Topology-tcp and udp sources, Computer Networking

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is your partner. Of course, you can do this project alone if you want to or have hard time to find a partner.

 

2026_tcp source.png

You are required to create the above topology and specified links (don't consider the buffer capacity requirement). Both of the TCP and UDP sources should start transmitting at time 0.01 second, and stop at time 4.0 seconds. Configure the UDP source to be a CBR source, sending packets of size 1000 bytes, at a rate of 0.2Mbps. Configure the UDP sink to be a NULL sink. TCP source is a FTP source. Then add loss model to the link between two routers (see Page 41 in our ns2 lecture notes). Use the following to define the error model:

set loss_module [new ErrorModel]

$loss_module set rate_ 0.02

$loss_module unit pkt

$loss_module ranvar [new RandomVariable/Uniform]

$loss_module drop-target [new Agent/Null]

To make it consistent among all students, make sure that the TCP source node has node ID 0, UDP source node is ID 1, Router 1 is ID 2, Router 2 is ID 3, TCP sink node is ID 4 and UDP sink node is ID 5. 

Run the simulation, and then based on the output trace file (give the file name as "out.tr"), you need to answer:

1). How many packets are generated by TCP source and UDP source, respectively? How many ACK packets are generated by the TCP sink?

2). On the link between two routers:  How many TCP data packets being dropped? How many TCP ACK packets being dropped? How many UDP packets being dropped?

3). What is the average throughput on the link between two routers during the 4 seconds simulation time for the TCP data traffic and the UDP traffic, respectively? The throughput is defined as the bytes received by the router #2 divided by the time interval.

Submission: Please submit your report document (a word file or PDF file), your simulation tcl code, and your output trace file "out.tr", and your analysis code if you program one. If you use "grep" or other Unix commands for data processing, please give the commands you have used in your report.

Posted Date: 3/14/2013 1:11:13 AM | Location : United States







Related Discussions:- Topology-tcp and udp sources, Assignment Help, Ask Question on Topology-tcp and udp sources, Get Answer, Expert's Help, Topology-tcp and udp sources Discussions

Write discussion on Topology-tcp and udp sources
Your posts are moderated
Related Questions
Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major

There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)

Buffering This  protocols  provides  the advantage of buffering to the  receiver can buffer any out of order  packets after being received by  sending  acknowledgment  when

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat

QUESTION (a) Briefly describe the direct coordination model and the meeting oriented coordination model (b) What does JADE stands for? (c) Name the three spec

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two

Internet  Protocols  Control Protocols ( IPCP)  The  internet  protocols  control protocols  establishes  configures and terminates the TCP/ IP network  protocols  layer in a PPP

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t