NAM ANIMATOR USING NETWORK PROTOCOL
|
|
- Franklin Wilkinson
- 5 years ago
- Views:
Transcription
1 International Journal of of Computer Engineering Engineering and Technology (IJCET), ISSN (Print), and Technology (IJCET), ISSN (Print) ISSN (Online) Volume 2 Number 1, Jan - April (2011), pp IAEME, IJCET I A E M E NAM ANIMATOR USING NETWORK PROTOCOL S.L.MOHAMMED SAJEER B.Sc (cs), M.Sc (IT), M, L.I.S., (Ind) 7A/1 Lake Road, Sammanthurai, Sri Lanka -ID: sajeer241@gmail.com ABSTRACT Protocol design requires Understanding state distributed across many nodes, complex message exchanges, and with competing traæc. Traditional analysis tools (such as packet traces) too often hide protocol dynamics in a mass of extraneous detail. This paper presents nam, a network animator that provides packet-level animation and protocol-specific graphs to aid the design and debugging of new network protocols. Taking data from network simulators (such as ns) or live networks, nam was one of the first tools to provide general purpose, packet-level and network animation. Nam now integrates traditional time-event plots of protocol actions and scenario editing capabilities. We describe how nam visualizes protocol and network dynamics. Keywords: Network protocol visualization, packet level animation, internet protocol design network simulation ns, nam. INTRODUCTION Network protocol designers face many difficult tasks, including simultaneously monitoring state in a potentially large number of nodes, understanding and analyzing complex message exchanges, and characterizing dynamic interactions with competing traffic. Traditionally they ve used packet traces to accomplish these tasks, but traces have two major drawbacks: They present an incredible amount of detail, which challenges the designer s ability to comprehend the data, and they are static, which hides an important dimension of protocol behavior. Although network simulators such as the VINT project s ns1 can easily generate numerous detailed Traces, they provide limited help for analyzing and understanding the data. The network animator that we developed in our work at the VINT Project provides packet-level Animation, protocol graphs, traditional time-event plots of protocol actions, and scenario editing capabilities. Nam benefits from a close relationship with Ns, which can collect detailed protocol. Information from a simulation. With some preprocessing, NAM can visualize data taken directly from real network traces. 61
2 Figure 1 NAM NAM BASED TECHNOLOGY Figure 2 NAM Description Gamida Cell identified sirtuins (SIRTs), which are type-iii lysine deacetylases of histones and of numerous transcription factors, as new stem cell targets. Gamida Cell's pre-clinical studies demonstrate that controlling the function of SIRTs with small molecules modulates stem cell fate, extends their ability to replicate and increases the number of blood-building stem cells known as hematopoietic stem cells. Based on these findings, Gamida Cell has developed a novel propriety technology for expansion of functional hematopoietic stem cells in in vitro cultures. The lead molecule of this technology is Nicotinamide (NAM), a Vitamin B3, a potent modulator of SIRT1 activity as well as a potent inhibitor of NAD+ -dependent ADP ribose transferees enzymes. Pre-clinical studies show the tremendous potential of this technology to increase stem cell migration, homing and engraftment efficacy, to rescue lethally irradiated primary and secondary recipients and to enhance myeloid and lymphoid reconstitution by maximizing the full therapeutic potential of bone marrow transplantation, tissue regeneration and gene therapy 62
3 Figure 3 NAM Based Technology NETWORK PROTOCOL VISUALIZATION Researchers have explored network protocol visualization in many contexts, beginning with static protocol graphs and visualization of large-scale traffic, and more recently including simulation visualizations and editors. Network visualization tools allow designers to take in large amounts of information quickly, visually identify patterns in communication, and better understand causality and interaction. Graphs of packet exchanges are useful for understanding cause and effect in complex protocols like TCP. Work at MIT2 and the University of Arizona3 is typical: Graphs show time against TCP sequence numbers on a2d graph, sometimes with annotations to show special events. Similar time-event graphs have proven useful in understanding reliable multicast behavior in SRM.4 Several groups have looked at visualization of large, static network data sets. Important questions include choice of layouts based on real-world geography or network topology and how best to use animation, color, and 3D. More generally, many researchers have tackled the problem of visualization of complex data.5systems like this share the principle that multiple linked views are essential for visualizing complex data. Network-specific visualization tools address this problem, allowing the user to take in large amounts of information quickly, to visually identifying patterns in communication, and to better understand causality and interaction. This paper presents nam, a net-work animator that provides packet-level animation and protocolspecie graphs to aid the design and de-bugging of new network protocols (Figure 1). Namwas one of the tools to provide general purpose, packet-level, network animation. Recent work has inte-grated traditional time-event plots of protocol actions and added scenario editing capabilities. Nam benetsfrom a close relationship with ns, the VINT 63
4 project s network ns [2] which can collect detailed protocol infor-mation from a simulation. With some pre-processing, nam can also be used to visualize data taken directly from real network traces. Packet Stack of headers and an optional data space are in the composition of NS packet. A packet header format is initialized when a simulator object is created, where a stack of all registered headers such as the common header that is commonly used by any object as needed, IP header, TCP header, RTP header and trace header is defined. The offset of each header in the steak is recorded. What this means is that whether or not a desired header is used, a steak consist of all registered headers is created. When a packet is allocated by an agent, and a network object can access any header in the steak of a packet it compiles using the linked off set value. However if u want to implement an application that talks to another application cross the network. You might use this feature with the little alteration. Another for this to create a new header for the application and upgrading the underlying agent to writhe data received from the application to the new header. Tools for NS simulation a. NAM b. AWK script language Figure 4 Packet Network Animator- NAM Visual interpretation of network topology is provided by the NAM. It was developed as apart of VINT project. Features given below. >Visual interpretation of network topology >Execution directly from the Tcl script. >Play, stop, fast forward, rewind, pause, display speed controller and a packet monitoring facility like Controls are used in NAM. >Information like throughput and number of packets on each link is present. >It also provides a drag and drop interface for creation of topologies. AWK Script 64
5 It is a test processing programming language. It is a utility for performing simple text processing tasks and it is a programming language for performing complex text processing tasks. Packet animation Animation allows the user to quickly see the status of each part of the network the top link is severely congested and dropping packets; the middle link is slightly busier than the bottom link and quickly compare algorithms the middle variation has one extra magenta packet, while the top versions ends many back-toback packets. Nam lets users adjust the animation speed and play it forward or backward, making it easy to find and examine interesting occurrences. The first step in a new animation is displaying the network topology. Network protocol has three different topology layout mechanisms to accommodate different needs: Automatic The default is an automatic layout algorithm based on a spring-embedded model.9the algorithm assigns attractive forces on all links and repulsive forces between all nodes and tries to achieve balance through iteration. Automatic layout can produce reasonable layouts of many networks without explicit user guidance, but it may not produce satisfactory results for complicated networks. If necessary, users can manually adjust the resulting layout. Relative For smaller topologies, relative layout is possible. The user species the relative directions of links (left, up, down). Nam places nodes relative to each other using link directions; link length is set proportional toils bandwidth and delay. Relative layout works very well for small topologies and has the desirable property that packet movement rate is consistent with link delay and bandwidth. The network in uses relative layout. Disadvantages of relative layout are that theuser must specify the directions of each link, that notall networks have a planer representation that satis-es delay constraints, and relative layout of a topology containing very di erent delays can result in very short links. Relative layout works well for small topologies and has the advantage that packet movement rate is constant and consistent with link delay and bandwidth. Relative layout s disadvantages are that the user must specify the directions of each link, not all networks have a planar representation that satisfies delay constraints, and relative layout of a topology containing different delays can result in very short links. Wireless Wireless layout associates each node with a physical location in a constrained area. Each node s 3D coordinate gives its position in the area (though visualization currently uses only two dimensions) and its velocity vector. Wireless visualizations typically lack explicit links. 65
6 Figure 5 Wireless Packet animation is straightforward once the topology is laid out. Trace events indicate when packets enter and leave links and queues. Packets are shown as rectangles with arrows at the front; queues as arrays of squares (see the left window of Figure 1). Packets can be colored based on codes set in the simulator or preprocessing to identify source and destination pairs. When queues packets are literally dropped, shown as small rolling squares falling to the bottom of the display Network statistics The animation component of nam only displays a sub-set of the simulation details present in the trace output. Additional information, such as packet headers or pro-tocol state variables, is handled by other nam components. The statistics component provides three ways to display this additional information. First, clicking on any of the displayed objects (e.g. packets and protocol agents) will bring out a oneshot panel showing object-specific information. Second, continuous monitoring of all available object-specific information maybe achieved by associating a monitor with entities of interest. Monitors remain associated with an object until explicitly removed by the user or until its under-lying object is destroyed. Other visualization methods In addition to packet animation, we experimented with other ways to visualize information. Users can specify node color and shape to indicate state such as membership in a multicast group use protocol agents to represent the state of a protocol instance at an end node, and display agents as small labeled rectangles attached to nodes. Protocol-specific graphs These graphs have long been used to understand TCP behavior and more recently to understand timer interaction in scalable reliable multicasts. Currently, protocol graphs for TCPand SRM, but we plan to add a pluggable API to support other, more-generic protocols event graphs for SRM (top right) and TCP (bottom center and bottom right). When a graph first comes up, a nam filter scans the trace file to extract the relevant information for a specific flow or protocol. 66
7 The advantage of integrating these views with is that it synchronizes graphs and packet animations. Moving a time slider or clicking on an interesting event in any view will update the time in all views. To help users coordinate events, displays each trace event in a consistent way through color or shape across views. Each trace event is displayed in the consistent way (i.e., col-or, shape, etc.) across views to help the user coordinate events. Scenario creation and editing We use nam in two complementary ways to assist scenario creation: With the scenario input facility that we recently added to nam, users can apply a traditional drawing approach to add nodes, links, and protocol agents. Nam then saves this scenario as an ns simulation script (in Tcl), which the simulator will process. The ns scenario generator uses nam to visualize large scenario topologies, using tools such as Georgia Tech s ITM10 to construct these scenarios. am uses automatic layout to present the topology to the user for acceptance or regeneration. CONCLUSIONS Nam development is ongoing, with a number of incremental improvements under consideration or planned. we plan to improve scenario-editing capabilities and add support for entering mobile node tracks. Two major focuses of future work remain: 1 st we would like to make nam easier to extend, providing better internal APIs to allow users to add custom controls to the output and to control object rendering. For example, one application would allow users to interactively control node colors to indicate application groups or characteristics. 2 nd we are just beginning to understand how to visualize large-scale networks (more than 100 nodes), and we intend to devote more work to this area. Network protocol visualization is easy to dismiss because its contributions to protocol development are indirect. More than a tool for fancy demos, visualization through nam can substantially ease protocol debugging and help developers understand dynamic behavior. REFERENCES 1. Brakmo, L. S., O'Malley, S. W., and e-treason, L. L. TCP Vegas: New techniques for Congestion detection and avoidance. In Proceed-ings of the ACM 2. T.J. Shepard, TCP Packet Trace Analysis, Tech. Report 494, Laboratory of Computer Science, Massachusetts Inst. of Technology, Cambridge, Mass., Comer, D., Internetworking with TCP/IP, Prentice Hall, Jacobson, V., Braden, R., Borman, A., TCP Extensions for High Performance, RFC 1323, May L. Breslau et al., Advances in Network Simulation, Computer, May 2000, pp Dempsey, B., Liebeherr, J., and Weaver, A., On Retransmission-based Error Control for Continuous Media Traffic in Packet-switching Networks, Technical Report CS-94-09, University of Virginia, Charlottesville, Virginia, Feb
ns simulation network data other sources
Network Visualization with the VINT Network Animator Nam Λ Deborah Estrin, Mark Handley, John Heidemann, Steven McCanne, Ya Xu, Haobo Yu USC Computer Science Department Technical Report 99-703b March 1999
More informationnam Packet animations Automatic layout Relative layout Wireless layout Protocol graphs TCP SRM
RESEARCH FEATURE Network Visualization with Nam, the VINT Network Animator Visualization tools such as nam, a network animator that supports packetlevel animation and provides scenario-editing capabilities,
More informationChao Li Thomas Su Cheng Lu
CMPT885 High-Performance Network Final Project Presentation Transport Protocols on IP Multicasting Chao Li Thomas Su Cheng Lu {clij, tmsu, clu}@cs.sfu.ca School of Computing Science, Simon Fraser University
More informationII. ROUTING CATEGORIES
ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses
More informationRate Based Pacing with Various TCP Variants
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,
More informationVANS: Visual Ad hoc Network Simulator
VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,
More informationAssignment 3 Solutions 2/10/2012
INFO334 / TELE302 Assignment 3 Solutions 2/10/2012 The WAN topology to be adopted for the enterprise WAN is shown in Figure 1. Figure 1: NZAM WAN topology. 1 Task 1: Reliability Analysis (4 marks) 1. What
More informationA Java Execution Simulator
A Java Execution Simulator Steven Robbins Department of Computer Science University of Texas at San Antonio srobbins@cs.utsa.edu ABSTRACT This paper describes JES, a Java Execution Simulator that allows
More informationAVC College of Engineering, Mayiladuthurai, India
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation
More informationReliable Multicast in Mobile Networks
Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationTM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 232-7345 TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS Reza Poorzare 1 Young Researchers Club,
More informationAshish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India
Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Abstract Mobile Ad
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationRouting Protocol comparison
Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate
More informationNETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*
NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.
More informationOptimistic Parallel Simulation of TCP/IP over ATM networks
Optimistic Parallel Simulation of TCP/IP over ATM networks M.S. Oral Examination November 1, 2000 Ming Chong mchang@ittc.ukans.edu 1 Introduction parallel simulation ProTEuS Agenda Georgia Tech. Time Warp
More informationTHE TCP specification that specifies the first original
1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission
More informationArchitectural Principles
Architectural Principles Brighten Godfrey CS 538 January 29 2018 slides 2010-2017 by Brighten Godfrey unless otherwise noted Cerf and Kahn: TCP/IP Clark: TCP / IP design philosophy Goals of the architecture
More informationENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3
Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics
More informationThe Network Simulator Fundamentals. Downloads and further info at:
ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,
More informationEE 122: Computer Networks Network Simulator ns2
EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.
More informationScript for Visualization of Algorithms: Framework for Animation Environment and Composite Structures
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, IIT KHARAGPUR Script for Visualization of Algorithms: Framework for Animation Environment and Composite Structures A synopsis of the thesis to be submitted
More informationMethods to Resolve Traffic Jams using VANET
Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract - In this paper we have proposed a method to avoid
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationSTATEFUL TCP/UDP traffic generation and analysis
XENATM STATEFUL TCP/UDP traffic generation and analysis Ideal for validating firewalls, switches, routers, NAT routers, proxies, load-balancers, bandwidth shapers and more. VULCAN LAYER 4-7 GIGABIT ETHERNET
More informationIndex Terms Congestion, congestion control mechanism, Fairness, routing protocols, FIFO
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationCongestion Propagation among Routers in the Internet
Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,
More informationA Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation
A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.
More informationComparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline
Comparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline Alejandro Gomez Suarez, and H. Srikanth Kamath Abstract In this paper, SFQ (Start Time Fair Queuing) algorithm is analyzed
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationCHAPTER 5. Simulation Tools. be reconfigured and experimented with, usually this is impossible and too expensive or
CHAPTER 5 Simulation Tools 5.1 Introduction A simulation of a system is the operation of a model of the system. The model can be reconfigured and experimented with, usually this is impossible and too expensive
More informationCS 598: Advanced Internet
CS 598: Advanced Internet Lecture 3: TCP / IP Brighten Godfrey pbg@illinois.edu Fall 2009 1 Today Announcements A few more project ideas Cerf and Kahn: TCP / IP Clark: TCP / IP design philosophy 2 Announcements
More informationWord Found Meaning Innovation
AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information
More informationPerformance Enhancement Of TCP For Wireless Network
P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3
More informationEFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS
EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.
More informationPERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS
PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous
More informationDesigning Issues For Distributed Computing System: An Empirical View
ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),
More informationInternational Journal of Scientific Research and Modern Education (IJSRME) ISSN (Online): ( Volume I, Issue I,
EFFECTIVE LEARNING WITH USAGE OF SIMULATORS A CASE OF NCTUNS SIMULATOR IN COMPUTER NETWORKS Subrahmanya Bhat* & Dr. K. R. Kamath** * Department of Computer Application, Srinivas Institute of Management
More informationSimulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University
Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects
More informationMultiprotocol Label Switching (MPLS) on Cisco Routers
Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching
More informationGraduate Examination. Department of Computer Science The University of Arizona Spring March 5, Instructions
Graduate Examination Department of Computer Science The University of Arizona Spring 2004 March 5, 2004 Instructions This examination consists of ten problems. The questions are in three areas: 1. Theory:
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationImplementation of Feedback Mechanism into AODV based on NS2
Implementation of Feedback Mechanism into AODV based on NS2 Sebastian Roschke [sebastian.roschke@hpi.uni-potsdam.de] 2007-05-16 Abstract This paper gives an overview on the implementation of a feedback
More informationIT 540 Operating Systems ECE519 Advanced Operating Systems
IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) (Advanced) Operating Systems 3. Process Description and Control 3. Outline What Is a Process? Process
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationThe simulation and emulation verification that was based on NS-2
210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer
More informationCHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS
59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand
More informationANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2
ANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2 Mr.Ganesh R.Patil 1, Prof. Prashant S.Wankhade 2 1 PG Scholar,Dept of Electronics &Telecomm. Engg, ARMIET, Asangaon, Mumbai (India)
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More informationMultiprocessor Systems
White Paper: Virtex-II Series R WP162 (v1.1) April 10, 2003 Multiprocessor Systems By: Jeremy Kowalczyk With the availability of the Virtex-II Pro devices containing more than one Power PC processor and
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationEVENT DRIVEN PACKET SIMULATOR
EVENT DRIVEN PACKET SIMULATOR Nikolay Georgiev Chillev,Vassiliy Platonovitch Tchoumatchenko*,Tania Krumova Vassileva* Department of Computer Science,*Department of Electronics, Technical University of
More informationDomain Based Approach for QoS Provisioning in Mobile IP
Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr
More informationNS-2: A Free Open Source Network Simulator
: A Free Open Source Network Simulator srinath@it.iitb.ac.in Open Source Software Research Center Workshop on FOSS tools for Engineering June 27, 2005 Simulation Introduction Definition A simulation imitates
More informationRED behavior with different packet sizes
RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,
More informationReverse Engineering with a CASE Tool. Bret Johnson. Research advisors: Spencer Rugaber and Rich LeBlanc. October 6, Abstract
Reverse Engineering with a CASE Tool Bret Johnson Research advisors: Spencer Rugaber and Rich LeBlanc October 6, 994 Abstract We examine using a CASE tool, Interactive Development Environment's Software
More informationStudy Of Methods For Preventing Selective Jamming Attacks:A Review
Study Of Methods For Preventing Selective Jamming Attacks:A Review Mr.Ganesh R.Patil PG Student,Dept.of E & TC Engg. ARMIET College Of Engineering, Asangaon,Mumbai,INDIA Prof.Prashant S.Wankhade Assistant
More informationTips and Guidance for Analyzing Data. Executive Summary
Tips and Guidance for Analyzing Data Executive Summary This document has information and suggestions about three things: 1) how to quickly do a preliminary analysis of time-series data; 2) key things to
More informationReview: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model
Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model Rakesh K Scholar (M.Tech) The Oxford College of Engineering Bangalore Mrs. Kalaiselvi Asst. Prof,
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationNetwork Emulation in the NS Simulator. Kishore Ramachandran
Network Emulation in the NS Simulator. Kishore Ramachandran Emulation the why and the how. Motivation (Why?) Simulations make simplifying assumptions. Results not always basis for real-world deployment.
More informationSIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9
More informationOutline Computer Networking. Functionality Split. Transport Protocols
Outline 15-441 15 441 Computer Networking 15-641 Lecture 10: Transport Protocols Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15 441 F17 Transport introduction TCP connection establishment
More informationPerformance of DSDV Protocol over Sensor Networks
Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com
More informationMCS-377 Intra-term Exam 1 Serial #:
MCS-377 Intra-term Exam 1 Serial #: This exam is closed-book and mostly closed-notes. You may, however, use a single 8 1/2 by 11 sheet of paper with hand-written notes for reference. (Both sides of the
More informationXinu on the Transputer
Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 1990 Xinu on the Transputer Douglas E. Comer Purdue University, comer@cs.purdue.edu Victor
More informationProvide One Year Free Update!
QUESTION & ANSWER HIGHER QUALITY, BETTER SERVICE Provide One Year Free Update! https://www.passquestion.com Exam : 300-101 Title : Implementing Cisco IP Routing Version : DEMO 1 / 4 1.Which three problems
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More information6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1
6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The
More informationLecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.
Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/
More informationRSVP Petri Jäppilä Nokia Telecommunications P.O Box Nokia Group, Finland
RSVP Petri Jäppilä Nokia Telecommunications P.O Box 330 0004 Nokia Group, Finland Email: petri.jappila@nokia.com Abstract Resource ReSerVation Protocol, RSVP, is a protocol to provide resources reservation,
More informationImplementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network
ENSC 835: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Demo School of Engineering Science
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationPerformance Evaluation of Routing Protocols for Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib
More informationAdvanced Computer Networks. Flow Control
Advanced Computer Networks 263 3501 00 Flow Control Patrick Stuedi Spring Semester 2017 1 Oriana Riva, Department of Computer Science ETH Zürich Last week TCP in Datacenters Avoid incast problem - Reduce
More informationTCP Congestion Control
TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationTCP Congestion Control
What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationTHE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS
VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology,
More informationEEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationIEEE Time-Sensitive Networking (TSN)
IEEE 802.1 Time-Sensitive Networking (TSN) Norman Finn, IEEE 802.1CB, IEEE 802.1CS Editor Huawei Technologies Co. Ltd norman.finn@mail01.huawei.com Geneva, 27 January, 2018 Before We Start This presentation
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationHSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationThis Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network
This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information
More informationNS-2 Tutorial. Kumar Viswanath CMPE 252a.
NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.
More informationCross-layer TCP Performance Analysis in IEEE Vehicular Environments
24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide
More informationPERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL
I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationL1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L1: Introduction Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/15/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures used in this presentation
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More information1 What is network simulation and how can it be useful?
CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET
More informationThe Transport Layer: User Datagram Protocol
The Transport Layer: User Datagram Protocol CS7025: Network Technologies and Server Side Programming http://www.scss.tcd.ie/~luzs/t/cs7025/ Lecturer: Saturnino Luz April 4, 2011 The UDP All applications
More information