Friday, January 31, 2020

Network Simulator Essay Example for Free

Network Simulator Essay INTRODUCTION IEEE 802.11 is the de facto standard for WLANs. It specifies both the medium access control (MAC) and the physical (PHY) layers for WLANs. The MAC layer operates on top of one of several physical layers. Medium access is performed using Carrier Sense Multiple Access with Collision Avoidance. However, simple CSMA is susceptible to the hidden node problem, especially in so called ad hoc networks where a node may communicate directly with every other node in range or using intermediate nodes as relays otherwise. Hidden nodes cause costly packet collisions and thus significantly affect network performance. In order to combat the hidden node problem, a mechanism known as Request to Send/Clear to Send (RTS/CTS) handshake is often used. RTS/CTS mechanism is supported in the IEEE 802.11 family of standards. The RTS/CTS mechanism was initially proposed in a protocol called Multiple- Access with Collision Avoidance (MACA). From a network point of view, one of the primary reasons for using the RTS/CTS mechanism is to avoid network congestion resulting from frequent packet collisions. Figure 1 depicts a conceptual â€Å"throughput versus Packet Size† curve for a network. In the presence of congestion, the throughput goes to zero as the Packet Size is increased beyond a certain value. A properly designed network, on the other hand, maintains the maximum throughput as the Packet Size goes to infinity. LITERATURE REVIEW The IEEE 802.11 standard includes an optional feature of the RTS/CTS (Request to Send/Clear to Send) function to control station access to the medium when collisions occur due to the hidden node. This option is also known as virtual carrier sensing. Through the proper use of RTS/CTS, you can fine-tune the operation of your wireless LAN since it solves the hidden node problem and provides additional protection against collisions. If you enable RTS/CTS on a particular station, it will refrain from sending a data frame until the station completes a RTS/CTS handshake with another station, such as an access point. A station initiates the process by sending a RTS frame. The access point (AP) or another station receives the RTS and responds with a CTS frame. The station must receive a CTS frame before sending the data frame. The CTS also contains a time value that alerts other stations to hold off from accessing the medium while the station initiating the RTS transmits  its data. Thus, the use of RTS/CTS reduces collisions and improves the performance of the network if hidden nodes are present. SIMULATION ENVIRONMENT We use Ns-3 as simulation tool. NS-3 is built using C++ and Python and scripting is available with both languages. The ns-3 library is wrapped to python thanks to the pybindgen library which delegates the parsing of the ns-3 C++ headers to gccxml and pygccxml to generate automatically the corresponding C++ binding glue. These automatically-generated C++ files are finally compiled into the ns-3 python module to allow users to interact with the C++ ns-3 models and core through python scripts. Graphical visualization of raw or processed data collected in a simulation is graphed using Gnuplot tool. Our experimental done in Ubuntu 11.10 with installation of all needed tools. Simulation environment based on the command below, sudo apt-get install build-essential g++ python mercurial NS-3 is available in (linux, osx, cygwin, mingw) and we deploy Development version: http://code.nsnam.org/ns-3-dev. The development version is usually stable; a lot of people use it for daily work. RESULT ANALYSIS The results analysis are based on the following factors * Enabling and disabling RTS/CTS * Protocol bases, either UDP or TCP * WLAN standards which are IEEE 802.11a, IEEE 802.11b, IEEE 802.11g * Variation of Throughput, Packet Loss Ratio, Delay with Packet Size and Wifi Nodes. From the graphs below result obtained through the following * Disabling and enabling RTS/CTS * UDP protocol used * IEEE 802.11b standard used * Variation of Packet Size (500-2200) Considering the second result with use of TcpTahoe, TcpNewReno, TcpReno and UDP transport protocols with the following * Disabling and enabling RTS/CTS * UDP protocol used * IEEE 802.11b standard used * Variation of Packet Size Fig. Tahoe 1 Fig. Tahoe 2 Fig. Tahoe 3 Fig. Reno 1 Fig. Reno 2 Fig. Reno 3 Fig. Newreno 1 Fig. Newreno 2 Fig. Newreno 3 Considering the third result for different IEEE802.11 standards (802.11a, 802.11b and 802.11g). * Disabling and enabling RTS/CTS * TCP protocol used * IEEE 802.11a/ IEEE 802.11b/ IEEE 802.11g standard used * Variation of Wifi Nodes Fig. 802.11a (i) Fig. 802.11a (ii) Fig. 802.11a (iii) Fig. 802.11b (i) Fig. 802.11b (ii) Fig. 802.11b (iii) Fig. 802.11g (i) Fig. 802.11g (ii) Fig. 802.11g (iii) CONCLUSION From the result analysis obtained above, it is clearly seen that IEEE 802.11a has better performance compared to other wireless standards due to the following reasons; * Provides maximum data rate of about 54 Mbps. * It operates in 5GHz ISM band. * It is not subjected to interference from other products designed , * It is characterized with higher throughput * It is suited for connectivity provision over densely populated user environment Also from the result analysis above, TCP Tahoe is the best TCP variant due to the following facts; * It is characterized by fast retransmit. * It is characterized by fast recovery. * Reduce congestion window REFERENCES 1. E. Ayanoglu, S. Paul, T. F. LaPorta, K. K. Sabnani, and R. D.Gitlin, â€Å"AIRMAIL: A link-layer protocol for wireless networks,† ACMACM/Baltzer Wireless Networks J., vol. 1, pp. 47–60, Feb. 1995. 2. A. Bakre and B. R. Badrinath, â€Å"Handoff and system support for indirectTCP/IP,† in Proc. 2nd Usenix Symp. Mobile and Location-IndependentComputing, Apr. 1995. 3. S. Keshav, â€Å"REAL: A Network Simulator,† University of California at * Berkeley, Berkeley, CA, USA, Tech. Rep., 1988. * 4. V. Naoumov and A. Gross, â€Å"Simulation of Large Ad Hoc Networks,† In Proceedings of the 6th ACM Workshop on Modeling, Analysis, and * Simulation of Wireless and Mobile Systems, 2003.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.