Part 3. Result Analysis
|
|
- Janice Boone
- 6 years ago
- Views:
Transcription
1 Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1
2 Outline A Simulation and its results The Format of Trace File The AWK language Result Analysis End-to-End Delay Jitter Packet Loss Figure Output GNUplot 2
3 A Simulation: TCP and UDP TCP and UDP Queuing 1 s ~ 4.0 s ftp tcp s1 sink r d s2 null 0.1 s ~ 4.5 s cbr udp 3
4 The OTcl Script set s1 [$ns node] set s2 [$ns node] set r [$ns node] set d [$ns node] $ns duplex link $s1 $r 2Mb 10ms DropTail $ns duplex link $s2 $r 2Mb 10ms DropTail $ns duplex link $r $d 1.7Mb 20ms DropTail $ns queue limit $r $d 10 $ns duplex link op $s1 $r orient right down $ns duplex link op $s2 $r orient right up $ns duplex link op $r $d orient right $ns duplex link op $r $d queuepos 0.5 4
5 The OTcl Script set tcp [new Agent/TCP] $ns attach agent $s1 $tcp set sink [new Agent/TCPSink] $ns attach agent $d $sink $ns connect $tcp $sink $tcp set fid_ 1 set ftp [new Application/FTP] $ftp attach agent $tcp $ftp set type_ FTP 5
6 The OTcl Script set udp [new Agent/UDP] $ns attach agent $s2 $udp set null [new Agent/Null] $ns attach agent $d $null $ns connect $udp $null $udp set fid_ 2 set cbr [new Application/Traffic/CBR] $cbr attach agent $udp $cbr set type_ CBR $cbr set packet_size_ 1000 $cbr set rate_ 1mb $cbr set random_ false 6
7 The OTcl Script $ns at 0.1 "$cbr start" $ns at 1.0 "$ftp start" $ns at 4.0 "$ftp stop" $ns at 4.5 "$cbr stop" $ns at 4.5 "$ns detach agent $s1 $tcp; $ns detach agent $d $sink" $ns at 5.0 "finish" 7
8 NAM Result 8
9 Trace File cbr cbr cbr cbr r cbr cbr cbr cbr cbr r cbr cbr cbr cbr cbr r cbr cbr cbr cbr
10 Trace Format cbr Event Time From node To node Packet Type Packet Size Flags Flow ID Source address Destination address Sequence number Packet ID r: receive +: enqueue : dequeue d: drop src_node.port dest_node.port 10
11 AWK Language Designed for text analysis Similar to C but more simple Read the records line by line $0: the whole string in the corresponding line $1: the first data in the corresponding line $2: the second data in the corresponding line cbr $1 $2 $3 $4 $5 $6 $7 $8 $9 $10 $11 $12 11
12 AWK Language (Cont.) Three parts in the AWK code BEGIN Process END Process Procedure 1) Read one record 2) Update the parameters 3) Run the Pattern Code 4) Repeat until no record remain 12
13 An AWK Example AWK Code: awk.awk file BEGIN{ sum=0; } { } if($1=="+") { sum++; } END{ printf("the number of enqueue is: %d\n",sum); } 13
14 An AWK Example (Cont.) Use the awk.awk to anlyze the out.tr trace file ~$ awk -f awk.awk out.tr Output the results into sum.txt ~$ awk -f awk.awk out.tr > sum.txt 14
15 Analysis 1: End-to-End Delay Calculate the duration of a packet End to End Delay = End Time Start Time r d End Time s2 Start Time In this example, we calculate the end-to-end delay for the cbr traffic via udp transmission 15
16 Analysis 1: End-to-End Delay(Cont.) BEGIN { highest_packet_id=0; } { action = $1; time = $2; from = $3; to = $4; type = $5; pktsize = $6; flow_id = $8; src = $9; dst = $10; seq_no = $11; packet_id = $12; if ( packet_id > highest_packet_id ) highest_packet_id = packet_id; if ( start_time[packet_id] == 0 ) start_time[packet_id] = time; if ( flow_id == 2 && action!= "d" ) { if( action == "r" ) { end_time[packet_id] = time; } else { end_time[packet_id] = -1; } } } 16
17 Analysis 1: End-to-End Delay(Cont.) END { for(packet_id=0; packet_id < highest_packet_id; packet_id++) { start = start_time[packet_id]; end = end_time[packet_id]; packet_duration = end-start; if( start < end ) { printf("%f %f\n",start, packet_duration); } } } 17
18 Analysis 1: End-to-End Delay(Cont.) ~$ awk -f delay.awk out.tr > delay.txt delay.txt:
19 Analysis 2: Jitter Jitter represents the variance of delay Jitter = ( (EndTime(j)-StartTime(j)) - (EndTime(i)-StartTime(i)) ) / (j i) In this example, we calculate the jitter for the cbr traffic via udp transmission 19
20 Analysis 2: Jitter(Cont.) BEGIN { highest_packet_id=0; } { action = $1; time = $2; from = $3; to = $4; type = $5; pktsize = $6; flow_id = $8; src = $9; dst = $10; seq_no = $11; packet_id = $12; if ( packet_id > highest_packet_id ) highest_packet_id = packet_id; if ( start_time[packet_id] == 0 ) { pkt_seqno[packet_id] = seq_no; start_time[packet_id] = time; } if ( flow_id == 2 && action!= "d" ) { if( action == "r" ) { end_time[packet_id] = time; } else { end_time[packet_id] = -1; } } } 20
21 Analysis 2: Jitter(Cont.) END { last_sequno = 0; last_delay = 0; seqno_diff = 0; for(packet_id=0; packet_id < highest_packet_id; packet_id++) { start = start_time[packet_id]; end = end_time[packet_id]; packet_duration = end-start; if( start < end ) { seqno_diff = pkt_seqno[packet_id]-last_seqno; delay_diff = packet_duration - last_delay; if ( seqno_diff == 0 ) { jitter = 0; } else { jitter = delay_diff/seqno_diff; } printf("%f %f\n",start, jitter); last_seqno = pkt_seqno[packet_id]; last_delay = packet_duration; } } } 21
22 Analysis 2: Jitter(Cont.) ~$ awk jitter.awk out.tr > jitter.txt
23 Analysis 3: Packet Loss In the transmission, some of the packets may be lost due to the overflow of the queue Loss = Packets_Sent - Packets_Recieve r d End Time s2 Start Time In this example, we calculate the packet loss for the cbr traffic via udp transmission 23
24 Analysis 3: Packet Loss(Cont.) BEGIN { fsdrops = 0; numfs = 0; } { action = $1; time = $2; from = $3; to = $4; type = $5; pktsize = $6; flow_id = $8; src = $9; dst = $10; seq_no = $11; packet_id = $12; if ( from == 1 && to == 2 && action == "+" ) { numfs++; } if ( flow_id == 2 && action == "d" ) { fsdrops++; } } END{ printf("number of packets sent:%d lost:%d\n",numfs, fsdrops); } 24
25 Practice 1: Throughput To calculate the average throughput of the cbr traffic between node 2 and node 3 Average Throughput = Total Recieved Bytes / Elapsed Time Once node 3 recieve a packet, print out the real-time thoughput 25
26 Figure Output A picture paints a thousand words In a paper, figures(plots) are always the essential parts of the simulation and analysis section Tools for figure drawing Matlab Mathematica GNUplot 26
27 GNUplot Portable command-line driven graphing utility Support Linux, Windows, Mac OS... It allows scientists and students to visualize mathematical functions and data Supports many types of plots in either 2D and 3D. Installation in Ubuntu from source sudo apt-get install gnuplot 27
28 How to draw a figure Enter the GNUplot model ~$ gnuplot Draw a plot gnuplot > plot delay.txt To To denote denote the the gnuplot gnuplot model model The The command command for for drawing drawing The The file file name name 28
29 Result from the GNUplot 29
30 Commands in GNUplot (1) Set Axis Range Step Example For x axis gnuplot > set xtics -10,1,10 gnuplot > plot sin(x) Showing range gnuplot > set yrange [-2:2] gnuplot > plot sin(x) ` ` 30
31 Commands in GNUplot (2) Show grid gnuplot > set grid gnuplot > plot sin(x) 31
32 Commands in GNUplot (3) Labels title title ylabel ylabel label label arrow arrow xlabel xlabel gnuplot > set title CBR Delay gnuplot > set xlabel Simulation Time (s) gnuplot > set ylabel Delay (s) gnuplot > unset key gnuplot > set label constant delay = sec at 0.1,0.05 gnuplot > set arrow from 0.5,0.05 to 0.5,0.04 gnuplot > plot delay.txt with linespoints 32
33 Commands in GNUplot (4) points impulses Styles lines points linespoints impulses dots steps errorbars lines steps 33
34 Command in GNUplot (5) Output #set the picture format gnuplot > set terminal png #set the output file name gnuplot > set output delay.png #draw the plot gnuplot > plot delay.txt with linespoints 34
35 GPL script It is inconvenient to input commands Typos make errors We may redraw the plot for many times Solution Write the GPL script as gpl file set title "CBR Delay" set xlabel "Simulation Time (s)" set ylabel "Delay (s)" unset key set label "constant delay = sec" at 0.1,0.05 set arrow from 0.5,0.05 to 0.5,0.04 set terminal png set output "cbr_delay.png" plot "delay.txt" with linespoints Run the script in the terminal ~$ gnuplot -persist delay.gpl 35
36 Questions? Thank you!
Part 6. Confidence Interval
Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationNetwork Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.
Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to
More informationProject Network Simulation CSE 5346/4346
Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)
More informationDMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University
DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students
More informationBrief Overview and Background
Brief Overview and Background In this assignment you will be studying the performance behavior of TCP, using ns 2. At the end of this exercise, you should be able to write simple scripts in ns 2 as well
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation
More informationns-2 Tutorial Exercise (1)
ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of
More informationPART A SIMULATION EXERCISES
PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new
More informationAn Introduction to NS-2
An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:
More informationSimple Data Link Protocols
Simple Data Link Protocols Goals 1) Become familiar with Network Simulator 2 2) Simulate Stop & wait and Sliding Window 3) Investigate the effect of channel with loss on link utilization Introduction Data
More informationThe Transport Control Protocol (TCP)
TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable
More informationEE 122: Computer Networks Network Simulator ns2
EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.
More informationSimulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University
Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects
More informationLAMPIRAN. set ns [new Simulator]
LAMPIRAN set ns [new Simulator] $ns color 0 pink $ns color 1 red $ns color 2 green $ns color 3 yellow $ns color 4 brown $ns color 5 purple $ns color 6 black $ns color 7 grey $ns color 8 maroon set n0 [$ns
More informationS Quality of Service in Internet. Introduction to the Exercises Timo Viipuri
S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning
More informationPart 5. Wireless Network
Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation
More informationThe Network Simulator Fundamentals. Downloads and further info at:
ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,
More informationSimulations: ns2 simulator part I a
Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...
More informationREVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore
REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A
More informationENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012
2012 ENSC 427 Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 Gyuhan David Choi Seungjae Andy Back Calvin Chun Kwan Ho gca16@sfu.ca sjb18@sfu.ca cch8@sfu.ca 3/17/2012 Contents
More informationRouting Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI
International Conference on Computational Science and Engineering (ICCSE 2015) Routing Protocols Simulation of Wireless Self-organized Network Based on NS-2 Qian CAI School of Information Engineering,
More informationS Ns2 simulation exercise
S-38.3148 Ns2 simulation exercise Fall 2007 1 Table of contents 1. Introduction... 3 2. Theoretical background... 3 2.1. IEEE 802.11 MAC protocol... 3 2.2. Overview of TCP s congestion control... 4 2.3.
More informationCDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)
CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html
More informationLAN-WAN-LAN end-to-end Network Simulation with NS2
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp 13136-13140 Research India Publications http://wwwripublicationcom LAN-WAN-LAN end-to-end Network Simulation
More informationAnalysis and Performance Evaluation of Routing Protocols in MANETS
Analysis and Performance Evaluation of Routing Protocols in MANETS Team Effort by Ankita Mukherjee Roopashree N Department of Computer Science & Engineering, Santa Clara University Fall 2014 Preface Mobile
More informationNS-2 Tutorial. Kumar Viswanath CMPE 252a.
NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.
More informationS Ns2 simulation exercise
S-38.148 Ns2 simulation exercise 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2. Fast Retransmit...4
More informationFACULTY OF ENGINEERING
FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried
More informationWireless Networks - Preliminaries
This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators
More informationQoS in Network Simulator 2
QoS in Network Simulator 2 This experiment provides experience in how to apply and simulate QoS mechanisms in communication networks by means of NS2. We focus on RSVP in this experiment. 1. RSVP in NS2
More informationJohn Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002
QVWKHQHWZRUNVLPXODWRU,3$07XWRULDO 1HWZRUN0RGHOLQJDQG7UDIILF $QDO\VLVZLWKQV John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 a discrete event simulator simple model focused on modeling
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationModeling of data networks by example: ns-2 (I)
Modeling of data networks by example: ns-2 (I) Holger Füßler Holger Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating
More informationUSE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES
USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES Petr Berka, Petr Hujka Department of Telecommunications, Brno University of Technology, Purkynova 118, 612 00 Brno, Czech Republic, phone: +420 5 41149190,
More informationFlow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks
Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a
More informationEvaluation Strategies. Nick Feamster CS 7260 February 26, 2007
Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation
More informationns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2
ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some
More informationns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1
ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial
More informationTutorial Schedule. Introduction Ns fundamentals Ns programming internal Extending ns-2 Simulator. Sep. 25,
NS-2 Tutorial Presenter: Qing (Kenny) Shao (SFU/CNL) Author: Polly Huang (AT&T Labs Research) Padmaparna Haldar (USC/ISI) Xuan Chen (USC/ISI) Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl
More informationIntroduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities
Introduction Ns Tutorial 2002 Padmaparna Haldar (haldar@isi.edu) Xuan Chen (xuanc@isi.edu) Nov 21, 2002 1989: REAL network simulator 1995: DARPA VINT project at LBL, Xerox PARC, UCB, and USC/ISI Present:
More informationModeling of data networks by example: NS-2 (II)
Modeling of data networks by example: NS-2 (II) Holger Füßler H. Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating
More informationPart 3: Network Simulator 2
S-38.148 Simulation of data networks / fall-04 Part 3: Network Simulator 2 24.11.2004 1 NS2: Contents NS2 Introduction to NS2 simulator Background info Main concepts, basics of Tcl and Otcl NS2 simulation
More informationNetwork Simulator 2 (NS2)
Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)
More informationNetwork Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.
Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple
More information1 What is network simulation and how can it be useful?
CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET
More information1 Gnuplot. Installing and running. Plot
1 Gnuplot gnuplot is a simple and popular scripting language and program for producing plots. You may use any software you want for producing the plots in your report. Here, we introduce gnuplot because
More information[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for
References [1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). Multiple valued logic (MVL) reduction operator, its synthesis and application on network congestion. Proceeding of 7th
More informationCSE 573S Protocols for Computer Networks (Spring 2005 Final Project)
CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) To Investigate the degree of congestion control synchronization of window-based connections bottlenecked at the same link Kumar, Vikram
More informationNetwork Simulator Version 2 for VANET
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Network Simulator Version 2 for VANET Venkatatamangarao
More informationestadium Project Lab 2: Iperf Command
estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure
More informationInternational Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using.
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Efficient routing protocol for MANET using STP and BRM First
More informationReport: Simulation of ECOFRAME MAC layer in ns Bogdan Ušćumlić, Annie Gravey, Michel Morvan, and Philippe Gravey
Report: Simulation of ECOFRAME MAC layer in ns-2.31 Bogdan Ušćumlić, Annie Gravey, Michel Morvan, and Philippe Gravey May 12, 2009 Contents Introduction 1 1 The simulator 3 1.1 Caracteristics...........................
More informationGENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK
GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK A PROJECT REPORT Submitted by DIVYA P Register No: 14MCO010 in partial fulfillment for the
More informationComparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline
Comparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline Alejandro Gomez Suarez, and H. Srikanth Kamath Abstract In this paper, SFQ (Start Time Fair Queuing) algorithm is analyzed
More informationS Ns2 simulation exercise
S-38.148 Ns2 simulation exercise Table of contents 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2.
More informationStudy on Performance of simulation analysis on Multimedia Network
Study on Performance of simulation analysis on Multimedia Network Shiferaw Hermela Shimelash 1, Li Yao Hui 2,Fares Mohmmed Mehdi Hassan 3 1,2 Tianjin University of Technology and Education, School of Applied
More informationSTUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL
STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation
More informationData Graphics with Gnuplot
Data Graphics with Gnuplot Le Yan User Services HPC @ LSU 4/17/2013 1 Training Goals Produce simple interactive plots and graphs Create 2- and 3-d graphs from functions and data files Understand the automation
More informationThe simulation and emulation verification that was based on NS-2
210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer
More informationAssignment 3 Solutions 2/10/2012
INFO334 / TELE302 Assignment 3 Solutions 2/10/2012 The WAN topology to be adopted for the enterprise WAN is shown in Figure 1. Figure 1: NZAM WAN topology. 1 Task 1: Reliability Analysis (4 marks) 1. What
More informationGraphical Analysis with Gnuplot. Evangelos Pournaras, Izabela Moise
Graphical Analysis with Gnuplot Evangelos Pournaras, Izabela Moise Evangelos Pournaras, Izabela Moise 1 Outline 1. Introduction to gnuplot 2. Gnuplot in practice 3. Plot examples 4. Output and terminals
More informationDesign and Simulation Implementation of an Improved PPM Approach
I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt
More informationNS internals. Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University
NS internals Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University Software architecture Split programming model (C++ and OTcl) Simulation kernel fi
More informationPacketExpert PDF Report Details
PacketExpert PDF Report Details July 2013 GL Communications Inc. 818 West Diamond Avenue - Third Floor Gaithersburg, MD 20878 Phone: 301-670-4784 Fax: 301-670-9187 Web page: http://www.gl.com/ E-mail:
More informationIJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing
More informationTKN. Technische Universität Berlin. Circuit Switching Module for ns-2. Filip Idzikowski. Berlin, March 2009
TKN Telecommunication Networks Group Technische Universität Berlin Telecommunication Networks Group Circuit Switching Module for ns-2 Filip Idzikowski idzikowski@tkn.tu-berlin.de Berlin, March 2009 TKN
More informationTraffic Behaviour of VoIP in a Simulated Access Network
Complete Citation: Das Gupta, Jishu and Howard, Srecko and Howard, Angela (2006). Traffic behaviour of VoIP in a simulated access network. International Transactions on Engineering, Computing and Technology,
More informationComparing ad-hoc wireless to wiredwireless
TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script
More informationANALYSIS OF SMART DEVICE GAME PROTOCOL
ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien
More informationPerformance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic
Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad
More informationNSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse
NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner
More informationGnuplot Tutorial. Gnuplot is a portable command-line driven graphing utility for - Linux, - MS Windows - Mac - Many other platforms.
Gnuplot Tutorial http://www.gnuplot.info https://www.cs.hmc.edu/~vrable/gnuplot/using-gnuplot.html http://people.duke.edu/~hpgavin/gnuplot.html Gnuplot is a portable command-line driven graphing utility
More informationPerformance Analysis of TCP Variants
102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable
More informationUNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS
UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS PROJECT INDEX: PRJ 148 BY NAME: NJERU PATRICK MAGOCHI REG. NO: F17/1360/2010 SUPERVISOR: DR. G.S. ODHIAMBO EXAMINER: PROF. V.K. ODUOL Project report
More informationVisualisation Lab: gnuplot
Visualisation Lab: gnuplot Anton Gerdelan February 2, 2012 What is gnuplot? gnuplot is a tool for creating graphs and charts. gnuplot has a terminal. You can enter commands to tell gnuplot how to format
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationDropping Packets in Ubuntu Linux using tc and iptables
Dropping Packets in Ubuntu Linux using tc and... 1 Dropping Packets in Ubuntu Linux using tc and iptables By Steven Gordon on Tue, 18/01/2011-8:13pm There are two simple ways to randomly drop packets on
More informationSimulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System
Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System VM Chavan 1, MM Kuber 2 & RJ Mukhedkar 3 1&2 Department of Computer Engineering, Defence
More informationNGN Progress Report. Table of Contents
NGN Progress Report Title: Simulator Scalability Testing Prepared by: Richard Nelson Date: 08 February, 2006 Table of Contents Introduction...2 Simulators...2 Test Method...2 Simulation Model...2 CPU Utilisation...2
More informationCHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS
59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand
More informationCHAPTER 6 IMPLEMENTATION OF TRACE ANALYZER FOR NS3
135 CHAPTER 6 IMPLEMENTATION OF TRACE ANALYZER FOR NS3 This chapter presents a framework for NS3 Trace Analyzer which is implemented in java. NS3 trace analyzer reads the.tr file and automatically calculates
More informationChannabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.
Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. QMP 7.1 D/F Department of Computer Science & Engineering Network
More informationMathematical Computing
IMT2b2β Department of Mathematics University of Ruhuna A.W.L. Pubudu Thilan Graphics in Maxima Introduction Gnuplot is a comand-line oriented plot program. Maxima s plotting is based on the Gnuplot, which
More informationWIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR
UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATIONS ENGINEERING Xiang Chao WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR Master s thesis for the degree of Master of Science in Technology
More informationtrpr 2.0b1 User's Guide
trpr 2.0b1 User's Guide Trpr (TRace Plot Real-time) is a program which analyzes output from the tcpdump packet sniffing program and creates output suitable for plotting. It also specifically supports a
More informationSimulation in Cyber Security
Simulation in Cyber Security Andres Ojamaa Institute of Cybernetics, Tallinn University of Technology CS Theory Days, 25 Jan 2008, Põlva Outline Cyber Security and Simulation What is this thing called
More informationCOMPARISON OF DIFFERENT VERSIONS OF TCP IN
SONG XING COMPARISON OF DIFFERENT VERSIONS OF TCP IN 802.11 WLANS Master of Science Thesis Examiner: Yevgeni Koucheryavy Dmitri Moltchanov Examiner and topic approved by the Faculty Council of the Faculty
More informationComputational Approach to Materials Science and Engineering
Computational Approach to Materials Science and Engineering Prita Pant and M. P. Gururajan January, 2012 Copyright c 2012, Prita Pant and M P Gururajan. Permission is granted to copy, distribute and/or
More informationPerformance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2 Jyoti 1 1 M.Tech. Student, Department of ECE DCRUST, Murthal Sonipat, India 1 mltrjyt.22@gmail.com Himanshi Saini 2 2 Assistant Professor,
More informationBasic statistical operations
COSC 6397 Big Data Analytics Fundamental Analytics Edgar Gabriel Spring 2014 Basic statistical operations Calculating minimum, maximum, mean, median, standard deviation Data typically multi-dimensional
More informationEEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. I. Introduction
EEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. By Paul Muri, Carlo Pascoe, and Brian Sapp I. Introduction Research Paper: LDoS Attack in Ad-hoc Network by Y. He et al. Citation:
More informationAn Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in
More informationImplementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network
ENSC 835: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Demo School of Engineering Science
More informationAffects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss
Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in Applicable Computing University of Bedfordshire
More informationINTEGRATED DEVELOPMENT ENVIRONMENT FOR NS-2
INTEGRATED DEVELOPMENT ENVIRONMENT FOR NS-2 Research Paper: Amol Deore et al., 2012:Pp.74-78 Amol Deore, Tejas Chaphalkar, Gaurav Buche, Pratik Chandak, Rohankar, A.W and Pratibha Karmarkar Dept. of Information
More informationA Simulation study : Performance comparison of AODV and DSR
A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,
More informationCreating Plots with Gnuplot. May 18, 2017
Creating Plots with Gnuplot May 18, 2017 What is Gnuplot Gnuplot is a freely available command-line based interactive plotting program. $ gnuplot G N U P L O T Version 4.6 patchlevel 0 last modified 2012-03
More informationEmulab Tutorial. Getting Started
Page 1 of 13 Emulab Tutorial Contents! Getting Started " Logging into the Web Interface " Designing a Network Topology " Beginning the Experiment " Using your Nodes " I need root access! " My node is wedged!
More informationcs/ee 143 Fall
cs/ee 143 Fall 2018 13 4 Internetworking 4.1 W&P, P6.1 (a) 2 points. How many IP addresses need to be leased from an ISP to support a DHCP server (with L ports) that uses NAT to service N clients at the
More information