SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 12-16
ww.iosrjournals.orgw
www.iosrjournals.org 12 | Page
Enhancing the NS-2 Traffic Generator for the MANETs
1
Assist Prof. Dr. Saad Talib Hasson, 2
Ahmed Jawad Kadhim, 3
Zainab Saad Talib
1,2
Iraq- University of Babylon- College of Sciences- Computer Science Department
3
University of Babylon- College of Sciences
Abstract: The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to
generate the traffic rates by generating random connections between source nodes and destinations. The
original "cbrgen" file generates only CBR and TCP traffics. It generates connections in random manner
between 0 and 180s only. The purpose of this paper is to enhance and modify this file by rebuilding it to
generate additional types of traffics such as exponential on/off and Pareto on/off, as well as adding the
simulated application "Telnet" that can be implemented easily with NS-2. The generated connections was also
developed by letting the time to be distributed randomly between 0 and the simulation time instead of the fixed
time between 0 and 180s. All these modification were tested and implemented many timed. Such modifications
will make this simulator more practical and close to the real MANETs applications.
Keywords: MANET, traffic generators, simulations, performance metrics.
I. Introduction
MANET is a group of mobile nodes that work as a host and router without any infrastructures. The
topology of MANET is changed frequently due to the movement of nodes. The network simulator version 2
(NS-2) represents a good tool to simulate this type of networks. The process of determining the traffic generator
for a large number of hosts is too difficult and it may takes large time. Therefore, the CBR file was supported by
NS-2 as a solution to perform this task. This file creates two types of traffic generators (TCP and CBR) and
schedule them randomly based on the uniform distribution. This script file named "cbrgen" can be found under
the following directory in the Linux environment "ns-allinone-2.34/ns-2.34/indep-utils/cmu-scen-gen", (ns-2.34
is the version of the NS-2 [1].
In order to create new traffic generation between nodes, the user must first follow "ns-allinone-2.34/ns-
2.34/indep-utils/cmu-scen-gen" directory and then write the following instruction in the Linux terminal [2].
ns cbrgen.tcl -type <traffic_type> -nn <number> -seed <number> -mc <number> -rate <number> >
file_name
Traffic Generator
It models the behavior of the user depending on the predefined schedule. In NS-2 there are four types
of traffic generators:
a. Exponential On/Off
During an on period, it sends fixed size payload for every randomized interval to an attached agent, but
it stops sending during an off period. On and off periods are exponentially distributed. [3].
b. Pareto On/Off
It is similar to the exponential On/Off traffic generator, but it differs in that the durations of on and off
periods which are Pareto distributions [3].
c. Constant Bit Rate (CBR)
This type sends payload of fixed size to the attached agent. By default, the interval between two
successive payloads is fixed, but it can be optionally randomized by set the value of random parameter to 1 [4].
d. Trace Traffic
This type depends on the trace file from existing simulation where it selects starting place randomly in
this trace file and begins generate traffic from it [4].
Simulated Applications
Simulated applications act as an actual application running and not depend on the predefined schedule
for payload generation. FTP and Telnet are types of the simulated applications.
Enhancing the NS-2 Traffic Generator for the MANETs
www.iosrjournals.org 13 | Page
a. File Transfer Protocol (FTP)
It is a protocol which divides a given file by the source node into small pieces and transfers them to a
destination node. Not as FTP in practice, in NS-2 the FTP module does not depend on an input file. It informs
an attached sending transport layer agent of a file size in bytes. When receiving the demand of the used, the
agent creates packets which can accommodate the file and forwards them to a connected receiving transport
layer agent [3].
b. Telnet
It is an interactive application based on the client-server text. A Telnet client logs on to a server, and
sends text messages to the server. The server will execute the received message and returns the result to that
client. In other word, Telnet data traffic is created in response to user demand and not depends on a predefined
schedule. However, NS-2 models a Telnet application in the same way as it does for traffic generators: sending
a fixed size packet for every randomized interval [3].
II. Performance Metrics
There are many performance metrics used to evaluate the behavior of the simulated MANETs. In this
paper only the following metrics were suggested to be used.
a. Throughput
Throughput represents the amount of data received by the destination nodes in certain period of time [5].
b. Average end-to-end delay (average E2E delay)
It represents the time that spent by the packet to reach to the destination.
E2E delay [packet_id] = received time [packet_id] – sent time [packet_id]
The average end-to-end delay can be calculated by summing the times taken by all received packets divided by
their total numbers [6].
c. Packet delivery fraction (PDF)
PDF can be measured as the ratio of the received packets by the destination nodes to the packets sent
by the source node [7].
PDF = (number of received packets / number of sent packets) * 100.
III. Modifying the Traffic Generator
The traffic generation file in NS-2 is the "Cbrgen". This file has an important role in each simulation
scenario. the "Cbrgen" file plays an important role in reducing the required effort and time to build the traffic
patterns. It also creates these traffics in random manner to assist the users in their simulation approaches. Due to
our long and continuous dealing with NS-2, we found that it is useful to modify its behavior to exceed and
achieve the new requirements of the MANETs applications. The proposed required modifications of this file can
be done in two parts: (1) is to modify the scheduling time of this file and, (2) is to add a new ability for this
generator to generate other near real traffic types in future simulation applications.
(1). Modify the Time
The old traffics were appeared at a uniformly distributed time between 0 and 180s. This is not practical
in many simulation applications, because in many cases the time of the simulation is required to be smaller/
greater than 180s, so many traffics will become not useful when it was be scheduled with the simulation time.
For this reason, we propose to modify this file and make it generates the traffics between 0 and the time of the
set simulation time instead of 180s. The following instruction is used to generate the new traffic by the modified
file:
ns cbrgen.tcl -type <traffic_type> -nn <number> -seed <number> -mc <number> -rate <number> -time
<simulation time> > file_name
We add a new parameter (-time) to the old instruction. This parameter is used to match with the
simulation time that used in the "tcl" file as well as it can be used to generate the suitable scenario files.
(2). Adding Traffic Generator and Application
In this section, we will present other modifications for the "cbrgen" file by adding two real types of
the traffic generator which are the exponential On/Off and pareto On/Off. These generators are found and
implemented in the network simulator NS-2 but the original "cbrgen" file was not assist them. As well as we
added the one important simulation application (Telnet). The purpose of this modification is to help the
researchers and NS-2 users in dealing with these random traffics and applications manner instead of writing or
building these traffics manually. The manual process may not simulate the real or exact behavior of the wanted
Enhancing the NS-2 Traffic Generator for the MANETs
www.iosrjournals.org 14 | Page
distribution of the required traffic in the designed MANET. The following instruction is used to generate the
required or designed traffic by the modified file:
ns cbrgen.tcl -type <agent_type> -traffic <traffic_type> -nn <number> -seed <number> -mc <number> -
rate <number> -time <simulation time> > file_name.
In the above instruction a new parameter (-traffic) was added. The users must distinguish between the
traffic generators used with UDP and the applications used with TCP. Where:
-type: means TCP or UDP and ,
-traffic: means (CBR, Exponential On/Off, and Pareto On/Off uses with UDP, (FTP or Telnet use with TCP).
Simulation Environment
In order to implement and apply these modifications, the following MANET simulation environment
was suggested and evaluated. The used traffic rates in this simulation scenario will be randomly distributed as
Exponential on/off , pareto on/off and Telnet.
Table (1) shows the suggested simulation environment of the MANET with the application of the new
developed random traffics.
Table (1): suggested simulation environment parameters.
Parameter Value
The simulator NS-2.34
MAC 802.11
Propagation model Two ray ground
Routing protocols AODV
Simulation time 75s
Traffic generation Exponential on/off, pareto on/off,
Telnet
Antenna Omni Antenna
Max connection 8
Transition rate 64 kb/second
Mobility model Random way point model
Seed 1-50
Window size for Telnet
application
32
Nodes number 20
Speed 10 m/s
Pause time 4s
Simulation area 1000m*1000m
IV. Simulation Results
For each traffic generator type, 100 traffic files were built (50 files based on the old "cbrgen" file, while
the other 50 files are based on the modified "cbrgen" file) with different seeds. The maximum connections
number was set to be "8" and the sending rate in this paper was set to be "64 kb/s".
Figure1 represents the throughput of exponential traffic before and after changing the scheduled time. Figure2
represents the average end-to-end delay of exponential traffic before and after changing the scheduled time.
Figure3 represents the packet delivery fraction of exponential traffic before and after changing the scheduled
time.
Fig1: The throughput of the exponential traffic.
Enhancing the NS-2 Traffic Generator for the MANETs
www.iosrjournals.org 15 | Page
Fig2: The average end-to-end delay of the exponential traffic.
Fig3: The packet delivery fraction of the exponential traffic.
Figure4 represent the throughput of the Pareto traffic before and after changing the scheduled time.
Figure5 represent the average end-to-end delay of the Pareto traffic before and after changing the scheduled
time.
Figure6 represent the packet delivery fraction of the Pareto traffic before and after changing the scheduled time.
Fig4: The throughput of the Pareto traffic.
Fig5: The average end-to-end delay of the Pareto traffic.
Fig 6: The packet delivery fraction of the Pareto traffic.
Figure 7 represents the throughput of the Telnet application before and after changing the scheduled time.
Enhancing the NS-2 Traffic Generator for the MANETs
www.iosrjournals.org 16 | Page
Figure 8 represent the average end-to-end delay of the Telnet application before and after changing the
scheduled time.
Figure 9 represent the packet delivery fraction of the Telnet application before and after changing the scheduled
time.
Fig 7: The throughput of the Telnet application.
Fig 8: The average end-to-end delay of the Telnet application.
Fig9: The packet delivery fraction of the Telnet application.
V. Conclusion
From the modified "cbrgen" file, we conclude that the users will be able to schedule many traffic
generators easily in an optimal manner because all the traffics will begins and finished through the assigned
simulation period. This process will prevent the traffic generators to operate out of the simulation period.
The new users and MANETs designers will be able to design wide ranges of traffics depending on many
distributions which helps in improving the behavior of the real and applicable MANETs.
References
[1] Lee Kok Thong, "Performance Analysis of Mobile Ad hoc Networking Routing Protocols", MSc. Thesis, Naval Postgraduate
School, Monterey, California, 2004.
[2] Kevin Fall and Kannan Varadhan, "The ns Manual (formerly ns Notes and Documentation)", 2010.
[3] Teerawat Issariyakul and Ekram Hossain, "Introduction to Network Simulator NS2 ", Springer, ISBN: 978-0-387-71759-3, 2009.
[4] Björn Wiberg, "Porting AODV-UU Implementation to ns-2 and Enabling Trace-based Simulation", MSc. thesis, Information
Technology, Department of Computer Systems, Uppsala University, Sweden, 2002.
[5] Ducksoo Shin, Jonghyup Lee, Jaesung Kim, and Jooseok, "A2
OMD : AN Adaptive Ad Hoc On-Demand Multipath Distance Vector
Routing Protocol Using Dynamic Route Switching", Journal of Engineering Science and Technology, Vol. 4, No. 2, 171 – 183,
2009.
[6] Aliff Umair Salleh, Zulkifli Ishak, Norashidah Md. Din, and Md Zaini Jamaludin, "Trace Analyzer for NS-2", IEEE, pp. 29-32,
Student Conference on Research and Development (SCOReD), Malaysia, 2006.
[7] Er. Deepinder Singh Wadhwa and Er. Tripatjot Singh Panag, "Performance Comparison of Single and Multipath Routing Protocols
in Adhoc Networks ", Int. J. Comp. Tech. Appl., ISSN: 2229-6093, Vol 2 (5), 1486-1496, 2011.

Mais conteúdo relacionado

Mais procurados

Communication costs in parallel machines
Communication costs in parallel machinesCommunication costs in parallel machines
Communication costs in parallel machinesSyed Zaid Irshad
 
MPEG DASH White Paper
MPEG DASH White PaperMPEG DASH White Paper
MPEG DASH White Paperidrajeev
 
Chapter - 04 Basic Communication Operation
Chapter - 04 Basic Communication OperationChapter - 04 Basic Communication Operation
Chapter - 04 Basic Communication OperationNifras Ismail
 
1 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp011 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp01Zaigham Abbas
 
Transport Layer
Transport LayerTransport Layer
Transport LayerAmin Omi
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Apache hama 0.2-userguide
Apache hama 0.2-userguideApache hama 0.2-userguide
Apache hama 0.2-userguideEdward Yoon
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux SystemsRodrigo Campos
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design reportAbhishek Datta
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design reportRaj Gupta
 
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel ComputationCommand Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel Computationpaperpublications3
 

Mais procurados (20)

Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
 
Communication costs in parallel machines
Communication costs in parallel machinesCommunication costs in parallel machines
Communication costs in parallel machines
 
MPEG DASH White Paper
MPEG DASH White PaperMPEG DASH White Paper
MPEG DASH White Paper
 
Chapter - 04 Basic Communication Operation
Chapter - 04 Basic Communication OperationChapter - 04 Basic Communication Operation
Chapter - 04 Basic Communication Operation
 
message passing
 message passing message passing
message passing
 
Report
ReportReport
Report
 
1 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp011 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp01
 
Minimize Staleness and Stretch in Streaming Data Warehouses
Minimize Staleness and Stretch in Streaming Data WarehousesMinimize Staleness and Stretch in Streaming Data Warehouses
Minimize Staleness and Stretch in Streaming Data Warehouses
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
37
3737
37
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
Apache hama 0.2-userguide
Apache hama 0.2-userguideApache hama 0.2-userguide
Apache hama 0.2-userguide
 
Schedulling
SchedullingSchedulling
Schedulling
 
13 tm adv
13 tm adv13 tm adv
13 tm adv
 
Capacity Planning for Linux Systems
Capacity Planning for Linux SystemsCapacity Planning for Linux Systems
Capacity Planning for Linux Systems
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel ComputationCommand Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
 
Lecture9
Lecture9Lecture9
Lecture9
 

Destaque

Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...IOSR Journals
 
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...ARtSENSE_EU
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012rarbos
 
Transport go green
Transport   go greenTransport   go green
Transport go greenAralc Eiob
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторинаNatalya Dyrda
 
Issues in Sentiment analysis
Issues in Sentiment analysisIssues in Sentiment analysis
Issues in Sentiment analysisIOSR Journals
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...IOSR Journals
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyIOSR Journals
 

Destaque (20)

D0931621
D0931621D0931621
D0931621
 
B0441418
B0441418B0441418
B0441418
 
I0355561
I0355561I0355561
I0355561
 
H01055157
H01055157H01055157
H01055157
 
F0543645
F0543645F0543645
F0543645
 
F0463842
F0463842F0463842
F0463842
 
D0562428
D0562428D0562428
D0562428
 
Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...
 
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...
ISMAR 2012: Tailoring the Adaptive Augmented Reality (A²R) Museum Visit: Iden...
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012
 
Transport go green
Transport   go greenTransport   go green
Transport go green
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторина
 
Dank u
Dank uDank u
Dank u
 
Sfware educativos
Sfware educativosSfware educativos
Sfware educativos
 
Issues in Sentiment analysis
Issues in Sentiment analysisIssues in Sentiment analysis
Issues in Sentiment analysis
 
Kvalifikatsii 1
Kvalifikatsii 1Kvalifikatsii 1
Kvalifikatsii 1
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
 
Dewis cv
Dewis cvDewis cv
Dewis cv
 
10____
  10____  10____
10____
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On Ontology
 

Semelhante a Enhancing the NS-2 Traffic Generator for the MANETs

Network simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linuxNetwork simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linuxPratik Joshi
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Andrea Tino
 
Probabilistic Approach to Provisioning of ITV - Amos K.
Probabilistic Approach to Provisioning of ITV - Amos K.Probabilistic Approach to Provisioning of ITV - Amos K.
Probabilistic Approach to Provisioning of ITV - Amos K.Amos Kohn
 
Probabilistic Approach to Provisioning of ITV - By Amos_Kohn
Probabilistic Approach to Provisioning of ITV - By Amos_KohnProbabilistic Approach to Provisioning of ITV - By Amos_Kohn
Probabilistic Approach to Provisioning of ITV - By Amos_KohnAmos Kohn
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computingAdeel Javaid
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 
Paper id 27201431
Paper id 27201431Paper id 27201431
Paper id 27201431IJRAT
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
 
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...IJECEIAES
 
Introduction to NS2 - Cont..
Introduction to NS2 - Cont..Introduction to NS2 - Cont..
Introduction to NS2 - Cont..cscarcas
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETDIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETijcseit
 

Semelhante a Enhancing the NS-2 Traffic Generator for the MANETs (20)

Network simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linuxNetwork simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linux
 
cscn1819.pdf
cscn1819.pdfcscn1819.pdf
cscn1819.pdf
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
 
Probabilistic Approach to Provisioning of ITV - Amos K.
Probabilistic Approach to Provisioning of ITV - Amos K.Probabilistic Approach to Provisioning of ITV - Amos K.
Probabilistic Approach to Provisioning of ITV - Amos K.
 
Probabilistic Approach to Provisioning of ITV - By Amos_Kohn
Probabilistic Approach to Provisioning of ITV - By Amos_KohnProbabilistic Approach to Provisioning of ITV - By Amos_Kohn
Probabilistic Approach to Provisioning of ITV - By Amos_Kohn
 
An Optics Life
An Optics LifeAn Optics Life
An Optics Life
 
Npma Final
Npma FinalNpma Final
Npma Final
 
Ns2 introduction 2
Ns2 introduction 2Ns2 introduction 2
Ns2 introduction 2
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Tut hemant ns2
Tut hemant ns2Tut hemant ns2
Tut hemant ns2
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 
Paper id 27201431
Paper id 27201431Paper id 27201431
Paper id 27201431
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...
 
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
 
Introduction to NS2 - Cont..
Introduction to NS2 - Cont..Introduction to NS2 - Cont..
Introduction to NS2 - Cont..
 
Ns2
Ns2Ns2
Ns2
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETDIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
 
project_531
project_531project_531
project_531
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Enhancing the NS-2 Traffic Generator for the MANETs

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 12-16 ww.iosrjournals.orgw www.iosrjournals.org 12 | Page Enhancing the NS-2 Traffic Generator for the MANETs 1 Assist Prof. Dr. Saad Talib Hasson, 2 Ahmed Jawad Kadhim, 3 Zainab Saad Talib 1,2 Iraq- University of Babylon- College of Sciences- Computer Science Department 3 University of Babylon- College of Sciences Abstract: The network simulator (NS-2) structure is containing a file called "cbrgen". This file was used to generate the traffic rates by generating random connections between source nodes and destinations. The original "cbrgen" file generates only CBR and TCP traffics. It generates connections in random manner between 0 and 180s only. The purpose of this paper is to enhance and modify this file by rebuilding it to generate additional types of traffics such as exponential on/off and Pareto on/off, as well as adding the simulated application "Telnet" that can be implemented easily with NS-2. The generated connections was also developed by letting the time to be distributed randomly between 0 and the simulation time instead of the fixed time between 0 and 180s. All these modification were tested and implemented many timed. Such modifications will make this simulator more practical and close to the real MANETs applications. Keywords: MANET, traffic generators, simulations, performance metrics. I. Introduction MANET is a group of mobile nodes that work as a host and router without any infrastructures. The topology of MANET is changed frequently due to the movement of nodes. The network simulator version 2 (NS-2) represents a good tool to simulate this type of networks. The process of determining the traffic generator for a large number of hosts is too difficult and it may takes large time. Therefore, the CBR file was supported by NS-2 as a solution to perform this task. This file creates two types of traffic generators (TCP and CBR) and schedule them randomly based on the uniform distribution. This script file named "cbrgen" can be found under the following directory in the Linux environment "ns-allinone-2.34/ns-2.34/indep-utils/cmu-scen-gen", (ns-2.34 is the version of the NS-2 [1]. In order to create new traffic generation between nodes, the user must first follow "ns-allinone-2.34/ns- 2.34/indep-utils/cmu-scen-gen" directory and then write the following instruction in the Linux terminal [2]. ns cbrgen.tcl -type <traffic_type> -nn <number> -seed <number> -mc <number> -rate <number> > file_name Traffic Generator It models the behavior of the user depending on the predefined schedule. In NS-2 there are four types of traffic generators: a. Exponential On/Off During an on period, it sends fixed size payload for every randomized interval to an attached agent, but it stops sending during an off period. On and off periods are exponentially distributed. [3]. b. Pareto On/Off It is similar to the exponential On/Off traffic generator, but it differs in that the durations of on and off periods which are Pareto distributions [3]. c. Constant Bit Rate (CBR) This type sends payload of fixed size to the attached agent. By default, the interval between two successive payloads is fixed, but it can be optionally randomized by set the value of random parameter to 1 [4]. d. Trace Traffic This type depends on the trace file from existing simulation where it selects starting place randomly in this trace file and begins generate traffic from it [4]. Simulated Applications Simulated applications act as an actual application running and not depend on the predefined schedule for payload generation. FTP and Telnet are types of the simulated applications.
  • 2. Enhancing the NS-2 Traffic Generator for the MANETs www.iosrjournals.org 13 | Page a. File Transfer Protocol (FTP) It is a protocol which divides a given file by the source node into small pieces and transfers them to a destination node. Not as FTP in practice, in NS-2 the FTP module does not depend on an input file. It informs an attached sending transport layer agent of a file size in bytes. When receiving the demand of the used, the agent creates packets which can accommodate the file and forwards them to a connected receiving transport layer agent [3]. b. Telnet It is an interactive application based on the client-server text. A Telnet client logs on to a server, and sends text messages to the server. The server will execute the received message and returns the result to that client. In other word, Telnet data traffic is created in response to user demand and not depends on a predefined schedule. However, NS-2 models a Telnet application in the same way as it does for traffic generators: sending a fixed size packet for every randomized interval [3]. II. Performance Metrics There are many performance metrics used to evaluate the behavior of the simulated MANETs. In this paper only the following metrics were suggested to be used. a. Throughput Throughput represents the amount of data received by the destination nodes in certain period of time [5]. b. Average end-to-end delay (average E2E delay) It represents the time that spent by the packet to reach to the destination. E2E delay [packet_id] = received time [packet_id] – sent time [packet_id] The average end-to-end delay can be calculated by summing the times taken by all received packets divided by their total numbers [6]. c. Packet delivery fraction (PDF) PDF can be measured as the ratio of the received packets by the destination nodes to the packets sent by the source node [7]. PDF = (number of received packets / number of sent packets) * 100. III. Modifying the Traffic Generator The traffic generation file in NS-2 is the "Cbrgen". This file has an important role in each simulation scenario. the "Cbrgen" file plays an important role in reducing the required effort and time to build the traffic patterns. It also creates these traffics in random manner to assist the users in their simulation approaches. Due to our long and continuous dealing with NS-2, we found that it is useful to modify its behavior to exceed and achieve the new requirements of the MANETs applications. The proposed required modifications of this file can be done in two parts: (1) is to modify the scheduling time of this file and, (2) is to add a new ability for this generator to generate other near real traffic types in future simulation applications. (1). Modify the Time The old traffics were appeared at a uniformly distributed time between 0 and 180s. This is not practical in many simulation applications, because in many cases the time of the simulation is required to be smaller/ greater than 180s, so many traffics will become not useful when it was be scheduled with the simulation time. For this reason, we propose to modify this file and make it generates the traffics between 0 and the time of the set simulation time instead of 180s. The following instruction is used to generate the new traffic by the modified file: ns cbrgen.tcl -type <traffic_type> -nn <number> -seed <number> -mc <number> -rate <number> -time <simulation time> > file_name We add a new parameter (-time) to the old instruction. This parameter is used to match with the simulation time that used in the "tcl" file as well as it can be used to generate the suitable scenario files. (2). Adding Traffic Generator and Application In this section, we will present other modifications for the "cbrgen" file by adding two real types of the traffic generator which are the exponential On/Off and pareto On/Off. These generators are found and implemented in the network simulator NS-2 but the original "cbrgen" file was not assist them. As well as we added the one important simulation application (Telnet). The purpose of this modification is to help the researchers and NS-2 users in dealing with these random traffics and applications manner instead of writing or building these traffics manually. The manual process may not simulate the real or exact behavior of the wanted
  • 3. Enhancing the NS-2 Traffic Generator for the MANETs www.iosrjournals.org 14 | Page distribution of the required traffic in the designed MANET. The following instruction is used to generate the required or designed traffic by the modified file: ns cbrgen.tcl -type <agent_type> -traffic <traffic_type> -nn <number> -seed <number> -mc <number> - rate <number> -time <simulation time> > file_name. In the above instruction a new parameter (-traffic) was added. The users must distinguish between the traffic generators used with UDP and the applications used with TCP. Where: -type: means TCP or UDP and , -traffic: means (CBR, Exponential On/Off, and Pareto On/Off uses with UDP, (FTP or Telnet use with TCP). Simulation Environment In order to implement and apply these modifications, the following MANET simulation environment was suggested and evaluated. The used traffic rates in this simulation scenario will be randomly distributed as Exponential on/off , pareto on/off and Telnet. Table (1) shows the suggested simulation environment of the MANET with the application of the new developed random traffics. Table (1): suggested simulation environment parameters. Parameter Value The simulator NS-2.34 MAC 802.11 Propagation model Two ray ground Routing protocols AODV Simulation time 75s Traffic generation Exponential on/off, pareto on/off, Telnet Antenna Omni Antenna Max connection 8 Transition rate 64 kb/second Mobility model Random way point model Seed 1-50 Window size for Telnet application 32 Nodes number 20 Speed 10 m/s Pause time 4s Simulation area 1000m*1000m IV. Simulation Results For each traffic generator type, 100 traffic files were built (50 files based on the old "cbrgen" file, while the other 50 files are based on the modified "cbrgen" file) with different seeds. The maximum connections number was set to be "8" and the sending rate in this paper was set to be "64 kb/s". Figure1 represents the throughput of exponential traffic before and after changing the scheduled time. Figure2 represents the average end-to-end delay of exponential traffic before and after changing the scheduled time. Figure3 represents the packet delivery fraction of exponential traffic before and after changing the scheduled time. Fig1: The throughput of the exponential traffic.
  • 4. Enhancing the NS-2 Traffic Generator for the MANETs www.iosrjournals.org 15 | Page Fig2: The average end-to-end delay of the exponential traffic. Fig3: The packet delivery fraction of the exponential traffic. Figure4 represent the throughput of the Pareto traffic before and after changing the scheduled time. Figure5 represent the average end-to-end delay of the Pareto traffic before and after changing the scheduled time. Figure6 represent the packet delivery fraction of the Pareto traffic before and after changing the scheduled time. Fig4: The throughput of the Pareto traffic. Fig5: The average end-to-end delay of the Pareto traffic. Fig 6: The packet delivery fraction of the Pareto traffic. Figure 7 represents the throughput of the Telnet application before and after changing the scheduled time.
  • 5. Enhancing the NS-2 Traffic Generator for the MANETs www.iosrjournals.org 16 | Page Figure 8 represent the average end-to-end delay of the Telnet application before and after changing the scheduled time. Figure 9 represent the packet delivery fraction of the Telnet application before and after changing the scheduled time. Fig 7: The throughput of the Telnet application. Fig 8: The average end-to-end delay of the Telnet application. Fig9: The packet delivery fraction of the Telnet application. V. Conclusion From the modified "cbrgen" file, we conclude that the users will be able to schedule many traffic generators easily in an optimal manner because all the traffics will begins and finished through the assigned simulation period. This process will prevent the traffic generators to operate out of the simulation period. The new users and MANETs designers will be able to design wide ranges of traffics depending on many distributions which helps in improving the behavior of the real and applicable MANETs. References [1] Lee Kok Thong, "Performance Analysis of Mobile Ad hoc Networking Routing Protocols", MSc. Thesis, Naval Postgraduate School, Monterey, California, 2004. [2] Kevin Fall and Kannan Varadhan, "The ns Manual (formerly ns Notes and Documentation)", 2010. [3] Teerawat Issariyakul and Ekram Hossain, "Introduction to Network Simulator NS2 ", Springer, ISBN: 978-0-387-71759-3, 2009. [4] Björn Wiberg, "Porting AODV-UU Implementation to ns-2 and Enabling Trace-based Simulation", MSc. thesis, Information Technology, Department of Computer Systems, Uppsala University, Sweden, 2002. [5] Ducksoo Shin, Jonghyup Lee, Jaesung Kim, and Jooseok, "A2 OMD : AN Adaptive Ad Hoc On-Demand Multipath Distance Vector Routing Protocol Using Dynamic Route Switching", Journal of Engineering Science and Technology, Vol. 4, No. 2, 171 – 183, 2009. [6] Aliff Umair Salleh, Zulkifli Ishak, Norashidah Md. Din, and Md Zaini Jamaludin, "Trace Analyzer for NS-2", IEEE, pp. 29-32, Student Conference on Research and Development (SCOReD), Malaysia, 2006. [7] Er. Deepinder Singh Wadhwa and Er. Tripatjot Singh Panag, "Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks ", Int. J. Comp. Tech. Appl., ISSN: 2229-6093, Vol 2 (5), 1486-1496, 2011.