[ns] Maintaining and Updating vector table

2006-01-20 Thread mahesh l


 Hello ns-users,
   I have a problem and hope somebody will help.

  Problem- I want to maintain a table (path table)
where each Node - keeps info for every other node i.e.
next hop to reach that node and the least cost.

  Now the problem is how should I create table for
each node and update these tables with other node
table.

  i.e how can I create vector table and exchange
vector information


 Thank you 

Send instant messages to your online friends http://in.messenger.yahoo.com 



[ns] NS 2.29 in X86_64 (Suse 10.0)

2006-01-20 Thread marcos


Hello,

I installed Suse Linux 10.0 (uname -a gives Linux linux
2.6.13-15.7-default #1 x86_64 x86_64 x86_64 GNU/Linux) in a Turion 64
processor.
Googling the mailing list I found some usefull tips I translated in the
patch bellow, including my own contribution.

After ./validate, I got the following:
validate overall report: some tests failed:
 ./test-all-tcpHighspeed ./test-all-srm ./test-all-smac-multihop
./test-all-hier-routing ./test-all-algo-routing ./test-all-mcast
./test-all-vc ./test-all-session ./test-all-mixmode ./test-all-red
./test-all-cbq ./test-all-webcache ./test-all-mcache ./test-all-plm
./test-all-wireless-tdma ./test-all-xcp

Maybe, the errors listed above come from my modifications. I don't know,
but the patch could help someone as a starting point.

Thanks,

Marcos

---

*diff -Naur ns-allinone-2.29-orig/install ns-allinone-2.29/install*
*--- ns-allinone-2.29-orig/install  2005-10-22 15:34:47.0 -0200*
*+++ ns-allinone-2.29/install   2006-01-20 15:56:37.0 -0200*
@@ -468,7 +468,7 @@
 blame='Please check http://www.isi.edu/nsnam/ns/ns-problems.html
 for common problems and bug fixes.'
 if  [ "${test_cygwin}" = "true" ]; then
-./configure --x-libraries=/usr/X11R6/lib
--x-includes=/usr/X11R6/include || die "otcl-$OTCLVER configuration failed!
Exiting ...";
+./configure --x-libraries=/usr/X11R6/lib64
--x-includes=/usr/X11R6/include || die "otcl-$OTCLVER configuration failed!
Exiting ...";
 else
 ./configure || die "otcl-$OTCLVER configuration failed! Exiting ...";
 fi
@@ -493,7 +493,7 @@
 cd ./tclcl-$TCLCLVER

 if  [ "${test_cygwin}" = "true" ]; then
-./configure --x-libraries=/usr/X11R6/lib
--x-includes=/usr/X11R6/include || die "tclcl-$TCLCLVER configuration failed!
Exiting ...";
+./configure --x-libraries=/usr/X11R6/lib64
--x-includes=/usr/X11R6/include || die "tclcl-$TCLCLVER configuration failed!
Exiting ...";
 else
 ./configure || die "tclcl-$TCLCLVER configuration failed! Exiting ..."
 fi
@@ -522,7 +522,7 @@
 fi

 if  [ "${test_cygwin}" = "true" ]; then
-./configure --x-libraries=/usr/X11R6/lib
--x-includes=/usr/X11R6/include || die "Ns configuration failed! Exiting ...";
+./configure --x-libraries=/usr/X11R6/lib64
--x-includes=/usr/X11R6/include || die "Ns configuration failed! Exiting ...";
 else
 ./configure || die "Ns configuration failed! Exiting ...";
 fi
@@ -547,7 +547,7 @@
 cd ./nam-$NAMVER

 if  [ "${test_cygwin}" = "true" ]; then
-./configure --x-libraries=/usr/X11R6/lib
--x-includes=/usr/X11R6/include --with-tclcl=$CUR_PATH/tclcl-$TCLCLVER  || die
"Nam configuration failed! Exiting ...";
+./configure --x-libraries=/usr/X11R6/lib64
--x-includes=/usr/X11R6/include --with-tclcl=$CUR_PATH/tclcl-$TCLCLVER  || die
"Nam configuration failed! Exiting ...";
 else
 ./configure --with-tclcl=$CUR_PATH/tclcl-$TCLCLVER  || die "Nam
configuration failed! Exiting ...";
 fi
*diff -Naur ns-allinone-2.29-orig/nam-1.11/conf/configure.in.x11
ns-allinone-2.29/nam-1.11/conf/configure.in.x11*
*--- ns-allinone-2.29-orig/nam-1.11/conf/configure.in.x11   2004-12-17
13:14:20.0 -0200*
*+++ ns-allinone-2.29/nam-1.11/conf/configure.in.x112006-01-20
15:56:37.0 -0200*
@@ -3,6 +3,7 @@

 xlibdirs="\
/usr/openwin/lib \
+   /usr/X11R6/lib64 \
/usr/X11R6/lib \
/usr/lib/X11R6 \
/usr/X11R5/lib \
*diff -Naur ns-allinone-2.29-orig/nam-1.11/config.status
ns-allinone-2.29/nam-1.11/config.status*
*--- ns-allinone-2.29-orig/nam-1.11/config.status   2005-01-24 
17:48:25.0
-0200*
*+++ ns-allinone-2.29/nam-1.11/config.status2006-01-20 15:56:37.0
-0200*
@@ -77,7 +77,7 @@
 [EMAIL PROTECTED]@%gcc%g
 [EMAIL PROTECTED]@%c++%g
 [EMAIL PROTECTED]@%%g
[EMAIL PROTECTED]@%-L/usr/X11R6/lib -lXext -lX11%g
[EMAIL PROTECTED]@%-L/usr/X11R6/lib64 -lXext -lX11%g
 [EMAIL PROTECTED]@%$(TCL_84_LIBRARY_FILES)%g
 [EMAIL PROTECTED]@%/users/haldar/tcl8.4.5/bin/tclsh8.4%g
 [EMAIL PROTECTED]@%/users/haldar/tcl8.4.5/lib/tcl8.4%g
*diff -Naur ns-allinone-2.29-orig/nam-1.11/config.sub
ns-allinone-2.29/nam-1.11/config.sub*
*--- ns-allinone-2.29-orig/nam-1.11/config.sub  2005-01-25 21:22:43.0
-0200*
*+++ ns-allinone-2.29/nam-1.11/config.sub   2006-01-20 15:56:37.0 
-0200*
@@ -267,7 +267,7 @@
| tahoe | thumb | tic4x | tic80 | tron \
| v850 | v850e \
| we32k \
-   | x86 | xscale | xstormy16 | xtensa \
+   | x86 | x86_64 | xscale | xstormy16 | xtensa \
| z8k)
basic_machine=$basic_machine-unknown
;;
@@ -1172,7 +1172,7 @@
;;
-qnx*)
case $basic_machine in
-   x86-* | i*86-*)
+   x86-* | x86_64-* | i*86-*)
;;
*)
os=-nto$os
*diff -Naur ns-allinon

[ns] kindly help me with these simulations

2006-01-20 Thread Ashutosh Srivastava


dear all ,
   
  Please go through this scenario that I am supposed to simulate (it is an 
excerpt from a paper) . I have already underlined the part I am unable to have 
under simulate .Please go through the whole mail and kindly send in your inputs 
.I have already mailed about this topic even earlier but could not get through 
,due to lack of any sort of input . 
   
  

  The DSR implementation built in to NS-2 version 2.1b9 was used as a base, and 
some slight modifications were made to simulate the sinkhole attacker node. The 
simulation environment was composed of 20 wireless nodes, each with a 
transmission radius of 250m. At the start of each simulation, the nodes were 
given random placements in a 1000m x 1000m area, and a random movement pattern 
was generated, which the nodes adhered to, using CMU’s setdest program, which 
is included with NS-2.
The program generates node movement files using the random
  waypoint algorithm, in which nodes choose a random point
  within the area boundaries, and proceed towards it at a
  randomly chosen constant velocity. When the node arrives at its
  destination, it pauses for some interval, and then repeats the
  process. Constant bit rate traffic patterns were also generated at
  the start of each simulation, using the cbrgen.tcl program that is
  included with NS-2.
  A total of 23,710 simulations were run. Of these, 19,797 of
  them were normal, cooperative DSR networks with no sinkhole
  attacker, and 3,913 of them were with a single sinkhole attacker
  identified as node 20. In the simulation, the sinkhole attacker
  ran the same DSR code as the other nodes. However, in
  addition to the normal behavior, a new behavior was triggered
  by a timer that normally goes off every 0.03 seconds to check
  the DSR send buffer – the normal purpose of this is to flush
  packets that have been queued for asynchronous transmission.
  In the case of the attacker, this timer would cause 18 bogus
  route request messages to be sent, in rapid succession, with the purpose of 
redirecting all routes leading to a particular target node, starting with node 
1. The target node would then be incremented. After the timer had fired 18 
times, the attacker would have made an effort to redirect all routes in the 
network to itself, and the target node would be reset to 1. 
   
  For these
  messages, the attacker node used sequence numbers starting at , 
incrementing the sequence number each time a message was sent.
   
   
   
   
   
   
   

   I am supposed to simulate the Sinkhole attack (made on 
Ad-Hoc Networks) . As i am quite new to  ns-2 programming I am unable to do so 
.The main problem is that how do we create routing tables for the different 
nodes in the ad-hoc network (or Mobile Network)  and then how can we 
represent the sending of information from a compromised node that it has the 
shortest route for a number of nodes . Kindly helpme 
  out as I am stuck badly here .Any sort of inputs are welcome .I am also 
including a definition of the sinkhole attacks at the bottom .

Expecting  a quick relief .
   
   
   
   
Sinkhole attacks 
  By carrying out a sinkhole attack, a compromised node tries to attract the 
data to itself from all neighboring nodes. Since this would give access to all 
data to this node, the sinkhole attack is the basis for many other attacks 
likes eavesdropping or data alteration. Sinkhole attacks make use of the 
loopholes in routing algorithms of ad hoc networks and present themselves to 
adjacent nodes as the most attractive partner in a multihop route. Even though 
by definition nodes on the network layer of an ad hoc network are equal, 
sinkhole attacks might be very effective on application level, where nodes may 
have different roles. This means, that as stated  the effect of sinkhole 
attacks on networks with centralized entities can be especially grave, because 
by impersonating the centralized node or its neighbors, the adversary can get 
access to the biggest part of the data flowing through the network.



Send instant messages to your online friends http://in.messenger.yahoo.com 


[ns] Installation issues - Qiang's 802.11 EDCF simulator

2006-01-20 Thread Marek Swierk

Hi,
During the installation of Qiang's 802.11 EDCF
simulator(ftp://ftp-sop.inria.fr/rodeo/qni/ns-edcf.tar.gz), I have following
problem (I use Red Hat 7.3) :
after "make install" command I get the following error:

tclAppInit.o: In function `Tcl_AppInit':
tclAppInit.o(.text+0x122): undefined reference to `et_ns_lib'
misc.o: In function `VersionCommand::command(int, char const *const *)':
misc.o(.VersionCommand::gnu.linkonce.t.command(int, char const
*const*)+0x8): undefined reference to `version_string'
collect2: ld returned 1 exit status
make: *** [ns] Error 1

I would be very grateful for any suggestions how to cope with this problem
and make the installation succesful.

Regards,
Marek Swierk



[ns] kindly help me with the simulation of Sinkholes Attacks (ad-hoc network) on ns-2

2006-01-20 Thread Ashutosh Srivastava



Ashutosh Srivastava <[EMAIL PROTECTED]> wrote:dear all ,
   I am supposed to simulate the Sinkhole attack (made on 
Ad-Hoc Networks) . As i am quite new to  ns-2 programming I am unable to do so 
.The main problem is that how do we create routing tables for the different 
nodes in the ad-hoc network (or Mobile Network)  and then how can we 
represent the sending of information from a compromised node that it has the 
shortest route for a number of nodes . Kindly helpme 
  out as I am stuck badly here .Any sort of inputs are welcome .I am also 
including a definition of the sinkhole attacks at the bottom .

Expecting  a quick relief .
   
   
   
   
Sinkhole attacks 
  By carrying out a sinkhole attack, a compromised node tries to attract the 
data to itself from all neighboring nodes. Since this would give access to all 
data to this node, the sinkhole attack is the basis for many other attacks 
likes eavesdropping or data alteration. Sinkhole attacks make use of the 
loopholes in routing algorithms of ad hoc networks and present themselves to 
adjacent nodes as the most attractive partner in a multihop route. Even though 
by definition nodes on the network layer of an ad hoc network are equal, 
sinkhole attacks might be very effective on application level, where nodes may 
have different roles. This means, that as stated  the effect of sinkhole 
attacks on networks with centralized entities can be especially grave, because 
by impersonating the centralized node or its neighbors, the adversary can get 
access to the biggest part of the data flowing through the network.


Send instant messages to your online friends http://in.messenger.yahoo.com 


[ns] mobile node ?

2006-01-20 Thread P.Navaratnam

Hi,

Can a single mobile node in ns 2.28 support generating several flows at the 
same time ?

For example : I want to establish 2 TCP flows and 2 TFRC flows between 'node 0' 
and 'node 3' at the same time in a multi hop wireless network ( no mobility). 
Is there any restriction in ns ? From my results I observe only one flow exists 
most of the time.


Thanks.
PBA




[ns] Regarding Queuing delay

2006-01-20 Thread Tema Teresa Johnson

Hello,
I am simulating wireless networks-single hop.I use "tracegraph" for
getting the "end to end delays".My question is,when u set the source trace
as AGT and destination trace as MAC,does the "end to end delay" include
the queuing delay at the source?
Another question is regarding an anomaly..
I am simulating a wireless environment where the nodes are arranged in a
random fashion(ie topology is random and the arrangement is made in such a
way that it satisfies the single hop condition.)The experiment is repeated
several times to get the distribution of the delay
Traffic-CBR
No.of flows-5,10,14
problem is when the rate is 400kbps the delay u get is concentrated on a
smaller value than that obtained for 200kbps.and for 100kbps u get a still
greater value than 200kbps..but the difference di Is it because the nodes
are going to saturation? The channel bit rate is 1Mbps.. So will the nodes
be in the saturation state? And will that affect the delay if so why?
If neone can explain these that will be really very helpful for me..
Thanks in advance..
Teena.





[ns] static routing in 802.15.4

2006-01-20 Thread saradellaluna

Dear all,

I am a newbie in NS2, and I am working on wireless sensors network
simulation using the 802.15.4 module developed by Zheng. The scripts that
come with the module use AODV as the routing protocol. However, I would like
to configure static routing tables for each node, so as to be able to
control the exact path followed by my packets. Can anybody give suggestions
on how to do this?

Thanks in advance!

Regards,

Sara Della Luna







[ns] R: 802.11 simulating

2006-01-20 Thread Marco Fiore

The number of transmissions is not sufficient to determine
the cause of 
such a high number of collisions. Several
other parameters are 
necessary: simulation time,
transmission range of nodes, use of 
RTS/CTS,
802.11 CWND min and max sizes, etc.

Regards,

Marco Fiore

Messaggio originale
Da: [EMAIL PROTECTED]
Data: 19-gen-2006 4.25 
PM
A: 
Ogg: [ns] 802.11 simulating


Hi all!
I´m 
simulating a sensor network, with 100 nodes in a 1000x1000 scenario,
but I´ve a terrible number of collisions:
47935 in 19905 messages 
sent...
The packet is 52 byte long.
I use the 802.11 with ns2.28
Someone have some tricks?
Or someone can help me to understand the 
reason?
Maybe I have to configure better some parameters?

Many 
thanks!!






[ns] Layer Three Handoff Detection Algorithms

2006-01-20 Thread altaf hussain

Hi all Users.
  I am new to ns and using ns2.28 in Linux RedHat 8.0 environment.
  can anyone help me to implement the layer three detection Algorithms for 
mobile IP (like lazy cell switching, eager cell switching etc) in ns 2.28.
  thanks
   


-
Yahoo! Photos – Showcase holiday pictures in hardcover
 Photo Books. You design it and we’ll bind it!