Simulating Well-Known Protocols
|
|
- Sara Powers
- 5 years ago
- Views:
Transcription
1 Using Qualnet Part I ulating Well-Known Protocols Why Qualnet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each layer Modular layered stack design Standard API for composition of protocols across different layers Scalability via support for parallel execution GUI Tools for system/protocol modeling 2
2 Qualnet Layer Model Application Transport IP MAC Wired Radio Physical Channel Routing FTP Telnet CBR TCP UDP OSPF AODV CSMA Radio Bus Point to Point Free space Two-ray 3 Installing Qualnet Obtain the current Qualnet package from buckwheat.cis cd cd <working_dir> gunzip c c/m/buckwheat/qualnet/3.5/qualnet-3.5.tgz \ tar tar xf xf - Obtain the license file cd cd qualnet/3.5 cp cp /m/buckwheat/qualnet/client.lic license_dir 4
3 Installing Qualnet (cont d) Build an executable cd cd main main cp cp Makefile-solaris Makefile make make Set QUALNET_HOME environment variable setenv QUALNET_HOME <working_dir>/qualnet/3.5 csh/tcsh QUALNET_HOME<working_dir>/qualnet/3.5 export QUALNET_HOME sh/bash Test Qualnet s installation cd cd../bin./qualnet default.config 5 Running Qualnet Default configuration file./qualnet./qualnet default.config default.config QUALNET_HOME QUALNET_HOME /usa/jaikaeo/qualnet/3.5 /usa/jaikaeo/qualnet/3.5 Attempting Attempting license license checkout checkout (should (should take take less less than than 2 2 seconds) seconds) success. success. QualNet QualNet Version Version Partition Partition Node Node 1 1 (21.35 ( )..). Initial node s coordinate (xyz) Partition Partition Node Node 2 2 ( ( )..). : : Partition Partition Node Node 3 3 ( ( )..). Initialization Initialization completed completed in in sec sec.. Completed Completed % % Completed Completed 1% 1% : : Completed Completed 99% 99% Completed1% Completed1% Executed Executed events events in in sec sec ulation Progress 6
4 Output Statistics default.stat Node Address Instance ID Protocol Statistic Value [] [] Physical Physical 82.11bSignals 82.11bSignals transmitted transmitted [] [] Physical Physical 82.11bSignals 82.11bSignals received received and and forwarded forwarded to to MAC MAC [] [] MAC MAC 82.11MAC 82.11MAC from from network network [] [] MAC MAC 82.11MACUNICAST 82.11MACUNICAST packets packets sent sent to to channel channel [] [] Network Network FIFOTotal FIFOTotal Queued Queued [] [] Network Network FIFOTotal FIFOTotal Dequeued Dequeued [1] [1] Network Network FIFOTotal FIFOTotal Queued Queued [1] [1] Network Network FIFOTotal FIFOTotal Dequeued Dequeued [2] [2] Network Network FIFOTotal FIFOTotal Queued Queued [2] [2] Network Network FIFOTotal FIFOTotal Dequeued Dequeued IP Address Layer * perl and awk are very good tools for processing statistic outputs 7 Configuration Files Line entry format: [Qualifier] <PARAMETER> <VALUE> Qualifier (optional) specifies a range of nodes and has precedence over the general one E.g. MOBILITY NE DE-ADDRESS[5:1] MOBILITY RANDOM-WAYPOINT Notes: Some settings require additional parameters e.g. MOBILITY Lines starting with # are treated as comments 8
5 ulation Parameters Global Parameters: ulation time Coordinate system and terrain Random seed Topology and subnets Layer/Protocol related parameters: Channel/Radio Physical Layer MAC Layer Network Layer 9 Important Global Parameters EXPERIMENT-NAME: Name of the output statistic file e.g. EXPERIMENT-NAME default Resulting statistics are written in default.stat SIMULATION-TIME: The length of time to simulate. e.g. SIMULATION-TIME 15M (Available time units: NS US MS S M H D; default is in seconds) SEED: The random seed used to derive all other seeds used in the simulation. e.g. SEED 1 1
6 Terrain and Node Placement COORDINATE-SYSTEM: LATLONALT or CARTESIAN e.g. COORDINATE-SYSTEM CARTESIAN TERRAIN-DIMENSIONS: The size of the rectangular area to simulate (in meters) for Cartesian coordinate. e.g. TERRAIN-DIMENSIONS (1 1) DE-PLACEMENT: GRID RANDOM UNIFORM FILE GRID RANDOM UNIFORM GRID-UNIT 11 Specifying Topology SUBNET Parameter SUBNET <subnet> { comma-delimited list of nodes } Ex. SUBNET N8-1. { 3 7 thru 9 } NodeIds and 9 have network interfaces with address..1.1 through..1.5 Node ID Basic form: SUBNET N16- { 1 thru n } n is the number of nodes 1 Interface Address IP address and Node ID are identical Node 5 has IP address
7 Subnet Shorthand Format: N<# host bits>-<address with front end s omitted> Ex. N8-1. The subnet address is..1. Host IP addresses are 8 bits This allows for (254) hosts in this subnet with IP addresses numbered from..1.1 through The broadcast address for this subnet is The subnet mask is N is an equivalent representation 13 Mobility Model NE TRACE RANDOM-WAYPOINT e.g. MOBILITY RANDOM-WAYPOINT MOBILITY-WP-PAUSE 3S MOBILITY-WP-MIN-SPEED MOBILITY-WP-MAX-SPEED 1 MOBILITY-POSITION-GRANULARITY: distance in meters at which a node s location is updated small values potentially slow down the simulation Location updates when granularity 5 5m 1m (minmax) (minmax) pause Location updates when granularity 1 14
8 Approximate mobility speed Scenario Walking City driving Free way driving Aircraft Speed 5 mph 35 mph 65 mph Mach 1 Speed (m/s) 2.2 m/s 15.5 m/s 28.8 m/s 332 m/s 15 Propagation Model PROPAGATION-LIMIT: received signals with power below this limit (in dbm) will not be processed. e.g. PROPAGATION-LIMIT PROPAGATION-PATHLOSS: specifies path-loss model FREE-SPACE Empty space no ground TWO-RAY Flat ground Considers a ray bounced back from the ground h TX d ITM Irregular terrain (terrain database required) d ground h RX 16
9 Fading Model Applied to only narrowband channels (flat fading) Specified by PROPAGATION-FADING-MODEL Available models NE No fading RAYLEIGH Highly mobile no line of sight RICEAN requires an additional parameter RICEAN-K-FACTOR K : no line of sight (similar to RAYLEIGH) K : strong line of sight e.g. PROPAGATION-FADING-MODEL RAYLEIGH 17 Physical Layer Model Noise modeling Thermal noise PHY-ISE-FACTOR (default 1) PHY-TEMPERATURE (in K; default 29) Interference PHY-RX-MODEL (SNR-THRESHOLD-BASED BER-BASED) Parameters specific to 82.11b PHY82.11b-DATA-RATE (in bps) PHY82.11b-TX-POWER (in dbm) PHY82.11b-RX-SENSITIVITY (in dbm) PHY82.11b-RX-THRESHOLD (in dbm) C B A Rx threshold Rx sensitivity 18
10 MAC Layer Model MAC-PROTOCOL: specifies MAC layer protocol CSMA Requires carrier sensing before transmission If the channel is free the packet is transmitted immediately Otherwise set a random timeout MACA Uses RTS/CTS to acquire channel Does not carrier sense MAC82.11 CSMA/CA with ACKs and optional RTS/CTS TSMA MAC82.3 Wired networks PROMISCUOUS-MODE: set to YES to allow nodes to overhear packets destined to the neighboring node (required by DSR). 19 IP Protocol ly the only support network layer protocol Available queuing models First-in first-out (FIFO) Variations of Random Early Detection: RED RIO WRED Three priority types supported: control () real-time (1) and non-real-time (2) IP-QUEUE-PRIORITY-QUEUE-SIZE specifies the queue s size (in bytes) Each priority queue's size can be specified separately IP-QUEUE-PRIORITY-QUEUE-SIZE[] 25 IP-QUEUE-PRIORITY-QUEUE-SIZE[1] 5 IP-QUEUE-PRIORITY-QUEUE-SIZE[2] 5 2
11 Routing Protocols Proactive protocols BELLMANFORD RIPv2 OSPFv2 OLSR Reactive protocols AODV DSR LAR1 Static routing: requires STATIC-ROUTE-FILE 21 Application Specification APP-CONFIG-FILE: Specifies a file with a list of apps/traffic generators to run. FTP TELNET CBR HTTP VoIP etc See bin/default.app for more details 22
12 Layer Statistics Some statistics include: APPLICATION-STATISTICS (YES ) TCP-STATISTICS (YES ) UDP-STATISTICS (YES ) ROUTING-STATISTICS (YES ) NETWORK-LAYER-STATISTICS (YES ) QUEUE-STATISTICS (YES ) MAC-LAYER-STATISTICS (YES ) PHY-LAYER-STATISTICS (YES ) MOBILITY-STATISTICS (YES ) 23 Quantifiers Determine the scope of the parameter Global Quantifier MOBILITY NE Subnet Quantifier [N8-2.] MAC-PROTOCOL MACA Node Quantifier [5 thru 15] MOBILITY NE 24
13 Other Configuration Files Node placement: DE-PLACEMENT-FILE See details in bin/default.nodes Mobility trace: MOBILITY-TRACE-FILE See details in bin/default.mobility Static routing: STATIC-ROUTE-FILE See details in bin/default.routes-static Multicast membership: MULTICAST-GROUP-FILE See details in bin/default.member 25 Example routing protocol comparison Comparing throughput of an FTP application over AODV and DSR reactive routing protocols Application traffic: one FTP session Routing protocols: AODV/DSR Collected statistics: application layer Configure application Create bin/compare.app containing only one line: FTP S The session starts at 15 secs. There are 1 items to be sent Node 3 is the server (receiver) Node 1 is the client (sender) 26
14 Preparing Config File for AODV AODV: copy the file default.config to aodv.config then modify aodv.config on the following parameters: EXPERIMENT-NAME EXPERIMENT-NAME aodv aodv ROUTING-PROTOCOL ROUTING-PROTOCOL AODV AODV APP-CONFIG-FILE APP-CONFIG-FILE./compare.app./compare.app APPLICATION-STATISTICS APPLICATION-STATISTICS YES YES TCP-STATISTICS TCP-STATISTICS UDP-STATISTICS UDP-STATISTICS RSVP-STATISTICS RSVP-STATISTICS ROUTING-STATISTICS ROUTING-STATISTICS ACCESS-LIST-STATISTICS ACCESS-LIST-STATISTICS IGMP-STATISTICS IGMP-STATISTICS EXTERIOR-GATEWAY-PROTOCOL-STATISTICS EXTERIOR-GATEWAY-PROTOCOL-STATISTICS NETWORK-LAYER-STATISTICS NETWORK-LAYER-STATISTICS DIFFSERV-EDGE-ROUTER-STATISTICS DIFFSERV-EDGE-ROUTER-STATISTICS QUEUE-STATISTICS QUEUE-STATISTICS MAC-LAYER-STATISTICS MAC-LAYER-STATISTICS PHY-LAYER-STATISTICS PHY-LAYER-STATISTICS MOBILITY-STATISTICS MOBILITY-STATISTICS 27 Preparing Config File for DSR DSR: Copy the modified aodv.in to dsr.config edit ROUTING- PROTOCOL parameter and enable promiscuous mode: EXPERIMENT-NAME EXPERIMENT-NAME dsr dsr ROUTING-PROTOCOL ROUTING-PROTOCOL DSR DSR PROMISCUOUS-MODE PROMISCUOUS-MODE YES YES 28
15 Collecting and Comparing Statistics Run qualnet on the two configuration files cd cd QUALNET_HOME/bin./qualnet aodv.in./qualnet dsr.in Examine output statistics: Throughput difference grep grep "ServerThroughput" "ServerThroughput" aodv.stat aodv.stat 3 3 [2] [2] Application Application FTP FTP ServerThroughput ServerThroughput (bits/s) (bits/s) grep grep "ServerThroughput" "ServerThroughput" dsr.stat dsr.stat 3 3 [2] [2] Application Application FTP FTP ServerThroughput ServerThroughput (bits/s) (bits/s) More Information Plain-text explanation for configuration files: QUALNET_HOME/bin/default.* Qualnet simulator manual /m/buckwheat/qualnet/3.1/doc/ulatormanual-3.1.pdf Qualnet community forums training_and_support/support/forums/index.php 3
Simulating Well-Known Protocols
Using QualNet Part I Simulating Well-Known Protocols Why QualNet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each
More informationSimulating Well-Known Protocols
Using QualNet Part I Simulating Well-Known Protocols Why QualNet? Rapid prototyping of protocols Comparative performance evaluation of alternative protocols at each layer Built-in measurements on each
More informationQualNet 7.4 Model Library Index
QualNet 7.4 Model Index August 2015 SCALABLE Network Technologies, Inc. 600 Corporate Pointe, Suite 1200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information
More informationCHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN
26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and
More informationQualNet Model Library Index
QualNet 4.5.1 Model Library Index July 2008 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationQualNet 8.1 Model Library Index
QualNet 8.1 Model Index November 2017 SCALABLE Network Technologies, Inc. 6059 Bristol Parkway, Suite 200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information
More informationQualNet 8.2 Model Library Index
QualNet 8.2 May 2018 SCALABLE Network Technologies, Inc. 6059 Bristol Parkway, Suite 200 Culver City, CA 90230 +1.310.338.3318 TEL +1.310.338.7213 FAX SCALABLE-NETWORKS.COM Copyright Information 2018 SCALABLE
More informationIntroduction to QualNet
Introduction to QualNet Marco A. Alzate Simply a (non-quite experienced) user May 16 th, 2007 1. General Overview 2. IDE (GUI) Functional Overview 3. Command Line overview 4. Programming 5. Conclusions
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More informationQualNet Wireless Model Library
QualNet 4.5.1 Wireless Model Library July 2008 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationThe CMU Monarch Project s Wireless and Mobility Extensions to ns
The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/
More informationNovell TCP IP for Networking Professionals.
Novell 050-649 TCP IP for Networking Professionals http://killexams.com/exam-detail/050-649 I. RECV (Receive) J. RETR (Retrieve) Answer: Pending, Please email feedback to support@hotcerts.com QUESTION:
More informationIntegration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks
Integration of fluid-based analytical model with Packet-Level Simulation for Analysis of Computer Networks Tak Kin Yung, Jay Martin, Mineo Takai, and Rajive Bagrodia Department of Computer Science University
More informationQualNet 4.5 Cellular Model Library
QualNet 4.5 Cellular Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationQualNet Model Libraries
QualNet Model Libraries QualNet Model Libraries greatly extend the base capabilities of QualNet. From supporting specialized networks, such as MANET, WiMAX, and satellite, to enabling hardware-in-the-loop
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More informationOPNET Editors and Features
OPNET Steven Gordon Sirindhorn International Institute of Technology Thammasat University June 2010 Contents OPNET Menus Nodes and Links Communication Running Multiple OPNET Commonly used editors: 1. Project
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationMulticast and Quality of Service. Internet Technologies and Applications
Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationA STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationIETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks
IETF 75 - MANET WG Routing Loop Issue in Mobile Ad Hoc Networks Niigata University By: Lee Speakman 1 and Kenichi Mase 2 July 2009 1. Research Center for Natural Hazard and Disaster Recovery, Niigata University
More informationInteractions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationQualNet 4.0 Model Library: Wireless
QualNet 4.0 Model Library: Wireless December 2006 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationA Simulation study : Performance comparison of AODV and DSR
A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 Instructor: Mohammad Hossein Manshaei Teaching Assistants Mr. Adili & Mr. Nourbakhsh Course web page available at IVUT webcourse: http://ivut.iut.ac.ir/bounce.php?course=1012
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCS321: Computer Networks Introduction to Computer Networks and Internet
CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications
More informationA Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation
A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More information4. Simulation Model. this section, the simulator and the models used for simulation are discussed.
4. Simulation Model In this research Network Simulator (NS), is used to compare and evaluate the performance of different ad-hoc routing protocols based on different mobility models. In this section, the
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationQualNet. Model Libraries for. Key Capabilities of Model Libraries
Model Libraries for QualNet & Model Libraries for QualNet and EXata greatly extend the base capabilities of the software. From supporting specialized networks, such as WiFi, sensor networks, cellular,
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationNetwork Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class
Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationUsing QualNet Part II. QualNet s Directory Structure. Adding a Custom Protocol
Using QualNet Part II Adding a Custom Protocol QualNet s Directory Structure $QUALNET_HOME application bin gui include mac main mobility network phy transport tcplib verification code for the application
More informationOn the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks
On the Impact of Noise Sensitivity on Performance in 82.11 Based Ad Hoc Networks Saman Desilva Computer Science Department The Univ. of Texas at San Antonio, San Antonio, TX 78249 Email: sdesilva@cs.utsa.edu
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationUNIVERSITY OF OSLO Department of Informatics. Improving the Physical and MAC layer models of NEMAN. Master thesis.
UNIVERSITY OF OSLO Department of Informatics Improving the Physical and MAC layer models of NEMAN Master thesis Jan Erik Johnsen May 24, 2006 Abstract Mobile ad-hoc networks (MANETs) are wireless networks
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationCOMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)
COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More informationPerformance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks
Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks Sonal Telang Chandel Department of Computer Applications, Maulana Azad National Institute of Technology,
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationRouter 6000 R17 Training Programs. Catalog of Course Descriptions
Router 6000 R7 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 IP NETWORKING... 4 IP OVERVIEW & FUNDAMENTALS... 8 IP ROUTING OVERVIEW & FUNDAMENTALS...0
More informationH3C S9500 QoS Technology White Paper
H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and
More informationAppendix B Policies and Filters
Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationIEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA
RARA: Rate Adaptation Using Rate-adaptive adaptive Acknowledgment for IEEE 802.11 WLANs IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA 정하경 Hakyung Jung School of Computer
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationEfficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 277 Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks * Mohammed
More informationEffects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks
Effects of Wireless Physical Layer Modeling in Mobile Ad Hoc Networks Mineo Takai Jay Martin Rajive Bagrodia UCLA Computer Science Department Los Angeles, CA 995-596 (3) 825-4885 {mineo, jmartin, rajive}@cs.ucla.edu
More informationChapter-2 Routing Protocols of MANET
Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationCCNA Exam File with Answers. Note: Underlines options are correct answers.
CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationUsing Qualnet Part II
Using Qualnet Part II Adding a Custom Protocol Qualnet s Directory Structure $QUALNET_HOME application bin gui include mac main mobility network phy transport tcplib verification code application protocols
More informationObjectives. Chapter 10. Upon completion you will be able to:
Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group
More informationLTE system performance optimization by RED based PDCP buffer management
LTE system performance optimization by RED based PDCP buffer management Umar Toseef 1,2, Thushara Weerawardane 2, Andreas Timm-Giel 2, Carmelita Görg 1 1, University of Bremen, Bremen, Germany 2, TUHH,
More informationAirborne Telemetry Networking Scenario and Environment
Highly-Dynamic Ad Hoc Airborne Networking for Telemetry Test and Evaluation James P.G. Sterbenz Abdul Jabbar, Erik Perrins, Justin Rohrer Department of Electrical Engineering & Computer Science Information
More informationDesign of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri
Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve
More informationThe Diffie-Hellman Key Exchange
ISC: SECURITY AND QOS The Diffie-Hellman Key Exchange A mechanism to establish secret keys without the need for CAs Based on the difficulty of computing discrete logarithms of large numbers Public (or
More informationPerformance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)
Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Md. Zulfikar Alom 1, Tapan Kumar Godder 2, Mohammad NayeemMorshed 3, Student Member, IEEE 1,2 Department of Information & Communication
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationStrategies and Guidelines for Improving Wireless Local Area Network Performance
Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk
More informationImpulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis
American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationTutorial 9 : TCP and congestion control part I
Lund University ETSN01 Advanced Telecommunication Tutorial 9 : TCP and congestion control part I Author: Antonio Franco Course Teacher: Emma Fitzgerald January 27, 2015 Contents I Before you start 3 II
More informationHomework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15
ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationAnalysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com
More informationSurvey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design
Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design Liang Qin and Thomas Kunz Systems and Computer Engineering Carleton University August 2004 A "mobile ad hoc network" (MANET) is
More informationA Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels
A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,
More information