Networked Computers, Routers And Data Links

Better Essays

networked computers, routers and data links, network simulators are relatively fast and inexpensive. They allow engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware- for instance, simulating the effects of sudden bursts in the traffic or a Dos attack on a network service. Networking simulators are particularly useful in allowing designers to test new networking protocols or changed to existing protocols in a controlled and reproducible environment. Network simulators simulate and then analyze the effect of various parameters on the network performance. Typical network simulators encompasses a wide range of networking technologies and help the users to build complex networks from …show more content…

REAL is a network simulator originally intended for studying the dynamic behaviour of flow and congestion control schemes in packet switched data network. NS2 is available on several platforms such as FreeBSD, Linux, Sim OS and Solaris. NS2 also builds and runs under Windows. Figure 5.2 Simplified user’s view of NS C). Node Basics The basic primitive for creating a node is set ns[new Simulator] $ns node The instance procedure node constructs a node out of simpler classifier objects. All nodes contain the following components: 1. An address or id_, monotonically increasing by 1 (from initial value o) across the simulation namespace as nodes are created 2. A list of neighbors (neighbor_) 3. A list of agents (agent_) 4. A node type identifier (node type_) D). Node Methods: Configuring the Node Procedures to configure an individual node can be classified into: 1. Control functions 2. Address and Port number management, unicast routing functions 3. Agent management V. SIMULATION AND RESULTS Figure 5.3 Communications between Cluster head to source Node Simulate a heterogeneous multihop wireless network by randomly deploying 55 nodes in an area of 1;000 m_1;000 m: n is the number of nodes having low and medium trust values. The number of nodes having high trust values is 55 _ n and their trust values are uniformly distributed in [0.8, 1). The number of nodes having low trust values is b0:67 _ nc and their trust values are

Get Access