Nt1310 Unit 3.2 Simulations

Improved Essays
3.2 Simulator
Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently.
Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another. Besides, each simulator depends on its own methodology and models to model a real network.
Whereas several network simulators exist in the software
…show more content…
NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices.
Because of the continuing modifying the code base, the result may not be consistent and consist bugs.
NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.

3.2.2 GloMo Sim
GloMoSim is a scalable simulation atmosphere for wired and wireless network systems, formulated by PCL (Parallel Calculation Laboratory) of UCLA ( the University of California in Los Angeles). It utilizes Parallel Simulation atmosphere for Complex System (PARSEC) that is a C-based simulation language for parallel and sequential execution of Discrete event simulation model. Glomosim Supports protocol for a purely wireless network.

Advantages:-
Network model scalability can be increased up to thousands of nodes.
GlomoSim is helpful for a network model where nodes are interchanging a large amount of information.
Limitations:-
The GloMoSim updates are not regular. The last update was in
…show more content…
slow Java-based User Interface. very costly.

3.2.4 NETSIM
NetSim offers complete model creation and changes abilities along with graphical animation and data output. Netsim utilizes the event graph mechanism and object-oriented programming for simulation. Netsim is a world wide web-based simulation package written completely in Java. NetSim permits expandability for complicated modeling and integration with other Java-based programs i.e. graphing and analysis packages.
Any simulation issue modeled in NETSIM can be seen as an HTML page like JAVA applet. It offers conventional procedural based simulation package.
Advantages:-
it is existed in all platforms without recompiling. It can be accessed remotely as modeling is JAVA applet based.
It offers security by password technique for individual access, and protect against unauthenticated change and delicacy.
High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever.
Encourage interaction and communication through java and needs Browser capable of running JAVA programs.

Related Documents

  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2 Assignment

    • 505 Words
    • 3 Pages

    The assignment during the third week was to find the information that would entail the usage of the two definable word with, which came as an abstraction and encapsulation in reference to the design methods of object oriented programming. The example that would come to mind is the design of one or more of the software application used during the past few weeks within the online lecture class and the usage of hiding information by design. The design of any program can be the structure of the application and it does only what its attribute’s and behavior entail it to do, forgetting what other purposes the application has in mind for operation. The information that would best describe the usage comes as the control flow of the design on the programming that have been implemented so far in the published manual areas during the past week. This is encompassed by the design of the statement in the functionality of the program setting of the statements, functions and the way the program is executed for operations.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    It requires 3rd party integration. 3) To Factor Login After providing valid username & Password end user needs to provide code which will be sent by Application over E-mail or Phone. This is currently not in scope if require we can add it in near future. It require 3rd party SMS & Email services (we need to analyze the cost of different service providers) 3.2.2.…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    The services will be configured and adapted for the development of virtual lab realizations. Therefore, they will be installed as separate components, embedded in other end user tools or centrally used as web services. The communication with other component are developed through various protocols/API, whereas with web services strictly using REST API. Regardless of the underlying communication protocols used, a coherent higher level API are uniformly defined and supported by all…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Here, an evaluation including 40 graphs from the Internet Topology Zoo is carried out. For each graph,…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In this model every subject and object are classified and assigned with a security label. Packet filtering firewall…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Thanks Shailesh . Can you give me short description for each of these documents. My only guidance is that I want to create right amount of deliverables which aligns with resources we have. Currently in SOW , only document we have is Integration Approach Document, which I am plan to get it updated with new SOW.…

    • 75 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In order to construct the interdependent modular networks, first, two isolated networks labeled A and B was generated and both A and B are small-world modular networks[3, 46], where each modular has the Watts-Strogatz(WS) networks structure[5]. Without loss of generality, the two networks are designed with the same number of nodes NA=NB =N. Then, we coupled the two isolated networks with a certain preferences. Watts and Strogatz in their seminal paper discovered that many real-world networks are neither random nor regular but somewhere in between, and they proposed a method for constructing such networks, i.e., WS networks[5].…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hailam Kopitiam Case Study

    • 1869 Words
    • 8 Pages

    So that I can test the performance of the wireless connection and will reduce the interference on the wireless connection. This project will show how the data have been…

    • 1869 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    A traditional traffic model for circuit switched data as well as packet data is the Poisson process in which the number of incoming packets per time is according to Poisson distribution. It is one of the most widely used and oldest traffic models. In this model the length of each packet is based on exponential distribution and the number of simultaneously ongoing packets is according to Erlang distribution [16]. The Poisson process is characterized as a renewal process.…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays