Outline. Tutorial: The ns-2 Network Simulator. Some thoughts about network simulation. What to use it for. Michael Welzl
|
|
|
- Miranda Wilcox
- 9 years ago
- Views:
Transcription
1 Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Outline Tutorial: The ns-2 Network Simulator ns-2 overview Writing simulation scripts Obtaining results General network simulation hints Michael Welzl Institute of Computer Science University of Innsbruck, Austria Teaching with ns-2 Conclusion simulated transit-stub network (ns/nam dump) Uni Innsbruck Informatik - 3 Uni Innsbruck Informatik - 4 Some thoughts about network simulation Real-world experiments sometimes impossible ns-2 2 overview Mathematical modeling can be painful Sometimes even painful and inaccurate! Simulation cannot totally replace real-world experiments: stack processing delay, buffering, timing,.. and vice versa! scaling, simulated vs. real time (long simulations),.. Simulation sometimes misses the whole picture focus on specific layers, wrong assumptions,.. Uni Innsbruck Informatik - 5 Uni Innsbruck Informatik - 6 ns-2 2 (ns version 2) overview What to use it for discrete event simulator (but does not strictly follow DEVS formalism) OTcl and C++ OTcl scripts, C++ mechanism implementations, timing critical code de facto standard for Internet simulation open source! advantages: facilitates building upon other work allows others to use your work disadvantages: huge and complicated code partially missing, somewhat poor documentation Mainly research Examining operational networks, e.g. with Cisco brand names: OPNET Focus on Internet technology the tool for TCP simulations Not ideal for new link layer technologies etc. typically neglects everything underneath layer 3 there are special simulators for things like ATM But: lots of features! CSMA/CD, now available... if you really want it Some things must be added manually ( Contributed Modules )
2 Uni Innsbruck Informatik - 7 Uni Innsbruck Informatik - 8 Some ns-2 2 features Simulation process Lots of TCP (and related) implementations Not interactive Mobility Script describes scenario, event scheduling times Satellite nodes: specify longitude, latitude, altitude Typical last line: $ns run Internet routing protocols Various link loss models Various traffic generators (e.g., web, telnet,..) flexible, but hard to use; alternatives: NISTNet, Dummynet Network emulation capability (real traffic traverses simulated net) ns generates output files Interactive simulation : view.nam output file with network animator nam.nam files can become huge! Uni Innsbruck Informatik - 9 Uni Innsbruck Informatik - 10 Typical long-term simulation process Simulation elements Mechanism implementation in C++, test with simple OTcl script Simulation scenario development in OTcl Test simulation with nam Code: C++ network elements, OTcl simulator elements and simulation script, perl (or whatever) scripts for running simulation and interpreting results ns to run simulation, nam for immediate feedback Visualization tool (xgraph, gnuplot,..) generates One way to obtain a useful result: perl script -> simulations with varying parameter(s) -> several output files -> perl script -> result file -> xgraph (gnuplot, MS Excel,..) -> ps file user nam Otcl script nam trace file ns trace file visualisation tool uses diagram C++ network elements perl script results Uni Innsbruck Informatik - 11 Uni Innsbruck Informatik - 12 Writing simulation scripts Writing simulation scripts OTcl - what you require is some Tcl knowledge not complicated, but troublesome: e.g., line breaks can lead to syntax errors Some peculiarities variables not declared, generic type: set a 3 instead of a=3 expressions must be explicit: set a [expr 3+4] set a 3+4 stores string 3+4 in a use $ to read from a variable: set a $b instead of set a b set a b stores string b in a Write output: puts hello world OTcl objects: basically used like variables method calls: $myobject method param1 param2 not (param1, param2)!
3 Uni Innsbruck Informatik - 13 Uni Innsbruck Informatik - 14 Code template (Marc Greis tutorial) Code template /2 #Create two nodes set n0 [$ns node] set n1 [$ns node] #Create a simulator object set ns [new Simulator] #Open the nam trace file set nf [open out.nam w] $ns namtrace-all $nf #Define a 'finish' procedure proc finish {} { global ns nf $ns flush-trace #Close the trace file close $nf #Execute nam on the trace file exec nam out.nam & exit 0 } set variable value [new Simulator] generates a new Simulator object open out.nam for writing, associate with nf $ns ns-command parameters log everything as nam output in nf Run nam with parameter out.nam as background process (unix) More about Tcl & OTcl: ( finding documentation ) # Insert your own code for topology creation # and agent definitions, etc. here Other agents: TCP, UDP,.. Agent parameters CBR <-> Null,TCP <-> TCPSink! #Create a duplex link between the nodes $ns duplex-link $n0 $n1 1Mb 10ms DropTail #Create a CBR agent and attach it to node n0 set cbr0 [new Agent/CBR] $ns attach-agent $n0 $cbr0 $cbr0 set packetsize_ 500 $cbr0 set interval_ #Create a Null agent (a traffic sink) and attach it to node n1 set sink0 [new Agent/Null] $ns attach-agent $n1 $null0 #Connect the traffic source with the traffic sink $ns connect $cbr0 $sink0 $cbr0 start contains no destination address #Schedule events for the CBR agent $ns at 0.5 "$cbr0 start" #Call the finish procedure after 5 seconds simulation time $ns at 4.5 "$cbr0 stop" $ns at 5.0 "finish" #Run the simulation $ns run $ns at time command schedule command nam Uni Innsbruck Informatik - 15 Applications Apps: layered on top of agents CBR the clean way: set udp [new Agent/UDP] $ns attach-agent $mynode $udp Uni Innsbruck Informatik - 16 Other applications: ftp (greedy tcp source) telnet Traffic/Exponential Traffic/Pareto set cbr [new Application/Traffic/CBR] $cbr set packetsize_ 500 $cbr set interval_ or LossMonitor $cbr attach-agent $udp $ns connect $udp $mynullagent $ns at 0.5 $cbr start $ns at 4.5 $cbr stop always connect agents, sometimes also apps! start / stop the app, not the agent! Uni Innsbruck Informatik - 17 Uni Innsbruck Informatik - 18 More agents CBR <-> Null, CBR <-> LossMonitor note: CBR agent deprecated! requires TCPSink/Sack1! TCP <-> TCPSink one-way Tahoe implementation other flavours: TCP/Reno, TCP/NewReno, TCP/Sack1, TCP/Vegas two-way: use FullTCP at both sides TCP-friendly connectionless protocols: RAP <-> RAP Rate Adaptation Protocol (rate-based AIMD + Slow Start) TFRC <-> TFRCSink TCP Friendly Rate Control protocol (based on TCP throughput-equation) Use app on top $app start $app stop $agent start $agent stop More about links Link creation: $ns_ duplex-link node1 node2 bw delay qtype args qtypes: DropTail, FQ, SFQ, DRR, CBQ, RED, RED/RIO,... Link commands: set mylink [$ns link $node1 $node2] $mylink command Queue parameters: set myqueue [$mylink queue] $myqueue set parameter_ value or $myqueue command Note: for all default parameters, see: ns/tcl/lib/ns-default.tcl down, up... control link status cost value... sets cost (influences routing!) or directly: set myqueue [[$ns link $node1 $node2] queue]
4 Uni Innsbruck Informatik - 19 Uni Innsbruck Informatik - 20 Transmitting user data Writing your own protocol TcpApp application - use on top of Agent/TCP/SimpleTCP set tcp1 [new Agent/TCP/SimpleTCP] set tcp2 [new Agent/TCP/SimpleTCP] $ns attach-agent $node1 $tcp1 $ns attach-agent $node2 $tcp2 $ns connect $tcp1 $tcp2 if you want to receive... $tcp2 listen ( $tcp1 listen ) set app1 [new Application/TcpApp $tcp1] set app2 [new Application/TcpApp $tcp2] to send back $app1 connect $app2 ( $app2 connect $app1 ) size $ns at 1.0 $app1 send 100 \"$app2 app-recv 123\ Application/TcpApp instproc app-recv { number } {... } content simple (for teaching): use TcpApp inefficient, not very flexible more useful (for researchers): change ns code two basic approaches 1. truly understand architecture (class hierarchy, including shadow objects in OTcl etc.) 2. hack code change existing code to suit your needs generally use C++ (and not OTcl) if possible works surprisingly well; I recommend this. Uni Innsbruck Informatik - 21 Uni Innsbruck Informatik - 22 How to hack ns code ping example in the Marc Greis tutorial (easy - try it!) simple end-to-end protocol how to integrate your code in ns: write your code: e.g., ping.h and ping.cc if it s an agent... command method = method call from OTcl recv method= called when a packet arrives if it s a new packet type: change packet.h and tcl/lib/ns-packet.tcl change tcl/lib/ns-default.tcl define and initialize attributes that are visible from OTcl do a make depend, then make Obtaining results Note: ns manual mixes how to use it with what happens inside this is where you look for details Uni Innsbruck Informatik - 23 Uni Innsbruck Informatik - 24 Obtaining results Obtaining results /2 Use LossMonitor instead of Null agent LossMonitor: simple solution for CBR, but TCP <-> TCPSink! read byte counter puts [$filehandle] text write text proc record {} { global sink0 ns } #Set the time after which the procedure should be called again set time 0.5 #How many bytes have been received by the traffic sinks? set bw0 [$sink0 set bytes_] #Get the current time set now [$ns now] #Calculate the bandwidth (in MBit/s) and write it to the files puts $f0 "$now [expr $bw0/$time*8/ ]" #Reset the bytes_ values on the traffic sinks $sink0 set bytes_ 0 #Re-schedule the procedure $ns at [expr $now+$time] "record" Important: $ns at 0.0 "record" Note: puts [expr 1+1] -> 2 puts 1+1 -> 1+1 Very common solution: generate tracefile set f [open out.tr w] $ns trace-all $f Trace file format: event time from to type size flags flowid src addr dst addr seqno uid event: "r" receive, "+" enqueue, "-" dequeue, "d" drop type: "cbr", "tcp", "ack",... $agent set class_ num flags: ECN, priority,... (e.g. $udp set class_ 1) flow id: similar to IPv6 uid: unique packet identifier Color your flow in nam: $ns color num color (e.g. $ns color 1 blue) Monitoring queues in nam: $ns duplex-link-op $node1 $node2 queuepos 0.5
5 Uni Innsbruck Informatik - 25 Uni Innsbruck Informatik - 26 Obtaining results /3 Dynamic vs. long-term behavior Problem: trace files can be very large Solution 1: use pipe set f [open perl filter.pl parameters w] $ns trace-all $f perl script to filter irrelevant information Other solutions: (could be any script file) Use specific trace or monitor - more efficient! direct output in C++ code - even more efficient, but less flexible! Note: TCP throughput!= TCP goodput Goodput: bandwidth seen by the receiving application should not include retransmits! requires modification of TCP C++ code Typically two types of simulation results: dynamic behavior long-term behavior: 1 result per simulation (behavior as function of parameter) Dynamic behavior: parse trace file (e.g. with throughput.pl ) roughly: oldtime = trace_time; while (read!= eof) if (trace_time - oldtime < 1) sum_bytes += trace_bytes; else { print result: sum_byte / (trace_time - oldtime); oldtime = trace_time; } actually slightly more difficult - e.g., empty intervals should be included long-term behavior script calls simulations with varying parameter each simulation trace file parsed (simply summarize data or calculate statistics) Long-term behavior Simulation script: (..) set parameter [lindex $argv 0] (..) set f [open " perl stats.pl tcp w] $ns trace-all $f (..) ($parameter used in simulation!) Uni Innsbruck Informatik - 27 external parameter write 1 result line (+ line break) to stdout loop: for {set i 1} {$i <= 10} {set i [expr $i+1]} { exec echo $i >> results.dat exec ns sim.tcl $i >> results.dat } append result line Plot final file with additional tool (e.g. gnuplot) Visualizing dynamic behavior: CADPC Routing robustness manual edit Uni Innsbruck Informatik - 28 xgraph plot of throughput.pl result nam output ( print + postscript driver) manual edit Uni Innsbruck Informatik - 29 Example 2: CADPC startup (xgraph) Long-term CADPC results (gnuplot) Uni Innsbruck Informatik - 30 Throughput Loss Avg. Queue Length Fairness
6 Uni Innsbruck Informatik - 31 Uni Innsbruck Informatik - 32 General simulation recommendations Concluding remarks Select parameters carefully consider RTT: what is realistic? what is a reasonable simulation duration? ideally, duration should depend on statistics e.g., until variance < threshold not supported by ns thus, just simulate long (realistic duration for, e.g., ftp download) Frequently ignored (but important) parameters: TCP maximum send window size (should not limit TCP behavior) TCP flavor (should be a state-of-the-art variant like SACK) buffer length (should be bandwidth*delay) Active Queue Management parameters (RED = hard to tune!) Uni Innsbruck Informatik - 33 Uni Innsbruck Informatik - 34 General simulation recommendations /2 Common topologies Start simple, then gradually approach reality 1 source, 1 destination multiple homogeneous flows across single bottleneck multiple homogeneous flows with heterogeneous RTTs multiple heterogeneous flows with homogeneous and heterogeneous RTTs impact of routing changes, various types of traffic sources (web, greedy,..) Dumbbell: evaluate basic end2end behaviour, TCP-friendliness,.. often: n vs. m flows S1 Sn D1 Dn eventually implement and test in controlled environment...and then perhaps even test in real life :) Parking Lot: evaluate behaviour with different RTT's, fairness,.. often: S0/D0 - n flows, all other S/D pairs - m flows S0 S1 D1 S2 D2 Dn D0 Uni Innsbruck Informatik - 35 Recommended papers (simulation method) Key links Uni Innsbruck Informatik - 36 Krzysztof Pawlikowski, Hae-Duck Jeong, and Jong-Suk Ruth Lee, On Credibility of Simulation Studies of Telecommunication Networks, IEEE Communications Magazine, January 2002, pp Mark Allman, Aaron Falk, On the Effective Evaluation of TCP, ACM Computer Communication Review, 29(5), October Sally Floyd and Vern Paxson, Difficulties in Simulating the Internet, IEEE/ACM Transactions on Networking, Vol.9, No.4, pp Sally Floyd and Eddie Kohler, Internet Research Needs Better Models, ACM Hotnets-I, October and this website: Official website: docs: ns manual, Marc Greis tutorial, ns by example note: HTML version of ns manual not always up-to-date large number of Contributed Modules Personal ns website: throughput and stats scripts working versions of ns and nam Windows binaries German ns documentation (student work) these slides LLoyd Wood s site: additional links
7 Good luck! Uni Innsbruck Informatik - 37
Tutorial: The ns-2 Network Simulator. Outline. Michael Welzl http://www.welzl.at. Institute of Computer Science University of Innsbruck, Austria
Uni Innsbruck Informatik - 1 Tutorial: The ns-2 Network Simulator Michael Welzl http://www.welzl.at Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 2 Outline ns-2
IASTED ASM 2004 Tutorial:
Uni Innsbruck Informatik - 1 IASTED ASM 2004 Tutorial: The ns-2 Network Simulator Michael Welzl http://www.welzl.at Distributed and Parallel Systems Group Institute of Computer Science University of Innsbruck,
ns-2 Tutorial Exercise
ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people
Network Simulator: ns-2
Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: [email protected] Introduction Network simulator provides a powerful support to research in networking
Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France
Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: [email protected] November 21, 2003 The code provided between the
TCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: [email protected]
TCP Performance Simulations Using Ns2 Johanna Antila 51189d TLT e-mail: [email protected] 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start
Daniele Messina, Ilenia Tinnirello
!"! #$ %& ' %& traffic source agent node link n0 ftp tcp sink 2mbps 10 ms n2 1.7mbps, 20 ms n3 cbr udp n1 2mbps 10 ms null pktsize 1KB, rate 1mbps #Create a simulator object set ns [new Simulator] $ $
Study of Active Queue Management Algorithms ----Towards stabilize and high link utilization
Study of Active Queue Management Algorithms ----Towards stabilize and high link utilization Mengke Li, Huili Wang Computer Science and Engineering University of Nebraska Lincoln Lincoln, NE 66588-0115
SystemC - NS-2 Co-simulation using HSN
Verona, 12/09/2005 SystemC - NS-2 Co-simulation using HSN Giovanni Perbellini 1 REQUIRED BACKGROUND 2 2 GOAL 2 3 WHAT IS SYSTEMC? 2 4 WHAT IS NS-2? 2 5 WHAT IS HSN? 3 6 HARDWARE-NETWORK COSIMULATION 3
Evaluation and Comparison of Wired VoIP Systems to VoWLAN
ENSC 427: COMMUNICATION NETWORKS SPRING 2013 Evaluation and Comparison of Wired VoIP Systems to VoWLAN Project website: http://www.sfu.ca/~rza6/ensc427.html Group #15 Leslie Man 301048471 [email protected] Bill
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005
Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature
Performance Analysis on VoIP over LTE network Website: www.sfu.ca/~lchor/ensc%20427/427website
ENSC 427: Communication Networks Spring 2015 Final Project Performance Analysis on VoIP over LTE network Website: www.sfu.ca/~lchor/ensc%20427/427website Group 7 Chor, Alexandrea (Lexi) [email protected] Dai,
How To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
Simulation and Evaluation for a Network on Chip Architecture Using Ns-2
Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Yi-Ran Sun, Shashi Kumar, Axel Jantsch the Lab of Electronics and Computer Systems (LECS), the Department of Microelectronics & Information
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Performance Monitoring on Networked Virtual Environments
ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet
Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1
Event Driven Simulation in NS2 Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Outline Recap: Discrete Event v.s. Time Driven Events and Handlers The Scheduler
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Network simulation and simulators. Lecturer: Dmitri A. Moltchanov E-mail: [email protected]
Network simulation and simulators Lecturer: Dmitri A. Moltchanov E-mail: [email protected] OUTLINE Theoretical aspects why do we need network simulation? structure of a simulator discrete-event simulation
Parallel TCP Data Transfers: A Practical Model and its Application
D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
TCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
Measuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
Context. Congestion Control In High Bandwidth-Delay Nets [Katabi02a] What is XCP? Key ideas. Router Feedback: Utilization.
Congestion Control In High Bandwidth-Delay Nets [Katabi02a] CSci551: Computer Networks SP2006 Thursday Section John Heidemann 7e_Katabi02a: CSci551 SP2006 John Heidemann 1 Context limitations of TCP over
ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow <spc12 at sfu.ca> Tenzin Sherpa <tserpa at sfu.
Performance analysis of a system during a DDoS attack ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow Tenzin Sherpa Sam Hoque
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
Robust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
Monitoring Android Apps using the logcat and iperf tools. 22 May 2015
Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis [email protected] Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android
TCP, Active Queue Management and QoS
TCP, Active Queue Management and QoS Don Towsley UMass Amherst [email protected] Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle
Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications
212 International Conference on Information and Network Technology (ICINT 212) IPCSIT vol. 7 (212) (212) IACSIT Press, Singapore Analyzing Marking Active Queue Management Scheme on TCP Applications G.A.
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Analysis of Internet Transport Service Performance with Active Queue Management in a QoS-enabled Network
University of Helsinki - Department of Computer Science Analysis of Internet Transport Service Performance with Active Queue Management in a QoS-enabled Network Oriana Riva [email protected] Contents
A Framework For Evaluating Active Queue Management Schemes
A Framework For Evaluating Active Queue Management Schemes Arkaitz Bitorika, Mathieu Robin, Meriel Huggard Department of Computer Science Trinity College Dublin, Ireland Email: {bitorika, robinm, huggardm}@cs.tcd.ie
The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet
The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University [email protected] What is the internetworking problem: how to connect different types
Performance improvement of active queue management with per-flow scheduling
Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239
Computer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Optimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION
LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION 1 NCTUns Program In General NCTUns Program is an extensible network simulator and emulator for teleinformatic networks.
EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY
EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large
New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks
New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks Matthias Rosenschon 1, Markus Heurung 1, Joachim Habermann (SM IEEE) 1 ABSTRACT 1 Fachhochschule Giessen-Friedberg,
LRU-RED: An active queue management scheme to contain high bandwidth flows at congested routers
LRU-RED: An active queue management scheme to contain high bandwidth flows at congested routers Smitha A. L. Narasimha Reddy Dept. of Elec. Engg., Texas A & M University, College Station, TX 77843-3128,
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
Bandwidth Measurement in Wireless Networks
Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS
Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS Ashish Kumar Dr. B R Ambedkar National Institute of Technology, Jalandhar Ajay K Sharma Dr. B R Ambedkar National Institute
Wide Area Network Latencies for a DIS/HLA Exercise
Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing Results
Intelligent Wireless Network Group Department of Computer Engineering Faculty of Engineering, Kasetsart University http://iwing.cpe.ku.ac.th ns-3 Tutorial (Part IV) Wireless & Tracing System and Visualizing
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
