Simulating Well-Known Protocols

Size: px
Start display at page:

Download "Simulating Well-Known Protocols"

Transcription

1 Using Qualnet Part I ulating Well-Known Protocols Why Qualnet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each layer Modular layered stack design Standard API for composition of protocols across different layers Scalability via support for parallel execution GUI Tools for system/protocol modeling 2

2 Qualnet Layer Model Application Transport IP MAC Wired Radio Physical Channel Routing FTP Telnet CBR TCP UDP OSPF AODV CSMA Radio Bus Point to Point Free space Two-ray 3 Installing Qualnet Obtain the current Qualnet package from buckwheat.cis cd cd <working_dir> gunzip c c/m/buckwheat/qualnet/3.5/qualnet-3.5.tgz \ tar tar xf xf - Obtain the license file cd cd qualnet/3.5 cp cp /m/buckwheat/qualnet/client.lic license_dir 4

3 Installing Qualnet (cont d) Build an executable cd cd main main cp cp Makefile-solaris Makefile make make Set QUALNET_HOME environment variable setenv QUALNET_HOME <working_dir>/qualnet/3.5 csh/tcsh QUALNET_HOME<working_dir>/qualnet/3.5 export QUALNET_HOME sh/bash Test Qualnet s installation cd cd../bin./qualnet default.config 5 Running Qualnet Default configuration file./qualnet./qualnet default.config default.config QUALNET_HOME QUALNET_HOME /usa/jaikaeo/qualnet/3.5 /usa/jaikaeo/qualnet/3.5 Attempting Attempting license license checkout checkout (should (should take take less less than than 2 2 seconds) seconds) success. success. QualNet QualNet Version Version Partition Partition Node Node 1 1 (21.35 ( )..). Initial node s coordinate (xyz) Partition Partition Node Node 2 2 ( ( )..). : : Partition Partition Node Node 3 3 ( ( )..). Initialization Initialization completed completed in in sec sec.. Completed Completed % % Completed Completed 1% 1% : : Completed Completed 99% 99% Completed1% Completed1% Executed Executed events events in in sec sec ulation Progress 6

4 Output Statistics default.stat Node Address Instance ID Protocol Statistic Value [] [] Physical Physical 82.11bSignals 82.11bSignals transmitted transmitted [] [] Physical Physical 82.11bSignals 82.11bSignals received received and and forwarded forwarded to to MAC MAC [] [] MAC MAC 82.11MAC 82.11MAC from from network network [] [] MAC MAC 82.11MACUNICAST 82.11MACUNICAST packets packets sent sent to to channel channel [] [] Network Network FIFOTotal FIFOTotal Queued Queued [] [] Network Network FIFOTotal FIFOTotal Dequeued Dequeued [1] [1] Network Network FIFOTotal FIFOTotal Queued Queued [1] [1] Network Network FIFOTotal FIFOTotal Dequeued Dequeued [2] [2] Network Network FIFOTotal FIFOTotal Queued Queued [2] [2] Network Network FIFOTotal FIFOTotal Dequeued Dequeued IP Address Layer * perl and awk are very good tools for processing statistic outputs 7 Configuration Files Line entry format: [Qualifier] <PARAMETER> <VALUE> Qualifier (optional) specifies a range of nodes and has precedence over the general one E.g. MOBILITY NE DE-ADDRESS[5:1] MOBILITY RANDOM-WAYPOINT Notes: Some settings require additional parameters e.g. MOBILITY Lines starting with # are treated as comments 8

5 ulation Parameters Global Parameters: ulation time Coordinate system and terrain Random seed Topology and subnets Layer/Protocol related parameters: Channel/Radio Physical Layer MAC Layer Network Layer 9 Important Global Parameters EXPERIMENT-NAME: Name of the output statistic file e.g. EXPERIMENT-NAME default Resulting statistics are written in default.stat SIMULATION-TIME: The length of time to simulate. e.g. SIMULATION-TIME 15M (Available time units: NS US MS S M H D; default is in seconds) SEED: The random seed used to derive all other seeds used in the simulation. e.g. SEED 1 1

6 Terrain and Node Placement COORDINATE-SYSTEM: LATLONALT or CARTESIAN e.g. COORDINATE-SYSTEM CARTESIAN TERRAIN-DIMENSIONS: The size of the rectangular area to simulate (in meters) for Cartesian coordinate. e.g. TERRAIN-DIMENSIONS (1 1) DE-PLACEMENT: GRID RANDOM UNIFORM FILE GRID RANDOM UNIFORM GRID-UNIT 11 Specifying Topology SUBNET Parameter SUBNET <subnet> { comma-delimited list of nodes } Ex. SUBNET N8-1. { 3 7 thru 9 } NodeIds and 9 have network interfaces with address..1.1 through..1.5 Node ID Basic form: SUBNET N16- { 1 thru n } n is the number of nodes 1 Interface Address IP address and Node ID are identical Node 5 has IP address

7 Subnet Shorthand Format: N<# host bits>-<address with front end s omitted> Ex. N8-1. The subnet address is..1. Host IP addresses are 8 bits This allows for (254) hosts in this subnet with IP addresses numbered from..1.1 through The broadcast address for this subnet is The subnet mask is N is an equivalent representation 13 Mobility Model NE TRACE RANDOM-WAYPOINT e.g. MOBILITY RANDOM-WAYPOINT MOBILITY-WP-PAUSE 3S MOBILITY-WP-MIN-SPEED MOBILITY-WP-MAX-SPEED 1 MOBILITY-POSITION-GRANULARITY: distance in meters at which a node s location is updated small values potentially slow down the simulation Location updates when granularity 5 5m 1m (minmax) (minmax) pause Location updates when granularity 1 14

8 Approximate mobility speed Scenario Walking City driving Free way driving Aircraft Speed 5 mph 35 mph 65 mph Mach 1 Speed (m/s) 2.2 m/s 15.5 m/s 28.8 m/s 332 m/s 15 Propagation Model PROPAGATION-LIMIT: received signals with power below this limit (in dbm) will not be processed. e.g. PROPAGATION-LIMIT PROPAGATION-PATHLOSS: specifies path-loss model FREE-SPACE Empty space no ground TWO-RAY Flat ground Considers a ray bounced back from the ground h TX d ITM Irregular terrain (terrain database required) d ground h RX 16

9 Fading Model Applied to only narrowband channels (flat fading) Specified by PROPAGATION-FADING-MODEL Available models NE No fading RAYLEIGH Highly mobile no line of sight RICEAN requires an additional parameter RICEAN-K-FACTOR K : no line of sight (similar to RAYLEIGH) K : strong line of sight e.g. PROPAGATION-FADING-MODEL RAYLEIGH 17 Physical Layer Model Noise modeling Thermal noise PHY-ISE-FACTOR (default 1) PHY-TEMPERATURE (in K; default 29) Interference PHY-RX-MODEL (SNR-THRESHOLD-BASED BER-BASED) Parameters specific to 82.11b PHY82.11b-DATA-RATE (in bps) PHY82.11b-TX-POWER (in dbm) PHY82.11b-RX-SENSITIVITY (in dbm) PHY82.11b-RX-THRESHOLD (in dbm) C B A Rx threshold Rx sensitivity 18

10 MAC Layer Model MAC-PROTOCOL: specifies MAC layer protocol CSMA Requires carrier sensing before transmission If the channel is free the packet is transmitted immediately Otherwise set a random timeout MACA Uses RTS/CTS to acquire channel Does not carrier sense MAC82.11 CSMA/CA with ACKs and optional RTS/CTS TSMA MAC82.3 Wired networks PROMISCUOUS-MODE: set to YES to allow nodes to overhear packets destined to the neighboring node (required by DSR). 19 IP Protocol ly the only support network layer protocol Available queuing models First-in first-out (FIFO) Variations of Random Early Detection: RED RIO WRED Three priority types supported: control () real-time (1) and non-real-time (2) IP-QUEUE-PRIORITY-QUEUE-SIZE specifies the queue s size (in bytes) Each priority queue's size can be specified separately IP-QUEUE-PRIORITY-QUEUE-SIZE[] 25 IP-QUEUE-PRIORITY-QUEUE-SIZE[1] 5 IP-QUEUE-PRIORITY-QUEUE-SIZE[2] 5 2

11 Routing Protocols Proactive protocols BELLMANFORD RIPv2 OSPFv2 OLSR Reactive protocols AODV DSR LAR1 Static routing: requires STATIC-ROUTE-FILE 21 Application Specification APP-CONFIG-FILE: Specifies a file with a list of apps/traffic generators to run. FTP TELNET CBR HTTP VoIP etc See bin/default.app for more details 22

12 Layer Statistics Some statistics include: APPLICATION-STATISTICS (YES ) TCP-STATISTICS (YES ) UDP-STATISTICS (YES ) ROUTING-STATISTICS (YES ) NETWORK-LAYER-STATISTICS (YES ) QUEUE-STATISTICS (YES ) MAC-LAYER-STATISTICS (YES ) PHY-LAYER-STATISTICS (YES ) MOBILITY-STATISTICS (YES ) 23 Quantifiers Determine the scope of the parameter Global Quantifier MOBILITY NE Subnet Quantifier [N8-2.] MAC-PROTOCOL MACA Node Quantifier [5 thru 15] MOBILITY NE 24

13 Other Configuration Files Node placement: DE-PLACEMENT-FILE See details in bin/default.nodes Mobility trace: MOBILITY-TRACE-FILE See details in bin/default.mobility Static routing: STATIC-ROUTE-FILE See details in bin/default.routes-static Multicast membership: MULTICAST-GROUP-FILE See details in bin/default.member 25 Example routing protocol comparison Comparing throughput of an FTP application over AODV and DSR reactive routing protocols Application traffic: one FTP session Routing protocols: AODV/DSR Collected statistics: application layer Configure application Create bin/compare.app containing only one line: FTP S The session starts at 15 secs. There are 1 items to be sent Node 3 is the server (receiver) Node 1 is the client (sender) 26

14 Preparing Config File for AODV AODV: copy the file default.config to aodv.config then modify aodv.config on the following parameters: EXPERIMENT-NAME EXPERIMENT-NAME aodv aodv ROUTING-PROTOCOL ROUTING-PROTOCOL AODV AODV APP-CONFIG-FILE APP-CONFIG-FILE./compare.app./compare.app APPLICATION-STATISTICS APPLICATION-STATISTICS YES YES TCP-STATISTICS TCP-STATISTICS UDP-STATISTICS UDP-STATISTICS RSVP-STATISTICS RSVP-STATISTICS ROUTING-STATISTICS ROUTING-STATISTICS ACCESS-LIST-STATISTICS ACCESS-LIST-STATISTICS IGMP-STATISTICS IGMP-STATISTICS EXTERIOR-GATEWAY-PROTOCOL-STATISTICS EXTERIOR-GATEWAY-PROTOCOL-STATISTICS NETWORK-LAYER-STATISTICS NETWORK-LAYER-STATISTICS DIFFSERV-EDGE-ROUTER-STATISTICS DIFFSERV-EDGE-ROUTER-STATISTICS QUEUE-STATISTICS QUEUE-STATISTICS MAC-LAYER-STATISTICS MAC-LAYER-STATISTICS PHY-LAYER-STATISTICS PHY-LAYER-STATISTICS MOBILITY-STATISTICS MOBILITY-STATISTICS 27 Preparing Config File for DSR DSR: Copy the modified aodv.in to dsr.config edit ROUTING- PROTOCOL parameter and enable promiscuous mode: EXPERIMENT-NAME EXPERIMENT-NAME dsr dsr ROUTING-PROTOCOL ROUTING-PROTOCOL DSR DSR PROMISCUOUS-MODE PROMISCUOUS-MODE YES YES 28

15 Collecting and Comparing Statistics Run qualnet on the two configuration files cd cd QUALNET_HOME/bin./qualnet aodv.in./qualnet dsr.in Examine output statistics: Throughput difference grep grep "ServerThroughput" "ServerThroughput" aodv.stat aodv.stat 3 3 [2] [2] Application Application FTP FTP ServerThroughput ServerThroughput (bits/s) (bits/s) grep grep "ServerThroughput" "ServerThroughput" dsr.stat dsr.stat 3 3 [2] [2] Application Application FTP FTP ServerThroughput ServerThroughput (bits/s) (bits/s) More Information Plain-text explanation for configuration files: QUALNET_HOME/bin/default.* Qualnet simulator manual /m/buckwheat/qualnet/3.1/doc/ulatormanual-3.1.pdf Qualnet community forums training_and_support/support/forums/index.php 3

Simulating Well-Known Protocols

Simulating Well-Known Protocols Using QualNet Part I Simulating Well-Known Protocols Why QualNet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each

More information

Simulating Well-Known Protocols

Simulating Well-Known Protocols Using QualNet Part I Simulating Well-Known Protocols Why QualNet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each

More information

QualNet 7.4 Model Library Index

QualNet 7.4 Model Library Index QualNet 7.4 Model Index August 2015 SCALABLE Network Technologies, Inc. 600 Corporate Pointe, Suite 1200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information

More information

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN 26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and

More information

QualNet Model Library Index

QualNet Model Library Index QualNet 4.5.1 Model Library Index July 2008 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

QualNet 8.1 Model Library Index

QualNet 8.1 Model Library Index QualNet 8.1 Model Index November 2017 SCALABLE Network Technologies, Inc. 6059 Bristol Parkway, Suite 200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information

More information

QualNet 8.2 Model Library Index

QualNet 8.2 Model Library Index QualNet 8.2 May 2018 SCALABLE Network Technologies, Inc. 6059 Bristol Parkway, Suite 200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information 2018 SCALABLE

More information

Introduction to QualNet

Introduction to QualNet Introduction to QualNet Marco A. Alzate Simply a (non-quite experienced) user May 16 th, 2007 1. General Overview 2. IDE (GUI) Functional Overview 3. Command Line overview 4. Programming 5. Conclusions

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

QualNet Wireless Model Library

QualNet Wireless Model Library QualNet 4.5.1 Wireless Model Library July 2008 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

The CMU Monarch Project s Wireless and Mobility Extensions to ns

The CMU Monarch Project s Wireless and Mobility Extensions to ns The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/

More information

Novell TCP IP for Networking Professionals.

Novell TCP IP for Networking Professionals. Novell 050-649 TCP IP for Networking Professionals http://killexams.com/exam-detail/050-649 I. RECV (Receive) J. RETR (Retrieve) Answer: Pending, Please email feedback to support@hotcerts.com QUESTION:

More information

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks

Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Tak Kin Yung, Jay Martin, Mineo Takai, and Rajive Bagrodia Department of Computer Science University

More information

QualNet 4.5 Cellular Model Library

QualNet 4.5 Cellular Model Library QualNet 4.5 Cellular Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

QualNet Model Libraries

QualNet Model Libraries QualNet Model Libraries QualNet Model Libraries greatly extend the base capabilities of QualNet. From supporting specialized networks, such as MANET, WiMAX, and satellite, to enabling hardware-in-the-loop

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

OPNET Editors and Features

OPNET Editors and Features OPNET Steven Gordon Sirindhorn International Institute of Technology Thammasat University June 2010 Contents OPNET Menus Nodes and Links Communication Running Multiple OPNET Commonly used editors: 1. Project

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION

A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

IETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks

IETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks IETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks Niigata University By: Lee Speakman 1 and Kenichi Mase 2 July 2009 1. Research Center for Natural Hazard and Disaster Recovery, Niigata University

More information

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

QualNet 4.0 Model Library: Wireless

QualNet 4.0 Model Library: Wireless QualNet 4.0 Model Library: Wireless December 2006 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

A Simulation study : Performance comparison of AODV and DSR

A Simulation study : Performance comparison of AODV and DSR A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 Instructor: Mohammad Hossein Manshaei Teaching Assistants Mr. Adili & Mr. Nourbakhsh Course web page available at IVUT webcourse: http://ivut.iut.ac.ir/bounce.php?course=1012

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

CS321: Computer Networks Introduction to Computer Networks and Internet

CS321: Computer Networks Introduction to Computer Networks and Internet CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications

More information

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

4. Simulation Model. this section, the simulator and the models used for simulation are discussed.

4. Simulation Model. this section, the simulator and the models used for simulation are discussed. 4. Simulation Model In this research Network Simulator (NS), is used to compare and evaluate the performance of different ad-hoc routing protocols based on different mobility models. In this section, the

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

QualNet. Model Libraries for. Key Capabilities of Model Libraries

QualNet. Model Libraries for. Key Capabilities of Model Libraries Model Libraries for QualNet & Model Libraries for QualNet and EXata greatly extend the base capabilities of the software. From supporting specialized networks, such as WiFi, sensor networks, cellular,

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Using QualNet Part II. QualNet s Directory Structure. Adding a Custom Protocol

Using QualNet Part II. QualNet s Directory Structure. Adding a Custom Protocol Using QualNet Part II Adding a Custom Protocol QualNet s Directory Structure $QUALNET_HOME application bin gui include mac main mobility network phy transport tcplib verification code for the application

More information

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks On the Impact of Noise Sensitivity on Performance in 82.11 Based Ad Hoc Networks Saman Desilva Computer Science Department The Univ. of Texas at San Antonio, San Antonio, TX 78249 Email: sdesilva@cs.utsa.edu

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

UNIVERSITY OF OSLO Department of Informatics. Improving the Physical and MAC layer models of NEMAN. Master thesis.

UNIVERSITY OF OSLO Department of Informatics. Improving the Physical and MAC layer models of NEMAN. Master thesis. UNIVERSITY OF OSLO Department of Informatics Improving the Physical and MAC layer models of NEMAN Master thesis Jan Erik Johnsen May 24, 2006 Abstract Mobile ad-hoc networks (MANETs) are wireless networks

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks

Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks Sonal Telang Chandel Department of Computer Applications, Maulana Azad National Institute of Technology,

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Router 6000 R17 Training Programs. Catalog of Course Descriptions

Router 6000 R17 Training Programs. Catalog of Course Descriptions Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA

IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA RARA: Rate Adaptation Using Rate-adaptive adaptive Acknowledgment for IEEE 802.11 WLANs IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA 정하경 Hakyung Jung School of Computer

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks

Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 277 Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks * Mohammed

More information

Effects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks

Effects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks Effects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks Mineo Takai Jay Martin Rajive Bagrodia UCLA Computer Science Department Los Angeles, CA 995-596 (3) 825-4885 {mineo, jmartin, rajive}@cs.ucla.edu

More information

Chapter-2 Routing Protocols of MANET

Chapter-2 Routing Protocols of MANET Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Using Qualnet Part II

Using Qualnet Part II Using Qualnet Part II Adding a Custom Protocol Qualnet s Directory Structure $QUALNET_HOME application bin gui include mac main mobility network phy transport tcplib verification code application protocols

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

LTE system performance optimization by RED based PDCP buffer management

LTE system performance optimization by RED based PDCP buffer management LTE system performance optimization by RED based PDCP buffer management Umar Toseef 1,2, Thushara Weerawardane 2, Andreas Timm-Giel 2, Carmelita Görg 1 1, University of Bremen, Bremen, Germany 2, TUHH,

More information

Airborne Telemetry Networking Scenario and Environment

Airborne Telemetry Networking Scenario and Environment Highly-Dynamic Ad Hoc Airborne Networking for Telemetry Test and Evaluation James P.G. Sterbenz Abdul Jabbar, Erik Perrins, Justin Rohrer Department of Electrical Engineering & Computer Science Information

More information

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve

More information

The Diffie-Hellman Key Exchange

The Diffie-Hellman Key Exchange ISC: SECURITY AND QOS The Diffie-Hellman Key Exchange A mechanism to establish secret keys without the need for CAs Based on the difficulty of computing discrete logarithms of large numbers Public (or

More information

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Md. Zulfikar Alom 1, Tapan Kumar Godder 2, Mohammad NayeemMorshed 3, Student Member, IEEE 1,2 Department of Information & Communication

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Strategies and Guidelines for Improving Wireless Local Area Network Performance

Strategies and Guidelines for Improving Wireless Local Area Network Performance Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Tutorial 9 : TCP and congestion control part I

Tutorial 9 : TCP and congestion control part I Lund University ETSN01 Advanced Telecommunication Tutorial 9 : TCP and congestion control part I Author: Antonio Franco Course Teacher: Emma Fitzgerald January 27, 2015 Contents I Before you start 3 II

More information

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com

More information

Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design

Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design Liang Qin and Thomas Kunz Systems and Computer Engineering Carleton University August 2004 A "mobile ad hoc network" (MANET) is

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information