LAMPIRAN. set ns [new Simulator]

Size: px
Start display at page:

Download "LAMPIRAN. set ns [new Simulator]"

Transcription

1 LAMPIRAN set ns [new Simulator] $ns color 0 pink $ns color 1 red $ns color 2 green $ns color 3 yellow $ns color 4 brown $ns color 5 purple $ns color 6 black $ns color 7 grey $ns color 8 maroon set n0 [$ns node] set n1 [$ns node] set n2 [$ns node] set n3 [$ns node] set n4 [$ns node] set n5 [$ns node] set n6 [$ns node] set n7 [$ns node] set n8 [$ns node] set n9 [$ns node] set n10 [$ns node] set n11 [$ns node] set n12 [$ns node] set n13 [$ns node] set n14 [$ns node] set n15 [$ns node] set n16 [$ns node] set n17 [$ns node] set n18 [$ns node] set n19 [$ns node] set n20 [$ns node] set n21 [$ns node] set n22 [$ns node] set f [open out.tr w] $ns trace-all $f set nf [open out.nam w] $ns namtrace-all $nf $ns duplex-link $n0 $n3 5Mb 2ms DropTail $ns duplex-link $n1 $n3 5Mb 2ms DropTail $ns duplex-link $n2 $n3 5Mb 2ms DropTail $ns duplex-link $n10 $n3 1.5Mb 10ms DropTail

2 $ns simplex-link $n9 $n10 1.5Mb 10ms DropTail $ns duplex-link $n10 $n16 1.5Mb 10ms DropTail $ns duplex-link $n10 $n11 1.5Mb 10ms DropTail $ns duplex-link $n10 $n17 1.5Mb 10ms DropTail $ns duplex-link $n3 $n4 1.5Mb 10ms DropTail $ns duplex-link $n4 $n5 1.5Mb 10ms DropTail $ns duplex-link $n4 $n11 1.5Mb 10ms DropTail $ns duplex-link $n5 $n6 1.5Mb 10ms DropTail $ns duplex-link $n6 $n7 1.5Mb 10ms DropTail $ns simplex-link $n6 $n8 1.5Mb 10ms DropTail $ns duplex-link $n11 $n12 1.5Mb 10ms DropTail $ns duplex-link $n12 $n13 1.5Mb 10ms DropTail $ns duplex-link $n12 $n14 1.5Mb 10ms DropTail $ns duplex-link $n12 $n15 1.5Mb 10ms DropTail $ns duplex-link $n11 $n18 1.5Mb 10ms DropTail $ns duplex-link $n18 $n19 1.5Mb 10ms DropTail $ns duplex-link $n18 $n20 1.5Mb 10ms DropTail $ns duplex-link $n5 $n21 1.5Mb 10ms DropTail $ns duplex-link $n5 $n22 1.5Mb 10ms DropTail $ns simplex-link $n8 $n9 0.1Mb 10ms DropTail $ns duplex-link-op $n0 $n3 orient right-up $ns duplex-link-op $n1 $n3 orient right-down $ns duplex-link-op $n2 $n3 orient down $ns duplex-link-op $n10 $n3 orient up $ns simplex-link-op $n9 $n10 orient right-up $ns duplex-link-op $n10 $n11 orient right $ns duplex-link-op $n10 $n16 orient down $ns duplex-link-op $n10 $n17 orient right-down $ns duplex-link-op $n3 $n4 orient right $ns duplex-link-op $n4 $n5 orient right-up $ns duplex-link-op $n4 $n11 orient down $ns duplex-link-op $n5 $n6 orient right $ns duplex-link-op $n6 $n7 orient right-up $ns simplex-link-op $n6 $n8 orient right $ns duplex-link-op $n11 $n12 orient right $ns duplex-link-op $n12 $n13 orient right-up $ns duplex-link-op $n12 $n14 orient right $ns duplex-link-op $n12 $n15 orient right-down $ns duplex-link-op $n11 $n18 orient right-down $ns duplex-link-op $n18 $n19 orient left-down $ns duplex-link-op $n18 $n20 orient right-down $ns duplex-link-op $n5 $n21 orient right-up $ns duplex-link-op $n5 $n22 orient left-up $ns simplex-link-op $n8 $n9 orient left-down $ns duplex-link-op $n2 $n3 queuepos 0.5

3 set udp0 [new Agent/UDP] $ns attach-agent $n0 $udp0 set cbr0 [new Application/Traffic/CBR] $cbr0 attach-agent $udp0 set udp1 [new Agent/UDP] $ns attach-agent $n3 $udp1 $udp1 set class_ 1 set cbr1 [new Application/Traffic/CBR] $cbr1 attach-agent $udp1 #set udp2 [new Agent/UDP] #$ns attach-agent $n9 $udp2 #$udp2 set class_ 2 #set cbr2 [new Application/Traffic/CBR] #$cbr2 attach-agent $udp2 set udp3 [new Agent/UDP] $ns attach-agent $n16 $udp3 $udp3 set class_ 3 set cbr3 [new Application/Traffic/CBR] $cbr3 attach-agent $udp3 set udp4 [new Agent/UDP] $ns attach-agent $n19 $udp4 $udp4 set class_ 4 set cbr4 [new Application/Traffic/CBR] $cbr4 attach-agent $udp4 set udp5 [new Agent/UDP] $ns attach-agent $n7 $udp5 $udp5 set class_ 5 set cbr5 [new Application/Traffic/CBR] $cbr5 attach-agent $udp5 set udp6 [new Agent/UDP] $ns attach-agent $n14 $udp6 $udp6 set class_ 6 set cbr6 [new Application/Traffic/CBR] $cbr6 attach-agent $udp6 set udp7 [new Agent/UDP] $ns attach-agent $n13 $udp7 $udp7 set class_ 7 set cbr7 [new Application/Traffic/CBR] $cbr7 attach-agent $udp7 set udp8 [new Agent/UDP]

4 $ns attach-agent $n1 $udp8 $udp8 set class_ 8 set cbr8 [new Application/Traffic/CBR] $cbr8 attach-agent $udp8 set null0 [new Agent/Null] $ns attach-agent $n14 $null0 set null1 [new Agent/Null] $ns attach-agent $n13 $null1 #set null2 [new Agent/Null] #$ns attach-agent $n8 $null2 set null3 [new Agent/Null] $ns attach-agent $n20 $null3 set null4 [new Agent/Null] $ns attach-agent $n14 $null4 set null5 [new Agent/Null] $ns attach-agent $n20 $null5 set null6 [new Agent/Null] $ns attach-agent $n21 $null6 set null7 [new Agent/Null] $ns attach-agent $n22 $null7 set null8 [new Agent/Null] $ns attach-agent $n17 $null8 $ns connect $udp0 $null0 $ns connect $udp1 $null1 #$ns connect $udp2 $null2 $ns connect $udp3 $null3 $ns connect $udp4 $null4 $ns connect $udp5 $null5 $ns connect $udp6 $null6 $ns connect $udp7 $null7 $ns connect $udp8 $null8 # creation trace traffic set max_fragmented_size 1024 #add udp header(8 bytes) and IP header (20bytes) set packetsize 1052 set original_file_name st40_a02 set trace_file_name video1.dat

5 set original_file_id [open $original_file_name r] set trace_file_id [open $trace_file_name w] set pre_time 0 while {[eof $original_file_id] == 0 { gets $original_file_id current_line scan $current_line "%d%s%d%d%f" no_ frametype_ length_ tmp1_ tmp2_ set time [expr int(($tmp2_ - $pre_time)* )] if { $frametype_ == "I" { set type_v 1 if { $frametype_ == "P" { set type_v 2 if { $frametype_ == "B" { set type_v 3 if { $frametype_ == "H" { set type_v 1 puts $trace_file_id "$time $length_ $type_v $prio_p $max_fragmented_size" set pre_time $tmp2_ close $original_file_id close $trace_file_id set end_sim_time $tmp2_ puts "$end_sim_time" set trace_file [new Tracefile] $trace_file filename $trace_file_name #Attach video to server #create source traffic #Create a UDP agent and attach it to node n0 set udp_0 [new Agent/myUDP] $udp_0 set_filename udpsend0 $udp_0 set packetsize_ 1052 $ns attach-agent $n2 $udp_0 ;#Server 2 set tcp_1 [new Agent/TCP]

6 $tcp_1 set_filename TcpSend0 $tcp_1 set packetsize_ 1052 $ns attach-agent $n9 $tcp_1 ;#paket yang diamati set udp_1 [new Agent/myUDP] $udp_1 set_filename udpsend1 $udp_1 set packetsize_ 1052 $ns attach-agent $n20 $udp_1 ;#Server 20 set udp_2 [new Agent/myUDP] $udp_2 set_filename udpsend2 $udp_2 set packetsize_ 1052 $ns attach-agent $n22 $udp_2 ;#Server 22 # Attach video traffic source set video0 [new Application/Traffic/myEvalvid] $video0 attach-tracefile $trace_file $video0 attach-agent $udp_0 set video1 [new Application/Traffic/myEvalvid] $video1 attach-tracefile $trace_file $video1 attach-agent $tcp_1 set video2 [new Application/Traffic/myEvalvid] $video2 attach-tracefile $trace_file $video2 attach-agent $udp_1 set video3 [new Application/Traffic/myEvalvid] $video3 attach-tracefile $trace_file $video3 attach-agent $udp_2

ns-2 Tutorial Exercise (1)

ns-2 Tutorial Exercise (1) ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of

More information

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro. Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

An Introduction to NS-2

An Introduction to NS-2 An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

NS-2 Tutorial. Kumar Viswanath CMPE 252a.

NS-2 Tutorial. Kumar Viswanath CMPE 252a. NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.

More information

The Transport Control Protocol (TCP)

The Transport Control Protocol (TCP) TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable

More information

Part 6. Confidence Interval

Part 6. Confidence Interval Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit

More information

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A

More information

QoS in Network Simulator 2

QoS in Network Simulator 2 QoS in Network Simulator 2 This experiment provides experience in how to apply and simulate QoS mechanisms in communication networks by means of NS2. We focus on RSVP in this experiment. 1. RSVP in NS2

More information

Part 3. Result Analysis

Part 3. Result Analysis Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1 Outline A Simulation and its results The Format of Trace File The AWK language

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students

More information

Simulations: ns2 simulator part I a

Simulations: ns2 simulator part I a Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...

More information

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning

More information

The Network Simulator Fundamentals. Downloads and further info at:

The Network Simulator Fundamentals. Downloads and further info at: ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,

More information

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some

More information

Simple Data Link Protocols

Simple Data Link Protocols Simple Data Link Protocols Goals 1) Become familiar with Network Simulator 2 2) Simulate Stop & wait and Sliding Window 3) Investigate the effect of channel with loss on link utilization Introduction Data

More information

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial

More information

Modeling of data networks by example: ns-2 (I)

Modeling of data networks by example: ns-2 (I) Modeling of data networks by example: ns-2 (I) Holger Füßler Holger Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating

More information

LAN-WAN-LAN end-to-end Network Simulation with NS2

LAN-WAN-LAN end-to-end Network Simulation with NS2 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp 13136-13140 Research India Publications http://wwwripublicationcom LAN-WAN-LAN end-to-end Network Simulation

More information

Part 5. Wireless Network

Part 5. Wireless Network Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation

More information

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES Petr Berka, Petr Hujka Department of Telecommunications, Brno University of Technology, Purkynova 118, 612 00 Brno, Czech Republic, phone: +420 5 41149190,

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.3148 Ns2 simulation exercise Fall 2007 1 Table of contents 1. Introduction... 3 2. Theoretical background... 3 2.1. IEEE 802.11 MAC protocol... 3 2.2. Overview of TCP s congestion control... 4 2.3.

More information

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation

More information

Tutorial Schedule. Introduction Ns fundamentals Ns programming internal Extending ns-2 Simulator. Sep. 25,

Tutorial Schedule. Introduction Ns fundamentals Ns programming internal Extending ns-2 Simulator. Sep. 25, NS-2 Tutorial Presenter: Qing (Kenny) Shao (SFU/CNL) Author: Polly Huang (AT&T Labs Research) Padmaparna Haldar (USC/ISI) Xuan Chen (USC/ISI) Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl

More information

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2) CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried

More information

Network Simulator 2 (NS2)

Network Simulator 2 (NS2) Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)

More information

[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for

[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for References [1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). Multiple valued logic (MVL) reduction operator, its synthesis and application on network congestion. Proceeding of 7th

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.148 Ns2 simulation exercise 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2. Fast Retransmit...4

More information

Report: Simulation of ECOFRAME MAC layer in ns Bogdan Ušćumlić, Annie Gravey, Michel Morvan, and Philippe Gravey

Report: Simulation of ECOFRAME MAC layer in ns Bogdan Ušćumlić, Annie Gravey, Michel Morvan, and Philippe Gravey Report: Simulation of ECOFRAME MAC layer in ns-2.31 Bogdan Ušćumlić, Annie Gravey, Michel Morvan, and Philippe Gravey May 12, 2009 Contents Introduction 1 1 The simulator 3 1.1 Caracteristics...........................

More information

Introduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities

Introduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities Introduction Ns Tutorial 2002 Padmaparna Haldar (haldar@isi.edu) Xuan Chen (xuanc@isi.edu) Nov 21, 2002 1989: REAL network simulator 1995: DARPA VINT project at LBL, Xerox PARC, UCB, and USC/ISI Present:

More information

EE 122: Computer Networks Network Simulator ns2

EE 122: Computer Networks Network Simulator ns2 EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.

More information

International Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using.

International Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using. www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Efficient routing protocol for MANET using STP and BRM First

More information

Comparing ad-hoc wireless to wiredwireless

Comparing ad-hoc wireless to wiredwireless TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script

More information

ANALYSIS OF SMART DEVICE GAME PROTOCOL

ANALYSIS OF SMART DEVICE GAME PROTOCOL ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien

More information

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing

More information

Part 3: Network Simulator 2

Part 3: Network Simulator 2 S-38.148 Simulation of data networks / fall-04 Part 3: Network Simulator 2 24.11.2004 1 NS2: Contents NS2 Introduction to NS2 simulator Background info Main concepts, basics of Tcl and Otcl NS2 simulation

More information

NS internals. Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University

NS internals. Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University NS internals Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University Software architecture Split programming model (C++ and OTcl) Simulation kernel fi

More information

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner

More information

John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002

John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 QVWKHQHWZRUNVLPXODWRU,3$07XWRULDO 1HWZRUN0RGHOLQJDQG7UDIILF $QDO\VLVZLWKQV John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 a discrete event simulator simple model focused on modeling

More information

Brief Overview and Background

Brief Overview and Background Brief Overview and Background In this assignment you will be studying the performance behavior of TCP, using ns 2. At the end of this exercise, you should be able to write simple scripts in ns 2 as well

More information

GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK

GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK A PROJECT REPORT Submitted by DIVYA P Register No: 14MCO010 in partial fulfillment for the

More information

Channabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.

Channabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka. Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. QMP 7.1 D/F Department of Computer Science & Engineering Network

More information

Wireless Networks - Preliminaries

Wireless Networks - Preliminaries This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators

More information

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project)

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) To Investigate the degree of congestion control synchronization of window-based connections bottlenecked at the same link Kumar, Vikram

More information

Design and Simulation Implementation of an Improved PPM Approach

Design and Simulation Implementation of an Improved PPM Approach I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt

More information

Chapter 5. Simulation Environment. Chapter 5 Simulation Environment... V Network Simulator... V NS-2 Installation...

Chapter 5. Simulation Environment. Chapter 5 Simulation Environment... V Network Simulator... V NS-2 Installation... Chapter 5 Simulation Environment Chapter 5 Simulation Environment... V-2 5.1 Network Simulator... V-2 5.2 NS-2 Installation... V-4 5.3 Sample Script... V-9 5.4 Adding New Routing Protocol in NS2... V-12

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.148 Ns2 simulation exercise Table of contents 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2.

More information

QMP 7.1 D/F Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.

QMP 7.1 D/F Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka. QMP 7.1 D/F Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. Department of Computer Science & Engineering LAB MANUAL

More information

Network Simulator Version 2 for VANET

Network Simulator Version 2 for VANET International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Network Simulator Version 2 for VANET Venkatatamangarao

More information

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT VoIP Performance of City-Wide Wi-Fi and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie 301144355 Yang, Tian Lin 301107652

More information

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore. Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple

More information

Congestion-aware TCP-friendly system for multimedia transmission based on UDP

Congestion-aware TCP-friendly system for multimedia transmission based on UDP DOI 10.1007/s10586-015-0446-8 Congestion-aware TCP-friendly system for multimedia transmission based on UDP Mohammed M. Kadhum 1,2 Hossam S. Hassanein 1 Received: 15 August 2013 / Revised: 31 January 2015

More information

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad

More information

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.

More information

Emulab Tutorial. Getting Started

Emulab Tutorial. Getting Started Page 1 of 13 Emulab Tutorial Contents! Getting Started " Logging into the Web Interface " Designing a Network Topology " Beginning the Experiment " Using your Nodes " I need root access! " My node is wedged!

More information

UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS

UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS PROJECT INDEX: PRJ 148 BY NAME: NJERU PATRICK MAGOCHI REG. NO: F17/1360/2010 SUPERVISOR: DR. G.S. ODHIAMBO EXAMINER: PROF. V.K. ODUOL Project report

More information

The simulation and emulation verification that was based on NS-2

The simulation and emulation verification that was based on NS-2 210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer

More information

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7 www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...

More information

DMI COLLEGE OF ENGINEERING

DMI COLLEGE OF ENGINEERING DMI COLLEGE OF ENGINEERING PALANCHUR CHENNAI 600 123 DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LABORATORY MANUAL SUB CODE : EC6611 SUBJECT TITLE: COMPUTER NETWORKS LABORATORY SEMESTER : VI

More information

Implementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2

Implementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2 Implementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2 1 S.Jeneeth Subashini, 2 D. Guna Shekar, 3 C.Harinath Reddy, 4 M. Manikanta 1,2,3,4 ECE, Final year students,

More information

Modeling of data networks by example: NS-2 (II)

Modeling of data networks by example: NS-2 (II) Modeling of data networks by example: NS-2 (II) Holger Füßler H. Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating

More information

1 What is network simulation and how can it be useful?

1 What is network simulation and how can it be useful? CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET

More information

Quantifying the Impact of Flood Attack on Transport Layer Protocol

Quantifying the Impact of Flood Attack on Transport Layer Protocol Quantifying the Impact of Flood Attack on Transport Layer Protocol KULDEEP TOMAR 1 AND S.S TYAGI 2 1 Research Scholar, Department of CSE, MRIU, Faridabad, Haryana, India 2 Professor & Head, Department

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Ns-2 Laboratory Prof. Chansu Yu http://academic.csuohio.edu/yuc/ In-Class Lab: Mobile IP 5 nodes 2 wired nodes, W(0) and W(1) 2 mobile agents, HA and FA A

More information

Traffic Behaviour of VoIP in a Simulated Access Network

Traffic Behaviour of VoIP in a Simulated Access Network Complete Citation: Das Gupta, Jishu and Howard, Srecko and Howard, Angela (2006). Traffic behaviour of VoIP in a simulated access network. International Transactions on Engineering, Computing and Technology,

More information

Performance Simulation of Multicast for Small Conferences

Performance Simulation of Multicast for Small Conferences Performance Simulation of Multicast for Small Conferences Diplomarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von: Stefan Egger 2002 Leiter der Arbeit: Prof.

More information

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks Amitabha Ghosh IBM India Research Laboratory Department of Electrical Engineering University of Southern California, Los Angeles http://anrg.usc.edu/~amitabhg

More information

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session ii ABSTRACT An opportunistic network application is a scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register

More information

PESIT Bangalore South Campus. Department OF Information Science & Engineering

PESIT Bangalore South Campus. Department OF Information Science & Engineering PESIT Bangalore South Campus 1Km before Electronic City, Hosur Road, Bangalore-560100. Department OF Information Science & Engineering COMPUTER NETWORK LABORATORY 15CSL57 Lab Manual 2017-18 Introduction

More information

Simulation in Cyber Security

Simulation in Cyber Security Simulation in Cyber Security Andres Ojamaa Institute of Cybernetics, Tallinn University of Technology CS Theory Days, 25 Jan 2008, Põlva Outline Cyber Security and Simulation What is this thing called

More information

Tcl script 2

Tcl script 2 Ns : 5... 1 5...nam ns 6... ns 6... nam 1.1 1.2 1.3 7... Tcl script 2 8... 9... 10... 2.1 2.2 2.3 12... 3 13... ( ) 14... 16... 17... 3.1 3.2 3.3 3.4 18... 4 18... 20... 4.1 4.2 22... Xgraph 5 22... 5.1

More information

How to Make the Client IP Address Available to the Back-end Server

How to Make the Client IP Address Available to the Back-end Server How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration

More information

Nsclick User Manual. University of Colorado at Boulder

Nsclick User Manual. University of Colorado at Boulder Nsclick User Manual Michael Neufeld, Graham Schelle, and Dirk Grunwald University of Colorado Department of Computer Science Boulder, CO 80309 {neufeldm,schelleg,grunwald}@cs.colorado.edu CU-CS-959-03

More information

Keywords Congestion Control, SRR, RED, RIO, BLUE, SFB, SRM, PGM.

Keywords Congestion Control, SRR, RED, RIO, BLUE, SFB, SRM, PGM. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Case Study: Check

More information

VOIP Performance Over City-Wide WIFI and LTE

VOIP Performance Over City-Wide WIFI and LTE ENSC 427: COMMUNICATION NETWORKS SPRING 2014 VOIP Performance Over City-Wide WIFI and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie Chen, Yawen Yang, Tian Lin Group 5 jou@sfu.ca yca137@sfu.ca tly@sfu.ca

More information

Standalone Access Control

Standalone Access Control Standalone Access Control BELL_A BELL_B D0 D1 D_in(LED) Open (BZ) COM ALARM- Light Green Pink Red Black Green White Brown Yellow Blue Purple Orange Grey Door Bell DC 12V Power Green White Reader Red Black

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

UNIVERSITÉ DU QUÉBEC MÉMOIRE PRÉSENTÉ À L'UNIVERSITÉ DU QUÉBEC À TROIS-RIVIÈRES COMME EXIGENCE PARTIELLE DE LA MAÎTRISE EN GÉNIE ÉLECTRIQUE

UNIVERSITÉ DU QUÉBEC MÉMOIRE PRÉSENTÉ À L'UNIVERSITÉ DU QUÉBEC À TROIS-RIVIÈRES COMME EXIGENCE PARTIELLE DE LA MAÎTRISE EN GÉNIE ÉLECTRIQUE UNIVERSITÉ DU QUÉBEC MÉMOIRE PRÉSENTÉ À L'UNIVERSITÉ DU QUÉBEC À TROIS-RIVIÈRES COMME EXIGENCE PARTIELLE DE LA MAÎTRISE EN GÉNIE ÉLECTRIQUE PAR GHASSEN GADHOUM PERFORMANCE DES RÉSEAUX DE CAPTEURS SANS

More information

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12

I Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12 iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap

More information

Network Element Configuration

Network Element Configuration The following describes how to configure Flexible NetFlow and NTP servers on your ISR. Configuring a Network Element, page 1 NTP Configuration, page 1 NetFlow Configuration, page 2 Configuring a Network

More information

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER Vilma Tomço, 1 Aleksandër Xhuvani 2 Abstract: The purpose of this work is

More information

Introduction to Network Simulators

Introduction to Network Simulators Chapter 4 Introduction to Network Simulators 4.1 Contents Network Simulation Tools ns-2 OMNeT++ 4.2 Network Simulation Tools 4.3 Network Simulation Tools ns-2 Network Simulator http://nsnam.isi.edu/nsnam/index.php/main_page

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

Performance of Competing High Speed TCP Flows with Background Traffic

Performance of Competing High Speed TCP Flows with Background Traffic Performance of Competing High Speed TCP Flows with Background Traffic Master s Project Final Report Author: Siva Sagar Tella Email: stella@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu

More information

Assembly Instructions

Assembly Instructions Assembly Instructions MKG_NA_Instructions_H-line_V13_20160203 But also... for choosing Thank you, Table of Contents GREY YELLOW PINK GREEN PURPLE DARK GREEN LIGHT BLUE ORANGE BLUE Identification of the

More information

Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment

Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment Group 1 Rajdeep Bhullar - 301187037 Kamal Ezz - 301213002 Daniel Quon 301170142 http://www.sfu.ca/~rsa83/

More information

To obtain the current global trace mask, call meitraceget(...). To modify the global trace mask, call meitraceset(...).

To obtain the current global trace mask, call meitraceget(...). To modify the global trace mask, call meitraceset(...). Trace Objects Trace Objects Introduction Use the Trace module to selectively produce trace output on a global and/or per-object basis for your application. You can specify the types of trace output when

More information

REACTION PAPER 01 TEL 500

REACTION PAPER 01 TEL 500 TEL 500 Session Initiation Protocol Improvement Using Inter-Asterisk exchange Introduction: Within the VoIP network environment, H323, SIP and IAX are three protocols that solve the problem of voice packet

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while

More information

PERFORMANCE ANALYSIS OF VOIP OVER LTE NETWORK. Chor, Alexandrea (Lexi) Dai, Wei (Ellson) Zhang, Chi (Chi)

PERFORMANCE ANALYSIS OF VOIP OVER LTE NETWORK. Chor, Alexandrea (Lexi) Dai, Wei (Ellson) Zhang, Chi (Chi) PERFORMANCE ANALYSIS OF VOIP OVER LTE NETWORK 1 Chor, Alexandrea (Lexi) Dai, Wei (Ellson) Zhang, Chi (Chi) OVERVIEW Background Introduction LTE Topology LTE Module Simulation Scenarios Result Analysis

More information

UHF Reader Configuration Manual

UHF Reader Configuration Manual UHF Reader Configuration Manual STA IR0207E STA IR0507E STA IR1207E STA 4R1207E Page 1 of 13 Reader Connections STA IR0207E, STA IR0507E, STA IR1207E STA 4R1207E Page 2 of 13 DB15 pin GPIO Connector diagram

More information

Microsoft Edge Web Browser Assignment Digital Literacy

Microsoft Edge Web Browser Assignment Digital Literacy Microsoft Edge Web Browser Assignment Digital Literacy Part A--Add websites to Favorites and Reading List Add to favorites all websites that you access frequently. This makes it fast and easy to return

More information