Escolar Documentos
Profissional Documentos
Cultura Documentos
SUBMITTED BY
Name : Ankit Ghosh
ID : 2015UCP1467
ASSIGNMENT - 1
2. Tasks Performed : A Point-to-Point network topology between nodes is taken, where two
nodes are communicating over network via p2p channel.
3. Steps Involved :
a. Topology Creation : Node0-----Node1-----Node2
b. Configuration :
i. Client : Node 0
ii. Server : Node 2
iii. MAC Protocol : CSMA/CA
iv. Type of Connection : Point-to-Point
v. Type of Traffic : UDP
c. Simulation : The above network configuration was simulated on NS3.
Packets Lost 2 3
6. Conclusion : Flow Monitor is used to collect and store performance data from simulation.
This module uses probes installed in network nodes to track the packets exchanged by the
nodes and measures a number of parameters. Packets are divided according to the flow.
ASSIGNMENT - 2
1. Objective : Design and configure a sample network model with two LANs connected
Point-to-Point, collect statistics and analyze network performance.
3. Steps Involved :
a. Topology Creation :
10.1.1.0
n1 n2 n3 n4 ---------------- n5 n6 n7 n8
| | | | point-to-point | | | |
=========== ==========
b. Configuration :
i. MAC Protocol : CSMA/CA
ii. Type of Connection : Point-to-Point
iii. Type of Channel : Wired Channel
iv. Type of Traffic : UDP
c. Simulation : The above network configuration was simulated on NS3.
5. Outputs/Results :
Packets Lost 0 0
6. Conclusion : Flow Monitor is used to collect and store performance data from
simulation. This module uses probes installed in network nodes to track the packets
exchanged by the nodes and measures a number of parameters. Packets are divided
according to the flow.
ASSIGNMENT - 3
1. Objective : Create a wireless network with two Wifi access points and send data between
nodes, connected to different access points.
2. Tasks Performed: In our simulation data packets are sent between two wireless nodes
via different access points which are connected by Point-to-Point channel. Two separate
wireless channels have been created with base addresses 10.1.2.0 and 10.1.3.0
respectively.
3. Steps Involved:
a. Topology Creation :
p2p
n4 n3 n2 n0 ------- n1 n5 n6 n7
* * * | | * * *
AP1 AP2
b. Configuration :
i. Type of Nodes : CSMA (Wifi Nodes), p2p (Access Point)
ii. Type of Connection : Point-to-Point
iii. Type of Channel : Wireless Channel
iv. Type of Traffic : UDP
v. Mobility Model : Grid Position
1. MinX : 0.0
2. MinY : 0.0
3. DeltaX : 5.0
4. DeltaY : 10.0
5. GridWidth : 3
6. LayoutType : RowFirst
c. Simulation : The above network configuration was simulated on NS3.
5. Outputs/Results :
a. At time 2.00000 sec Client (10.1.3.3:49153) sent 1024 bytes to Server (10.1.2.2:9)
b. At time 2.01772 sec Server (10.1.2.2:9) received 1024 bytes from Client
(10.1.3.3:49153)
c. At time 2.01772 sec Server (10.1.2.2:9) sent 1024 bytes to Client (10.1.3.3:49153)
d. At time 2.03965 sec Client (10.1.3.3:49153) received 1024 bytes from Server
(10.1.2.2:9)
6. Conclusion : In wireless medium two nodes have to communicate via Access Points
only. And also in ideal conditions all the packets are received whereas in the case of path
loss, packet loss will be there.
ASSIGNMENT - 4.1
1. Objective : Create a scenario for Hidden Terminal with RTS/CTS enabled and disabled.
Find the packet drop in both the scenario.
2. Tasks Performed : Network Scenario for Hidden Terminal is created. Maximum
Wireless Range is set to 5m to produce a hidden node scenario.
3. Steps Involved :
a. Topology Creation : [node 0] <-- -50 dB --> [node 1] <-- -50 dB --> [node 2]
b. Configuration :
i. Mobility Model : Constant Position Model
ii. Type of Channel : Wireless Channel
iii. Type of Traffic : UDP
iv. Type of Application : On-Off
v. Type of Stream: CBR (Constant Bit Rate)
c. Simulation : The above network configuration was simulated on NS3.
5. Outputs/Results :
a. With RTS/CTS :
7. Conclusion : Performance is better with RTS/CTS packets as we can analyze from the
results that almost double packets are received with RTS/CTS technique.
ASSIGNMENT - 4.2
1. Objective : Create a scenario for Exposed Terminal with RTS/CTS enabled and disabled.
Find the packet drop in both the scenario.
2. Tasks Performed : Network Scenario for Exposed Terminal is created. Maximum
Wireless Range is set to 5m to produce a exposed node scenario. Wifi Ad-hoc network is
created for the same.
3. Steps Involved :
a. Topology Creation : [n0] <-- -50 dB --> [n1] [n2] <-- -50 dB --> [n3]
b. Configuration :
i. Mobility Model : Constant Position Model
ii. Type of Channel : Wireless Channel
iii. Type of Traffic : UDP
iv. Type of Application : On-Off
v. Type of Stream: CBR (Constant Bit Rate)
5. Outputs/Results :
a. With RTS/CTS :
d. Without RTS/CTS :
ASSIGNMENT - 5
1. Objective : Explain how the link failures are handled in AODV with an example.
2. Tasks Performed: Firstly 10 nodes are created separated by 100 m distance and
communication among these nodes is simulated for 100 sec using AODV protocol. Then
one intermediate node is removed to see how AODV handles these type of failures.
3. Steps Involved :
a. Topology Creation : n1<-- step --> n2 <-- step --> n3 <-- step --> n4 --> n5 -->
n6 --> n7 --> n8 --> n9--> n10
5. Outputs/Results :
Received Packets 23
Packet Lost 73
6. Observations : Packet loss depends upon many factors like simulation time, distance
between the nodes,etc.
ASSIGNMENT - 6
1. Objective: Simulate the DSDV routing protocol and evaluate the performance.
2. Tasks Performed: We have taken 10 nodes for the network and we have simulated it for
5 sec with 5 sink nodes using DSDV protocol.
3. Steps Involved :
● Topology Creation : n1<-- step --> n2 <-- step --> n3 <-- step --> n4 --> n5 -->
n6 --> n7 --> n8 --> n9--> n10
● Configuration :
○ Type of Nodes : Wifi Nodes, Sink Nodes
○ Type of Channel : Wireless Channel
○ Type of Traffic : UDP
○ Mobility Model : Grid Position
■ MinX : 0.0
■ MinY : 0.0
■ DeltaX : 0
■ DeltaY : 0
■ GridWidth : nwifi
■ LayoutType : RowFirst
5. Outputs/Results :
6. Conclusion :
The availability of paths to all destinations in network always shows that less delay is
required in the path set up process.
The method of incremental update with sequence number labels, marks the existing wired
network protocols adaptable to Ad-hoc wireless networks. Therefore, all available wired
network protocol can be useful to ad hoc wireless networks with less modification.