PART A SIMULATION EXERCISES
|
|
- Magnus Cain
- 6 years ago
- Views:
Transcription
1 PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new Simulator ] set trf [ open 1.tr w ] trace-all $trf set namf [ open 1.nam w ] namtrace-all $namf # The below code is used to create the nodes. set n0 [ node] set n1 [ node] set n2 [ node] #This is used to give color to the flow of packets. color 1 "red" color 2 "green" $n0 label "Source/udp0" $n1 label "Source/udp1" $n2 label destination #providing the link duplex-link $n0 duplex-link $n1 $n2 10Kb 100ms DropTail $n2 5Mb 200ms DropTail # set the queue size b/w the nodes set queue-limit $n0 $n2 10 set cbr1 [new Application/Traffic/CBR] $cbr1 attach-agent $udp1 #The below code sets the udp0 packets to red and udp1 packets to blue color $udp0 set class_ 1 $udp1 set class_ 2 #The below code is used to connect the agents. connect $udp0 $null3 VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 1 of 17
2 connect $udp1 $null3 #The below code is used to set the packet size to 500 $cbr1 set packetsize_ 500Mb #The below code is used to set the interval of the packets, $cbr1 set interval_ proc finish { { global ns namf trf flush-trace exec nam 1.nam & close $trf close $namf exit 0 at 0.1 "$cbr0 start" at 0.1 "$cbr1 start" at 10.0 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 2 of 17
3 2. Simulate a four node point-to-point network with the links connected as follows: n0-n2, nl-n2 and n2-n3. Apply TCP agent between no-n3 and UDP between nl-n3. Apply relevant applications over TCP and UDP agents changing the parameter and determine the number of packets sent by TCP/UDP. set ns [new Simulator] set trf [open 2.tr w] trace-all $trf set namf [open 2.nam w] namtrace-all $namf #to create nodes set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] # The below code is used to set the color and name's to the #nodes. color 1 "red" color 2 "green" $n0 label "source1" $n1 label "source2" $n2 label "Router" $n3 label "destination" duplex-link $n0 duplex-link $n1 duplex-link $n2 $n2 10Mb 10ms DropTail $n2 10Kb 100ms DropTail $n3 100Mb 1ms DropTail # The below code is used assign TCP and UDP agents and traffic set tcp0 [new Agent/TCP] attach-agent $n0 $tcp0 set ftp0 [new Application/FTP] $ftp0 attach-agent $tcp0 set sink3 [new Agent/TCPSink] attach-agent $n3 $sink3 set udp1 [new Agent/UDP] attach-agent $n1 $udp1 set nul3 [new Agent/Null] attach-agent $n3 $nul3 #The below code is used to set the packet size of ftp and #udp. VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 3 of 17
4 $ftp0 set packetsize_ 200 $ftp0 set interval_ 0.01 $cbr1 set packetsize_ 300 $cbr1 set interval_ #This code is used give color for links $tcp0 set class_ 1 $udp1 set class_ 2 #connect the agents connect $tcp0 connect $udp1 $sink3 $nul3 proc finish { { global ns naf trf flush-trace exec nam 2.nam & close $naf close $trf exit 0 at 0.1 "$cbr1 start" at 0.3 "$ftp0 start" at 10.0 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 4 of 17
5 3. Simulate the different types of Internet traffic such as FTP and TELNET over a network and analyze the throughput. set ns [new Simulator] set trf [open 3.tr w] trace-all $trf set naf [open 3.nam w] namtrace-all $naf set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] $n0 label "Source/FTP" $n1 label "Source/Telnet" $n3 label "Destination/FTP/Telnet" color 1 "red" color 2 "green" duplex-link $n0 $n2 5Mb 10ms DropTail duplex-link $n1 $n2 10Mb 10ms DropTail duplex-link $n2 $n3 15Mb 10ms DropTail set tcp0 [new Agent/TCP] attach-agent $n0 $tcp0 set ftp0 [new Application/FTP] $ftp0 attach-agent $tcp0 set sink3 [new Agent/TCPSink] attach-agent $n3 $sink3 set tcp1 [new Agent/TCP] attach-agent $n1 $tcp1 set telnet1 [new Application/Telnet] $telnet1 attach-agent $tcp1 set sink3 [new Agent/TCPSink] attach-agent $n3 $sink3 $telnet1 set packetsize_ 500Mb $telnet1 set interval_ #The below code is used to connect the tcp agents & sink. connect $tcp0 $sink3 connect $tcp1 $sink3 #The below code is used to assign color to packets. $tcp0 set class_ 1 VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 5 of 17
6 $tcp1 set class_ 2 proc finish { { global ns naf trf exec nam 3.nam & close $naf close $trf exit 0 at 0.3 "$ftp0 start" at 0.3 "$telnet1 start" at 10 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 6 of 17
7 4. Simulate the transmission of ping messages over a network topology consisting of 6 nodes and find the number of packets dropped due to congestion. set ns [new Simulator] set trf [open 4.tr w] trace-all $trf set naf [open 4.nam w] namtrace-all $naf set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] set n4 [ node] set n5 [ node] set n6 [ node] $n0 label "Ping0" $n3 label "Ping3" $n4 label "Ping4" $n6 label "Ping6" $n2 label "Router" color 1 "red" color 2 "blue" duplex-link $n0 $n2 10Mb 30ms DoopTal duplex-link $n5 $n2 10Mb 30ms DoopTal duplex-link $n2 $n6 5Mb 50ms DropTail duplex-link $n3 $n2 10Kb 40ms DropTail duplex-link $n1 $n4 100Mb 100ms DropTail # connect the ping agents set ping0 [new Agent/Ping] attach-agent $n0 $ping0 set ping3 [new Agent/Ping] attach-agent $n3 $ping3 set ping4 [new Agent/Ping] attach-agent $n4 $ping4 set ping5 [new Agent/Ping] attach-agent $n6 $ping6 VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 7 of 17
8 $ping0 set packetsize_ 500 $ping0 set interval_ $ping4 set packetsize_ 500 $ping4 set interval_ $ping0 set class_ 1 $ping4 set class_ 2 connect $ping0 connect $ping4 $ping3 $ping5 #The below function is executed when the ping agent receives #a reply from the destination Agent/Ping instproc recv {from rtt { $self instvar node_ puts " The node [$node_ id] received an reply from $from with round trip time of $rtt" proc finish { { global ns naf trf exec nam 4.nam & flush-trace close $trf close $naf exit 0 # to start sending the ping packets at 0.1 "$ping0 send" at 0.2 "$ping0 send" at 0.3 "$ping0 send" at 0.4 "$ping0 send" at 0.5 "$ping0 send" at 0.6 "$ping0 send" at 0.7 "$ping0 send" at 0.8 "$ping0 send" at 0.9 "$ping0 send" at 1.0 "$ping0 send" at 0.1 "$ping4 send" at 0.2 "$ping4 send" at 0.3 "$ping4 send" at 0.4 "$ping4 send" at 0.5 "$ping4 send" at 0.6 "$ping4 send" at 0.7 "$ping4 send" VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 8 of 17
9 at 0.8 "$ping4 send" at 0.9 "$ping4 send" at 1.0 "$ping4 send" at 6.0 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 9 of 17
10 5. Simulate an Ethernet LAN using n nodes (6-10), change error rate and data rate and compare throughput. set ns [new Simulator] set trf [open 5.tr w] trace-all $trf set naf [open 5.nam w] namtrace-all $naf set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] set n4 [ node] set n5 [ node] set n6 [ node] $n1 label "Source" $n2 label "Error Node" $n5 label "Destination" #The below code is used to create a two Lans (Lan1 and #Lan2). make-lan "$n0 $n1 $n2 $n3" 10Mb 10ms LL Queue/DropTail Mac/802_3 make-lan "$n4 $n5 $n6" 10Mb 10ms LL Queue/DropTail Mac/802_3 # connect node n2 and n6 duplex-link $n2 $n6 10Mb 100ms DropTail set udp0 [new Agent/UDP] attach-agent $n1 $udp0 set cbr0 [ new Application/Traffic/CBR] $cbr0 attach-agent $udp0 set null5 [new Agent/Null] attach-agent $n5 $null5 connect $udp0 $null5 $cbr0 set packetsize_ 100 $cbr0 set interval_ $udp0 set class_ 1 # The below code is used to add an error model between the nodes n2 and n6. set err [new ErrorModel] lossmodel $err $n2 $n6 #inserting the error rate VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 10 of 17
11 $err set rate_ 0.1 proc finish { { global nf ns tf exec nam 5.nam & close $naf close $trf exit 0 at 6.0 "finish" at 0.1 "$cbr0 start" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 11 of 17
12 6. Simulate an Ethernet LAN using n nodes and set multiple traffic nodes and determine collision across different nodes. set ns [new Simulator] set trf [open 6.tr w] trace-all $trf set naf [open 6.nam w] namtrace-all $naf #to create nodes set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] set n4 [ node] set n5 [ node] make-lan -trace on "$n0 $n1 $n2 $n3 $n4 $n5 10Mb 100ms Queue/DropTail Mac/802_3 set tcp0 [new Agent/TCP] attach-agent $n0 $tcp0 set ftp0 [new Application/FTP] $ftp0 attach-agent $tcp0 set sink2 [new Agent/TCPSink] attach-agent $n2 $sink2 connect $tcp0 $sink2 set udp1 [new Agent/UDP] attach-agent $n4 $udp1 set cbr1 [new Application/Traffic/CBR] $cbr1 attach-agent $udp1 set null [new Agent/Null] attach-agent $n5 $null connect $udp1 $null set tcp1 [new Agent/TCP] attach-agent $n1 $tcp1 set ftp1 [new Application/FTP] $ftp1 attach-agent $tcp1 set sink3 [new Agent/Null] attach-agent $n3 $sink3 connect $tcp1 $sink3 $ftp0 set interval_ $cbr1 set interval_ $ftp1 set interval_ VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 12 of 17
13 proc finish { { global ns naf trf flush-trace exec nam 6.nam & close $trf close $naf exit 0 at 0.1 "$cbr1 start" at 0.2 "$ftp1 start" at 0.3 "$ftp0 start" at 6.0 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 13 of 17
14 7. Simulate an Ethernet LAN using n nodes and set multiple traffic nodes and plot congestion window for different source and destination. set ns [new Simulator] set trf [open 7.tr w] trace-all $trf set naf [open 7.nam w] namtrace-all $naf set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] set n4 [ node] make-lan "$n0 $n1 $n2 $n3 $n4" 10mb 10ms LL Queue/DropTail Mac/802_3 set tcp0 [new Agent/TCP] attach-agent $n0 $tcp0 set ftp0 [new Application/FTP] $ftp0 attach-agent $tcp0 set sink2 [new Agent/TCPSink] attach-agent $n2 $sink2 connect $tcp0 $sink2 set tcp3 [new Agent/TCP] attach-agent $n3 $tcp3 set ftp3 [new Application/FTP] $ftp3 attach-agent $tcp3 set sink3 [new Agent/TCPSink] attach-agent $n4 $sink3 connect $tcp3 $sink3 #To build the congestion window set f1 [open f1.tr w] $tcp0 attach $f1 $tcp0 trace cwnd_ set f2 [open f2.tr w] $tcp3 attach $f2 $tcp3 trace cwnd_ VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 14 of 17
15 proc finish { { global naf trf ns flush-trace exec nam 7.nam & close $naf close $trf exit 0 at 0.1 "$ftp0 start" at 1.5 "$ftp0 stop" at 2 "$ftp0 start" at 3 "$ftp0 stop" at 0.2 "$ftp3 start" at 2 "$ftp3 stop" at 2.0 "$ftp0 start" at 4.0 "$ftp3 stop" at 10.0 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 15 of 17
16 8. Simulate simple ESS and with transmitting nodes in wire-less LAN by simulation and determine the performance with respect to transmission of packets. set ns [new Simulator] set trf [open 8.tr w] trace-all $trf set topo [new Topography] $topo load_flatgrid set naf [open 8.nam w] #to specify the node topology namtrace-all-wireless $naf node-config -adhocrouting DSDV \ -lltype LL \ -mactype Mac/802_11 \ -ifqtype Queue/DropTail \ -ifqlen 20 \ -phytype Phy/WirelessPhy \ -channeltype Channel/WirelessChannel \ -proptype Propagation/TwoRayGround \ -anttype Antenna/OmniAntenna \ -topoinstance $topo \ -agenttrace ON \ -routertrace ON create-god 3 set n0 [ node] set n1 [ node] set n2 [ node] set n3 [ node] $n0 label "tcp0" $n1 label "sink1/tcp1" $n2 label "tcp1 $n3 label $sink2/tcp2" #The below code is used to give the initial node positions. $n0 set X_ 70 $n0 set Y_ 70 $n0 set Z_ 0 $n1 set X_ 120 $n1 set Y_ 120 $n1 set Z_ 0 VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 16 of 17
17 $n2 set X_ 500 $n2 set Y_ 500 $n2 set Z_ 0 at 0.3 "$n0 setdest at 0.3 "$n1 setdest " at 0.3 "$n2 setdest " set tcp0 [new Agent/TCP] attach-agent $n0 $tcp0 set ftp0 [new Application/FTP] $ftp0 attach-agent $tcp0 set sink1 [new Agent/TCPSink] attach-agent $n1 $sink1 connect $tcp0 $sink1 set tcp1 [new Agent/TCP] attach-agent $n2 $tcp1 set ftp1 [new Application/FTP] $ftp1 attach-agent $tcp1 set sink2 [new Agent/TCPSink] attach-agent $n3 $sink2 connect $tcp1 $sink2 at 5 "$ftp0 start" at 10 "$ftp1 start" #The below code is used to provide the node movements. at 120 "$n2 setdest " proc finish { { global ns naf trf flush-trace exec nam 8.nam & close $trf close $naf exit 0 at 400 "finish" run VTU NOTES QUESTION PAPERS NEWS RESULTS FORUMS 17 of 17
Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.
Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple
More informationEexercise5: How to do Data Transmission between Nodes Using TCP in NS2
Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.
More informationREVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore
REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A
More informationPart 5. Wireless Network
Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation
More informationNetwork Simulator 2 (NS2)
Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)
More informationCDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)
CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html
More informationComparing ad-hoc wireless to wiredwireless
TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script
More informationANALYSIS OF SMART DEVICE GAME PROTOCOL
ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien
More informationNetwork Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.
Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to
More informationFACULTY OF ENGINEERING
FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationAn Introduction to NS-2
An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:
More informationProject Network Simulation CSE 5346/4346
Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation
More informationns-2 Tutorial Exercise (1)
ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of
More informationIJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing
More informationDMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University
DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Ns-2 Laboratory Prof. Chansu Yu http://academic.csuohio.edu/yuc/ In-Class Lab: Mobile IP 5 nodes 2 wired nodes, W(0) and W(1) 2 mobile agents, HA and FA A
More informationBabak Shahabi ( ), Shaoyun Yang ( ) Team # 7
www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...
More informationChannabasaveshwara Institute of Technology. (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.
Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. QMP 7.1 D/F Department of Computer Science & Engineering Network
More informationThe Network Simulator Fundamentals. Downloads and further info at:
ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,
More informationThe Transport Control Protocol (TCP)
TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable
More informationS Quality of Service in Internet. Introduction to the Exercises Timo Viipuri
S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning
More informationAnalysis and Performance Evaluation of Routing Protocols in MANETS
Analysis and Performance Evaluation of Routing Protocols in MANETS Team Effort by Ankita Mukherjee Roopashree N Department of Computer Science & Engineering, Santa Clara University Fall 2014 Preface Mobile
More informationSimple Data Link Protocols
Simple Data Link Protocols Goals 1) Become familiar with Network Simulator 2 2) Simulate Stop & wait and Sliding Window 3) Investigate the effect of channel with loss on link utilization Introduction Data
More informationLAN-WAN-LAN end-to-end Network Simulation with NS2
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp 13136-13140 Research India Publications http://wwwripublicationcom LAN-WAN-LAN end-to-end Network Simulation
More informationSimulations: ns2 simulator part I a
Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...
More informationPart 6. Confidence Interval
Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit
More informationWireless Networks - Preliminaries
This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators
More informationEE 122: Computer Networks Network Simulator ns2
EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.
More informationBrief Overview and Background
Brief Overview and Background In this assignment you will be studying the performance behavior of TCP, using ns 2. At the end of this exercise, you should be able to write simple scripts in ns 2 as well
More informationQMP 7.1 D/F Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur Karnataka.
QMP 7.1 D/F Channabasaveshwara Institute of Technology (An ISO 9001:2008 Certified Institution) NH 206 (B.H. Road), Gubbi, Tumkur 572 216. Karnataka. Department of Computer Science & Engineering LAB MANUAL
More informationENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012
2012 ENSC 427 Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 Gyuhan David Choi Seungjae Andy Back Calvin Chun Kwan Ho gca16@sfu.ca sjb18@sfu.ca cch8@sfu.ca 3/17/2012 Contents
More informationLAMPIRAN. set ns [new Simulator]
LAMPIRAN set ns [new Simulator] $ns color 0 pink $ns color 1 red $ns color 2 green $ns color 3 yellow $ns color 4 brown $ns color 5 purple $ns color 6 black $ns color 7 grey $ns color 8 maroon set n0 [$ns
More informationABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session
ii ABSTRACT An opportunistic network application is a scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register
More informationPerformance Analysis of Routing Protocols
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 5 (May. 2018), VI PP 69-77 www.iosrjen.org Performance Analysis of Routing Protocols N Dinesh Kumar 1, V.S
More informationns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2
ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some
More informationns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1
ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial
More informationIntroduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities
Introduction Ns Tutorial 2002 Padmaparna Haldar (haldar@isi.edu) Xuan Chen (xuanc@isi.edu) Nov 21, 2002 1989: REAL network simulator 1995: DARPA VINT project at LBL, Xerox PARC, UCB, and USC/ISI Present:
More informationS Ns2 simulation exercise
S-38.3148 Ns2 simulation exercise Fall 2007 1 Table of contents 1. Introduction... 3 2. Theoretical background... 3 2.1. IEEE 802.11 MAC protocol... 3 2.2. Overview of TCP s congestion control... 4 2.3.
More informationTCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye
TCP over Ad Hoc Networks : NS-2 Simulation Analysis Ren Mao, Haobing Wang, Li Li, Fei Ye Chapter 1 Introduction This report is for simulation of TCP transimition in Ad-hoc networks.to begin with,we have
More informationScholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol
Available online at www.scholarsresearchlibrary.com European Journal of Applied Engineering and Scientific Research, 2012, 1 (4):207-215 (http://scholarsresearchlibrary.com/archive.html) ISSN: 2278 0041
More informationJohn Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002
QVWKHQHWZRUNVLPXODWRU,3$07XWRULDO 1HWZRUN0RGHOLQJDQG7UDIILF $QDO\VLVZLWKQV John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 a discrete event simulator simple model focused on modeling
More information[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for
References [1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). Multiple valued logic (MVL) reduction operator, its synthesis and application on network congestion. Proceeding of 7th
More informationSimulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University
Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects
More informationNS-2 Tutorial. Kumar Viswanath CMPE 252a.
NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.
More informationS Ns2 simulation exercise
S-38.148 Ns2 simulation exercise 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2. Fast Retransmit...4
More information1 What is network simulation and how can it be useful?
CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET
More informationPart 3. Result Analysis
Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1 Outline A Simulation and its results The Format of Trace File The AWK language
More informationQoS in Network Simulator 2
QoS in Network Simulator 2 This experiment provides experience in how to apply and simulate QoS mechanisms in communication networks by means of NS2. We focus on RSVP in this experiment. 1. RSVP in NS2
More informationENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT
ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT VoIP Performance of City-Wide Wi-Fi and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie 301144355 Yang, Tian Lin 301107652
More informationFlow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks
Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a
More informationModeling of data networks by example: ns-2 (I)
Modeling of data networks by example: ns-2 (I) Holger Füßler Holger Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating
More informationarxiv: v2 [cs.ni] 26 Jul 2010
arxiv:1007.4065v2 [cs.ni] 26 Jul 2010 A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2) Mubashir Husain Rehmani, Sidney Doria, and Mustapha
More informationPerformance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment
Performance of a Wi-Fi Network as a function of Distance and Number of Connections in a School Environment Group 1 Rajdeep Bhullar - 301187037 Kamal Ezz - 301213002 Daniel Quon 301170142 http://www.sfu.ca/~rsa83/
More informationTcl script 2
Ns : 5... 1 5...nam ns 6... ns 6... nam 1.1 1.2 1.3 7... Tcl script 2 8... 9... 10... 2.1 2.2 2.3 12... 3 13... ( ) 14... 16... 17... 3.1 3.2 3.3 3.4 18... 4 18... 20... 4.1 4.2 22... Xgraph 5 22... 5.1
More informationUSE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES
USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES Petr Berka, Petr Hujka Department of Telecommunications, Brno University of Technology, Purkynova 118, 612 00 Brno, Czech Republic, phone: +420 5 41149190,
More informationPESIT Bangalore South Campus. Department OF Information Science & Engineering
PESIT Bangalore South Campus 1Km before Electronic City, Hosur Road, Bangalore-560100. Department OF Information Science & Engineering COMPUTER NETWORK LABORATORY 15CSL57 Lab Manual 2017-18 Introduction
More informationEvaluation Strategies. Nick Feamster CS 7260 February 26, 2007
Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation
More informationSTUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2
STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Bachelor of Technology In Computer Science
More informationCSE 573S Protocols for Computer Networks (Spring 2005 Final Project)
CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) To Investigate the degree of congestion control synchronization of window-based connections bottlenecked at the same link Kumar, Vikram
More informationSimulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network
Master s Thesis Electrical Engineering September 2014 Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Jani Saida Shaik School of Computing Blekinge Institute of Technology
More informationPart 3: Network Simulator 2
S-38.148 Simulation of data networks / fall-04 Part 3: Network Simulator 2 24.11.2004 1 NS2: Contents NS2 Introduction to NS2 simulator Background info Main concepts, basics of Tcl and Otcl NS2 simulation
More informationS Ns2 simulation exercise
S-38.148 Ns2 simulation exercise Table of contents 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2.
More informationWIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR
UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATIONS ENGINEERING Xiang Chao WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR Master s thesis for the degree of Master of Science in Technology
More informationPerformance Analysis of WLAN MAC algorithms
MEE10:91 Performance Analysis of WLAN MAC algorithms Author: Ramaz Samhan Amer Khoulani Supervisor: Dr. Jorgen Nordberg A Thesis Presented in partial fulfillment of the requirements for the degree of Master
More informationComparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network
Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Pushpender Sarao Hyderabad Institute of Technology and Management, Hyderabad-1401, India Email: drpushpendersarao@gmail Abstract
More informationThe simulation and emulation verification that was based on NS-2
210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer
More informationChapter 5. Simulation Environment. Chapter 5 Simulation Environment... V Network Simulator... V NS-2 Installation...
Chapter 5 Simulation Environment Chapter 5 Simulation Environment... V-2 5.1 Network Simulator... V-2 5.2 NS-2 Installation... V-4 5.3 Sample Script... V-9 5.4 Adding New Routing Protocol in NS2... V-12
More informationThis manual is for informational purposes only. TETCOS MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Experiment Manual 1 The information contained in this document represents the current view of TETCOS on the issues discussed as of the date of publication. Because TETCOS must respond to changing market
More informationTutorial Schedule. Introduction Ns fundamentals Ns programming internal Extending ns-2 Simulator. Sep. 25,
NS-2 Tutorial Presenter: Qing (Kenny) Shao (SFU/CNL) Author: Polly Huang (AT&T Labs Research) Padmaparna Haldar (USC/ISI) Xuan Chen (USC/ISI) Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl
More informationNSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse
NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner
More informationModeling of data networks by example: NS-2 (II)
Modeling of data networks by example: NS-2 (II) Holger Füßler H. Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating
More informationestadium Project Lab 2: Iperf Command
estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure
More informationEFFICIENT ROUTING AND FALSE NODE DETECTION IN MANET
International Conference on Information Engineering, Management and Security [ICIEMS] 27 International Conference on Information Engineering, Management and Security 2015 [ICIEMS 2015] ISBN 978-81-929742-7-9
More informationInternational Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using.
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Efficient routing protocol for MANET using STP and BRM First
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationProject report Cross-layer approach in mobile as hoc routing by
Project report Cross-layer approach in mobile as hoc routing by Alexandre Boursier boursier@kom.aau.dk Stéphane Dahlen sdahlen@kom.aau.dk Julien Marie-Françoise mariefra@kom.aau.dk Thior Santander Marin
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationStudying Fairness of TCP Variants and UDP Traffic
Studying Fairness of TCP Variants and UDP Traffic Election Reddy B.Krishna Chaitanya Problem Definition: To study the fairness of TCP variants and UDP, when sharing a common link. To do so we conduct various
More informationMANET With ADMEN SIMULATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationNS internals. Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University
NS internals Velibor Markovski Communication Networks Laboratory School of Engineering Science Simon Fraser University Software architecture Split programming model (C++ and OTcl) Simulation kernel fi
More informationImplementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2
Implementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2 1 S.Jeneeth Subashini, 2 D. Guna Shekar, 3 C.Harinath Reddy, 4 M. Manikanta 1,2,3,4 ECE, Final year students,
More informationCCNA Exam File with Answers. Note: Underlines options are correct answers.
CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.
More informationNetwork Simulator Version 2 for VANET
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Network Simulator Version 2 for VANET Venkatatamangarao
More informationUNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS
UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS PROJECT INDEX: PRJ 148 BY NAME: NJERU PATRICK MAGOCHI REG. NO: F17/1360/2010 SUPERVISOR: DR. G.S. ODHIAMBO EXAMINER: PROF. V.K. ODUOL Project report
More informationA BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS
A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of IT, Sri Sai Aditya Institute of Science And Technology, Surampalem,
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationGENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK
GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK A PROJECT REPORT Submitted by DIVYA P Register No: 14MCO010 in partial fulfillment for the
More informationEmulab Tutorial. Getting Started
Page 1 of 13 Emulab Tutorial Contents! Getting Started " Logging into the Web Interface " Designing a Network Topology " Beginning the Experiment " Using your Nodes " I need root access! " My node is wedged!
More informationCongestion Control for High Bandwidth-delay Product Networks
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Presented by Chi-Yao Hong Adapted from slides by Dina Katabi CS598pbg Sep. 10, 2009 Trends in the Future
More informationFirst Exam for ECE671 Spring /22/18
ECE67: First Exam First Exam for ECE67 Spring 208 02/22/8 Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 75 minutes to complete the exam. Be a
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationSIMULATING SENSOR NETWORKS IN NS-2
1 SIMULATING SENSOR NETWORKS IN NS-2 Ian Downard Naval Research Laboratory Code 5523 4555 Overlook Ave Washington DC, 20375-5337 downard@itd.nrl.navy.mil Abstract Optimizing sensor networks involves addressing
More informationEvaluation of Epidemic Routing Protocol in Delay Tolerant Networks
Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks D. Kiranmayi Department of CSE, Vignan s Institute Of IT, Visakhapatnam, India ABSTRACT:There are many routing protocols that which can
More informationCongestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it
More informationPERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER
PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER Vilma Tomço, 1 Aleksandër Xhuvani 2 Abstract: The purpose of this work is
More informationAugmented Split-TCP over Wireless LANs
Augmented Split- over Wireless LANs Hakyung Jung, Nakjung Choi, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea Email: {hkjung,
More informationExperimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for Based Wireless Networks
Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks Santosh Hosamani, G.S.Nagaraja Dept of CSE, R.V.C.E, Bangalore,
More informationAn Application of the Modification of Slow Start Algorithm in Campus Network
Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 1326 1331 2012 International Conference on Future Electrical Power and Energy Systems An Application of the Modification of Slow Start
More information