SlideShare uma empresa Scribd logo
1 de 48
Implementation of Networking protocol
using Network Simulator 2
By:Nishant
Amresh
Naman
Kumar Gaurav
Vikash kumar)
INTRODUCTION
We perform the simulation of various
networking protocol on NS2 like :
 TCP
 UDP
Ad-Hoc routing protocols like :
 AODV
 DSR
 DSDV
Continue…


Implementation of VLAN

 And

for all its implementation we have
used Network Simulator 2 as a platform.
Reasons to choose NS2 as a
platform
 Object

Oriented
 Real time Implementation
 Discrete - Event Simulation
 Plumbing makes NS2 a powerful tool
 Event Scheduler
 Time Synchronization
 Cost effective
What is NS2
 Network

Simulator 2, widely known as
NS2, is simply an event-driven
simulation tool that has proved useful
in studying the dynamic nature of
communication networks.
 It is written using two language: Otcl (Object Oriented Tool Command
language)
 C++ language.

Why two languages?
 NS2

uses Otcl to create and
configure a network .



for configuration, setup, or one time
simulation,
to run simulation with existing NS2 modules.

 C++

defines the internal mechanism of
the simulation objects



Used when dealing with a packet
Used when need to modify existing NS2
modules.
Node used as a Router
NS2 ARCHITECTURE
How to write tcl script program
to create a program…
Five steps to create a tcl script
programming:
 Initialization and termination aspects of
network simulator
 Defining the network nodes ,links, queues
and topology
 Defining the agents and their application
 NAM
 Tracing
Example..
 To

create new simulation use this
command:Set ns [new Simulator]
 To create a new node :
Set n0 [ns node]
 To create trace file :
set tracefile1 [open out.tr w]
$ns trace-all $tracefile1
Example…. (cont.)




To create a NAM file
set namfile1 [open out.nam w]
$ns namfile1-all $namfile1
To terminate the program :
Proc finish {} {
global ns tracefile1 namfile1
$ns flush-trace
close $tracefile
close $namfile
exec nam out.nam
exit 0
TCP(Transmission Control
Protocol)
 Connection

Oriented Reliable Protocol
 Consisting of three phases of operation

Connection setup

Data setup

Connection termination
Objective of TCP








Adapt the transmission rate of packets to the
available bandwidth.
Avoid congestion at the network.
Create a reliable connection by
retransmitting lost packet

We measure the performance of TCP on noisy
links using Queue monitoring.
How the window size vary in network
congestion.
UDP(User Datagram Protocol)
 Connectionless

transport-layer protocol
 No connection setup is needed prior to
data transfer
 Offers minimal transport layer
functionalities

non-guaranteed data delivery

gives application a direct access to

network layer
SYSTEM DESIGN
Basic Agents




Two types of NS2 agent used for creating or
destroying a packet are :
Routing agent
A routing agent creates and receives routing
control packets, and commands routing protocols
to act accordingly .



Transport-layer agent
A transport-layer agent controls the congestion
and reliability of a data flow based on an
underlying transport layer protocol (e.g.,UDP or
TCP)
ADHOC
INTRODUCTION





Ad-hoc networks are infrastructure-less.
The interconnected nodes coordinate the
transmissions with other nodes and they may
have to relay messages among several other
nodes in order to reach a destination.
An ad-hoc network is a self-configuring
network of wireless links connecting mobile
nodes, where these nodes may be routers
and/or hosts.
Packet transmission using
multiple channel
Multiple Channels and Multiple
Interfaces







Due to the increasing throughput demand,
the idea of exploiting multiple channels is
appealing in ad-hoc wireless networks .
Having more than one interface on a node
allows two different nodes communicating in
parallel on different channels .
An interface has a capability to dynamically
switch to different channels over time.
Two adjacent nodes can communicate with
each other if they have at least one interface
on a common channel.
Problems occurred
In a wireless ad-hoc network consisting of
multiple hops, if each node only uses a
single interface, packets may be delayed
at some hops if their next hops are not on
the same channel.
 End-to-end delay increases.
 Degradation in channel capacity.

Solution






A multi-interface solution for exploiting
multiple channels that can be implemented
on existing IEEE 802.11 hardware.
An interface assignment strategy using the
technique of interface switching , that
simplifies coordination among nodes while
utilizing multiple available channels.
A routing protocol, namely the MultipleChannel Routing (MCR), that selects routes
with the highest throughput by accounting for
channel diversity and interface switching
cost.
Interface switching
 Fixed

Interface
 Switchable Interface
Routing protocols used in ADHOC network
 AODV

(Ad-Hoc On Demand
Distance Vector)
 DSR (Dynamic Source Routing)
 DSDV (Destination Sequenced
Distance Vector)
AODV
 Routing

protocol for wireless Ad-Hoc

network
 Reactive routing protocol, meaning that it
establishes a route to a destination only
on demand
 avoids the counting-to-infinity problem
using sequence numbers on route
updates
 Capable of unicast and multicast routing .
Working..
Features…
 Routes

established on demand and that
destination sequence numbers are
applied to find the latest route to the
destination
 Connection setup delay is lower
DSR (Dynamic Source Routing)
 DSR

is designed for MANETs
 DSR doesn’t need any network infrastructures



Loop free routing
No routing information in the intermediate nodes

 Nodes

may easily cache this routing information
for future use
DSR Mechanisms
 Route

discovery
 Route maintenance
 Mechanisms “on-demand”




No periodic routing advertisement
No link status sensing
No neighbor detection packets

 Routes

caching
Basic DSR Route Maintenance






Each node transmitting the packet is responsible for
confirming that the packet has been received by next hop.
Acknowledgement
 By lower layer protocol MAC
 By DSR-specific software ack
Route errore message
DSDV(Destination Sequenced
Distance Vector )


Each node maintains a routing table which stores





next hop, cost metric towards each destination
a sequence number that is created by the destination itself

Each node periodically forwards routing table to its neighbours


Each node increments and appends its sequence number when
sending its local routing table



Each route is tagged with a sequence number; routes with greater
sequence numbers are preferred



Each node advertises a monotonically increasing even sequence
number for itself
When a node finds that a route is broken, it increments the
sequence number of the route and advertises it with infinite metric
Destination advertises new sequence number



Advantages of DSDV
 DSDV

is an efficient protocol for route
discovery. Whenever a route to a new
destination is required, it already exists at
the source.

 Hence,

low.

 DSDV

latency for route discovery is very

also guarantees loop-free paths.
Virtual LAN( VLAN):
A

virtual LAN is a group of devices in the
same broadcast domain or subnet.
 VLANs are good at logically separating
traffic between different groups of users
 VLANs contain/isolate broadcast traffic,
where you need a router to move traffic
between VLANs.
VLAN overview
Configuration of VLAN in NS2:
1)

Create a Network Bridge:

Firstly we have to create a network bridge
using the add call.

We have to use net_vlanType as a data
type for the net_device element.
To attach an adapter to be a
bridge, we have to use
following parameter’s :
id: the name of a physical LAN or VLAN
adapter that you would like to plug into the
bridge (e.g. eth0, eth1.5).
 Network_id: a virtual network ID that you
would like to attach the network adapter to.
If an adapter is already connected to a bridge
and you pass a different network ID, the
adapter will be disconnected from the old
bridge and connected to the new bridge.
To detach an adapter from a bridge, leave the
network_id element empty.

cont.
 vlan_id

-- the VLAN adapter ID. When
attaching/detaching a physical network
adapter, leave the element empty.
 base_device_id -- the name of the
physical network adapter with which the
VLAN adapter is associated.
When attaching/detaching a physical
adapter, leave the element empty.
2) VLAN Setup:
eth1.1 bridged with eth0.1 and
eth2.2 bridged with eth0.2
 This

configuration implements a VLAN
switch with two access ports (port eth1 for
VLAN 1 and port eth2 for VLAN 2) and a
trunk port eth0 capable of carrying
frames with VLAN ID either 1 or 2 in its
802.1q tag. Now, consider another switch
with exactly the same configuration.
Then, the trunk ports of the switches are
connected.
Cont.
 Now

device connected to port eth1 of
switch 1 and that connected to port eth1
of switch 2 can interchange frames with
VLAN ID 1. The same is the case with eth2
on both the switches.
 Two VLANs span across 2 switches. There is
no bridging/routing 'between' these two
VLANs. So, this works like a perfect VLAN
switch.
What is actually happening is :
All the untagged frames from eth1 pass
through the bridge and goes out of eth0
as untagged frame.
 All the frames with VLAN ID 2 entering
eth2 gets untagged at eth2.2, gets
bridged to eth0.2, gets tagged with VLAN
ID 2 at eth0 and goes out of the trunk as
tagged frame.

How we can implement it in
NS2:










I have 3 Ethernet interfaces, eth0, eth1 and
eth2. I am planning to convert it into a VLAN
switch.
Let eth1 and eth2 are configured for VLAN 1
and 2 respectively. Let eth0 be a trunk
carrying both VLAN frames.
$vconfig add eth1 1
$vconfig add eth2 2
$vconfig add eth0 1
$vconfig add eth0 2
Cont.
 $brctl

addbr br1
 $brctl addif br1 eth0.1
 $brctl addif br1 eth1.1
 $brctl

addbr br2
 $brctl addif br2 eth0.2
 $brctl addif br2 eth1.2
Cont.
 The

basic idea of the above configuration
is based on the fact that each VLAN can
be simulated with individual bridges per
VLAN. The above configuration works fine
as expected. eth0 acts as trunk carrying
frames with both VLAN IDs(1 and 2). This
trunk can be connected to a similar
switch on the other end to span the VLAN
segmentation across switches.
Benefits of VLAN:






Higher performance - Dividing flat Layer 2
networks into multiple logical workgroups
(broadcast domains) reduces unnecessary traffic
on the network and increases performance.
Security - Groups that have sensitive data are
separated from the rest of the
network, decreasing the chances of confidential
information breaches.
Cost reduction - Cost savings result from less need
for expensive network upgrades and more
efficient use of existing bandwidth and uplinks.
THANK YOU……

Mais conteúdo relacionado

Mais procurados (20)

Aloha
AlohaAloha
Aloha
 
Transport layer
Transport layerTransport layer
Transport layer
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
WLAN
WLANWLAN
WLAN
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Manet
ManetManet
Manet
 
Introduction to ns2
Introduction to ns2Introduction to ns2
Introduction to ns2
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 

Destaque (20)

Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Ns2
Ns2Ns2
Ns2
 
NS-2 Tutorial
NS-2 TutorialNS-2 Tutorial
NS-2 Tutorial
 
Ns2programs
Ns2programsNs2programs
Ns2programs
 
Ns 2 Network Simulator An Introduction
Ns 2 Network Simulator An IntroductionNs 2 Network Simulator An Introduction
Ns 2 Network Simulator An Introduction
 
Working with NS2
Working with NS2Working with NS2
Working with NS2
 
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
 
Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2
 
Dynamic UID
Dynamic UIDDynamic UID
Dynamic UID
 
Cour simulation ns2
Cour simulation ns2Cour simulation ns2
Cour simulation ns2
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
NS2: Events and Handlers
NS2: Events and HandlersNS2: Events and Handlers
NS2: Events and Handlers
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
NS2--Event Scheduler
NS2--Event SchedulerNS2--Event Scheduler
NS2--Event Scheduler
 
NS2: Binding C++ and OTcl variables
NS2: Binding C++ and OTcl variablesNS2: Binding C++ and OTcl variables
NS2: Binding C++ and OTcl variables
 
Ns2
Ns2Ns2
Ns2
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Tracing and awk in ns2
Tracing and awk in ns2Tracing and awk in ns2
Tracing and awk in ns2
 

Semelhante a Protocol implementation on NS2

Basic Networking
Basic NetworkingBasic Networking
Basic NetworkingCEC Landran
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxShehanMarasinghe1
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systemskingGovindi
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area NetworkAtakan ATAK
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesAalok Shah
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron InsightsAtul Pandey
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNidescitation
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 

Semelhante a Protocol implementation on NS2 (20)

Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Wan
WanWan
Wan
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron Insights
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Protocol implementation on NS2

  • 1. Implementation of Networking protocol using Network Simulator 2 By:Nishant Amresh Naman Kumar Gaurav Vikash kumar)
  • 2. INTRODUCTION We perform the simulation of various networking protocol on NS2 like :  TCP  UDP Ad-Hoc routing protocols like :  AODV  DSR  DSDV
  • 3. Continue…  Implementation of VLAN  And for all its implementation we have used Network Simulator 2 as a platform.
  • 4. Reasons to choose NS2 as a platform  Object Oriented  Real time Implementation  Discrete - Event Simulation  Plumbing makes NS2 a powerful tool  Event Scheduler  Time Synchronization  Cost effective
  • 5. What is NS2  Network Simulator 2, widely known as NS2, is simply an event-driven simulation tool that has proved useful in studying the dynamic nature of communication networks.  It is written using two language: Otcl (Object Oriented Tool Command language)  C++ language. 
  • 6. Why two languages?  NS2 uses Otcl to create and configure a network .   for configuration, setup, or one time simulation, to run simulation with existing NS2 modules.  C++ defines the internal mechanism of the simulation objects   Used when dealing with a packet Used when need to modify existing NS2 modules.
  • 7. Node used as a Router
  • 9. How to write tcl script program to create a program… Five steps to create a tcl script programming:  Initialization and termination aspects of network simulator  Defining the network nodes ,links, queues and topology  Defining the agents and their application  NAM  Tracing
  • 10. Example..  To create new simulation use this command:Set ns [new Simulator]  To create a new node : Set n0 [ns node]  To create trace file : set tracefile1 [open out.tr w] $ns trace-all $tracefile1
  • 11. Example…. (cont.)   To create a NAM file set namfile1 [open out.nam w] $ns namfile1-all $namfile1 To terminate the program : Proc finish {} { global ns tracefile1 namfile1 $ns flush-trace close $tracefile close $namfile exec nam out.nam exit 0
  • 12. TCP(Transmission Control Protocol)  Connection Oriented Reliable Protocol  Consisting of three phases of operation  Connection setup  Data setup  Connection termination
  • 13. Objective of TCP      Adapt the transmission rate of packets to the available bandwidth. Avoid congestion at the network. Create a reliable connection by retransmitting lost packet We measure the performance of TCP on noisy links using Queue monitoring. How the window size vary in network congestion.
  • 14. UDP(User Datagram Protocol)  Connectionless transport-layer protocol  No connection setup is needed prior to data transfer  Offers minimal transport layer functionalities  non-guaranteed data delivery  gives application a direct access to  network layer
  • 16. Basic Agents   Two types of NS2 agent used for creating or destroying a packet are : Routing agent A routing agent creates and receives routing control packets, and commands routing protocols to act accordingly .  Transport-layer agent A transport-layer agent controls the congestion and reliability of a data flow based on an underlying transport layer protocol (e.g.,UDP or TCP)
  • 17. ADHOC
  • 18. INTRODUCTION    Ad-hoc networks are infrastructure-less. The interconnected nodes coordinate the transmissions with other nodes and they may have to relay messages among several other nodes in order to reach a destination. An ad-hoc network is a self-configuring network of wireless links connecting mobile nodes, where these nodes may be routers and/or hosts.
  • 20. Multiple Channels and Multiple Interfaces     Due to the increasing throughput demand, the idea of exploiting multiple channels is appealing in ad-hoc wireless networks . Having more than one interface on a node allows two different nodes communicating in parallel on different channels . An interface has a capability to dynamically switch to different channels over time. Two adjacent nodes can communicate with each other if they have at least one interface on a common channel.
  • 21. Problems occurred In a wireless ad-hoc network consisting of multiple hops, if each node only uses a single interface, packets may be delayed at some hops if their next hops are not on the same channel.  End-to-end delay increases.  Degradation in channel capacity. 
  • 22. Solution    A multi-interface solution for exploiting multiple channels that can be implemented on existing IEEE 802.11 hardware. An interface assignment strategy using the technique of interface switching , that simplifies coordination among nodes while utilizing multiple available channels. A routing protocol, namely the MultipleChannel Routing (MCR), that selects routes with the highest throughput by accounting for channel diversity and interface switching cost.
  • 24.
  • 25. Routing protocols used in ADHOC network  AODV (Ad-Hoc On Demand Distance Vector)  DSR (Dynamic Source Routing)  DSDV (Destination Sequenced Distance Vector)
  • 26. AODV  Routing protocol for wireless Ad-Hoc network  Reactive routing protocol, meaning that it establishes a route to a destination only on demand  avoids the counting-to-infinity problem using sequence numbers on route updates  Capable of unicast and multicast routing .
  • 28. Features…  Routes established on demand and that destination sequence numbers are applied to find the latest route to the destination  Connection setup delay is lower
  • 29. DSR (Dynamic Source Routing)  DSR is designed for MANETs  DSR doesn’t need any network infrastructures   Loop free routing No routing information in the intermediate nodes  Nodes may easily cache this routing information for future use
  • 30. DSR Mechanisms  Route discovery  Route maintenance  Mechanisms “on-demand”    No periodic routing advertisement No link status sensing No neighbor detection packets  Routes caching
  • 31. Basic DSR Route Maintenance    Each node transmitting the packet is responsible for confirming that the packet has been received by next hop. Acknowledgement  By lower layer protocol MAC  By DSR-specific software ack Route errore message
  • 32. DSDV(Destination Sequenced Distance Vector )  Each node maintains a routing table which stores    next hop, cost metric towards each destination a sequence number that is created by the destination itself Each node periodically forwards routing table to its neighbours  Each node increments and appends its sequence number when sending its local routing table  Each route is tagged with a sequence number; routes with greater sequence numbers are preferred  Each node advertises a monotonically increasing even sequence number for itself When a node finds that a route is broken, it increments the sequence number of the route and advertises it with infinite metric Destination advertises new sequence number  
  • 33. Advantages of DSDV  DSDV is an efficient protocol for route discovery. Whenever a route to a new destination is required, it already exists at the source.  Hence, low.  DSDV latency for route discovery is very also guarantees loop-free paths.
  • 34.
  • 35. Virtual LAN( VLAN): A virtual LAN is a group of devices in the same broadcast domain or subnet.  VLANs are good at logically separating traffic between different groups of users  VLANs contain/isolate broadcast traffic, where you need a router to move traffic between VLANs.
  • 37. Configuration of VLAN in NS2: 1) Create a Network Bridge: Firstly we have to create a network bridge using the add call. We have to use net_vlanType as a data type for the net_device element.
  • 38. To attach an adapter to be a bridge, we have to use following parameter’s : id: the name of a physical LAN or VLAN adapter that you would like to plug into the bridge (e.g. eth0, eth1.5).  Network_id: a virtual network ID that you would like to attach the network adapter to. If an adapter is already connected to a bridge and you pass a different network ID, the adapter will be disconnected from the old bridge and connected to the new bridge. To detach an adapter from a bridge, leave the network_id element empty. 
  • 39. cont.  vlan_id -- the VLAN adapter ID. When attaching/detaching a physical network adapter, leave the element empty.  base_device_id -- the name of the physical network adapter with which the VLAN adapter is associated. When attaching/detaching a physical adapter, leave the element empty.
  • 41. eth1.1 bridged with eth0.1 and eth2.2 bridged with eth0.2  This configuration implements a VLAN switch with two access ports (port eth1 for VLAN 1 and port eth2 for VLAN 2) and a trunk port eth0 capable of carrying frames with VLAN ID either 1 or 2 in its 802.1q tag. Now, consider another switch with exactly the same configuration. Then, the trunk ports of the switches are connected.
  • 42. Cont.  Now device connected to port eth1 of switch 1 and that connected to port eth1 of switch 2 can interchange frames with VLAN ID 1. The same is the case with eth2 on both the switches.  Two VLANs span across 2 switches. There is no bridging/routing 'between' these two VLANs. So, this works like a perfect VLAN switch.
  • 43. What is actually happening is : All the untagged frames from eth1 pass through the bridge and goes out of eth0 as untagged frame.  All the frames with VLAN ID 2 entering eth2 gets untagged at eth2.2, gets bridged to eth0.2, gets tagged with VLAN ID 2 at eth0 and goes out of the trunk as tagged frame. 
  • 44. How we can implement it in NS2:       I have 3 Ethernet interfaces, eth0, eth1 and eth2. I am planning to convert it into a VLAN switch. Let eth1 and eth2 are configured for VLAN 1 and 2 respectively. Let eth0 be a trunk carrying both VLAN frames. $vconfig add eth1 1 $vconfig add eth2 2 $vconfig add eth0 1 $vconfig add eth0 2
  • 45. Cont.  $brctl addbr br1  $brctl addif br1 eth0.1  $brctl addif br1 eth1.1  $brctl addbr br2  $brctl addif br2 eth0.2  $brctl addif br2 eth1.2
  • 46. Cont.  The basic idea of the above configuration is based on the fact that each VLAN can be simulated with individual bridges per VLAN. The above configuration works fine as expected. eth0 acts as trunk carrying frames with both VLAN IDs(1 and 2). This trunk can be connected to a similar switch on the other end to span the VLAN segmentation across switches.
  • 47. Benefits of VLAN:    Higher performance - Dividing flat Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and increases performance. Security - Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Cost reduction - Cost savings result from less need for expensive network upgrades and more efficient use of existing bandwidth and uplinks.