Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR
WIRELESS NETWORK BY USING NS2
NUR AZIRAH BINTI AHMAD TARMIZI
BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY)
WITH HONOURS
2019
i
DECLARATION
I hereby declare that this report is based on my original work except for quotations and
citations, which have been duly acknowledged. I also declare that it has not been previously
or concurrently submitted for any other degree at University Sultan Zainal Abidin or other
institutions.
Name: NUR AZIRAH BINTI AHMAD TARMIZI
Date: …………………………………….
ii
CONFIRMATION
This is to confirm that:
The research conducted and the writing of this report was under my supervision.
Name: DR. AZNIDA HAYATI BINTI ZAKARIA @ MOHAMAD
Date: ………………………………………
iii
DEDICATION
Praise to Allah, the Most Gracious and the Most Merciful. Alhamdulillah, for
blessing me and giving me the opportunity to go through and complete this final year project
entitled Implementation of Network Performance Analysis for Wireless Network by Using
NS2.
Firstly, my greatest appreciation to my family especially my beloved mother and
father who always gives me advices and for being supportive throughout this project. Next,
I would like to take this opportunity to express my heartiest appreciation and gratitude to
my experienced supervisor, Dr. Aznida Hayati Binti Zakaria @ Mohamad for the
encouragement, guidance, comments, motivation and also support. Without her continuous
support, this project could not be completed as presented here. Thank you.
In addition, I would like to thank the panels during my final year project, Dr. Wan
Nor Syuhadah Binti Wan Nik and Dr. Nor Aida Binti Mahiddin for all supportive words,
guidance, advices as well as fresh ideas during the development of this project until the end.
Thank you.
To Faculty of Informatics and Computing, and all lecturers in this faculty, I also
would like to thank everyone for the opportunity for me to be exposed and explore as a
degree student with this project. Last but not least, I would take this chance to thank my
fellow friends for kind and supportive words, and helping hands during the completion of
this project.
iv
ABSTRACT
Network performance analysis are significant in the network security and management.
Network performance analysis refers to the study on the events, taking place through the
network with the aim of maintaining a secure and firm network. Nowadays, the breakneck
growth of network size, resources and distances involved has gradually increase the complexity
of the network traffic and network behavior. The network management has become entangled
with the network congestion and to ensure IP network smoothly and safely operated. Hence,
this study is to propose an implementation of network performance analysis for wireless
network by using NS2. Network simulator tool are used to study the robust nature of network
by theoretically replicate an actual network on the computer to be studied, so as to have the
prior warning of failures or problems and to improve them. This simulator tool collects,
analyze, specify the network protocol and simulating the network environment to be tested.
Apart from that, this tool also conveys easy-to-understand visual analysis by utilize a trace file
to replay the network simulation using animation to get a precise analysis and network traffic
monitoring. Main contributions are to implement the system, which mainly includes network
flow collection, transmission, storage, analysis and the visual display of the network traffic.
Therefore, performance analysis is a great essential to network security.
v
ABSTRAK
Analisis prestasi rangkaian adalah penting dalam keselamatan rangkaian dan pengurusan.
Analisis prestasi rangkaian merujuk kepada kajian mengenai kejadian yang berlaku dalam
rangkaian bertujuan mengekalkan rangkaian yang selamat dan kukuh. Pada masa kini,
pertumbuhan jaringan yang pesat, sumber dan jarak rangkaian yang terlibat secara beransur-
ansur meningkatkan kerumitan lalu lintas rangkaian dan tingkah laku rangkaian. Pengurusan
rangkaian telah terikat dengan kesesakan rangkaian dan bagi memastikan rangkaian IP lancar
dan selamat dikendalikan. Oleh itu, kajian ini adalah untuk mencadangkan pelaksanaan analisis
prestasi rangkaian tanpa wayar dengan menggunakan simulator NS2. Alat simulator rangkaian
digunakan untuk mengkaji sifat rangkaian yang teguh dengan secara teori meniru rangkaian
sebenar pada komputer yang akan dikaji, bagi mendapatkan amaran atau kegagalan awal dan
memperbaikinya. Alat simulator ini mengumpul, menganalisis, menentukan protokol
rangkaian dan mensimulasikan persekitaran rangkaian untuk diuji. Selain itu, alat ini juga
menyampaikan analisis visual yang mudah difahami dengan menggunakan fail jejak untuk
memainkan semula simulasi rangkaian menggunakan animasi untuk mendapatkan analisis
yang tepat dan pemantauan trafik rangkaian. Sumbangan utama adalah untuk melaksanakan
sistem ini, yang terutama termasuk pengumpulan aliran, penghantaran, penyimpanan, analisa
dan paparan visual trafik rangkaian. Oleh itu, analisis prestasi ini adalah penting untuk
keselamatan rangkaian
vi
CONTENTS
DECLARATION ........................................................................................................................ i
CONFIRMATION ..................................................................................................................... ii
DEDICATION ......................................................................................................................... iii
ABSTRACT .............................................................................................................................. iv
ABSTRAK ................................................................................................................................. v
CONTENTS .............................................................................................................................. vi
LIST OF TABLES ................................................................................................................. viii
LIST OF FIGURES .................................................................................................................. ix
LIST OF ABBREVIATIONS .................................................................................................... x
LIST OF APPENDICES ........................................................................................................... xi
CHAPTER 1 .............................................................................................................................. 1
1.1 Background ..................................................................................................................... 1
1.2 Problem Statement .......................................................................................................... 3
1.3 Objectives ....................................................................................................................... 3
1.4 Scopes ............................................................................................................................. 3
1.5 Limitation of work .......................................................................................................... 4
1.6 Report structure ............................................................................................................... 4
vii
CHAPTER 2 .............................................................................................................................. 5
2.1 Introduction ..................................................................................................................... 5
2.2 Network........................................................................................................................... 6
2.3 Network performance analysis ....................................................................................... 6
2.4 NS2 ................................................................................................................................. 8
2.5 Linux Operating System ................................................................................................. 9
2.6 Existing System ............................................................................................................ 10
2.6 Overview of the Project and Research .......................................................................... 14
2.7 Summary ....................................................................................................................... 16
CHAPTER 3 ............................................................................................................................ 17
3.1 Introduction ................................................................................................................... 17
3.2 Framework .................................................................................................................... 18
3.3 Flowchart ...................................................................................................................... 19
3.4 Performance metrics ..................................................................................................... 21
3.5 Proof of Concept ........................................................................................................... 21
3.6 Hardware and Software requirement ............................................................................ 23
3.7 Summary ....................................................................................................................... 24
REFERENCES ........................................................................................................................ 25
viii
LIST OF TABLES
TABLE TITLE PAGE
2.1 Comparison table of project and research 14
3.1 List of hardware used 23
3.2 List of software used 23
ix
LIST OF FIGURES
FIGURE TITLE PAGE
2.1 Network Management Model 8
2.2 Architecture of NS2 9
3.1 Framework of Network performance analysis of small organization
using NS2
18
3.2 Flowchart of network performance analysis 20
3.3 Install NS2 and NAM 21
3.4 Input Tcl script in NS2 22
3.5 Install and run NAM 22
x
LIST OF ABBREVIATIONS
NS2 Network Simulation Version 2
NAM Network Animation
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
UDP User Datagram Protocol
TCP Transmission Control Protocol
FTP File Transfer Protocol
IEEE Institute of Electrical and Electronics Engineers
QoS Quality of service
CBR Constant bit rate
WSN Wireless Sensor Network
DSDV Destination-Sequenced Distance-Vector routing protocol
MANET Mobile ad hoc network
AODV Ad Hoc On-Demand Distance Vector
PLR Packet Loss Ratio
xi
LIST OF APPENDICES
APPENDIX TITLE PAGE
A Gantt Chart (FYP 1) 28
1
CHAPTER 1
INTRODUCTION
1.1 Background
In this golden era of technology, the Internet has become a major part of life and people
have an increasing reliance on the Internet to carry out task in daily life. The Internet can be
defined as a massive network of networks. Network is a collection of computers and other
devices that can send and receive data from one to another, more or less in real time (Elliotte
Rusty Harold, 2013). Besides, the Internet plays a significant role as one of the most effective
and efficient medium of communication between one individual to another individual in the
world. During this dynamic technological revolution, the Internet also plays a very vital role
as a resource of education and learning. With that being said, network usage is increasing
dynamically from time to time with an application that user can use for access. A good
management of network are necessary for smooth and efficient use as the future of Network
management is becoming more challenging every second.
Network management and security are among the most significant and exciting
technological innovations that have taken place in the last few decades. While the exact pattern
of future network development cannot be predicted, their development will continue, and they
will have a decisive impact on important walks of life such as business, government, sciences,
industry, the arts and entertainment. In particular, computer networks underpin almost every
aspect of corporate communications; it is important that they are appropriately designed,
operate at their optimal efficiency, and are secure.
Next, network monitoring is an oversight of a computer network using specialized
management software tools to ensure the availability and overall performance of computers
2
and network services. The tool let admins monitor access, routers, slow or failing components,
firewalls, core switches, client systems, and server performance among other network data.
The International Organization for Standards (ISO) has created a network management model
which is the areas of network management such as performance management and analysis,
fault management, configuration management, accounting management and security
management (James F. Kurose, Keith W. Ross., 1999).
Therefore, in this project, the implementation of performance analysis for wireless
network was studied and focused purposefully narrow for small organization with application
of Network Simulation Version 2 (NS2). According to Michael E. Whitman in Management
of Information Security Third Edition, small organization have 10 to 100 computers and have
little in the way of formal policy, planning, or security measures. NS2 is an open-source event-
driven simulator designed specifically for research in computer communication networks. This
tool imitates the working of a computer network where in simulators, the computer network is
typically modeled with devices and traffic and the performance is analyzed. NS2 come with
support for the protocols in use today, such as IPv4, IPv6, UDP, and TCP. It is an important
foundation for network traffic feature summary, network security assessment, anomalous
behavior analysis, intrusion detection and protection.
3
1.2 Problem Statement
Problem statement of this project are:
i. The breakneck growth of network size, resources and distances involved has gradually
increase the complexity of the network traffic and network behavior.
ii. The network management become entangled with the network congestion and to ensure
IP network smoothly and safely operated.
iii. All communication network is exposed to challenges such as natural disaster, attack
and human mistake.
iv. Not all small organization has a professional and experts to provide this ability.
1.3 Objectives
There are three main objectives to develop this project include:
i. To study the simulation model to monitor the network performance for wireless
network in small organization.
ii. To design the simulation model that can analyze the behavior of existing and proposed
for wireless network in small organization under different scenario.
iii. To implement the simulation model that can act as framework to simulate challenges
such as natural disaster, attack and human mistake and the corresponding effects of the
network under the induced challenge.
1.4 Scopes
This propose study involve two parties which are administrator and system.
1.4.1 Scope of user
Administrator can monitor the traffic of network through performance management in
term of the capacity, traffic, throughput and response time by using the simulation.
4
1.4.2 Scope of system
Configuration of NS2 tool can manage the performance of network by quantify,
measure, report, analyze and control performance.
1.5 Limitation of work
There is some limitation in this project which is:
i. This simulation work on a limited operating system such as Linux, UNIX and a few
older versions of Windows (XP, Vista). In this project, Ubuntu OS is used with Linux-
based.
ii. This simulation dependant to internet connection to be monitor in real-time mode only.
1.6 Report structure
This thesis consists of five chapters. The first chapter focuses on the project background,
problem statements, objectives, scopes of project and limitation of work. Chapter two is a
review of all related study regarding to this project. In chapter three, the methodology was
discussed including the methods and techniques used for the development of this project. In
this chapter, the expected results also were discussed through the data model and design. In the
fourth chapter, implementation and testing processes that has been run in this project were
explained in detail. In the last chapter, conclusion and final results are presented.
5
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
Before the implementation of the proposed project, a sufficient research on the
published literature related to this topic has been done. In this chapter, the summarization of
literature reviews related to this project was discussed. The literature review is a text of a trusted
paper such as journal, article and book that include current knowledge about theoretical and
methodological contribution. Main purpose of the literature review is to identify research
methods and strategies that should be apply in this project. The information from these previous
studies and research will be discussed in this chapter. Therefore, the literature review is carried
out to be used as references and as an inspiration in developing the proposed simulation.
There are two main fields that have been investigated in this part which are useful for
the implementation of the proposed project. The main areas are to study the Network and
Network Performance Analysis. The purpose of the research will be defined and the concepts
which have been helpful in understanding technologies used in development of proposed
application, have been collected.
In order to find a problem and disconnections in the network for any organizations that
may disturbing the performance of network, an appropriate administration and management
will be performed. This administration of network will capture the whole performance of the
network and maintain any possible connections. If any failure happens in the network, an
urgent monitoring and maintaining will be needed.
6
2.2 Network
A network is the interconnection of a set of devices capable of communication (Behrouz
A. Forouzan, 2012). Based on this definition from Data Communication and Networking Fifth
Edition book, the computers, servers, mainframes, network devices, peripherals, or other
devices connected to one another to permit the transmission of data and information. The
evolution of network through the years have been changed from a simple connection between
a few computers to a connection of computers in many networks. An amazing example of a
network is the Internet, which connects millions of individuals all over the world. This dynamic
change of complex network demanding for having a rich of performance analysis and
management. The connections can be established through wired and wireless. Wired
connection requires a copper wire or fibre optic cable as a transmission medium to allow data
sending and receiving. For wireless transmission, data signal travels through electromagnetic
waves. In this project, a wireless network was used as a traffic scenario to be administer and
analyse.
The IEEE 802.11 standards specify two operating modes which is infrastructure mode
and ad hoc mode. Infrastructure mode is used to connect computers with wireless network
adapters, also known as wireless clients, to an existing wired network with the help from
wireless router or access point. Ad hoc mode is used to connect wireless clients directly
together, without the need for a wireless router or access point. An ad hoc network consists of
up to 9 wireless clients, which send their data directly to each other.
2.3 Network performance analysis
In this part, some previous proposed model for performance analysis will be discussed.
Network performance can be defined as the overall quality of service (QoS) provided by a
network while the network performance analysis is a complete set of processes and tools that
can be used to quantitatively and qualitatively analyse network performance. Basically, it is
7
the use of network data to unpack performance trends. By conducting a performance analysis,
we can understand why the network is performing the way it is. The network performance can
be analysed by measuring a few parameters such as bandwidth usage, throughput, latency and
jitter.
Bandwidth can be defined as arrange of frequencies that can be transmitted by a
particular system or medium (Jorge L. Olenewa,2012). Throughput is the rate of data that can
be transferred from one place to another in a period of time. Next, latency is the delay between
the sender and the receiver decoding it, this is mainly a function of the signals travel time, and
processing time at any nodes the information traverses while jitter is variation in packet delay
at the receiving end of the information. Each of these types of parameters behaves differently
on different conditions of the network. Hence the performance analysis is a must task to know
its behaviour and work in that environment accordingly. The factors like node mobility,
network size, control overhead and traffic intensity along with inherent characteristics of
networks may result in unpredictable variations in the overall network performance.
In the previous project, Morris Sloman have proposed a new model for network
monitoring which modifies the event management. In the mentioned model, event and status
have been produced for the administrator to be able to analyse the network performance. Figure
2.1, presents the design of the proposed network.
8
Figure 2.1: Network Management Model
2.4 NS2
NS-2 is an open source network simulator which runs on different platforms that are UNIX (or
Linux), Windows, and Mac systems. NS-2 is widely exploited to simulate the various network
components and protocols such as routing, TCP, UDP, FTP and traffic sources like CBR over
wired and wireless networks. Principally, NS2 provides a way to specify such network
protocols, and also simulate their corresponding behaviours. Owing to its flexibility and
modular nature, the NS-2 has gained profound admiration in the networking research
community areas. The most recent version of NS-2 is NS-2.35.
NS-2 simulator facilitates integration of the different types of technologies and tools.
NS-2 is implemented using both the oTCL (object Tool Command Language) and C++
languages. It exploits TCL/C++ interface, called as TclCl to allow interaction between the
oTCL and C++. By Employing NS-2 simulator the AWK script can be exploited to process the
trace files. The Ns-2 simulator incorporates diverse tools such as Network Animator (NAM)
and X-Graph. The architecture of NS2 are as shown in Figure 2.2.
9
Figure 2.2: Architecture of NS2
2.5 Linux Operating System
Linux is an open source operating system that is distributed by Red Hat Enterprise
under GNU General Public Licence. This operating system gives freedom to user to run the
program for any purpose, to study how the program works, and change it to make it do what
you wish. It also allows the redistribution of copies or distribute copies of own modified
versions to others. The advantage is security characteristic of Linux much stronger than
Windows (Nandhini, U., Nivetha, B. and Shobana, D., 2016). Moreover, this operating system
is more powerful and unique compared with other operating system such as Windows and
Macintosh (Hussain A. Alhassan and Dr Christian Bach, 2014). Linux is user-friendly when it
comes to application codes writing through an accessing network which make it suit this project.
NS2 are the most compatible in Ubuntu Linux operating system. Ubuntu consist of two
different versions which is the server and desktop. Desktop version are mostly used in this
project since it has better performer for network performance analysis.
10
2.6 Existing System
In this part of the chapter, the previously researches to the proposed network performance
analysis was studied and will be discussed. For every mentioned paper, some explanations
along with its advantages and disadvantages will be discussed in order to providing some
familiarities and understanding regarding these previous studies.
2.5.1 Design and Simulation of Wireless Sensor Network in NS2
This paper presented a study of how to design and implement Wireless Sensor Network
(WSN) in NS2. WSN consists of spatially distributed autonomous sensors to monitor physical
or environmental conditions such as temperature, sound, vibration, pressure and humidity. The
capabilities of sensor nodes in WSN are so wide and can be different as the simple sensor nodes
may monitor a single physical phenomenon while more complicated devices might combine
many different sensing techniques. The diversity of application in WSN makes it important for
the simulation to study the dynamic nature of this network. NS2 were used in this research
paper by implementing the sensing and tracing techniques on 20 nodes with DSDV routing
protocol. Sensing technique was used to gather information about a physical object or process,
including the occurrence of events. Tracing is done to capture all packets that are receive,
dropped and sent in the network. The advantage of this study is the nature and variety behaviour
of WSN can be study and analysed as the calculation of average end-to-end delay and total
energy consumed was recorded. However, this study is complicated to any novice and students
since the information recorded was not represented with any visual representation. Thus, it is
hard for nonprofessional to understand and conduct this project.
11
2.5.2 Application and Performance Analysis of DSDV Routing Protocol in Ad-Hoc
Wireless Sensor Network with Help of NS2 Knowledge
The purpose of this paper is to evaluate performance of DSDV routing protocol in wireless
sensor network (WSN) scales regarding the End-to-End delay and throughput PDR with
mobility factor. Routing protocols are a critical aspect to performance in mobile wireless
networks and play crucial role in determining network performance in terms of packet delivery
fraction, end-to-end delay and packet loss. Destination-sequenced distance vector (DSDV)
protocol is a proactive protocol depending n routing tables which are maintained at each node.
The routing protocol should detect and maintain optimal route(s) between source and
destination nodes. In this paper, they presented the application of DSDV in WSN as extend to
their previous study to the design and implementation the details of the DSDV routing protocol
in MANET using the NS2 network simulator.
2.5.3 Performance Analysis of Wired, Wireless and Optical Network using NS2
In this paper, wired, wireless and optical networks have been analysed and implemented using
network simulator tool NS2. A systematic simulation-based performance analysis of wired,
wireless and optical networks using distance vector routing protocol has been carried out.
Analysis of the performance of these networks on the basis of three metrics which are the
Packet delivery ratio, end to end delay, throughput using NS2 simulation has been undertaken.
2.5.4 Simulation Analysis of Routing Protocols in Hybrid wireless network
In this paper, a simulation Analysis of Routing Protocols in Hybrid wireless network
was carried out. A wireless hybrid network which are the integration of wireless ad hoc network
and wireless infrastructure network is recognized as superior option for next generation
12
wireless networks. Such network focuses to support of continuous transmission with strong
Quality of Service (QoS). In hybrid networks, the way to guarantee quality of service (QoS)
remains a hot problem, where it is observed that due to the direct adoption of QoS based
reservation resource routing for MANET, hybrid networks inherit problems of resource
reservation and invalid racing conditions. The article presents the working of two Ad-Hoc
routing protocols (DSDV and AODV+) in hybrid systems in relation with different network
complexities. It is observed that both protocols performed indistinguishably to the extent of the
throughput. For jitter, PLR and PDR, the AODV+ performed superior to DSDV; except for the
intricacy situation of system, while DSDV performed ineffectively.
2.5.5 Performance Analysis of UDP Based on Traffic Classifier Using NS2
In this research paper, Prof. R. Praveen Kumar et al has found that UDP offer a minimal,
unreliable, best-effort and message-passing transport to applications. Hence, a further
examination of its performance was performed using NS2 on aspects related to traffic size and
traffic load and traffic classification. By utilizing UDP for network connection based on the
header format, the retransmission difficulties double retransmit as compared to transmission
control protocol (TCP). A connection transferred within the network is not TCP within TCP,
but rather TCP within UDP. UDP does not support any retransmission components, so it is
going to only function as the forwarded TCP connection which will do retransmissions. An
additional gain from using UDP would be the smaller header dimensions. UDP features a
header dimension of 8 bytes when TCP employ a header dimension of 20 bytes. This may leave
space for bandwidth improvement within the network channel.
To address the issues of packet delay and unfairness among multimedia UDP flows,
this paper presents the design and evaluation of network models to study different parameters
13
for quality-of-service (QoS) provisioning in differentiated service (DiffServ) routers using user
datagram protocol (UDP) as network traffic agent and constant bit rate (CBR) as traffic
generator. Traffic marker algorithms are used to define the treatment an incoming traffic
(packet streams) receives at the edge routers in a DiffServ domain.
14
2.6 Overview of the Project and Research
Table 2.1: Comparison table of project and research
Author/Year Project Name Tools Routing protocol/algorithm Disadvantages
Genita G. and
Biswaraj S.
(2015)
Design and Simulation
of Wireless Sensor
Network in NS2
NS2 DSDV routing protocol The calculation of average energy
consumption and average end-to-end delay
was not represented with any visual
representation. Thus, it is hard for
nonprofessional to understand and conduct
this project.
Mohammed Zaid
Ghawy and Dr. Maher
Ali Al – Sanabani
(2017)
Application and
Performance Analysis
of DSDV Routing
Protocol in Ad-Hoc
Wireless Sensor
Network with Help of
NS2 Knowledge
NS2 DSDV routing protocol Many packets dropped occur because IEEE
802.15.4 not enabled large packets
transmission as the routing protocol DSDV
cause full dump packets to routes update,
15
Jyoti and Himanshi
Saini
(2017)
Performance Analysis
of Wired, Wireless and
Optical Network using
NS2
NS2 DSDV routing protocol Parameter tested and compared for each
network is limited and need to be done for
a large range of applications in different
scenarios.
K. H. Mohammadani,
S. Abbasi, N. A.
Memon, Z. A. Bhutto,
I. R. Memon
(2018)
Simulation Analysis of
Routing Protocols in
Hybrid wireless
network
NS2 DSDV and AODV+ routing
protocol
There is no selection of homogenous
routing protocols and heterogeneous
routing protocols for hybrid network.
Prof.R.Praveen
Kumar, Amal
Mohanan,
C.Madhumithra,
R.Kumar
(2019)
Performance Analysis
of UDP Based on
Traffic Classifier Using
NS2
NS2 AOMDV AOMDV has more message overheads
during route discovery due to increased
flooding and since it is a multipath routing
protocol, the destination replies to the
multiple RREQs those results are in longer
overhead.
16
2.7 Summary
This chapter provides an overview related to the concept of the existing system.
Literature review helps in determining whether the technology has been studied before or not.
The various approach and techniques used helps in generate a better of project research in the
future. The research in this literature review is done to avoid identical production of idea.
17
CHAPTER 3
METHODOLOGY
3.1 Introduction
This chapter reports the approach or model development and application of a
comprehensive framework taken in the development of project, application or implementation
of the study. Methodology is a systematic way to solve the research problem by applying
technique, algorithm or method. This chapter contains specific procedures or techniques used
to identify, select, process, and analyze information about network performance analysis in
small organization by using NS2. The selection of the most suitable as suitable methodology
for methodology is chaotic enough because the project might not complete on the right
schedule or the project might completely fail because the developer might be lost guidance in
order to complete the project development. All the phases involved during this project will be
detailed.
According to the project, methodology shown in this chapter are the flowchart and
framework that was build referring to the objectives stated in 1.3. Firstly, to study the
simulation to monitor the network performance for DSDV routing protocol in small
organization. Secondly, to design the simulation that can analyze the behavior of existing and
proposed network for DSDV routing protocol in small organization under different scenario.
Lastly, to implement the simulation that can act as framework to simulate challenges such as
natural disaster, attack and human mistake and the corresponding effects of the network under
the induced challenge. This project will be focused on network performance analysis.
18
3.2 Framework
This part will be discussed and focused on simulation of framework. Simulation is the operation
of modelling a process or system from the real-world situation over a period of time. Thus, in
this project, network for small organization was simulate and can be shown in Figure 3.1.
Figure 3.1: Framework of Network performance analysis of small organization using NS2
Figure 3.1 shows the framework of this project. Firstly, a network for network traffic that suit
for small organization are modelled and was scripted with Tcl script. Next, a network
simulation model was develop using NS2. The simulation was tested and evaluate to see if the
user is satisfied enough with the performance analyse from the simulation. If the user is
satisfied, a result and discussion can be done. If not, a communication session needed to make
an improvement in the network model. The simulation can be done again until the user are
satisfied with the performance analyse in this project.
Model a network
traffic of small
organization
Develop network
simulation model
using NS2
Test and evaluate
the simulation
Satisfy? Communicate
Result and
discussion
Network performance analysis of small organization using NS2
No
Yes
19
3.3 Flowchart
Flowchart is a type of diagram that represents a workflow or process. In this part,
flowchart can also be defined as a diagrammatic representation of an algorithm, a step-by-step
approach in network performance analysis in small organization by using NS2.
Figure 3.1 shows the flowchart for network performance analysis in small organization
using NS2. This simulation involved user as the client and the NS2 server itself. In this project,
NS2 and NAM was installed in Ubuntu Linux operating system before start the simulation.
Firstly, after the installation complete, Tcl script was uploaded to be read and simulate in NS2.
The Tcl script uploaded was edited according to the requirement of the network to be tested.
Secondly, the Tcl script will be executed and network was scanned in NS2. Thirdly, a trace file
will be automatically saved as the output after being simulated in NS2. Next, the NAM will
present a visual simulation of traffic in the network tested. After that, the trace file produced
was analyse in an analyser such as Perl. Then, the analysed result was output to be studied and
a graph was plotted from the result. Lastly, the evaluation of result from simulation was done
by the user and to decide if the user is satisfied with the current network performance analysis.
If the user is satisfied, the final report can be written. If not, the work will be repeat by input
the modified Tcl script for improvement of network performance until the user is satisfied.
20
Figure 3.2: Flowchart of network performance analysis
21
3.4 Performance metrics
The performance metrics used in this proposed project are as follows:
1. Average Throughput: It is the measure of total information conveyed in a unit of time
(Nayak and Sinha, 2016).
2. Latency: It is the normal time a packet takes to achieve the goal (Marcotte and Olson, 2016).
3. Jitter: The difference in packet delay time known jitter. It is occurred due to network
congestion, an unexpected changing in network topology or link break (Kumar, et al., 2017).
4. Packet delivery ratio: It is the percentage of application layer packets successfully received
to the aggregate sent (Chaubey et al. 2015).
3.5 Proof of Concept
Figure 3.3: Install NS2 and NAM
22
Figure 3.4: Input Tcl script in NS2
Figure 3.5: Install and run NAM
23
3.6 Hardware and Software requirement
Hardware and software are important things to ensure the successful of this project. Thus, these
hardware and software has its own role and function in the completion of each steps. The details
on hardware and software are as shown in Table 3.1 and 3.2 below.
Hardware Description
Laptop Processor: Intel® Core™ i5-6200U CPU @ 2.30 GHz
RAM: 8 GB
Operating system: Ubuntu 16.04
Table 3.1: List of hardware used
Software Description
Ubuntu 16.04 Main used operating system and act as server
Windows 2010 Second used operating system for documentation of report
NS2 Simulation used to simulate network tested
NAM An animation tool which is employed to view the network
simulation trace data. It supports topology layout, level packet
animation, and various data inspection tools.
Perl Analyser of trace file produced by NS2
XGraph, MATLAB Plot graph for better understanding and pattern observation in
performance analysis
Microsoft Office 2016 Platform for documentation and presentation slides
Google Chrome and
Mozilla Firefox
Browser to run system and do research and related studies about
project
Table 3.2: List of software used
24
3.7 Summary
In this chapter, the methodology of this project is explained. The flow of this project is being
shown in the framework and detailed view of how the whole system works is display on the
data model. Therefore, the requirements of the project are being shown in perfect order and can
carry out the minimum error.
25
REFERENCES
1. Elliotte R. H., (2013), Java Network Programming Fourth Edition. pp.26.
2. James F. K. and Keith W. R., (1999), Computer Networking Sixth Edition. pp. 52.
3. Behrouz A. F., (2012), Data Communication and Networking Fifth Edition. pp. 7-17.
4. Jorge L. O., (2012). Guide to Wireless Communication Third Edition. pp. 18-56.
5. Whitman, M. E. and Mattord, H. J. (2010). Management of Information Security Third
Edition. pp. 171.
6. Sloman, M. (ed.), (1994), Networks and Distributed Systems Management, Addison
Wesley Longman Publishing Co., Inc., Boston, MA, USA.
7. Nandhini, U., Nivetha, B. and Shobana, D. (2016). An Analysis of Linux Operating System.
International Journal of Trend in Research and Development, Volume 3(1), ISSN:2394-
9333.
8. Hussain A. A. and Dr. Christian Bach. (2014). Operating System and Decision Making.
ASEE 2014 Zone I Conference. pp. 80-85.
9. Genita G. and Biswaraj Sen, (2015), “Design and Simulation of Wireless Sensor Network
in NS2”, International Journal of Computer Applications (0975 – 8887), Volume 113 No.
16.
10. Nayak, P. and P. Sinha, (2016). “Analysis of Random Way Point and Random Walk
Mobility Model for Reactive Routing Protocols for MANET Using Netsim Simulator.”
Proceedings - AIMS 2015, 3rd International Conference on Artificial Intelligence,
Modelling and Simulation 427–32.
11. Marcotte, R. J. and E. Olson, (2016). “Adaptive Forward Error Correction with
Adjustable-Latency QoS for Robotic Networks.” Proceedings - IEEE International
Conference on Robotics and Automation 2016–June:5283–88.
26
12. Kumar, S., G. S. Agrawal, and S. K. Sharma, (2017). “Impact of Mobility on MANETs
Routing Protocols Using Group Mobility Model.” International Journal of Wireless and
Microwave Technologies 7(2):1–12. Retrieved (http://www.mecs-press.org/ijwmt/ijwmt-
v7-n2/v7n2-1.html).
13. Chaubey, N., A. Aggarwal, S. Gandhi, and K. A. Jani. (2015). “Performance Analysis of
TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying
Network Size.” International Conference on Advanced Computing and Communication
Technologies, ACCT 2015:320–24.
27
APPENDIX
28
Gantt Chart (FYP 1)
Activity/Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
1. FYP briefing by KPP
2. Discussion and selection of the proposal topic
3. Project title proposal
4. Details on project background, problem statement, objectives,
scope and limitation
5. Detail on Literature Review
6. Proposal progress presentation and panel’s evaluation
7. Correction on proposal
8. Framework discussion
9. Configuration of NS2
10. Draft proposal submission
11. Correction on proposal
12. Discussion and preparation of project presentation
13. Conference of project presentation
14. Final presentation and panel’s evaluation
15. Final report submission and supervisor’s evaluation