Daniele Messina, Ilenia Tinnirello

Size: px
Start display at page:

Download "Daniele Messina, Ilenia Tinnirello"

Transcription

1

2

3 !"! #$ %& ' %&

4 traffic source agent node link n0 ftp tcp sink 2mbps 10 ms n2 1.7mbps, 20 ms n3 cbr udp n1 2mbps 10 ms null pktsize 1KB, rate 1mbps

5 #Create a simulator object set ns [new Simulator] $ $ #Define different colors for data flows (for NAM) $ns color 1 Blue $ns color 2 Red #Open the NAM trace file set nf [open out.nam w] $ns namtrace-all $nf #Define a 'finish' procedure proc finish {} { global ns nf $ns flush-trace #Close the NAM trace file close $nf #Execute NAM on the trace file exec nam out.nam & exit 0 }

6 set ns [new Simulator]" %& $ " ( (%& %! "! " # #! $ $ $ $# % & '

7 $ $ n0 #Create four nodes set n0 [$ns node] set n1 [$ns node] set n2 [$ns node] set n3 [$ns node] 2mbps 10 ms n1 2mbps 10 ms n2 1.7mbps, 20 ms n3 #Create links between the nodes $ns duplex-link $n0 $n2 2Mb 10ms DropTail $ns duplex-link $n1 $n2 2Mb 10ms DropTail $ns duplex-link $n2 $n3 1.7Mb 20ms DropTail #Set Queue Size of link (n2-n3) to 10 $ns queue-limit $n2 $n3 10 #Give node position (for NAM) $ns duplex-link-op $n0 $n2 orient right-down $ns duplex-link-op $n1 $n2 orient right-up $ns duplex-link-op $n2 $n3 orient right #Monitor the queue for link (n2-n3). (for NAM) $ns duplex-link-op $n2 $n3 queuepos 0.5

8 $ns_ simplex-link <node1> <node2> <bw> <delay> <qtype> <args> %!% )*+, $ #!-#. #!! -.$ $ns_ duplex-link <node1> <node2> <bw> <delay> <qtype> <args> %% $ $ns_ simplex-link-op <n1> <n2> <op> <args> %!/$ %% %# $ $ns_ duplex-link-op <n1> <n2> <op> <args> %)! %#,!/$

9 $ $ #Setup a TCP connection set tcp [new Agent/TCP] $ns attach-agent $n0 $tcp set sink [new Agent/TCPSink] $ns attach-agent $n3 $sink $ns connect $tcp $sink $tcp set fid_ 1 #Setup a FTP over TCP connection set ftp [new Application/FTP] $ftp attach-agent $tcp $ftp set type_ FTP n0 ftp tcp n3 sink

10 #Setup a UDP connection set udp [new Agent/UDP] $ns attach-agent $n1 $udp set null [new Agent/Null] $ns attach-agent $n3 $null $ns connect $udp $null $udp set fid_ 2 $ $ #Setup a CBR over UDP connection set cbr [new Application/Traffic/CBR] $cbr attach-agent $udp $cbr set type_ CBR $cbr set packet_size_ 1000 $cbr set rate_ 1mb $cbr set random_ false cbr udp n1 pktsize 1KB, rate 1mbps n3 null

11 $ $ #Schedule events for the CBR and FTP agents $ns at 0.1 "$cbr start" $ns at 1.0 "$ftp start" $ns at 4.0 "$ftp stop" $ns at 4.5 "$cbr stop" #Detach tcp and sink agents (not really necessary) $ns at 4.5 "$ns detach-agent $n0 $tcp ; $ns detach-agent $n3 $sink" #Call the finish procedure after 5 seconds of simulation time $ns at 5.0 "finish" #Print CBR packet size and interval puts "CBR packet size = [$cbr set packet_size_]" puts "CBR interval = [$cbr set interval_]" #Run the simulation $ns run

12 $ns trace-all $fd cbr cbr r cbr r ack tcp tcp r cbr cbr d cbr

13 " 0 %" " #( $ns_ use-scheduler Heap ) # " * # / / / /1!! 2

14 !!!!3 %!!!!!! " ( +!,! * -!, (, +! *! p(x)=k*(x m ) k /(x) k+1 (, * ( +. /. " " #!!

15 4*5!!! %&" 0 0 # #! 0! 4*5!!% 6!" set e [new Application/Traffic/CBR] $e set packetsize_ 48 $e set rate_ 64Kb $e set random_ 1!4*5%&788 /$

16 9/!!!%&" /:!!!!% 6!" set e [new Application/Traffic/Exponential] $e set packetsize_ 210 $e set burst_time_ 500ms $e set idle_time_ 500ms $e set rate_ 100k 9/:!!%! % % %%88 ; %8$

17 <= <=%&%!4= %&$ $ftp start $ftp produce <n> $ftp stop $ftp attach agent $ftp producemore <count> 4!=" maxpkts

18 ! $ %6!! $ 3 4, ), ( Agent/UDP set packetsize_ 1000 ;# max segment size

19 4= &!4=" " senders receivers (sink) " # " & 5, " 1 2 5, & 5, 6 " , & 5, % " 6 & 5, 7 " 5, : # & 5, ; " 5, ; & 5, 8 " 6 5, 1 2

20 4= " & 5, " 5, & 5 < & 5, 4 & " 5, & 5 < & 5, 7 " & 5 < : # & 5, 7 4 & " 7 4 &

21 4= Agent/TCP set window_ 100 ;# Changes the class variable $tcp set window_ 2.0 ;# Changes window_ for the $tcp object! 5, & 5, # & 5 < 5, & 5 < & 5 < Agent/TCPSink set packetsize_ 40 4 & 5 < 5, Agent/TCPSink/DelAck set interval_ 100ms & 5 < 5, " Agent/TCPSink set maxsackblocks_ 3

22 5 <" 4 ' 6!! $ >?! % $ns rtproto Static ;# Enable static route strategy for the simulation $ns rtproto Session ;# Enable session routing for this simulation $ns rtproto DV $n1 $n2 $n3 ;# Run DV agents on nodes $n1, $n2, and $n3 $ns rtproto LS $n1 $n2 ;# Run link state routing on specified nodes

23 '!! $'%! $ $ns cost $n1 $n2 10 ;# set cost of link from $n1 to $n2 to 10 $ns cost $n2 $n1 5 ;# set cost of link in reverse direction to 5 [$ns link $n1 $n2] cost? ;# query cost of link from $n1 to $n2 [$ns link $n2 $n1] cost? ;# query cost of link in reverse direction

24 5 " 3 4 = ", 8! #file:static-routing.tcl

25 5 " 4 - "8 4 ; #. # ( changes in the topology received route update #files: session-routing.tcl dv-routing.tcl

26 5 B 5" $ns rtproto Manual set n1 [$ns node] set n2 [$ns node] $ns duplex-link $n1 $n2 10Mb 100ms DropTail [$n1 get-module "Manual"] add-route-to-adj-node -default $n2 [$n1 get-module "Manual"] add-route-to-adj-node $n2 [$n2 get-module "Manual"] add-route-to-adj-node -default $n1 #file:manual-routing.tcl

27 @ >?!% $ #<start> <on> <off> <end> $ns rtmodel Exponential $n1 ;#apply to node $ns rtmodel Trace dynamics.trc $n2 $n3 ;#apply to link $ns rtmodel Deterministic $node(1) $node(5) >?! B!$!$ $ns rtmodel-at 3.5 up $n0 $ns rtmodel-at 3.9 up $n3 $n5 $ns rtmodel-at 40 down $n4

28 C! $ns set-address-format hierarchical /. " */. / 7 9 *7 7 *7 7 # $ns set-address-format hierarchical <#n hierarchy levels> <#bits for level1> <#bits for level 2>...<#bits for nth level> The AddrParams class is used to store the topology hierarchy. AddrParams set domain_num_ 2 lappend cluster_num 2 2 AddrParams set cluster_num_ $cluster_num lappend eilastlevel AddrParams set nodes_num_ $eilastlevel This defines a topology with 2 domains, say D1 and D2 with 2 clusters each (C11 & C12 in D1 and C21 & C22 in D2). Then number of nodes in each of these 4 clusters is specified as 2,3,2 and 3 respectively.

29 + %!" > >? ' & A %!" " set val(chan) Channel/WirelessChannel ;# channel type set val(prop) Propagation/TwoRayGround ;# radio-propagation model set val(ant) Antenna/OmniAntenna ;# Antenna type set val(ll) LL ;# Link layer type set val(ifq) Queue/DropTail/PriQueue ;# Interface queue type set val(ifqlen) 50 ;# max packet in ifq set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(rp) DSDV ;# ad-hoc routing protocol set val(nn) 2 ;# number of mobilenodes

30 + + %&!!% %$ set topo [new Topography] B %!D;;ED;;$ + %& /! %)/FD;;FD;;," $topo load_flatgrid #file:simple-wireless.tcl

31 + / %&3!" create-god $val(nn) 3)3@," ) the next hop information is normally loaded into god object from movement pattern files.

32 + +!" # $ns_ node-config -addressingtype flat or hierarchical or expanded # -adhocrouting DSDV or DSR or TORA # -lltype LL # -mactype Mac/802_11 # -proptype "Propagation/TwoRayGround" # -ifqtype "Queue/DropTail/PriQueue" # -ifqlen 50 # -phytype "Phy/WirelessPhy" # -anttype "Antenna/OmniAntenna" # -channeltype "Channel/WirelessChannel" # -topoinstance $topo # -energymodel "EnergyModel" # -initialenergy (in Joules) # -rxpower (in W) # -txpower (in W) # -agenttrace ON or OFF # -routertrace ON or OFF # -mactrace ON or OFF # -movementtrace ON or OFF

33 + # Create nodes: for {set i 0} {$i < $val(nn) } {incr i} { set node_($i) [$ns_ node ] $node_($i) random-motion 0;# disable random motion } # Provide initial (X,Y,Z) co-ordinates for node_(0) and node_(1) $node_(0) set X_ 5.0 $node_(0) set Y_ 2.0 $node_(0) set Z_ 0.0 $node_(1) set X_ $node_(1) set Y_ $node_(1) set Z_ 0.0

34 + # Produce some node movements # # Node_(1) starts to move towards node_(0) # command: $node setdest <x2> <y2> <speed> $ns_ at 50.0 "$node_(1) setdest " $ns_ at 10.0 "$node_(0) setdest " # Node_(1) then starts to move away from node_(0) $ns_ at "$node_(1) setdest "

35 + # Tell nodes when the simulation ends # for {set i 0} {$i < $val(nn) } {incr i} { $ns_ at "$node_($i) reset"; } $ns_ at "stop" $ns_ at "puts \"NS EXITING...\" ; $ns_ halt" #for # Tell {set nodes i 0} when {$i < the $val(nn) simulation } {incr ends $ns_ at "$node_($i) reset"; i} { }$ns_ $ns_ proc at "stop" global stop {} ns_ { tracefd "puts \"NS EXITING...\" ; $ns_ halt" }At time close 150.0s, $tracefd later And finally after resetting the command the simulation the to nodes. start shall The the procedure simulation, stop. The stop{} nodes are is called reset at to that flush time out and traces the and "$ns_ close halt" the is trace called file. at s, a little puts $ns_ "Starting run Simulation..." proc stop {} { global ns_ tracefd close $tracefd } puts "Starting Simulation..." $ns_ run

36 + MAC r _6_ RTR tcp 1492 [a ] [65536: : ] [1 0] 2 0 NETWORK TRANSPORT TCP packet received by routing agent of node 6 at time UID: 5 size: 1492 Mac Layer fields: time src_addr dst_addr type (800: IP, 806: ARP) Network Layer fields: src_addr dst_addr TTL next_hop_addr Transport Layer fields: seq_no ack_no no_of_fwds opt_no_of_fwds

37 +< %% ns use-newtrace %! A

38 + 9%!" set namtrace [open wireless1-out.nam w] $ns_ namtrace-all-wireless $namtrace $val(x) $val(y) "+ %B 4 / #file:wireless1.tcl

39 4!! % cd <ns_dir>/indep-utils/cmu-scen-gen/setdest./setdest [-v version of setdest] [-n num_of_nodes] [-p pausetime] [-s maxspeed] [-t simtime] [-x maxx] [-y maxy] > [outdir/movement-file]

40 4!! % 9/" setdest -n 5 -p 200 -s 0.1 -t 180 -x 50 -y 50 > nodes.tcl.in % ( B

41 + wireless node WL0 wired node base station BS0 link 5mbps 2 ms W0 5.0mbps, 2 ms W1 BS1 5.0mbps 2 ms WL1 WL2 #file:wireless2.tcl

42 + Domain n Use hierarchical routing 3 domains BS BS1 W0 W1 Domain 0 n Domain 2 n2

43 9! % $! %! $ 9$ '!!! )/=/=== =,

44 9 + 6 %%!" $ns_ node-config... -energymodel $opt(energymodel) \ #EnergyModel -idlepower 1.0 \ #watts -rxpower 1.0 \ #watts -txpower 2.0 \ #watts -sleeppower \ #watts -transitionpower 0.2 \ #watts -transitiontime \ #seconds -initialenergy $opt(initialenergy) #joules

45 9 9/" -8.::/:$ "::$$::!::B $ " GHIH$HI;;;;$;I0;$;;;;$;;J;$;;KL " "'@9 " 99= " "

ns-2 Tutorial Exercise

ns-2 Tutorial Exercise ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people

More information

Evaluation and Comparison of Wired VoIP Systems to VoWLAN

Evaluation and Comparison of Wired VoIP Systems to VoWLAN ENSC 427: COMMUNICATION NETWORKS SPRING 2013 Evaluation and Comparison of Wired VoIP Systems to VoWLAN Project website: http://www.sfu.ca/~rza6/ensc427.html Group #15 Leslie Man 301048471 lpm4@sfu.ca Bill

More information

Network simulation and simulators. Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi

Network simulation and simulators. Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi Network simulation and simulators Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi OUTLINE Theoretical aspects why do we need network simulation? structure of a simulator discrete-event simulation

More information

Network Simulator: ns-2

Network Simulator: ns-2 Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: cianfrani@diet.uniroma1.it Introduction Network simulator provides a powerful support to research in networking

More information

Network Simulator: A Learning Tool for Wireless Technologies

Network Simulator: A Learning Tool for Wireless Technologies Current Developments in Technology-Assisted Education (2006) 1979 Network Simulator: A Learning Tool for Wireless Technologies A. Triviño Cabrera, E. Casilari Dpto. Tecnología Electrónica, University of

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: Chadi.Barakat@sophia.inria.fr November 21, 2003 The code provided between the

More information

TCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi

TCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi TCP Performance Simulations Using Ns2 Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start

More information

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Today

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Today ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial

More information

Performance Analysis on VoIP over LTE network Website: www.sfu.ca/~lchor/ensc%20427/427website

Performance Analysis on VoIP over LTE network Website: www.sfu.ca/~lchor/ensc%20427/427website ENSC 427: Communication Networks Spring 2015 Final Project Performance Analysis on VoIP over LTE network Website: www.sfu.ca/~lchor/ensc%20427/427website Group 7 Chor, Alexandrea (Lexi) lchor@sfu.ca Dai,

More information

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc and Hybrid Networks

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc and Hybrid Networks Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc and Hybrid Networks Computer Science Project done by: Thomas Staub staub@iam.unibe.ch head: Prof. Torsten Braun assisted

More information

Centralized Support Node for Mobility Management in Cognitive Radio Networks

Centralized Support Node for Mobility Management in Cognitive Radio Networks Master Thesis Electrical Engineering June 2012 Centralized Support Node for Mobility Management in Cognitive Radio Networks Srinivasan Jayaraman Hemachandra Chowdari Gonuguntla School of Computing Blekinge

More information

Capacity Estimation of VOIP Channels on Wireless Networks

Capacity Estimation of VOIP Channels on Wireless Networks Capacity Estimation of VOIP Channels on Wireless Networks T. J. Patel, V. A. Ogale, S. Baek, N. Cui, R. Park WNCG, Dept of Electrical and Computer Engineering The University of Texas at Austin Austin TX

More information

SystemC - NS-2 Co-simulation using HSN

SystemC - NS-2 Co-simulation using HSN Verona, 12/09/2005 SystemC - NS-2 Co-simulation using HSN Giovanni Perbellini 1 REQUIRED BACKGROUND 2 2 GOAL 2 3 WHAT IS SYSTEMC? 2 4 WHAT IS NS-2? 2 5 WHAT IS HSN? 3 6 HARDWARE-NETWORK COSIMULATION 3

More information

Achieving fast Recovery in IP Networks by Multiple Routing Configuration

Achieving fast Recovery in IP Networks by Multiple Routing Configuration Achieving fast Recovery in IP Networks by Multiple Routing Configuration 1. Prajwalsingh Parihar 2. Pradeep Pandey, Anushree Deshmukh, Surabhi Gawali, Samruddhi Phadnis, Nikesh Gajbhiye 1Assistant Professor,Department

More information

Tutorial: The ns-2 Network Simulator. Outline. Michael Welzl http://www.welzl.at. Institute of Computer Science University of Innsbruck, Austria

Tutorial: The ns-2 Network Simulator. Outline. Michael Welzl http://www.welzl.at. Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 1 Tutorial: The ns-2 Network Simulator Michael Welzl http://www.welzl.at Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 2 Outline ns-2

More information

Outline. Tutorial: The ns-2 Network Simulator. Some thoughts about network simulation. What to use it for. Michael Welzl http://www.welzl.

Outline. Tutorial: The ns-2 Network Simulator. Some thoughts about network simulation. What to use it for. Michael Welzl http://www.welzl. Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Outline Tutorial: The ns-2 Network Simulator ns-2 overview Writing simulation scripts Obtaining results General network simulation hints Michael

More information

Study of Active Queue Management Algorithms ----Towards stabilize and high link utilization

Study of Active Queue Management Algorithms ----Towards stabilize and high link utilization Study of Active Queue Management Algorithms ----Towards stabilize and high link utilization Mengke Li, Huili Wang Computer Science and Engineering University of Nebraska Lincoln Lincoln, NE 66588-0115

More information

Performance Evaluation of AQM Techniques in PIM-DM Multicast Network for SRM Protocol

Performance Evaluation of AQM Techniques in PIM-DM Multicast Network for SRM Protocol Performance Evaluation of AQM Techniques in PIM-DM Multicast Network for SRM Protocol Shaveta Harsh K Verma Ashish Kumar ABSTRACT The focus of this work is to study the behavior of various queue management

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

IASTED ASM 2004 Tutorial:

IASTED ASM 2004 Tutorial: Uni Innsbruck Informatik - 1 IASTED ASM 2004 Tutorial: The ns-2 Network Simulator Michael Welzl http://www.welzl.at Distributed and Parallel Systems Group Institute of Computer Science University of Innsbruck,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1

Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Event Driven Simulation in NS2 Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Outline Recap: Discrete Event v.s. Time Driven Events and Handlers The Scheduler

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Simulation and Evaluation for a Network on Chip Architecture Using Ns-2

Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Yi-Ran Sun, Shashi Kumar, Axel Jantsch the Lab of Electronics and Computer Systems (LECS), the Department of Microelectronics & Information

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS

ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS ROBUST AND SECURE DYNAMIC CHANNEL ALLOCATION AND LOAD BALANCED ROUTING IN MANETS Chaitra k c Dr. N.K Cauvery M. Tech in Software Engineering Professor and HOD Dept. of ISE, Dept. of ISE, R. V. College

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Network Emulation as a Basis for Performance Analysis of Groupware. Prof. Dr. rer. nat. habil. Dr. h. c. Alexander Schill Dipl. Inf.

Network Emulation as a Basis for Performance Analysis of Groupware. Prof. Dr. rer. nat. habil. Dr. h. c. Alexander Schill Dipl. Inf. Network Emulation as a Basis for Performance Analysis of Groupware Prof. Dr. rer. nat. habil. Dr. h. c. Alexander Schill Dipl. Inf. Robert Lübke Contents 1. Motivation 2. Network characteristics and effects

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Hierarchical Routing for Small World Wireless Networks

Hierarchical Routing for Small World Wireless Networks 126 Hierarchical Routing for Small World Wireless Networks Juhani Latvakoski VTT Technical Research Centre of Finland Oulu, Finland Juhani.Latvakoski@vtt.fi Abstract The number of embedded systems capable

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Implementation, Simulation of Linux Virtual Server in ns-2

Implementation, Simulation of Linux Virtual Server in ns-2 Implementation, Simulation of Linux Virtual Server in ns-2 CMPT 885 Special Topics: High Performance Networks Project Final Report Yuzhuang Hu yhu1@cs.sfu.ca ABSTRACT LVS(Linux Virtual Server) provides

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs

A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs B. Gopalakrishnan Asst. Prof. Sl. Grade Department of Computer Applications, Bannari Amman Institute of Technology,

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Optimization of VoIP over 802.11e EDCA based on synchronized time

Optimization of VoIP over 802.11e EDCA based on synchronized time Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

STUDY OF COMPUTER NETWORK ISSUES AND IMPROVISING DROP RATE OF TCP PACKETS USING NS2

STUDY OF COMPUTER NETWORK ISSUES AND IMPROVISING DROP RATE OF TCP PACKETS USING NS2 STUDY OF COMPUTER NETWORK ISSUES AND IMPROVISING DROP RATE OF TCP PACKETS USING NS2 Shweta Gambhir 1 and Kuldeep Tomar 2 1 Department of Computer Engineering, NGF Engineering College & Technology, Palwal,

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Application. Transport. Network. Data Link. Physical. Network Layers. Goal Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes

More information

QualNet 4.5 Network Emulation Interface Model Library

QualNet 4.5 Network Emulation Interface Model Library QualNet 4.5 Network Emulation Interface Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Remote Monitoring Quick Start Guide

Remote Monitoring Quick Start Guide For more information about your new system, look for QC on our website or in our online support materials at www.q-see.com/support Remote Monitoring Quick Start Guide QC Series Network NVRs efore You Get

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

Performance Monitoring on Networked Virtual Environments

Performance Monitoring on Networked Virtual Environments ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: meeran@tlu.ee February 2014 What is wireless mesh networks?

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Cross Layer TCP Congestion Control Load Balancing Technique in MANET Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information