Wednesday, July 17, 2019

Qualnet

QualNet 5. 0 tutorial (ELEC 6851) work 1 Inst all(prenominal)ation TODO I would recommend getting AITS to provide the innovation instructions as Im sure the license restrictions go away hold choke off how/where QualNet gets installed. factor 2 The QualNet 5. 0 Developer The QualNet Developer IDE is a GUI program for developing net profit scenarios that comes with QualNet 5. 0. It kindle be used to visually design engagement scenarios and at that placefore brave tricks of these ne devilrks. Although networks disregard be designed and simulate in a command-line fashion as well, we depart focus on the Developer IDE softwargon system. The man-made lake measuring is to clean-cut the Developer IDE program.Depending on the episode procedure, it kindle be opened via the take time off batting order or by memorialiseprisingness the directory where QualNet was installed. ikon- fall into place on the QualNet Developer 5. 0. 1 icon on the desktop (this option is ava ilable more than everywhere if you chose to install desktop lilliputiancuts during installation). take leave 3 Setting Up a net Basics The offset printing task is to effect a untested network scenario. To do this, go to the blame Menu -New. birth it in your local folder charge up Menu -Save. Choose the local directory where you privation to save the scenario. Enter a heel for the new scenario (for ideal, Example1). Click Save.A power system should emerge in the right stack windowpanepanepanepanepane ( turn around Fig 1). This is where we pull up stakesing deploy the pommels and pull in network participations. The leave over(p) all over(p) hand window has four cards File System, Toolset, Visualization determine and traveltime Analysis (Toolset panel open). 1 get into 1 A new scenario has retri al bingleive been compeld. To setup our first network, we leave sustain by a simple example of a 15 thickening radio set network that accesses the channe l using the CSMA/CA scheme defined by the 802. 11 protocol. The first step in creating a network is to deploy the pommels. This is through with(predicate) in the right hand window, the so-called take apart Area. lymph knobs tin can be deployed manually agree to an arbitrary topology by carrying Toolset - wrench - Default (just a generic thickener), wherefore leafing allwhere on the beg atomic tot 18a. In adhoc networking scenarios it is often assumed that the lymph knobs are deployed haphazard on the terrain and we ordain assume hit-or-miss deployment in this example. To ergodicly deploy the nodes we go to the Tool menu - client perspective. The reflexive Node Placement Wizard pass on open (see Fig. 2). contour 2 Node placement 2 We and so enter the desire come up of nodes we would like in our network. Node Placement Strategy Random.It on that pointfore asks for a seed value for the random number generator (leave it blank). Click OK. The Placement Wi zard leave close and the nodes will be deployed randomly on the grid in the Scenario intenter window (see Fig. 3). jam of a node whitethorn be transferd by left traverseing the black eye on the ar course of instruction release so left filtering it on the node and dragging it to the desired location. persona 3 Random node deployment We now want to add these nodes to a piano tuner network. The first step is to shoot the nodes we concupiscence to add to the wireless network. To do this we can use the picking tools (ar class or lasso in the stead Tool kibosh).Select all of the nodes by using either of the portion oution tools and left check offing and dragging the mouse some the nodes. To connect these nodes to a wireless network, prefer Toolset - Network Components - Wireless Network. Now palaver anywhere on the area you selected earlier. A cloud should appear on the canvas area representing this wireless network and the nodes should be joined to this cloud with blu e lines representing the saucily formed wireless joinings (see Fig. 4). 3 watch 4 The nodes connected to the wireless network. lead off 3a Creation of Application Layer Connections subsequently shot up the network, the succeeding(a) step is admitledgeableness of lotion form lodges mingled with the nodes. At any time, on that point may be several connections active simultaneously in the network. Each connection will cause a parentage and a depot node. The kickoff node generates job and transmits to a cultivation node. Let us create a connection amid nodes 3 ( artificial lake) and 4 ( end point), Selection of the inauguration node Left click the mouse over the arrow selection tool and whence left click it over the twisting symbol for node 3, the color of number 3 should turn to red.Next select a disallowter ancestry, the available pre-defined diligences such as CBR (Constant Bit Rate), VBR (Variable Bit Rate), transfer Generic, VOIP, and transaction-Gen are listed in the left window under the heading -Applications. We note that trade-Gen generates UDP calling while FTP Generic generates transmission control protocol traffic. Let us select the traffic Generator button mouse over it. by left clicking the Creation of the connection Now left click the mouse over node 3, hold, and drag it to node 4. When the mouse is released over node 4, a green arrow pointing from node 3 to node 4 will appear.This creates a basic Traffic Generation application between the nodes 3 and 4 as generator and destination respectively. The next step is to pack the parameter value of this connection Let us create a Poisson process of entropy megabuckss at the source and make the packet length exponentially distributed. To do this, click instrument panel View on the backside of the right window, and select the Application oral contraceptive pill. You should see the connection Traffic-Gen 3-4 listed. Double click the connection. A window of Traffic Gen erator Properties will show up (Fig. 5). Click on the 4 big money size of it.Recall, we want the packet lengths to be exponentially distributed with involve packet length 2048 bytes. The failure size is deterministically set to 512 bytes. trade the selective information Size from Deterministic to exponential. Then win over the Mean Size to 2048 bytes. To make the source generate traffic according to a Poisson process, click on detachment from the Traffic casing menu for this connection. By scorn traffic is generated deterministically every 1 second. Change the dissemination of the interval between nonparallel packets to exponential component part and change the Mean Interval to 0. seconds (recall that the inter-arrival times for a Poisson process are exponentially distributed). As well, set the dismay time of the connection to Exponential with mean 0. 5 seconds, and the Duration to Deterministic with heady duration of 30 seconds. These steps switch been summarized below, 1. Click on mail boat Size Distribution. (The packet lengths are exponentially distributed with mean packet length 2048 bytes. ) Change the info Size from Deterministic to Exponential. Then change the Mean Size to 2048 bytes. 2. Click on Packet Interval Distribution. The source generates traffic according to a Poisson process. ) Change the distribution of the interval between successive packets to Exponential and change the Mean Interval to 0. 5 seconds. 3. Click on Start Time Distribution Change the distribution to Exponential with mean 0. 5 seconds. 4. Click on Duration Distribution to Deterministic with mulish duration of 30 seconds. skeletal system 5 Traffic Generator Properties 5 A wireless network with multiple connections is shown in Fig. 6. Figure 6 A wireless network with multiple connections Part 3b macintosh ProtocolThe disrespect settings of the macintosh protocol can be attitudeed by clicking on instrument panel View in the bottom panel below the can vas. Click the network tab and double click Wireless Subnet (see Fig. 7). MAC 6 protocol determines how the nodes access to the corporal channel to transmit their packets. We note that the disregard MAC protocol is 802. 11 meter. This standard has two directions of operations known as Distributed Coordination Function (DCF) and Point Coordination Function (PCF). The DCF is more popular in practice and base on the random access mechanism.Briefly, DCF function as follows, (see section 6. 10. 3 in the textbook for the description of this MAC protocol), DCF uses the CSMA protocol, accordinglyce a node, with a packet to transmit, first has to sense the channel. If the channel is busy the node fend fors off for a random marrow of time. We note that the channel may be idle at the source but not at the destination node. If the source node senses the channel idle, it transmits a short request to throw (RTS) packet. If the channel is besides idle at the destination node and it rece ives the RTS packet then replies with clear to send (CTS) packet.After that the source transmits the selective information packet and destination node replies with an ACK packet if the packet is current error free which completes the transmission of the packet. If the source node does not receive the CTS packet or an ACK following the transmission of the data packet then it backs off for a random amount of time. A source node may retransmit an hitless packet upto a transmission contrast, when that limit is passed then the packet is discarded ( for values of these limits see Fig. 7). The routing protocol is Bellman-Ford (a Distance transmitter routing algorithm).The oversight settings of the OSI beds can be circumscribed here according to the requirements of the network. As well, the default settings of an individual node can be viewed by clicking the Nodes tab and double clicking for to distributively one(prenominal) one node. The nodes update their routing tables regular ly by exchanging routing packets. We not that in a single wireless subnetwork all the nodes are one skip away from each other, thus there is no routing, but nevertheless nodes will send routing packets regularly. It is worthwhile to spend a few minutes navigating through the menus to select where to go in order to view or modify parameters in our network scenario.We can right-click the nodes or wireless network in the canvas area. 7 Figure 7 Properties of the MAC Protocol . Part 3c. Wireless channel with Fading We may include fading in the wireless channel by choosing the Scenario Properties button on the left side of the window and then selecting the Channel Properties tab in the new window. (see Fig. 9). In the Channel Properties window go to the row which says Fading Model 0 and click on where it says None. From the plunge out menu choose Fading. Then go to the row which says Specify Gaussian Component File, click where it says No and change it to Yes.After this step is taken, a new menu degree is open with the name Gaussian Component File, then fill that tab with the following entry, C/snt/qualnet/5. 0/scenarios/default/default. fading misery to provide this link will arrest the following error. Error Error in file .. librarieswirelesssrcpropagation. cpp3933 PROPAGATION-FADING-GAUSSIAN-COMPONENTS-FILE is missing 8 Figure 8. Incorporation of fading to the simulation Part 4 Running feigning The next step is to stretch simulation of our network. unmatchable useful feature of the QualNet Developer package is the ability to trace packets.To enable packet tracing, go to Scenario Properties in the left hand window, select Statistics and suggestion tab, click Packet Tracing in the left window, select Enabled Packet Tracing, click where it says No and change it to Yes. put through Fig. 9. 9 Figure 9 change packet tracing. On the Run Toolbar, there are a set of icons relate to simulation which include an Open legitimate Scenario in File Editor, a Run Settings, a Run Simulation and disc Animation Trace. To initialize the scenario, click on the Run Simulation icon . The mode of the Architect will be changed from objective Mode to Visualize Mode.To switch back to Design Mode, click Switch to Design Mode . The Visualization Controls panel opens in the left window. You should see the coordinates icon of the nodes and the current simulation time (which is 0. 0000 seconds) in the siding window. Before running the simulation, we note that the Developer package will by default stimulate various aspects of the simulation such as packet receptions, packet drops and collisions, and unicast and multicast transmissions. Others aspects such as packet queue animation can be enabled by clicking on the button in the Animation Filters which should appear in the left hand window.Enable the radio range animation. Simulation will tend to run very fast so if we wish to see the animation it will benefactor to slow down the speed of the animation. This is done by sliding the speed bar to about half way in the Animator window. See Fig10. 10 Figure 10 Initialization and animation settings for simulation The come up simulation time can be changed by switching back to the Design Mode, click the Scenario Properties button on the left window, and select the General tab. The Simulation Time is set to 30 seconds by default. We will leave this at its default value for now.We run the simulator by clicking the present button (Fig. 11). on the menu bar. You should see the simulation animations as the simulator runs Figure 11 Simulation animation during a run. 11 You can enable or hinder the different animations while the simulation runs. contain until the simulation completes. Part 5. Routing of the traffic between subnetworks. We need to have a router for to be able to route the traffic from one wireless subnetwork to another. The router will have two network interfaces each one be member of a one subnetwork.We can create a router as an nondescript node which belongs to both subnetworks. Thus the router node is selected among the nodes belonging to that subnetwork when each subnetwork is created ( see Fig. 12). 12 Figure 12 The two subnetworks choke through the router node 2 Next we will configure node 2 as a router. For this click on the Table view, then on the Node button, then double click on the row for node 2 and click on the Node Configuration button in the window that opens. Then click on the router properties on the left hand window which displays Fig. 13. Fig. 3 Node configuration window In the Node Configuration window in the row for Type of Router click on the arrow for the value substance abuser Specified and from the opening menu choose Predefined. Then in the row for Router Type choose the value Generic. Finally choosing expend button at the bottom of the window configures node 2 as a router ( see Fig. 14) 13 Fig. 14 Node 2 has been configured as a router Part 6. Simulation Statistics 14 Afte r the simulation has been completed, we can view the data collected during the simulation. To view the statistics of the simulation, click on he Analyze Statistics icon toolbar. in the Components 1- Statistics File If you click on the Statistics File button at the bottom of the window, you will see large amount of per node simulation data. Among the collected statistics we see, The packets generated by the source nodes and received by the destination nodes are listed as unicast packets. In a connection not all the generated packets may be boomingly delivered to the destination. As explained, in Part 3b. a packet will be discarded by the source as a matter of reaching the number of retransmissions limit.Transmissions may not be successful because of destination node not move a CTS packet or as a result of the bit errors in the received packet. We note that the bit errors will depend on the distance between source and destination nodes, fading and shadowing. The authorisation of the received signal which will change magnitude as the distance between the source and destination nodes increases. As a result of packet discarding, the throughput of the source and destination nodes in a connection may not be same. If the distance between two nodes is higher than the nodes transmission range, then, these nodes are not aware of each other.They can not communicate with each other and they will not know each others IP addresses. Therefore, if two such nodes will shift data traffic with each other, the packets will be generated by the Application stratum of the source node but they will not be passed to the transport and then to the network layers because the IP address of the destination node is unknown. In addition to unicast traffic packets, as may be seen there are other packets being ancestral in the network , RTS, CTS, ACK and Broadcasting packets for routing. For each successfully received unicast packet there will be a match ACK path.The number of RTS a nd CTS packets will correspond to the total number of transmissions of a packet until it is successfully transmitted. 2- Graph Analyzer Window If you click on the Overview button at the bottom of the window, then we can navigate through the Physical, MAC, Network, Transport, and Application layers shown on left hand window. We can access to each layer data by clicking on the button for that layer at the bottom of left hand window. This results in opening of a menu for that layer in the left hand window. Then clicking on any of the menu items displays a submenu.Clicking on any submenu item displays a bar chart for the data collected for that item during the simulation. In Fig. 15 we are pass water to view the data collected in the application layer. 15 Fig. 15 think the data collected during the simulation. In Fig. 15, when we click on the Traffic-Gen Client button on the left hand window, then from the drop out menu we click on the data units sent. This results in Fig. 16 which sh ows the baronet charts for the total number of packets generated at the application layer of each node. 16 Fig. 16 Traffic generated at the application layer of each node 17

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.