Skip to main content

Posts

Showing posts with the label simulation

SRM Implementation in NS

This section gives an overview of the implementation of SRM in NS. Running an SRM simulation requires creating and configuring the agent, attaching an application level data source (a traffic generator), and starting the agent and the traffic generator. The key steps in configuring a virgin SRM agent are to assign its multicast group and attach it to a node. Other useful configuration parameters are to assign a separate flow id to traffic originating from this agent, to open log file for statistics, and a trace file for trace data. The agent does not generate any application data on its own; instead the simulation user can connect any traffic generation module to any SRM agent to generate data. The user can attach any traffic generator to n SRM agent. The SRM agent will add the SRM headers, set the destination address to the multicast group and deliver the packet to its target. SRM header contains the type of message, identity of the sender, the sequence number of the message, the roun...

NS2 trace analysis IN MATLAB

Hey, In this post we are discussing about  How to do ns2 trace analysis under Matlab using Tracegraph Tool The following procedure shows the way to do trace analysis under Matlab using the Tracegraph tool : About Software versions used : We can use ns2.35 for the proposed simulation (even it will run under some lower versions also). We are using the new version of Tracegraph Version 2.05.  We are using the new version of Trace Converter Version 1.01. We can get it from the following link:  http://www.tracegraph.com/trconvertwin.zip Matlab 6.5 can be used to run the source version of Tracegraph. We will use a trace converter because Tracegraph could not handle the trace file generated by the wired cum wireless scenario. Refer Internet for further information about Tracegraph and trace converter. Diagram Explaining the Simulation and Analysis Steps. The highlighted model (Case – 4)  in the following diagram shows the simulation and analysis using we are using in t...

BYZANTINE ATTACK SIMULATION IN NS 2

In order to simulate most of the Byzantine attacks, we developed a protocol-independent Byzantine attack simulation module for ns2. This module provides the capability to simulate the black hole, Byzantine wormhole, and Byzantine overlay network wormhole attacks without modifying the routing protocol. It was not possible to simulate the flood rushing attack using this technique because it requires timing changes in the routing protocol code. Because this attack simulation module is potentially useful to the secure routing community, we make it publicly available below. The module is implemented as part of the ns2 Link Layer (LL) object which lies directly below the Routing Agent and directly above the MAC layer. The modified LL has several commands that allow it to be configured from the simulation TCL setup script. The first command enables the black hole attack, which is executed by checking the packet type of any packet sent down by the routing agent, and silently dropping any packe...