325. IEEE (2019)

Gaballah, A., Tiwari, A., Narayanan, S., Falk, T.H.: Context-aware speech stress detection in hospital workers using Bi-LSTM classifiers. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8348–8352 (2021)

Tiwari, A., Narayanan, S., Falk, T.H.: Stress and anxiety measurement “in-the-wild” using quality-aware multi-scale HRV features. In: 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 7056–7059. IEEE (2019)

Umematsu, T., Sano, A., Taylor, S., Tsujikawa, M., Picard, R.W.: Forecasting stress, mood, and health from daytime physiology in office workers and students. In: 42nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE (EMBC), pp. 5953–5957 (2020)

Paletta, L., et al.: Towards Large-scale evaluation of mental stress and biomechanical strain in manufacturing environments using 3D-referenced gaze and wearable-based analytics. Electron. Imaging 33 , 1–7 (2021)

Nkurikiyeyezu, K., Shoji, K., Yokokubo, A., Lopez, G.: Thermal comfort and stress recognition in office environment. In: HEALTHINF, pp. 256–263 (2019)

Hoekstra, M., Lu, P.L., Lyu, T., Zhang, B., Hu, J.: Collective stress visualization enabled by smart cushions for office chairs. In: Streitz, N.A., Konomi, S. (eds.) HCII 2022. LNCS, vol. 13325, pp. 278–290. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05463-1_20

Vildjiounaite, E., Huotari, V., Kallio, J., Kyllönen, V., Mäkelä, S.M., Gimel’farb, G.: Unobtrusive assessment of stress of office workers via analysis of their motion trajectories. Perv. Mobile Comput. 58 , 101028 (2019)

Bromuri, S., Henkel, A.P., Iren, D., Urovi, V.: Using AI to predict service agent stress from emotion patterns in service interactions. J. Serv. Manag. 32 (4), 581–611 (2021)

Mättig, B., Döltgen, M., Archut, D., Kretschmer, V.: Intelligent work stress monitoring: prevention of work-related stress with the help of physiological data measured by a sensor wristband. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) Intelligent Systems and Applications: 2018 Intelligent Systems Conference (IntelliSys), vol. 2, pp. 1211–1222. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01057-7

Maxhuni, A., Hernandez-Leal, P., Morales, E.F., Sucar, L.E., Osmani, V., Mayora, O.: Unobtrusive stress assessment using smartphones. IEEE Trans. Mob. Comput. 20 (6), 2313–2325 (2020)

Bolliger, L., Lukan, J., Luˇstrek, M., De Bacquer, D., Clays, E.: Protocol of the STRess At Work (STRAW) project: how to disentangle day-to-day occupational stress among academics based on EMA, physiological data, and smartphone sensor and usage data. Int. J. Environ. Res. Public Health 17 (23), 8835 (2020)

Suni Lopez, F., Condori-Fernandez, N., Catala, A.: Towards real-time automatic stress detection for office workplaces. In: 5th International Conference In Information Management and Big Data, SIMBig, pp. 273–288 (2018)

Jebelli, H., Choi, B., Lee, S.: Application of wearable biosensors to construction sites. I: assessing workers’ stress. J. Constr. Eng. Manage. 145 (12), 04019079 (2019)

Khowaja, S.A., Prabono, A.G., Setiawan, F., Yahya, B.N., Lee, S.L.: Toward soft real-time stress detection using wrist-worn devices for human workspaces. Soft. Comput. 25 , 2793–2820 (2021)

Booth, B.M., Vrzakova, H., Mattingly, S.M., Martinez, G.J., Faust, L., D’Mello, S.K.: Toward robust stress prediction in the age of wearables: modeling perceived stress in a longitudinal study with information workers. IEEE Trans. Affect. Comput. 13 (4), 2201–2217 (2022)

Mozgovoy, V.: Longitudinal estimation of stress-related states through bio-sensor data. Appl. Comput. Inform. (2021)

Download references

Author information

Authors and affiliations.

Centre de Recherche en Informatique, Université Paris 1 Panthéon-Sorbonne, Paris, France

Iris Mezieres, Rébecca Deneckère, Nourhène Ben Rabah & Bénédicte Le Grand

RIADI Laboratory, National School of Computer Science, University of Manouba, Manouba, Tunisia

Abir Gorrab

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Rébecca Deneckère .

Editor information

Editors and affiliations.

and Technology, Wrocław University of Science, Wrocław, Poland

Ngoc-Than Nguyen

University of Leipzig, Leipzig, Germany

Bogdan Franczyk

André Ludwig

Universidad Complutense de Madrid, Madrid, Spain

Manuel Nunez

Vrije Universiteit Amsterdam, Amsterdam, The Netherlands

University of Münster, Münster, Germany

Gottfried Vossen

Adrianna Kozierkiewicz

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Mezieres, I., Gorrab, A., Deneckère, R., Ben Rabah, N., Le Grand, B. (2024). A Systematic Literature Review on Affective Computing Techniques for Workplace Stress Detection . In: Nguyen, NT., et al. Advances in Computational Collective Intelligence. ICCCI 2024. Communications in Computer and Information Science, vol 2165. Springer, Cham. https://doi.org/10.1007/978-3-031-70248-8_4

Download citation

DOI : https://doi.org/10.1007/978-3-031-70248-8_4

Published : 08 September 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-70247-1

Online ISBN : 978-3-031-70248-8

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. (PDF) Computer Network Simulation with ns-3: A Systematic Literature

    literature review computer network

  2. Literature Review Examples using Network Visualization

    literature review computer network

  3. Information Technology and the Computer Network

    literature review computer network

  4. literature review computer network

    literature review computer network

  5. What Is A Computer Network

    literature review computer network

  6. (DOC) COMPUTER NETWORKS Computer Networks

    literature review computer network

VIDEO

  1. Review of literature|| Review of literature

  2. Writing the Literature Review (recorded lecture during pandemic)

  3. Different Network layer design issues in Computer Networks By Jayamma Rodda

  4. Research Methods: Lecture 3

  5. What is Literature Review?| How to write Literature review?| Research Methodology|

  6. Computer Network

COMMENTS

  1. Computer Network Simulation with ns-3: A Systematic Literature Review

    In this systematic literature review we aim to analyze, basing our investigation on available literature, the adoption of a popular network simulator, namely ns-3, and its use in the scientific community. ... Simulation is a widely accepted tool in the field of computer networks. Literature offers both free and commercial simulation tools that ...

  2. 376104 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on COMPUTER NETWORKING. Find methods information, sources, references or conduct a literature review on ...

  3. Computer Networks

    Computer Networks | Journal | ScienceDirect.com by Elsevier

  4. Computer Network Simulation with ns-3: A Systematic Literature Review

    This work wants to study in a systematic manner the research literature about ns-3 in the period. between 2009 and 2019. The aim is to find the main research areas in which it has been used and ...

  5. A systematic literature review of methods and datasets for anomaly

    A systematic literature review of methods and datasets for ...

  6. 290334 PDFs

    Find methods information, sources, references or conduct a literature review on COMPUTER NETWORKS Science topics: Computer Science and Engineering Computer Communications (Networks) Computer Networks

  7. A Systematic Literature Review on Software-Defined Networking

    Software-Defined Networking (SDN) is a recently evolving networking architecture that focuses on the separation of control and data planes. Unlike traditional switches, SDN switches include flow tables that are remotely controlled by a separate software application, the controller. SDN is not completely new; it formulates an architecture on top ...

  8. Networking capability: a systematic review of literature and future

    The purpose of this paper is to scrutinize the existing literature and provide a comprehensive overview by compiling and synthesizing the dispersed body of knowledge in the networking capability (NC) literature stream. Therefore, this review study contributes to the research by presenting a summary of the NC complex construct.,The authors have ...

  9. Review and Analysis of Networking Challenges in Cloud Computing

    Computing. Cloud Computing offers virtualized computing, storage, and networking resources, over the Internet, to organizations and individual users in a completely dynamic way. These cloud resources are cheaper, easier to manage, and more elastic than sets of local, physical, ones. This encourages customers to outsource their applications and ...

  10. How-to conduct a systematic literature review: A quick guide for

    Method Article How-to conduct a systematic literature review

  11. Methods in Teaching Computer Networks: A Literature Review

    This article provides a survey of methods and paradigms for teaching Computer Networks (CN). Since the theoretical concepts are rather abstract in this subject, and students often find them too technical and difficult to understand, many authors attempt to answer the question on how to improve students' motivation and interest for the complex teaching material of CN.

  12. A literature review on network reliability analysis and its engineering

    The applications of networks can be observed in numerous engineering realms mainly computers and communication, transportation, electric transmission and oil and gas distribution. Estimating the reliability of such networks is a critical task for the well-being of society as well as a nation.

  13. [PDF] A review of Network Topology

    The recent development of six different common topologies are summarized: Bus, Ring, Star, Extended Star, Hierarchical, and Mesh. A network topology is how computers, printers, and other devices are connected over a network. It describes the layout of wires, devices, and routing paths. Essentially there are six different common topologies you should familiarize yourself with: Bus, Ring, Star ...

  14. A systematic literature review for network intrusion detection system

    A thorough evaluation was carried out by [] on IDS with a focus on the signature- and anomaly-based approaches; however, a systematic literature review approach was not followed, and there was also no in-depth analysis or comparisons of the methods, datasets, attacks, or performances of the techniques.In the same vein, [] followed a systematic approach to reviewing hybrid-based IDS; however ...

  15. A Structured Literature Review on Networks and Organizations

    2 Methodology. This chapter aims at analysing the main trends and characteristics of the literature regarding networks and organizations in the last 20 years (2002-2021). Following Massaro, Dumay, and Guthrie (2016) we developed a structured literature review, starting with setting boundaries to our research.

  16. (PDF) Computer Networking: A Survey

    REVIEW OF LITERATURE (Balasubramaniam, 2015) Computer networks are becoming more and more commonplace. In today's world, a computer network is much more than just a collection of linked gadgets. ...

  17. Literature Review For Networking And Communication Technology

    Table of Contents. Networking and communication technology laboratory literature review: Introduction -- Purpose -- Statement of the problem -- Investigation methodology -- Procedures -- Summary -- Appendix A Modeling of computer communication systems library listing -- Appendix B On-line search article titles -- Appendix C On-line search abstracts -- Appendix D DURRA library listing.

  18. A Literature Review on Challenges and Effects of Software Defined

    A Literature Review on Challenges and Effects of Software ...

  19. PDF Review of computer networking technology

    112. 125. Review of Computer Networking Technology*. Robert P. Blanc. This report gives a descriptive summary of the technical characteristics of existing computer networks, including data communication technology and configuration related to support of resource sharing services for a computer network. Included.

  20. Recent Trends and Developments in Computer Networks: a Literature

    A literature review was carried out on different topics and synthesized. The survey on recent trends in computer networks depicts the effectiveness of these technologies in present and future in ...

  21. PDF CHAPTER 2 LITERATURE REVIEW

    2.1 INTRODUCTION. This chapter reports on the results of literature review. The purpose of the literature review was to examine what information-communication technologies and their applications entail, especially in nursing education. The historical development of information-communication technologies and trends on computer assisted ...

  22. A network approach toward literature review

    This study introduces a method that uses a network approach towards literature review. To employ this approach, we use hypotheses proposed in scientific publications as building blocks. In network terms, a hypothesis is a directed tie between two concepts or nodes. The network emerges by aggregating the hypotheses from a set of articles in a specific domain. This study explains the method and ...

  23. Computer Network And Its Consequences -A Literature Survey

    1.1 Computer Networks fall into three classes regarding the size, distance and the structure. namely: LAN (Local Area Ne twork), MAN (Metropolitan Area Network), WAN (Wide Area. Network). Before ...

  24. A Systematic Literature Review on Affective Computing Techniques for

    This paper provides a Systematic Literature Review (SLR) focusing on the existing scientific research in stress at work assessment using affective computing technologies. What distinguishes our work from others is that we deeply focus on each phase of the stress quantification process.