Topology-tcp and udp sources, Computer Networking

Assignment Help:

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is your partner. Of course, you can do this project alone if you want to or have hard time to find a partner.

 

2026_tcp source.png

You are required to create the above topology and specified links (don't consider the buffer capacity requirement). Both of the TCP and UDP sources should start transmitting at time 0.01 second, and stop at time 4.0 seconds. Configure the UDP source to be a CBR source, sending packets of size 1000 bytes, at a rate of 0.2Mbps. Configure the UDP sink to be a NULL sink. TCP source is a FTP source. Then add loss model to the link between two routers (see Page 41 in our ns2 lecture notes). Use the following to define the error model:

set loss_module [new ErrorModel]

$loss_module set rate_ 0.02

$loss_module unit pkt

$loss_module ranvar [new RandomVariable/Uniform]

$loss_module drop-target [new Agent/Null]

To make it consistent among all students, make sure that the TCP source node has node ID 0, UDP source node is ID 1, Router 1 is ID 2, Router 2 is ID 3, TCP sink node is ID 4 and UDP sink node is ID 5. 

Run the simulation, and then based on the output trace file (give the file name as "out.tr"), you need to answer:

1). How many packets are generated by TCP source and UDP source, respectively? How many ACK packets are generated by the TCP sink?

2). On the link between two routers:  How many TCP data packets being dropped? How many TCP ACK packets being dropped? How many UDP packets being dropped?

3). What is the average throughput on the link between two routers during the 4 seconds simulation time for the TCP data traffic and the UDP traffic, respectively? The throughput is defined as the bytes received by the router #2 divided by the time interval.

Submission: Please submit your report document (a word file or PDF file), your simulation tcl code, and your output trace file "out.tr", and your analysis code if you program one. If you use "grep" or other Unix commands for data processing, please give the commands you have used in your report.


Related Discussions:- Topology-tcp and udp sources

network consultant, Network Consultant, My name is Jason Long. I am th...

Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a

Which protocol is used for booting diskless workstations, Reverse Address R...

Reverse Address Resolution Protocol - RARP is ARP's counterpart, but it resolves IP addresses to MAC addresses typically on diskless workstations.

Financial services - fundamentals of networks , Financial Services Tod...

Financial Services Today   financial services are totally depended  on computer network. Application includes credit history searchers foreign exchange and  investment service

#titlenetwork, importance of mail server ,proxy server ,modem ,intranet and...

importance of mail server ,proxy server ,modem ,intranet and web site

What are called fat clients and fat servers, If the amount of the applicati...

If the amount of the application runs on the Client side, then it is Fat clients. It is mostly used for decision support and personal software. If the amount of the application

Explain typical network topologies, Question: a) Explain briefly three ...

Question: a) Explain briefly three typical network topologies giving one advantage and one disadvantage of each topology. Explain the three topologies with appropriate diagrams

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Designing an internet work, 1. Introduction This document describes t...

1. Introduction This document describes the research-based assignment for this module. This assignment consists of two parts: A formal report And a presentatio

Firewalls - point to point, Firewalls After several  security  related ...

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

What do you mean by modems, Q. What do you mean by Modems? Telephone M...

Q. What do you mean by Modems? Telephone Modems - A telephone line has a bandwidth of approximately 2400 Hz for data transmission

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd