NetSim User Manual
NetSim User Manual
Contents
1
3 Simulating different networks in NetSim ............................................ 50
3.1 Internetworks.............................................................................................................................. 50
3.1.1 New Experiment............................................................................................................ 50
3.1.2 Create Scenario ............................................................................................................. 50
3.1.3 Set Node, Link and Application Properties ................................................................... 51
3.1.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 52
3.1.5 Run Simulation .............................................................................................................. 52
3.1.6 Sample Experiment ....................................................................................................... 52
3.1.7 IP Addressing in NetSim ................................................................................................ 52
3.1.8 SINR, BER and Propagation models for 802.11 a, b, g and n ........................................ 53
3.1.9 Features in WLAN 802.11n/ac ...................................................................................... 59
3.2 Legacy Networks ......................................................................................................................... 65
3.2.1 New Experiment............................................................................................................ 65
3.2.2 Create Scenario ............................................................................................................. 65
3.2.3 Set Node, Link and Application Properties ................................................................... 65
3.2.4 Modifying/Viewing/Accepting Properties .................................................................... 66
3.2.5 Enable Packet Trace (Optional) ..................................................................................... 66
3.2.6 Run Simulation .............................................................................................................. 66
3.3 Advanced wireless networks MANET & Wi-Max ..................................................................... 67
3.3.1 New Experiment............................................................................................................ 67
3.3.2 Create Scenario ............................................................................................................. 67
3.3.3 Set Node, Link and Application Properties ................................................................... 67
3.3.4 Modifying/Viewing/Accepting Properties .................................................................... 68
3.3.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 69
3.3.6 Sample Experiment ....................................................................................................... 69
3.3.7 Run Simulation .............................................................................................................. 69
3.3.8 Link Layer Acknowledgements and Network Layer Acknowledgements in DSR .......... 70
3.4 BGP .............................................................................................................................................. 72
3.4.1 New Experiment............................................................................................................ 72
3.4.2 Create Scenario ............................................................................................................. 72
3.4.3 Set Node, Link and Application Properties ................................................................... 72
3.4.4 Modifying/Viewing/Accepting Properties .................................................................... 73
3.4.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 73
3.4.6 Run Simulation .............................................................................................................. 74
2
3.4.7 Sample Experiment ....................................................................................................... 74
3.5 MPLS............................................................................................................................................ 75
3.5.1 New Experiment............................................................................................................ 75
3.5.2 Create Scenario ............................................................................................................. 75
3.5.3 Modifying/Viewing/Accepting Properties .................................................................... 75
3.5.4 Enable Packet Trace (Optional) ..................................................................................... 76
3.5.5 Run Simulation .............................................................................................................. 76
3.6 Cellular Networks GSM/CDMA ................................................................................................ 77
3.6.1 New Experiment............................................................................................................ 77
3.6.2 Create Scenario ............................................................................................................. 77
3.6.3 Set Node, Link and Application Properties ................................................................... 77
3.6.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 78
3.6.5 Run Simulation .............................................................................................................. 78
3.6.6 Sample Experiment ....................................................................................................... 79
3.7 Wireless Sensor Network ............................................................................................................ 80
3.7.1 New Experiment............................................................................................................ 80
3.7.2 Create Scenario ............................................................................................................. 80
3.7.3 Set Node, Link and Application Properties ................................................................... 80
3.7.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 80
3.7.5 Run Simulation .............................................................................................................. 81
3.7.6 Sample Experiment ....................................................................................................... 81
3.7.7 SINR, BER and Propagation models for 802.15.4 .......................................................... 81
3.8 Internet of Things ........................................................................................................................ 85
3.8.1 New Experiment............................................................................................................ 85
3.8.2 Introduction .................................................................................................................. 85
3.8.3 Create Scenario ............................................................................................................. 86
3.8.4 Set Node, Link and Application Properties ................................................................... 86
3.8.5 Enable Packet Trace, Event Trace & Dynamic Metrics(Optional) ................................. 88
3.8.6 Run Simulation .............................................................................................................. 88
3.8.7 Sample Experiment ....................................................................................................... 88
3.9 Zigbee .......................................................................................................................................... 89
3.9.1 New Experiment............................................................................................................ 89
3.9.2 Create Scenario ............................................................................................................. 89
3.9.3 Modifying/Viewing/Accepting Properties .................................................................... 89
3
3.9.4 Set Node, Link and Application Properties ................................................................... 89
3.9.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 90
3.9.6 Run Simulation .............................................................................................................. 91
3.9.7 Sample Experiment ....................................................................................................... 91
3.9.8 SINR, BER and Propagation models for 802.15.4 .......................................................... 91
3.10 Cognitive Radio ........................................................................................................................ 95
3.10.1 New Experiment............................................................................................................ 95
3.10.2 Create Scenario ............................................................................................................. 95
3.10.3 Set Node, Link and Application Properties ................................................................... 95
3.10.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 96
3.10.5 Run Simulation .............................................................................................................. 97
3.10.6 Sample Experiment ....................................................................................................... 97
3.11 LTE ............................................................................................................................................. 98
3.11.1 New Experiment............................................................................................................ 98
3.11.2 Create Scenario ............................................................................................................. 98
3.11.3 Set Node, Link and Application Properties ................................................................... 98
3.11.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) ................................ 99
3.11.5 Run Simulation ............................................................................................................ 100
3.11.6 Sample Experiment ..................................................................................................... 100
3.12 Military Radio TDMA link 16 ................................................................................................ 101
3.12.1 New Experiment.......................................................................................................... 101
3.12.2 Create Scenario ........................................................................................................... 101
3.12.3 Set Node Properties .................................................................................................... 101
3.12.4 Set Environment Properties ........................................................................................ 102
3.12.5 Modifying/Viewing/Accepting Properties .................................................................. 103
3.12.6 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional) .............................. 103
3.12.7 Run Simulation ............................................................................................................ 103
3.12.8 Sample Experiment ..................................................................................................... 103
4
4.5 Video ......................................................................................................................................... 107
4.6 FTP............................................................................................................................................. 110
4.7 Database ................................................................................................................................... 111
4.8 Peer to Peer .............................................................................................................................. 112
4.9 HTTP .......................................................................................................................................... 112
4.10 Email........................................................................................................................................ 113
4.11 Sensor App .............................................................................................................................. 113
4.12 Erlang Call................................................................................................................................ 114
4.13 Emulator.................................................................................................................................. 115
4.14 Priority and QoS of Applications ............................................................................................. 116
4.15 Modelling Poisson arrivals in NetSim...................................................................................... 117
6
9.5 Programming Exercises ............................................................................................................. 231
9.5.1 Address Resolution Protocol ....................................................................................... 231
9.5.2 Assignment of Sites to Concentrator .......................................................................... 234
9.5.3 Cryptography - Substitution - Encryption ................................................................... 237
9.5.4 Cryptography - Substitution - Decryption ................................................................... 239
9.5.5 Cryptography - Transposition - Encryption ................................................................. 242
9.5.6 Cryptography - Transposition Decryption ................................................................ 243
9.5.7 Cryptography - XOR - Encryption ................................................................................ 246
9.5.8 Cryptography - XOR - Decryption ................................................................................ 247
9.5.9 Cryptography - Data Encryption Standard (DES) - Encryption .................................... 250
9.5.10 Cryptography - Data Encryption Standard (DES) - Decryption.................................... 253
9.5.11 Rivest-Shamir - Adleman Algorithm (RSA) .................................................................. 258
9.5.12 Cryptography - Wired Equivalent Privacy (WEP) Encryption ................................... 260
9.5.13 Cryptography - Wired Equivalent Privacy (WEP) - Decryption ................................... 262
9.5.14 Distance Vector Routing ............................................................................................. 265
9.5.15 Distance Host Configuration Protocol......................................................................... 268
9.5.16 Error Correcting Code - Hamming Code ..................................................................... 271
9.5.17 Error Detection Code - Cyclic Redundancy Check (CRC) - 12 ...................................... 274
9.5.18 Error Detection Code - Cyclic Redundancy Check (CRC) 16 ..................................... 277
9.5.19 Error Detection Code - Cyclic Redundancy Check (CRC) - 32 ...................................... 280
9.5.20 Error Detection Code - Cyclic Redundancy Check (CRC) CCITT ................................ 283
9.5.21 Error Detection Code - Longitudinal Redundancy Check (LRC) .................................. 286
9.5.22 Framing Sequence Bit Stuffing ................................................................................. 288
9.5.23 Framing Sequence Character Stuffing...................................................................... 292
9.5.24 Virtual Scheduling Algorithm ...................................................................................... 295
9.5.25 Address Mask .............................................................................................................. 298
9.5.26 Binary Conversion ....................................................................................................... 300
9.5.27 Classless InterDomain Routing.................................................................................... 304
9.5.28 Network Address......................................................................................................... 308
9.5.29 Special Addresses ........................................................................................................ 310
9.5.30 Subnetting ................................................................................................................... 312
9.5.31 EUI-64 Interface Identifier .......................................................................................... 315
9.5.32 IPV6 Host Addresses ................................................................................................... 318
9.5.33 IPV6 Subnetting........................................................................................................... 321
7
9.5.34 Leaky Bucket Algorithm .............................................................................................. 325
9.5.35 Multi Level Multi Access ............................................................................................. 328
9.5.36 Code Division Multiple Access .................................................................................... 330
9.5.37 Time Division Multiple Access..................................................................................... 336
9.5.38 Orthogonal Frequency Division Multiple Access ........................................................ 340
9.5.39 PC to PC Communication - Socket Programming TCP................................................. 345
9.5.40 PC to PC Communication - Socket Programming UDP ................................................ 350
9.5.41 PC to PC Communication Chat Application TCP ....................................................... 356
9.5.42 PC to PC Communication Chat Application UDP ...................................................... 361
9.5.43 Scheduling - First In First Out (FIFO) ........................................................................... 367
9.5.44 Scheduling - Max - Min Fair (MMF)............................................................................. 370
9.5.45 Shortest Path - Floyds ................................................................................................ 373
9.5.46 Shortest Path - Link State ............................................................................................ 377
9.5.47 Sliding Window Protocol - Go Back N ......................................................................... 380
9.5.48 Sliding Window Protocol - Selective Repeat ............................................................... 385
9.5.49 Sorting Technique - Bubble Sort ................................................................................. 390
9.5.50 Sorting Technique - Insertion Sort .............................................................................. 393
9.5.51 Sorting Technique - Quick Sort ................................................................................... 396
9.5.52 Sorting Technique - Selection Sort .............................................................................. 399
9.5.53 Spanning Tree Borovska ........................................................................................... 402
9.5.54 Spanning Tree Kruskal .............................................................................................. 405
9.5.55 Spanning Tree Prims................................................................................................. 408
9.5.56 Transmission Flow Control - Go Back N ...................................................................... 411
9.5.57 Transmission Flow Control - Selective Repeat ............................................................ 415
9.5.58 Transmission Flow Control - Stop and Wait ................................................................ 419
9.6 Programming exercise - How to practice without NetSim ....................................................... 423
8
10.3 Emulation examples in NetSim ............................................................................................... 434
10.3.1 Example Application 1 PING (One way Communication)......................................... 434
10.3.2 Example Application 1 PING (Two way Communication) ........................................ 436
10.3.3 Example Application 2 Video (One way Communication) ....................................... 437
10.3.4 Example Application 3 File Transfer using FileZilla (One way Communication) ...... 442
10.3.5 Example Application 4 Skype (Two way Communication) ........................................ 445
10.3.6 Example Application 5 JPerf Network performance measurement graphical tool
(One way Communication) ......................................................................................................... 447
9
12.4 Device properties does not revert to default values .............................................................. 461
12.5 No special characters in file path for Firewall config file ........................................................ 461
12.6 Incumbent ID in network and metrics not matching .............................................................. 461
12.7 BGP link speed issues .............................................................................................................. 461
12.8 Dynamic Metrics limit is 500 graphs ....................................................................................... 461
12.9 Running Application between unconnected nodes ................................................................ 462
12.10 RIP Hop count ....................................................................................................................... 462
12.11 Default gateway cant be empty ........................................................................................... 462
12.12 Simulating ATM scenario multiple times will crash NetSim ................................................. 462
12.13 Packet size limit in TDMA(Military Radio)............................................................................. 462
12.14 Removing link between switches leads to IP addressing issue............................................. 463
12.15 Packet animation simulation time bar is not functioning properly ion WSN, IOT. ............... 463
12.16 In IOT, Power model metrics results are zero....................................................................... 463
12.17 Traditional Ethernet, Frame Relay and X.25 networks crash ............................................... 463
10
1 NetSim Introduction
1.1 Introduction to modeling and simulation of networks
A network simulator enables users to virtually create a network along with its components
such as devices, links, and applications etc. to study the behavior and performance of the
Network.
Building the model Create a network scenario with devices, links, applications etc
Running the simulation - Run the discrete event simulation (DES) and log different
performance metrics
Visualizing the simulation- Use a packet animator to view the flow of packets
Analyzing the results - Examine output performance metrics such as throughput,
delay, loss etc. at multiple levels - network, sub network, link, queue, application etc.
Developing your own protocol / algorithm - Extend existing algorithms by
modifying the simulators source C code
11
1.2 Versions of NetSim Academic, Standard & Pro
NetSim is used by people from different areas such as academics, industry and defense to
design, simulate, analyze and verify the performance of different networks.
NetSim comes in three versions- Academic, Standard and Pro. The academic version is
used for lab experimentation and teaching. The standard version is used for project work and
research while Pro version addresses the needs of defense and industry. The standard and pro
versions are available as components in NetSim v9 from which users can choose and
assemble. The academic version is available as a single product and includes all the
technologies shown below. The main differences between the various versions are tabulated
below:
12
Integrated debugging
Users can write their own code, link their
code to NetSim and debug using Visual
Studio
Dynamic Metrics
Allows users to plot the value of a
parameter over simulation time
Emulator (Add on)
Connect to real hardware running live
application
Target Users and Pricing Educational Educational Commercial
13
1.3 Components in Pro and Standard versions
In NetSim v9, users can choose and assemble components for Pro and Standard version. The
components are as follows:
BGP Networks
Component 3
Border Gateway Protocol (BGP) IETF RFCs 1771 & 3121
14
Advanced Wireless Networks IETF RFC 4728, 3561,
Component 4 MANET - DSR, AODV, OLSR, ZRP 3626
Wi-Max IEEE 802.16d
15
2 Getting Started in NetSim
2.1 Installing NetSim in Client
Note: Based on the NetSim version under installation the version type being displayed in the
following windows will change. For example you will see NetSim Standard for a standard
version install
16
Read the agreement carefully, scroll down to read the complete license agreement. If the
requirement of the license agreement is accepted click I Agree button else quit the setup by
clicking Cancel button.
If you agree with the license agreement, you will be prompted to select the components to be
installed. The list of components is available for selection and assembly only in the Standard
and Pro version. Other versions of NetSim are available as a single package.
17
Click on the Install button to start the
installation.
18
Click on I accept the agreement and then
Next icon as shown above.
Click on Next.
19
In this screen, select Full installation and
components to be installed and select
Next. All the components are required
except Japanese language support:
20
Click Install to continue with the
installation, the following screen appears:
Click on Next.
21
For NetSim Standard Version and Pro Version, Wireshark installation will start by default ( if not
deselected during 3rd party software selection)
Click on I Agree.
22
Click on Next to go to Install Location window
as shown below.
23
Select Run NetSim and then click on the
Finish button.
Note: During the installation of NetSim Academic version the supporting software installed are
Adobe Flash player and WinPcap.
24
2.2 Setting up License Server
2.2.1 Installing NetSim RLM Dongle
This section guides you to install the RLM Dongle software from the CD-ROM.
Each prompt displayed during the process tells you what it is about to do and prompts to
either continue or Exit.
Setup prepares the installation wizard and the software installation begins with a Welcome
Screen.
25
Read the license agreement carefully,
scroll down to read the complete license
agreement. If the requirement of the
license agreement is accepted select the I
accept button else quit the setup by
clicking Cancel button.
26
After the installation of the software, you will be requested to click Finish button to complete
the installation process.
If the driver has been successfully installed then upon connecting the Dongle in the USB port
red light would glow (Refer picture below). If the driver is not correctly installed this light
will not glow when the dongle is connected to the USB port.
27
2.2.2 Running RLM Dongle (Server)
After the Driver Software installation, connect the RLM dongle to the system USB port.
Note: For running NetSim, rlm.exe must be running in the server (license server) system and
the server system IP address must be entered correctly. Without running rlm.exe, NetSim
wont run.
When you run rlm.exe, the screen will appear as shown below.
28
2.2.3 Running NetSim Software
29
2.3 Menus in NetSim
In Academic/Standard Version
Opens the Simulation menu consisting of New, Open, Delete and Analytics. User can
simulate Internetworks, Legacy, Cellular, BGP, Advanced Wireless Networks,
Wireless Sensor Networks, Internet of Things, ZigBee Networks, Cognitive Radio
Networks and LTE Networks.
In Pro Version
Opens the Simulation menu consisting of New, Open and Analytics. User can simulate
Internetworks, Legacy, Cellular, BGP, Advanced Wireless Networks, Wireless Sensor
Networks, Internet of Things, ZigBee Networks, Cognitive Radio Networks and LTE
Networks.
30
2.3.1 Simulation Menu
The Simulation menu contains options such as New, Open, Delete and Analytics.
2.3.1.1 New
Click on New and select the desired protocol from
Internetworks, Legacy, Cellular, BGP, Personal Area,
Advanced Wireless, Wireless Sensor, Internet of
Things, ZigBee Networks, Cognitive Radio and LTE
Networks to create a new network scenario.
2.3.1.2 Open
To open an already created network scenario (except Legacy Networks), go to Open
Network. For opening Legacy Network scenarios, go to Open Legacy Network.
2.3.1.3 Delete
To delete any Legacy Network scenario, go to Delete.
A. To delete any specific experiment, select Delete, then specify the User Name and
Experiment Name and click Delete.
B. To delete all experiments created by a user, select Delete All and specify the User
Name and click Delete.
2.3.1.4 Analytics
31
2.3.2 Programming Menu
The Programming menu contains network programming exercises. Click on this menu and
select the desired programming exercise.
Note: This menu is available only in Academic and Standard Version.
Upon selection, the following screen will appear. Please refer Section 9(NetSim
Academic/Standard User Manual) for detailed help.
Using the User mode users can link and run their
own source code.
32
2.3.3 Basics
In this menu, various network concepts are explained using animations. Note: This menu is
available only in Academic Version.
33
2.3.4 Utilities
2.3.5 Help
NetSim User Manual - It contains the documentation about the working of NetSim.
NetSim Source Code Help It contains the documentation about network protocol source
code (Available with NetSim Standard as well as Pro Version)
NetSim Experiment Manual It contains selected experiments which can be performed in
NetSim.
Shortcut Keys it contains shortcut keys for all menus and sub menus.
34
2.4 Modeling and Simulation of a simple network
This section will demonstrate how to create a basic network scenario and analyze in NetSim.
Let us say the subnet 1 consists of two wired nodes connected via a Switch and the other
subnet 2 is a wired node. Both the subnets are connected using a Router. Traffic in Network
is generated from a wired node in subnet 1 to the wired node in subnet 2.
Perform the following steps to create the network scenario which looks like this:
35
Step 1: Drop the devices
Click on the environment (the grid in the center) where you want
the Wired Node to be placed. In this way, place two more wired
nodes.
36
2.4.2 Configuring devices and links in the scenario
37
2.4.3 Modeling Traffic
After the network is configured, user needs to model traffic from Wired Node B to Wired
Node E.
Select the Application Button and click on the gap between the Grid Environment and the
ribbon. Now right click on Application and select Properties.
In above scenario, default values already present in the properties are accepted. The
Source_ID is 2 and Destination_ID is 5. Click on Accept.
38
2.4.4 Logging Packet/ Event Trace
If the user wants to analyze the simulation result using Packet and Event Trace, then they
need to be enabled before simulation.
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5 and 6.6 respectively.
2.4.5 Simulation
39
2.5 Network Opening, Saving, Deleting scenarios and
Printing results
2.5.1 Opening Saved Experiments
2.5.1.1 Open Network All Networks except Legacy Networks
Open saved experiment folder and select the configuration file you want to open.
Select the User (Note: This option is available in Admin login only)
40
Select the Network. Only Legacy Networks option will be present.
Select the Protocol(Note: Protocols present under Legacy Network will be displayed)
Select the Experiment
Click on Ok button to open the specified Experiment.
Click on Browse and select the Metrics.txt file (present with the saved experiment) you want
to open
41
2.5.1.4 Open Metrics Legacy Networks
Select the User (Note: This option is available in Admin login only)
Select the Network. Only Legacy Networks option will be present.
Select the Protocol(Note: Protocols present under Legacy Network will be displayed)
Select the Experiment
Click on Ok button to open the specified Experiment.
42
2.5.2 Saving an Experiment
2.5.2.1 For all Networks except Legacy Networks
Step 2: Specify the Experiment Name and Save Path and click on OK
Step 2: Specify the Experiment Name and Save Path and click on OK
43
2.5.3 Deleting Saved Experiments (Only for Legacy networks)
In the Simulation menu select Delete option to delete the saved Simulated Experiments.
To delete Experiments the user needs to follow the below given steps,
Click the Delete/Delete All button to enter into the next window.
Delete Click the Delete button to delete single experiment.
Delete All Click the Delete All button to delete all the saved experiments.
44
After clicking on the Delete button a message appears which says Are you
sure you want to delete this Experiment(s)? Click on Yes to continue
deleting the Experiment(s), else click on No to cancel deleting.
Click on OK button in the The experiment is deleted or The
experiments have been deleted window.
Note:
Admin User: An option called User Name is available only in when the User has
logged into Admin. This option can be made use for deleting experiments under
any User.
Local User: A User who has a normal privilege other than Admin can delete
experiments only which are created by that particular user.
45
2.6 Adding and deleting users (Not present in Pro version)
2.6.1 Adding New Users
This menu can be used to add new user, delete of existing users, and to set mode of working
(Exam/Practice) of the user. It is typically used by professors / administrators to add student
users, and then set the user to exam mode during assessments.
Add User - This button is used for creating new users. The following fields have to be
filled in,
o Username - Name of the new user needs to be entered in the field provided.
Delete User - This button is used for deleting the existing users.
Change Password - This button is used to change the password of the user which is
selected currently in the left side of the User Accounts. Administrator can change the
password of all the users, whereas other user (other than Administrator) can change
his/her password only.
Experiment Deletion Section: This section is used to delete the saved experiments in
NetSim. Administrator can delete the saved experiments of all the users, whereas other
user (other than Administrator) can delete his/her saved experiments only.
46
Note: Experiment Deletion Section can be used to delete the saved experiments in
Legacy Networks and MPLS. Saved experiments in Internetworks, BGP Networks,
Advanced Wireless Networks MANET and Fixed Wi-Max, Wireless Sensor
Networks, Internet of Things, ZigBee Networks, Cellular Networks, LTE Networks
and Cognitive Radio Networks cannot be deleted through Experiment Deletion
Section since these experiments are saved as configuration files in user specified
locations.
Select Admin present inside Add and Delete User panel and then click on Add User
Add User Name and Password, select the Mode of your choice.
o Practice Mode - Students will be able to get all the help that is associated with the
software. Saved experiments can be reused. If this mode is selected, then the user
would have access to
1. Under Simulation all the saved experiments in Simulation when the user is
in Practice mode can be opened and reused, deleted if they are not
required and Saved experiment can be used in the Analytics interface.
47
2. Under Programming Sample all help documents such Concepts,
Algorithm, Pseudo Code and Flowchart can be viewed.
3. Basics Menu,
4. NetSim Help.
o Exam Mode - Students will not be able to use the help associated with the
software. Also saved experiments in the Practice mode cannot be reused in the
Exam mode. If this mode is selected, then the user would have access to,
1. Under Simulation all the saved experiments in Simulation when the user is
in Exam mode can be opened and reused, delete if they are not
required and Saved experiment can be used in the Analytics interface.
You can view the newly added user in Add and Delete User panel.
48
2.6.2 Deleting User
In order to delete, you have to be logged in using Admin account. Then select the account
you want to delete and click on Delete User.
49
3 Simulating different networks in
NetSim
3.1 Internetworks
Internetwork simulation is available in NetSim with LAN-WAN-LAN modeling capability.
Internetwork runs Ethernet, Wireless LAN, IP Routing and TCP / UDP and allows users to
log packet and event (in NetSim Standard/Pro version only) traces.
Select the appropriate link in the toolbar and connect the devices by
clicking on the device 1 and device 2.
50
3.1.3 Set Node, Link and Application Properties
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. Routing Protocol in Application Layer of
router and all user editable properties in DataLink Layer and Physical Layer of Access
Point and Wireless Node are Global i.e. changing properties in one node will
automatically reflect in the others in that network..
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
51
3.1.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
When you create a network using the GUI, NetSim will automatically configure the IP
address of the devices in the scenario.
52
If you create a network with two wired nodes and a switch, the IP addresses are assigned as
10.0.1.2 and 10.0.1.3 for the two wired nodes. The default subnet mask is assigned to be
255.255.0.0. It can be edited to 255.0.0.0 (Class A) or 255.255.255.0 (Class C) subnet masks.
Both the nodes are in the same network (10.0.0.0).
Similarly, if you create a network with a router and two wired nodes, the IP addressed are
assigned as 11.1.1.2 and 11.2.1.2 for the two wired nodes. The subnet mask is default as in
above case, i.e., 255.255.0.0. The IP address of the router is 11.1.1.1 and 11.2.1.1
respectively for the two interfaces. Both the nodes are in different networks (11.1.0.0 and
11.2.0.0) in this case.
The code for calculating the received power is included in the file 802_11_PHY.c, path for
the file is NetSim Standard\src\Simulation\WLAN.
53
3.1.8.2 Propagation Loss
Three different and mutually independent propagation phenomena influence the power of the
received signal: path loss, shadowing and multipath fading.
Where L is the path loss in decibels, is the path loss exponent and d is the distance between
transmitter and the receiver, usually measured in meters.
A simplified formula for the path loss between two isotropic antennas in free space:
L (in dBm) = 20log10 (4d0/)
Where L is the path loss in decibels, _ is the wavelength and d is the transmitter-receiver
distance in the same units as the wavelength.
The code for calculating the Path loss is included in the function
fn_NetSim_WLAN_CalculateReceivedPower, which is present in the file 802_11_PHY.c,
path for the file is NetSim Standard\src\Simulation\WLAN.
3.1.8.2.2 Shadowing
Slow shadowing in wireless network is the attenuation caused by buildings or any obstacles
between a transmitter and a receiver. In the model with shadowing, the shadowing value X
typically defined in dB, is added to (or subtracted from) the average received power zero
means Gaussian distributed random variable with standard deviation. The default value for
standard deviation is chosen as 5 dB.
The code for calculating the shadow loss is present in file 802_11_PHY.c, path for the file is
NetSim Standard\src\Simulation\WLAN.
54
3.1.8.2.3 Fading
Analogous to the SNR used often in wired communications systems, the SINR is defined as
the power of a certain signal of interest divided by the sum of the interference power (from
all the other interfering signals) and the power of some background noise.
The interference power is the difference between the total power received by the receiver and
the power received from one particular transmitter.
Where f is the Bandwidth in Hertz. For 802.11a, b, g, f = 20 MHz, and for 802.11n, f =
20 MHz or 40 MHz.
Therefore, SNR (in dBm) = Power Received (in dBm) - PNoise (in dBm)
The bit error rate (BER) is the number of bit errors divided by the total number of transferred
bits during a studied time interval. The BER calculation has been done as a hash-table based
on the BER curves for different modulation schemes.
The code for calculating SNR and implementation of SNR vs. BER is included in the
function fn_NetSim_WLAN_802_11x_BER of the file 802_11_x.c (where x=a, b, g and n),
you can find it in the following path NetSim Standard\src\Simulation\WLAN.
55
SNR vs. BER curve for MPSK (where M=2k)
(Reference: From Page 221 Digital Communications by Bernard Sklar 2nd Edition)
56
SNR vs. BER curve for 5.5CCK and 11CCK
0
Bit Error Rate
10
10 -1
-2
10
5.5CCK
BER
-3
10
TextEnd 11CCK
10 -4
-5
10
-6
10
0 1 2 3 4 5 6 7 8 9 10
Eb/No
(Reference: Higher Rate 802.11b: Double the Data Rate Chris Heegard, Matthew Shoemake & Sid
Schrum Doc: IEEE 802.11-00/091)
(Reference: BER Comparison of M-ary QAM by Mukthar Hussain MATLAB File Exchange)
57
3.1.8.5 SNR vs. BER Table followed in NetSim
58
3.1.9 Features in WLAN 802.11n/ac
3.1.9.1 IEEE 802.11n Standard
Mac aggregation and block acknowledgement are two important enhancements to 802.11n
standard. In the aggregation scheme, several MPDUs (MAC Protocol Data Units) are
aggregated in to a single A-MPDU (Aggregated MPDU).
The A-MPDUs are created before sending to PHY layer for transmission. The MAC does
not wait for MPDUs before aggregation. It aggregates the already present packets in the
queue to form an A-MPDU. The maximum size of A-MPDU is 65535 bytes. The maximum
size of each MPDU is 4KB. In A-MPDU, each MPDU has a delimiter of 32bits at the
beginning and padding ate the end. These padding bytes ensure that size of MPDU is a
multiple of 4bytes.
In 802.11n, a single block acknowledgement is sent for the entire A-MPDU. The block ack
acknowledges each packet that is received. It consists of a bitmap(compressed bitmap) of
64bits or 8 bytes. This bitmap can acknowledge upto 64 packets, 1bit for each packet. The
value of a bitmap field is 1 if respective packet is received without error else it is 0. Only the
error packets are resent until a retry limit is reached. The number of packets in an A-MPDU
is restricted to 64 since the size of block ack bitmap is 64bits.
59
3.1.9.2 Details of 802.11 n implementation in NetSim
Packets arriving from the NETWORK Layer gets queued up in an access buffer from which
they are sorted according to their priority in the respective QOS buffer according to the IEEE
802.11e standard. An event MAC_OUT with SubEvent CS (Carrier Sense CSMA) is
added to check if the medium is free
In CS, if the medium is free, then the NAV is checked. This is enabled if RTS/CTS
mechanism is enabled which can be done so by adjusting the RTS Threshold. If the
60
Present_Time>NAV, then an Event MAC_OUT with SubEvent DIFS End is added at the
time Present_Time + DIFS time.
The medium is checked at the end of DIFS time period and a random time BackOff is
calculated based on the Contention Window (CW). An Event MAC_OUT with SubEvent
Backoff is added at time Present_Time + BackOff Time.
Once Backoff is successful, NetSimstarts the transmission process wherein it gets the
aggregated packet from the QOS buffer and stores it in the Retransmit buffer. If the A-MPDU
size is > RTS Threshold, then it enables RTS/CTS mechanism which is an optional feature.
NetSim sends the packet by calling the PHY_OUT Event with SubEventAMPDU_Frame.
Note that the implementation of A-MPDU is in the form of a linked list.
61
Whenever a packet is transmitted, the medium is made busy and a Timer Event with
SubEvent Update Device Status is added at the transmission end time to set the medium again
as idle.
At the receiver, the device de-aggregates the packet in the MAC Layer and generates a
block ACK which is sent to the transmitter. If the receiver is an intermediate node, the de-
aggregated packets are added to the access buffer of the receiver in addition to the packets
which arrive from Network layer. If the receiver is the destination, then the received packets
are sent to the Network layer. At the transmitter side, when the device receives the block
acknowledgement, it retransmits only those packets which are errored. The rest of the packets
are deleted from the retransmit buffer. This is done till all packets are transmitted successfully
or a retransmit limit is reached after which next set of packets are aggregated to be sent.
62
MAC layer improvements include only the increment of number of aggregated packets from
64 to 1024. The MCS index for different modulation and coding rates
0 BPSK 1/2
1 QPSK 1/2
2 QPSK 3/4
3 16QAM 1/2
4 16QAM 3/4
5 64QAM 2/3
6 64QAM 3/4
7 64QAM 5/6
8 256QAM 3/4
9 256QAM 5/6
Receiver sensitivity for different modulation schemes in 802.11ac (for a 20MHz Channel
bandwidth)
0 -82
1 -79
2 -77
3 -74
4 -70
5 -66
6 -65
7 -64
8 -59
9 -57
63
Number of subcarriers for different channel bandwidths
Capacity relative to
PHY Standard Subcarriers
20MHz in 802.11ac
Now with the knowledge of MCS index and bandwidth of the channel data rate is set in the
following manner
Step1: Get the number subcarriers that are usable for the given bandwidth of the medium.
Step2: Get the Number of Bits per Sub Carrier (NBPSC) from selected MCS
Step5: Physical level Data Rate = NDBPS/Symbol Time (4micro sec for long GI and 3.6
micro sec for short GI)
64
3.2 Legacy Networks
3.2.1 New Experiment
In the Simulation menu select New
Legacy Networks
For example, to arrive Pure Aloha,
In the Simulation menu select New
Legacy Networks Pure Aloha.
Adding Hub:
Click on the Hub icon in the tool bar and click it onto the environment. By default a Hub
has eight ports. (Note: This is applicable for Traditional Ethernet and Token Bus)
Adding Concentrator:
Click on the Concentrator icon in the tool bar and click it onto the environment. By
default a Concentrator consists of eight ports. (Note: This is applicable for Token Ring)
65
Switch to Switch.
(Note: Depending upon the simulation, choose either ATM Switch or X.25 Switch or Frame
Relay Switch)
Set Node Properties or CPE Properties
On opening an already configured properties of an application the input fields will be frozen
(i.e. the input cannot be changed).To modify these values click on the Modify button in the
screen. Now the input value can be changed. Click on the Accept button, the modified values
will be saved.
This View button is enabled once the Accept Button is clicked. To view the given values,
click on the View button.
Click Packet Trace icon in the tool bar. Set the name and path and select the required
attributes. To get detailed help, please refer section 6.5respectively. Select Dynamic Metrics
icon for enabling Dynamic Metrics and click OK.
66
3.3 Advanced wireless networks MANET & Wi-Max
3.3.1 New Experiment
Adding Base Station and Subscriber (Note: This is applicable for Wi-
MAX)
Click on the Base Station icon in the tool bar and click it onto the
environment.
Click on the Wi-Max Subscriber icon after clicking Node icon in the
tool bar. Click and drop it onto the environment.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements.
o In case of Wi-Max, Routing Protocol in Application Layer of router and all user
editable properties in DataLink Layer and Physical Layer of Access Point and
Wireless Node are Global i.e. changing properties in one node will automatically
reflect in the others in that network.
67
o In case of MANET, in Wireless Node, Routing Protocol in Network Layer and all
user editable properties in DataLink Layer, Physical Layer and Power are Global
i.e. changing properties in one node will automatically reflect in the others in that
network.
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
68
3.3.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
If user wants to implement HTTP application among Nodes, TCP must be enabled in
Source Node as TCP is set to disable by default.
69
OLSR is a proactive link-state routing protocol, which uses hello and topology control
(TC) messages to discover and then disseminate link state information throughout the
mobile ad hoc network. Individual nodes use this topology information to compute
next hop destinations for all nodes in the network using shortest hop forwarding paths.
For topology control (TC) messages to disseminate throughout, it requires 5 or more
seconds depending upon the network size. In general, it is (5.5 secs + Tx_Time *
network size). Hence an application must start at least 6-7 seconds after the network
commences and it can be done by setting the Starting time parameter in
Application.
Route Maintenance is the mechanism by which a source node S is able to detect, while
using a source route to some destination node D, if the network topology has changed such
that it can no longer use its route to D because a link along the route no longer works.
If the MAC protocol in use provides feedback as to the successful delivery of a data packet
(such as is provided for unicast packets by the link-layer acknowledgement frame defined by
IEEE 802.11), then the use of the DSR Acknowledgement Request and Acknowledgement
options is not necessary. If such link-layer feedback is available, it SHOULD be used instead
of any other acknowledgement mechanism for Route Maintenance, and the node SHOULD
NOT use either passive acknowledgements or network-layer acknowledgements for Route
Maintenance.
70
protocol; the time at which the acknowledgement is expected to arrive and the time at which
the next retransmission attempt (if necessary) will occur are controlled by the MAC protocol
implementation.
71
3.4 BGP
3.4.1 New Experiment
Establishing Connections
The steps for connecting devices in BGP networks are as follows,
The connections between two wired nodes cannot be made in the network.
The connection possibilities are
Wired Node to Internal Router
Internal Router to Border Router
Border Router to Border Router
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. Routing Protocol in Application Layer of
router and all user editable properties in DataLink Layer and Physical Layer of Access
Point and Wireless Node are Global i.e. changing properties in one node will
automatically reflect in the others in that network.
72
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
This View button is enabled once the Accept Button is clicked. To view the given values,
click on the View button.
3.4.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
73
3.4.6 Run Simulation
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
74
3.5 MPLS
3.5.1 New Experiment
Adding Router - Click on the Router icon in the tool bar, click and drop the Router on the
environment. By default a Router has eight ports.
Establishing Connections
The steps for connecting CPE and Router are as follows:
On opening an already configured properties of an application the input fields will be frozen
(i.e. the input cannot be changed).To modify these values click on the Modify button in the
screen. Now the input value can be changed. Click on the Accept button, the modified values
will be saved.
This View button is enabled once the Accept Button is clicked. To view the given values,
click on the View button.
75
3.5.4 Enable Packet Trace (Optional)
Click Packet Trace icon in the tool bar. Set the name and path and select the required
attributes. To get detailed help, please refer section 6.5 respectively. Select Dynamic Metrics
icon for enabling Dynamic Metrics and click OK.
76
3.6 Cellular Networks GSM/CDMA
3.6.1 New Experiment
Adding Base Transceiver Station (BTS) - Click on the BTS icon in the toolbar and click it
onto the environment.
Adding Mobile Switching Centre (MSC) - Click and drop MSC in the environment.
Adding Mobile Station (MS) -
Click on the Mobile Station icon in the tool bar, click and drop it on the Base Station
coverage area.
Mobile Station cannot be placed on another Mobile Station. It has to be clicked and
placed on the Base Station coverage area.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements.
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
77
3.6.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
78
3.6.6 Sample Experiment
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
79
3.7 Wireless Sensor Network
3.7.1 New Experiment
In the Simulation menu select Simulation
New Wireless Sensor Networks
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. In Sensor Node, Routing Protocol in Network
Layer and all user editable properties in DataLink Layer, Physical Layer and Power are
Global i.e. changing properties in one node will automatically reflect in the others in that
network.
Set the values according to requirement and click Accept.
3.7.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
80
3.7.5 Run Simulation
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
SINR Calculation:
Analogous to the SNR used often in wired communications systems, the SINR is defined as
the power of a certain signal of interest divided by the sum of the interferencepower (from all
the other interfering signals) and the power of some background noise.
The interference power is the difference between the total power received by the receiver and
the power received from one particular transmitter.
P (in dBm) =
( )
P (in mW) =
81
Therefore, SINR in dBm is calculated as:
The bit error rate (BER) is the number of bit errors divided by the total number of transferred
bits during a studied time interval. The BER results were obtained using the analytical model
from IEEE standard 802.15.2-2003 [B9]. The calculation follows the approach outlined in
5.3.2 of that standard.
( ( ))
BER = ( ) ( ) ( )
Propagation Loss:
Three different and mutually independent propagation phenomena influence the power of the
received signal: path loss, shadowing and multipath fading.
Shadowing:
Slow shadowing in wireless network is the attenuation caused by buildings or any obstacles
between a transmitter and a receiver. In the model with shadowing, the shadowing value X,
typically defined in dB, is added to (or subtracted from) the average received power. X is a
zero means Gaussian distributed random variable with standard deviation .
82
Path Loss:
Path loss can be represented by the path loss exponent, whose value is normally in the range
of 2 to 4, where 2 is for propagation in free space and 4 is for relatively loss environments. In
NetSim, the default value for path loss exponent is taken as 2.
Path loss is usually expressed in dB. In its simplest form, the path loss can be calculated
using the formula
Where L is the path loss in decibels, is the path loss exponent, d is the distance between the
transmitter and the receiver, usually measured in meters, and C is a constant which accounts
for system losses.
A simplified formula for the path loss between two isotropic antennas in free space:
L (in dBm) = ( )
Where L is the path loss in decibels, is the wavelength and d is the transmitter-receiver
distance in the same units as the wavelength.
In general,
( ) ( ) ( ) ( ) ( )
The path loss model used is described in IEEE Standard 802.15.2-2003[B9], which stipulates
a two-segment function with a path loss exponent of 2.0 for the first 8 m and then a path loss
exponent of 3.3 thereafter. The formula given in IEEE Standard 802.15.2 is shown in
Equation (E.1).
83
pl(d) = {
( )
Reference: IEEE Standard 802.15.4 2006 Part 15.4: Wireless Medium Access Control
(MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area
Networks (WPANs).
84
3.8 Internet of Things
3.8.1 New Experiment
In the Simulation menu select Simulation
New Internet of Things
3.8.2 Introduction
Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible
through the internet. It is the network of physical objects that can communicate, sense or
interact with their internal states or the external environment.
The thing in IoT could be a person with a heart monitor or an automobile with built-in-
sensors, i.e. objects that have been assigned an IP address and have the ability to collect and
transfer data over a network without manual assistance or intervention.
NetSim IOT is modeled as a wireless sensor network that can connect to the internet via a
6LoPAN Gateway. The default protocols in the WSN section is AODV with IPv6 addressing
in L3 and 802.15.4 MAC & PHY. This WSN sends data to a LowPAN Gateway which has a
Zigbee (802.15.4) interface and a WAN Interface. The Zigbee interface allows wireless
connectivity to the WSN while the WAN interface connects to the internet.
Any WSN comprises of two parts, the sensing part and the network communication part.
NetSim is "agnostic" to the sensing and this sensing is abstracted as an Agent (sometime
known as Agent based modeling). Whatever is sensed is finally converted to a "packet" and it
is from this point on that NetSim simulation can be used.
NetSim does not provide any connectivity / interfacing to real hardware / sensors. However,
NetSim provides interfacing to MATLAB or via text files. In case of text files, real sensors
can write their data to files which can then taken as input by NetSim.
85
3.8.3 Create Scenario
Total Grid Length (m) settings allows the user to set the
total environment length of IOT Networks containing
sensors, LoWPAN gateway, wired nodes, routers,
switches, access point, wireless nodes.
Sensor Grid Settings (m) allows the user to set the
environment length for placing the sensors uniformly or
randomly. Users can manually create the scenario by
selecting Via click and drop, or place the sensors
automatically in an uniform or random manner.
Adding Sensor - Click on Sensor Node icon in toolbar and click and drop inside the grid.
Adding LoWPAN gateway- LoWPAN is an acronym of Low power Wireless Personal Area
Networks. The LoWPAN IoT gateway functions as a border router in a LoWPAN network,
connecting a wireless IPv6 network to the Internet. Designed to send IPv6 packets over
IEEE802.15.4-based networks and implementing open IP standards including TCP, UDP,
HTTP and more, the standard offers end-to-end addressable nodes, allowing a router to
connect the network to IP.
Click on the LoWPAN gateway icon in the toolbar and click and drop inside the grid.
User need not connect the sensors with LoWPAN gateway using wireless links.
Interconnection among other devices is same as in Internetworks.
LoWPAN gateway can be connected with router using wired links.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements.
o Routing Protocol in Application Layer of router and all user editable properties in
DataLink Layer and Physical Layer of Access Point and Wireless Node are Global
i.e. changing properties in one node will automatically reflect in the others in that
network.
86
o In Sensor Node, Routing Protocol in Network Layer and all user editable properties
in DataLink Layer, Physical Layer and Power are Global i.e. changing properties
in one node will automatically reflect in the others in that network.
Set the values according to requirement and click Accept.
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
87
3.8.5 Enable Packet Trace, Event Trace & Dynamic Metrics(Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
88
3.9 Zigbee
3.9.1 New Experiment
Adding Node -
Click on the ZigBee icon in the toolbar and click and drop it inside the grid (i.e.
Visibility Range - The systems can move and communicate in this range only).
A Node cannot be placed on another Node. A Node cannot float outside the grid.
Adding PAN Coordinator - Click on the PAN Coordinator icon in the toolbar and click
and drop inside the grid.
On opening an already configured properties of environment, the input fields will be frozen
(i.e. the input cannot be changed).To modify these values click on the Modify button in the
screen. Now the input value can be changed. Click on the Accept button, the modified values
will be saved.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. In Zigbee Node, Routing Protocol in Network
Layer and all user editable properties in DataLink Layer, Physical Layer and Power are
89
Global i.e. changing properties in one node will automatically reflect in the others in that
network.
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
3.9.5 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
90
3.9.6 Run Simulation
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
SINR Calculation:
Analogous to the SNR used often in wired communications systems, the SINR is defined as
the power of a certain signal of interest divided by the sum of the interferencepower (from all
the other interfering signals) and the power of some background noise.
The interference power is the difference between the total power received by the receiver and
the power received from one particular transmitter.
P (in dBm) =
91
where f is the Bandwidth in Hertz. For 802.15.4, f = 2 MHz
( )
P (in mW) =
The bit error rate (BER) is the number of bit errors divided by the total number of transferred
bits during a studied time interval. The BER results were obtained using the analytical model
from IEEE standard 802.15.2-2003 [B9]. The calculation follows the approach outlined in
5.3.2 of that standard.
( ( ))
BER = ( ) ( ) ( )
Propagation Loss:
Three different and mutually independent propagation phenomena influence the power of the
received signal: path loss, shadowing and multipath fading.
Shadowing:
Slow shadowing in wireless network is the attenuation caused by buildings or any obstacles
between a transmitter and a receiver. In the model with shadowing, the shadowing value X,
typically defined in dB, is added to (or subtracted from) the average received power. X is a
zero means Gaussian distributed random variable with standard deviation .
92
The default value for standard deviation is chosen as 5 dB.
Path Loss:
Path loss can be represented by the path loss exponent, whose value is normally in the range
of 2 to 4, where 2 is for propagation in free space and 4 is for relatively loss environments. In
NetSim, the default value for path loss exponent is taken as 2.
Path loss is usually expressed in dB. In its simplest form, the path loss can be calculated
using the formula
Where L is the path loss in decibels, is the path loss exponent, d is the distance between the
transmitter and the receiver, usually measured in meters, and C is a constant which accounts
for system losses.
A simplified formula for the path loss between two isotropic antennas in free space:
L (in dBm) = ( )
Where L is the path loss in decibels, is the wavelength and d is the transmitter-receiver
distance in the same units as the wavelength.
In general,
( ) ( ) ( ) ( ) ( )
The path loss model used is described in IEEE Standard 802.15.2-2003[B9], which stipulates
a two-segment function with a path loss exponent of 2.0 for the first 8 m and then a path loss
93
exponent of 3.3 thereafter. The formula given in IEEE Standard 802.15.2 is shown in
Equation (E.1).
pl(d) = {
( )
94
3.10 Cognitive Radio
Cognitive Radio Network simulation is available
from v7 of NetSim. Cognitive Radio Networks
allows you to connect, if required, with Ethernet,
Wireless LAN, IP Routing, TCP / UDP and
allows users to log packet and event (in NetSim
standard version only) traces.
Adding Devices
Cognitive Radio Networks comes with the palette of various devices like Cognitive Radio
CPE, Cognitive Radio Base Station, Switch, Router, Wired Node, Wireless Node, Access
point, Incumbent etc.
Select the desired devices in the toolbar and click and drop on the environment.
To remove devices, right click on the particular device and then click Remove.
Connect the devices
Select the appropriate link in the toolbar and connect the devices by clicking on the device 1
and device 2.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. Routing Protocol in Application Layer of
router and all user editable properties in DataLink Layer and Physical Layer of Access
Point and Wireless Node are Global i.e. changing properties in one node will
automatically reflect in the others in that network.
95
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
96
3.10.5 Run Simulation
Click on Run Simulation icon on the top toolbar. Set the Simulation Time and click on
Simulate.
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
CR BS allocates max one symbol per CPE. If the generation rate is more than the data
filled in one symbol then allocation fails and it results in zero throughput.
The first symbol is reserved for CR control frames or any broadcast PDU
NetSim gives App layer throughput which is lesser than that of MAC layer
throughput because of
TCP connection establishment
ARP set-up
Service flow creation CPE-BS and BS-CPE
BW request
To avoid the above effects
Generate custom traffic
Set DL/UL Ratio as 1:1 so that the BS transmits whatever it receives
Run UDP in transport layer
Use static ARP
Run Simulation for more than 100 sec
97
3.11 LTE
3.11.1 New Experiment
Adding MME- Click on the Router icon in the tool bar, click and drop the MME (Mobility
Management Entity) onto the environment.
Adding ENB - Click on the Evolved node B (ENB) icon in the toolbar and click it onto the
environment.
Adding UE
Click on the UE (User Equipment) icon from the Node icon in the toolbar, click and
drop it on the ENB coverage area.
UE cannot be placed on another UE. It has to be clicked and placed on the ENB node
coverage area.
Connect the devices
Select the appropriate link in the toolbar and connect the devices by clicking on the device 1
and device 2.
Right click on the appropriate node or link and select Properties. Then modify the
parameters according to the requirements. Routing Protocol in Application Layer of
router and all user editable properties in DataLink Layer and Physical Layer of Access
Point and Wireless Node are Global i.e. changing properties in one node will
automatically reflect in the others in that network. Transmission Mode Index of ENB and
UE are also Global properties.
Select the Application Button on the ribbon and click on the empty region between the
Grid Environment and the ribbon. Now right click on Application and select Properties.
Multiple applications can be generated by using add button in Application properties.
98
Set the values according to requirement and click Accept.
3.11.4 Enable Packet Trace, Event Trace & Dynamic Metrics (Optional)
Click Packet Trace / Event Trace icon in the tool bar. Set the name and path and select the
required attributes. To get detailed help, please refer section 6.5, 6.6 and 6.3 respectively.
Select Dynamic Metrics icon for enabling Dynamic Metrics and click OK.
99
3.11.5 Run Simulation
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
100
3.12 Military Radio TDMA link 16
3.12.1 New Experiment
Click on the Node icon in the Toolbar, and then click on Wireless Node.
Next, click on the environment where you want to drop it inside the grid.
(Note: A Node cannot be placed on another Node. A Node cannot float
outside of the grid.)
101
3.12.4 Set Environment Properties
102
3.12.5 Modifying/Viewing/Accepting Properties
On opening an already configured properties of environment, the input fields will be frozen
(i.e. the input cannot be changed).To modify these values click on the Modify button in the
screen. Now the input value can be changed. Click on the Accept button, the modified values
will be saved.
Furthermore, users can open this Configuration.xml file using Visual Studio 2010 and
analyze how to write a designed network scenario manually. Further information is provided
in Understanding Configuration.xml file under Running NetSim via CLI chapter.
103
4 Traffic generator in NetSim
(Application Models)
NetSim allows users to model and simulate the applications:
1. CBR
2. Custom
3. Database
4. FTP
5. Email
6. HTTP
7. PEER_TO_PEER
8. Video
9. Voice
10. Sensor App
11. Erlang Call
12. Emulator (Only if Emulator Add-on is present)
To set up the application click and drop the application icon from the tool bar as shown
below.
104
This properties window allows you to set the traffic. You can add (or) delete one or more
applications.
Start time
End time
Note: Suppose Start time is 1 and end time is 10 then application starts generating traffic
at 1st second and ends at 10th second.
Source Count
This property represents number of sources for the application. Voice, Video, FTP,
Database and Custom applications have only one source.
Source ID
Destination Count
This property represents number of destinations for the application. Voice, Video,
FTP, Database and Custom applications have only one destination.
Destination ID
4.2 CBR
Packet Size
Constant
Packet Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 1460 bytes is entered.
105
Inter Arrival Time
Constant
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 20000
Micro Sec is entered.
4.3 Custom
Packet Size
Constant
Exponential
Packet Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 1460 bytes is entered.
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 20000
Micro Sec is entered.
4.4 Voice
Codec
Codec is the component of any voice system that translates between analog speech and
the bits used to transmit them. Every codec transmits a burst of data in a packet that can
106
be reconstructed into voice. Five different standards of voice codecs are given which can
be selected depending on the variations required.
Packet Size
Constant
Exponential
Packet Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 160 bytes is entered.
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 20000
Micro Sec is entered.
Service Type
CBR - CBR stands for Constant Bit Rate. Packets of constant size are generated at
constant inter arrival times.
VBR - VBR stands for Variable Bit Rate. The two types of Suppression Model that
can be selected are,
Deterministic
Markov Chain
4.5 Video
Video is an electronic medium for the recording, copying and broadcasting of moving
visual images.
Model Type
107
Continuous Normal VBR This model is the simplest of all models. It uses
Normal Distribution for the generation of bits per pixel. In this model, consecutive
packet sizes are independent of each other.
o Frames per second Number of frames arriving per second. This is in
the range of 10 50.
o Pixels per frame -Number of pixelsin each frame. This is in the range
of 10000 100000.
o Bits per pixel () Mean value of the normal distribution used to
generate the value of bits per pixel.
o Bits per pixel () Standard Deviation of the normal distribution used
to generate the value of bits per pixel.
Quantized State Continuous Time Markov In this model the bit rate is
quantized into finite discreet levels. This model takes uniform quantization step as
A bits/pixel. There are M + 1 possible levels (0, A, .., MA).Transitions
between levels are assumed to occur with exponential rates that may depend on
the current level. This model is approximating the bit rate by a continuous time
process (t) with discreet jumps at random Poisson time.
108
o Frames per second Number of frames arriving per second. This is in
the range of 10 50.
o Pixels per frame - Number of pixels in each frame. This is in the range
of 10000 100000.
o No of Multiplexed Sources This model considers the aggregate
instantaneous input rate N(t) instead of the single source bit rate (t).
The total rate is the sum of N independent random processes each with
mean E() and variance C(0) at steady state.Therefore, the steady state-
state mean of N(t) will be E( N)=N x E() bits/pixel.
o Quantization Level This model takes uniform quantization step as A
bits/pixel. There are M + 1 possible levels (0, A, .., MA). Transitions
between levels are assumed to occur with exponential rates that may
depend on the current level.
Simple IPB Composite ModelIn this model, the frames are organized as
IBBPBBPBBPBBIBBPBB i.e., 12 frames in a Group of
Pictures(GOP).Generate X0 from a Gaussian distribution N(0, y 0).Set initial
value N0= 0, D0 = 1.
Dk = Dk-1 (N2k-1/Dk-1)
kk = Nk / Dk
mk = j = 1kkjXk-j
Finally, eachXk is chosen from N(mk, y k). Thus we get a process X with ACF
approximating to r(k).
109
where d= H-0.5.
= 2 2H
4.6 FTP
File Size
Constant
Exponential
File Size (Bytes): Sets the size of the packets being generated by the chosen distribution.
By default 100000 bytes is entered.
110
File_Inter Arrival Time
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 5 Sec is
entered.
4.7 Database
Transaction Size
Constant
Exponential
Packet_Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 10000 bytes is entered.
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 1000000
Micro Sec is entered.
111
4.8 Peer to Peer
NOTE: Devices must have TCP enabled in Transport layer for implementing peer to peer application
successfully.
File Size
Constant
Exponential
Piece size (Bytes): Each file is divided into equal sized pieces and then the piece of the
data is transmitted. This property represents the size of each piece.
4.9 HTTP
HTTP (HyperText Transfer Protocol) is a protocol that utilizes TCP to transfer its
information between computers (usually Web servers and clients). Hence in NetSim, it is
imperative that TCP is enabled in the Source Node.
Http_request_interarrival_time
Constant
Exponential
Inter Arrival Time (micro sec): This represents the rate at which client sends the
requests.
Page_property
Constant
Exponential
Page Count: This represents the number of pages received from the server.
Page Size (Bytes): This represents the size of each page that is received from the server.
112
4.10 Email
Email_Receive
Constant
Exponential
Constant
Exponential
Email_Send
Constant
Exponential
Constant
Exponential
Constant
113
Exponential
Packet Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 50 bytes is entered.
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 1000000
Micro Sec is entered.
Constant
Packet Size (Bytes): Sets the size of the packets being generated by the chosen
distribution. By default 160 bytes is entered.
Constant
Inter Arrival Time: Enter the average inter-arrival time between packets. A lower inter-
arrival time would lead to a higher generation rate and the vice versa. By default 20000
Micro Sec is entered.
Call
114
Constant
Exponential
Inter Arrival Time: Enter the average inter-arrival time between calls. A lower inter-
arrival time would lead to a higher call rate and the vice versa. By default 60 Sec is
entered.
Constant
Exponential
Constant
Service
Service Type
CBR - CBR stands for Constant Bit Rate. Packets of constant size are generated at
constant inter arrival times.
VBR - VBR stands for Variable Bit Rate. The two types of Suppression Model that
can be selected are,
Deterministic
Markov Chain
Success ratio: Sets the ratio of the packets that are not silenced during VBR calls.
4.13 Emulator
NOTE- Will be present only when Emulator Add-on is installed
Emulation
Source Real IP: Specifies the real IP Address of source device in Emulation
Source Port: Specifies the Port no used for transmission by Application running in
source device
115
Destination Real IP: Specifies the real IP Address of destination device in Emulation
Destination Port: Specifies the Port no used for reception by Application running in
destination device
The various traffics generated in NetSim have the following priority and QoS values:
Note: Priority of Normal has a Priority Value of 4 and nRTPS QoS Class. Ex: Video
over TCP.
116
4.15 Modelling Poisson arrivals in NetSim
Whats a Poisson process, and how is it useful?
Any time you have events which occur individually at random moments, but which tend to
occur at an average rate when viewed as a group, you have a Poisson process.
For example, we can estimate that a certain node generates 1200 packets per minute. These
are randomly generated throughput the hour throughout the 60 seconds, but there are on
average 1200 packets per minute.
If 1200 packets generated per minute that, on average, one packet is generated every 60 /
1200 = 0.05 seconds. So, lets define a variable = 1/ 0.05 = 20 and call it the rate
parameter. The rate parameter is a measure of frequency: the average rate of events
(packets) per unit of time (in this case, seconds).
Knowing this, we can ask questions like, what is the probability that a packet will be
generated within the next second? Whats the probability within the next 10 seconds? Theres
a well-known function to answer such questions. Its called the cumulative distribution
function for the exponential distribution, and it looks like this:
F(x) =1ex
Basically, the more time passes, the more likely it is that, a packet is generated. The word
exponential, in this context, actually refers to exponential decay. As time passes, the
probability of having no packets generated decays towards zero and correspondingly, the
probability of having at least one packet generated increases towards one.
117
Plugging in a few values, we find that:
The probability of generating a packet within the next 0.05 seconds is F(0.05) 0.63
The probability of generating a packet within 1 second is F(1) 0.999999998
In particular, note that after 0.05 seconds the prescribed average time between packets the
probability is F(0.05) 0.63 .
This is exactly the code used in NetSim, and this is available in the source C file in
../NetSim_Standard/Simulation/Application/Distribution.c. In the case exponential
distribution, you would see
fFirstArg = args[0];
nRandOut = fnRandomNo(10000000, &fRand, uSeed, uSeed1);
fRandomNumber = (double) (fRand);
fFirstArg = 1 / fFirstArg;
*fDistOut = (double) -(1 / fFirstArg)* (double) logl(1 - fRandomNumber);
The simple way of selecting this via the UI is to selecting exponential distribution for inter-
arrival time when modelling application properties.
118
5 Running simulation via CLI
5.1 Running NetSim via CLI
Note: This feature is available from v7 onwards. In v8, NetSim can be run via CLI for
Internetworks, Advanced Wireless Networks MANET, Wireless Sensor Networks, Internet
of Things, ZigBee Networks, BGP Networks, Cellular Networks, LTE Networks and Cognitive
Radio Networks only. For other networks NetSim v8 can only be run via GUI.
Advanced users can model their simulation via a configuration file (which can be created
without the NetSim GUI) and run the simulation from command line. This is typically done
in cases where very large networks are to be simulated (it takes too long to create it in the
GUI), or to run a series of simulations automatically (Ref Help on NetSim Batch Processing).
The configuration file contains all required information to run the simulation including the
network topology, devices, links, traffic, statistics, traces etc.
To run Simulation in NetSim through command line interface (CLI), the following steps have
to be followed.
App path is the file location in the system in which NetSim has been installed.
The app path can be found out by right clicking the NetSim Shortcut in the desktop and
selecting Open file location (In Vista and Windows 7) or Find Target (In Windows XP). The
app path will be something like C:\Program Files\NetSim Standard\bin, depending on
where NetSim is installed.
Note: The path to the bin folder of the app path must be mentioned
IO path (Input/output Path) is the path where the input and output files of an application is
written. This is similar to the temp path of windows OS. For NetSim, the IO path can be got
by Start Run %temp%/NetSim. Once you reach this folder, the user can notice that the
path would be something like C:\Users\Ram\AppData\Local\Temp\NetSim
119
The IO path is the path where the Configuration.xml (NetSim Configuration file) of the
scenario, that will be simulated, should be present.
App path and IO path can also be same, i.e., Configuration.xml can be placed inside the app
path (if the app path has write permission). Otherwise, users can create a folder for IO path
and Configuration.xml can be placed inside that folder.
Note: Sample configuration.xml files are available in the <NetSim installed Directory>/Docs/
Sample_Configurations folder of the NetSim install directory inside the respective protocol
folder names.
To run NetSim through command line, copy the app path where NetSimCore.exe is present
and paste it in the command prompt.
For floating/roaming licenses, type the following in the command prompt.The type of license
can be seen by clicking on NetSim Help About NetSim
Where,
120
The following screenshot is the example of running NetSim through CLI where the ip address
of the NetSim license server is 192.168.0.2
Where,
Simulation will be completed successfully and the text files that are requested by the end user
in Configuration.xml will be written in the <iopath>.
Note: If the folder name contains white space, then mention the folder path within double
quotes while specifying the folder name in the command prompt. For example, if app path
contains white space, then the app path must be mentioned within double quotes in the
command prompt as given below.
121
>cd <app path>
To know more about the options that are available to run NetSim via CLI, type the following
in the command prompt.
>NetSimCore.exe -h
122
123
5.2 Understanding Configuration.xml file
Lets see under the hood to know how NetSim is working.
Using UI
GUI
Using CLI
Configuratio
Metrics.txt
n.xml
Protocol
Engine +
Stack +
Kernel
To model a scenario in order to generate metrics in NetSim, GUI will write all the details
about the devices used in the scenario and its properties, the links used and their properties,
the properties of the environment being used, etc. in Configuration.xml just when the user
performs the simulation.
The back-end engine that contains dlls and NetSimCore.exe will read this Configuration.xml,
execute the simulation and write output metrics files (in .txt format) to the IO path. Then, the
GUI will display the metrics based on the text files written by the backend.
In order to run NetSim through command line (CLI), the user has to create the
Configuration.xml furnishing all the details about the devices, links and the environment of
the desired scenario.
124
5.2.1 How to use Visual Studio to edit the Configuration file?
To edit the Configuration.xml, xml editor is required. There are various xml editors available
in the market. Visual Studio 2010 is one of the xml editors that can be used to edit the
Configuration.xml with efficacy.
This section shows limelight on how to use Visual Studio to edit the Configuration.xml.
XML view provides an editor for editing raw XML and provides IntelliSense and color
coding.
After you type the element name and press the CTRL+ SPACE, you will be presented with a
list of attributes that the element supports. This is known as IntelliSense. Using this feature,
you can select the options that are required to create the desired scenario.
Color coding is followed to indicate the elements and the attributes in a unique fashion.
The following screenshot displays the Configuration.xml which is opened through the Visual
Studio.
125
5.2.2 Sections of Configuration file
EXPERIMENT_INFORMATION
GUI_INFORMATION
NETWORK_CONFIGURATION
SIMULATION_PARAMETER
PROTOCOL_CONFIGURATION
STATISTICS_COLLECTION
EXPERIMENT_INFORMATION:
This section contains the details about the user credentials, such as the user mode
(Admin or Exam or Practice), experiment name, date on which the experiment is created and
the comments about the experiment. This section plays a significant role while running
NetSim through GUI.
GUI_INFORMATION:
This section contains the GUI information like the environment length, view type etc.
and the network name which is desired to be run.
NETWORK_CONFIGURATION:
This section is used to configure the devices and the links of the desired network at
the each layer of the OSI stack. It consists of DEVICE_CONFIGURATION, CONNECTION
and APPLICATION_CONFIGURATION. DEVICE_CONFIGURATION configures the
devices in the desired network while the CONNECTION configures the links in the desired
network and APPLICATION configures the Applications.
SIMULATION_PARAMETER:
126
PROTOCOL_CONFIGURATION:
IPV4 and static ARP are enabled or disabled in this section. The text files illustrating
the static routing and static ARP can be obtained by enabling the corresponding tags in the
Configuration.xml.
STATISTICS_COLLECTION:
The packet trace and the event trace can be observed in the text files which are created
by enabling the tags in this section. The required fields of the packet trace can be enabled in
the PACKET_TRACE while the event trace can be enabled in the EVENT_TRACE of this
section.
Sample Configuration.xml file will be installed in user system along with the software at
<NetSim installed Path>\Docs\ Sample_Configuration\ <Network Technology>. User can
open and edit these files using Visual Studio 2010 or any XML editor. The purpose of
providing the sample Configuration.xml file is to assist the user in writing a network
scenario manually by analyzing the format for that specific network technology.
127
6 Analysis
6.1 Performance Metrics
NetSim provides distinct quantitative metrics at various abstraction levels such as Network
Metrics, Link Metrics, TCP Metrics, Application Metrics, etc at the end of simulation. With
the help of metrics, users can analyze the behavior of the modeled network and can compare
the impact of different algorithms on end-to-end behavior.
After simulation of a scenario is performed, the NetSim Performance Metrics are shown on
the screen as shown below
128
Collided_Packets-Total number of packets collided in the link including data
and control packets.
Bytes_Transmitted-It is the total number of bytes transmitted in the link. It is
equal to the sum of the Payload_Transmitted and Overhead_Transmitted
transmitted in the link.
Payload_Transmitted-It is the total payload transmitted in the link.
Overhead_Transmitted-It is the total overhead transmitted in the link. It
includes the layer wise overheads and all control packets in the link.
Queue Metrics: Displays the values of the queue metrics for the devices containing
buffer queue like routers, access points etc.
Device Id-Unique id number of the device.
Port Id-Unique id number of the port of the device. This is also called as
interface id.
Queued Packet-Number of packets queued at a particular port of a device.
Dequeued Packet-Number of packets removed from the queue at a particular
port of device
Dropped Packet-Number of packets dropped at a particular port of a device.
Protocol metrics: Displays the protocol based metrics which are implemented in
Network scenario. Metrics will vary depending upon the type of network simulated.
Device metrics: Displays device related metrics like ARP table, IP forwarding tables.
This is also dependent upon the type of network
Application Metrics: Displays the various metrics based on the Application running
in the network scenario.
Application Id- It is the unique Id of the application running at the source.
Source Id-It is the unique Id of the device running that particular application.
Destination Id-It is the unique Id of the destination device.
Packets Transmitted-It is the total number of packets generated and
transmitted from the source.
129
Packets Received-It is the total number of packets received at the destination.
Duplicate packet received-It is the number of packets which are received
more than once at the destination. This generally happens due to re-
transmissions.
Payload Transmitted-It is the total payload transmitted in bytes. It is equal
to the product of Packets Transmitted and Packet Size.
Payload Received-It is the total payload received at the destination in bytes.
Delay-It is the average amount of time taken calculated for all the packets to
reach the destination from the source.
Note about metrics: The metrics are calculated at each layer and might not be equivalent to
the same metric calculated at a different layer. For exactness and precision we recommend
users also verify the results with the event trace & packet trace generated by NetSim.
Note about packet transmission: The Network Stack forms the core of NetSims architecture.
The Stack consists of five IN and OUT events: PHYSICAL_IN, MAC_IN, NETWORK_IN,
TRANSPORT_IN, APPLICATION_IN and APPLICATION_OUT,TRANSPORT_OUT,
NETWORK_OUT, MAC_OUT, PHYSICAL_OUT. All the packets when transferred
between devices go through the above events in order. IN events occur when the packet is
entering a device and all the OUT events occur when packet leaves a device.
The following table lists the various files that will be written in the NetSim install directory/
IO path on completion of simulation.
130
S. No File Contents
If NetSim runs via the UI, then the metrics will be displayed automatically at the end of
simulation with illustrative pie charts and tables.
If NetSim runs via CLI, then the metrics will be written into Metrics.txt and
MetricsGraph.txt.
131
6.2 Packet Animation
NetSim provides the feature to play and record animations to the user. Packet animation
enables users to watch traffic flow through the network for in-depth visualization and
analysis.
No animation,
Record the animation and
Play and record animation while running simulation.
The packet animation would then be recorded and the user can view the animation from the
metrics screen as shown below:
132
When packet animation is enabled, a screen with the following toolbar appears:
While viewing packet animation, user can see the flow of packets as well as the type of
packet. Blue color packet denotes control packet, green color is used for data packet and red
color is error/collided packet.
Example showing packet animation: In first figure, CBR data packet is flowing from Switch
D to Node E (green color) and TCP_ACK is sent from Node E to Switch D in second figure
(blue color).
133
6.3 Dynamic Metrics (only in Standard/Pro Version)
Dynamic metrics allows users to monitor the value of a parameter over simulation time.
As of NetSim v8, link and application throughputs can be dynamically plotted. These plots
can be done offline or during simulation. Note that enabling them to be plotted during
simulation would consume a lot of memory and slow down the simulation significantly.
Dynamic metrics can be set by clicking on the dynamic metrics icon in the GUI, and
selecting those metrics that you wish to monitor.
Upon completion of the simulation dynamic metrics plots can be viewed by clicking on Link
throughput in Metrics screen.
134
6.4 Analytics Menu (Multiple Experiments)
Under the Simulation menu click Analytics to view the Analytics screen. This module is
designed to enable comparison of performance metrics of multiple experiments. A graphing
engineer facilitates plotting of different performance metrics across the different experiments.
This can be used to infer/trend how changes in input parameters affect network performance.
An explanation of the use of the different fields in the Analytics screen is detailed below:
User: This Option can be used to compare different experiments created by a single
user. As Admin is a Super User, he/she can compare all the experiments created by all
the users. Things that cannot be done are,
User to User comparison cannot be made, i.e. two or more different
experiments created by two or more different users cannot be compared.
Experiments of a particular Network cannot be compared with experiments of
other Networks.
In Tool Bar, there are various tabs available like Internetworks, Legacy Networks,
BGP Networks, MPLS Networks, Advanced Wireless Networks - MANET,
Advanced Wireless Networks WiMAX, Cellular Networks, Wireless Sensor
Networks, Personal Area Networks, Cognitive Radio Networks and LTE networks.
Click on the particular Network tab for comparing the performance of protocols
under that Network.
For Internetworks, Advanced Wireless Networks MANET, BGP Networks,
Wireless Sensor Networks, Personal Area Networks, LTE networks and
Cognitive Radio Networks, select the Metrics FileSelect the Metrics File to
add it onto the Metrics Table by using Browse button.
For Other Networks, select the Experiment based on the tab selected. When
one of the tabs is selected, all the experiments saved under the particular
Network will be listed. Click on the Experiment Name to add it onto the
Metrics Table.
Export to .csv - Click on Export to .csv to export the Metrics Table to a
.csv format. This action button will export the contents to a .csv format
that is available.
Print - Click on the Print option to print the Metrics Table. This action
button will fetch the Print dialogue box.
135
The Graph Field
Select the Metrics - Select the coordinates for Y-axis by clicking on the
dropdown menu.
Graph - Based on the X-axis (i.e. Metrics File/ Experiment selected) and Y-
axis (i.e. Metrics selected by using the dropdown menu above the graph), a
Bar graph will be plotted.
Add metrics file of different experiments to compare.
The Metrics Table- This is the table that is generated when the Experiments are
selected using the Select the Metrics File/ Experiment option.
The first column in the Metrics Table consists of the Check Boxes that are
used to select (i.e. by default all the Experiments are selected) or deselect the
selected Experiments. If an Experiment is selected, then that Experiment
would be compared along with other Experiments, else the Experiment would
not be compared with other Experiments.
The second column in the Metrics Table X button is available. This X
button is used for deleting the Experiment.
136
6.5 Packet Trace (only in Standard/Pro Version)
Introduction:
NetSim allows users to generate trace files which provide detailed packet information useful
for performance validation, statistical analysis and custom code de-bugging. Packet Trace
logs a set of chosen parameters for every packet as it flows through the network such as
arrival times, queuing times, departure times, payload, overhead, errors, collisions etc.
By providing a host of information and parameters of every packet that flows through the
network, packet trace provides necessary forensics for users to catch logical errors without
setting a lot of breakpoints or restarting the program often. Window size variation in TCP,
Route Table Formation in OSPF, Medium Access in Wi-fi, etc, are examples of protocol
functionalities that can be easily understood from the trace.
Note: Turning on Packet Trace will slow down the simulation significantly
137
Step 2: Select the file click import, the following window will appear,
Step 3: Click next, the following window will appear, in that select the check box as
mentioned in the following window, and then click Next and Finish button.
138
Packet Trace Metrics:
139
device
140
6.6 Event Trace (only in Standard/Pro Version)
NetSim Network Stack:
NetSims Network Stack forms the core of NetSim and its architectural aspects are
diagrammatically explained below. Network Stack accepts inputs from the end-user in the
form of Configuration file and the data flows as packets from one layer to another layer in the
Network Stack.
All packets, when transferred between devices move up and down the stack, and all events in
NetSim fall under one of these ten categories of events, namely, Physical IN, Data Link IN,
Network IN, Transport IN, Application IN, Application Out, Transport OUT, Network
OUT, Data Link OUT and Physical OUT. The IN events occur when the packets are entering
a device while the OUT events occur while the packet is leaving a device.
Every device in NetSim has an instance of the Network Stack shown above. Switches
& Access points have a 2 layer stack, while routers have a 3 layer stack. End-nodes have a 5
layer stack.
The protocol engines are called based on the layer at which the protocols operate. For
example, TCP is called during execution of Transport IN or Transport OUT events, while
802.11b WLAN is called during execution of MAC IN, MAC OUT, PHY IN and PHY OUT
events.
141
When these protocols are in operation they in turn generate events for NetSim's
discrete event engine to process. These are known as SUB EVENTS. All SUB EVENTS, fall
into one of the above 10 types of EVENTS.
Each event gets added in the Simulation kernel by the protocol operating at the
particular layer of the Network Stack. The required sub events are passed into the Simulation
kernel. These sub events are then fetched by the Network Stack in order to execute the
functionality of each protocol. At the end of Simulation, Network Stack writes trace files and
the Metrics files that assist the user in analyzing the performance metrics and statistical
analysis.
Event Trace:
The event trace records every single event along with associated information such as
time stamp, event ID, event type etc in a text file or .csv file which can be stored at a user
defined location.
Apart from a host of information, the event trace has two special information fields
for diagnostics
a) A log of the file name and line number from where the event was generated (Please
refer Custom Code in NetSim Debugging your code Via CLI) and
b) Previous event which triggered the current event.
Note: Turning
NetSim provideson Event
users Trace
with will slow
the option down the
of turning onsimulation significantly
"Event Traces".
If NetSim runs via GUI, event trace can be turned on by clicking the Event Trace icon
in the tool bar in the Internetworks menu and selecting the required fields in the event trace.
If NetSim runs via CLI, then the event trace can be turned on by enabling the event
trace in the STATISTICS_COLLECTION tag of the configuration file.
142
How to import Event Trace to Excel?
Refer Help on Generating Packet Trace How to import Packet Trace to Excel?
143
6.7 Trace Data Analysis (only in Standard/Pro Version)
This section explains about how to analyze the data of a NetSim trace file.
Step 1: Open the trace file. (In this example packet trace is opened)
Step 2: Go to Data menu and click on filter icon to enable the auto filter.
Step 3: Click the arrow in the header of the column you want to filter. In the list of text or
numbers, uncheck the (Select All) box at the top of the list, and then check the boxes of the
items you want to show.
For example, click on arrow of SOURCE_ID and uncheck the Select all check box and
select NODE 2 then click on ok.
All the rows which are having NODE 2 as source id will be shown.
144
Typically filters can be set to observe Errored/Collided/Successful packets, packets of
destination and packets of source.
Step 3: Click the arrow in the header of the column PACKET_ID and uncheck the
Select all check box and select the packet id which you want to observe, for example 1, and
then click on ok.
145
Scenario is as shown below and traffic flow is from Wired Node 1 to Wired Node 2.
Flow of packet 1 can be observed from the packet trace as shown below.
Note: In the trace file device IDs are shown not device names. Wired Node 1s ID is 2 so it is
Shown as NODE-2, Wired Node 2s ID is 3 so it is shown as NODE -3, Router-1 ID is 1 so it
is shown as ROUTER-1. Device IDs are shown on the top of the device icon in the above
scenario.
In a scenario source and destinations are fixed but transmitter and receiver are changed. For
example in the above scenario NODE-2 is the source and NODE-3 is the destination, but
when NODE- 2 sending the packet to the ROUTER-1 then NODE-2 is the transmitter and
ROUTER-1 is the receiver. When ROUTER-1 sending the packet to the NODE-3, ROUTER-
1 is the transmitter and NODE-3 is the receiver.
146
6.8 Packet Capture & analysis using Wireshark
(www.wireshark.com) (only in Standard/Pro Version)
6.8.1 Enabling Wireshark in the network scenario
In NetSim, to enable packet capture in Wireshark, Right Click on the device where
Wireshark will capture packets. In the properties, go to Global_Properties and set the
Wireshark parameter as Online
If enabled, Wireshark automatically starts during simulation and displays all the captured
packets.
To view the details of the packet displayed, click on the packet as shown below:
147
The detail of the contents of the selected packet can be seen in the below panes.
TREE View
BYTE View
In the above figure, the details of the packet are displayed in both tree form and bytes form.
In the tree form, user can expand the data by clicking on the part of the tree and view
detailed information about each protocol in each packet.
Display filters allow you to concentrate on the packets you are interested in while hiding
the currently uninteresting ones. Packets can be filtered by protocol, presence of a field,
values of fields etc.
To select packets based on protocol, type the protocol in which you are interested in the
Filter: field of the Wireshark window and press enter to initiate the filter. In the figure
below, tcp protocol is filtered.
You can also build display filters that compare values using a number of different
comparison operators like ==, != , >, <, <=, etc.
Following is an example displaying filtered packets whose SYN Flag and ACK Flag are
set to 1 in a TCP Stream.
148
6.8.4 Analyzing packets in Wireshark
6.8.4.1 Analyzing Conversation using graphs
In Wireshark,
go to Statistics Menu Conversations
Different types of protocols will be available. User can select the specific conversation by
going to the desired protocol. For example, in the following diagram, we have selected TCP.
User can also analyze each of the conversation and can create graphs by selecting them and
clicking on Graph
149
The different types of graphs possible are
Round Trip time
Throughput
Time/Sequence (Stevens)
Time/Sequence (tcptrace)
Window Scaling
150
6.8.4.2 Comparing the packet lengths
151
6.8.4.4 Creating Flow graphs
By default you can see the flow graph of all the packets.
To get the TCP flow, select TCP flow in Flow Type dropdown box and you will obtain the
flow as shown:
152
153
7 Custom code in NetSim
7.1 Writing your own code
NetSim allows the user to write the custom code for all the protocols by creating a DLL
(Dynamic Link Library) for their custom code and replacing NetSims default DLL with the
users custom DLL.
There are various important steps in this process, and each of these steps has various options
as explained in the subsequent pages:
DLL is the shared library concept, implemented by Microsoft. All DLL files have a .dll file
extension. DLLs provide a mechanism for sharing code and data to upgrade functionality
without requiring applications to be re-linked or re-compiled. It is not possible to directly
execute a DLL, since it requires an EXE for the operating system to load it through an entry
point.
Note: If the DLL needs to be debugged then build the DLL in debug mode or else build in
release mode.
Note: Make sure that Visual Studio 2010 is installed in your computer
154
b)
Note: Sometimes you may get the following warning message. Then click on ok
and proceed.
Step 2: Inside Solution Explorer pane in Visual Studio 2010, double click on DSR. Then
open DSR.C file by double clicking on it.
Step 3: Add fprintf (stderr, Source is modified\n); statement inside the source code of
DSR as shown below to print Source is modified.
155
Note: - Use fprintf (stderr,Hello World) instead of printf ( ) to write to standard out.
stdout is redirected to LogFile.txt which is present in <iopath>. So you can see Hello
World Statement (or whatever you write inside the printf) inside the LogFile.txt.
Once this is done click to save the changes and overwrite the file (in case of write
protection).
Step 1: Right Click on the Project (in this case DSR) inside the Solution Explorer pane and
select Build to create DLL file of that specific protocol only
NOTE: To create DLL file of all the protocols actively displayed inside solution pane, click
on BuildBuild Solution
156
Check that the build is successful and necessary DLL files have been built.
Step 2: Inside the simulation folder (present on the desktop) a Dll folder will be created and
inside, the DLLs are built.
It will contain custom DLLs which have been built per the modifications done.
157
7.1.3 Linking Dlls
The procedure to link custom dynamic link libraries (DLLs) is explained below. This
procedure is common for any linking of any custom DLL to NetSim.
Step 1: Copy the newly created DLL file of customized DSR from ../NetSim
Standard/src/Simulation folder
Step 2: Go to NetSim Standardbin folder. Here one would find default DLLs for
respective protocols as shown in next figure.
Step 3: Rename the default DLL: It is recommended to rename the default DLL thereby
saving a copy of original DLL. For example libCognitiveRadio.dll has been renamed as
libCognitiveRadio_default.dll as shown below.
Original DLL
158
Step 4: Place the custom DLL obtained from Step 1 inside the NetSim Standard bin
folder.
Note: Ensure that the name of the DLL which is pasted is exactly the same as
the original DLL (before it was renamed). For the example case of DSR, the DLL
must be libDSR.dll.
User can run the simulation via GUI (Please refer section 3). Running the simulation with the
custom DLL will give desired output to the user as shown below.
159
7.2 Implementing your code - Examples
7.2.1 Hello World Program
Implementation: Add fprintf (stderr, <MESSAGE>) statement inside the source code of
DSR as shown below to print Hello World when custom built dll is executing.
Note: - Use fprintf (stderr,Hello World) instead of printf ( ) to write to standard out.
stdout is redirected to LogFile.txt which is present in <iopath>. So you can see Hello
World Statement (or whatever you write inside the printf) inside the LogFile.txt.
Create DLL and Link the DLL to the NetSim as explained in Section 7.1. And run the
simulation, you can see the following output on the console.
160
7.2.2 Introducing Node Failure in MANET
Step 1: Create a file with the name NodeFailure.txt inside the bin folder of NetSim
installation directory. The file will contain two columns: one being the Node ID of the device
to be failed and other being the failure time (in microseconds).
For example, to fail Node Id 2 from 10th sec onwards and fail Node Id 1 from 90th sec
onwards, the NodeFailure.txt file will be as follows:
Step 3: The function fn_NetSim_DSR_Init() will execute before the protocol execution
starts. So in this function, we will read the NodeFailure.txt and save information regarding
which nodes will fail at which time. Add the following code inside the specified function.
int i;
FILE *fp1;
char *pszFilepath;
char pszConfigInput[1000];
pszFilepath = fnpAllocateMemory(36,sizeof(char)*50);
strcpy(pszFilepath,pszAppPath);
strcat(pszFilepath,"/NodeFailure.txt");
fp1 = fopen(pszFilepath,"r");
i=0;
if(fp1)
{
while(fgets(pszConfigInput,500,fp1)!= NULL)
{
sscanf(pszConfigInput,"%d %d",&NodeArray[i],&TimeArray[i]);
i+=1;
}
}
fclose(fp1);
161
Step 4: The fn_NetSim_DSR_Run( ) is the main function to handle all the protocol
functionalities. So add the following code to the function at the start.
int i,nFlag=1;
if(nFlag)
{
for(i=0;i<100;i++)
if((pstruEventDetails->nDeviceId== NodeArray[i])&&(pstruEventDetails-
>dEventTime >= TimeArray[i]))
{
pstruEventDetails->nInterfaceId = 0;
pstruEventDetails->pPacket=NULL;
return 0;
}
}
Step 6: Create DLL and Link the DLL to the NetSim as explained in Section 7.1.
Step 7: Create a scenario in MANET and run the simulation. User can utilize Packet
Animation to check the node failure (i.e. no packets are forwarded by failed nodes) after the
mentioned time.
162
7.2.3 Transferring file from source to destination in WSN
Objective: Transferring a real file from source node to destination node in WSN
Implementation: The code modifications to transfer file from Sensor to Sink node are
described here:
1. Open NetSim.sln in Visual Studio and add the following modifications.
2. The modified files are in Zigbee: Sensor.c and 802_15_4.h
3. In 802_15_4.h add the following line of code
#define _FILE_SEND_ //Uncomment to transfer file
4. In Sensor.c , the code must be modified at specified places in red color. Add the
modified code:
#include "main.h"
#include "List.h"
#include "802_15_4.h"
#define MAX_PAYLOAD 70
#ifdef _FILE_SEND_
typedef struct file_info
{
char Packet[100];
long len;
int Packet_Id;
_ele* ele;
}FILE_INFO,*PFILE_INFO;
#define FILE_INFO_ALLOC()
(PFILE_INFO)list_alloc(sizeof(FILE_INFO),offsetof(FILE_INFO,ele))
PFILE_INFO fileinfo=NULL;
static int nPacketId=0;
char file_name[100][50] = {"send.txt"};
char outfile_name[100][50] = {"receive.txt"};
if(!file_receive)
file_receive = fopen(outfile_name[0],"wb");
163
while(file_rec)
{
if(file_rec->Packet_Id == PacketId)
{
//fprintf(stderr,"file written. size = %d\n",file_rec-
>len);
packet = file_rec->Packet;
siz = file_rec->len;
fwrite(packet,sizeof(char),siz,file_receive);
}
file_rec=LIST_NEXT(file_rec);
}
fflush(file_receive);
return 0;
}
}
else
{
siz = fread(str,sizeof(char),n,file_transfer);
}
n-=siz;
164
PstruPacket->nDestinationId = nGlobalPANCoordinatorId;
PstruPacket->nPacketId = ++nPacketId;
PstruPacket->nPacketStatus = 0;
PstruPacket->nPacketType = PacketType_Custom;
PstruPacket->nPacketPriority = Priority_Low;
PstruPacket->nQOS =(NETSIM_ID)QOS_BE;
PstruPacket->nSourceId = (NETSIM_ID)nSensorLoop;
//Update the Transport layer information
PstruPacket->pstruTransportData->nSourcePort = SOURCEPORT;
PstruPacket->pstruTransportData->nDestinationPort =
DESTINATIONPORT;
//Update the Network layer information
PstruPacket->pstruNetworkData->szSourceIP =
IP_COPY(fn_NetSim_Stack_GetFirstIPAddressAsId((NETSIM_ID)nSensorLoop,0));
PstruPacket->pstruNetworkData->szDestIP =
IP_COPY(fn_NetSim_Stack_GetFirstIPAddressAsId(PstruPacket-
>nDestinationId,0));
PstruPacket->pstruNetworkData->nTTL = MAX_TTL;
//Update the Application layer information
//For transferring file from Sensor to sink node
//70 bytes at a time
file =FILE_INFO_ALLOC();
memcpy(file->Packet,str,siz);
file->Packet_Id = PstruPacket->nPacketId;
file->len = siz;
LIST_ADD_LAST((void**)&fileinfo,file);
PstruPacket->szPayload = NULL;
PstruPacket->pstruAppData->dPayload = siz;
PstruPacket->pstruAppData->dOverhead = 0;
PstruPacket->pstruAppData->dPacketSize = PstruPacket-
>pstruAppData->dPayload + PstruPacket->pstruAppData->dOverhead;
PstruPacket->pstruAppData->dArrivalTime = pstruEventDetails-
>dEventTime;
PstruPacket->pstruAppData->dEndTime = pstruEventDetails-
>dEventTime;
PstruPacket->pstruAppData->dStartTime = pstruEventDetails-
>dEventTime;
if(NETWORK->ppstruDeviceList[nSensorLoop-1]-
>pstruTransportLayer->isUDP)
PstruPacket->pstruTransportData-
>nTransportProtocol=TX_PROTOCOL_UDP;
else if(NETWORK->ppstruDeviceList[nSensorLoop-1]-
>pstruTransportLayer->isTCP)
PstruPacket->pstruTransportData-
>nTransportProtocol=TX_PROTOCOL_TCP;
else
PstruPacket->pstruTransportData->nTransportProtocol=0;
if(NETWORK->ppstruDeviceList[nSensorLoop-1]-
>pstruSocketInterface->pstruSocketBuffer[0]->pstruPacketlist==NULL)
{
fn_NetSim_Packet_AddPacketToList((NETWORK-
>ppstruDeviceList[nSensorLoop-1]->pstruSocketInterface-
>pstruSocketBuffer[0]),PstruPacket,3);
165
pstruEventDetails->dPacketSize=PstruPacket-
>pstruAppData->dPacketSize;
pstruEventDetails->nDeviceType = SENSOR;
pstruEventDetails->nApplicationId=0;
pstruEventDetails->nProtocolId=PstruPacket-
>pstruTransportData->nTransportProtocol;
pstruEventDetails->nDeviceId=(NETSIM_ID)nSensorLoop;
pstruEventDetails->nInterfaceId=0;
pstruEventDetails->nEventType=TRANSPORT_OUT_EVENT;
pstruEventDetails->nSubEventType=0;
pstruEventDetails->pPacket=NULL;
fnpAddEvent(pstruEventDetails);
}
else
{
fn_NetSim_Packet_AddPacketToList((NETWORK-
>ppstruDeviceList[nSensorLoop-1]->pstruSocketInterface-
>pstruSocketBuffer[0]),PstruPacket,3);
}
}
fclose(file_transfer);
return 0;
}
#endif
/** In this function the sensors sense the agent, creates a packet and
forwards it to sink node.*/
int fn_NetSim_Zigbee_SensorEvent(int nSensorLoop,NETSIM_ID
nGlobalPANCoordinatorId,AGENT** pstruAgent,SENSORS* pstru_Sensor,METRICS**
pstruMetrics,NetSim_EVENTDETAILS* pstruEventDetails)
{
int nFlag = 0;
static int nPacketId;
char str[500];
int nAgentLoop;
POS_2D* pstruPos;
double dDistance;
POS_2D* pstruTemppos;
NetSim_PACKET *PstruPacket;
#ifdef _FILE_SEND_
fnsendfile((NETSIM_ID)nSensorLoop);
return 0;
#endif
pstruPos = (POS_2D*)fnpAllocateMemory(sizeof(POS_2D),1);
pstruTemppos = (POS_2D*)fnpAllocateMemory(sizeof(POS_2D),1);
for(nAgentLoop =0;nAgentLoop<MAXAGENT;nAgentLoop++)
{
if(pstruAgent[nAgentLoop] == NULL)
continue;
5. In 802_15_4.c , the code must be modified at specified places in red color. Add the
modified code:
case MAC_IN_EVENT:
{
166
.
if(pstruPacket->nControlDataType/100 != MAC_PROTOCOL_IEEE802_15_4)
{
//Prepare the Network in event details
pstruPacket->pstruMacData->dOverhead -= 5;
pstruPacket->pstruMacData->dPacketSize = pstruPacket-
>pstruMacData->dPayload + pstruPacket->pstruMacData->dOverhead;
pstruEventDetails->dPacketSize = pstruPacket->pstruMacData-
>dPacketSize;
pstruEventDetails->pPacket = pstruPacket;
pstruEventDetails->nEventType = NETWORK_IN_EVENT;
pstruEventDetails->nSubEventType = 0;
pstruEventDetails->nProtocolId =
fn_NetSim_Stack_GetNWProtocol(pstruEventDetails->nDeviceId);
//Add Network in event
fnpAddEvent(pstruEventDetails);
#ifdef _FILE_SEND_
if(pstruPacket->nPacketType == PacketType_Custom)
fnWriteFile(pstruPacket->nSourceId,pstruPacket->nPacketId);
#endif
}
else if(pstruPacket->nControlDataType == BEACON_FRAME)
{ ...
6. Copy the input file (file to be transferred) in NetSim bin folder (C:\Program
Files\NetSim Standard\bin) and rename it as send.txt.
7. In Sensor.c, user can optionally edit the name of the input file in file_name[] and
output file in outfile_name[] in the code. For example, currently it is receive.txt for
output file.
8. Build Zigbee (Please refer section 7.1) and link the dll to bin folder of NetSim. Take
care to rename the original libZigbee.dll so as to preserve the original binaries of
NetSim
9. Next, to run the code, follow these steps:
In this section we create a sample scenario to transfer file from Sensor to Sink Node in WSN:
167
Step 3: Output file should be present in bin folder of NetSim with
the name receive.txt defined earlier in outfile_name[] in Sensor.c.
Note: Due to retransmissions and errors, sometimes the output file is not reproduced
correctly. To get exact file, user has to enable TCP (WSN works on UDP).
Step 1:- Perform the required modification of the protocol source code. Also add getch()
statement inside init function of the modified protocol.
Step 2:- Build the protocol and replace the dll in bin folder in NetSim. Do not close Visual
Studio.
Step 3:- In NetSim, create a network scenario where the protocol is being used. The
simulation wont start and will pause (because of getch())
168
Step 4:- In Visual Studio, put break point inside the source code where you want to debug.
Step 5:- Go to Debug Attach to Process in Visual studio as shown and attach to
NetSimCore.exe.
169
Click on Attach.
Press enter in the command window .Then control goes to the project and stops at the break
point in the source code as shown below.
All debugging options like step over (F10), step into (F11), step out (Shift + F11),
continue (F5) are available.
After execution of the function, the control goes back to NetSim and then comes back to the
custom code the next time the function is called in the simulation.
170
To stop debugging and continue execution, remove all breakpoint and press F5 (key). This
then gives the control back to NetSim, for normal execution to continue.
Step 2:- To run the NetSim via CLI copy the path where NetSimCore.exe is present.
>cd <apppath>
171
Press enter. Now you can see the following screen.
Step 4:- Open/Create the Project in Visual Studio and put break point inside the source code.
Attach to NetSimCore.exe.
172
Click on Attach.
Step 6:- Go to command prompt which is already opened in Step 3. Enter the Event Id.
Note: If you dont want to stop at any event you can specify 0 as event id.
173
Press enter then control goes to the project and stops at the break point in the source code as
shown below.
All debugging options like step over (F10), step into (F11), step out (Shift + F11),
continue(F5) are available.
After execution of the function, the control goes back to NetSim and then comes back to the
custom code the next time the function is called in the simulation.
To stop debugging and continue execution, remove all breakpoint and press F5 (key). This
then gives the control back to NetSim, for normal execution to continue.
To debug your own (custom) code, it is often helpful to know which section of the code (file
name & line number) generated the event under study. There are 2 ways to enable this
feature.
174
Procedure 1
Step 1: Open configuration.xml file and provide the file name, path and set status as Enable.
Step 2: Run the NetSim via CLI in debug mode (Refer NetSim Help Running Netsim via
CLI) with d as the fourth parameters
Press enter
Upon running, NetSim will write the file name and line number of the source code that
generated each event.
175
Note: In the above trace file Event Id 2 is triggered inside the 802_22_lib.c file which is
present in Cognitive radio.lib.Since all the lib files are opaque to the end user, you cannot see
the source code of the lib file. However, Event Id 4 is triggered at line number 80 of sch.c file
and you can find the location of the event by opening the sch.c file as shown below.
File name
Line number
Procedure 2:
176
Step 1: Right click on my computer and select Properties.
Step 4: Now perform simulation in NetSim . Upon running, NetSim will write the file name
and line number of the source code that generated each event.
Watch the change in the variable as the code progress by right clicking on the variable
& clicking on "add watch" tab. This is useful if to continuously monitor the change in the
variable as the code progresses.
During the process of debug users would come across variables that are defined
178
outside the source file being built as a .dll. Such variables cannot be viewed directly when
added in the watch tab, as this would throw the error
CX0017: Error:symbol Variable_Namenot found.
In the call stack window one can find the file in which that variable is situated. Right
click on the dll file name in the call stack window, in this case NetworkStack.dll. Then in the
pull down menu which appears, select "load symbols from" and give the path of the
pdb(program database) file.
A program database (.pdb) file, also called a symbol file, maps the identifiers that a
user creates in source files for classes, methods, and other code to the identifiers that are used
in the compiled executablesof the project. The .pdb file also maps the statements in the
source code to the execution instructions in the executables. The debugger uses this
information to determine: the source file and the line number displayed in the Visual Studio
IDE and the location in the executable to stop at when a user sets a breakpoint. A symbol file
also contains the original location of the source files, and optionally, the location of a source
server where the source files can be retrieved from.
When a user debugs a project in the Visual Studio IDE, the debugger knows exactly
where to find the .pdb and source files for the code. If the user wants to debug code outside
their project source code, such as the Windows or third-party code the project calls, the user
has to specify the location of the .pdb (and optionally, the source files of the external code)
and those files need to exactly match the build of the executables.
The pdb files are usually available in NetSims install directory, else write to
[email protected] for the latest copy of these debug files.
179
Note: If the load symbols menu option is greyed, then it means symbols are already loaded
In the watch window, the variable which the user has to watch should be edited by
double clicking on it and prefixing {,,NetworkStack.dll} to the variable name and pressing
enter. (The name of the respective file in which the variable is defined should be mentioned -
in this case NetworkStack.dll).
180
Accessing External Variables
In the main function where a user wishes to find the dTotalReceivedPower, the variable must
be assigned the respective value. In the above case, the following line of code must be written
inside fn_NetSim_WLAN_PhysicalIn() function in WLAN.c file present inside WLAN
folder
var1 = DEVICE_PHYVAR(nDeviceId, nInterfaceId);
Note that the parameters given in the macro or any function which assigns a value to
the variable must be defined beforehand in the code. Here nDeviceId and nInterfaceId are
defined beforehand.
181
The solution must be built and the resulting <Installed Directory>\src\Simulation
\Dll\libWLAN.dll file which gets created must be copied in to the NetSim standard bin
folder.
The modified WLAN.h file along with other header files on which it depends (802_11e.h and
802_11abgnac.h), present inside <Installed Directory> \src \Simulation \WLAN\ folder must
be copied and pasted in the DSR solution folder <Installed Directory>\src\Simulation\DSR
and must be included in the DSR solution in visual studio.
182
The Object file library <Installed Directory>\src\Simulation \Dll\WLAN.lib file
which got created must be copied and pasted in the lib folder located at <Installed
Directory>\src\Simulation.
The WLAN.h header file which was included in DSR solution must be edited and the
line where _declspec(dllexport) PHY_VAR *var1; was written must be replaced with
_declspec(dllimport) PHY_VAR *var1;
For viewing the variable value in the command prompt, the following lines must be
added in DSR.c.
#include WLAN.h
if(var1)
fprintf (stderr,"\n Received Power- %lf\n",var1->dTotalReceivedPower);
183
The solution must be built and the resulting dll file <Installed
Directory>\src\Simulation \Dll\libDSR.dll must be copied and replaced in the NetSim
Standard bin path. When a scenario is run, the Total Received Power can be seen in the
command prompt.
184
7.4 NetSim APIs
NetSim provides a wide variety of APIs for protocol developers. These are available in
1. packet.h Packet related APIs (Eg: Create_Packet ( ), Copy_Packet ( ), Free_Packet (
) etc.)
2. stack.h Network / device / link and event related APIs (Eg: Get_Device_IP ( ),
Get_Connected_Link( ), Add_Event ( ) etc.)
3. list.h, -- Optimized list operation calls since NetSim uses lists extensively (Eg:
Add_to_list ( ), Sort_list ( ) etc.)
4. NetSim_Graph.h This is used for plotting graphs using GNU plot
5. IP_Addressing.h For setting & getting IP address per the appropriate format (Eg:
Convert_IP_to_string ( ), Compare_IP( ) etc.)
For detailed help please refer the appropriateheader (.h) files inside:
../NetSim_Standard/src/simulation/include or read through the doxygen source code
documentation available inside NetSim Help NetSim source code Help
Include all the header (.h) files from the include folder
NetworkStack.lib is a import library file and has the definitions for the functions
present in the NetworkStack.dll
When developing new protocols users should create their own protocol.h and declare
all the protocol specific variables here. Stack & packet related variables should be
used from stack.h and packet.h
Every protocol should provide the following APIs as hooks to the network stack:
int (*fn_NetSim_protocol_init)(conststruct stru_NetSim_Network*,conststruct
stru_NetSim_EventDetails*,constchar*,constchar*,int,constvoid**);
Using this API the stack passes all the relevant pointers to variables, paths etc needed for
the protocol. Inside this function a) local variables should be initialized, b) Initial events if
any should be written,eg: Hello packet in RIP, STP in Ethernet c) File pointers for
reading & writing protocol_specific_IO files.
int (*fn_NetSim_protocol_Configure)( conststruct stru_NetSim_Network*, int
nDeviceId, int nINterfaceID, int nlayertype, fnpAllocateMemory, fnpFreeMemory,
fpConfigLog );
185
The stack calls this API when reading the config file. Upon reaching the appropriate
protocol definition in the XML file, the stack calls this and passes all these pointers to the
protocol
char* (*fn_NetSim_protocol_trace)(int): This called by the stack to write the event trace
186
8 Advanced Features
8.1 Random number Generator and Seed Values
All network simulations involve an element of randomness. Some examples are -
a. It is possible to configure the traffic sources in the simulation to generate traffic in a
perfectly regular pattern. However, this is typically not the case in the real world.
b. Node back-offs after collisions are random to resolve contention issues
c. The exact bit which is errored, based on Bit error probability of a wireless channel, is
decided randomly
NetSim uses an in-built Linear Congruential Random Number Generator (RNG) to generate
the randomness. The RNG uses two seeds values to initialize the RNG.
Having the same set of seed values ensures that for a particular network configuration the
same output results will be got, irrespective of the PC or the time at which the simulation is
run. This ensures repeatability of experimentation.
Modifying the seed value will lead to the generation of a different set of random numbers and
thereby lead to a different sequence of events in NetSim. When simulations are run for a
network configuration with different seed values, the results will likely be slightly different.
More advanced users may note that Confidence can be established by analyzing a set of
results with different seed values for the same network scenario.
187
8.2 Static Routing
How to Setup Static Routes in RIP and OSPF
Using GUI
Step1: Create a scenario in internetworks and set properties of the devices. Configure the
applications.
Step 2: While running the simulation, go to IP and ARP configuration tab and enable Static
IP forwarding and browse the path where it has to be saved.
Using CLI
Step1: In internetworks, Static Routes can be set for any scenario having a minimum of 3
routers, 2 switches and 3 wired nodes. The easiest way to do this is to first run the scenario
with routing protocol set as RIP/OSPF and save the Configuration file
Step 2: Open the Configuration file with Visual studio. Expand the Router configuration and
set the Static Routing information in Application Layer property of the device, by enabling
the Static routing status. Then set the appropriate Static routing file name and file path.
RIP
By default:
<LAYERTYPE="APPLICATION_LAYER">
<ROUTING_PROTOCOLNAME="RIP"SETPROPERTY="true">
188
<PROTOCOL_PROPERTYFILE_NAME="StaticRouting.txt"FILE_PATH="C:\Program
Files\NetSim
standard\Docs\Sample_Configuration\Internetworks"GARBAGE_COLLECTION_TIMER="
120"STATIC_ROUTING_STATUS="DISABLE"TIMEOUT_TIMER="180"UPDATE_TIMER="30"VERS
ION="2"/>
</ROUTING_PROTOCOL>
</LAYER>
Change to:
<LAYERTYPE="APPLICATION_LAYER">
<ROUTING_PROTOCOLNAME="RIP"SETPROPERTY="true">
<PROTOCOL_PROPERTYFILE_NAME="StaticRouting.txt"FILE_PATH="C:\Program
Files\NetSim
standard\Docs\Sample_Configuration\Internetworks"GARBAGE_COLLECTION_TIMER="
120"STATIC_ROUTING_STATUS="ENABLE"TIMEOUT_TIMER="180"UPDATE_TIMER="30"VERSI
ON="2"/>
</ROUTING_PROTOCOL>
</LAYER>
OSPF
By default:
<LAYERTYPE="APPLICATION_LAYER">
<ROUTING_PROTOCOLNAME="OSPF"SETPROPERTY="true">
<PROTOCOL_PROPERTYFILE_NAME="StaticRouting.txt"FILE_PATH="C:\Program
Files\NetSim standard\Docs\Sample_Configuration\Internetworks"
LS_REFRESH_TIME="1800"MAX_AGE="3600"ROUTER_PRIORITY="1"STATIC_ROUTING_STATU
S="DISABLE"VERSION="2"/>
</ROUTING_PROTOCOL>
</LAYER>
Change to:
<LAYERTYPE="APPLICATION_LAYER">
<ROUTING_PROTOCOLNAME="OSPF"SETPROPERTY="true">
<PROTOCOL_PROPERTYFILE_NAME="StaticRouting.txt"FILE_PATH="C:\Program
Files\NetSim standard\Docs\Sample_Configuration\Internetworks"
LS_REFRESH_TIME="1800"MAX_AGE="3600"ROUTER_PRIORITY="1"STATIC_ROUTING_STATU
S="ENABLE"VERSION="2"/>
</ROUTING_PROTOCOL>
</LAYER>
189
Note:
1. Device Id
DEVICE_ID:1
DEVICE_ID:2
Step 3: After this, run this configuration file through CLI and static routes will be used for
routing.
190
8.3 File Based Mobility
Mobility models represent the movement of mobile user, and how their location, velocity and
acceleration change over time. Such models are frequently used for simulation purposes
when new communication or navigation techniques are investigated, or to evaluate the
performance of mobile wireless systems and the algorithms and protocols at the basis of
them.
In File Based Mobility, users can write their own custom mobility models and define the
movement of the mobile users. The name of the trace file generated should be kept as
mobility.txt and it should be in the NS2 trace file format. The user can also generate the trace
file by using any Traffic Generator like VanetMobSim, SUMO (Simulation of Urban
MObility) etc.
Step 1: Create a text file inside <NetSim Installation Directory>\bin and rename it as
mobility.txt
Step 2: Open the text file and write the code in format shown below
# User needs to specify the total number of Nodes and Environment size as shown below
#nodes: <No. of Nodes> max x = <X_Environment_Size>, max y: <Y_Environment_Size>
#First specify the location of all the devices as per their X, Y and Z Axis
$node_(<Node _ID - 1>) set X_ <Initial X_Coordinate>
$node_(<Node _ ID - 1>) set Y_ <Initial Y_ Coordinate >
$node_(<Node _ ID - 1>) set Z_ <Initial Z_ Coordinate >
#Specify the new location of the specific device at the specific time
$time <Time_in_Secs> "$node_(<Node_ ID - 1>) <X_Coordinate> <Y_ Coordinate > <Z_
Coordinate >"
191
Step 3: In NetSim, go to MANET and create a Network scenario. Set Mobility Model
as File Based Mobility and simulate.
A sample file based mobility experiment is present at <NetSim Installed Directory> \Docs\
Sample_Configuration\ MANET.
A sample mobility.txt file for a MANET network containing 2 nodes is shown below
#
#nodes: 2 max x = 500.0, max y: 500.0
#
$node_(0) set X_ 70.0
$node_(0) set Y_ 70.0
$node_(0) set Z_ 0.0
$node_(1) set X_ 150.0
$node_(1) set Y_ 150.0
$node_(1) set Z_ 0.0
$time 0.0 "$node_(0) 70.00 70.00 0.00"
$time 0.0 "$node_(1) 150.0 150.0 0.0"
$time 5.0 "$node_(0) 100.00 70.00 0.00"
$time 5.0 "$node_(1) 150.0 160.0 0.0"
$time 10.0 "$node_(0) 130.00 70.00 0.00"
$time 10.0 "$node_(1) 150.0 170.0 0.0"
$time 15.0 "$node_(0) 160.00 70.00 0.00"
$time 15.0 "$node_(1) 150.0 180.0 0.0"
$time 20.0 "$node_(0) 190.00 70.00 0.00"
$time 20.0 "$node_(1) 150.0 190.0 0.0"
$time 25.0 "$node_(0) 220.00 70.00 0.00"
$time 25.0 "$node_(1) 150.0 200.0 0.0"
$time 30.0 "$node_(0) 250.00 70.00 0.00"
$time 30.0 "$node_(1) 150.0 210.0 0.0"
$time 35.0 "$node_(0) 280.00 70.00 0.00"
$time 35.0 "$node_(1) 150.0 220.0 0.0"
$time 40.0 "$node_(0) 310.00 70.00 0.00"
$time 40.0 "$node_(1) 150.0 230.0 0.0"
$time 45.0 "$node_(0) 340.00 70.00 0.00"
$time 45.0 "$node_(1) 150.0 240.0 0.0"
$time 50.0 "$node_(0) 370.00 70.00 0.00"
$time 50.0 "$node_(1) 150.0 250.0 0.0"
192
8.4 Interfacing MATLAB with NetSim
8.4.1 Implement Nakagami Distribution of MATLAB in NetSim without
using .m file
In this example we will replace the default Rayleigh Fading (part of the path loss calculation)
used in NetSim, with a Fading Power calculated using the Nakagami Distribution from
MATLAB
Procedure:
1) Create a MATLAB_Interface.c file inside the WLAN folder which can be found in
the path <NetSim_Install_Direcotry>/src/Simulation/. Write the following code inside the file
MATLAB_Interface.c file
/*
*
* This is a simple program that illustrates how to call the MATLAB
* Engine functions from NetSim C Code.
*
*/
#include <windows.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include "engine.h"
#include "mat.h"
#include "mex.h"
char buf[100];
Engine *ep;
int status;
mxArray *h=NULL, *i=NULL, *j=NULL,*k=NULL;
mxArray *out;
double *result;
double fn_matlab_init()
{
/*
* Start the MATLAB engine
*/
if (!(ep = engOpen(NULL))) {
MessageBox ((HWND)NULL, (LPCWSTR)"Can't start MATLAB engine",
(LPCWSTR) "MATLAB_Interface.c", MB_OK);
exit(-1);
}
engEvalString(ep,"desktop");
return 0;
}
double fn_netsim_matlab()
{
193
//write your own implementation here
int nakagami_shape=5,nakagami_scale=2;
engPutVariable(ep,"h",h);
sprintf(buf,"h=ProbDistUnivParam('nakagami',[%d
%d])",nakagami_shape,nakagami_scale);
status=engEvalString(ep,buf);
engPutVariable(ep,"i",i);
sprintf(buf,"i=random(h,1)");
status=engEvalString(ep,buf);
out=engGetVariable(ep,"i");
result=mxGetPr(out);
return *result;
}
double fn_netsim_matlab_Finish()
{
status=engEvalString(ep,"exit");
return 0;
}
3) Right click on WLAN Project present in Solution Explorer window and select
Add Existing Item and select the MATLAB_Interface.c file.
194
4) MATLAB_Interface.c file contains the following functions
a) fn_matlab_init() - Opens the MATLAB Engine
b) fn_netsim_matlab() - Communicates with MATLAB Command Window
c) fn_netsim_matlab_finish() - Closes the MATLAB Engine
195
7) Similarly add a call to fn_netsim_matlab_Finish() inside the
fn_NetSim_WLAN_Finish() function.
8) In the Solution Explorer double click on the WLAN.h file. Add definitions of the
following functions
double fn_matlab_init();
double fn_netsim_matlab();
double fn_netsim_matlab_Finish();
196
9) In the Solution Explorer double click on the 802_11_PHY.c file.
11) Make a call to the fn_netsim_matlab() function by adding the following line,
*dFadingPower = fn_netsim_matlab();
12) To compile a MATLAB engine application in the Microsoft Visual Studio 10.0
(2010) environment, Right click on the WLAN project and select PROPERTIES in the
solution explorer. Once this window has opened, make the following changes:
197
a) Under C/C++ General, add the following directory to the field ADDITIONAL
INCLUDE DIRECTORIES:
<Path where MATLAB is installed>\extern\include
NOTE: To determine path where MATLAB is installed, entering the following command in the
MATLAB command prompt:
matlabroot
198
c) Under Linker General, add the directory to the field ADDITIONAL LIBRARY
DIRECTORIES:
<Path where MATLAB is installed>\extern\lib\win32\microsoft
d) Under Configuration Properties Debugging, Add the following Target path in the
ENVIRONMENT:
<Path where MATLAB is installed>\bin\win32
199
13) Under Linker Input, add the following names to the field marked ADDITIONAL
DEPENDENCIES:
libeng.lib, libmx.lib, libmat.lib
14) Make sure that the following directory is in the environment variable PATH:
<Path where MATLAB is installed>\bin\win32
NOTE: To do step 14, check the Windows system path by clicking on Start Right click on
Computer Properties Advanced System Settings Environment variables System
Variables Open "Path" for editing.
Note: If the machine has more than one MATLAB installed, the directory for the target platform
must be ahead of any other MATLAB directory (for instance, when compiling a 32-bit
application, the directory in the MATLAB 32-bit installation must be the first one on the
PATH).
200
16) Now replace the newly built libWLAN.dll from the DLL folder, into the NetSim bin
folder. Please ensure you rename the original libWLAN.dll file to retain a copy of the
original file.
[For more information, follow steps provided in Writing your own code: Linking Dlls
under Custom Code in NetSim chapter]
17) Create a Network scenario involving WLAN say MANET, and set the Fading Figure
value in the Multipoint to Multipoint Link properties to 1, to ensure that Rayleigh fading is
set.
18) Perform Simulation. You will find that once the Simulation starts, MATLAB
command window starts and gets closed once the simulation is over.
!matlab -regserver
201
8.4.2 Debug and understand communication between NetSim and
MATLAB
1. In the Solution Explorer of Visual Studio double click on WLAN.c and Add a getch()
inside the fn_NetSim_WLAN_Init() function.
202
3. Now run the NetSim Scenario. The simulation window stops for user interrupt.
4. In Visual studio, go to Debug Attach to Process.
5. From the list of Processes select NetSimCore.exe and click on Attach.
7. MATLAB Command Window and MATLAB Desktop Window will start and
breakpoint in Visual Studio gets triggered.
203
8. Now when debugging (say, by pressing F5 each time) you will find the computation
taking place in the MATLAB Workspace.
9. This value of i obtained from MATLAB is used to calculate fading power instead of
the Rayleigh Fading Model.
10. Add a watch to the *dFadingPower variable in the 802_11_PHY.c file. For this, right
click on the variable *dFadingPower and select Add Watch option. You will find a watch
window containing the variable name and its value in the bottom left corner.
204
11. Now place another breakpoint after the line *dFadingPower = fn_netsim_matlab()
12. Now when debugging (say by pressing F5 each time) you will find that the watch
window displays the value of *dFadingPower whenever the control reaches the recently set
breakpoint. You will also find that the value of *dFadingPower in the Visual Studio Watch
window and the value of i in the MATLAB workspace window are similar.
205
8.4.3 Implement Nakagami Distribution of MATLAB in NetSim using
.m file:
Procedure:
function WLAN=nakagami(scale,shape)
h=ProbDistUnivParam('nakagami',[scale,shape]);
i=random(h,1);
WLAN=i;
NOTE: To determine path where MATLAB is installed, entering the following command in the
MATLAB command prompt:
matlabroot
206
4. Now double click on MATLAB_Interface.c file in the Solution Explorer if a link
exists, else right click on WLAN project and select add existing item to add the file to the
project.
double fn_netsim_matlab()
{
//write your own implementation here
int nakagami_shape=5,nakagami_scale=2;
sprintf(buf,"k=nakagami(%d,%d)",nakagami_shape,nakagami_scale);
status=engEvalString(ep,buf);
out=engGetVariable(ep,"k");
result=mxGetPr(out);
return *result;
}
6. A call to the nakagami() function inside the nakagami.m file is made, and
nakagami_shape and nakagami_scale parameters are passed from NetSim.
8. Replace the newly build libWLAN.dll from the DLL folder in the NetSim bin folder
after renaming the original libWLAN.dll file.
9. Create a Network scenario involving WLAN say MANET, and set the Fading Figure
value in the Multipoint to Multipoint Link properties to 1 to ensure that Rayleigh fading is
set.
10. You will find that once the Simulation is run MATLAB Command Window starts and
gets closed once the Simulation is over.
You can also debug the code to understand the communication between NetSim and
MATLAB as explained in the DEBUGGING section above.
207
8.4.4 Plot a histogram in MATLAB using the values generated by
Nakagami distribution for NetSim (using .m file).
Procedure:
function WLAN=NETSIM_MATLAB(choice,varargin)
switch(choice)
case 'nakagami'
h=ProbDistUnivParam('nakagami',[varargin{1},varargin{2}]);
i=random(h,1);
fid = fopen('plotvalues.txt','a+');
fprintf(fid,'%f',i);
fprintf(fid,'\r\n');
fclose('all');
WLAN=i;
case 'plothistogram'
fid=fopen('plotvalues.txt');
mx=fscanf(fid,'%f');
hist(mx);
fclose('all');
end
208
4. Now double click on MATLAB_Interface.c file in the Solution Explorer if a link
exists, else right click on WLAN project and select add existing item to add the file to the
project.
int nakagami_shape=5,nakagami_scale=2;
if(strcmp(arr,"nakagami")==0)
{
engPutVariable(ep,"h",h);
sprintf(buf,"h=NETSIM_MATLAB('nakagami',%d,%d)",nakagami_shape,nakagami_scale);
status=engEvalString(ep,buf);
out=engGetVariable(ep,"h");
result=mxGetPr(out);
return *result;
}
else if(strcmp(arr,"plothistogram")==0)
{
status=engEvalString(ep,"NETSIM_MATLAB('plothistogram')");
return 0;
}
else
return 0;
}
8. Also add the following call to fn_netsim_matlab() function along with a getch() to
plot the histogram before closing the MATLAB Engine.
209
9. Similarly in the call made to fn_netsim_matlab() function in 802_11_PHY.c file add
the parameter nakagami as shown below
10. Also modify the function definition of fn_netsim_matlab() function in WLAN.h file
as shown below
210
11. Right Click on WLAN project and select Rebuild.
12. Now Replace the newly build libWLAN.dll from the DLL folder in the NetSim bin
folder after renaming the original libWLAN.dll file.
13. Create a Network scenario involving WLAN say MANET, and set the Fading Figure
value in the Multipoint to Multipoint Link properties to 1 to ensure that Rayleigh fading is
set.
14. You will find that once the Simulation is run MATLAB Command Window starts and
once the Simulation is over a histogram is displayed in MATLAB for the values that were
generated using nakagami distribution.
15. The graph and the MATLAB windows gets closed once you press any key.
You can also debug the code to understand the communication between NetSim and
MATLAB as explained in the DEBUGGING section above.
211
8.5 Adding Custom Performance Metrics
In Performance Metrics, users have the latitude of adding their own customized metric
variables by editing the source code of the protocol of that specific networking technology.
The following example provides a better understanding of how to implement it.
For illustration, an example regarding Wireless Sensor Network is provided. In this example,
users will print Sensor Node Name, Residual Energy, State(On/Off) and turnoff time in the
performance metrics
#include "string.h"
double NetSim_Residual_Energy[100];
string NetSim_Node_name[100];
double NetSim_Off_Time[100];
string NetSim_Node_state[100];
STEP 2:
Copy the below code (in red colour) in 802_15_4.c file (inside fn_NetSim_Zigbee_Metrics()
function)
212
STEP 3:
Copy the below code (in red colour) at the end of ChangeRadioState.c file (inside IF(nStatus)
loop)
if(nStatus)
{
WSN_PHY(nDeviceId)->nOldState = nOldState;
WSN_PHY(nDeviceId)->nRadioState = nNewState;
NetSim_Node_state[nDeviceId-1]= "ON";
NetSim_Node_name[nDeviceId-1]= NETWORK->ppstruDeviceList[nDeviceId-1]-
>szDeviceName;
return nStatus;
}
else
{
WSN_PHY(nDeviceId)->nRadioState = RX_OFF;
WSN_MAC(nDeviceId)->nNodeStatus = OFF;
NetSim_Off_Time[nDeviceId-1] = ldEventTime;
NetSim_Node_state[nDeviceId-1]= "OFF";
NetSim_Node_name[nDeviceId-1]= NETWORK->ppstruDeviceList[nDeviceId-1]-
>szDeviceName;
return nStatus;
STEP 4:
Build DLL with the modified code and run a Wireless Sensor Network scenario.
After Simulation, user will notice a new Performance metrics named Custom WSN
Metrics is added
213
9 Programming Exercises
This menu contains network programming exercises and is not available in Pro version.
Run down the menu and select the desired programming exercise. The programs available are
as follows,
Assignments of Sites to Concentrator
Address Resolution Protocol
Cryptography
o Substitution
o Transposition
o XOR
o Advanced
Data Encryption Standard
RSA
Wired Equivalent Privacy
Distance Vector Routing
Dynamic Host Configuration Protocol
Error Correcting Code
o Hamming Code
Error Detecting Codes
o Cyclic Redundancy Check
o Longitudinal Redundancy Check
Framing Sequence
o Bit Stuffing
o Character Stuffing
Generic Cell Rate Algorithm
o Virtual Scheduling Algorithm
IPV4 Addressing
o Address Mask
o Binary Conversion
o Classless InterDomain Routing
o Network Address
o Special Addresses
214
o Subnetting
IPV6 Addressing
o EUI - 64 Interface Identifier
o Host Addresses
o Subnetting
Leaky Bucket Algorithm
Multi Level Multi Access
Multiple Access Technology
o CDMA
o TDMA
o OFDMA
PC to PC Communication
o Socket Programming
o Chat Application
Scheduling
Shortest Path
Sliding Window Protocol
Sorting Techniques
Spanning Tree
Transmission Flow Control
NetSims Programming Lab has been designed to provide hands - on network programming
skills to students. The labs come with a GUI where students can first run the experiment in
Sample mode and subsequently link their own code and visualize its working. Programs
can be written in C and the executable can be linked to NetSim.
215
9.1 Architecture
The following Architecture is applicable for all the exercises under the Programming
menu. Each exercise has two modules
Using the Input - Output module inputs are given and output is viewed. The working of the
concept/algorithm is done in the process module. The link between the Input - Output
module and process module is as follows
Input - Output Process
Process is the module for which the user has to write and link the written code when using the
user mode.
The code can be written either by C or C++, the executable file created should be linked to
the software.
The input and output file format should be as required, as they form the link between the
software and the user executable file.
216
9.2 Creating .exe file for Programming Exercise
1. Select FileNewProject
2. Select Win32Console Application. Name the project and select location to save the
project and then click OK button.
217
3. Click Next Check Whether Console application is selected or not. If selected, then
select Empty Project, otherwise select Console application and Empty Project and
finally click Finish button.
4. Add source codes to the project. Right click on the Source FilesAddNew Item
218
5. Select C++ File (.cpp) and name the file with extension of .c
219
7. Copy and paste the source code.
8. Select the mode for creating the exe i.e., debug or release mode by choosing the
required option as shown in the figure. The preferred setting is debug mode.
220
9. To build the Solution,Select Build Menu Build Solution
221
9.2.2 Using GCC
By using Command Prompt:
C / C++ files can be created using any editor. Ex: Notepad
Once C / C++ file is ready go to command prompt using Start Run.
There are three cases for creating Exe (.exe) file using GCC.
Case 1: C programs
1. Set the path as C program path
4. Once exe file is created link that exe file with NetSim Programming User mode
222
Case 2: C++ programs
1. Set the path as C++ program path.
4. Once exe file is created link that exe file with NetSim Programming User mode
Case 3: Socket programs
1. Set the path to Socket program location.
223
3. Create exe file (.exe file) using below command
gcc -o send send.o -lws2_32
4. Once exe file is created link that exe file with NetSim Programming User mode
1. Open the C source code file in Dev C++. Then go to Execute Compile.
Dev C++ will create the exe file in the same location where the C source code file is
located
2. Once exe file is created , link that exe file with NetSim Programming User mode
224
Note: For Windows Vista, set up Dev C++ as shown below
In Dev C++ 4.9.9.2.exe, go to Tools Compiler Options Directories tab Binaries tab
Add the following path as per your installation directory in the text box provided and click on
add button.
C:\Dev-Cpp\libexec\gcc\mingw32\3.4.2
In the C Includes tab add the follwing path in the text box provided and click on add button.
C:\Dev-Cpp\lib\gcc\mingw32\3.4.2\include
225
In the programs tab edit the following paths as shown in screenshot.
226
9.3 Steps to perform Programming Exercise in NetSim
In NetSim, select Programming < The exercise you want > .
Step 1:
In the left panel, select the Mode as Sample. Provide the required inputs in the panel and
click on Run.
So presently NetSim will run that algorithm code already present in the software and will
display the result graphically.
Step 2:
For user to write their own C Code in NetSim and check the result, click on Concept
Algorithm Pseudo Code and Flowchart (present in Help in the left pane) and understand the
working of the algorithm.
Step 3:
Then click on Interface Source Code (present in Help in the left pane).
Open Dev C++ or any GNU C compiler based IDK and copy the code from the Interface
Source Code.
The user needs to edit the Interface Source Code at the following location. For Example,
So the user needs to write the code, create exe and attach it with NetSim to run.
Step 4:
Create .exe file. In the left panel, select the Mode as User. Select the .exe file created above.
Set the input and click Run. So presently NetSim will run code which is written by the user
and will display the result graphically.
In case of any error, ERROR IN USER CODE message will be displayed.
227
9.4 How to De-bug your code linked to NetSims
Programming Exercise
In NetSim, programming exercise menu, users can write and link their code as executables
(*.exe). If the users *.exe file does not provide the correct output, NetSim UI will display the
message Error in User Code. To de-bug your code on getting this message, follow the steps
given below:
1. Run the scenario again in sample mode. On completion, minimize NetSim and keep it
running without closing the programming exercise.
2. Open your code in Visual studio 2010.The procedure is explained above in Creating.exe
file for Programming Exercises.
3. Right click on your project in the Solution Explorer pane and select properties as shown
below
228
4. Inside the properties window select Debugging and edit the Command Arguments as
shown
229
6. Now add a breakpoint to your code in your function or in the main ( ), and proceed with
de-bugging
7. At the end check if the output.txt present in the %temp%\NetSim path and the temp.txt
present in the %temp%\NetSim path are exactly similar. Exact similarity would indicate
that your code will work fine when you run it in use mode the next time.
230
9.5 Programming Exercises
9.5.1 Address Resolution Protocol
Programming Guidelines
This section guides the user to link his/her own code for Address Resolution Protocol to
NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
The first line of the Input.txt contains the The output file should contain two lines,
number of nodes in the network, following The first line has the details of the Source
which the IP Addresses are assigned to each (i.e.) in which class it is present. The second
node (ascending order). The last two lines are line has the result of the ARP i.e., whether
the Source node IP Address and the destination is present in the class.
Destination node IP Address respectively.
An example format of input.txtis given below, The second line has the flag value
(important) that is used for the animation.
Number_of_Nodes=3
The result for the above is:
Node1_IP_Address=192.168.1.1
Node2_IP_Address=192.168.1.2 Source is Class C.Destination is present in
Node3_IP_Address=192.168.1.3 that class 2
Source_Node_IP_ Address=192.168.1.3
Destination_Node_IP_Address=192.168.1.1
231
Interface Source Code
Interface Source code written in C is given and using this the user can write only the Address
Resolution Protocol inside the function fnARP () using the variables already declared.
To view the interface source code, go to NetSim Installation path / src / Programming /
ARP.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenario:
Objective - To find the Medium Access Control (MAC) Address of the Destination Node
using Address Resolution Protocol (ARP).
How to Proceed? - The objective can be executed in NetSim by using the programming
exercise available. In the Programming menu select Address Resolution Protocol(ARP).
Sample Input - By using the Input Panel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
1 192.168.1.1
2 192.168.1.2
3 192.168.1.3
4 192.168.1.4
5 192.168.1.5
6 192.168.1.6
ARP Request System and ARP Reply System needs to be selected. That is,
1. ARP Request System 192.168.1. 1 (Any one Node Number to be
selected)
2. ARP Reply System 192.168.1. 6 (Any one Node Number to be selected)
Then Run button need to be clicked.
232
Output - Output for the above Sample is as follows,
The Source Node (i.e. Node Number 1 in the above example) sends the ARP
Request to the Connecting Device.
The Connecting Device then broadcasts the ARP Request to all the Nodes
available in the network.
The Destination Node (i.e. Node Number 6 in the above example) sends an
acknowledgement in the form of ARP Reply (i.e. The Destination MAC -
MAC Address of the Destination Node) to the Connecting Device.
The Device then transmits the ARP Reply (i.e. The Destination MAC - MAC
Address of the Destination Node) only to the Source Node.
Once the sample experiment is done, then Refresh button can be clicked to
create new samples.
233
9.5.2 Assignment of Sites to Concentrator
Programming Guidelines
This section guides the user to link his/her own code for Assignment of Sites to Concentrator
to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Input.txt contains the number of sites, In the output file (i.e. Output.txt) each line
number of concentrators, and number of should indicate one complete traverse. For
sites that can be assigned to a concentrator, example, for the above input, the output file
the order in which sites are to be assigned should be:
and the distance matrix given by the user. 2>1>
The format of input.txtis:
1>2>
Number_of_Sites=2
In each line, the first character indicates the
Number_of_Concentrators=2 site and the rest indicates the concentrators.
Sites_per_Concentrator=1 The second character (excluding the >
symbol) is the first concentrator found with
Selected_Priority=1>0>
minimum distance/cost. The third character
Distance is a concentrator, which has the minimum
1>2> distance/cost compared to the previous one
and so on.
3>4>
Note:> is the delimiter symbol, which is
Note: > is the delimiter symbol, which is used to separate each input.
used to separate each input.
234
Interface Source Code
Interface Source code code written in C is given using this the user can write only the
Assignments of Sites to Concentrators inside the function fnAssignmentsofSites() using the
variables already declared.
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To allocate the resource which is concentrator to the require system which is
sites based on the distance for each sites to concentrator.
How to proceed? - The objective can be executed in NetSim using the programming exercise
available, under programming user has to select Assignment of Sites to Concentrator.
Sample Input - By using the Input Panel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
Sample Mode should be selected.
Number of Sites need to be selected. The value that has selected ranges from 1 to
7.
Number of Concentrators need to be selected. The values available for selection
are 2, 3 and 4.
Number of Sites / Concentrators need to be selected. The value that has selected
ranges from 1 to 7.
Click on the image to select Priority. Click on Change Priority to reset the
Priority of the Sites.
Enter the Distance in the given table. Distance should be in the range, 1 to 99 km.
Then Run button need to be clicked. Refresh button can be used if new Inputs
have to be given.
Click on Concept, Algorithm, Pseudo Code & Flow Chart to get help on it.
235
Output - The following steps are under gone internally,
The site which has the highest priority searches for a concentrator which is the
nearest.
A red line appears between the site and a concentrator. This indicates the only
shortest path available between the site and the concentrators. Hence, it
indicates the site has been allocated to that concentrator.
A site can have only one concentrator, whereas a concentrator can have many
sites linked to it.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
236
9.5.3 Cryptography - Substitution - Encryption
Programming Guidelines
This section guides the user to link his/her own code for Substitution to NetSim.
Pre-conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
There are six lines in Input.txt file. Plain letter>encrypted letter for the
corresponding plain letter>
Cryptographic_Technique=Substitution
Cryptographic_Method=Encryption t>u>v>
e>f>g>
Plain_Text:
t>u>v>
tetcos
c>d>e>
Key_Text:
o>p>q>
2
s>t>u>
Interface Source code written in C is given using this the user can write only the Substitution-
Encryption inside the function fnSubstutionEncryption () using the variables already
declared.
237
NetSim Installation path / src / Programming/ SubstEncrypt.c
To find NetSims Installation path right click NetSim icon and select
238
9.5.4 Cryptography - Substitution - Decryption
Programming Guidelines
This section guides the user to link his/her own code for Substitution to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
There are six lines in Input.txt file. Cipher letter>decrypted letter for the
corresponding cipher letter>
Cryptographic_Technique=Substitution
v>u>t>
Cryptographic_Method=Decryption
g>f>e>
Cipher_Text:
v>u>t>
vgvequ
e>d>c>
Key_Text:
q>p>o>
2
u>t>s>
Interface Source code written in C is given using this the user can write only the Substitution-
Decryption inside the function SubstutionDecryption () using the variables already declared.
239
NetSim Installation path / src / Programming/ SubstDecrypt.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Encrypt and decrypt the message with the same key value using Substitution.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming user has to select Cryptography Substitution.
Encryption:
Sample Input: In the Input panel the following steps need to be done,
Enter the Plain Text that needs to be encrypted. Maximum of 8 alphabets need
to be entered.
Enter the Key Value. This is an Integer which is within the range 0 to 26.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
The Plain Text and Key Value entered would be displayed in red color.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
Decryption:
Sample Input: In the Input panel the following steps need to be done,
240
Decryption need to be selected.
Cipher Text obtained while encryption is filled in the Plain Text and also the
Key Text is same as that entered while encrypting.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
The Cipher Text and Key Value entered would be displayed in red color.
The corresponding Plain Text that had been entered at the time of encrypting is
obtained.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
241
9.5.5 Cryptography - Transposition - Encryption
Programming Guidelines
This section guides the user to link his/her own code for Transposition Encryption to NetSim.
Pre-conditions
The user program should read the inputted scenario from text file named Input with
extension txt. The user program after executing the concept should write the required output
to a file named Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Cryptographic_Technique=Transposition 1>3>4>5>2>
Cryptographic_Method=Encryption T>E>T>C>O>S>T>E>T>C>
Plain_Text: T>S>O>C>E>T>T>E>C>T>
TETCOS
Key_Text:
BLORE
Interface Source Code
Interface Source code written in C is given using this the user can write only the
Transposition-Encryption inside the function fnTranspositionEncryption() using the variables
already declared.
To find NetSims Installation path right click NetSim icon and select
242
9.5.6 Cryptography - Transposition Decryption
Programming Guidelines
This section guides the user to link his/her own code for Transposition Decryption to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Cryptographic_Technique=Transposition BELOR>
Cryptographic_Method=Decryption 1>5>2>3>4>
Cipher_Text: T>O>E>T>C>S>C>T>E>T>
TSOCETTECT
Key_Text:
BLORE
Interface Source code written in C is given using this the user can write only the
Transposition-Decryption inside the function fnTranspositionDecryption() using the variables
already declared.
To find NetSims Installation path right click NetSim icon and select
243
Open file location in Windows 7
Open file location in Windows Vista
Properties find target in Windows XP.
Sample Scenarios:
Objective - Encrypt and decrypt the message with the same key text using Transposition.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming user has to select Cryptography Transposition.
Encryption:
Sample Input: In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked
to create New Samples.
Decryption:
Sample Input: In the Input panel the following steps need to be done,
The Cipher Text obtained for Encryption is the Cipher Text for
Decryption. This would be automatically taken. Maximum of 14
Characters can be entered.
244
Enter the Key Value will also be taken internally. Maximum of 8 alphabets
can be entered.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
The entered Key Value would be displayed first. This is arranged in such a
way that the order is changed when compared to Encryption.
Once the sample experiment is done, then Refresh button can be clicked
to create New Samples.
245
9.5.7 Cryptography - XOR - Encryption
Programming Guidelines
This section guides the user to link his/her own code for XOR Encryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Cryptographic_Technique=XOR 01010100>01000010>00010110>
Cryptographic_Method=Encryption 01000101>01001110>00001011>
Plain_Text: 01010100>01001100>00011000>
TETCOS 01000011>01001111>00001100>
Key_Text: 01001111>01010010>00011101>
BNLORE 01010011>01000101>00010110>
Interface Source Code
Interface Source code written in C is given using this the user can write only the XOR-
Encryption inside the function fnXOREncryption () using the variables already declared.
To find NetSims Installation path right click NetSim icon and select
246
9.5.8 Cryptography - XOR - Decryption
Programming Guidelines
This section guides the user to link his/her own code for XOR Decryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Cryptographic_Technique=XOR 00010110>01000010>01010100>
Cryptographic_Method=Decryption 00001011>01001110>01000101>
Cipher_Text: 00011000>01001100>01010100>
00010110000010110001100000001100000 00001100>01001111>01000011>
1110100010110 00011101>01010010>01001111>
Key_Text:
00010110>01000101>01010011>
BNLORE
Here a skeleton code written in C is given using this the user can write only the XOR-
Decryption inside the function fnXORDecryption () using the variables already declared.
247
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Encrypt and Decrypt the message by using the same KeyText in XOR.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu select Cryptography XOR.
Note:Encryption should be done first and then Decryption should be done.
Encryption:
Sample Inputs - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
o SampleMode should be selected.
o EncryptionMode needs to be selected.
o PlainText and KeyValue need to be entered in the fields available. That
is,
Plain Text tetcos (Maximum of 8 Characters)
Key Text 123456 (Maximum of 8 Characters)
Note: If the length of the PlainText and Key Value differs then an error
would pop out.
o Then Run button need to be clicked.
Output - Output for the above Sample is as follows,
o Plain Text t e t c o s
o Key Text 1 2 3 4 5 6
o Binary of plain text 01110011
o Binary of key text 00110110
o XOR Value 01000101
o ASCII Equivalent 69 87 71 87 90 69
o Cipher Text E W G W Z E
248
Decryption:
Sample Inputs - By using the InputPanel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
o SampleMode should be selected.
o After completing the Encryption part, DecryptionMode needs to be
selected.
o CipherText (this field is automatically filled) and KeyValue (this should
be same as the one that is entered in Encryption) need to be entered in the
fields available. That is,
CipherText
010001010101011101000111010101110101101001000101 (Cipher
Text in Binary Format Maximum 64 bits)
KeyText 123456 (Maximum of 8 Characters)
Note - Both Cipher Text and Key Text is automatically taken when
Decryption button is selected (i.e. after undergoing Encryption).
o Then Run button need to be clicked.
Output - Output for the above Sample is as follows,
o Cipher Text E W G W Z E
o Key Text 1 2 3 4 5 6
o Binary of cipher text 01000101
o Binary of key text 00110110
o XOR Value 01110011
o ASCII Equivalent 116 101 116 99 111 115
o Plain Text t e t c o s
Note -
o Text in the Input of the Encryption and Output of the Decryption
should be the same if the Key Value is same.
o The Cipher Text in case of Encryption is Alpha Numeric (i.e. for the
user to understand in a better manner)and in case of Decryption the tool
converts it to Binary form (i.e. since, the tool doesnt recognize Alpha
Numeric).
249
9.5.9 Cryptography - Data Encryption Standard (DES) - Encryption
Programming Guidelines
This section guides the user to link his/her own code for DES Encryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and,The results of the program should be written into the
output file Output.txt.
250
6bit - 4 Bit conversion logic (in each S-Box):
Of the 6 input bits, 4 bits (1, 2, 3, and 4) are used for identifying the S-Box column (4 bits
representing 16 columns) and the remaining 2 bits (0, 5) are used for identifying the S-Box
row (2 bits representing 4 rows). The corresponding hexadecimal number is chosen from the
S-box. Since each Hexadecimal number represents 4 bits in binary form, the total output is of
32 bits.
251
Input File Format Output File Format
Interface Source code written in C is given using this the user can write only the DES-
Encryption inside the function fnDESEncryption() using the variables already declared.
To find NetSims Installation path right click NetSim icon and select
252
9.5.10 Cryptography - Data Encryption Standard (DES) - Decryption
Programming Guidelines
This section guides the user to link his/her own code for DES Decryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
253
254
6bit - 4 Bit conversion logic (in each S-Box):
Of the 6 input bits, 4 bits (1, 2, 3, 4) are used for identifying the S-Box column (4 bits
representing 16 columns) and the remaining 2 bits (0, 5) are used for identifying the S-
Box row (2 bits representing 4 rows). The corresponding hexadecimal number is chosen from
the S-box. Since each Hexadecimal number represents 4 bits in binary form, the total output
is of 32 bits.
Interface Source code written in C is given using this the user can write only the DES-
Decryption inside the function fnDESDecryption () using the variables already declared.
255
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Encrypt and decrypt the message with the using DES.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming user has to select
CryptographyAdvancedDataEncryptionStandard.
Encryption:
Sample Inputs - In the Input panel the following steps need to be done,
Enter the Key Text in the provided field. Only hexadecimal characters
have to be entered. Maximum of 16 characters can be entered in this field.
Characters more than 16 will be filled in the Data field.
Data needs to be entered in this field that has to be encrypted. Data can be
entered only when the Enter Key Text field is filed with 16 hexadecimal
characters. Maximum of 1500 characters can be stuffed into this field.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Output -
Click on Copy button and then on the Paste button to make use of the
Cipher text for Decryption.
256
Once the sample experiment is done, then Refresh button can be clicked
to create New Samples.
Decryption:
Sample Inputs - In the Input panel the following steps need to be done,
Once the Encryption is done, click on Copy and Paste buttons. The
encrypted data is filled in the data field available in the Decryption view.
Fields such as Enter the Key Text, Number of Iteration and Data is filled
in automatically when Copy and Paste button is clicked.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
The Data that was entered in the Encryption view would be encrypted and
displayed.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
257
9.5.11 Rivest-Shamir - Adleman Algorithm (RSA)
Programming Guidelines
This section guides the user to link his/her own code for RSAAlgorithmto NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
258
Interface Source Code
To find NetSims Installation path right click NetSim icon and select
Sample Scenario:
Objective - Encrypt and decrypt the message with the using DES.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming user has to select
CryptographyAdvancedRSA.
Sample Inputs - In the Input panel the following steps need to be done,
Plain Text of only one character has to be entered in the field available.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
259
9.5.12 Cryptography - Wired Equivalent Privacy (WEP) Encryption
Programming Guidelines
This section guides the user to link his/her own code for WEP Encryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface Source code written in C is given using this the user can write only the WEP-
Encryption inside the function fnWEPEncrypt () using the variables already declared.
260
To find NetSims Installation path right click NetSim icon and select
261
9.5.13 Cryptography - Wired Equivalent Privacy (WEP) - Decryption
Programming Guidelines
This section guides the user to link his/her own code for WEP Decryption to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
Note:
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface Source code written in C is given using this the user can write only the WEP-
Decryption inside the function fnWEPDecrypt () using the variables already declared.
To find NetSims Installation path right click NetSim icon and select
262
Open file location in Windows 7
Open file location in Windows Vista
Properties find target in Windows XP.
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In Programming menu select CryptographyAdvancedWired
Equivalent Privacy.
Note: Encryption should be done first and then Decryption should be done.
Encryption
Sample Inputs - By using the Input Panel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
o SampleMode should be selected.
o Under CryptographicMethod, Encryption Mode needs to be selected.
o InputData (Maximum of 1500 Characters) - NetSim TetCos
Bangalore
o Then Run button need to be clicked.
Sample Inputs - By using the InputPanel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
263
o Sample Mode should be selected. (This is Automatically selected once
the Paste button is clicked at the time of Encrypting the Data).
o Under Cryptographic Method, Encryption Mode needs to be selected.
(This is Automatically selected once the Paste button is clicked at the
time of Encrypting the Data).
o Enter Key Value 3E41C6ABCDEF0123 (16Hexadecimal Characters).
(This field is Automatically filled once the Paste button is clicked at the
time of Encrypting the Data).
o Number of Iterations 1.
o InputData -
786441A955C419F9537576954F897BCC5866549653DB5CA73E1B4D
F63CA939AD (This field is Automatically filled once the Paste button
is clicked at the time of Encrypting the Data).
o Then Run button need to be clicked.
264
9.5.14 Distance Vector Routing
Programming Guidelines
This section guides the user to link his/her own code for Distance Vector Routing to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
265
2>1>2>1>0
2>1>5>1>0
2>2>1>1>0
2>2>5>2>1
2>5>1>1>0
2>5>2>2>1
Interface Source code written in C is given using this the user can write only the Distance
Vector Routing inside the function fnDistVectAlgorithm() using the variables already
declared.
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim by using the programming
exercise available. In the Programming menu selectDistance Vector Routing.
Sample Input -Follow the below given steps,
Click on two Routers to establish a Path (i.e. 1st Click on Router number 1
and 2, then similarly on Router number 2 and 3, 3 and 4, 4 and 5, 5 and 6,
& 6 and 1).
Router 1, 2, 3, 4, 5, 6 are connected.
Click on Initial, Intermediate and Final button to execute.
Output - The Output that is obtained is given below,
266
Initial button can be clicked to view the initial table of the all router.
Intermediate button can be clicked to view the intermediate table of the all router.
Final button can be clicked to view the final table of the all router.
267
9.5.15 Distance Host Configuration Protocol
Programming Guidelines
This section guides the user to link his/her own code for Dynamic Host Configuration
Protocol to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Number_of_Clients = 4 DHCP_DISCOVER>
Start_Address = 192.168.0.105 Node1>Node2>
End_Address = 192.168.0.109 Node1>Node3>
Mask = 255.255.255.0 Node1>Node4>
Node1>Server
DHCP_OFFER>
Server>Node1
DHCP_REQUEST>
Node1>Server
DHCP_ACK>
Server>192.168.0.105
DHCP_DISCOVER>
Node2>Node1>
Node2>Node3>
Node2>Node4>
Node2>Server
DHCP_OFFER>
Server>Node2
DHCP_REQUEST>
Node2>Server
268
DHCP_ACK>
Server>192.168.0.106
DHCP_DISCOVER>
Node3>Node1>
Node3>Node2>
Node3>Node4>
Node3>Server
DHCP_OFFER>
Server>Node3
DHCP_REQUEST>
Node3>Server
DHCP_ACK>
Server>192.168.0.107
DHCP_DISCOVER>
Node4>Node1>
Node4>Node2>
Node4>Node3>
Node4>Server
DHCP_OFFER>
Server>Node4
DHCP_REQUEST>
Node4>Server
DHCP_ACK>
Server>192.168.0.108
Interface Source code written in C is given using this the user can write only the Dynamic
Host Configuration Protocol inside the function fnDHCPServer() and fnDHCPClient() using
the variables already declared.
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Find the Shortest Path using Dynamic Host Configuration Protocol.
269
How to Proceed? - The objective can be executed in NetSim by using the programming
exercise available. In the Programming menu selectDynamic Host Configuration
Protocol.
Sample Input -Follow the below given steps,
Select number of clients.
Set the Start Address and the End Address
Click on Run button to execute.
Output - The Output that is obtained is given below,
270
9.5.16 Error Correcting Code - Hamming Code
Programming Guidelines
This section guides the user to link his/her own code for Hamming Code Generator to
NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Parity=Odd Output.txt file, the first line is the count of check bits to be
introduced in the current hamming code application. The next 8
Data=a
lines is the check bit calculation process, the first four lines are
Error_Position=7 for input data and the next four lines are for the error data.
Data_Bits_Original=01100001 1 and 2 are the check bits that vary in the Hamming String. The
Data_Bits_Error=00100001 last value is the actual position in the Hamming Code generated
where the data bits has been changed.
4 - The number of check bits introduced
3>5>7>9>11>13>0>0>- the check bit of position 1 of input
data
3>6>7>10>11>1>1>- the check bit of position 2 of input data
5>6>7>12>13>0>0>- the check bit of position 4 of input data
9>10>11>12>13>0>0>- the check bit of position 8 of input
271
data
3>5>7>9>11>13>0>0>- the check bit of position 1 of error
data
3>6>7>10>11>1>1>- the check bit of position 2 of error data
5>6>7>12>13>1>1>- the check bit of position 4 of error data
9>10>11>12>13>1>1>- the check bit of position 8 of error
data
4>8>12>- the check bit position whose value has been changed
and the final error position.
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To detect and correct the single bit error occurs in the transmission of data.
How to proceed? - The objective can be executed in NetSim using the programming exercise
available, under programming user has to select Error Correcting Code Hamming Code
Sample Inputs - In the Input panel the following steps need to be done,
Error Position needs to be selected. Based on the input, its values ranges.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Data Bits which if in the binary form is obtained. This Data Bits is obtained for
Original Data entered as well as for the Error selected.
272
Depending on the Parity selected, tables of Hamming String, Original Data and
Error Data will be obtained.
For the Error Data table to be obtained click on the Next button available in the
output panel. When the Error Data table is obtained Error Position value is
also obtained.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
273
9.5.17 Error Detection Code - Cyclic Redundancy Check (CRC) - 12
Programming Guidelines
This section guides the user to Run his/her own code for Cyclic Redundancy Check to
NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
274
Interface Source Code
Interface Source code written in C is given using this the user can write only the Cyclic
Redundancy Check inside the function fnCRC () using the variables already declared.
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To detect the error found in the file transferred between a Sender and Receiver
using CRC12.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming Menu selectError Detecting CodesCyclic
Redundancy Check.
Sample Input
For No Error Case -Follow the below given steps,
0. SampleMode should be selected.
1. SelectCRC12 as Algorithm from the list available.
2. Under Condition, NoError should be selected.
3. Under Input, Enter the path of the file name to get its CRC. The file
should be in .txt format which should not exceed 5000bytes.
4. Click on Run button to execute. Refresh button can be used if new Inputs
have to be given.
For Error Case - Follow the below given steps,
0. SampleMode should be selected.
1. SelectCRC12 as Algorithm from the list available.
2. Under Condition, Error should be selected.
275
3. Under Input, Enter the path of the file name to get its CRC.The file
should be in .txt format which should not exceed 5000bytes.
4. Click on Run button to execute. Refresh button can be used if new Inputs
have to be given.
Sample Output
For No Error Case: The CalculatedCRC should be Zero when the .txt file is
received by the Node2. The message Data Frame is Flowing from Node1 to
Node2 with No Error.
For Error Case: The CalculatedCRC should be Non-Zero when the .txt file
is received by the Node2. The message Data Frame is Flowing from Node1 to
Node2 with Error.
276
9.5.18 Error Detection Code - Cyclic Redundancy Check (CRC) 16
Programming Guidelines
This section guides the user to link his/her own code for Cyclic Redundancy Check to
NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface Source code written in C is given using this the user can write only the Cyclic
Redundancy Check inside the function fnCRC () using the variables already declared.
277
NetSim Installation path / src / Programming/ Crc16.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To detect the error found in the file transferred between a Sender and Receiver
using CRC16.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu selectError Detecting CodesCyclic
Redundancy Check.
Sample Input
For No Error Case -Follow the below given steps,
5. SampleMode should be selected.
6. SelectCRC16 as Algorithm from the list available.
7. Under Condition, No Error should be selected.
8. Under Input, Enter the path of the file name to get its CRC. The file
should be in .txt format which should not exceed 5000bytes.
9. Click on Run button to execute. Refresh button can be used if new
Inputs have to be given.
For Error Case - Follow the below given steps,
10. SampleMode should be selected.
11. SelectCRC16 as Algorithm from the list available.
12. Under Condition, Error should be selected.
13. Under Input, Enter the path of the file name to get its CRC. The file
should be in .txt format which should not exceed 5000bytes.
14. Click on Run button to execute. Refresh button can be used if new
Inputs have to be given.
278
Sample Output
For No Error Case: The CalculatedCRC should be Zero when the .txtfile
is received by the Node2. The message DataFrame is Flowing from Node1
to Node2 with NoError.
For Error Case: The CalculatedCRC should be Non-Zero when the
.txtfile is received by the Node2. The message DataFrame is Flowing
from Node1 to Node2 with Error.
279
9.5.19 Error Detection Code - Cyclic Redundancy Check (CRC) - 32
Programming Guidelines
This section guides the user to link his/her own code for Cyclic Redundancy Check to
NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface Source code written in C is given using this the user can write only the Cyclic
Redundancy Check inside the function fnCRC () using the variables already declared.
280
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To detect the error found in the file transferred between a Sender and Receiver
using CRC32.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu selectError Detecting CodesCyclic
Redundancy Check.
Sample Input
For No Error Case -Follow the below given steps,
0. SampleMode should be selected.
1. SelectCRC32 as Algorithm from the list available.
2. Under Condition, NoError should be selected.
3. Under Input, Enter the path of the file name to get its CRC. The
file should be in .txt format which should not exceed 5000bytes.
4. Click on Run button to execute. Refresh button can be used if new
Inputs have to be given.
For Error Case - Follow the below given steps,
0. SampleMode should be selected.
1. SelectCRC32 as Algorithm from the list available.
2. Under Condition, Error should be selected.
3. Under Input, Enter the path of the file name to get its CRC. The
file should be in .txt format which should not exceed 5000bytes.
4. Click on Run button to execute. Refresh button can be used if new
Inputs have to be given.
Sample Output
For No Error Case: The CalculatedCRC should be Zero when the
.txtfile is received by the Node2. The message DataFrame is Flowing
from Node1 to Node2 with NoError.
281
For Error Case: The CalculatedCRC should be Non-Zero when the
.txtfile is received by the Node2. The message DataFrame is Flowing
from Node1 to Node2 with Error.
282
9.5.20 Error Detection Code - Cyclic Redundancy Check (CRC) CCITT
Programming Guidelines
This section guides the user to link his/her own code for Cyclic Redundancy Check to
NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface Source code written in C is given using this the user can write only the Cyclic
Redundancy Check inside the function fnCRC () using the variables already declared.
283
To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - To detect the error found in the file transferred between a Sender and Receiver
using CRC CCITT.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu selectError Detecting CodesCyclic
Redundancy Check.
Sample Input
For No Error Case -Follow the below given steps,
0. SampleMode should be selected.
1. SelectCRCCCITT as Algorithm from the list available.
2. Under Condition, NoError should be selected.
3. Under Input, Enter the path of the file name to get its CRC. The file
should be in .txt format which should not exceed 5000bytes.
4. Click on Run button to execute. Refresh button can be used if new Inputs
have to be given.
284
Sample Output
For No Error Case: The CalculatedCRC should be Zero when the .txtfile is
received by the Node2. The message DataFrame is Flowing from Node1 to
Node2 with NoError.
For Error Case: The CalculatedCRC should be Non-Zero when the .txt file
is received by the Node2. The message DataFrame is Flowing from Node1 to
Node2 with Error.
285
9.5.21 Error Detection Code - Longitudinal Redundancy Check (LRC)
Programming Guidelines
This section guides the user to link his/her own code for Longitudinal Redundancy Check to
NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Input.txt file has the original data bits, the type of parity Output.txt file, the First line
(odd or even) and the error data bits. is the LRC bits value for the
original data bits. The Second
Parity=Odd (or Even)
line is the LRC bits value for
Data=Tetcos the error data bits.
Data_Bits_Original=0101010001100101011101000110001 00111010 - LRC bits of the
10110111101110011 original data
Data_Bits_Error=001010110100010101010100011000110 01000101 - LRC bits of the
110111101110011 error data
286
Interface Source Code
Interface source code written in C is given using this the user can write only the Longitudinal
Redundancy Check inside the function fnLRC () using the variables already declared.To view
the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Error Detecting Codes in that
Longitudinal redundancy Check,
Sample Input - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Data Bits which if in the binary form is obtained. This Data Bits is obtained for
Original Data entered as well as for the Error selected.
Depending on the Parity selected, tables of LRC of Original Data Bits and LRC
of Error Data Bits are obtained.
In each of the above mentioned tables last row would contain the Parity.
287
9.5.22 Framing Sequence Bit Stuffing
Programming Guidelines
This section guides the user to link his/her own code for Bit Stuffing to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt which is in Temporary Directory. The user program after executing the concept should
write the required output to a file named Output with extension txt in Temporary
Directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
288
CRC Polynomial=10010 Source Address= Value >
Error Status=0 Data= Value >
Seed Value=45 Error Status= Value >
CheckSumReceiver= Value >
Binary Values= Value >
H= Value >e= Value >l= Value >l= Value >o= Value >
Message= Value >
Example:
Message=Hello>
H=72>e=101>l=108>l=108>o=111>
Binary
Values=0100100001100101011011000110110001101111>
CRC Polynomial=10011>
CheckSumSender=1110>
<Stuffing>
Destination Address=000111110>
Source Address=001111101>
Data=010010000110010101101100011011000110111110110>
<DeStuffing>
Destination Address=00011111>
Source Address=00111111>
Data=01001000011001010110110001101100011011111110>
Error Status=0>
CheckSumReceiver=0000>
BinaryValues=0100100001100101011011000110110001101111>
H=72>e=101>l=108>l=108>o=111>
Message=Hello>
289
Interface Source Code
Interface source code written in C is given. Using this, the user can write only the functions
fnBitStuffing () and fnDeStuffing (), using the variables already declared.
To view the interface source code, go to NetSim Installation path / src / Programming/
BitStuffing.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Framing Sequence Bit Stuffing.
290
Checksum will be calculated in receiver side.
Again Binary Values will be converted into ASCII values.
Finally the ASCII values will be converted into Data which the user
entered.
291
9.5.23 Framing Sequence Character Stuffing
Programming Guidelines
This section guides the user to link his/her own code for Character Stuffing to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt which is in Temporary Directory
The user program after executing the concept should write the required output to a file
named Output with extension txt in Temporary Directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
292
Checksum=shfsdfsd Stuffing>
Ending Delimiter=h Destination Address=eraaerwbr>
Source Address=aasdaasdaas>
Data=sdfgf>
Checksum=shhfsdfsd>
DeStuffing>
Destination Address=eraerwbr>
Source Address=asdasdas>
Data=sdfgf>
Checksum=shfsdfsd>
Interface source code written in C is given. Using this, the user can write only the functions
fnCharacterStuffing () and fnDeStuffing (), using the variables already declared. To view
the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Framing Sequence Character
Stuffing.
Sample Input - In the Input panel the following steps need to be done,
SampleMode should be selected.
Fill in the HDLC Frame fields available.
o Starting Delimiter has to be filled in.
o Enter the 8 characters in the Destination Address field.
293
o Enter the 8 characters in the Source Address field.
o Enter in Data field with a maximum of 8 characters.
o Enter the 8 characters in the Check Sum field.
o Ending Delimiter has to be filled in.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
294
9.5.24 Virtual Scheduling Algorithm
Programming Guidelines
This section guides the user to link his/her own code for Virtual Scheduling Algorithm to
NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
295
Value 3 Current cells Actual arrival time.
Note: The above convention to write into the
Output.Txt are mandatory.
A sample file format is as follows:3>2.000>1.000>
Interface source code written in C is given using this the user can write only the Longitudinal
Redundancy Check inside the void main () using the variables already declared.To view the
interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Virtual Scheduling Algorithm,
Sample Input - In the Input panel the following steps need to be done,
Select the Peak Cell Rate (PCR). Its value ranges from 1 to 10.
Select the Cell Delay Variation Tolerance (CDVT). Its value ranges from 0.1
to 0.9.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
296
A graph with the following information is obtained,
o Cell Confirmation,
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
297
9.5.25 Address Mask
Programming Guidelines
This section guides the user to link his/her own code for Address mask to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
This gives us the contents of the Input. Txt The Output File format
from which the user has to get the values Binary value of IP Address>
for his program
Prefix value>Suffix value>
The Input File format
Binary value of Address mask>
IP Address>
Decimal value of Address mask>.
Sample Input text Format
Sample Output text Format
Let us consider how a given input (Data
file and error index) is stored in the text 11000000 10101001 00000000 10010110 >
and read. 1>31>
IP_Address=192.169.0.150 10000000 00000000 00000000
Prefix_Value=1 0000000>128>0>0>0>
Interface source code written in C is given using this the user can write only
thefnAddressMAsk () function using the variables already declared. To view the interface
source code, go to
298
NetSim Installation path / src / Programming/ AddressMask.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
299
9.5.26 Binary Conversion
Programming Guidelines
This section guides the user to link his/her own code for Binary conversion to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
This gives us the contents of the Input. The Output File format
Txt from which the user has to get the First Byte value>128>Quotient of First
values for his program Byte/128>Remainder of First Byte/128>
The Input File format Previous remainder>64>Quotient of
IP Address> Previous remainder/64>Remainder of
Previous remainder /64>
Sample Input text Format
Previous remainder>32>Quotient of
IP_Address=192.168.0.100
Previous remainder/32>Remainder of
Previous remainder /32>
Previous remainder>16>Quotient of
Previous remainder/16>Remainder of
Previous remainder /16>
Previous remainder>8>Quotient of Previous
remainder/8>Remainder of Previous
remainder /8>
Previous remainder>4>Quotient of Previous
remainder/4>Remainder of Previous
300
remainder /4>
Previous remainder>2>Quotient of Previous
remainder/2>Remainder of Previous
remainder /2>
Previous remainder>1>Quotient of Previous
remainder/1>Remainder of Previous
remainder /1>.
.same procedure for all bytes
Binary value>
Sample Output text Format
192>128>1>64>
64>64>1>0>
0>32>0>0>
0>16>0>0>
0>8>0>0>
0>4>0>0>
0>2>0>0>
0>1>0>0>
168>128>1>40>
40>64>0>40>
40>32>1>8>
8>16>0>8>
8>8>1>0>
0>4>0>0>
0>2>0>0>
0>1>0>0>
0>128>0>0>
0>64>0>0>
0>32>0>0>
0>16>0>0>
0>8>0>0>
0>4>0>0>
0>2>0>0>
0>1>0>0>
100>128>0>100>
100>64>1>36>
301
36>32>1>4>
4>16>0>4>
4>8>0>4>
4>4>1>0>
0>2>0>0>
0>1>0>0>
11000000 10101000 00000000 01100100 >
Interface source code written in C is given using this the user can write only the
fnBinaryConversion () function using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
302
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
303
9.5.27 Classless InterDomain Routing
Programming Guidelines
This section guides the user to link his/her own code for Classless Inter Domain Routing to
NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
Note:
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
This gives the contents of the The Output file contains the First address, Last
Input. Txt from which the user has address, Mask, Value and Network Address of
to get the values. all the networks.
The Input File contains: First Address: The Starting Address of the
Network
Starting_IP_Address=150.0.0.0
Last Address: The last address in the Network.
No_of_Networks=3
Mask: The Mask address (Mask should be 4 byte
No_of_Hosts_in_Network_1=512
format).
No_of_Hosts_in_Network_2=1024
Number of Node: The number of nodes in the
No_of_Hosts_in_Network_3=2048
304
Host_IP_Address=150.0.1.2 network.
Value: The value will be either 0 or 1.
0 - The next line has the network address to
which the given host belongs.
1 - Means that the host does not belong to any
network.
Network Address: If the Value is 1 then the
network to which the host belongs is given.
Note: Each data will have a separate line and
each line will end with ">"
A Sample Output File Format
150.0.0.0>
150.0.1.255>
255.255.254.0>
512>
150.0.4.0>
150.0.7.255>
255.255.252.0>
1024>
150.0.8.0>
150.0.15.255>
255.255.248.0>
2048>
0>
150.0.0.0>
For each network there will be first address, last
address, mask and number of hosts. Since the
input is 3 networks, there are 3 set of outputs.
The last two lines give the details about whether
the host is present in any of the network.
Interface source code written in C is given using this the user can write only the CIDR inside
the function fnCIDR () using the variables already declared. To view the interface source
code, go to
To find NetSims Installation path right click NetSim icon and select
305
Open file location in Windows 7
Open file location in Windows Vista
Properties find target in Windows XP.
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Classless InterDomain Routing,
Sample Input - By using the Input Panel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
Select the No. of Networks from the given range. Maximum of 6 networks
can be selected.
Click on Add button to add the No.ofHosts onto the Hosts Field. The use of
Add button depends on the No. of Networks selected. If a new No. of Hosts
has to be added then remove button can be used.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
There are 4 columns available in the output table, i.e. First Address, Last
Address, CIDR Mask and No. of Hosts.
The First Address of the first network would be nothing but the Starting IP
Address which is selected. No. of rows in the table depends on the No. of
Networks selected.
306
CIDR Mask is obtained internally by using the following formula,
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
307
9.5.28 Network Address
Programming Guidelines
This section guides the user to link his/her own code for Network Addresses to NetSim.
Pre - Conditions
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
308
Interface Source Code
Interface source code written in C is given using this the user can write only the
fnNetworkAddress () function using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
309
9.5.29 Special Addresses
Programming Guidelines
This section guides the user to link his/her own code for Special Addresses to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file
named Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
310
Interface Source Code
Interface source code written in C is given using this the user can write only the
fnSpecialAddress () function using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples
311
9.5.30 Subnetting
Programming Guidelines
This section guides the user to link his/her own code for Sub-netting to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
Class=B The Output file contains the Default mask (in decimal),
Network portion of Default mask (in binary), Host portion
Network_Address=128.0.0.0
of Default mask (in binary), Subnet mask bit value, Network
No_of_Subnets=2 portion of Subnet mask (in binary), Host portion of Subnet
Host_IP_Address=128.0.0.89 mask (in binary), Subnet mask (in decimal), number of zero
in host portion, number of host in each subnet, Host address,
subnet number of the given host, subnet address of the given
host and Subnet address, Starting address, Ending address,
Broadcast address of each subnet.
The Output File format
Default mask (in decimal)>
Network portion of Default mask (in binary)>Host portion
of Default mask (in binary)>
312
Subnet mask bit value>
Subnet mask (in decimal)>
Network portion of Subnet mask (in binary)>Host portion of
Subnet mask (in binary)>
Number of zero in host portion,>Number of host in each
subnet>
Host address>Subnet number of the given host >Subnet
address of the given host>
Subnet address>Starting address>Ending address>Broadcast
address >
.
.
.until number of subnet is reached
Sample Output text Format
255.255.0.0
11111111 11111111>00000000 00000000>
1>
255.255.128.0>
11111111 11111111 1>0000000 00000000>
15>32766>
128.0.0.89>1>128.0.0.0>
1>128.0.0.0>128.0.0.1>128.0.127.254>128.0.127.255>
2>128.0.128.0>128.0.128.1>128.0.255.254>128.0.255.255>
Interface source code written in C is given using this the user can write only the Leaky bucket
algorithm inside the function fnSubnet () using the variables already declared. To view the
interface source code, go to
To find NetSims Installation path right click NetSim icon and select
313
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Subnetting,
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Subnet address, Starting address, Ending address and Broadcast address are
obtained.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
314
9.5.31 EUI-64 Interface Identifier
Programming Guidelines
This section guides the user to link his/her own code for EUI 64 Interface Identifier to
NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
315
IPV6 Address>
Sample Output text Format
11-11-FF-FF-12-34>
11-11-FF>FF-12-34>
11-11-FF-FF-FE-FF-12-34>
11>00010001>
0>1>
00010011>13>
13-11-FF-FF-FE-FF-12-
34>1311:FFFF:FEFF:1234>
2000:FE21:5931:72C3>
2000:FE21:5931:72C3:1311:FFFF:FEFF:1234>
Interface source code written in C is given using this the user can write only the fnEUI64 ()
function using the variables already declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select IPV6 Addressing EUI 64
Interface Identifier,
Sample Inputs - In the Input panel the following steps need to be done,
316
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
317
9.5.32 IPV6 Host Addresses
Programming Guidelines
This section guides the user to link his/her own code for IPV6 Host Addresses to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
318
000100010001000100100010001000100011001100110011
010001000100010010101010101010101011101110111011
11001100110011001101110111011101>12>116>
000100010001>00010010001000100010001100110011001
101000100010001001010101010101010101110111011101
111001100110011001101110111011101>
000100010001>00000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000>
1110:0000:0000:0000:0000:0000:0000:0000>
000100010001>11111111111111111111111111111111111
111111111111111111111111111111111111111111111111
111111111111111111111111111111111>
111F:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF>
Interface source code written in C is given using this the user can write only the
fnHostAddresses () function using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select IPV6 Addressing IPV6 Host
Addresses,
Sample Inputs - In the Input panel the following steps need to be done,
319
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
IPV6 is separated into two parts: Network Id bits (prefix) and Host Id bits
(suffix)
Starting address of the network is found by replacing each bits of suffix part
with zero
Ending address of the network is found by replacing each bits of suffix part
with one
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
320
9.5.33 IPV6 Subnetting
Programming Guidelines
This section guides the user to link his/her own code for IPV6 Subnetting to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
321
until number of subnet reached in the first level
First levels subnet number>Prefix part of Level 2 s first
subnet Address> Subnet Id part of Level 2 s first subnet
Address> Suffix part of Level 2 s first subnet Address>
Hexa decimal value of Level 2 s first subnet address>prefix
length of Level 2 s first subnet>
.
.
until the number of subnets reached in the second level of
first levels subnet
.
.
until the number of subnets reached in the first level
Sample Output text Format
1111:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>
0001000100011001001000100010001000110011001100110
1000100010001001010101010101010101110111011101111
001100110011001101110111011101>
000100010001>000100100010001000100011001100110011
0100010001000100101010101010101010111011101110111
1001100110011001101110111011101>2>1>
000100010001>0>001001000100010001000110011001100
1101000100010001001010101010101010101110111011101
111001100110011001101110111011101>
000100010001>0>001001000100010001000110011001100
1101000100010001001010101010101010101110111011101
111001100110011001101110111011101>1111:2222:3333:4
444:AAAA:BBBB:CCCC:DDDD>13>
000100010001>1>001001000100010001000110011001100
1101000100010001001010101010101010101110111011101
111001100110011001101110111011101>1119:2222:3333:4
444:AAAA:BBBB:CCCC:DDDD>13>
0>1111:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
0>1113:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
0>1115:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
0>1117:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
1>1119:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
1>111B:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
1>111D:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
1>111F:2222:3333:4444:AAAA:BBBB:CCCC:DDDD>15>
322
Interface Source Code
Interface source code written in C is given using this the user can write only the
fnIPV6Subnetting () function using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select IPV6 Addressing IPV6
Subnetting,
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
323
Using the subnet id portion, subnets are calculated
Like that, subnets in the all levels are calculates by using the above steps
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
324
9.5.34 Leaky Bucket Algorithm
Programming Guidelines
This section guides the user to link his/her own code for Leaky Bucket Algorithm to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The path of the input file and the output file can be viewed on clicking the Button Path in
NetSim.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
325
100>100>100>100>100>100>100>100>100>100>1
00>
0>0>300>0>0>0>0>0>0>0>0>
11>
Interface source code written in C is given using this the user can write only the Leaky bucket
algorithm inside the function fnLBA() using the variables already declared. To view the
interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming menu user has to select Leaky Bucket Algorithm.
Sample Inputs - In the Input panel the following steps need to be done,
Select the Output Capacity from the given list of values. The value ranges
from 100 to 1000.
Select the Size of Buffer from the given list of values. The value ranges from
100 to 1000.
Enter in the Input Capacity in the fields provided. The range that can be
entered is from 100 to 1000. These values will be plotted in the graph on the
right hand side panel.
326
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the Run button is clicked a graph with Output and Discard Rate is
obtained.
The graph explains in detail as in what is the Output and Discard Packet Rate
for the given inputs.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
327
9.5.35 Multi Level Multi Access
Programming Guidelines
This section guides the user to link his/her own code for Multi-Level Multi Access Protocol
to NetSim.
Pre - Condition
User written program should read the value from the Input.txt in the temporary directory
which is having input from the GUI at runtime
The output should be stored in Output.txt in the temporary directory for display.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, The results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
328
Interface Source Code
Interface source code written in C is given using this the user can write only the Multi-Level
Multi Access Protocol inside the function fnMLMA () using the variables already declared.
To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Multi-Level Multi -Access Protocol.
Sample Inputs - In the Input panel the following steps need to be done,
Node Address has to be entered and added onto the Node Address field. The
Number of Nodes selected and the Number of Addresses added into the
Address field should match.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
On the right hand panel an animation would play. This shows that higher the
address given to the node higher the priority that node gets. Hence the node
with the higher address would transmit the data first.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
329
9.5.36 Code Division Multiple Access
Programming Guidelines
This section guides the user to link his/her own code for Code Division Multiple Access to
NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt which is in Temporary Directory.
The user program after executing the concept should write the required output to a file named
Output with extension txt in Temporary Directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
330
MobileStation=1>Data=10101010> MobileStation=Value>code=Value>Decode=Value>
Code=1 1 1 1 1 1 1 1> Data=Value>
MobileStation=2>Data=11110000> Example:
Code=1 -1 1 -1 1 -1 1 -1> NumberofMobileStations=2>
MobileStation=1>Data=1 0 1 0 1 0 1 0 >Code=1 1 1
1 1 1 1 1 >Encode=1 -1 1 -1 1 -1 1 -1 >Signal=1 1 1
1 1 1 1 1 -1 -1 -1 -1 -1 -1 -1 -1 1 1 1 1 1 1 1 1 -1 -1 -
1 -1 -1 -1 -1 -1 1 1 1 1 1 1 1 1 -1 -1 -1 -1 -1 -1 -1 -1
1 1 1 1 1 1 1 1 -1 -1 -1 -1 -1 -1 -1 -1 >
MobileStation=2>Data=1 1 1 1 0 0 0 0 >Code=1 -1
1 -1 1 -1 1 -1 >Encode=1 1 1 1 -1 -1 -1 -1 >Signal=1
-1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1
1 -1 1 -1 1 -1 1 -1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1
1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 >
InterferencePattern=2 0 2 0 2 0 2 0 0 -2 0 -2 0 -2 0 -
2 2 0 2 0 2 0 2 0 0 -2 0 -2 0 -2 0 -2 0 2 0 2 0 2 0 2 -2
0 -2 0 -2 0 -2 0 0 2 0 2 0 2 0 2 -2 0 -2 0 -2 0 -2 0 >
MobileStation=1>Code=1 1 1 1 1 1 1 1 >Decode=8
-8 8 -8 8 -8 8 -8 >Data=1 0 1 0 1 0 1 0 >
MobileStation=2>Code=1 1 1 1 1 1 1 1 >Decode=8
8 8 8 -8 -8 -8 -8 >Data=1 1 1 1 0 0 0 0 >
Interface source code written in C is given.Using this, the user can write only the function
fnEncode () and fnDecode (), using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
331
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming select Multiple Access Technology Code Division
Multiple Access.
Sample Inputs - In the Input panel the following steps need to be done,
Then Run button needs to be clicked. Refresh button can be used, if new
inputs have to be given.
In Transmitter side, the values of each Mobile Stations Binary Data, Code,
Encode and Signal are shown, if the user clicks the Mobile Station.
The Interference Pattern will be formed in Base Station and if the user
clicks the Base Station, interference Pattern will be displayed.
332
Decode mode needs to be selected.
Once the sample experiment is done Refresh button can be clicked to create
new samples.
Transmitter Side
333
In Base Station
Mobile Signal
Station
1 -1 -1 -1 -1 -1 -1 -1 -1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
-1 -1 -1 -1 -1 -1 -1 -1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
2 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1
-1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1 1 -1
3 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 -1 -1 1 1 -1 -1 1 1 1 1 -1 -1 1 1 -1 -1
1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 1 1 -1 -1 -1 -1 1 1 -1 -1 1 1 1 1 -1 -1 1 1 -1 -1
Interference 1 1 -3 -1 -1 1 -3 -1 1 3 -1 1 1 3 -1 1 1 -1 3 1 1 -1 3 1 3 1 1 -1 3
Pattern 1 1 -1 -1 1 -3 -1 -1 1 -3 -1 1 3 -1 1 1 3 -1 1 1 -1 3 1 1 -1 3 1 3 1
1 -1 3 1 1 -1
Receiver Side
334
-1
3 1 1 -3 -1 -1 1 -3 -1 1 3 1 1 -1 -1 1 1 -1 - 8 8 -8 8 8 8 - 11011101
-1 1 1 3 -1 1 1 -1 3 1 1 8 8
1 -1 3 1 3 1 1 -1 3 1 1
-1 -1 1 -3 -1 -1 1 -3 -1 1
3 -1 1 1 3 -1 1 1 -1 3
1 1 -1 3 1 3 1 1 -1 3 1 1
-1
335
9.5.37 Time Division Multiple Access
Programming Guidelines
This section guides the user to link his/her own code for Time Division Multiple Access to
NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt which is in Temporary Directory.
The user program after executing the concept should write the required output to a file named
Output with extension txt in Temporary Directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
File Format
336
The value of the GuardInterval is -1 and the value of the no
user is 0
Example:
GuardInterval=-
1>Bandwidth=100>StartTime=0.0>EndTime=0.0>nouser=
0>
Channelno=1>Bandwidth=100>StartTime=0.0>EndTime=
100.0>user=1>
GuardInterval=-
1>Bandwidth=100>StartTime=100.0>EndTime=100.0>no
user=0>
Interface source code written in C is given.Using this, the user can write only the function
fnTDMA(), using the variables already declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available, under programming user has to select Multiple Access Technology
Time Division Multiple Access.
Sample Inputs - In the Input panel the following steps need to be done,
337
Note:
Bandwidth(kHz) 200
No. of TimeSlots 3
TimeSlotLength(s) 100
GuardInterval(s) 10
Then Run button need to be clicked. Refresh button can be used, if new
Inputs have to be given.
The first Mobile Station will access the medium in first channel time slot.
The Second Mobile Station will access the medium in second channel
time slot, and so on.
During the guard interval, No mobile station will access the medium. This
is used to avoid the collision or interference.
338
Start Time and End Time of the channel is obtained.
339
9.5.38 Orthogonal Frequency Division Multiple Access
Programming Guidelines
This section guides the user to link his/her own code for Orthogonal Frequency Division
Multiple Access to NetSim.
Pre-conditions
The user program should read the input scenario from text file named Input with extension
txtwhich is in Temporary Directory.
The user program after executing the concept should write the required output to a file named
Output with extension txtin Temporary Directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
340
User3 =101010101010 User 3
User4 =000000000000 Value
Number of sub carrier per User 4
user = 4 Value
SubCarrier Mapping
User 1
Value
User 2
-Value
User 3
Value
User 4
Value
SubCarrier Addition
User 1
Value
User 2
Value
User 3
Value
User 4
Value
Example:
Parallel Data Conversion
User 1
1 1 1 1
1 1 1 1
1 1 1 1
User 2
0 1 0 1
0 1 0 1
0 1 0 1
User 3
1 0 1 0
341
1 0 1 0
1 0 1 0
User 4
0 0 0 0
0 0 0 0
0 0 0 0
Bit Mapping
User 1
1 1 1 1
1 1 1 1
1 1 1 1
User 2
-1 1 -1 1
-1 1 -1 1
-1 1 -1 1
User 3
1 -1 1 -1
1 -1 1 -1
1 -1 1 -1
User 4
-1 -1 -1 -1
-1 -1 -1 -1
-1 -1 -1 -1
SubCarrier Mapping
User 1
sin(2PIf0t) sin(2PIf1t) sin(2PIf2t) sin(2PIf3t)
sin(2PIf0t) sin(2PIf1t) sin(2PIf2t) sin(2PIf3t)
sin(2PIf0t) sin(2PIf1t) sin(2PIf2t) sin(2PIf3t)
User 2
-sin(2PIf4t) sin(2PIf5t) -sin(2PIf6t) sin(2PIf7t)
-sin(2PIf4t) sin(2PIf5t) -sin(2PIf6t) sin(2PIf7t)
-sin(2PIf4t) sin(2PIf5t) -sin(2PIf6t) sin(2PIf7t)
User 3
sin(2PIf8t) -sin(2PIf9t) sin(2PIf10t) -sin(2PIf11t)
sin(2PIf8t) -sin(2PIf9t) sin(2PIf10t) -sin(2PIf11t)
342
sin(2PIf8t) -sin(2PIf9t) sin(2PIf10t) -sin(2PIf11t)
User 4
-sin(2PIf12t) -sin(2PIf13t) -sin(2PIf14t) -sin(2PIf15t)
-sin(2PIf12t) -sin(2PIf13t) -sin(2PIf14t) -sin(2PIf15t)
-sin(2PIf12t) -sin(2PIf13t) -sin(2PIf14t) -sin(2PIf15t)
SubCarrier Addition
User 1
sin 2PI(f0+f1+f2+f3)t
sin 2PI(f0+f1+f2+f3)t
sin 2PI(f0+f1+f2+f3)t
User 2
sin 2PI(-f4+f5-f6+f7)t
sin 2PI(-f4+f5-f6+f7)t
sin 2PI(-f4+f5-f6+f7)t
User 3
sin 2PI(f8-f9+f10-f11)t
sin 2PI(f8-f9+f10-f11)t
sin 2PI(f8-f9+f10-f11)t
User 4
sin 2PI(-f12-f13-f14-f15)t
sin 2PI(-f12-f13-f14-f15)t
sin 2PI(-f12-f13-f14-f15)t
Interface Source code written in C is given. Using this, the user can writeonly the
fnOFDMA() and fnSubcarrierAddition() functions, using the variables already declared.To
view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
343
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under programming select Multiple Access Technology OFDMA
344
9.5.39 PC to PC Communication - Socket Programming TCP
Programming Guidelines
This section guides the user to link his/her own code for PC to PC Communication Socket
programming to NetSim.
Pre Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
The prerequisite for the creation of sockets in the Windows-based C complier is they must
have winsock.h header file in its standard header file folder. In order to use the commands of
the winsock.h, there must be wsock32.lib library file present in the C complier. To link
wsock32.lib, different steps have to be followed for different compilers as shown:
For Visual Studio complier 2010 (10.0 versions), the library file linkage must be
made in the following way:
345
a. Click Project Menu in the workspace.
d. Select Input
If you have an eclipse complier, the library linkage must be in the following way
346
a. Click Project Menu in the workspace.
d. Select Setting.
gcc -C Filename.c
347
c. Create exe file (.exe file) using below command
If using Dev C++ IDE, go to Toolscompiler options and add -lws2_32 as follows
before executing:
348
Interface Source Code
Interface source code written in C is given using this the user can write only the TCP Client ()
function. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
349
9.5.40 PC to PC Communication - Socket Programming UDP
Programming Guidelines
This section guides the user to link his/her own code for PC to PC Communication Socket
programming to NetSim.
Pre Conditions`
The user program should read the input from text file named Input with extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
The prerequisite for the creation of sockets in the Windows-based C complier is they must
have winsock.h header file in its standard header file folder. In order to use the commands of
the winsock.h, there must be wsock32.lib library file present in the C complier. To link
wsock32.lib, different steps have to be followed for different compilers as shown:
For Visual Studio complier 2010 (10.0 versions), the library file linkage must be
made in the following way:
350
a. Click Project Menu in the workspace.
d. Select Input
If you have an eclipse complier, the library linkage must be in the following way
351
a. Click Project Menu in the workspace.
d. Select Setting.
gcc -C Filename.c
352
c. Create exe file (.exe file) using below command
If using Dev C++ IDE, go to Toolscompiler options and add -lws2_32 as follows
before executing:
The data format in the input file is as follows,. Write the received message
Server Input Ex:192.168.0.2:- Requesting for the
Protocol= UDP connection
Operation=Server
Client
Protocol=UDP
Operation=Client
Destination IP=192.168.0.132
<Client IP:-Message>
Ex: 192.168.0.2:- Requesting for the connection
353
Interface Source Code
Interface source code written in C is given using this the user can write only the UDP ()
functions. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? -Two Systems are required to perform this experiment. When one System
is in the ServerMode other should be in the Client Mode. The objective can be executed in
NetSim using the programming exercise available. In the Programming menu selectPC to
PC Communication Socket Programming.
Sample Inputs - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
Select a Protocol from the following,
o TCP
o UDP
Under Operation, Server or Client should be selected.
On the Right hand side panel there is an InputField Enter Data to be
Transmitted, where Data needs to be typed in. This Data is later sent to the
ReceiverSystem. Here Type Hello.
Under Input there are two things,
o When Operation is Client, then the ServersIPAddress (192.168.1.2)
should be given in the Server IP Address field.
354
o When Operation is Server, then the ServersIPAddress (192.168.1.1)
would be automatically filled in the Local IP Address field.
Sample Output:
On the Right hand side panel there is an InputField ReceivedData, where Data
would get displayed. Hello is the Data that is received from the ClientSystem.
TCP
First the Server should click on the Run button after which the Client should
click on the Run button to Create the socket
Client should click on the Connect button to establish the connection with
server.
The Client should click on the Send button to transmit the data to the Server.
The Client should click on the Close button to terminate the Connection with
Server.
If the Data is successfully transmitted then the SentData would be Received in
the ServerSystem.
UDP
First the Server should click on the Run button after which the Client should
click on the Run button to Create the socket
The Client should click on the Send button to transmit the data to the Server.
The Client should click on the Close button to terminate the Connection with
Server.
If the Data is successfully transmitted then the SentData would be Received in
the ServerSystem.
355
9.5.41 PC to PC Communication Chat Application TCP
Programming Guidelines
This section guides the user to link his/her own code for PC to PC Communication Socket
programming to NetSim.
Pre Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
The prerequisite for the creation of sockets in the Windows-based C complier is they must
have winsock.h header file in its standard header file folder. In order to use the commands of
the winsock.h, there must be wsock32.lib library file present in the C complier. To link
wsock32.lib, different steps have to be followed for different compilers as shown:
For Visual Studio complier 2010 (10.0 versions), the library file linkage must be
made in the following way:
356
a. Click Project Menu in the workspace.
d. Select Input
If you have an eclipse complier, the library linkage must be in the following way
357
a. Click Project Menu in the workspace.
d. Select Setting.
gcc -C Filename.c
358
c. Create exe file (.exe file) using below command
If using Dev C++ IDE, go to Toolscompiler options and add -lws2_32 as follows
before executing:
The data format in the input file is as Write the received message
follows, Ex:
Receive Input Tetcos:-Hello!!!!!!!!!!!!!!!
Protocol=TCP
Local User Name=Tetcos
Send
Protocol=TCP
Number of Users=2
1=192.168.0.1
2=192.168.0.2
Tetcos:-Hello!!!!!!!!!!!
359
Interface Source Code
Interface source code written in C is given using this the user can write the TCP chat
functions. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
360
9.5.42 PC to PC Communication Chat Application UDP
Programming Guidelines
This section guides the user to link his/her own code for PC to PC Communication Socket
programming to NetSim.
Pre Conditions`
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
The prerequisite for the creation of sockets in the Windows-based C complier is they must
have winsock.h header file in its standard header file folder. In order to use the commands of
the winsock.h, there must be wsock32.lib library file present in the C complier. To link
wsock32.lib, different steps have to be followed for different compilers as shown:
For Visual Studio complier 2010 (10.0 versions), the library file linkage must be made in the
following way:
361
a. Click Project Menu in the workspace.
d. Select Input
If you have an eclipse complier, the library linkage must be in the following way
362
a. Click Project Menu in the workspace.
d. Select Setting.
gcc -C Filename.c
363
c. Create exe file (.exe file) using below command
If using Dev C++ IDE, go to Toolscompiler options and add -lws2_32 as follows
before executing:
The data format in the input file is as Write the received message
follows,. Ex:
Receive Input 192.168.0.2:- Requesting for the
Protocol=UDP connection
Local User Name=Tetcos
Send
Protocol=TCP
Number of Users=2
1=192.168.0.1
2=192.168.0.2
Tetcos:-Hello!!!!!!!!!!!
364
Interface Source Code
Interface source code written in C is given using this the user can write UDP Chat functions.
To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and Receive the data using PC to PCCommunication Chat Application
How to Proceed? -Two to Ten Systems are required to perform this experiment.
The objective can be executed in NetSim using the programming exercise available. In the
Programming menu selectPC to PC Communication Chat Application.
Sample Inputs - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
Select a Protocol from the following,
o TCP
o UDP
On the Right hand side panel there is an InputField Send Data, where Data
needs to be typed in. This Data is later sent to the ReceiverSystem. Here Type
Hello.
On the Right hand side panel there is Receive Data, where data is received
from user. Ex. Hello
Under Input there are two things,
o Number of users must be select between one to ten
o Enter the IP address of the data where needs to be in all the column in the
input pane.
365
Sample Output:
On the Right hand side panel there is an InputField ReceivedData, where Data
would get displayed. Hello is the Data that is received from the users.
TCP
Click Run button to create the socket and start Receive Data from the users.
Click Send button to transmit the data to the users.
Click Refresh button to terminate the connection.
UDP
Click Run button to create the socket and start Receive Data from the users.
Click Send button to transmit the data to the users.
366
9.5.43 Scheduling - First In First Out (FIFO)
Programming Guidelines
This section guides the user to link his/her own code for Scheduling - FIFO to NetSim.
Pre - Conditions
The program should read the data from Input.txt file that is available in the temporary
directory.
The program should write the output data to Output.txt file that is available in the
temporary directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
367
Interface Source Code
Interface source code written in C is given using this the user can write only the Scheduling
inside the function fnFIFO() using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - The objective is to allocate the output capacity among the various input
capacities using First In First Out (FIFO) Scheduling algorithm.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu selectScheduling.
Sample Input - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
Algorithm should be selected as FirstIn First Out (FIFO).
Under Input field,
0. EnterOutputLinkCapacity which is in MBPS. The options that are
available for selecting are 100, 200, 300, 1000 MBPS. Select
400 MBPS.
1. EnterBits / Node for one second (limit 0 - 9999) in the fields available.
i.e. Node1 - 100 , Node2 - 100, .., Node8 - 100.
o The Priority for the Node needs to be given. Click to Select or Deselect
the Priority of a Node. In this Sample the Priorities are as follows,
368
Node Priority
Number Given
1 7
2 6
3 8
4 3
5 2
6 1
7 5
8 4
Click on the Run button.
Output
Note: The Transmission of the data takes place in the following sequence. The Bits /
Node are represented in different colors. These colors indicate the order in which the
transmission takes place.
369
9.5.44 Scheduling - Max - Min Fair (MMF)
Programming Guidelines
This section guides the user to link his/her own code for Scheduling - MMF to NetSim.
Pre - Conditions
The program should read the data from Input.txt file that is available in the application
path.
The program should write the output data to Output.txt file that is available in the
application path.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
370
Interface Source Code
Interface source code written in C is given using this the user can write only the Scheduling
inside the function fnMMFA () using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - The objective is to allocate the output capacity among the various input
capacities using Max-Min Fare(MMF) Scheduling algorithm.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming menu selectScheduling.
Sample Input - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
Algorithm should be selected as Max - Min Fair (MMF).
Under Input field,
0. EnterOutputLinkCapacity which is in MBPS. The options that are available
for selecting are 100, 200, 300, 1000 MBPS. Select100MBPS.
1. EnterBits / Node for one second (limit 0 - 9999) in the fields available.
i.e. Node1 - 100 , Node2 - 100, .., Node8 - 100.
Click on the Run button.
Output
The Transmission of the data takes place in the following sequence. The Bits / Node
are represented in different colors. These colors indicate the order in which the
transmission takes place.
371
The Transmission Sequence 1 2 3 4 5 6 7 8.
Seconds 1 2 3 4 5 6 7 8
Node1 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node2 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node3 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node4 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node5 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node6 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node7 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
Node8 12.50 12.50 12.50 12.50 12.50 12.50 12.50 12.50
372
9.5.45 Shortest Path - Floyds
Programming Guidelines
This section guides the user to link his/her own code for shortest path Floyds to NetSim.
Pre - Conditions
The program should read the data from Input.txt file that is available in the temporary
directory.
The program should write the output data to Output.txt file that is available in the temporary
directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
File Format
373
Sample Output:
1>2>3>
1>2>
1>3>
1>
>>>
path_FS>
0>0>0>
0>0>1>
0>1>0>
distance_FS>
0>5>1>
5>0>6>
1>6>0>
Note:
The string Distance and Path in the file is
compulsory. The output must be stored in
the same format
Interface source code written in C is given using this the user can write only the Scheduling
inside the function fnFloyd() using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
374
Sample Scenarios:
Objective - The objective is to find the Shortest Path between the two Routers using the
Floyds algorithm.
How to Proceed? - The objective can be executed in NetSim using the Programming
exercise available. Under Programming Menu select Shortest Path.
Sample Input - By using the Input Panel that is
available on the left hand Routing Table side a Sample Scenario is
created. The Steps involved in creating are as
follows,
Sample Mode should be selected.
Select the Algorithm as Floyds.
Number of Routers needs to be selected. Minimum of 3Routers and Maximum
of 8Routers can be selected. Let us consider 4 Routers are selected.
Source Router needs to be given. Let Router 4 be the Source Router.
Destination Router also needs to be given. Let Router 1 be the Destination
Router.
Click on 2 Routers to give the distance between those 2 Routers. A blue arrow
would be pointing from the Source Node to the Destination Node. The Distances
between the Routers that needs to be given are as follows,
1. Router 4 and Router 1 67 Km,
2. Router 4 and Router 3 46 Km,
3. Router 3 and Router 1 18 Km,
4. Router 3 and Router 2 56 Km, and
5. Router 1 and Router 2 70 Km.
Click on Run button to view the output in the Routing Table.
375
Route Distance[KM]
4>1> 67
4>3>1> 64
4>3>2> 102
4>3> 46
4> 0
376
9.5.46 Shortest Path - Link State
Programming Guidelines
This section guides the user to link his/her own code for shortest path - Link State Routing to
NetSim.
Pre - Conditions
The program should read the data from Input.txt file that is available in the temporary
directory.
The program should write the output data to Output.txt file that is available in the
temporary directory.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, the results of the program should be written into the
output file Output.txt.
Input.txt contains the distance matrix given Consider the source node is 1
by the user, along with the source node, Distance>0>1>2>1>2>1>
destination node and the total number of
nodes. Here, we have the input as a Path>0>1>2>1>4>1>
SYMMETRIC matrix. The format of The first line has the all the distance values
input.txt is, for example, from the source node to all the other
Algorithm=Link_State connected nodes.
No_of_Router=3 The second line has the path values from
the source node to all the other nodes.
Distance:
The first line contains the values stored in
999>6>5> the distance array (single dimensional array)
6>999>7> used in the algorithm.
5>7>999> The second line contains the values stored
in the path array (single dimensional array)
Source_Router=1
used in the algorithm.
Destination_Router=2
Sample Output:
Note:
377
> is the delimiter symbol, which is used to 1>2>
separate each input. 1>3>2>
1>3>
1>
>>>
Distance>0>6>5>
Path>1000>1>1>
Note:
The string Distance and Path in the file is
compulsory. The output must be stored in
the same format.
Interface source code written in C is given using this the user can write only the Scheduling
inside the function fnDijkstra() using the variables already declared. To view the interface
source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - The objective is to find the Shortest Path between the two routers using the
Link State algorithm.
How to Proceed? - Under ProgrammingMenu select ShortestPath.
Sample Input - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
378
SourceRouter needs to be given. Let Router 5 be the SourceRouter.
DestinationRouter also needs to be given. Let Router 3 be the
DestinationRouter.
Click on 2 Routers to give the distance between those 2 Routers. A blue Line
would be pointing from the SourceNode to the DestinationNode. The Distances
between the Routers that needs to be given are as follows,
1. Router 1 and Router 2 35,
2. Router 2 and Router 3 30,
3. Router 3 and Router 4 60,
4. Router 4 and Router 1 20,
5. Router 4 and Router 5 67, and
6. Router 5 and Router 2 58.
Click on Run button to view the output in the RoutingTable.
Routing Table
Route Distance[KM]
5>2>1>4>3> 173
5>2>1>4> 113
5>2>1> 93
5>2>3> 88
5>2> 58
5>4>1>2>3> 152
5>4>1>2> 122
5>4>1> 87
5>4>3> 127
5>4> 67
5> 0
379
9.5.47 Sliding Window Protocol - Go Back N
Programming Guidelines
This section guides the user to link his/her own code for Go Back N to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Window Size:
Algorithm=Go_Back_N Value1>Value2>Value3>Value4>
Data_File=C:\Users\P.Sathishkumar\D Types:
ocuments\1 Th.txt>
There are five types of formats of writing in
Bit_Error_Rate=6 the output file.
Sequence_Number=3 Each format is written in specific condition,
the types are explained below.
Window_Size=7
The condition of writing the types is
explained in the algorithm.
Type1:
Value1 - "CNT",
Value 2 -output of the slidingcount function
Value 3 - "FRAMES"
380
Value 4 - "TRANSMIT"
Type2:
Value1 - "DT",
Value 2 -Frame number,
Value 3 - Frames Source address,
Value 4 - Frames Destination address.
Type3:
Value 1 - "EV",
Value 2 - Output of the intro_error function,
Value 3 - Frame Source address,
Value 4 - Frames Destination address.
Type4:
Value 1 - "ACK",
Value 2 - "POS",
Value 3 - Acknowledgement frames Source
Address,
Value 4 - Acknowledgement frames
Destination Address.
Type5:
Value 1 - "DEL"
Value 2 - count of frames being deleted
Value 3 - "FRAME"
Value 4 - "DELETED"
Note: The above convention to write into the
Output.Txt ismandatory.
Values in Quotes"" to be written into file
Output.Txt as it is including Case.
DT>Frame No>node1>node2> (DT denotes
Data from node 1 to node 2)
EV>Error Flag>node1>node2> (EV denotes
Error Value - i.e If the above frame has error
then set the error flag as 1 else set the flag as
0)
ACK>POS>node2>node1>
(Acknowledgement for that above frame
received is sent to node 2 to node 1)
Ex:
CNT>1>FRAMES>TRANSMIT>
381
DT>1>node1>node2>
EV>0>node1>node2>
ACK>POS>node1>node2>
Interface source code written in C is given using this the user can write only the Sliding
Window Protocols - Go Back N inside the function GoBackN () using the variables already
declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and receive the data using Sliding Window Protocol - Go BackN.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under ProgrammingMenu select Sliding WindowProtocolGo Back
N.
Sample Input - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
SelectGoBackN as Algorithm.
Create a Datafile (.txt) and save it on the disk.
Select the path of the above created Datafile (.txt) which could be Maximum
of 100000bytes.
SelectBit Error Rate (BER) as 10^-5 from the drop down menu.
SelectSequencenumber (Bits) as 3 from the drop down menu.
A default value is entered for WindowSize as 7.
1. Then Run button need to be clicked.
382
Output - Output for the above Sample is as follows,
2. An OutputTable is obtained when Run button is clicked. In the OutputTable,
Transmittedframe (Data and Acknowledgement) and their corresponding Counts is
obtained. The TotalCount is also obtained. The table is given below,
Output
Total data frames to be transmitted - 24
Transmitted frame Count
Data 30
Acknowledgement 5
Total = 35
Note - The Total data frames to be transmitted and Total count in the Output
table depends on size of the .txt file.
3. The details of the DataFrames flowing from Node1 to Node 2 are obtained on the
right hand side panel. Below are the details that is obtained in the tool,
o Data Frame 1 is flowing from Node1 to Node2 with no error.
o Data Frame 2 is flowing from Node1 to Node2 with no error.
o Data Frame 3 is flowing from Node1 to Node2 with no error.
o Data Frame 4 is flowing from Node1 to Node2 with error.
o Data Frame 5 is flowing from Node1 to Node2 with no error.
o Data Frame 6 is flowing from Node1 to Node2 with no error.
o Data Frame 7 is flowing from Node1 to Node2 with error.
o Acknowledgement from Node2 to Node1.
o Data Frame 4 is flowing from Node1 to Node2 with no error.
o Data Frame 5 is flowing from Node1 to Node2 with no error.
o Data Frame 6 is flowing from Node1 to Node2 with no error.
o Data Frame 7 is flowing from Node1 to Node2 with no error.
o Data Frame 8 is flowing from Node1 to Node2 with no error.
o Data Frame 9 is flowing from Node1 to Node2 with no error.
o Data Frame 10 is flowing from Node1 to Node2 with no error.
o Acknowledgement from Node2 to Node1.
o Data Frame 11 is flowing from Node1 to Node2 with no error.
383
o Data Frame 12 is flowing from Node1 to Node2 with no error.
o Data Frame 13 is flowing from Node1 to Node2 with no error.
o Data Frame 14 is flowing from Node1 to Node2 with no error.
o Data Frame 15 is flowing from Node1 to Node2 with no error.
o Data Frame 16 is flowing from Node1 to Node2 with no error.
o Data Frame 17 is flowing from Node1 to Node2 with no error.
o Acknowledgement from Node2 to Node1.
o Data Frame 18 is flowing from Node1 to Node2 with no error.
o Data Frame 19 is flowing from Node1 to Node2 with no error.
o Data Frame 20 is flowing from Node1 to Node2 with no error.
o Data Frame 21 is flowing from Node1 to Node2 with no error.
o Data Frame 22 is flowing from Node1 to Node2 with no error.
o Data Frame 23 is flowing from Node1 to Node2 with error.
o Data Frame 24 is flowing from Node1 to Node2 with no error.
o Acknowledgement from Node2 to Node1.
o Data Frame 23 is flowing from Node1 to Node2 with no error.
o Data Frame 24 is flowing from Node1 to Node2 with no error.
o Acknowledgement from Node2 to Node1.
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
384
9.5.48 Sliding Window Protocol - Selective Repeat
Programming Guidelines
This section guides the user to link his/her own code for Selective Repeat to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Window Size:
Algorithm=Selective_Repeat Value1>Value2>Value3>Value4>
Data_File=C:\Users\P.Sathishkumar Types:
\Documents\1 Th.txt>
There are five types of formats of writing in
Bit_Error_Rate=5 the output file.
Sequence_Number=3 Each format is written in specific condition,
the types are explained below.
Window_Size=4
The condition of writing the types is
explained in the algorithm.
Type1:
Value1 - "CNT",
Value 2 - output of the slidingcount
function
Value 3 - "FRAMES"
385
Value 4 - "TRANSMIT"
Type2:
Value1 - "DT",
Value 2 - Frame number,
Value 3 - Frames Source address,
Value 4 - Frames Destination address.
Type3:
Value 1 - "EV",
Value 2 - Output of the intro_error function,
Value 3 - Frame Source address,
Value 4 - Frames Destination address.
Type4:
Value 1 - "ACK",
Value 2 - "POS",
Value 3 - Acknowledgement frames
Source Address,
Value 4 - Acknowledgement frames
Destination Address.
Type5:
Value 1 - "DEL"
Value 2 - count of frames being deleted
Value 3 - "FRAME"
Value 4 - "DELETED"
Note: The above convention to write into
the Output.Txt ismandatory.
Values in Quotes"" to be written into file
Output.Txt as it is including Case.
DT>Frame No>node1>node2> (DT denotes
Data from node 1 to node 2)
EV>Error Flag>node1>node2> (EV denotes
Error Value - i.e If the above frame has
error then set the error flag as 1 else set the
flag as 0)
ACK>POS>node2>node1>
(Acknowledgement for that above frame
received is sent to node 2 to node 1)
Ex:
386
CNT>1>FRAMES>TRANSMIT>
DT>1>node1>node2>
EV>0>node1>node2>
ACK>POS>node1>node2>
Interface source code written in C is given using this the user can write only the Sliding
Window Protocol - Selective Repeat inside the function SelectiveRepeat () using the
variables already declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and receive the data using Sliding Window Protocol - Selective Repeat.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under Programming Menu select Sliding WindowProtocolSelective
Repeat.
Sample Input - By using the Input Panel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
Sample Mode should be selected.
Select Selective Repeat as Algorithm.
Create a Data file (.txt) and save it on the disk.
Select the path of the above created Data file (.txt) which could be Maximum
of 100000 bytes.
Select Bit Error Rate (BER) as 10^-5 from the drop down menu.
Select Sequence number (Bits) as 3 from the drop down menu.
A default value is entered for Window Size as 4.
1. Then Run button need to be clicked.
387
Output - Output for the above Sample is as follows,
2. An Output Table is obtained when Run button is clicked. In the Output Table,
Transmitted frame (Data and Acknowledgement) and their corresponding Counts
is obtained. The Total Count is also obtained. The table is given below,
Output
Total data frames to be transmitted - 24
Transmitted frame Count
Data 26
Acknowledgement 7
Total = 33
Note - The Total data frames to be transmitted and Total count in the
Output table depends on size of the .txt file.
3. The details of the Data Frames flowing from Node 1 to Node 2 are obtained on the
right hand side panel. Below are the details that is obtained in the tool,
o Data Frame 1 is flowing from Node1 to Node2 with no error
o Data Frame 2 is flowing from Node1 to Node2 with no error
o Data Frame 3 is flowing from Node1 to Node2 with no error
o Data Frame 4 is flowing from Node1 to Node2 with error
o Acknowledgement from Node2 to Node1
o Data Frame 4 is flowing from Node1 to Node2 with no error
o Data Frame 5 is flowing from Node1 to Node2 with no error
o Data Frame 6 is flowing from Node1 to Node2 with error
o Data Frame 7 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
o Data Frame 6 is flowing from Node1 to Node2 with no error
o Data Frame 8 is flowing from Node1 to Node2 with no error
o Data Frame 9 is flowing from Node1 to Node2 with no error
o Data Frame 10 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
o Data Frame 11 is flowing from Node1 to Node2 with no error
388
o Data Frame 12 is flowing from Node1 to Node2 with no error
o Data Frame 13 is flowing from Node1 to Node2 with no error
o Data Frame 14 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
o Data Frame 15 is flowing from Node1 to Node2 with no error
o Data Frame 16 is flowing from Node1 to Node2 with no error
o Data Frame 17 is flowing from Node1 to Node2 with no error
o Data Frame 18 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
o Data Frame 19 is flowing from Node1 to Node2 with no error
o Data Frame 20 is flowing from Node1 to Node2 with no error
o Data Frame 21 is flowing from Node1 to Node2 with no error
o Data Frame 22 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
o Data Frame 23 is flowing from Node1 to Node2 with no error
o Data Frame 24 is flowing from Node1 to Node2 with no error
o Acknowledgement from Node2 to Node1
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
389
9.5.49 Sorting Technique - Bubble Sort
Programming Guidelines
This section guides the user to link his/her own code for Sorting Algorithm to NetSim.
Pre - Condition
User written program should read the value from the Input.txt in the temporary directory
which is having input from the GUI at runtime
The output should be stored in Output.txt in the temporary directory for display.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, The results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
390
to the index 2 value.
index 1 : index 1 is the index of array that
points to the first data that is being swapped
or compared.
index 2 : index 2 is the index of array that
points to the second data that is being
swapped or compared.
Sample Output:
Ascending Order:
1>0>1>
2>0>1>
1>1>2>
2>1>2>
1>0>1>
2>0>1>
Descending Order:
1>0>1>
2>0>1>
1>1>2>
2>1>2>
1>0>1>
2>0>1>
Interface source code written in C is given using this the user can write only the Sorting
Algorithm inside the function fnBubblesort () using the variables already declared. To view
the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
391
Sample Scenarios:
How to Proceed? -
The objective can be executed in NetSim using the programming exercise available, under
programming user has to select Sorting Techniques.
Sample Inputs - In the Input panel the following steps need to be done,
Select the total number that has to be sorted. The values available are from 3
to 25.
Enter the Number Value in the field provided. The value entered should be
within the range of 1 to 9999.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
392
9.5.50 Sorting Technique - Insertion Sort
Programming Guidelines
This section guides the user to link his/her own code for Sorting Algorithm to NetSim.
Pre - Condition
User written program should read the value from the Input.txt in the temporary directory
which is having input from the GUI at runtime
The output should be stored in Output.txt in the temporary directory for display.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, The results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
393
Number_to_Sort=1,9,3 Position data index value of index1 is
copied to the index 2 value.
index 1 : index 1 is the index of array
that points to the first data that is being
swapped or compared.
index 2 : index 2 is the index of array
that points to the second data that is
being swapped or compared.
Sample Output:
Ascending Order:
1>0>1>
2>0>1>
1>1>2>
2>1>2>
1>0>1>
2>0>1>
Descending Order:
1>0>1>
2>0>1>
1>1>2>
2>1>2>
1>0>1>
Interface source code written in C is given using this the user can write only the Sorting
Algorithm inside the function fnInsertsort () using the variables already declared. To view the
interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Project:
394
How to Proceed? -
The objective can be executed in NetSim using the programming exercise available, under
programming user has to select Sorting Techniques.
Sample Inputs - In the Input panel the following steps need to be done,
Select the total number that has to be sorted. The values available are from 3
to 25.
Enter the Number Value in the field provided. The value entered should be
within the range of 1 to 9999.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
395
9.5.51 Sorting Technique - Quick Sort
Programming Guidelines
This section guides the user to link his/her own code for Sorting Algorithm to NetSim.
Pre - Condition
User written program should read the value from the Input.txt in the temporary directory
which is having input from the GUI at runtime
The output should be stored in Output.txt in the temporary directory for display.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and, The results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
396
Number_to_Sort=22,33,44 type 4 : specifies the two index, where
Position data index value of index1 is
copied to the index 2 value.
index 1 : index 1 is the index of array
that points to the first data that is being
swapped or compared.
index 2 : index 2 is the index of array
that points to the second data that is
being swapped or compared.
Sample Output:
Ascending:
0>0>0>
1>0>2>
3>1>0>
4>0>1>
0>2>2>
0>0>0>
Descending:
0>0>0>
3>2>0>
1>0>1>
4>0>2>
0>0>0>
1>0>1>
4>0>0>
0>1>1>
Interface source code written in C is given using this the user can write only the Sorting
Algorithm inside the function fnQuicksort () using the variables already declared. To view
the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
397
Properties find target in Windows XP.
Sample Scenarios:
How to Proceed? -
The objective can be executed in NetSim using the programming exercise available, under
programming user has to select Sorting Techniques.
Sample Inputs - In the Input panel the following steps need to be done,
Select the total number that has to be sorted. The values available are from 3
to 25.
Enter the Number Value in the field provided. The value entered should be
within the range of 1 to 9999.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
398
9.5.52 Sorting Technique - Selection Sort
Programming Guidelines
This section guides the user to link his/her own code for Sorting Algorithm to NetSim.
Pre - Condition
User written program should read the value from the Input.txt in the temporary directory
which is having input from the GUI at runtime
The output should be stored in Output.txt in the temporary directory for display.
The program begins with the Reading of the Inputs from the input file Input.txt.
Executing the required concept and the results of the program should be written into the
output file Output.txt.
Note:The naming of the input and the output file must be same as the text displayed in the
Methodology screen
File Format
399
Number_to_Sort=55,11,22 Position data index value of index1 is
copied to the index 2 value.
index 1 : index 1 is the index of array
that points to the first data that is being
swapped or compared.
index 2 : index 2 is the index of array
that points to the second data that is
being swapped or compared.
Sample Output:
Ascending:
0>0>0>
1>1>0>
0>1>1>
1>2>1>
0>2>2>
2>0>2>
0>1>1>
1>2>1>
Descending:
0>0>0>
1>1>0>
1>2>0>
0>1>1>
1>2>1>
0>2>2>
2>1>2>
Interface source code written in C is given using this the user can write only the Sorting
Algorithm inside the function select() using the variables already declared. To view the
interface source code, go to
To find NetSims Installation path right click NetSim icon and select
400
Open file location in Windows 7
Open file location in Windows Vista
Properties find target in Windows XP.
Sample Scenarios:
How to Proceed? -
The objective can be executed in NetSim using the programming exercise available, under
programming user has to select Sorting Techniques.
Sample Inputs - In the Input panel the following steps need to be done,
Select the total number that has to be sorted. The values available are from 3
to 25.
Enter the Number Value in the field provided. The value entered should be
within the range of 1 to 9999.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
401
9.5.53 Spanning Tree Borovska
Programming Guidelines
This section guides the user to link his/her own code for Spanning Tree using Borovska
algorithm to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface source code written in C is given .Using this the user can write only the Borovska
algorithm inside the function fnBorovska() using the variables already declared. To view the
interface source code, go to
402
NetSim Installation path / src / Programming/ Boruvska.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming Menu selectSpanning Tree.
Sample Input
Click on 2 Switches to give the distance between them. Similarly connect all the
Switches that are available in the network. The Distances between the Routers
that needs to be given are as follows,
Click on Run button to execute. Refresh button can be used if new Inputs have
to be given.
Sample Output
The SpanningTreeTable with the Path (Source Switch and Destination Switch)
and Distance is obtained. Below is the Table that is obtained for the above inputs,
403
Spanning Tree Table
Path Distance[KM]
1 2 67
3 4 56
1 4 46
The Length of the SpanningTree (KM) would be given below in the output
panel. The SpanningTreePath consists of green lines, whereas the Non-
SpanningTree consists of red lines. Here in this Sample, Length of the
Spanning Tree (KM) 169.
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
404
9.5.54 Spanning Tree Kruskal
Programming Guidelines
This section guides the user to link his/her own code for Spanning Tree using Kruskal
algorithm to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface source code written in C is given .Using this the user can write only the Kruskal
algorithm inside the function fnKruskal() using the variables already declared. To view the
interface source code, go to
405
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming Menu selectSpanning Tree.
Sample Input
Click on 2 Switches to give the distance between them. Similarly connect all the
Switches that are available in the network. The Distances between the Routers
that needs to be given are as follows,
Click on Run button to execute. Refresh button can be used if new Inputs have
to be given.
Sample Output
The SpanningTreeTable with the Path (Source Switch and Destination Switch)
and Distance is obtained. Below is the Table that is obtained for the above inputs,
406
Spanning Tree Table
Path Distance[KM]
1 4 46
4 3 56
1 2 67
The Length of the SpanningTree (KM) would be given below in the output
panel. The SpanningTree Path consists of green lines, whereas the Non-
SpanningTree consists of red lines. Here in this Sample, Length of the
SpanningTree (KM) 169
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
407
9.5.55 Spanning Tree Prims
Programming Guidelines
This section guides the user to link his/her own code for Spanning Tree using Prims
algorithm to NetSim.
Pre - Conditions
The user program should read the input scenario from text file named Input with extension
txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Interface source code written in C is given .Using this the user can write only the Prims
algorithm inside the function fnPrims() using the variables already declared. To view the
interface source code, go to
408
NetSim Installation path / src / Programming/ Prims.c
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. In the Programming Menu selectSpanning Tree.
Sample Input
Click on 2 Switches to give the distance between them. Similarly connect all the
Switches that are available in the network. The Distances between the Routers
that needs to be given are as follows,
Click on Run button to execute. Refresh button can be used if new Inputs have
to be given.
409
Sample Output
SpanningTreeTable
Path Distance[KM]
3 4 56
4 1 46
1 2 67
The Length of the SpanningTree (KM) would be given below in the output
panel. The SpanningTree Path consists of green lines, whereas the Non-
SpanningTree consists of red lines. Here in this Sample, Length of the
Spanning Tree (KM) 169.
Once the sample experiment is done, then Refresh button can be clicked to create
New Samples.
410
9.5.56 Transmission Flow Control - Go Back N
Programming Guidelines
This section guides the user to link his/her own code for Go Back N to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Window Size:
Algorithm=Go_Back_N Value1>Value2>Value3>Value4>
Data_File=C:\Users\P.Sathishkumar\ Types:
Documents\1 Th.txt> There are five types of formats of writing in
BER=0 the output file.
Each format is written in specific condition,
the types are explained below.
The condition of writing the types is
explained in the algorithm.
Type1:
Value1 - "CNT",
Value 2 - output of the slidingcount function
Value 3 - "FRAMES"
411
Value 4 - "TRANSMIT"
Type2:
Value1 - "DT",
Value 2 - Frame number,
Value 3 - Frames Source address,
Value 4 - Frames Destination address.
Type3:
Value 1 - "EV",
Value 2 - Output of the intro_error function,
Value 3 - Frame Source address,
Value 4 - Frames Destination address.
Type4:
Value 1 - "ACK",
Value 2 - "POS",
Value 3 - Acknowledgement frames Source
Address,
Value 4 - Acknowledgement frames
Destination Address.
Type5:
Value 1 - "DEL"
Value 2 - count of frames being deleted
Value 3 - "FRAME"
Value 4 - "DELETED"
Note: The above convention to write into the
Output.Txt is mandatory.
Values in Quotes"" to be written into file
Output.Txt as it is including Case.
DT>Frame No>node1>node2> (DT denotes
Data from node 1 to node 2)
EV>Error Flag>node1>node2> (EV denotes
Error Value - i.e If the above frame has error
then set the error flag as 1 else set the flag as
0)
ACK>POS>node2>node1>
(Acknowledgement for that above frame
received is sent to node 2 to node 1)
Ex: CNT>1>FRAMES>TRANSMIT>
DT>1>node1>node2>
412
EV>0>node1>node2>
ACK>POS>node2>node1>
DEL>1>FRAME>DELETED>
Interface source code written in C is given using this the user can write only the Transmission
Flow Control - Go Back N inside the function GoBackN () using the variables already
declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and receive the data using Transmission Flow Control - Go BackN.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under ProgrammingMenu select Transmission Flow ControlGo
Back N.
Sample Input - By using the InputPanel that is available on the left hand side a
SampleScenario is created. The Steps involved in creating are as follows,
SampleMode should be selected.
SelectGoBackN as Algorithm.
Create a Datafile (.txt) and save it on the disk.
Select the path of the above created Datafile (.txt) which could be Maximum
of 100000bytes.
SelectBit Error Rate (BER) as 10^-5 from the drop down menu.
1. Then Run button need to be clicked.
Output - Output for the above Sample is as follows,
2. An OutputTable is obtained when Run button is clicked. In the OutputTable,
Transmittedframe (Data and Acknowledgement) and their corresponding
Counts is obtained. The TotalCount is also obtained. The table is given below,
413
Output
Total data frames to be transmitted - 24
Transmitted frame Count
Data 30
Acknowledgement 5
Total = 35
Note - The Total data frames to be transmitted and Total count in the Output
table depends on size of the .txt file.
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
414
9.5.57 Transmission Flow Control - Selective Repeat
Programming Guidelines
This section guides the user to link his/her own code for Selective Repeat to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Window Size:
Algorithm=Selective_Repeat Value1>Value2>Value3>Value4>
Data_File=C:\Users\P.Sathishkumar\ Types:
Documents\1 Th.txt> There are five types of formats of writing in the
BER=0 output file.
Each format is written in specific condition, the
types are explained below.
The condition of writing the types is explained
in the algorithm.
Type1:
Value1 - "CNT",
Value 2 - output of the slidingcount function
Value 3 - "FRAMES"
415
Value 4 - "TRANSMIT"
Type2:
Value1 - "DT",
Value 2 - Frame number,
Value 3 - Frames Source address,
Value 4 - Frames Destination address.
Type3:
Value 1 - "EV",
Value 2 - Output of the intro_error function,
Value 3 - Frame Source address,
Value 4 - Frames Destination address.
Type4:
Value 1 - "ACK",
Value 2 - "POS",
Value 3 - Acknowledgement frames Source
Address,
Value 4 - Acknowledgement frames
Destination Address.
Type5:
Value 1 - "DEL"
Value 2 - count of frames being deleted
Value 3 - "FRAME"
Value 4 - "DELETED"
Note: The above convention to write into the
Output.Txt is mandatory.
Values in Quotes"" to be written into file
Output.Txt as it is including Case.
DT>Frame No>node1>node2> (DT denotes
Data from node 1 to node 2)
EV>Error Flag>node1>node2> (EV denotes
Error Value - i.e If the above frame has error
then set the error flag as 1 else set the flag as 0)
ACK>POS>node2>node1> (Acknowledgement
for that above frame received is sent to node 2
to node 1)
Ex:
CNT>1>FRAMES>TRANSMIT>
416
DT>1>node1>node2>
EV>0>node1>node2>
ACK>POS>node2>node1>
DEL>1>FRAME>DELETED>
Interface source code written in C is given using this the user can write only the Transmission
Flow Control -Selective Repeat inside the function SelectiveRepeat () using the variables
already declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and receive the data using Transmission Flow Control - Selective Repeat.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under Programming Menu select Transmission Flow
ControlSelective Repeat.
Sample Input - By using the Input Panel that is available on the left hand side a Sample
Scenario is created. The Steps involved in creating are as follows,
Sample Mode should be selected.
Select Selective Repeat as Algorithm.
Create a Data file (.txt) and save it on the disk.
Select the path of the above created Data file (.txt) which could be Maximum
of 100000 bytes.
Select Bit Error Rate (BER) as 10^-5 from the drop down menu.
1. Then Run button need to be clicked.
Output - Output for the above Sample is as follows,
417
2. An Output Table is obtained when Run button is clicked. In the Output Table,
Transmitted frame (Data and Acknowledgement) and their corresponding
Counts is obtained. The Total Count is also obtained. The table is given below,
Output
Total data frames to be transmitted -
Transmitted frame Count
Data
Acknowledgement
Total =
Note - The Total data frames to be transmitted and Total count in the Output table
depends on size of the .txt file.
Once the sample experiment is done, then Refresh button can be clicked to create
new samples.
418
9.5.58 Transmission Flow Control - Stop and Wait
Programming Guidelines
This section guides the user to link his/her own code for Stop and Wait to NetSim.
Pre - Conditions
The user program should read the inputted scenario from text file named Input with
extension txt.
The user program after executing the concept should write the required output to a file named
Output with extension txt.
The program begins with the Reading of the Inputs from the input file Input.txt.
The results of the program should be written into the output file Output.txt.
Algorithm=Stop_and_Wait Value1>Value2>Value3>Value4>
Data_File=C:\Users\P.Sathishkumar\ Types:
Documents\1 Th.txt> There are five types of formats of writing in
BER=0 the output file.
Each format is written in specific condition,
the types are explained below.
The condition of writing the types is explained
in the algorithm.
Type1:
Value1 - "CNT",
Value 2 - output of the slidingcount function
Value 3 - "FRAMES"
Value 4 - "TRANSMIT"
Type2:
Value1 - "DT",
419
Value 2 - Frame number,
Value 3 - Frames Source address,
Value 4 - Frames Destination address.
Type3:
Value 1 - "EV",
Value 2 - Output of the intro_error function,
Value 3 - Frame Source address,
Value 4 - Frames Destination address.
Type4:
Value 1 - "ACK",
Value 2 - "POS",
Value 3 - Acknowledgement frames Source
Address,
Value 4 - Acknowledgement frames
Destination Address.
Type5:
Value 1 - "DEL"
Value 2 - count of frames being deleted
Value 3 - "FRAME"
Value 4 - "DELETED"
Note: The above convention to write into the
Output.Txt is mandatory.
Values in Quotes"" to be written into file
Output.Txt as it is including Case.
DT>Frame No>node1>node2> (DT denotes
Data from node 1 to node 2)
EV>Error Flag>node1>node2> (EV denotes
Error Value - i.e If the above frame has error
then set the error flag as 1 else set the flag as
0)
ACK>POS>node2>node1>
(Acknowledgement for that above frame
received is sent to node 2 to node 1)
Ex:
DT>1>node1>node2>
EV>0>node1>node2>
ACK>POS>node2>node1>
420
Interface Source Code
Interface source code written in C is given using this the user can write only the Transmission
Flow Control - Stop and Wait inside the function stopandwait() using the variables already
declared. To view the interface source code, go to
To find NetSims Installation path right click NetSim icon and select
Sample Scenarios:
Objective - Send and receive the data using Transmission Flow Control Stop and wait.
How to Proceed? - The objective can be executed in NetSim using the programming
exercise available. Under Programming Menu select Transmission Flow Control Stop
and wait.
Sample Input - In the Input panel the following steps need to be done,
SampleMode should be selected.
Stop and Wait needs to be selected for Algorithm.
The path of the Data file (.txt) should be entered.
Bit Error Rate (BER) should be selected.
Then Run button need to be clicked. Refresh button can be used if new
Inputs have to be given.
421
Output
Total data frames to be transmitted
Transmitted frame Count
Data
Acknowledgement
Total =
Once the sample experiment is done, then Refresh button can be clicked to
create New Samples.
422
9.6 Programming exercise - How to practice without NetSim
For Example:
The contents of the file will vary for each programming exercises and are specified in NetSim
User Manual under programming topic.
For Example:
Copy the input file contents from NetSim user manual and save it in a file called Input.txt
423
Sample:
Algorithm=Link_State
No_of_Router=3
Distance:
999>6>5>
6>999>7>
5>7>999>
Source_Router=1
Destination_Router=2
For Example:
Now in C editor (Dev C++ IDE is used here), copy the interface source code. In the interface
source code, void fnDijkstra() is not implemented.
424
After writing the code for the function void fnDijkstra(), create .exe file. The procedure to
create .exe file is explained in Section 9.2 of NetSim User Manual.
There type
For Example:
In this example, the exe file LinkState.exe and Input.txt is present at D:\New. So in
command prompt go to the folder where exe file is saved.
425
NOTE: For Chat programming exercise, type
For Sender: <EXE Name> <blank> <Path where Input.txt is saved> send
For Receiver: <EXE Name> <blank> <Path where Input.txt is saved> receive
For Example: Here according to this example, the Output.txt file will be created at
D:\New folder. User can open the file and compare the content with NetSim user manual.
426
10 NetSim Emulator
NOTE: Emulator will be featured in NetSim only if Licenses for Emulator Add-on is available
10.1 Introduction
A network simulator mimics the behavior of networks but cannot connect to real networks.
NetSim Emulator enables users to connect NetSim simulator to real hardware and interact
with live applications.
A real PC (running NetSim Emulation Client) sends live traffic to the PC (running NetSim
Emulation Server). Whenever a packet arrives at the interface of server, this packet is
modulated into a simulation packet and sent from a source node (user selectable) in the
simulated network (user configurable) to a destination node (again user selectable). Upon
receipt of this packet at the destination, the packet is then de-modulated and sent back to a
real PC destination node (running NetSim Emulation Client). The real packet thus undergoes
network effects such as delay, loss, error etc. created virtually by NetSim Simulator.
427
10.2 Emulation Set-up:
The ideal set-up to run emulation would be to have a minimum of three (3) PCs. One would
be the real source, the second would run NetSim emulation server, and the third would be the
real destination.
Alternately, this set-up can also be managed where the two (2) PC's are running client
applications that communicate with the central server, where NetSim Emulation server is
running.
428
Set the Simulation Time as how long you want to perform the Emulation in
Real World. Do not run the simulation until setting up Emulation in the Client
system.
User has to configure the router settings of the real-world network so as to allow the
packets to be transmitted to the Emulation Server
For Example, if we consider a sample real world network scenario where the
Emulation clients and server are located in different subnets
Routing table of router C needs to be configured such that any packet having Source
Address as IP Address of Node 6 (Client Source) and Destination Address as IP
Address of Node 8 (Client Destination) must be routed to Emulation Server. NetSim
configuration will the ensure that the packet is re-injected with destination set to the
appropriate IP Address (set in the application properties)
Type command
route delete <Network Address>
429
, then press Enter key. You will get OK. For example if your IP address is
192.168.0.4 and the subnet mask is 255.255.255.0 then the network address is
192.168.0.0 (Got by performing a bitwise AND of the IP Address and the subnet
mask)
Type command
, here the subnet mask is taken as 255.255.255.0). After execution, you will get OK.
Type command
netstat r
to check if the IP configuration is done or not.
Note that in the above screenshot, for the network 192.168.0.0, the gateway address assigned
is 192.168.0.87 (Address of the system where NetSim Emulation Server is running).
430
10.2.3 Setting multiple Virtual Machines (VM) to act as Nodes for
Emulation
NOTE - VM enabled license are required
A computer on which one or more virtual machines are running is defined as a Host Machine.
Each virtual machine is called a Guest Machine. In this scenario, we have 3 VMs running in a
Host Machine VM1, VM2 and VM3. Users can run NetSim License server in any system
connected to the network in which Host Machine is running.
Now right click on each VM and select Settings. Click on Network Adapter, and select
Bridged: Connected directly to the physical network. Also enable the Replicate
Physical network connection state.
An advantage of this technique is that, if the license server is running in another system,
connected to the same network as the original host, then NetSim running in the VM can
obtain the licenses.
431
10.2.3.2 VMs sharing a network but insulated from the host network.
A computer on which one or more virtual machines are running is defined as a Host Machine.
Each virtual machine is called a Guest Machine. In this scenario, we have 3 VMs running in a
Host Machine VM1, VM2 and VM3. NetSim License server is running in one of these 3
VMs.
If user needs to create an internal network which is segregated from host network, follow the
steps
432
User can modify the Subnet IP and Subnet Mask to suit their own preference.
The disadvantage of this technique is that, if the license server must compulsorily run in the
VM for NetSim to obtain the licenses.
433
10.3 Emulation examples in NetSim
I. Run NetSim in Administrative Mode and create a basic network Scenario in any stack
based protocol (Any network except Legacy Networks, Wireless Sensor Network,
Zigbee Network and Cellular Network) in NetSim. Screenshot of a sample scenario in
Internetworks is shown below
II. Go to Properties of Link1 and Link2 and set Uplink and Downlink Delay to 5000.
Click and drop the Application. Right click Application select Properties.
III. In the Application Type select Emulation.
IV. Select Source and Destination ID according to the network scenario and change the
Source and Destination IP address according to the IP address of the real system.
V. Provide the Simulation Time as how long you want the Emulation to be performed.
Make sure client system(s) are ready and then click Run Simulation.
434
10.3.1.2 Steps at Source PC:
1. Before running simulation, start pinging the Destination from Source using command
ping <Destination_IP> t and note down the time duration.
(NOTE: In case if no ping messages can be sent from source to destination, disable
windows firewall and try again.)
4. The impact of the link propagation delay in NetSim Emulator is seen on a real packet.
435
10.3.2 Example Application 1 PING (Two way Communication)
In PING (Two way communication), almost all the steps are same as PING (One way
communication), except that in NetSim Emulation server there will be two application
instead of one. One Application will be directed from Source to Destination node, while the
other application will be directed from Destination to Source node.
The difference caused in the network behavior is that in the first case (PING -One way
communication), the PING reply packets were not routed via NetSim Emulator. But in the
second case (PING -Two way communication), the PING reply packets will be routed via
NetSim Emulator, thereby the total delay will be approximately 21millisecond.
436
10.3.3 Example Application 2 Video (One way Communication)
10.3.3.1 Steps at NetSim Emulation Server:
I. Run NetSim in Administrative Mode and create a basic network Scenario in any stack
based protocol (Any network except Legacy Networks, Wireless Sensor Network,
Zigbee Network and Cellular Network) in NetSim. Screenshot of a sample scenario in
Internetworks is shown below
II. Click and drop the Application. Right click Application select Properties.
III. In the Application Type select Emulation.
IV. Select Source and Destination ID according to the network scenario and change the
Source and Destination IP address according to the IP Address of the real system and
click accept.
437
V. Provide the Simulation Time as how long you want the Emulation to be performed.
Make sure client system(s) are ready and then click Run Simulation.
During Simulation you will notice a change in the quality of the video being played in the
destination PC. This is because the network created in NetSim has errors / delays etc in the
links. The impact of this loss / jitter / delay etc in NetSim Emulator is seen on a real video
stream.
1. Follow steps as provided before in Running Emulation via GUISetting up the NetSim
Client. Then open VLC Media player Click Media menu Select Stream Option.
2. Click add button then select the video which you want to play
4. Enable the display locally checkbox. Then select the RTP / MPEG Transport Stream from
the drop down list as shown in the below screen shot
438
5. Click on Add Button. Then enter the Destination IP address in the Address field and enter
a stream name (user defined) and click next button.
6. Select Video MPEG-2 + MPGA (TS) option from the drop down list as shown in the
below screen shot. Then click next button
439
7. Perform all the steps at Emulation Server and then click on Stream button. Also Wireshark
(if installed) will automatically start capturing the packets as soon as Emulation Server starts
simulation.
440
Toggle button is circled in red at the bottom of the screen shot
2. Double click on Network Stream (SAP) under local network. Then right click and play on
the stream name that appears on the screen.
3. In the streamed video, you will notice a change in the quality of the video being played in
the destination PC. Also Wireshark (if installed) will automatically start capturing the packets
as soon as Emulation Server starts simulation.
441
10.3.4 Example Application 3 File Transfer using FileZilla (One
way Communication)
10.3.4.1 Steps at Destination PC:
2. Go to Edit User General Click Add in User Give Any Name (Ex: User1)
and Select Group what you given in Group Setting (In this case, we provide Admin
) and click ok.
3. In Account Setting, select Enable account and set password and click ok.
442
4. Go to Shared folder Add Folder to share (EX: FTP_FILES from Desktop)
Select all the Files and Directories Permissions and set that folder as Home Directory
by selecting Set as Home Dir. Click Ok.
2. Enter the Host Name(Server System ip (EX: 192.168.0.133)) and Give the User,
Password that we created in Server side and give Port No = 21. Run Emulation server
and click Quick Connect. Drag and drop files from Local Site to Remote Site.
1. Run NetSim in Administrative Mode and create a basic network Scenario in any stack
based protocol (Any network except Legacy Networks) in NetSim. A sample scenario
in Internetworks is performed as shown with link speed set to 1 Mbps.
2. Click and drop the Application. Right click Application select Properties.
3. In the Application Type select Emulation.
443
4. Select Source and Destination ID according to the network scenario and change the
Source and Destination IP address according to the IP Address of the real system and
click accept.
5. Provide the Simulation Time as how long you want the Emulation to be performed.
Make sure client system(s) are ready and then click Run Simulation.
10.3.4.4 Results:
444
10.3.5 Example Application 4 Skype (Two way Communication)
10.3.5.1 Steps at NetSim Emulation Server:
1. Run NetSim in Administrative Mode and create a basic network Scenario in any stack
based protocol (Any network except Legacy Networks, Wireless Sensor Network,
Zigbee Network and Cellular Network) in NetSim. Screenshot of a sample scenario in
Internetworks is shown below.
2. Click and drop Application button. Right click Application select Properties. As it
is two way communication, add and create two applications.
3. In both the Application Type select Emulation.
4. In one Application, select Source ID and Destination ID according to the network
scenario and change the Source and Destination IP address according to the IP
Address of the real system. In the second application, set the opposite of first
application, i.e. Source ID and IP address will be exchanged with Destination ID and
IP address. (Refer the IP settings in the screen-shot to get a clear picture)
445
5. Provide the Simulation Time as how long you want the Emulation to be performed.
Make sure client system(s) are ready and then click Run Simulation.
1. Follow steps as provided before in Emulation Set-up: Setting up the NetSim Client.
2. Run Skype and make a call to the destination system (Make sure that Skype is running in
Destination PC).
3. Wireshark (if installed) will automatically start capturing the packets as soon as Emulation
Server starts simulation .
1. Follow steps as provided before in Emulation Set-up: Setting up the NetSim Client.
After performing all the steps at Source PC and NetSim Emulation Server, open Skype.
2. Wireshark (if installed) will automatically start capturing the packets as soon as Emulation
Server starts simulation.
446
10.3.6 Example Application 5 JPerf Network performance
measurement graphical tool (One way Communication)
10.3.6.1 Steps at NetSim Emulation Server:
1. Run NetSim in Administrative Mode and create a basic network Scenario in any stack
based protocol (Any network except Legacy Networks, Wireless Sensor Network,
Zigbee Network and Cellular Network) in NetSim. Screenshot of a sample scenario in
Internetworks is shown below
2. Click and drop the Application. Right click Application select Properties.
3. In the Application Type select Emulation.
4. Select Source and Destination ID according to the network scenario and change the
Source and Destination IP address according to the IP Address of the real system and
click accept.
447
5. Provide the Simulation Time as how long you want the Emulation to be performed.
Make sure client system(s) are ready and then click Run Simulation.
1. Follow steps as provided before in Emulation Set-up: Setting up the NetSim Client.
Run JPerf and select Client and set Server Address as 192.168.0.145. User can edit the
Application Layer options, Transport Layer options and IP Layer options depending on the
type of data they want to transmit in the network .
2. Do not click Run IPerf until all the steps at NetSim Emulation Server are done. Also
Wireshark (if installed) will automatically start capturing the packets as soon as Emulation
Server starts simulation .
448
10.3.6.3 Steps at Destination PC:
1. Follow steps as provided before in Emulation Set-up: Setting up the NetSim Client.
Run JPerf and select Server.
449
11 Troubleshooting in NetSim
11.1 CLI mode
While running NetSim via CLI for the scenarios described in the Configuration file, you may
bump into few problems.
Note: While running NetSim via CLI, try to ensure that there are no errors in the
Configuration.xml file. The file, ConfigLog.txt, written to the windows temp path would
show errors, if any, found by NetSims config parser.
Reason: While typing the CLI command if you enter wrong I/O Path, or if there is no
Configuration.xml file then the following error is thrown
450
11.1.2 Connection refused at server<-111> error displayed:
Reason: If the license information is wrong then the following message will be shown.
Solution: If the folder name contains white space, then mention the folder path within double
quotes while specifying the folder name in the command prompt. For example, if app path
contains white space, then the app path must be mentioned within double quotes in the
command prompt.
451
11.1.4 Error in getting License error in CLI mode:
Simulation does not commence. No license for product (-1) is displayed in the command
prompt.
Example:
452
Solution:
NetSim is based on the client-server architecture. When NetSim runs in the client machine, it
will check for the license in the same machine, first. If license is not available in the same
machine, then No license for product (-1) will be displayed in the command prompt and the
server machine will be checked for the availability of license. If no license is available in the
server machine also, then again No license for product (-1) will be displayed in the
command prompt.
So, if No license for product(-1) is displayed in the command prompt two times, then check
in the NetSim license server to know about the availability of license and adjust the number
of current users of NetSim, in order to get the license.
Reason: If the command/iopath provided by the user is first written in MS Word and then
copy pasted to Command prompt, some special characters(not visible in command prompt)
gets inserted and on execution, license config dll is not found.
Solution: Type the command manually or copy paste the command/iopath from notepad.
453
11.2 Configuration.xml
11.2.1 Blue zigzag lines in configuration file attributes:
Specific attributes in the Configuration file are highlighted with zigzag lines
Reason: If invalid input is given in the Configuration file, then the corresponding attribute is
highlighted in zigzag lines as shown in the figure given below.
Solution:
To resolve this issue mouse over the corresponding attribute, in order to get the tool tip that
furnishes the details about the valid input for that attribute.
Note: If the schema file and the configuration file are not present in the same folder, the
zigzag lines wont appear. So place the Configuration file and Schema File in the same
location or change the path of schema file in the configuration file.
Simulation does not commence and error is displayed at the command prompt. Also, Zigzag
lines appearing at the tag specifying the Layer in the Configuration file
Reason: This issue arises mainly when the closing tag is not specified correctly for a
particular layer in the Configuration file.
Example: If the closing tag is not specified for the Data link Layer, then the zigzag lines
appear at the starting tags of Data link Layer and the Network Layer.
454
When NetSim is made to run through CLI, then the following error gets displayed in the
command prompt.
Solution: The bug can be fixed by setting the closing tag correctly in the Configuration file
Reason: This issue arises when the schema and the configuration file are not in the same
folder.
455
Solution: The bug can be fixed by placing the Configuration file and schema in the same
folder.
Example:
This problem arises if there is any flaw in the Configuration.xml or in the dll.
Solution: Check whether the desired scenario has been configured properly in the
Configuration.xml.
456
11.3 GUI
11.3.1 Readability problem of texts in window:
The text doesnt fit into the available space. This can be a problem of readability like in the
following case where MTU looks like MIU
Reason:
The system display setting has been change from Normal size (96DPI) to large size (120DPI)
Solution:
The display setting should change to normal size (96DPI) in DPI setting
In Windows XP, Right click in the desktop properties Settings (Tab) Advanced
(Button) DPI Setting (Combo box) Select normal size (96DPI).
In Windows XP, Right click in the desktop properties Appearance (Tab) Font size
(Combo box) Select Normal and Click OK button
While starting NetSim, error shows the monitor screen resolution is less than 1024 X 768.
Reason: This error will come if monitor resolution is less than 1024 and 768. For example,
1260 X 720 will also show this error
457
11.4 Licensing
11.4.1 No License for product (-1) error
NetSim dongle is running in the server system. When running the NetSim in the Client
system showing No License for product (-1) error.
Possible Reasons
Solution
1. The installed firewall may block traffic at 5053 port used for licensing. So either the
user can stop the firewall, or may configure it to allow port 5053.
2. Contact the Network-in-charge and check if the Server system can be pinged from
client.
3. Check whether License Server is running in the Server system or not.
458
11.5 Emulator
11.5.1 Server closing connection duration Emulation
Reason: This issue has been noticed rarely when emulation is running above one hour.
Solution:
If you send any data packet within your Network, it will get routed via Emulation Server.
Reason: After closing the NetSim Emulation client, a new window will appear as shown
below and user closes it manually.
Solution: DO NOT CLOSE this window manually. It will automatically close after
sometime. In case the user manually closes the window, they need to disable the active
network adapter (located at Control Panel Network and Sharing Center Change adapter
settings) and enable it to revert back to the original network settings.
459
12 Known Issues in NetSim v9
12.1 User modified parameters in device properties will not
reflect in newly dropped devices
After dropping nodes on the environment, modification of protocols/ global properties (like
Physical Layer parameters, Data Link Layer parameters and others) in one node will reflect
in all other nodes. But after modification, if any new node is dropped, the modifications will
not be reflected in the newly dropped nodes
Solution: After dropping new nodes, open the properties of any old wireless node and click
accept.
Solution: After making modification and just before simulating the scenario, Click on
Dynamic Metrics and click OK.
After opening a network scenario where Dynamic Metrics is enabled, if the user
modifies the scenario by adding new Links or Application and simulate, these new Link and
Application properties will not be plotted.
Solution: After making modification and just before simulating the scenario, Click on
Dynamic Metrics and click OK.
460
12.4 Device properties does not revert to default values
User modifies the default values in a parameter, which is exclusive to a specific
protocol/codec, and then changes the protocol/codec using the provided combo box. If the
user reverts the combo box value again to the old protocol/codec, then the modified
parameter values will be shown instead of the default ones.
Solution: Type the file path in a text file. Then copy the path and paste it in the input field.
Reason: This is because windows has a limit of 512 on the max number of files that can be
open simultaneously
461
12.9 Running Application between unconnected nodes
Users can create multiple isolated networks in NetSim. But if an application is set having
source as a node of an isolated network and destination as a node of another isolated network,
NetSim may crash or display zero application throughput.
Solution: Users should not enter any value in a blank default gateway field in UI.
462
12.14 Removing link between switches leads to IP addressing
issue.
User connects 3 or more switches serially with a router on one side and wired node on the
other side. Due to this, the node is assigned default gateway value. But on removing an
intermediate link, the default gateway value still remains in the node properties, which may
lead to crashing of the network scenario.
463
13 NetSim Videos
In order to have a better understanding of NetSim, users can access YouTube channel of
Tetcos at www.youtube.com/tetcos and check out the various videos available
464