ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results

Size: px
Start display at page:

Download "ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results"

Transcription

1 Intelligent Wireless Network Group Department of Computer Engineering Faculty of Engineering, Kasetsart University ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results JCSSE 2011's tutorials and workshops Wednesday, 11 May 2011, 9:00-16:00

2 Time Table 09:00-10:15 ns-3 Introduction & Installation 10: Break 10:30-12:00 Hands-On: Point-to-point and CSMA (Ethernet) 12:00-13:00 Lunch 13:00-14:15 Hands-On: Wireless & Tracing System and Visualizing Results 14:15-14:30 Break 14:30-15:30 Demonstation: ns-3 protocol stack modification 15:30-16:00 Q&A 2

3 Outline Wireless modules overview Tracing with Trace Helpers Creating custom tracers Visualizing and analyzing results Walk-through examples Hands-on exercise 3

4 Tracing Overview ns-3 provides a set of pre-configured trace sources Users provide trace sinks and attach to the trace source Multiple trace sources can connect to a trace sink 4

5 ns-3 Tracing Model Decouple trace sources from trace sinks: 5

6 ns-3 Trace Sources 6

7 Multiple Levels of Tracing High-level Use a helper to hook a predefined trace source to an existing trace sink (e.g., ascii, pcap) Mid-level Hook an existing trace source to a custom trace sink Low-level Add a new trace source and connect it to a special trace sink 7

8 Trace Helpers Ascii Trace Helper Pcap Trace Helper 8

9 Custom Trace Sink void DevTxTrace( std::string context, Ptr<const Packet> p, Mac48Address address) { std::cout << " TX to=" << address << " p: " << *p << std::endl; } : Config::Connect( "/NodeList/*/DeviceList/*/Mac/MacTx", MakeCallback(&DevTxTrace)); Name of trace sink function Path to trace source 9

10 Walk-Through Example I (1) Task: model the network topology below in ns-3 and capture ECHO packets transmitted from N7 to N4 N2 N3 N4 N5 N /24 N1 ECHO /24 N6 N /24 We can start from tutorials/third.cc 10

11 Dissecting third.cc CommandLine class allows processing of command-line arguments Supply default values of various attributes and variables main (int argc, char *argv[]) { bool verbose = true; uint32_t ncsma = 3; uint32_t nwifi = 3; CommandLine cmd; cmd.addvalue ("ncsma", "Number of \"extra\" CSMA nodes/devices", ncsma); cmd.addvalue ("nwifi", "Number of wifi STA devices", nwifi); cmd.addvalue ("verbose", "Tell echo applications to log if true", verbose); cmd.parse (argc,argv); 11

12 Dissecting third.cc Various Helpers are available to help create wireless channel/physical/mac models NodeContainer wifistanodes; wifistanodes.create (nwifi); NodeContainer wifiapnode = p2pnodes.get (0); YansWifiChannelHelper channel = YansWifiChannelHelper::Default (); YansWifiPhyHelper phy = YansWifiPhyHelper::Default (); phy.setchannel (channel.create ()); WifiHelper wifi = WifiHelper::Default (); wifi.setremotestationmanager ("ns3::aarfwifimanager"); 12

13 Dissecting third.cc WiFi MAC layer NodeContainer wifiapnode = p2pnodes.get (0); NqosWifiMacHelper mac = NqosWifiMacHelper::Default (); Ssid ssid = Ssid ("ns-3-ssid"); mac.settype ("ns3::stawifimac", "Ssid", SsidValue (ssid), "ActiveProbing", BooleanValue (false)); Configure all nodes in wifistanodes container to be of type station NetDeviceContainer stadevices; stadevices = wifi.install (phy, mac, wifistanodes); mac.settype ("ns3::apwifimac", "Ssid", SsidValue (ssid)); NetDeviceContainer apdevices; apdevices = wifi.install (phy, mac, wifiapnode); Configure first node of point-to-point link to be WiFi AP 13

14 Dissecting third.cc All wireless nodes must be associated with mobility MobilityHelper provides a lot of help MobilityHelper mobility; mobility.setpositionallocator ("ns3::gridpositionallocator", DeltaY "MinX", DoubleValue (0.0), "MinY", DoubleValue (0.0), "DeltaX", DoubleValue (5.0), "DeltaY", DoubleValue (10.0), "GridWidth", UintegerValue (3), "LayoutType", StringValue ("RowFirst")); mobility.setmobilitymodel ("ns3::randomwalk2dmobilitymodel", "Bounds", RectangleValue (Rectangle (-50, 50, -50, 50))); mobility.install (wifistanodes); mobility.setmobilitymodel ("ns3::constantpositionmobilitymodel"); mobility.install (wifiapnode); (MinX, MinY) DeltaX 14

15 Walk-Through Example I (2) Create a copy of third.cc into the scratch dir and rename it to pm-ex1.cc $ cp examples/tutorials/third.cc scratch/pm-ex1.cc Edit the source Change port number from 9 to 7 (standard ECHO port) UdpEchoServerHelper echoserver (7); : UdpEchoClientHelper echoclient (csmainterfaces.getaddress (ncsma), 7); Change PCAP file prefix to pm-ex1 pointtopoint.enablepcapall ("pm-ex1"); phy.enablepcap ("pm-ex1", apdevices.get (0)); csma.enablepcap ("pm-ex1", csmadevices.get (0), true); 15

16 Walk-Through Example I (3) Run the script $./waf --run pm-ex1 Open the pcap files with WireShark $ ls *.pcap pm-ex1-0-0.pcap pm-ex1-0-1.pcap pm-ex1-1-0.pcap pm-ex1-1-1.pcap $ wireshark pm-ex1-0-0.pcap 16

17 Walk-Through Example I (4) Visualize the simulation by adding option --visualize $./waf --run pm-ex1 --visualize Press F3 to start the simulation 17

18 Walk-Through Example I (5) Attributes can be configured and explored before the simulation starts #include "ns3/gtk-config-store.h" GtkConfigStore config; config.configureattributes(); Simulator::Run (); 18

19 Walk-Through Example I (6) GtkConfigStore can also be invoked in PyViz using Ipython shell Ipython must be installed 19

20 Walk-Through Example II (1) Task: Using the previous topology, replace ECHO traffic with CBR (Constant Bit Rate) traffic N2 N3 N4 N5 N /24 N1 CBR (512 Kbps) /24 N6 N /24 20

21 Walk-Through Example II (2) Create pm-ex2.cc from pm-ex1.cc $ cp scratch/pm-ex1.cc scratch/pm-ex2.cc Use OnOffHelper to generate CBR traffic from the client uint16_t port = 9; OnOffHelper onoff( "ns3::udpsocketfactory", InetSocketAddress(" ", port)); onoff.setattribute("ontime", StringValue("Constant:1")); onoff.setattribute("offtime", StringValue("Constant:0")); onoff.setattribute("datarate", StringValue("512Kbps")); onoff.setattribute("packetsize", StringValue("512")); Install app on node N7 only ApplicationContainer apps = onoff.install(wifistanodes.get(nwifi-1)); apps.start(seconds(5.0)); apps.stop(seconds(20.0)); 21

22 Walk-Through Example II (3) Create a packet sink on the server PacketSinkHelper sink( "ns3::udpsocketfactory", InetSocketAddress(" ", port)); sink.install(csmanodes.get(ncsma)); Set simulation time to 30 seconds Install PacketSink on node N4 Simulator::Stop(Seconds(25.0)); Don't forget to change the PCAP trace prefix 22

23 Walk-Through Example III (1) Task: calculate average throughput from previous scenario Idea: Connect a custom trace sink to PacketSink's Rx trace source Compute average throughput from first and last packets' timestamps total bytes received 23

24 Finding Path to Trace Source How to determine what trace source PacketSink provides? And how to get to it? In ns-3 Doxygen, look for ns3::packetsink (either via Class List or List of Trace Sources) Look at the documentation for GetTypeId 24

25 Connecting Trace Source/Sink We now know that PacketSink object already comes with a trace source, called Rx We need to write a callback function to serve as a trace sink PacketSink Object Trace Source 25 Trace Sink Callback Function

26 Callback Signature Quoted from ns-3 Tutorial: always try to copy someone else's working code $ find examples/ -name "*.cc" -exec grep -H PacketSink/Rx {} \; examples/csma/csma-ping.cc: Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", examples/csma/csma-packet-socket.cc: Config::Connect ("/NodeList/*/ApplicationList/*/$ns3::PacketSink/Rx", examples/csma/csma-raw-ip-socket.cc: Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", : : Opening examples/csma/csma-ping.cc reveals Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", MakeCallback (&SinkRx)); Then look at definition of SinkRx function: static void SinkRx (Ptr<const Packet> p, const Address &ad) { //std::cout << *p << std::endl; } 26

27 Callback Signature If no example can be found, look at ns-3 source code! $ find. -name "*.h" -exec grep -H TracedCallback {} \; :./src/applications/udp-echo/udp-echo-client.h: TracedCallback<Ptr<const Packet> > m_txtrace;./src/applications/v4ping/v4ping.h: TracedCallback<Time> m_tracertt;./src/applications/packet-sink/packet-sink.h: TracedCallback<Ptr<const Packet>, const Address &> m_rxtrace;./src/mobility/mobility-model.h: TracedCallback<Ptr<const MobilityModel> > m_coursechangetrace;./src/routing/olsr/model/olsr-routing-protocol.h: TracedCallback <const PacketHeader &, : Either way, we now know that our callback's signature should be: void Callback(Ptr<const Packet>, const Address &) Note: An additional std::string parameter is required if connection is made with context 27

28 Walk-Through Example III (2) Create pm-ex3.cc from pm-ex2.cc $ cp scratch/pm-ex2.cc scratch/pm-ex3.cc Prepare trace sink callback and necessary statistical variables double firstrxtime = -1.0, lastrxtime; uint32_t bytestotal = 0; void SinkRxTrace(Ptr<const Packet> pkt, const Address &addr) { if (firstrxtime < 0) firstrxtime = Simulator::Now().GetSeconds(); } lastrxtime = Simulator::Now().GetSeconds(); bytestotal += pkt->getsize(); 28

29 Walk-Through Example III (3) Connect trace source with trace sink Config::ConnectWithoutContext( "/NodeList/*/ApplicationList/*/$ns3::PacketSink/Rx", MakeCallback(&SinkRxTrace)); Produce statistical report at the end of the script cout << "Avg throughput = " << bytestotal*8/(lastrxtime-firstrxtime)/1024 << " kbits/sec" << endl; Run the simulation script 29

30 Walk-Through Example IV (1) Task: study impact of number of clients on average throughput Experiment setup 2-14 mobile clients UDP CBR stream 512 Kbps per client Packet size: 512 bytes 30

31 Walk-Through Example IV (2) Create pm-ex4.cc from pm-ex3.cc $ cp scratch/pm-ex3.cc scratch/pm-ex4.cc Modify the source so that OnOff application is installed on all WiFi stations Change the line: ApplicationContainer apps = onoff.install(wifistanodes.get(nwifi-1)); to ApplicationContainer apps = onoff.install(wifistanodes); 31

32 Walk-Through Example IV (3) Report the number of WiFi stations in addition to the average throughput cout << "Num clients = " << nwifi << " " << "Avg throughput = " << bytestotal*8/(lastrxtime-firstrxtime)/1024 << " kbits/sec" << endl; Try running the script with various values specified for nwifi argument suppress stderr messages $ waf --run "pm-ex4 --nwifi=1" 2> /dev/null Num clients = 1 Avg throughput = kbits/sec $ waf --run "pm-ex4 --nwifi=2" 2> /dev/null Num clients = 2 Avg throughput = kbits/sec 32

33 Walk-Through Example IV (4) Create a shell-script, named run-all.sh, that runs the simulation with different values for nwifi #!/bin/bash for ((i=2; i<=14; i += 2)); do waf --run "pm-ex4 --nwifi=$i" done Run the shell-script and redirect all stdout messages to a file $ bash run-all.sh > results.dat 33

34 Walk-Through Example IV (5) Visualize results with gnuplot $ gnuplot gnuplot> plot 'results.dat' using 4:8 with lines 34

35 Walk-Through Example IV (6) Create a script, genplot.gnuplot, for generating a plot as a PNG file Also Change x-axis to load, Polish the plot: turn on grid, turn off legend #!/usr/bin/gnuplot set terminal png set output 'graph.png' set xrange [0:] set yrange [0:] set xlabel 'Load (kb/s)' set ylabel 'Average Throughput (kb/s)' set grid plot 'results.dat' using ($4*512):8 with lines notitle 35

36 Walk-Through Example IV (7) Run the plotting script $ gnuplot genplot.gnuplot 36

37 Running Multiple Replications Publication-quality results should be obtained from many replications in each scenario Use --RngRun=<run-number> to change random sequence $ waf --run "pm-ex4 --nwifi=10 --RngRun=3" 37

38 Hands-on Exercise Study impact of number of mobile stations to packet delivery ratio 38

Mobility in ns-3. Contenidos SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3

Mobility in ns-3. Contenidos SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 Mobility in Contenidos 1. Mobility models Introduction Random Walk Model Random WayPoint Model

More information

Servicesin ns-3. Outline SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3

Servicesin ns-3. Outline SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 Servicesin Outline 1. Services in Sockets UDP TCP Bulk Application FTP On off Application 2.

More information

NS-3 Advanced Tutorial: Visualization and Data Collection

NS-3 Advanced Tutorial: Visualization and Data Collection NS-3 Advanced Tutorial: Visualization and Data Collection Tom Henderson (University of Washington and Boeing Research & Technology) L. Felipe Perrone (Bucknell University) NS-3 Consortium Meeting 1 Outline

More information

URI and UUID. Identifying things on the Web.

URI and UUID. Identifying things on the Web. URI and UUID Identifying things on the Web. Overview > Uniform Resource Identifiers (URIs) > URIStreamOpener > Universally Unique Identifiers (UUIDs) Uniform Resource Identifiers > Uniform Resource Identifiers

More information

NS-3 Reference Manual

NS-3 Reference Manual NS-3 Reference Manual Module: PhySim-WiFi Jens Mittag, Stylianos Papanastasiou jens.mittag@kit.edu, stylianos@gmail.com PhySim-WiFi version: 1.2 This is the reference manual for a detailed WiFi physical

More information

FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3)

FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3) FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3) Gustavo Carneiro Pedro Fortuna Manuel Ricardo INESC Porto Unidade de Telecomunicações e Multimédia Faculdade de Engenharia

More information

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator) Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:

More information

Comparison of Wireless Protocols. Paweł Ciepliński

Comparison of Wireless Protocols. Paweł Ciepliński Comparison of Wireless Protocols Comparison of Wireless Protocols Field test and comparing 82.11 protocol vs nstreme In Point To Multipoint scenarios IDEA? What force me to make such a comparison. Testing

More information

Using a Generic Plug and Play Performance Monitor for SoC Verification

Using a Generic Plug and Play Performance Monitor for SoC Verification Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why

More information

Product Introduction and Setup Examples. RS232 to WIFI Converter

Product Introduction and Setup Examples. RS232 to WIFI Converter Product Introduction and Setup Examples RS232 to WIFI Converter Part WF5000B U.S. Converters LLC page 1 of 12 Content Product Introduction. 3 AP and STA Modes. 3 Auto- Frequency Function. 3 Security..

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Simulation of wireless ad-hoc sensor networks with QualNet

Simulation of wireless ad-hoc sensor networks with QualNet Advanced Seminar Embedded Systems 2008/2009 Simulation of wireless ad-hoc sensor networks with QualNet Documentation by Tobias Doerffel Chemnitz, April 9, 2009 Contents Contents 1 Introduction 3 1.1 The

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Installing and Using Wireshark for Capturing Network Traffic

Installing and Using Wireshark for Capturing Network Traffic Installing and Using Wireshark for Capturing Network Traffic These instructions are written for using a Windows computer, but are mostly valid for a Linux/Apple environment too. In order to better troubleshoot

More information

Useful CLI Commands. Contents. Enable Logging

Useful CLI Commands. Contents. Enable Logging Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

An API for Reading the MySQL Binary Log

An API for Reading the MySQL Binary Log An API for Reading the MySQL Binary Log Mats Kindahl Lead Software Engineer, MySQL Replication & Utilities Lars Thalmann Development Director, MySQL Replication, Backup & Connectors

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

MASTER'S THESIS. Simulator-Controlled Real-World Experiments in Multihop Wireless Mesh Networks. Alexander Bakharev

MASTER'S THESIS. Simulator-Controlled Real-World Experiments in Multihop Wireless Mesh Networks. Alexander Bakharev MASTER'S THESIS Simulator-Controlled Real-World Experiments in Multihop Wireless Mesh Networks Alexander Bakharev Master of Science Computer Science and Engineering Luleå University of Technology Department

More information

RN-131-PICTAIL & RN-171-PICTAIL Evaluation Boards

RN-131-PICTAIL & RN-171-PICTAIL Evaluation Boards RN-131-PICTAIL & RN-171-PICTAIL Evaluation Boards 2012 Roving Networks. All rights reserved. Version 1.0 9/7/2012 USER MANUAL OVERVIEW The RN-131 and RN-171 WiFly radio modules are complete, standalone

More information

$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";

$ftp = Net::FTP->new(some.host.name, Debug => 0) or die Cannot connect to some.host.name: $@; NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot

More information

Wireshark Lab: Assignment 1w (Optional)

Wireshark Lab: Assignment 1w (Optional) Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding

More information

Using the AVR microcontroller based web server

Using the AVR microcontroller based web server 1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces 1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012 WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

ns-2 Tutorial Exercise

ns-2 Tutorial Exercise ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

CORBA Programming with TAOX11. The C++11 CORBA Implementation

CORBA Programming with TAOX11. The C++11 CORBA Implementation CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman

WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman WANPIPE TM Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L Author: Nenad Corbic/Alex Feldman Copyright (c) 1995-2002 Sangoma Technologies Inc. Introduction WANPIPE from Sangoma Technologies Inc.

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: Chadi.Barakat@sophia.inria.fr November 21, 2003 The code provided between the

More information

Wireshark Tutorial. Figure 1: Packet sniffer structure

Wireshark Tutorial. Figure 1: Packet sniffer structure Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation

More information

Verifying Detection of Asset Tags in WLAN Controllers

Verifying Detection of Asset Tags in WLAN Controllers APPENDIXB Verifying Detection of Asset Tags in WLAN Controllers Asset Tags Detection The protocol analyzer trace in Figure B-1 provides important information with regard to how asset tags compliant with

More information

CLC Server Command Line Tools USER MANUAL

CLC Server Command Line Tools USER MANUAL CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej

More information

Logging. Working with the POCO logging framework.

Logging. Working with the POCO logging framework. Logging Working with the POCO logging framework. Overview > Messages, Loggers and Channels > Formatting > Performance Considerations Logging Architecture Message Logger Channel Log File Logging Architecture

More information

Packet Sniffers. * Windows and Linux - Wireshark

Packet Sniffers. * Windows and Linux - Wireshark Packet Sniffers The following are tools that are either built in to the software or freeware that can be obtained from the website indicated. They are used by the corresponding Operating Systems. * Windows

More information

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012 NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

Netflow Collection with AlienVault Alienvault 2013

Netflow Collection with AlienVault Alienvault 2013 Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with

More information

Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON

Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, inemedi@ie.ase.ro Writing a custom web

More information

Securing Local Area Network with OpenFlow

Securing Local Area Network with OpenFlow Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Datasheet iscsi Protocol

Datasheet iscsi Protocol Protocol with DCB PROTOCOL PACKAGE Industry s premiere validation system for SAN technologies Overview Load DynamiX offers SCSI over TCP/IP transport () support to its existing powerful suite of file,

More information

Packet Sniffing and Spoofing Lab

Packet Sniffing and Spoofing Lab SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

Modeling and Simulation of Routing Protocols in the Cloud

Modeling and Simulation of Routing Protocols in the Cloud 220 ICT Innovations 2014 Web Proceedings ISSN 1857-7288 Modeling and Simulation of Routing Protocols in the Cloud Dejan Spasov, Igor Jakimovski Faculty of Computer Science and Engineering Skopje, Macedonia

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

IP videoconferencing solution with ProCurve switches and Tandberg terminals

IP videoconferencing solution with ProCurve switches and Tandberg terminals An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and

More information

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad is a highly scalable solution for accurately assessing the performance of content-aware devices and networks. IxLoad

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

New York University Computer Science Department Courant Institute of Mathematical Sciences

New York University Computer Science Department Courant Institute of Mathematical Sciences New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Yung-Chih Chen University of Massachusetts Amherst Department of Computer Science 1 Reminders 2 Reminders Assignment

More information

English version. LW320/LW321 Sweex Wireless 300N Router. Package Contents. Terminology list

English version. LW320/LW321 Sweex Wireless 300N Router. Package Contents. Terminology list LW320/LW321 Sweex Wireless 300N Router Do not expose the Sweex Wireless 300N Router to extreme temperatures. Do not place the device in direct sunlight or in the direct vicinity of heating elements. Do

More information

Specific Simple Network Management Tools

Specific Simple Network Management Tools Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:

More information

Optimization of VoIP over 802.11e EDCA based on synchronized time

Optimization of VoIP over 802.11e EDCA based on synchronized time Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University

More information

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014 WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

List of FTP commands for the Microsoft command-line FTP client

List of FTP commands for the Microsoft command-line FTP client You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1

ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1 ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1 ns-3 tutorial agenda 3:00-4:30: ns-3 current capabilities Project overview Walkthrough of basic simulation scenario Parallel simulations and

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application

RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application 2012 Roving Networks. All rights reserved. RN-131/171-PICTAIL-UM Version 1.0 1/8/2013 OVERVIEW The RN-131 and RN-171 WiFly radio modules are

More information

MST - What Is It? Uses. Useful for isolating problems to the PBX or external equipment Provides a detailed view of what happened when

MST - What Is It? Uses. Useful for isolating problems to the PBX or external equipment Provides a detailed view of what happened when MST - What Is It? First developed as a tool for tracing external protocols like ISDN-PRI External protocols: ISDN-PRI/BRI, ASAI, X.25, IP, CMS, CDR, PMS Internal protocols (not much good to us as customers):

More information

Network Simulator: ns-2

Network Simulator: ns-2 Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: cianfrani@diet.uniroma1.it Introduction Network simulator provides a powerful support to research in networking

More information

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s) netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing

More information

Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A / Micro-B)

Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A / Micro-B) USER GUIDE Software Programming Guide for SAM W25 Xplained Pro Atmel SmartConnect Prerequisites Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A

More information

Application. 1.1 About This Tutorial. 1.1.1 Tutorial Requirements. 1.1.2 Provided Files

Application. 1.1 About This Tutorial. 1.1.1 Tutorial Requirements. 1.1.2 Provided Files About This Tutorial 1Creating an End-to-End HL7 Over MLLP Application 1.1 About This Tutorial 1.1.1 Tutorial Requirements 1.1.2 Provided Files This tutorial takes you through the steps of creating an end-to-end

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Characterizing Wireless Network Performance

Characterizing Wireless Network Performance Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient

More information

RIOT-Lab. How to use RIOT in the IoT-Lab. Oliver "Oleg" Hahm. November 7, 2014 INRIA. O. Hahm (INRIA) RIOT-Lab November 7, 2014 1 / 29

RIOT-Lab. How to use RIOT in the IoT-Lab. Oliver Oleg Hahm. November 7, 2014 INRIA. O. Hahm (INRIA) RIOT-Lab November 7, 2014 1 / 29 RIOT-Lab How to use RIOT in the IoT-Lab Oliver "Oleg" Hahm INRIA November 7, 2014 O. Hahm (INRIA) RIOT-Lab November 7, 2014 1 / 29 Agenda 1 Start the RIOT 2 Using RIOT 3 Writing an Application for RIOT

More information

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine

More information

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering

More information

MikroTik Invisible Tools. By : Haydar Fadel 2014

MikroTik Invisible Tools. By : Haydar Fadel 2014 MikroTik Invisible Tools By : Haydar Fadel 2014 E-mail Tool A tool that allows you to send e-mail from the router. It can be used, along with other tools, to send the network administrator regular configuration

More information

The University of New Hampshire ~ InterOperability Laboratory 2005. Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment

The University of New Hampshire ~ InterOperability Laboratory 2005. Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment Introduction Wireless technology is becoming increasingly integrated into the world s networks. Recent innovations, such as offloading

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z

Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z Network Security EDA491 2011/2012 Laboratory assignment 4 Revision A/576, 2012-05-04 06:13:02Z Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network

More information

Network Programming. Writing network and internet applications.

Network Programming. Writing network and internet applications. Network Programming Writing network and internet applications. Overview > Network programming basics > Sockets > The TCP Server Framework > The Reactor Framework > High Level Protocols: HTTP, FTP and E-Mail

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information