Nt1310 Unit 3.2 Simulations

Improved Essays
3.2 Simulator
Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently.
Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another. Besides, each simulator depends on its own methodology and models to model a real network.
Whereas several network simulators exist in the software
…show more content…
NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices.
Because of the continuing modifying the code base, the result may not be consistent and consist bugs.
NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.

3.2.2 GloMo Sim
GloMoSim is a scalable simulation atmosphere for wired and wireless network systems, formulated by PCL (Parallel Calculation Laboratory) of UCLA ( the University of California in Los Angeles). It utilizes Parallel Simulation atmosphere for Complex System (PARSEC) that is a C-based simulation language for parallel and sequential execution of Discrete event simulation model. Glomosim Supports protocol for a purely wireless network.

Advantages:-
Network model scalability can be increased up to thousands of nodes.
GlomoSim is helpful for a network model where nodes are interchanging a large amount of information.
Limitations:-
The GloMoSim updates are not regular. The last update was in
…show more content…
slow Java-based User Interface. very costly.

3.2.4 NETSIM
NetSim offers complete model creation and changes abilities along with graphical animation and data output. Netsim utilizes the event graph mechanism and object-oriented programming for simulation. Netsim is a world wide web-based simulation package written completely in Java. NetSim permits expandability for complicated modeling and integration with other Java-based programs i.e. graphing and analysis packages.
Any simulation issue modeled in NETSIM can be seen as an HTML page like JAVA applet. It offers conventional procedural based simulation package.
Advantages:-
it is existed in all platforms without recompiling. It can be accessed remotely as modeling is JAVA applet based.
It offers security by password technique for individual access, and protect against unauthenticated change and delicacy.
High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever.
Encourage interaction and communication through java and needs Browser capable of running JAVA programs.

Related Documents

  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2 Assignment

    • 505 Words
    • 3 Pages

    The assignment during the third week was to find the information that would entail the usage of the two definable word with, which came as an abstraction and encapsulation in reference to the design methods of object oriented programming. The example that would come to mind is the design of one or more of the software application used during the past few weeks within the online lecture class and the usage of hiding information by design. The design of any program can be the structure of the application and it does only what its attribute’s and behavior entail it to do, forgetting what other purposes the application has in mind for operation. The information that would best describe the usage comes as the control flow of the design on the programming that have been implemented so far in the published manual areas during the past week. This is encompassed by the design of the statement in the functionality of the program setting of the statements, functions and the way the program is executed for operations.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    It requires 3rd party integration. 3) To Factor Login After providing valid username & Password end user needs to provide code which will be sent by Application over E-mail or Phone. This is currently not in scope if require we can add it in near future. It require 3rd party SMS & Email services (we need to analyze the cost of different service providers) 3.2.2.…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Thanks Shailesh . Can you give me short description for each of these documents. My only guidance is that I want to create right amount of deliverables which aligns with resources we have. Currently in SOW , only document we have is Integration Approach Document, which I am plan to get it updated with new SOW.…

    • 75 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In order to construct the interdependent modular networks, first, two isolated networks labeled A and B was generated and both A and B are small-world modular networks[3, 46], where each modular has the Watts-Strogatz(WS) networks structure[5]. Without loss of generality, the two networks are designed with the same number of nodes NA=NB =N. Then, we coupled the two isolated networks with a certain preferences. Watts and Strogatz in their seminal paper discovered that many real-world networks are neither random nor regular but somewhere in between, and they proposed a method for constructing such networks, i.e., WS networks[5].…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hailam Kopitiam Case Study

    • 1869 Words
    • 8 Pages

    So that I can test the performance of the wireless connection and will reduce the interference on the wireless connection. This project will show how the data have been…

    • 1869 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    A traditional traffic model for circuit switched data as well as packet data is the Poisson process in which the number of incoming packets per time is according to Poisson distribution. It is one of the most widely used and oldest traffic models. In this model the length of each packet is based on exponential distribution and the number of simultaneously ongoing packets is according to Erlang distribution [16]. The Poisson process is characterized as a renewal process.…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays