Saturday, 17 January 2015

NS2 BASIC PROGRAM FOR BEGINNERS-1

NS2 BASIC PROGRAM FOR BEGINNERS

FIRST EXAMPLE PROGRAM 

NETWORK SIMULATOR GUIDE 

SUNDARAPRAKASH CREATIONZ click here

---------------------------------------------------------------------------------------------------------------

1. To Design C++ and OTcl classes (e.g., Class My TCP). Derive this class from the TCP Reno classes. Use the convention defined above to name the class names, variables/instvars, and functions/instprocs in both the domain.

-----------------------------------------------------------------------------------------------------------------

# myfirst_ns.tcl
# Create a Simulator
1 set ns [new Simulator]
# Create a trace file
2 set mytrace [open out.tr w]
3 $ns trace-all $mytrace
# Create a NAM trace file
4 set myNAM [open out.nam w]
5 $ns namtrace-all $myNAM
# Define a procedure finish
6 proc finish { } {
7 global ns mytrace myNAM
8 $ns flush-trace
9 close $mytrace
10 close $myNAM
11 exec nam out.nam &
12 exit 0
13 }
# Create Nodes
14 set n0 [$ns node]
15 set n1 [$ns node]
16 set n2 [$ns node]
17 set n3 [$ns node]
18 set n4 [$ns node]
# Connect Nodes with Links
19 $ns duplex-link $n0 $n2 100Mb 5ms DropTail
20 $ns duplex-link $n1 $n2 100Mb 5ms DropTail
21 $ns duplex-link $n2 $n4 54Mb 10ms DropTail
22 $ns duplex-link $n2 $n3 54Mb 10ms DropTail
23 $ns simplex-link $n3 $n4 10Mb 15ms DropTail
24 $ns queue-limit $n2 $n3 40
---------------------------------------------------------------------------------------------------------------------
KEEP VISIT TO OUR BLOG TO GET LATEST TECHNOLOGY UPDATES UN CS/IT DEPT

we upload NS2 example programs with the clear explanations soon.. click follow button  sundaraprakash7.blogspot.in

Wednesday, 7 January 2015

Basics of Computer Network Simulation

Network Simulator Guide 

SUNDARAPRAKASH CREATIONZ click here

--------------------------------------------------------------------------------------------------------------------------

Basics of  Computer Network Simulation

                        A simulation is, more or less, a combination of art and science. That is, while
the expertise in computer programming and the applied mathematical tools
account for the science part, the very skill in analysis and conceptual model
formulation usually represents the art portion.
                        A long list of steps in executing
a simulation process, as given in [2], seems to reflect this popular claim.
Basically, all these steps can be put into three main tasks each of which carries
different degrees of importance.
                        According to Shannon [2], it is recommended that 40 percent of time and
effort be spent on defining a problem, designing a corresponding model, and
devising a set of experiments to be performed on the simulation model. Further,
it was pointed out that a portion of 20 percent should be used to program
the conceptual elements obtained during the first step.
                        Finally, the remaining
40 percent should be utilized in verifying/validating the simulation model, experimenting
with designed inputs (and possibly fine-tuning the experiments
themeselves), and analyzing the results.  
                       We note that this formula is in no
way a strict one. Any actual simulation may require more or less time and
effort, depending on the context of interest and, definitely, on the modeler
himself/herself.
                     A simulation can be thought of as a flow process of network entities (e.g.,
nodes, packets). As these entities move through the system, they interact with
other entities, join certain activities, trigger events, cause some changes to the
state of the system, and leave the process.
                  From time to time, they contend
or wait for some type of resources. This implies that there must be a logical
execution sequence to cause all these actions to happen in a comprehensible
and manageable way. An execution sequence plays an important role in
supervising a simulation and is sometimes used to characterize the types of
simulation.
-----------------------------------------------------------------------------------------
KEEP VISIT TO OUR BLOG TO GET LATEST TECHNOLOGY UPDATES UN CS/IT DEPT

we upload NS2 example programs with the clear explnations sooooon.. click follow button sundaraprakash7.blogspot.in

How To Use Network Simulator2

                                Network simulator 2 (NS2)

Introduction to Network

Simulator NS2

ANOTHER GREAT RELEASE FROM   SUNDARAPRAKASH CREATIONZ click here

--------------------------------------------------------------------------------------------------------------------------

        NS2 is an open-source event-driven simulator designed specifically for research
in computer communication networks. Since its inception in 1989, NS2 has
continuously gained tremendous interest from industry, academia, and government.
Having been under constant investigation and enhancement for years,
         NS2 now contains modules for numerous network components such as routing,
transport layer protocol, application, etc. 
          To investigate network performance,
researchers can simply use an easy-to-use scripting language to configure a network,
and observe results generated by NS2. Undoubtedly, NS2 has become
the most widely used open source network simulator, and one of the most
widely used network simulators.
           Unfortunately, most research needs simulation modules which are beyond
the scope of the built-in NS2 modules. Incorporating these modules into NS2
requires profound understanding of NS2 architecture. Currently, most NS2
beginners rely on online tutorials. 
           Most of the available information mainly
explains how to configure a network and collect results, but does not include
sufficient information for building additional modules in NS2. Despite its details
about NS2 modules, the formal documentation of NS2 is mainly written
as a reference book, and does not provide much information for beginners.
           The
lack of guidelines for extending NS2 is perhaps the greatest obstacle, which
discourages numerous researchers from using NS2. At this moment, there is
no guide book which can help the beginners understand the architecture of NS2 depth.
--------------------------------------------------------------------------------------------------------------
KEEP VISIT TO OUR BLOG TO GET LATEST TECHNOLOGY UPDATES UN CS/IT DEPT

we upload NS2 example programs with the clear explnations sooooon.. click follow button sundaraprakash7.blogspot.in

Secure Data Retrieval for Decentralized Disruption-Tolerant Hi-privacy Networks

Secure Data Retrieval for Decentralized Disruption-Tolerant Hi-privacy Networks          ------------------------------------------------------------------------------------------------------------                                                                      
                 Mobile nodes in military environments such as a
battlefield or a hostile region are likely to suffer from intermittent
network connectivity and frequent part                                                                                                                                       Disruption-tolerant
network (DTN) technologies are becoming successful solutions
that allow wireless devices carried by soldiers to communicate
with each other and access the confidential information or command
reliably by exploiting external storage nodes. 
                                                 Some of the
most challenging issues in this scenario are the enforcement of
authorization policies and the policies update for secure data
retrieval. 
                  Ciphertext-policy attribute-based encryption (CP-ABE)
is a promising cryptographic solution to the access control issues.
However, the problem of applying CP-ABE in decentralized DTNs
introduces several security and privacy challenges with regard to
the attribute revocation, key escrow, and coordination of attributes
issued from different authorities. In this paper, we propose a secure
data retrieval scheme using CP-ABE for decentralized DTNs
where multiple key authorities manage their attributes independently.
We demonstrate how to apply the proposed mechanism to
securely and efficiently manage the confidential data distributed
in the disruption-tolerant Hi-Privacy network.