Communication Network Simulations Using OPNET

Size: px
Start display at page:

Download "Communication Network Simulations Using OPNET"

Transcription

1 521365S Tietoliikenteen simuloinnit ja työkalut Communication Network Simulations Using OPNET klo TS407 Juha-Pekka Mäkelä juha.makela AT ee.oulu.fi 1

2 Network simulations Simulations are used for Application Equipment Protocol (algorithm) Network security functionality verification and implementation comparison Modeling of a real communication network 2

3 Things that are simulated Packet transmission. Capacity Packet formation. Packet length and distribution Terminal entering and exiting networks Communication link setup between terminals Mobility Effect of disturbance of other transmissions 3

4 Results End to end delay Throughput Packet loss Congestion and lost connections Traffic distribution Network utilization 4

5 S Throughput ALOHA G 5

6 delay End to end delay G 6

7 Ad hoc networks MAC and Routing MAC TDMA, FDMA, CDMA, OFDMA, CSMA QoS Routing Proactive vs. reactive Scalability Routing overhead 7

8 Sensor networks Straight implementation Large amoung of sensors with low cost Embedded programming Only very big networks must be simulated. Enegry efficiency Protocol simplicity 8

9 Network simulators OPNET ( NS2 ( OMNeT++ ( 9

10 OPNET Event based discrete time simulator. Packet level simulations Developped for wireline simulations Currently also supports wireless system simulations Radio channel modelled accurately For R&D 10

11 Modelling Network Sub nets, topologies, geocraphical modelling, mobility Node Routers, servers, clients, mobile terminals etc. Process Protocols (TCP/IP), data generation, algorithms, etc External processeing possible (Matlab) 11

12 Tools in OPNET Network model editor Node model editor Process model editor Source code editing environment Antenna pattern editor Modulation curve editor (SNR BER behavior) Packet format editor Analysis configuration tool Simulation tool ICI editor (Interface Control Information) Probe model tool (organization of result collection) Link model editor (properties of fixed link models) Path model editor (for routing and modeling virtual circuits) Demand model editor (wide scale application modeling) OPNET Animation viewer 12

13 Network modeling 13

14 Network modeling (2) 14

15 Node modeling 15

16 Node modeling (2) Node structure OSI like presentation One node can also be a sub-network 16

17 Process modeling 17

18 Process modeling (2) Process models determine the functionality of the node model State machines Conditional transitions from state to another determined by external events 18

19 Process modeling (3) 19

20 Process modeling (4) Editor to help C/C++ code writing. 20

21 Parametrized simulations Simulation tool 21

22 Simulation tool (2) Simulations as a function of time Not enough for determining the full statistics of a phenomenon Several simulations needed with different seeds Typical results are averaged combinations of different iterations. 22

23 Analyze tool Tool for inspection of results Published results can be done with Matlab where there are more possibilities for editing the results Numerical values of the simulation results also available 23

24 Physical link (Radio) Physical link is presented with a connection where all the issues present in the physical layer are described. When a packet travels inside the simulation, the effect of all the states of the PHY layer is calculated The effect of other users also taken into account. All the states are presented with editable C/C++ code 24

25 Physical link (Radio)(2) Used connection components are determined by the transceiver attributes. The attributes can be altered during the simulation 25

26 Physical link (Radio)(3) BER for a BPSK moddulation 26

27 Antenna modeling 27

28 Packet editor Packet editor can be used for describing the transmission packets used for the simulation Length and content can be determined according to one s needs Data transmission among the simulation entities. 28

29 Network R&D OPNET products OPNET Modeler The main simulation & development tool+ Wireless suite and Defense additions Capacity management IT Guru (network and system capacity planning for enterprises) SP Guru (network planning and engineering for service providers) Network operations IT Sentinel (network audit, security, and policy compliance for enterprises ) SP Sentinel (network audit, security, and policy compliance for service providers) IT and ST Netcop (unified network views and situational awareness) Application performance management ACE Analyst (analytics for networked applications) ACE Live (enduser experience monitoring & realtime network analytics) SLA Commander (application service level monitoring) OPNET Panorama (realtime application monitoring and analytics)29

30 Options for OPNET Modeler UMTS (WCDMA) WiMAX ( , e2005) DOCSIS (Data Over Cable Service Interface Specification) IPv6 + Mobile IPv6 MPLS (MultiProtocol Label Switching) PNNI (Private NetworkNetwork Interface) Terrain Modeling TIREM (propagation modeling calculation) Satellite Capability (dozens of models for satellite systems) Joint Communications Simulation System (JCSS) (Military orientated models) Vendor Devices (Dozens of vendor specific devices) Integration with 3rd Party Products (several modules) 30

31 Summary OPNET is an event based (discrete time) communication network simulator software Networks modeled in three levels; network, node, process. Modeling can be done with the desired accuracy. External processing can be used. Vast number of additional features and tools to ease the problem solving 31

32 References OPNET Modeler + Wireless (version 16.0 (14.0)) OPNET (versions 16.0 (14.0)) Documentation OPNET Technologies, Inc. WWW page, 32

1 sur 5 01/08/2005 14:09 Presentations, Labs, and Case Studies Papers (Sorted By) Authors Session Code Session Name Title Some OPNETWORK labs require the use of OPNET software that has not yet been made

More information

Preparation for OPNET Modeling

Preparation for OPNET Modeling Part I Preparation for OPNET Modeling 1 Introduction This chapter introduces network modeling and simulation, and both OPNET and OPNET Modeler. If you already have relevant background, you can quickly

More information

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods Introduction Communication Systems Simulation - I Harri Saarnisaari Part of Simulations and Tools for Telecommunication Course First we study what simulation methods are available Use of the Monte Carlo

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 Instructor: Mohammad Hossein Manshaei Teaching Assistants Mr. Adili & Mr. Nourbakhsh Course web page available at IVUT webcourse: http://ivut.iut.ac.ir/bounce.php?course=1012

More information

Comparison of Different Network Simulation Tools. University of Bremen Communication Networks

Comparison of Different Network Simulation Tools. University of Bremen Communication Networks Comparison of Different Network Simulation Tools University of Bremen Communication Networks www.comnets.uni-bremen.de Overview Network Simulator Overview Comparison of Different Network Simulators Random

More information

OPNET Editors and Features

OPNET Editors and Features OPNET Steven Gordon Sirindhorn International Institute of Technology Thammasat University June 2010 Contents OPNET Menus Nodes and Links Communication Running Multiple OPNET Commonly used editors: 1. Project

More information

IP & DCN Planning for Microwave Networks

IP & DCN Planning for Microwave Networks IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation

More information

What is an Ad Hoc Network?

What is an Ad Hoc Network? Introduction Part 1 CS-6777 Mobile Ad Hoc Networking Memorial University of Newfoundland What is an Ad Hoc Network?! A mobile ad hoc network (MANET) is Communication network Wireless signaling Multi-hop

More information

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Topics of discussion * Section 1. Wireless vs. Wired. Advantages and disadvantages

More information

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN 26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and

More information

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

A MPLS Simulation for Use in Design Networking for Multi Site Businesses

A MPLS Simulation for Use in Design Networking for Multi Site Businesses A MPLS Simulation for Use in Design Networking for Multi Site Businesses Petac Eugen Ovidius University of Constanța, Faculty of Mathematics and Computer Science epetac@univ-ovidius.ro Abstract The ease

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

OPNET. Mustafa Ergen. UC Berkeley

OPNET. Mustafa Ergen. UC Berkeley OPNET Mustafa Ergen ergen@eecs.berkeley.edu UC Berkeley Overview Introduction Design Process domain Node domain Network domain Communication mechanism Simulation Statistics Probe Analysis IEEE 802.11 MAC

More information

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications

More information

Visualize Real-Time Topology, Traffic, and Status in a Single View Troubleshoot Network Issues More Rapidly

Visualize Real-Time Topology, Traffic, and Status in a Single View Troubleshoot Network Issues More Rapidly ncompass Visualize Real-Time Topology, Traffic, and Status in a Single View Troubleshoot Network Issues More Rapidly IT organizations and service providers face increasing challenges in managing networks,

More information

This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started.

This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started. Introduction Overview Welcome to Modeler! This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started. If you are performing this

More information

Telecom Learning. Technology

Telecom Learning. Technology Telecom Learning Technology LTE Modules S. No. LTE Module Course Content LTE Overview LTE /EPS Network Architecture 1 LTE Basics LTE/EPS Mobility & Session Mgmt LTE Air Interface LTE Air Interface LTE-RF

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Introduction to QualNet

Introduction to QualNet Introduction to QualNet Marco A. Alzate Simply a (non-quite experienced) user May 16 th, 2007 1. General Overview 2. IDE (GUI) Functional Overview 3. Command Line overview 4. Programming 5. Conclusions

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity

More information

QualNet 7.4 Model Library Index

QualNet 7.4 Model Library Index QualNet 7.4 Model Index August 2015 SCALABLE Network Technologies, Inc. 600 Corporate Pointe, Suite 1200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET Author: Tianyin Zhang and Nur Jaber Advisor: Dr. Richard Dean Morgan State University ABSTRACT This paper discusses channel

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Handouts Class information Schedule (check online frequently) 2 1 Goals Principles on Wireless

More information

Resource management issues in mobile ad hoc networks (MANET)

Resource management issues in mobile ad hoc networks (MANET) Autonomic Communication and Knowledge Plane Resource management in autonomic communication Resource management issues in mobile ad hoc networks (MANET) S-38.4030 The aim of this presentation is to give

More information

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Energy Efficient MAC Protocols Design for Wireless Sensor Networks Energy Efficient MAC Protocols Design for Wireless Sensor Networks Francesco Chiti*, Michele Ciabatti*, Giovanni Collodi, Davide Di Palma*, Romano Fantacci *, Antonio Manes *Dipartimento di Elettronica

More information

1 Abstract Keywords: Wireless, wired, network, router, packet switching, circuit switching, protection, MPLS

1 Abstract Keywords: Wireless, wired, network, router, packet switching, circuit switching, protection, MPLS 1 Abstract The growth number of broadband user connections in the world, the wide use of mobile devices and other appliances to get information through the Internet always requires some level of availability

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

Introduction. Introduction to Network Communications G64INC. Lectures. Related Modules. Assessment. Objectives

Introduction. Introduction to Network Communications G64INC. Lectures. Related Modules. Assessment. Objectives Introduction to Network Communications G64INC Dr. Gail Hopkins Introduction Practical matters Module goals, structure and contents Initial introduction to some key ideas and issues Lectures Two lectures

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

QoS Based Evaluation of Multipath Routing Protocols in Manets

QoS Based Evaluation of Multipath Routing Protocols in Manets Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing

More information

MGT Mini MBA in Telecom Technologies

MGT Mini MBA in Telecom Technologies MGT-300 - Mini MBA in Telecom Technologies Description A comprehensive 5-day training course to empower participants with key knowledge on current and emerging telecom technologies to successfully plan,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Riverbed Modeler. University Program Module Description

Riverbed Modeler. University Program Module Description Riverbed Modeler University Program Module Description University Modeler Base Product & Add-Ons Users start with the base Modeler Wireless Suite and add specific models/modules to tailor their purchase

More information

UNIVERSITY OF CYPRUS DEPARTMENT OF COMPUTER SCIENCE

UNIVERSITY OF CYPRUS DEPARTMENT OF COMPUTER SCIENCE Master s Thesis Coverage and Capacity Planning in Enhanced UMTS Josephine Antoniou UNIVERSITY OF CYPRUS DEPARTMENT OF COMPUTER SCIENCE June 2004 UNIVERSITY OF CYPRUS DEPARTMENT OF COMPUTER SCIENCE 1 Table

More information

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ. Chapter 6 Local Area Networks and Media Access Control School of Info. Sci. & Eng. Shandong Univ. 6.1 MULTIPLE ACCESS COMMUNICATIONS FIGURE 6.1 Multiple access communications FIGURE 6.2 Approaches to sharing

More information

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks... Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -00 0 WIRELESS NETWORKS AND MOBILE COMPUTING TUTORIAL QUESTION BANK Course Name WIRELESS NETWORKS AND MOBILE COMPUTING Course Code

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

Communication Networks

Communication Networks Communication Networks A Concise Introduction Jean Walrand University of California, Berkeley Shyam Parekh Bell Labs, Alcatel-Lucent SYNTHESIS LECTURES ON COMMUNICATIONNETWORKS #4 vii entsi * s? m :W.

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

An Analysis of Simulators for Vehicular Ad hoc Networks

An Analysis of Simulators for Vehicular Ad hoc Networks World Applied Sciences Journal 23 (8): 1044-1048, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.08.584 An Analysis of Simulators for Vehicular Ad hoc Networks Syed A. Hussain

More information

An Architecture for Enabling migration of tactical networks to future flexible Ad Hoc WBWF. SDR11 WInnCommEurope, June 2011

An Architecture for Enabling migration of tactical networks to future flexible Ad Hoc WBWF. SDR11 WInnCommEurope, June 2011 An Architecture for Enabling migration of tactical networks to future flexible Ad Hoc WBWF SDR11 WInnCommEurope, June 2011 Rationale Operational scenarios Wideband Waveform Architecture requirements Architecture

More information

Title. EMANE Developer Training 0.7.1

Title. EMANE Developer Training 0.7.1 Title EMANE Developer Training 0.7.1 1 Extendable Mobile Ad-hoc Emulator Supports emulation of simple as well as complex network architectures Supports emulation of multichannel gateways Supports model

More information

LiveAction IWAN Management

LiveAction IWAN Management LIVEACTION, INC. LiveAction IWAN Management LiveAction, Inc. 3500 WEST BAYSHORE ROAD PALO Copyright ALTO, CA 2016 94303 LiveAction, Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction

More information

!"# $ I. Introduction

!# $ I. Introduction !"# $ LAGRIT (Laboratoire de gestion des réseaux informatiques et de télécommunications) * LACIME (Laboratoire de communications et d'intégration de la microélectronique) Department of Electrical Engineering,

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Nessi: A Python Network Simulator for Fast Protocol Development

Nessi: A Python Network Simulator for Fast Protocol Development Nessi: A Python Network Simulator for Fast Protocol Development Jérôme Vernez, Jürgen Ehrensberger, Stephan Robert [Jerome.Vernez, Juergen.Ehrensberger, Stephan.Robert]@heig-vd.ch Abstract A new and simple

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Traffic Modeling of Wireless Body Area Network

Traffic Modeling of Wireless Body Area Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 102-109 www.iosrjournals.org Traffic Modeling of Wireless Body Area

More information

Lab 3: Performance Analysis of ALOHA

Lab 3: Performance Analysis of ALOHA Lab 3: Performance Analysis of ALOHA ALOHA is one of the basic random access methods in mobile data networks. It is based on mobile terminals sending their packets without any coordination between them.

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar Papa Alioune Ly, Joel Alloh, Carl Hedari, Tom Reynaert Outline Introduction Design of the

More information

Wireless Ad-Hoc Networks

Wireless Ad-Hoc Networks Wireless Ad-Hoc Networks Dr. Hwee-Pink Tan http://www.cs.tcd.ie/hweepink.tan Outline Part 1 Motivation Wireless Ad hoc networks Comparison with infrastructured networks Benefits Evolution Topologies Types

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Reading. Read 3 MPLS links on the class website

Reading. Read 3 MPLS links on the class website Reading Read 3 MPLS links on the class website Read the following Wikipedia entries: Advanced Mobile Phone System, GSM, 1xEVDO, Cell site, Cellular network, 802.11ac Beyond IP Routing Traffic engineering

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

INICTEL-UNI 15/11/2010. Tecnología de Banda Ancha Inalámbrica LTE

INICTEL-UNI 15/11/2010. Tecnología de Banda Ancha Inalámbrica LTE INICTEL-UNI 15/11/2010 Tecnología de Banda Ancha Inalámbrica LTE 1 2Market Overview 2 LTE Presentation / Alcatel-Lucent. Title January 2008 Market Trends iphone (Apple) and G1 (Google) are bandwidth drivers

More information

CHAPTER 4 SIMULATION TOOL OPNET MODELER

CHAPTER 4 SIMULATION TOOL OPNET MODELER CHAPTER 4 SIMULATION TOOL OPNET MODELER Problems can be effectively solved through, by running a computer simulation program since that would be more time efficient than actually doing the calculations

More information

QualNet 8.1 Model Library Index

QualNet 8.1 Model Library Index QualNet 8.1 Model Index November 2017 SCALABLE Network Technologies, Inc. 6059 Bristol Parkway, Suite 200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Computer Communications DIT 420 EDA343

Computer Communications DIT 420 EDA343 Computer Communications DIT 420 EDA343 Summary Computer Communication 1 Important for the exam When/where:Friday Dec 21, 14.00-18.00, H You may have with you: English-X dictionary no calculators, PDAs,

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

The ZigBee Architecture An Introduction

The ZigBee Architecture An Introduction The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4

More information

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Tak Kin Yung, Jay Martin, Mineo Takai, and Rajive Bagrodia Department of Computer Science University

More information

Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite

Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite Int. J. Communications, Network and System Sciences, 2015, 8, 533-542 Published Online December 2015 in SciRes. http://www.scirp.org/journal/ijcns http://dx.doi.org/10.4236/ijcns.2015.813048 Collision

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 MIMO-Assisted MPR-Aware MAC Design for Asynchronous WLANs Sanaz Barghi, Student Member, IEEE, Hamid Jafarkhani, Fellow, IEEE, and Homayoun Yousefi zadeh, Senior Member,

More information

UNIVERSITY QUESTIONS

UNIVERSITY QUESTIONS UNIVERSITY QUESTIONS UNIT 1: INTRODUCTION 1) Show the layer representation in the TCP/IP model and the OSI model and Explain. / Dec 12 2) With a neat diagram, explain the TCP/IP reference model, giving

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner. ETSN01 Exam August 22nd 2015 8am 1pm Instructions Clearly label each page you hand in with your name and the page number in the bottom right hand corner. Materials allowed: calculator, writing material.

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information