ANALYSIS OF SMART DEVICE GAME PROTOCOL

Size: px
Start display at page:

Download "ANALYSIS OF SMART DEVICE GAME PROTOCOL"

Transcription

1 ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL Mehdi Elahi Seyed Ahmari Bilal Nurhusien Team 14

2 2 Table of Contents List of Figures Abstract Introduction Background Why Mobile Games? Game Protocol TCP and UDP Implementation Simulation with NS Wireless Scenario with Domains Throughput and Delay Results and Discussion Delay Throughput Conclusion References Appendix A: Code for Wireless Scenario with Domains... 16

3 3 List of Figures Figure 1: Mobile app statistics... 5 Figure 2: Typical game server traffic over IP network Figure 3: Tank game protocol Figure 4: Algorithm flow chart for the server and client Figure 5: Tank game screen shot Figure 6: Wireless scenario with domains using CBR traffic Figure 7: UDP Transmit Delay. (Client to Server.) Figure 8: TCP Transmit Delay. (Client to Server.) Figure 9: UDP Receive Delay. (Server to Client.) Figure 10: TCP Receive Delay. (Server to Client.) Figure 11: UDP Transmit Throughput. (Client to Server.) Figure 12: TCP Transmit Throughput. (Client to Server.) Figure 13: UDP Receive Throughput. (Server to Client.) Figure 14: TCP Receive Throughput. (Server to Client.)... 14

4 4 1.0 Abstract Multiplayer online games have been used throughout the world as a form of entertainment and way of connecting with others. Many of these video games rely on game servers to authoritatively determine the source of events and exchange information with clients. Unfortunately, due to the unpredictable nature of computer networks, games suffer from packet loss, latency, and jitter. Our project consists of creating a game server in different wireless scenarios and examining the effect this type of traffic has on the client s quality of service. We ll also create networks that use hierarchical routing layouts in order to see how they affect the user s experience. 2.0 Introduction In this project, we ll simulate a tank game that s running a simple game protocol for smart mobile devices such as iphones. The server application was created using a static IP that runs on a Ubuntu Server LTS with bandwidth of 100 MBps upload and download speed. The client is an iphone 4G that runs the protocol using 3G and Wi-Fi connections. The protocol is token based and runs on pure UDP for speed. A token based protocol disregards any client network details such as IP addresses, and rather creates a token number to identify the client. This allows the client to resume a game even after disconnections; the server replies to the client only after receiving the client s token. This specifically designed protocol supports clients that are hopping through different network domains. For example, a cell phone that is moving from one cell tower to another. Even though, the protocol has worked using small test cases. Bigger scale tests are needed to confirm its reliability. By simulating the implementation in NS-2 we can create more scenarios cheaper and faster. The goal of this project is to simulate the implementation in NS-2 for variety of scenarios to identify flaws, constraints, and to find better ways that improve the system. The scale of simulation must be according to real life situations. The server and client communication passes through routers, towers, etc. so the simulation must be in an environment that takes all the network components into account. For example, people using smart devices can move with different speeds, so we must understand how the speed of the smart phone for example in a moving car will affect the overall quality of the client s experience. 3.0 Background In recent years, there has been a growing preponderance of multiplayer online games. However, when the first multiplayer online games were released, limitations in network infrastructure limited the multiplayer game experience to small Local Area Networks (LANs). With the internet revolution and increasingly higher internet speeds available, games have also evolved into high interactive, network savvy multiplayer games such as MMORPGs and RPGs. 3.1 Why Mobile Games? When small smart devices were introduced (such as 3rd generation cell phones and tablets), a new market opened for small games that attract gamers across the world. Most of the smart devices in the

5 Analysis of Smart Device Game Protocol market offer 3G speed with a higher speed achieved through Wi Wi-Fi. Fi. Since most mobile game protocols are made specifically for wireless computer networks, there is a need to study thi thiss topology in network simulations. It is important to note that there here are more than one billion smart phones in the world. The mobile game market is growing every year, and is one the biggest industries in the world. As shown in the following figure, 64% of smart phone users have download a game in the past month. As network connections improve (in terms of speed, bandwidth, etc etc.) users will naturally want more interactive and network savvy multiplayer games. Figure 1: Mobile app statistics 3.2 Game Protocol A game server is a server that ss used by game clients to play multiplayer video games. The server receives and processes each player's input. It also transmits enough data about its internal state to allow connected clients the ability to maintain their own acc accurate urate version of the game world. A simple game session is depicted in Figure 2. 5

6 Analysis of Smart Device Game Protocol Figure 2:: Typical game server traffic over IP network. Figure 3 depicts the communication between the client and server for the tank game. Figure 3: Tank game protocol. We see from the figure above, the client initiates communication with the game server. The client is assigned an SID (Session ID)) and PID (Player ID). The client sends the player position and orientation of its tank and the server sends game data containing another other player s information. Both server and client continue to communicate until the game is over. The following flow chart illustrates the algorithm used to write the server and client applications. 6

7 Analysis of Smart Device Game Protocol Figure 4: Algorithm flow chart for the server and client. Figure 5 shows a screen shot of the actual tank game. Figure 5: Tank game screen shot. 7

8 8 3.3 TCP and UDP TCP is a connection oriented protocol that guarantees reliability and ordering of packets. It requires a three way handshake to set up a connection, and it offers flow and congestion control. Conversely, UDP is not a connection oriented protocol and doesn t guarantee reliability or ordering of packets. Applications using UDP must manually break data up into datagrams and send them individually (not a stream of information). It also lacks flow and congestion control. We ll examine the effect of using TCP and UDP protocols on the user quality of experience in the results section. 4.0 Implementation 4.1 Simulation with NS-2 The simulations were carried out in NS-2 v To plot the throughput and delay graphs, we used XGRAPH for both UDP and TCP traffic types Wireless Scenario with Domains To reiterate, we wanted to simulate a game application for mobile devices using NS-2. As depicted in Figure 6, we created a network scenario consisting of wireless and wired domains. As the mobile client traversed the map, it received information from the server (via wireless towers). It also sent information to the server in the opposite direction. Wired domain Wireless Domain Figure 6: Wireless scenario with domains using CBR traffic.

9 9 In order to route packets between wireless and wired domains, we used a hierarchical routing layout. This layout was created using the following code: #Create the network layout AddrParams set domain_num_ 2; #domain numbers Lappend cluster_num 1 1; #sub-domain for both domains AddrParams set cluster_num_ $cluster_num Lappend eilastlevel 1 4; # number of nodes for each sub-domain AddrParams set nodes_num_ $eilastlevel As seen in the code above, there are two domains and zero sub-domains; four nodes are located in the wireless domain and one node in the wired domain. Essentially, the wireless towers act as gateways between the domains. Then, we assigned each node in the simulation an address to identify its position in the hierarchy. For the base station node, we used the following: #Configure the server node $ns node-config addresstype hierarchical \ -mobileip ON # hierarchical address to identify server node set temp {0.0.0}; # 0 (0 Domain), 0 (0 Subdomain), 0 (Only node) set n(0) [ $ns_ node [lindex $temp 0]] From the code above, we see that the address assigned to the server is In other words, the server is in domain zero, sub-domain zero, and is the only node in that sub-domain. Using the following code, we assigned addresses to the wireless nodes. #hierarchical address for wireless nodes set temp { } set n(1) [ $ns_ node [lindex $temp 0]] set n(2) [ $ns_ node [lindex $temp 1]] set n(4) [ $ns_ node [lindex $temp 2]]... #client node address $ns node-config wiredrouting OFF set n(3) [ $ns_ node [lindex $temp 3]] From the addresses above, we see that each wireless node is assigned to domain one, sub-domain zero, and their respective node numbers. The client and server both send and receive CBR traffic to one another. We also used FTP traffic in a different network scenario to see what benefit or disadvantage

10 Analysis of Smart Devicee Game Protocol 10 TCP offered to the user experience. The results are examined in the discussion section. It is important to note that wireless nodes have no concept of links; therefore, packets are routed in a wireless topology using adhoc routing protocols. That is to say, nodes build forwarding tables by exchanging routing queries among their neighbours. 4.2 Throughput and Delay Throughput refers to the amount data received by a node per unit time (in our case, bits/sec). (1) The throughput is determined in the record {} procedure of the source code. Periodically, the record{} procedure is called and calculates the amount of bandwidth received by a node in a given time period. Throughput is then recorded to a file where it can be viewed using XGRAPH later on. Delay was calculated by measuring packet. In other words, the elapsed time between arrival of last packet and the current. (2) 5.0 Results and Discussion 5.1 Delay The UDP and TCP TX (transmit) delay graphs are shown in Figures 7 and 8, respectively. TX graphs represent the time that takes for a packet to travel from client to server. Figure 7: UDP Transmit Delay. (Client to Server.)

11 Analysis of Smart Devicee Game Protocol 11 From Figure 7, we see that the average delay is around 200(ms). This is consistent through the simulation, but there are two major points that the delay increases dramatically. In these two points the client is moving from one tower to another, so the delay will be much higher. We now compare this graph to TCP TX graph in Figure 7. Since TCP communication protocol uses error detection and packet recovery, the graph shows a higher average delay around (300ms). Please note that in the TCP simulation, the client switched between towers faster. Figure 8: TCP Transmit Delay. (Client to Server.) Figure 9 and Figure 10 are the RX (receive) UDP and TCP graphs respectively. RX means that the packet is sent from the server to client. Figure 9: UDP Receive Delay. (Server to Client.)

12 Analysis of Smart Devicee Game Protocol 12 Figure 10: TCP Receive Delay. (Server to Client.) We can see from the previous two figures that using UDP over TCP will reduce the delay. 5.2 Throughput Throughput is another network element that we studied. The throughput graphs for all the cases are shown below the graphs we can seee that the TCP bandwidth is consistence over the simulation, but in TCP we can see a lot of oscillation, which is not very good for gaming, so the UDP would be a better choice. Figure 11: UDP Transmit Throughput. (Client to Server.)

13 Analysis of Smart Devicee Game Protocol 13 Figure 12: TCP Transmit Throughput. (Client to Server.) Figure 13: UDP Receive Throughput. (Server to Client.)

14 Analysis of Smart Devicee Game Protocol 14 Figure 14: TCP Receive Throughput. (Server to Client.) 6.0 Conclusion After analyzing the simulation results, we noticed that the packet loss was dependent on the position of the mobile node with respect to the cell towers. As a mobile node moved from one tower to another, it resulted in greater packet loss than normal. Moreover, packet delay remained relatively consistent unless the mobile node moved out of range of the towers. When using a TCP connection, there was greater delay and lag time compared to networks that used UDP. This is due to the connection oriented nature of TCP; it needs to verify that data has been delivered with accuracy. According to the results, it appears that UDP is the better choice for real-time applications (especially gaming) due to its lower lag time.

15 References [[1] Schroeder, Stan. (2011, Jul 07). Mobile Games Dominate Smartphone App Usage [Online]. Available: [2] A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental Concepts and Key Architectures, 2nd edition, McGraw -Hill, [3] M. Greis. "Marc Greis Tutorial for the UCB/LBNL/VINT Network Simulator "ns"." [Online] Available: [March 2013]. [4] Game Server searched in Wikipedia [Online]. Available: (Mar. 2013). [5] SugihJamin. "Networking Multiplayer Games" Internet: Sept.10, 2006 [Mar, 2013]. [6] John Laird. "Networking in Games" Internet: Sept [Mar, 2013]. [7] Prasana. (2011, April. 5). Sample Coding in Wireless [Online]. Available: master.blogspot.ca/2011/04/sample-coding-in-wireless.html

16 16 Appendix A: Code for Wireless Scenario with Domains #ENSC 427 (Team 14, SPRING 2013) # Wireless Scenario with Domains (using CBR traffic) # file name: wireless_domain.tcl #======================== ==================== #============== #Initialization # Define options set val(adhocrouting) DSDV set val(chan) Channel/WirelessChannel ;# channel type set val(prop) Propagation/TwoRayGround ;# radio-propagation model set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(ifq) Queue/DropTail/PriQueue ;# interface queue type set val(ll) LL ;# link layer type set val(ant) Antenna/OmniAntenna ;# antenna model set val(ifqlen) 50 ;# max packet in ifq set val(nn) 5 ;# number of mobilenodes set val(x) 1000 ;# X dimension of topography set val(y) 1000 ;# Y dimension of topography set val(stop) 150 ;# time of simulation end set ns [new Simulator] set tracefd [open wireless_domain.tr w] set namtrace [open wireless_domain.nam w] #============== #============== #Open the output files and create trace set f0 [open bw_tx.tr w] set f1 [open bw_rx.tr w] set f2 [open delay_tx.tr w] set f3 [open delay_rx.tr w] $ns trace-all $tracefd $ns namtrace-all-wireless $namtrace $val(x) $val(y) #============== #============== # set up topography object set topo [new Topography] $topo load_flatgrid $val(x) $val(y) create-god $val(nn)

17 17 #============== #============== #Create the network layout AddrParams set domain_num_ 2;#domain numbers lappend cluster_num 1 1;#sub-domain for each domain AddrParams set cluster_num_ $cluster_num lappend eilastlevel 1 4;#node number for each sub-domain AddrParams set nodes_num_ $eilastlevel #============== #============== #Configure the server node $ns node-config -addresstype hierarchical \ -mobileip ON set temp {0.0.0} set n(0) [$ns node [lindex $temp 0]] #Configure tower nodes $ns node-config -adhocrouting $val(adhocrouting) \ -lltype $val(ll) \ -mactype $val(mac) \ -ifqtype $val(ifq) \ -ifqlen $val(ifqlen) \ -anttype $val(ant) \ -proptype $val(prop) \ -phytype $val(netif) \ -channeltype $val(chan) \ -topoinstance $topo \ -wiredrouting ON \ -agenttrace ON \ -routertrace ON \ -mactrace ON \ -movementtrace ON \ -mobileip ON set temp { };#towers network id

18 18 set n(1) [$ns node [lindex $temp 0]] set n(2) [$ns node [lindex $temp 1]] set n(4) [$ns node [lindex $temp 2]] $n(1) random-motion 0 $n(2) random-motion 0 $n(4) random-motion 0 #Configure mobile node $ns node-config -wiredrouting OFF set n(3) [$ns node [lindex $temp 3]] #$n(3) base-station [AddrParams addr2id [$n(0) node-addr]] [$n(3) set regagent_] set home_agent_ [AddrParams addr2id [$n(1) node-addr]] #hop tower to tower #============== #============== #Create Wired links $ns duplex-link $n(4) $n(0) 1Mb 150ms DropTail $ns duplex-link $n(1) $n(0) 1Mb 150ms DropTail $ns duplex-link $n(2) $n(0) 1Mb 150ms DropTail #Change graphic $ns color 1 blue $ns color 2 red $ns duplex-link-op $n(0) $n(4) orient down $ns duplex-link-op $n(0) $n(1) orient left-down $ns duplex-link-op $n(0) $n(2) orient right-down $n(0) shape box $n(0) color red $n(0) label Server $n(1) label Tower $n(2) label Tower $n(4) label Tower $n(3) label Client #============== #============== #Initial locations $n(0) set X_ $n(0) set Y_ $n(0) set Z_ 0.0 $n(1) set X_ $n(1) set Y_ $n(1) set Z_ 0.0

19 19 $n(2) set X_ $n(2) set Y_ $n(2) set Z_ 0.0 $n(4) set X_ $n(4) set Y_ $n(4) set Z_ 0.0 $n(3) set X_ 0.0 $n(3) set Y_ $n(3) set Z_ 0.0 #============== #============== #Needed Procs #Record Function set xbw0 0 set xtime set xbw2 0 set xtime proc record {} { global sink sink2 f0 f1 f2 f3 xbw0 xbw2 xtime xtime2 #f1 f2 #Get an instance of the simulator set ns [Simulator instance] #Set the time after which the procedure should be called again set time 0.08 #How many bytes have been received by the traffic sinks? set bw0 [$sink(3) set bytes_] set bw2 [$sink2(3) set bytes_] #Get the current time set now [$ns now] #Calculate the bandwidth (in MBit/s) and write it to the files puts $f0 "$now [expr $bw0/$time*8/ ]";#tx puts $f1 "$now [expr $bw2/$time*8/ ]";#rx #Calculate Delay for tx set xtime [expr $xtime+$time]; if { $bw0 > [expr 0] } { puts $f2 "$now $xtime" set xtime 0.0 } set xbw0 $bw0 #Calculate Delay for rx [expr $xbw2 * 2] set xtime2 [expr $xtime2+$time] if { $bw2 > [expr 0] } {

20 20 puts $f3 "$now $xtime2" set xtime2 0.0 } set xbw2 $bw2 #Reset the bytes_ values on the traffic sinks $sink(3) set bytes_ 0 $sink2(3) set bytes_ 0 #Re-schedule the procedure $ns at [expr $now+$time] "record" } #Create Traffic Function proc create_traffic_tx { node_num } { global ns n sink set udp($node_num) [new Agent/UDP] #set sink($node_num) [new Agent/LossMonitor] $ns attach-agent $n($node_num) $udp($node_num) $ns attach-agent $n(0) $sink($node_num) $ns connect $udp($node_num) $sink($node_num) #set ftp1 [new Application/FTP] set cbr($node_num) [new Application/Traffic/CBR] $cbr($node_num) set packetsize_ 1500 $cbr($node_num) set interval_ 0.2 $cbr($node_num) attach-agent $udp($node_num) $udp($node_num) set class_ 1 $cbr($node_num) set class_ 1 return $cbr($node_num) #$ns at 1.0 "$cbr start" } proc create_traffic_rx { node_num } { global ns n sink2 # Set a TCP connection between n(1) and n(3) set udp2($node_num) [new Agent/UDP] #set sink2($node_num) [new Agent/LossMonitor] $ns attach-agent $n(0) $udp2($node_num) $ns attach-agent $n($node_num) $sink2($node_num) $ns connect $udp2($node_num) $sink2($node_num) set cbr2($node_num) [new Application/Traffic/CBR] $cbr2($node_num) set packetsize_ 1500 $cbr2($node_num) set interval_ 0.2 $cbr2($node_num) attach-agent $udp2($node_num) $udp2($node_num) set class_ 2 $cbr2($node_num) set class_ 2 return $cbr2($node_num) #$ns at 1.0 "$cbr2 start"

21 21 } #============== #============== #Setup traffic sources set sink(3) [new Agent/LossMonitor] set sink2(3) [new Agent/LossMonitor] set source0 [create_traffic_tx 3] set source1 [create_traffic_rx 3] #============== #============== #Simulation data $ns at 0.02 "$source0 start" $ns at 0.02 "$source1 start" $ns at 0.01 "record" $ns at 0.02 "$n(3) setdest " #============== #============== #Finalization #Initial node size for {set i 0} {$i < $val(nn)} { incr i } { $ns initial_node_pos $n($i) 10 } #Telling nodes when the simulation ends for {set i 0} {$i < $val(nn) } { incr i } { $ns at $val(stop) "$n($i) reset"; } # ending nam and the simulation $ns at $val(stop) "$ns nam-end-wireless $val(stop)" $ns at $val(stop) "stop" $ns at "puts \"end simulation\" ; $ns halt" proc stop {} { global ns tracefd namtrace global f0 f1 f2 f3 #f2 #Close the output files close $f0 close $f1 close $f2 close $f3 #close $f2 $ns flush-trace close $tracefd close $namtrace exec nam wireless_domain.nam & }$ns run

Comparing ad-hoc wireless to wiredwireless

Comparing ad-hoc wireless to wiredwireless TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script

More information

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore. Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple

More information

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.

More information

Part 5. Wireless Network

Part 5. Wireless Network Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation

More information

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Ns-2 Laboratory Prof. Chansu Yu http://academic.csuohio.edu/yuc/ In-Class Lab: Mobile IP 5 nodes 2 wired nodes, W(0) and W(1) 2 mobile agents, HA and FA A

More information

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A

More information

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2) CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html

More information

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7 www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...

More information

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT VoIP Performance of City-Wide Wi-Fi and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie 301144355 Yang, Tian Lin 301107652

More information

Network Simulator 2 (NS2)

Network Simulator 2 (NS2) Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)

More information

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried

More information

Analysis and Performance Evaluation of Routing Protocols in MANETS

Analysis and Performance Evaluation of Routing Protocols in MANETS Analysis and Performance Evaluation of Routing Protocols in MANETS Team Effort by Ankita Mukherjee Roopashree N Department of Computer Science & Engineering, Santa Clara University Fall 2014 Preface Mobile

More information

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012 2012 ENSC 427 Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 Gyuhan David Choi Seungjae Andy Back Calvin Chun Kwan Ho gca16@sfu.ca sjb18@sfu.ca cch8@sfu.ca 3/17/2012 Contents

More information

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session ii ABSTRACT An opportunistic network application is a scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register

More information

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye TCP over Ad Hoc Networks : NS-2 Simulation Analysis Ren Mao, Haobing Wang, Li Li, Fei Ye Chapter 1 Introduction This report is for simulation of TCP transimition in Ad-hoc networks.to begin with,we have

More information

Tcl script 2

Tcl script 2 Ns : 5... 1 5...nam ns 6... ns 6... nam 1.1 1.2 1.3 7... Tcl script 2 8... 9... 10... 2.1 2.2 2.3 12... 3 13... ( ) 14... 16... 17... 3.1 3.2 3.3 3.4 18... 4 18... 20... 4.1 4.2 22... Xgraph 5 22... 5.1

More information

ns-2 Tutorial Exercise (1)

ns-2 Tutorial Exercise (1) ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of

More information

Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment

Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment Group 1 Rajdeep Bhullar - 301187037 Kamal Ezz - 301213002 Daniel Quon 301170142 http://www.sfu.ca/~rsa83/

More information

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol Available online at www.scholarsresearchlibrary.com European Journal of Applied Engineering and Scientific Research, 2012, 1 (4):207-215 (http://scholarsresearchlibrary.com/archive.html) ISSN: 2278 0041

More information

Performance Analysis of Routing Protocols

Performance Analysis of Routing Protocols IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 5 (May. 2018), VI PP 69-77 www.iosrjen.org Performance Analysis of Routing Protocols N Dinesh Kumar 1, V.S

More information

arxiv: v2 [cs.ni] 26 Jul 2010

arxiv: v2 [cs.ni] 26 Jul 2010 arxiv:1007.4065v2 [cs.ni] 26 Jul 2010 A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2) Mubashir Husain Rehmani, Sidney Doria, and Mustapha

More information

Wireless Networks - Preliminaries

Wireless Networks - Preliminaries This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation

More information

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Master s Thesis Electrical Engineering September 2014 Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Jani Saida Shaik School of Computing Blekinge Institute of Technology

More information

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks D. Kiranmayi Department of CSE, Vignan s Institute Of IT, Visakhapatnam, India ABSTRACT:There are many routing protocols that which can

More information

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro. Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

Performance Analysis of WLAN MAC algorithms

Performance Analysis of WLAN MAC algorithms MEE10:91 Performance Analysis of WLAN MAC algorithms Author: Ramaz Samhan Amer Khoulani Supervisor: Dr. Jorgen Nordberg A Thesis Presented in partial fulfillment of the requirements for the degree of Master

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Pushpender Sarao Hyderabad Institute of Technology and Management, Hyderabad-1401, India Email: drpushpendersarao@gmail Abstract

More information

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of IT, Sri Sai Aditya Institute of Science And Technology, Surampalem,

More information

An Introduction to NS-2

An Introduction to NS-2 An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:

More information

The Transport Control Protocol (TCP)

The Transport Control Protocol (TCP) TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable

More information

Project report Cross-layer approach in mobile as hoc routing by

Project report Cross-layer approach in mobile as hoc routing by Project report Cross-layer approach in mobile as hoc routing by Alexandre Boursier boursier@kom.aau.dk Stéphane Dahlen sdahlen@kom.aau.dk Julien Marie-Françoise mariefra@kom.aau.dk Thior Santander Marin

More information

Simulations: ns2 simulator part I a

Simulations: ns2 simulator part I a Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...

More information

QoS in Network Simulator 2

QoS in Network Simulator 2 QoS in Network Simulator 2 This experiment provides experience in how to apply and simulate QoS mechanisms in communication networks by means of NS2. We focus on RSVP in this experiment. 1. RSVP in NS2

More information

The Network Simulator Fundamentals. Downloads and further info at:

The Network Simulator Fundamentals. Downloads and further info at: ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,

More information

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Bachelor of Technology In Computer Science

More information

EE 122: Computer Networks Network Simulator ns2

EE 122: Computer Networks Network Simulator ns2 EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.

More information

Part 6. Confidence Interval

Part 6. Confidence Interval Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit

More information

NS-2 Tutorial. Kumar Viswanath CMPE 252a.

NS-2 Tutorial. Kumar Viswanath CMPE 252a. NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.

More information

WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR

WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATIONS ENGINEERING Xiang Chao WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR Master s thesis for the degree of Master of Science in Technology

More information

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students

More information

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning

More information

ENSC 894 SPECIAL TOPICS II: Communication Networks. Final Project Presentation. Spring 2017

ENSC 894 SPECIAL TOPICS II: Communication Networks. Final Project Presentation. Spring 2017 ENSC 894 SPECIAL TOPICS II: Communication Networks Final Project Presentation Spring 2017 Performance Analysis of Wi-Fi using ns-2 Web page: http://www.sfu.ca/~csa96/894 Team 5 CHARANJOT SINGH (301295964)

More information

COMPARISON OF DIFFERENT VERSIONS OF TCP IN

COMPARISON OF DIFFERENT VERSIONS OF TCP IN SONG XING COMPARISON OF DIFFERENT VERSIONS OF TCP IN 802.11 WLANS Master of Science Thesis Examiner: Yevgeni Koucheryavy Dmitri Moltchanov Examiner and topic approved by the Faculty Council of the Faculty

More information

Simple Data Link Protocols

Simple Data Link Protocols Simple Data Link Protocols Goals 1) Become familiar with Network Simulator 2 2) Simulate Stop & wait and Sliding Window 3) Investigate the effect of channel with loss on link utilization Introduction Data

More information

LAN-WAN-LAN end-to-end Network Simulation with NS2

LAN-WAN-LAN end-to-end Network Simulation with NS2 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp 13136-13140 Research India Publications http://wwwripublicationcom LAN-WAN-LAN end-to-end Network Simulation

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

Modeling of data networks by example: ns-2 (I)

Modeling of data networks by example: ns-2 (I) Modeling of data networks by example: ns-2 (I) Holger Füßler Holger Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

A Case Based Study to Identify Malicious Node in Packet Routing

A Case Based Study to Identify Malicious Node in Packet Routing A Case Based Study to Identify Malicious Node in Packet Routing Suhasini Sodagudi #1, Dr.Rajasekhara Rao Kurra *2 # Associate Professor, Department of Information Technology, VRSiddhartha Engineering College

More information

PESIT Bangalore South Campus. Department OF Information Science & Engineering

PESIT Bangalore South Campus. Department OF Information Science & Engineering PESIT Bangalore South Campus 1Km before Electronic City, Hosur Road, Bangalore-560100. Department OF Information Science & Engineering COMPUTER NETWORK LABORATORY 15CSL57 Lab Manual 2017-18 Introduction

More information

Brief Overview and Background

Brief Overview and Background Brief Overview and Background In this assignment you will be studying the performance behavior of TCP, using ns 2. At the end of this exercise, you should be able to write simple scripts in ns 2 as well

More information

LAMPIRAN. set ns [new Simulator]

LAMPIRAN. set ns [new Simulator] LAMPIRAN set ns [new Simulator] $ns color 0 pink $ns color 1 red $ns color 2 green $ns color 3 yellow $ns color 4 brown $ns color 5 purple $ns color 6 black $ns color 7 grey $ns color 8 maroon set n0 [$ns

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

VOIP Performance Over City-Wide WIFI and LTE

VOIP Performance Over City-Wide WIFI and LTE ENSC 427: COMMUNICATION NETWORKS SPRING 2014 VOIP Performance Over City-Wide WIFI and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie Chen, Yawen Yang, Tian Lin Group 5 jou@sfu.ca yca137@sfu.ca tly@sfu.ca

More information

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.3148 Ns2 simulation exercise Fall 2007 1 Table of contents 1. Introduction... 3 2. Theoretical background... 3 2.1. IEEE 802.11 MAC protocol... 3 2.2. Overview of TCP s congestion control... 4 2.3.

More information

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner

More information

MANET With ADMEN SIMULATION

MANET With ADMEN SIMULATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Channabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.

Channabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka. Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. QMP 7.1 D/F Department of Computer Science & Engineering Network

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

EFFICIENT ROUTING AND FALSE NODE DETECTION IN MANET

EFFICIENT ROUTING AND FALSE NODE DETECTION IN MANET International Conference on Information Engineering, Management and Security [ICIEMS] 27 International Conference on Information Engineering, Management and Security 2015 [ICIEMS 2015] ISBN 978-81-929742-7-9

More information

Lecture 2: Internet Structure

Lecture 2: Internet Structure Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,

More information

ENSC 427: COMMUNICATION NETWORKS SPRING Project: Final Project Report

ENSC 427: COMMUNICATION NETWORKS SPRING Project: Final Project Report ENSC 427: COMMUNICATION NETWORKS SPRING 2016 Project: Final Project Report Performance Analysis of Video Streaming over LTE using Riverbed Modeler TEAM NUMBER: 2 NAME STUDENT NUMBER SFU-ID Amer, Zargham

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization

An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization Sayid Mohamed Abdule 1, Wan Tat Chee 1, Ahmed Mustafa 2 & Aisha Hassan 2 1 Network Research

More information

SIMULATING SENSOR NETWORKS IN NS-2

SIMULATING SENSOR NETWORKS IN NS-2 1 SIMULATING SENSOR NETWORKS IN NS-2 Ian Downard Naval Research Laboratory Code 5523 4555 Overlook Ave Washington DC, 20375-5337 downard@itd.nrl.navy.mil Abstract Optimizing sensor networks involves addressing

More information

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Internet Architecture & Performance. What s the Internet: nuts and bolts view Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,

More information

Computer Communication Networks

Computer Communication Networks Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless

More information

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network ENSC 85: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Presentation School of Engineering

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project)

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) To Investigate the degree of congestion control synchronization of window-based connections bottlenecked at the same link Kumar, Vikram

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for

[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for References [1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). Multiple valued logic (MVL) reduction operator, its synthesis and application on network congestion. Proceeding of 7th

More information

Assessment Of Throughput Performance Under NS2 In Mobile Ad Hoc Networks (MANETs)

Assessment Of Throughput Performance Under NS2 In Mobile Ad Hoc Networks (MANETs) Assessment Of Throughput Performance Under NS2 In Mobile Ad Hoc Networks (MANETs) Liliana Enciso Quispe Department Computer Sience and Electronics Technical University of Loja San Cayetano Alto, Loja,

More information

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network ENSC 835: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Demo School of Engineering Science

More information

AA-RP COMMUNICATION METHOD FOR UNDERWATER WIRELESS SENSOR NETWORK M. Prakash, E. Jagan, B. Vignesh, S. Yuvaprabhu

AA-RP COMMUNICATION METHOD FOR UNDERWATER WIRELESS SENSOR NETWORK M. Prakash, E. Jagan, B. Vignesh, S. Yuvaprabhu Volume 119 No. 10 2018, 1753-1758 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Abstract AA-RP COMMUNICATION METHOD FOR UNDERWATER WIRELESS SENSOR

More information

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

CS321: Computer Networks Introduction to Computer Networks and Internet

CS321: Computer Networks Introduction to Computer Networks and Internet CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming in WSNs

Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming in WSNs 3376 Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming in WSNs Koffka Khan Department of Computing and Information Technology The University of the West Indies, Trinidad and

More information

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

ENSC 427: Communication Networks Final Project Presentation

ENSC 427: Communication Networks Final Project Presentation ENSC 427: Communication Networks Final Project Presentation Performance Evaluation of Gaming Traffic Over WiMAX Group 3: Kelvin Ho Titus Cheung Glen Nogayev Roadmap Introduction WiMAX Fundamentals Related

More information

Computer Networks 2012/2013. Introduction part 1 (01) Dr. Tanir Ozcelebi. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S.

Computer Networks 2012/2013. Introduction part 1 (01) Dr. Tanir Ozcelebi. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S. Computer Networks 2012/20 Introduction part 1 (01) Dr. Thanks to A. Leon-Garcia & I. Widjaja, & I. Radovanovic & A. S. Tanenbaum System Architecture and Networking Group Outline What is the Internet? Why

More information

1 What is network simulation and how can it be useful?

1 What is network simulation and how can it be useful? CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

Part 3. Result Analysis

Part 3. Result Analysis Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1 Outline A Simulation and its results The Format of Trace File The AWK language

More information

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES Petr Berka, Petr Hujka Department of Telecommunications, Brno University of Technology, Purkynova 118, 612 00 Brno, Czech Republic, phone: +420 5 41149190,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview

More information