ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results
|
|
- Olivia Jordan
- 8 years ago
- Views:
Transcription
1 Intelligent Wireless Network Group Department of Computer Engineering Faculty of Engineering, Kasetsart University ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results JCSSE 2011's tutorials and workshops Wednesday, 11 May 2011, 9:00-16:00
2 Time Table 09:00-10:15 ns-3 Introduction & Installation 10: Break 10:30-12:00 Hands-On: Point-to-point and CSMA (Ethernet) 12:00-13:00 Lunch 13:00-14:15 Hands-On: Wireless & Tracing System and Visualizing Results 14:15-14:30 Break 14:30-15:30 Demonstation: ns-3 protocol stack modification 15:30-16:00 Q&A 2
3 Outline Wireless modules overview Tracing with Trace Helpers Creating custom tracers Visualizing and analyzing results Walk-through examples Hands-on exercise 3
4 Tracing Overview ns-3 provides a set of pre-configured trace sources Users provide trace sinks and attach to the trace source Multiple trace sources can connect to a trace sink 4
5 ns-3 Tracing Model Decouple trace sources from trace sinks: 5
6 ns-3 Trace Sources 6
7 Multiple Levels of Tracing High-level Use a helper to hook a predefined trace source to an existing trace sink (e.g., ascii, pcap) Mid-level Hook an existing trace source to a custom trace sink Low-level Add a new trace source and connect it to a special trace sink 7
8 Trace Helpers Ascii Trace Helper Pcap Trace Helper 8
9 Custom Trace Sink void DevTxTrace( std::string context, Ptr<const Packet> p, Mac48Address address) { std::cout << " TX to=" << address << " p: " << *p << std::endl; } : Config::Connect( "/NodeList/*/DeviceList/*/Mac/MacTx", MakeCallback(&DevTxTrace)); Name of trace sink function Path to trace source 9
10 Walk-Through Example I (1) Task: model the network topology below in ns-3 and capture ECHO packets transmitted from N7 to N4 N2 N3 N4 N5 N /24 N1 ECHO /24 N6 N /24 We can start from tutorials/third.cc 10
11 Dissecting third.cc CommandLine class allows processing of command-line arguments Supply default values of various attributes and variables main (int argc, char *argv[]) { bool verbose = true; uint32_t ncsma = 3; uint32_t nwifi = 3; CommandLine cmd; cmd.addvalue ("ncsma", "Number of \"extra\" CSMA nodes/devices", ncsma); cmd.addvalue ("nwifi", "Number of wifi STA devices", nwifi); cmd.addvalue ("verbose", "Tell echo applications to log if true", verbose); cmd.parse (argc,argv); 11
12 Dissecting third.cc Various Helpers are available to help create wireless channel/physical/mac models NodeContainer wifistanodes; wifistanodes.create (nwifi); NodeContainer wifiapnode = p2pnodes.get (0); YansWifiChannelHelper channel = YansWifiChannelHelper::Default (); YansWifiPhyHelper phy = YansWifiPhyHelper::Default (); phy.setchannel (channel.create ()); WifiHelper wifi = WifiHelper::Default (); wifi.setremotestationmanager ("ns3::aarfwifimanager"); 12
13 Dissecting third.cc WiFi MAC layer NodeContainer wifiapnode = p2pnodes.get (0); NqosWifiMacHelper mac = NqosWifiMacHelper::Default (); Ssid ssid = Ssid ("ns-3-ssid"); mac.settype ("ns3::stawifimac", "Ssid", SsidValue (ssid), "ActiveProbing", BooleanValue (false)); Configure all nodes in wifistanodes container to be of type station NetDeviceContainer stadevices; stadevices = wifi.install (phy, mac, wifistanodes); mac.settype ("ns3::apwifimac", "Ssid", SsidValue (ssid)); NetDeviceContainer apdevices; apdevices = wifi.install (phy, mac, wifiapnode); Configure first node of point-to-point link to be WiFi AP 13
14 Dissecting third.cc All wireless nodes must be associated with mobility MobilityHelper provides a lot of help MobilityHelper mobility; mobility.setpositionallocator ("ns3::gridpositionallocator", DeltaY "MinX", DoubleValue (0.0), "MinY", DoubleValue (0.0), "DeltaX", DoubleValue (5.0), "DeltaY", DoubleValue (10.0), "GridWidth", UintegerValue (3), "LayoutType", StringValue ("RowFirst")); mobility.setmobilitymodel ("ns3::randomwalk2dmobilitymodel", "Bounds", RectangleValue (Rectangle (-50, 50, -50, 50))); mobility.install (wifistanodes); mobility.setmobilitymodel ("ns3::constantpositionmobilitymodel"); mobility.install (wifiapnode); (MinX, MinY) DeltaX 14
15 Walk-Through Example I (2) Create a copy of third.cc into the scratch dir and rename it to pm-ex1.cc $ cp examples/tutorials/third.cc scratch/pm-ex1.cc Edit the source Change port number from 9 to 7 (standard ECHO port) UdpEchoServerHelper echoserver (7); : UdpEchoClientHelper echoclient (csmainterfaces.getaddress (ncsma), 7); Change PCAP file prefix to pm-ex1 pointtopoint.enablepcapall ("pm-ex1"); phy.enablepcap ("pm-ex1", apdevices.get (0)); csma.enablepcap ("pm-ex1", csmadevices.get (0), true); 15
16 Walk-Through Example I (3) Run the script $./waf --run pm-ex1 Open the pcap files with WireShark $ ls *.pcap pm-ex1-0-0.pcap pm-ex1-0-1.pcap pm-ex1-1-0.pcap pm-ex1-1-1.pcap $ wireshark pm-ex1-0-0.pcap 16
17 Walk-Through Example I (4) Visualize the simulation by adding option --visualize $./waf --run pm-ex1 --visualize Press F3 to start the simulation 17
18 Walk-Through Example I (5) Attributes can be configured and explored before the simulation starts #include "ns3/gtk-config-store.h" GtkConfigStore config; config.configureattributes(); Simulator::Run (); 18
19 Walk-Through Example I (6) GtkConfigStore can also be invoked in PyViz using Ipython shell Ipython must be installed 19
20 Walk-Through Example II (1) Task: Using the previous topology, replace ECHO traffic with CBR (Constant Bit Rate) traffic N2 N3 N4 N5 N /24 N1 CBR (512 Kbps) /24 N6 N /24 20
21 Walk-Through Example II (2) Create pm-ex2.cc from pm-ex1.cc $ cp scratch/pm-ex1.cc scratch/pm-ex2.cc Use OnOffHelper to generate CBR traffic from the client uint16_t port = 9; OnOffHelper onoff( "ns3::udpsocketfactory", InetSocketAddress(" ", port)); onoff.setattribute("ontime", StringValue("Constant:1")); onoff.setattribute("offtime", StringValue("Constant:0")); onoff.setattribute("datarate", StringValue("512Kbps")); onoff.setattribute("packetsize", StringValue("512")); Install app on node N7 only ApplicationContainer apps = onoff.install(wifistanodes.get(nwifi-1)); apps.start(seconds(5.0)); apps.stop(seconds(20.0)); 21
22 Walk-Through Example II (3) Create a packet sink on the server PacketSinkHelper sink( "ns3::udpsocketfactory", InetSocketAddress(" ", port)); sink.install(csmanodes.get(ncsma)); Set simulation time to 30 seconds Install PacketSink on node N4 Simulator::Stop(Seconds(25.0)); Don't forget to change the PCAP trace prefix 22
23 Walk-Through Example III (1) Task: calculate average throughput from previous scenario Idea: Connect a custom trace sink to PacketSink's Rx trace source Compute average throughput from first and last packets' timestamps total bytes received 23
24 Finding Path to Trace Source How to determine what trace source PacketSink provides? And how to get to it? In ns-3 Doxygen, look for ns3::packetsink (either via Class List or List of Trace Sources) Look at the documentation for GetTypeId 24
25 Connecting Trace Source/Sink We now know that PacketSink object already comes with a trace source, called Rx We need to write a callback function to serve as a trace sink PacketSink Object Trace Source 25 Trace Sink Callback Function
26 Callback Signature Quoted from ns-3 Tutorial: always try to copy someone else's working code $ find examples/ -name "*.cc" -exec grep -H PacketSink/Rx {} \; examples/csma/csma-ping.cc: Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", examples/csma/csma-packet-socket.cc: Config::Connect ("/NodeList/*/ApplicationList/*/$ns3::PacketSink/Rx", examples/csma/csma-raw-ip-socket.cc: Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", : : Opening examples/csma/csma-ping.cc reveals Config::ConnectWithoutContext ("/NodeList/3/ApplicationList/0/$ns3::PacketSink/Rx", MakeCallback (&SinkRx)); Then look at definition of SinkRx function: static void SinkRx (Ptr<const Packet> p, const Address &ad) { //std::cout << *p << std::endl; } 26
27 Callback Signature If no example can be found, look at ns-3 source code! $ find. -name "*.h" -exec grep -H TracedCallback {} \; :./src/applications/udp-echo/udp-echo-client.h: TracedCallback<Ptr<const Packet> > m_txtrace;./src/applications/v4ping/v4ping.h: TracedCallback<Time> m_tracertt;./src/applications/packet-sink/packet-sink.h: TracedCallback<Ptr<const Packet>, const Address &> m_rxtrace;./src/mobility/mobility-model.h: TracedCallback<Ptr<const MobilityModel> > m_coursechangetrace;./src/routing/olsr/model/olsr-routing-protocol.h: TracedCallback <const PacketHeader &, : Either way, we now know that our callback's signature should be: void Callback(Ptr<const Packet>, const Address &) Note: An additional std::string parameter is required if connection is made with context 27
28 Walk-Through Example III (2) Create pm-ex3.cc from pm-ex2.cc $ cp scratch/pm-ex2.cc scratch/pm-ex3.cc Prepare trace sink callback and necessary statistical variables double firstrxtime = -1.0, lastrxtime; uint32_t bytestotal = 0; void SinkRxTrace(Ptr<const Packet> pkt, const Address &addr) { if (firstrxtime < 0) firstrxtime = Simulator::Now().GetSeconds(); } lastrxtime = Simulator::Now().GetSeconds(); bytestotal += pkt->getsize(); 28
29 Walk-Through Example III (3) Connect trace source with trace sink Config::ConnectWithoutContext( "/NodeList/*/ApplicationList/*/$ns3::PacketSink/Rx", MakeCallback(&SinkRxTrace)); Produce statistical report at the end of the script cout << "Avg throughput = " << bytestotal*8/(lastrxtime-firstrxtime)/1024 << " kbits/sec" << endl; Run the simulation script 29
30 Walk-Through Example IV (1) Task: study impact of number of clients on average throughput Experiment setup 2-14 mobile clients UDP CBR stream 512 Kbps per client Packet size: 512 bytes 30
31 Walk-Through Example IV (2) Create pm-ex4.cc from pm-ex3.cc $ cp scratch/pm-ex3.cc scratch/pm-ex4.cc Modify the source so that OnOff application is installed on all WiFi stations Change the line: ApplicationContainer apps = onoff.install(wifistanodes.get(nwifi-1)); to ApplicationContainer apps = onoff.install(wifistanodes); 31
32 Walk-Through Example IV (3) Report the number of WiFi stations in addition to the average throughput cout << "Num clients = " << nwifi << " " << "Avg throughput = " << bytestotal*8/(lastrxtime-firstrxtime)/1024 << " kbits/sec" << endl; Try running the script with various values specified for nwifi argument suppress stderr messages $ waf --run "pm-ex4 --nwifi=1" 2> /dev/null Num clients = 1 Avg throughput = kbits/sec $ waf --run "pm-ex4 --nwifi=2" 2> /dev/null Num clients = 2 Avg throughput = kbits/sec 32
33 Walk-Through Example IV (4) Create a shell-script, named run-all.sh, that runs the simulation with different values for nwifi #!/bin/bash for ((i=2; i<=14; i += 2)); do waf --run "pm-ex4 --nwifi=$i" done Run the shell-script and redirect all stdout messages to a file $ bash run-all.sh > results.dat 33
34 Walk-Through Example IV (5) Visualize results with gnuplot $ gnuplot gnuplot> plot 'results.dat' using 4:8 with lines 34
35 Walk-Through Example IV (6) Create a script, genplot.gnuplot, for generating a plot as a PNG file Also Change x-axis to load, Polish the plot: turn on grid, turn off legend #!/usr/bin/gnuplot set terminal png set output 'graph.png' set xrange [0:] set yrange [0:] set xlabel 'Load (kb/s)' set ylabel 'Average Throughput (kb/s)' set grid plot 'results.dat' using ($4*512):8 with lines notitle 35
36 Walk-Through Example IV (7) Run the plotting script $ gnuplot genplot.gnuplot 36
37 Running Multiple Replications Publication-quality results should be obtained from many replications in each scenario Use --RngRun=<run-number> to change random sequence $ waf --run "pm-ex4 --nwifi=10 --RngRun=3" 37
38 Hands-on Exercise Study impact of number of mobile stations to packet delivery ratio 38
Mobility in ns-3. Contenidos SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3
SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 Mobility in Contenidos 1. Mobility models Introduction Random Walk Model Random WayPoint Model
More informationServicesin ns-3. Outline SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3
SIMULACIÓN DE PROTOCOLOS DE ENRUTAMIENTO PARA REDES MÓVILES AD-HOC MEDIANTE HERRRAMIENTA DE SIMULACIÓN NS-3 Servicesin Outline 1. Services in Sockets UDP TCP Bulk Application FTP On off Application 2.
More informationNS-3 Advanced Tutorial: Visualization and Data Collection
NS-3 Advanced Tutorial: Visualization and Data Collection Tom Henderson (University of Washington and Boeing Research & Technology) L. Felipe Perrone (Bucknell University) NS-3 Consortium Meeting 1 Outline
More informationURI and UUID. Identifying things on the Web.
URI and UUID Identifying things on the Web. Overview > Uniform Resource Identifiers (URIs) > URIStreamOpener > Universally Unique Identifiers (UUIDs) Uniform Resource Identifiers > Uniform Resource Identifiers
More informationNS-3 Reference Manual
NS-3 Reference Manual Module: PhySim-WiFi Jens Mittag, Stylianos Papanastasiou jens.mittag@kit.edu, stylianos@gmail.com PhySim-WiFi version: 1.2 This is the reference manual for a detailed WiFi physical
More informationFlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3)
FlowMonitor a network monitoring framework for the Network Simulator 3 (NS-3) Gustavo Carneiro Pedro Fortuna Manuel Ricardo INESC Porto Unidade de Telecomunicações e Multimédia Faculdade de Engenharia
More informationCREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)
Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:
More informationComparison of Wireless Protocols. Paweł Ciepliński
Comparison of Wireless Protocols Comparison of Wireless Protocols Field test and comparing 82.11 protocol vs nstreme In Point To Multipoint scenarios IDEA? What force me to make such a comparison. Testing
More informationUsing a Generic Plug and Play Performance Monitor for SoC Verification
Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why
More informationProduct Introduction and Setup Examples. RS232 to WIFI Converter
Product Introduction and Setup Examples RS232 to WIFI Converter Part WF5000B U.S. Converters LLC page 1 of 12 Content Product Introduction. 3 AP and STA Modes. 3 Auto- Frequency Function. 3 Security..
More informationA Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationSimulation of wireless ad-hoc sensor networks with QualNet
Advanced Seminar Embedded Systems 2008/2009 Simulation of wireless ad-hoc sensor networks with QualNet Documentation by Tobias Doerffel Chemnitz, April 9, 2009 Contents Contents 1 Introduction 3 1.1 The
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationInstalling and Using Wireshark for Capturing Network Traffic
Installing and Using Wireshark for Capturing Network Traffic These instructions are written for using a Windows computer, but are mostly valid for a Linux/Apple environment too. In order to better troubleshoot
More informationUseful CLI Commands. Contents. Enable Logging
Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)
More informationTraffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg
More informationAn API for Reading the MySQL Binary Log
An API for Reading the MySQL Binary Log Mats Kindahl Lead Software Engineer, MySQL Replication & Utilities Lars Thalmann Development Director, MySQL Replication, Backup & Connectors
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationMASTER'S THESIS. Simulator-Controlled Real-World Experiments in Multihop Wireless Mesh Networks. Alexander Bakharev
MASTER'S THESIS Simulator-Controlled Real-World Experiments in Multihop Wireless Mesh Networks Alexander Bakharev Master of Science Computer Science and Engineering Luleå University of Technology Department
More informationRN-131-PICTAIL & RN-171-PICTAIL Evaluation Boards
RN-131-PICTAIL & RN-171-PICTAIL Evaluation Boards 2012 Roving Networks. All rights reserved. Version 1.0 9/7/2012 USER MANUAL OVERVIEW The RN-131 and RN-171 WiFly radio modules are complete, standalone
More information$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";
NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot
More informationWireshark Lab: Assignment 1w (Optional)
Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding
More informationUsing the AVR microcontroller based web server
1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationCT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
More informationHands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationWRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012
WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright
More informationWireshark Tutorial INTRODUCTION
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationSmoking and any food or drinks are not permitted in the Applications Lab!
220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationns-2 Tutorial Exercise
ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people
More informationTECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
More informationDissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationCORBA Programming with TAOX11. The C++11 CORBA Implementation
CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy
More informationVoice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationWANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman
WANPIPE TM Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L Author: Nenad Corbic/Alex Feldman Copyright (c) 1995-2002 Sangoma Technologies Inc. Introduction WANPIPE from Sangoma Technologies Inc.
More informationWireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
More informationExercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France
Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: Chadi.Barakat@sophia.inria.fr November 21, 2003 The code provided between the
More informationWireshark Tutorial. Figure 1: Packet sniffer structure
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation
More informationVerifying Detection of Asset Tags in WLAN Controllers
APPENDIXB Verifying Detection of Asset Tags in WLAN Controllers Asset Tags Detection The protocol analyzer trace in Figure B-1 provides important information with regard to how asset tags compliant with
More informationCLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
More informationLogging. Working with the POCO logging framework.
Logging Working with the POCO logging framework. Overview > Messages, Loggers and Channels > Formatting > Performance Considerations Logging Architecture Message Logger Channel Log File Logging Architecture
More informationPacket Sniffers. * Windows and Linux - Wireshark
Packet Sniffers The following are tools that are either built in to the software or freeware that can be obtained from the website indicated. They are used by the corresponding Operating Systems. * Windows
More informationNBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012
NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
More informationNetflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
More informationTamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
More informationChapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationDeveloping a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, inemedi@ie.ase.ro Writing a custom web
More informationSecuring Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
More informationCYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
More informationSmart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)
More informationDatasheet iscsi Protocol
Protocol with DCB PROTOCOL PACKAGE Industry s premiere validation system for SAN technologies Overview Load DynamiX offers SCSI over TCP/IP transport () support to its existing powerful suite of file,
More informationPacket Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
More informationPacket Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
More informationModeling and Simulation of Routing Protocols in the Cloud
220 ICT Innovations 2014 Web Proceedings ISSN 1857-7288 Modeling and Simulation of Routing Protocols in the Cloud Dejan Spasov, Igor Jakimovski Faculty of Computer Science and Engineering Skopje, Macedonia
More informationComparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
More informationIP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
More informationIxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks
IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad is a highly scalable solution for accurately assessing the performance of content-aware devices and networks. IxLoad
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More information>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?
Midterm Exam for Computer Networks (CNT 4004) Fall 2013 >>> SOLUTIONS
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationEffect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Yung-Chih Chen University of Massachusetts Amherst Department of Computer Science 1 Reminders 2 Reminders Assignment
More informationEnglish version. LW320/LW321 Sweex Wireless 300N Router. Package Contents. Terminology list
LW320/LW321 Sweex Wireless 300N Router Do not expose the Sweex Wireless 300N Router to extreme temperatures. Do not place the device in direct sunlight or in the direct vicinity of heating elements. Do
More informationSpecific Simple Network Management Tools
Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:
More informationOptimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
More informationWRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationList of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
More informationSIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
More informationMeasuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
More informationLab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1
ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1 ns-3 tutorial agenda 3:00-4:30: ns-3 current capabilities Project overview Walkthrough of basic simulation scenario Parallel simulations and
More informationManaging Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
More informationRN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application
RN-131-PICTAIL & RN-171-PICTAIL Web-Server Demo Application 2012 Roving Networks. All rights reserved. RN-131/171-PICTAIL-UM Version 1.0 1/8/2013 OVERVIEW The RN-131 and RN-171 WiFly radio modules are
More informationMST - What Is It? Uses. Useful for isolating problems to the PBX or external equipment Provides a detailed view of what happened when
MST - What Is It? First developed as a tool for tracing external protocols like ISDN-PRI External protocols: ISDN-PRI/BRI, ASAI, X.25, IP, CMS, CDR, PMS Internal protocols (not much good to us as customers):
More informationNetwork Simulator: ns-2
Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: cianfrani@diet.uniroma1.it Introduction Network simulator provides a powerful support to research in networking
More informationnetkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing
More informationHardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A / Micro-B)
USER GUIDE Software Programming Guide for SAM W25 Xplained Pro Atmel SmartConnect Prerequisites Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A
More informationApplication. 1.1 About This Tutorial. 1.1.1 Tutorial Requirements. 1.1.2 Provided Files
About This Tutorial 1Creating an End-to-End HL7 Over MLLP Application 1.1 About This Tutorial 1.1.1 Tutorial Requirements 1.1.2 Provided Files This tutorial takes you through the steps of creating an end-to-end
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationCharacterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
More informationRIOT-Lab. How to use RIOT in the IoT-Lab. Oliver "Oleg" Hahm. November 7, 2014 INRIA. O. Hahm (INRIA) RIOT-Lab November 7, 2014 1 / 29
RIOT-Lab How to use RIOT in the IoT-Lab Oliver "Oleg" Hahm INRIA November 7, 2014 O. Hahm (INRIA) RIOT-Lab November 7, 2014 1 / 29 Agenda 1 Start the RIOT 2 Using RIOT 3 Writing an Application for RIOT
More informationITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
More informationAC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
More informationMikroTik Invisible Tools. By : Haydar Fadel 2014
MikroTik Invisible Tools By : Haydar Fadel 2014 E-mail Tool A tool that allows you to send e-mail from the router. It can be used, along with other tools, to send the network administrator regular configuration
More informationThe University of New Hampshire ~ InterOperability Laboratory 2005. Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment
Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment Introduction Wireless technology is becoming increasingly integrated into the world s networks. Recent innovations, such as offloading
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationNetwork Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z
Network Security EDA491 2011/2012 Laboratory assignment 4 Revision A/576, 2012-05-04 06:13:02Z Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network
More informationNetwork Programming. Writing network and internet applications.
Network Programming Writing network and internet applications. Overview > Network programming basics > Sockets > The TCP Server Framework > The Reactor Framework > High Level Protocols: HTTP, FTP and E-Mail
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More information