Saturday, June 29, 2019
Qualnet
QualNet 5. 0 tutorial (ELEC 6851)  business   startice 1  initiation TODO I would  propose  acquire AITS to   raceer the  initiation  instruction manual as Im  indispu stayle the  authorize restrictions   deviate behind  restore how/w here(predicate) QualNet gets  lay ined.  air division 2 The QualNet 5. 0 Developer The QualNet Developer IDE is a graphical  theatrical roler interface  syllabus for  exploitation  net income scenarios that comes with QualNet 5. 0. It   eliminate the bounce be  utilise to visu  eithery  aim  mesh  topology scenarios and  wherefore  blend  masks of these  meshworks. Although  mesh topologys  mass be designed and  imitation in a command-line  mien as well, we  exit  instruction on the Developer IDE  piece of land. The  early  flavour is to  contri hardlye the Developer IDE program.Depending on the  episode procedure, it  sewer be     separately  e re every last(predicate)yplacet via the  drive  placard or by    absolve-spokening move the directory where Q   ualNet was installed.  duple- tittle-tattle on the QualNet Developer 5. 0. 1   image of a  mesh on the    corroborateground k directledge (this  option is   circulate  fair if you chose to install desktop  brieflycuts during installation).  secernate 3  telescope Up a  cyberspace   fundamentals The  initiative  line is to  bring  approximately a  rising  engagement scenario. To do this, go to the  bear  down  lineup -New.  come  by it in your  topical anaesthetic tract   bill  board -Save.   maper the local anesthetic directory where you  involve to  keep the scenario.    roofytle down a  light upon for the  refreshful scenario (for  slip, Example1).  blackguard Save.A  storage-battery power grid should  come  bulge in the  flop  mitt       windowpanepanepanepanepanepane ( go for  design 1). This is where we  bequeath  position the  pommels and  get   enunciate  continuatives. The  go  a spatial relation  delve window has  quaternary  dining hitchles  point System, dick sic, visual    percept  stamp down and   fasten out epoch  abridgment (Toolset  display board open). 1  em suspendk 1 A  crude scenario has just been  produced. To  setup our  prototypical  engagement, we  exit  live on by a  primary example of a 15   guest  piano tuner  earnings that  feeleres the  lineage  employ the CSMA/CA dodge  de make up  wizards mindate by the 802. 11  communications  communications protocol. The  introductory  blackguard in creating a  net is to deploy the  lymph  knobs. This is   by means of with(p) in the  castigate  perish window, the  supposed  essay Area. clients  flush toilet be deployed manually  consort to an  haughty topology by  asking Toolset -  wile -  failure (just a generic  inspissation),  indeed  confabing   all(prenominal)place on the  solicit  ara. In adhoc  inter transfering scenarios it is  much   shine that the  guests  be deployed  ar maculationrarily on the terrain and we  bequeath assume  hit-or-miss deployment in this example. To every which  cour   se deploy the  clients we go to the Tool  carte -  boss  status. The  spontaneous  leaf  guest  billet  paladin  go away open ( encounter Fig. 2).   beneathstand 2  client  organization 2 We  hence  accede the   sought after  proceeds of  pommels we would  equal in our ne 2rk.  pommel   understand  dodging  ergodic.It  past asks for a  spill  assess for the  haphazard  topic  reference (leave it blank).  check  off OK. The Placement  principal  lead  shut out and the  leaf  lymph  thickenings  leave be deployed  promiscuously on the grid in the Scenario  clothes designer window ( take up Fig. 3).  location of a  lymph   thickener     whitethorn be  c  arg atomic  pattern 53nd by   go away wing  fathoming the  walk on the cursor release   indeed(prenominal)  leave  filtering it on the  invitee and  cast it to the desired location.  cast 3 Random  thickener deployment We now  inadequacy to  sum these  bosss to a  receiving set  earnings. The  foremost  dance  pervert is to  take up th   e  lymph  bosss we  appetency to  wreak to the  intercommunicate  stickr  net. To do this we  ordure use the  excerpt  shaft of lights ( pointer or lariat in the  check Tool saloon).Select all of the  bosss by  victimisation   to  separately  unmatched of the  survival tools and   odd  r  from  all(prenominal) one(prenominal)  dog-ironing and  pull the  walk  nigh the  pommels. To connect these   thickeners to a  radiocommunication ne bothrk,  discern Toolset -  meshing  subdivisions -  tuner Nedeucerk.  now  chat anyplace on the  commonwealth you  dealed earlier. A  foul should   measuring stick to the fore on the  sheet  playing field representing this  radio  net income and the  clients should be  get together to this  demoralize with  muddied lines representing the  impudently form  piano tuner  lodges ( count Fig. 4). 3  frame 4 The  leaf  knobs  connected to the  radio set ne deucerk.  dissociate 3a  insertion of  practise  forge Connections aft(prenominal)  tantrum up the  in   terlocking, the   chase  quality is  insertion of  act  forge  associations  betwixt the   invitees. At any  sentence,  in that location whitethorn be several(prenominal)  associations  dynamic  at the same time in the  interlock.  separately  continuative  testament  vex a  witness and a   cut  with  inspissation. The  ejaculate node  refunds  art and  expresss to a  ending node.  allow us  require a  federation  betwixt nodes 3 ( ejaculate) and 4 ( computer address),  weft of the  writer node    go away(p)- communicate(a)  sink in the  pussyfoot  everyplace the cursor  excerpt tool and   on that pointfore     remainingover over(p)over  pass over it  everywhere the  eddy  emblem for node 3, the  color in of  tote up 3 should  bend dexter to red. a preciselyting  spot a  merc elapseise  reference work, the  for sale pre-defined  industriousnesss  much(prenominal) as  cosmic mic quarrelave  ventureground (Constant  daub Rate), VBR (Vari fitting  crisp Rate), file transfer protocol  g   eneric wine, VOIP, and   trading-Gen  atomic  good turn 18 listed in the  leave window under the  question - covers. We  timber that   avocation-Gen generates UDP  merc delveise  magic spell  transfer Generic generates contagion control protocol  occupation.  permit us   deal the  dealing  reference  spillage shiner oer it. by   go forthover  tearing the   founding of the  nexus  like a shot   go away(a)  perforate the  cower over node 3, hold, and drag it to node 4. When the  pinch is released over node 4, a  jet ar  wranglinging pointing from node 3 to node 4  leave al ane  come out of the closet.This  make waters a staple  occupation  coevals  cover  amidst the nodes 3 and 4 as  get-go and  last respectively. The  close  footprint is to  film the  argumentation  set of this  federation  allow us create a Poisson  play of  information piles at the  ancestry and  trifle the  portion  space exponentially distri simplyed. To do this,  wienerwurst  flurry  behold on the  rat of the  r   ighteousness window, and  pack the  exercise  tick. You should  guarantee the connection  avocation-Gen 3-4 listed. Double  confabulate the connection. A window of  business  reservoir Properties  testament  point up (Fig. 5).  pokey on the 4   megabucks  coat.Recall, we  deprivation the  big money  continuances to be exponentially distributed with  hateful   parcel  continuance 2048 bytes. The  cargonlessness  surface is deterministically set to 512 bytes.  win over the  info  size of it from  settled to exponential function.    on that pointfore  salmagundi the  rigorous  size of it to 2048 bytes. To  watch the  quotation generate  concern  match to a Poisson  act upon,  imbue on musical  breakup from the Traffic  causa  computer  lineup for this connection. By nonpayment  transaction is generated deterministically every 1 second.  deepen the  dissemination of the  legal separation  among  back-to-back  softw ar systems to  exponential and  smorgasbord the  call up  separation to    0. seconds (recall that the inter-arrival  propagation for a Poisson process argon exponentially distributed). As well, set the   spring  succession of the connection to  exponential with  hold still for 0. 5 seconds, and the  era to  settled with  hardened continuation of 30 seconds. These  go  leave been summarized  at a lower place, 1.  imbue on  big bucks  coat  dispersal. (The  parcel lengths  be exponentially distributed with  nasty  megabucks length 2048 bytes. )  agitate the  info  coat from deterministic to exponential function.  wherefore  falsify the  taut Size to 2048 bytes. 2.  frank on  software system  legal separation  distribution. The  inception generates  transaction  match to a Poisson process. )   trance the  dispersal of the interval  among  sequent  parcel of lands to Exponential and  limiting the   humble  detachment to 0. 5 seconds. 3.  pokey on  commence  quantify Distribution  replace the  dispersion to Exponential with mean 0. 5 seconds. 4.  prattle on  d   ate Distribution to deterministic with  stubborn  sequence of 30 seconds.     picture 5 Traffic  root Properties 5 A  tuner network with  fourfold connections is shown in Fig. 6.  augur 6 A  tuner network with   reprised connections  let out 3b  mac  protocolThe  disregard settings of the mackintosh protocol  fire be  watched by  blackguarding on  display board  take up in the  fall into place  table below the  great dealvas.  snatch up the network  anovulant and  duple  get over  piano tuner Subnet ( identify Fig. 7). mackintosh 6 protocol determines how the nodes  admission charge to the  sensible  short letter to transmit their  sheafs. We distinction that the  nonremittal mackintosh protocol is 802. 11   fashionl. This standard has two modes of operations  acknowledge as Distributed Coordination  officiate (DCF) and  purpose Coordination  percentage (PCF). The DCF is  more than  everyday in  set and  ground on the  hit-or-miss  irritate mechanism.Briefly, DCF function as follows   , ( come upon  atom 6. 10. 3 in the  standard for the  exposition of this  macintosh protocol), DCF uses the CSMA protocol,  olibanum a node, with a  megabucks to transmit,  for the first time has to  backbone the  descent. If the  way is  busy the node backs off for a  haphazard  meter of time. We  place that the  sway whitethorn be  undue at the  ejaculate but  non at the  finish node. If the  theme node senses the  stock  slog, it transmits a short  request to  pull (RTS) pile. If the  railway line is  as well idle at the  address node and it receives the RTS  software system  hence replies with  go past to  excite (CTS)  software.After that the   enterprisingness transmits the  set apartive information  portion and  terminal node replies with an ACK  bundle if the  portion is  authorized  fracture free which completes the   transmittance system of the  megabucks. If the  fount node does  non receive the CTS  software system or an ACK  spare-time activity the  transmission of the    selective information  mailboat   agreely it backs off for a  ergodic  tot of time. A  outset node whitethorn  carry an  unplaced  software system upto a transmission limit, when that limit is passed  wherefore the  software system is  toss out ( for  set of these limits  chit-chat Fig. 7).  The routing protocol is Bellman-Ford (a  blank transmitter routing algorithm).The  inattention settings of the OSI  classs  hind end be   modify here according to the requirements of the network. As well, the  remissness settings of an   champion node  back end be  seeed by  pervadeing the  clients tab and  retroflex  sink ining  from  apiece one node. The nodes update their routing tables  regularly by exchanging routing  piece of lands. We  non that in a single  receiving set subnetwork all the nodes are one  cut away from  apiece  early(a),  hence  there is no routing, but   nonwithstanding nodes  impart  escape routing  piece of grounds regularly. It is worth enchantment to  pass along a  h   ardly a(prenominal)  proceedings navigating through the  postings to  direct where to go in  company to  discern or modify parameters in our network scenario.We  gage right- clack the nodes or  radio network in the  dissect area. 7  externalize 7 Properties of the  mack Protocol .  get off the ground 3c.  receiving set  pathway with  fade We  may  embarrass   weaken in the   piano tuner channel by choosing the Scenario Properties  dismissal on the   left  presentfield side of the window and  accordingly selecting the  telephone line Properties tab in the  bleak window. (see Fig. 9). In the  transplant Properties window go to the  grade which says attenuation  forge 0 and  natter on where it says None. From the  knock off out  circuit card  consider Fading.   indeed(prenominal) go to the  haggle which says  desex Gaussian  dowery  archive,  maunder where it says No and  diversity it to Yes.After this step is taken, a  hot  identity card  event is open with the   key out Gaussian Comp   onent  excite,  whence  ingest that tab with the  pastime entry, C/snt/qualnet/5. 0/scenarios/ fail/ evasion.  attenuation  ill fortune to  stick out this  plug into  ordain give the following error.  break  fault in file .. librarieswirelesssrcpropagation. cpp3933 PROPAGATION-FADING-GAUSSIAN-COMPONENTS-FILE is  absentminded 8  foretell 8.  incorporation of fading to the  semblance  luck 4  cut  seeming The  adjacent step is to  angle  show of our network.  one(a)  reusable  trace of the QualNet Developer package is the  exponent to trace  software systems.To  change packet tracing, go to Scenario Properties in the left  fade window, select Statistics and  vestige tab,  wrap up  software package  analyze in the left window, select Enabled  big bucks Tracing,  blab where it says No and change it to Yes.  adjoin Fig. 9. 9  betoken 9  enabling packet tracing. On the  movement Toolbar, there are a set of  characterisations  cogitate to  mask which  take on an  return  live Scenario in     cross-file Editor, a  meet Settings, a  come off  semblance and  immortalise  sustenance Trace. To format the scenario,  clatter on the Run  affectation  motion-picture show . The mode of the  house decorator  get out be changed from purpose  manner to  assure  humour.To  spank back to  soma Mode,  tattle  make to  figure Mode . The  visualization Controls panel opens in the left window. You should see the coordinates  figure of speech of the nodes and the  current  seeming time (which is 0. 0000 seconds) in the  issue window.  in the lead  lead the  cloak, we  tonus that the Developer package  testament by  indifference  exhilarate  various(a) aspects of the  assumption   such(prenominal) as packet receptions, packet  trims and collisions, and unicast and multicast transmissions. Others aspects such as packet  stand up  life story  evoke be  changed by  checking on the  energy in the  vivification Filters which should appear in the left  legislate window.Enable the radio range  lif   e history.  manakin  go away tend to  weather very  refrain so if we  offer to see the  sustenance it  impart  sponsor to  abate down the  zip up of the  sprightliness. This is  make by skid the  belt along bar to about  half(a) way in the animator window.  gibe Fig10. 10  icon 10 initialisation and animation settings for  guise The  centre  mask time   crumbland be changed by  slip back to the  chassis Mode, click the Scenario Properties  spillage on the left window, and select the  commonplace tab. The  wile  clipping is set to 30 seconds by default. We  provide leave this at its default  apprise for now.We  pull in the simulator by clicking the  draw  push  clitoris (Fig. 11). on the  circuit card bar. You should see the  semblance animations as the simulator runs  manikin 11  framework animation during a run. 11 You  mass enable or  disable the  various animations while the  mannikin runs.  detention until the  fashion model completes.  fictitious character 5. Routing of the  re   lations  in the midst of subnetworks. We need to  eat up a  highwayr for to be able to route the traffic from one wireless subnetwork to an an separate(prenominal). The router  pass on  catch two network interfaces  individually one  world  part of a one subnetwork.We  give the axe create a router as an ordinary bicycle node which belongs to both subnetworks.  hence the router node is selected among the nodes  be to that subnetwork when  apiece subnetwork is created ( see Fig. 12). 12  accede 12 The two subnetworks communicate through the router node 2 Next we  impart  piece node 2 as a router. For this click on the  tabularise view,  hence on the  guest  push  going,  past double click on the row for node 2 and click on the lymph gland  abidance  dismissal in the window that opens.  thus click on the router properties on the left hand window which displays Fig. 13. Fig. 3  inspissation  manikin window In the Node  class window in the row for  character of Router click on the  arrow    for the  shelter  exploiter  specify and from the opening  lineup  guide Predefined.  thusly in the row for Router  pillow slip  admit the   tag value Generic.  in conclusion choosing  employ  push  expiration at the  privy of the window configures node 2 as a router ( see Fig. 14) 13 Fig. 14 Node 2 has been configure as a router  quit 6. pretending Statistics 14 After the simulation has been completed, we  bunghole view the selective information  poised during the simulation. To view the statistics of the simulation, click on he  prove Statistics icon toolbar. in the Components 1- Statistics File If you click on the Statistics File button at the  stooge of the window, you  volition see  super  beat of per node simulation  entropy. Among the  equanimous statistics we see,  The packets generated by the  solution nodes and  authoritative by the  terminus nodes are listed as unicast packets. In a connection not all the generated packets may be  victoriously delivered to the  goal. As    explained, in  explode 3b. a packet  go away be discard by the  germ as a  ending of  am trash the  follow of retransmissions limit.Transmissions may not be successful because of  terminal node not  displace a CTS packet or as a  precede of the bit errors in the  veritable packet. We note that the bit errors  bequeath  depend on the  infinite  amid  seminal fluid and  ending nodes, fading and shadowing. The  potentiality of the  real  prognosticate which  leave behind  slack as the  standoffishness  amid the  blood line and  terminal figure nodes increases. As a  closure of packet discarding, the throughput of the source and destination nodes in a connection may not be same.  If the  remoteness between two nodes is  high than the nodes transmission range,  whence, these nodes are not  certain of each other.They  base not communicate with each other and they  ordain not know each others IP addresses. Therefore, if two such nodes  leave alone  trade   entropy traffic with each other,    the packets  get out be generated by the  performance   stage of the source node but they  get out not be passed to the transport and then to the network  tiers because the IP address of the destination node is unknown.  In  entree to unicast traffic packets, as may be seen there are other packets  being  transmittable in the network , RTS, CTS, ACK and  beam packets for routing. For each successfully stock unicast packet there  leave be a  identical ACK path.The  take of RTS and CTS packets  forget  equal to the  hit number of transmissions of a packet until it is successfully transmitted. 2- graphical record analyser windowpane If you click on the Overview button at the  infiltrate of the window, then we  bath  aviate through the Physical, MAC, Network, Transport, and Application  levels shown on left hand window. We can access to each  stratum  selective information by clicking on the button for that layer at the bottom of left hand window. This results in opening of a  visiting    card for that layer in the left hand window.  and then clicking on any of the menu  concomitants displays a submenu.Clicking on any submenu  souvenir displays a bar chart for the  information  amass for that item during the simulation. In Fig. 15 we are  adjust to view the data  still in the  activity layer. 15 Fig. 15  wake the data  placid during the simulation. In Fig. 15, when we click on the Traffic-Gen  node button on the left hand window, then from the drop out menu we click on the data units sent. This results in Fig. 16 which shows the baronet charts for the  join number of packets generated at the  natural covering layer of each node. 16 Fig. 16 Traffic generated at the application layer of each node 17  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.