40
IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR WIRELESS NETWORK BY USING NS2 NUR AZIRAH BINTI AHMAD TARMIZI BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY) WITH HONOURS 2019

IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR

WIRELESS NETWORK BY USING NS2

NUR AZIRAH BINTI AHMAD TARMIZI

BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY)

WITH HONOURS

2019

Page 2: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

i

DECLARATION

I hereby declare that this report is based on my original work except for quotations and

citations, which have been duly acknowledged. I also declare that it has not been previously

or concurrently submitted for any other degree at University Sultan Zainal Abidin or other

institutions.

Name: NUR AZIRAH BINTI AHMAD TARMIZI

Date: …………………………………….

Page 3: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

ii

CONFIRMATION

This is to confirm that:

The research conducted and the writing of this report was under my supervision.

Name: DR. AZNIDA HAYATI BINTI ZAKARIA @ MOHAMAD

Date: ………………………………………

Page 4: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

iii

DEDICATION

Praise to Allah, the Most Gracious and the Most Merciful. Alhamdulillah, for

blessing me and giving me the opportunity to go through and complete this final year project

entitled Implementation of Network Performance Analysis for Wireless Network by Using

NS2.

Firstly, my greatest appreciation to my family especially my beloved mother and

father who always gives me advices and for being supportive throughout this project. Next,

I would like to take this opportunity to express my heartiest appreciation and gratitude to

my experienced supervisor, Dr. Aznida Hayati Binti Zakaria @ Mohamad for the

encouragement, guidance, comments, motivation and also support. Without her continuous

support, this project could not be completed as presented here. Thank you.

In addition, I would like to thank the panels during my final year project, Dr. Wan

Nor Syuhadah Binti Wan Nik and Dr. Nor Aida Binti Mahiddin for all supportive words,

guidance, advices as well as fresh ideas during the development of this project until the end.

Thank you.

To Faculty of Informatics and Computing, and all lecturers in this faculty, I also

would like to thank everyone for the opportunity for me to be exposed and explore as a

degree student with this project. Last but not least, I would take this chance to thank my

fellow friends for kind and supportive words, and helping hands during the completion of

this project.

Page 5: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

iv

ABSTRACT

Network performance analysis are significant in the network security and management.

Network performance analysis refers to the study on the events, taking place through the

network with the aim of maintaining a secure and firm network. Nowadays, the breakneck

growth of network size, resources and distances involved has gradually increase the complexity

of the network traffic and network behavior. The network management has become entangled

with the network congestion and to ensure IP network smoothly and safely operated. Hence,

this study is to propose an implementation of network performance analysis for wireless

network by using NS2. Network simulator tool are used to study the robust nature of network

by theoretically replicate an actual network on the computer to be studied, so as to have the

prior warning of failures or problems and to improve them. This simulator tool collects,

analyze, specify the network protocol and simulating the network environment to be tested.

Apart from that, this tool also conveys easy-to-understand visual analysis by utilize a trace file

to replay the network simulation using animation to get a precise analysis and network traffic

monitoring. Main contributions are to implement the system, which mainly includes network

flow collection, transmission, storage, analysis and the visual display of the network traffic.

Therefore, performance analysis is a great essential to network security.

Page 6: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

v

ABSTRAK

Analisis prestasi rangkaian adalah penting dalam keselamatan rangkaian dan pengurusan.

Analisis prestasi rangkaian merujuk kepada kajian mengenai kejadian yang berlaku dalam

rangkaian bertujuan mengekalkan rangkaian yang selamat dan kukuh. Pada masa kini,

pertumbuhan jaringan yang pesat, sumber dan jarak rangkaian yang terlibat secara beransur-

ansur meningkatkan kerumitan lalu lintas rangkaian dan tingkah laku rangkaian. Pengurusan

rangkaian telah terikat dengan kesesakan rangkaian dan bagi memastikan rangkaian IP lancar

dan selamat dikendalikan. Oleh itu, kajian ini adalah untuk mencadangkan pelaksanaan analisis

prestasi rangkaian tanpa wayar dengan menggunakan simulator NS2. Alat simulator rangkaian

digunakan untuk mengkaji sifat rangkaian yang teguh dengan secara teori meniru rangkaian

sebenar pada komputer yang akan dikaji, bagi mendapatkan amaran atau kegagalan awal dan

memperbaikinya. Alat simulator ini mengumpul, menganalisis, menentukan protokol

rangkaian dan mensimulasikan persekitaran rangkaian untuk diuji. Selain itu, alat ini juga

menyampaikan analisis visual yang mudah difahami dengan menggunakan fail jejak untuk

memainkan semula simulasi rangkaian menggunakan animasi untuk mendapatkan analisis

yang tepat dan pemantauan trafik rangkaian. Sumbangan utama adalah untuk melaksanakan

sistem ini, yang terutama termasuk pengumpulan aliran, penghantaran, penyimpanan, analisa

dan paparan visual trafik rangkaian. Oleh itu, analisis prestasi ini adalah penting untuk

keselamatan rangkaian

Page 7: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

vi

CONTENTS

DECLARATION ........................................................................................................................ i

CONFIRMATION ..................................................................................................................... ii

DEDICATION ......................................................................................................................... iii

ABSTRACT .............................................................................................................................. iv

ABSTRAK ................................................................................................................................. v

CONTENTS .............................................................................................................................. vi

LIST OF TABLES ................................................................................................................. viii

LIST OF FIGURES .................................................................................................................. ix

LIST OF ABBREVIATIONS .................................................................................................... x

LIST OF APPENDICES ........................................................................................................... xi

CHAPTER 1 .............................................................................................................................. 1

1.1 Background ..................................................................................................................... 1

1.2 Problem Statement .......................................................................................................... 3

1.3 Objectives ....................................................................................................................... 3

1.4 Scopes ............................................................................................................................. 3

1.5 Limitation of work .......................................................................................................... 4

1.6 Report structure ............................................................................................................... 4

Page 8: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

vii

CHAPTER 2 .............................................................................................................................. 5

2.1 Introduction ..................................................................................................................... 5

2.2 Network........................................................................................................................... 6

2.3 Network performance analysis ....................................................................................... 6

2.4 NS2 ................................................................................................................................. 8

2.5 Linux Operating System ................................................................................................. 9

2.6 Existing System ............................................................................................................ 10

2.6 Overview of the Project and Research .......................................................................... 14

2.7 Summary ....................................................................................................................... 16

CHAPTER 3 ............................................................................................................................ 17

3.1 Introduction ................................................................................................................... 17

3.2 Framework .................................................................................................................... 18

3.3 Flowchart ...................................................................................................................... 19

3.4 Performance metrics ..................................................................................................... 21

3.5 Proof of Concept ........................................................................................................... 21

3.6 Hardware and Software requirement ............................................................................ 23

3.7 Summary ....................................................................................................................... 24

REFERENCES ........................................................................................................................ 25

Page 9: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

viii

LIST OF TABLES

TABLE TITLE PAGE

2.1 Comparison table of project and research 14

3.1 List of hardware used 23

3.2 List of software used 23

Page 10: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

ix

LIST OF FIGURES

FIGURE TITLE PAGE

2.1 Network Management Model 8

2.2 Architecture of NS2 9

3.1 Framework of Network performance analysis of small organization

using NS2

18

3.2 Flowchart of network performance analysis 20

3.3 Install NS2 and NAM 21

3.4 Input Tcl script in NS2 22

3.5 Install and run NAM 22

Page 11: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

x

LIST OF ABBREVIATIONS

NS2 Network Simulation Version 2

NAM Network Animation

IPv4 Internet Protocol version 4

IPv6 Internet Protocol version 6

UDP User Datagram Protocol

TCP Transmission Control Protocol

FTP File Transfer Protocol

IEEE Institute of Electrical and Electronics Engineers

QoS Quality of service

CBR Constant bit rate

WSN Wireless Sensor Network

DSDV Destination-Sequenced Distance-Vector routing protocol

MANET Mobile ad hoc network

AODV Ad Hoc On-Demand Distance Vector

PLR Packet Loss Ratio

Page 12: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

xi

LIST OF APPENDICES

APPENDIX TITLE PAGE

A Gantt Chart (FYP 1) 28

Page 13: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

1

CHAPTER 1

INTRODUCTION

1.1 Background

In this golden era of technology, the Internet has become a major part of life and people

have an increasing reliance on the Internet to carry out task in daily life. The Internet can be

defined as a massive network of networks. Network is a collection of computers and other

devices that can send and receive data from one to another, more or less in real time (Elliotte

Rusty Harold, 2013). Besides, the Internet plays a significant role as one of the most effective

and efficient medium of communication between one individual to another individual in the

world. During this dynamic technological revolution, the Internet also plays a very vital role

as a resource of education and learning. With that being said, network usage is increasing

dynamically from time to time with an application that user can use for access. A good

management of network are necessary for smooth and efficient use as the future of Network

management is becoming more challenging every second.

Network management and security are among the most significant and exciting

technological innovations that have taken place in the last few decades. While the exact pattern

of future network development cannot be predicted, their development will continue, and they

will have a decisive impact on important walks of life such as business, government, sciences,

industry, the arts and entertainment. In particular, computer networks underpin almost every

aspect of corporate communications; it is important that they are appropriately designed,

operate at their optimal efficiency, and are secure.

Next, network monitoring is an oversight of a computer network using specialized

management software tools to ensure the availability and overall performance of computers

Page 14: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

2

and network services. The tool let admins monitor access, routers, slow or failing components,

firewalls, core switches, client systems, and server performance among other network data.

The International Organization for Standards (ISO) has created a network management model

which is the areas of network management such as performance management and analysis,

fault management, configuration management, accounting management and security

management (James F. Kurose, Keith W. Ross., 1999).

Therefore, in this project, the implementation of performance analysis for wireless

network was studied and focused purposefully narrow for small organization with application

of Network Simulation Version 2 (NS2). According to Michael E. Whitman in Management

of Information Security Third Edition, small organization have 10 to 100 computers and have

little in the way of formal policy, planning, or security measures. NS2 is an open-source event-

driven simulator designed specifically for research in computer communication networks. This

tool imitates the working of a computer network where in simulators, the computer network is

typically modeled with devices and traffic and the performance is analyzed. NS2 come with

support for the protocols in use today, such as IPv4, IPv6, UDP, and TCP. It is an important

foundation for network traffic feature summary, network security assessment, anomalous

behavior analysis, intrusion detection and protection.

Page 15: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

3

1.2 Problem Statement

Problem statement of this project are:

i. The breakneck growth of network size, resources and distances involved has gradually

increase the complexity of the network traffic and network behavior.

ii. The network management become entangled with the network congestion and to ensure

IP network smoothly and safely operated.

iii. All communication network is exposed to challenges such as natural disaster, attack

and human mistake.

iv. Not all small organization has a professional and experts to provide this ability.

1.3 Objectives

There are three main objectives to develop this project include:

i. To study the simulation model to monitor the network performance for wireless

network in small organization.

ii. To design the simulation model that can analyze the behavior of existing and proposed

for wireless network in small organization under different scenario.

iii. To implement the simulation model that can act as framework to simulate challenges

such as natural disaster, attack and human mistake and the corresponding effects of the

network under the induced challenge.

1.4 Scopes

This propose study involve two parties which are administrator and system.

1.4.1 Scope of user

Administrator can monitor the traffic of network through performance management in

term of the capacity, traffic, throughput and response time by using the simulation.

Page 16: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

4

1.4.2 Scope of system

Configuration of NS2 tool can manage the performance of network by quantify,

measure, report, analyze and control performance.

1.5 Limitation of work

There is some limitation in this project which is:

i. This simulation work on a limited operating system such as Linux, UNIX and a few

older versions of Windows (XP, Vista). In this project, Ubuntu OS is used with Linux-

based.

ii. This simulation dependant to internet connection to be monitor in real-time mode only.

1.6 Report structure

This thesis consists of five chapters. The first chapter focuses on the project background,

problem statements, objectives, scopes of project and limitation of work. Chapter two is a

review of all related study regarding to this project. In chapter three, the methodology was

discussed including the methods and techniques used for the development of this project. In

this chapter, the expected results also were discussed through the data model and design. In the

fourth chapter, implementation and testing processes that has been run in this project were

explained in detail. In the last chapter, conclusion and final results are presented.

Page 17: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

5

CHAPTER 2

LITERATURE REVIEW

2.1 Introduction

Before the implementation of the proposed project, a sufficient research on the

published literature related to this topic has been done. In this chapter, the summarization of

literature reviews related to this project was discussed. The literature review is a text of a trusted

paper such as journal, article and book that include current knowledge about theoretical and

methodological contribution. Main purpose of the literature review is to identify research

methods and strategies that should be apply in this project. The information from these previous

studies and research will be discussed in this chapter. Therefore, the literature review is carried

out to be used as references and as an inspiration in developing the proposed simulation.

There are two main fields that have been investigated in this part which are useful for

the implementation of the proposed project. The main areas are to study the Network and

Network Performance Analysis. The purpose of the research will be defined and the concepts

which have been helpful in understanding technologies used in development of proposed

application, have been collected.

In order to find a problem and disconnections in the network for any organizations that

may disturbing the performance of network, an appropriate administration and management

will be performed. This administration of network will capture the whole performance of the

network and maintain any possible connections. If any failure happens in the network, an

urgent monitoring and maintaining will be needed.

Page 18: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

6

2.2 Network

A network is the interconnection of a set of devices capable of communication (Behrouz

A. Forouzan, 2012). Based on this definition from Data Communication and Networking Fifth

Edition book, the computers, servers, mainframes, network devices, peripherals, or other

devices connected to one another to permit the transmission of data and information. The

evolution of network through the years have been changed from a simple connection between

a few computers to a connection of computers in many networks. An amazing example of a

network is the Internet, which connects millions of individuals all over the world. This dynamic

change of complex network demanding for having a rich of performance analysis and

management. The connections can be established through wired and wireless. Wired

connection requires a copper wire or fibre optic cable as a transmission medium to allow data

sending and receiving. For wireless transmission, data signal travels through electromagnetic

waves. In this project, a wireless network was used as a traffic scenario to be administer and

analyse.

The IEEE 802.11 standards specify two operating modes which is infrastructure mode

and ad hoc mode. Infrastructure mode is used to connect computers with wireless network

adapters, also known as wireless clients, to an existing wired network with the help from

wireless router or access point. Ad hoc mode is used to connect wireless clients directly

together, without the need for a wireless router or access point. An ad hoc network consists of

up to 9 wireless clients, which send their data directly to each other.

2.3 Network performance analysis

In this part, some previous proposed model for performance analysis will be discussed.

Network performance can be defined as the overall quality of service (QoS) provided by a

network while the network performance analysis is a complete set of processes and tools that

can be used to quantitatively and qualitatively analyse network performance. Basically, it is

Page 19: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

7

the use of network data to unpack performance trends. By conducting a performance analysis,

we can understand why the network is performing the way it is. The network performance can

be analysed by measuring a few parameters such as bandwidth usage, throughput, latency and

jitter.

Bandwidth can be defined as arrange of frequencies that can be transmitted by a

particular system or medium (Jorge L. Olenewa,2012). Throughput is the rate of data that can

be transferred from one place to another in a period of time. Next, latency is the delay between

the sender and the receiver decoding it, this is mainly a function of the signals travel time, and

processing time at any nodes the information traverses while jitter is variation in packet delay

at the receiving end of the information. Each of these types of parameters behaves differently

on different conditions of the network. Hence the performance analysis is a must task to know

its behaviour and work in that environment accordingly. The factors like node mobility,

network size, control overhead and traffic intensity along with inherent characteristics of

networks may result in unpredictable variations in the overall network performance.

In the previous project, Morris Sloman have proposed a new model for network

monitoring which modifies the event management. In the mentioned model, event and status

have been produced for the administrator to be able to analyse the network performance. Figure

2.1, presents the design of the proposed network.

Page 20: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

8

Figure 2.1: Network Management Model

2.4 NS2

NS-2 is an open source network simulator which runs on different platforms that are UNIX (or

Linux), Windows, and Mac systems. NS-2 is widely exploited to simulate the various network

components and protocols such as routing, TCP, UDP, FTP and traffic sources like CBR over

wired and wireless networks. Principally, NS2 provides a way to specify such network

protocols, and also simulate their corresponding behaviours. Owing to its flexibility and

modular nature, the NS-2 has gained profound admiration in the networking research

community areas. The most recent version of NS-2 is NS-2.35.

NS-2 simulator facilitates integration of the different types of technologies and tools.

NS-2 is implemented using both the oTCL (object Tool Command Language) and C++

languages. It exploits TCL/C++ interface, called as TclCl to allow interaction between the

oTCL and C++. By Employing NS-2 simulator the AWK script can be exploited to process the

trace files. The Ns-2 simulator incorporates diverse tools such as Network Animator (NAM)

and X-Graph. The architecture of NS2 are as shown in Figure 2.2.

Page 21: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

9

Figure 2.2: Architecture of NS2

2.5 Linux Operating System

Linux is an open source operating system that is distributed by Red Hat Enterprise

under GNU General Public Licence. This operating system gives freedom to user to run the

program for any purpose, to study how the program works, and change it to make it do what

you wish. It also allows the redistribution of copies or distribute copies of own modified

versions to others. The advantage is security characteristic of Linux much stronger than

Windows (Nandhini, U., Nivetha, B. and Shobana, D., 2016). Moreover, this operating system

is more powerful and unique compared with other operating system such as Windows and

Macintosh (Hussain A. Alhassan and Dr Christian Bach, 2014). Linux is user-friendly when it

comes to application codes writing through an accessing network which make it suit this project.

NS2 are the most compatible in Ubuntu Linux operating system. Ubuntu consist of two

different versions which is the server and desktop. Desktop version are mostly used in this

project since it has better performer for network performance analysis.

Page 22: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

10

2.6 Existing System

In this part of the chapter, the previously researches to the proposed network performance

analysis was studied and will be discussed. For every mentioned paper, some explanations

along with its advantages and disadvantages will be discussed in order to providing some

familiarities and understanding regarding these previous studies.

2.5.1 Design and Simulation of Wireless Sensor Network in NS2

This paper presented a study of how to design and implement Wireless Sensor Network

(WSN) in NS2. WSN consists of spatially distributed autonomous sensors to monitor physical

or environmental conditions such as temperature, sound, vibration, pressure and humidity. The

capabilities of sensor nodes in WSN are so wide and can be different as the simple sensor nodes

may monitor a single physical phenomenon while more complicated devices might combine

many different sensing techniques. The diversity of application in WSN makes it important for

the simulation to study the dynamic nature of this network. NS2 were used in this research

paper by implementing the sensing and tracing techniques on 20 nodes with DSDV routing

protocol. Sensing technique was used to gather information about a physical object or process,

including the occurrence of events. Tracing is done to capture all packets that are receive,

dropped and sent in the network. The advantage of this study is the nature and variety behaviour

of WSN can be study and analysed as the calculation of average end-to-end delay and total

energy consumed was recorded. However, this study is complicated to any novice and students

since the information recorded was not represented with any visual representation. Thus, it is

hard for nonprofessional to understand and conduct this project.

Page 23: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

11

2.5.2 Application and Performance Analysis of DSDV Routing Protocol in Ad-Hoc

Wireless Sensor Network with Help of NS2 Knowledge

The purpose of this paper is to evaluate performance of DSDV routing protocol in wireless

sensor network (WSN) scales regarding the End-to-End delay and throughput PDR with

mobility factor. Routing protocols are a critical aspect to performance in mobile wireless

networks and play crucial role in determining network performance in terms of packet delivery

fraction, end-to-end delay and packet loss. Destination-sequenced distance vector (DSDV)

protocol is a proactive protocol depending n routing tables which are maintained at each node.

The routing protocol should detect and maintain optimal route(s) between source and

destination nodes. In this paper, they presented the application of DSDV in WSN as extend to

their previous study to the design and implementation the details of the DSDV routing protocol

in MANET using the NS2 network simulator.

2.5.3 Performance Analysis of Wired, Wireless and Optical Network using NS2

In this paper, wired, wireless and optical networks have been analysed and implemented using

network simulator tool NS2. A systematic simulation-based performance analysis of wired,

wireless and optical networks using distance vector routing protocol has been carried out.

Analysis of the performance of these networks on the basis of three metrics which are the

Packet delivery ratio, end to end delay, throughput using NS2 simulation has been undertaken.

2.5.4 Simulation Analysis of Routing Protocols in Hybrid wireless network

In this paper, a simulation Analysis of Routing Protocols in Hybrid wireless network

was carried out. A wireless hybrid network which are the integration of wireless ad hoc network

and wireless infrastructure network is recognized as superior option for next generation

Page 24: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

12

wireless networks. Such network focuses to support of continuous transmission with strong

Quality of Service (QoS). In hybrid networks, the way to guarantee quality of service (QoS)

remains a hot problem, where it is observed that due to the direct adoption of QoS based

reservation resource routing for MANET, hybrid networks inherit problems of resource

reservation and invalid racing conditions. The article presents the working of two Ad-Hoc

routing protocols (DSDV and AODV+) in hybrid systems in relation with different network

complexities. It is observed that both protocols performed indistinguishably to the extent of the

throughput. For jitter, PLR and PDR, the AODV+ performed superior to DSDV; except for the

intricacy situation of system, while DSDV performed ineffectively.

2.5.5 Performance Analysis of UDP Based on Traffic Classifier Using NS2

In this research paper, Prof. R. Praveen Kumar et al has found that UDP offer a minimal,

unreliable, best-effort and message-passing transport to applications. Hence, a further

examination of its performance was performed using NS2 on aspects related to traffic size and

traffic load and traffic classification. By utilizing UDP for network connection based on the

header format, the retransmission difficulties double retransmit as compared to transmission

control protocol (TCP). A connection transferred within the network is not TCP within TCP,

but rather TCP within UDP. UDP does not support any retransmission components, so it is

going to only function as the forwarded TCP connection which will do retransmissions. An

additional gain from using UDP would be the smaller header dimensions. UDP features a

header dimension of 8 bytes when TCP employ a header dimension of 20 bytes. This may leave

space for bandwidth improvement within the network channel.

To address the issues of packet delay and unfairness among multimedia UDP flows,

this paper presents the design and evaluation of network models to study different parameters

Page 25: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

13

for quality-of-service (QoS) provisioning in differentiated service (DiffServ) routers using user

datagram protocol (UDP) as network traffic agent and constant bit rate (CBR) as traffic

generator. Traffic marker algorithms are used to define the treatment an incoming traffic

(packet streams) receives at the edge routers in a DiffServ domain.

Page 26: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

14

2.6 Overview of the Project and Research

Table 2.1: Comparison table of project and research

Author/Year Project Name Tools Routing protocol/algorithm Disadvantages

Genita G. and

Biswaraj S.

(2015)

Design and Simulation

of Wireless Sensor

Network in NS2

NS2 DSDV routing protocol The calculation of average energy

consumption and average end-to-end delay

was not represented with any visual

representation. Thus, it is hard for

nonprofessional to understand and conduct

this project.

Mohammed Zaid

Ghawy and Dr. Maher

Ali Al – Sanabani

(2017)

Application and

Performance Analysis

of DSDV Routing

Protocol in Ad-Hoc

Wireless Sensor

Network with Help of

NS2 Knowledge

NS2 DSDV routing protocol Many packets dropped occur because IEEE

802.15.4 not enabled large packets

transmission as the routing protocol DSDV

cause full dump packets to routes update,

Page 27: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

15

Jyoti and Himanshi

Saini

(2017)

Performance Analysis

of Wired, Wireless and

Optical Network using

NS2

NS2 DSDV routing protocol Parameter tested and compared for each

network is limited and need to be done for

a large range of applications in different

scenarios.

K. H. Mohammadani,

S. Abbasi, N. A.

Memon, Z. A. Bhutto,

I. R. Memon

(2018)

Simulation Analysis of

Routing Protocols in

Hybrid wireless

network

NS2 DSDV and AODV+ routing

protocol

There is no selection of homogenous

routing protocols and heterogeneous

routing protocols for hybrid network.

Prof.R.Praveen

Kumar, Amal

Mohanan,

C.Madhumithra,

R.Kumar

(2019)

Performance Analysis

of UDP Based on

Traffic Classifier Using

NS2

NS2 AOMDV AOMDV has more message overheads

during route discovery due to increased

flooding and since it is a multipath routing

protocol, the destination replies to the

multiple RREQs those results are in longer

overhead.

Page 28: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

16

2.7 Summary

This chapter provides an overview related to the concept of the existing system.

Literature review helps in determining whether the technology has been studied before or not.

The various approach and techniques used helps in generate a better of project research in the

future. The research in this literature review is done to avoid identical production of idea.

Page 29: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

17

CHAPTER 3

METHODOLOGY

3.1 Introduction

This chapter reports the approach or model development and application of a

comprehensive framework taken in the development of project, application or implementation

of the study. Methodology is a systematic way to solve the research problem by applying

technique, algorithm or method. This chapter contains specific procedures or techniques used

to identify, select, process, and analyze information about network performance analysis in

small organization by using NS2. The selection of the most suitable as suitable methodology

for methodology is chaotic enough because the project might not complete on the right

schedule or the project might completely fail because the developer might be lost guidance in

order to complete the project development. All the phases involved during this project will be

detailed.

According to the project, methodology shown in this chapter are the flowchart and

framework that was build referring to the objectives stated in 1.3. Firstly, to study the

simulation to monitor the network performance for DSDV routing protocol in small

organization. Secondly, to design the simulation that can analyze the behavior of existing and

proposed network for DSDV routing protocol in small organization under different scenario.

Lastly, to implement the simulation that can act as framework to simulate challenges such as

natural disaster, attack and human mistake and the corresponding effects of the network under

the induced challenge. This project will be focused on network performance analysis.

Page 30: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

18

3.2 Framework

This part will be discussed and focused on simulation of framework. Simulation is the operation

of modelling a process or system from the real-world situation over a period of time. Thus, in

this project, network for small organization was simulate and can be shown in Figure 3.1.

Figure 3.1: Framework of Network performance analysis of small organization using NS2

Figure 3.1 shows the framework of this project. Firstly, a network for network traffic that suit

for small organization are modelled and was scripted with Tcl script. Next, a network

simulation model was develop using NS2. The simulation was tested and evaluate to see if the

user is satisfied enough with the performance analyse from the simulation. If the user is

satisfied, a result and discussion can be done. If not, a communication session needed to make

an improvement in the network model. The simulation can be done again until the user are

satisfied with the performance analyse in this project.

Model a network

traffic of small

organization

Develop network

simulation model

using NS2

Test and evaluate

the simulation

Satisfy? Communicate

Result and

discussion

Network performance analysis of small organization using NS2

No

Yes

Page 31: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

19

3.3 Flowchart

Flowchart is a type of diagram that represents a workflow or process. In this part,

flowchart can also be defined as a diagrammatic representation of an algorithm, a step-by-step

approach in network performance analysis in small organization by using NS2.

Figure 3.1 shows the flowchart for network performance analysis in small organization

using NS2. This simulation involved user as the client and the NS2 server itself. In this project,

NS2 and NAM was installed in Ubuntu Linux operating system before start the simulation.

Firstly, after the installation complete, Tcl script was uploaded to be read and simulate in NS2.

The Tcl script uploaded was edited according to the requirement of the network to be tested.

Secondly, the Tcl script will be executed and network was scanned in NS2. Thirdly, a trace file

will be automatically saved as the output after being simulated in NS2. Next, the NAM will

present a visual simulation of traffic in the network tested. After that, the trace file produced

was analyse in an analyser such as Perl. Then, the analysed result was output to be studied and

a graph was plotted from the result. Lastly, the evaluation of result from simulation was done

by the user and to decide if the user is satisfied with the current network performance analysis.

If the user is satisfied, the final report can be written. If not, the work will be repeat by input

the modified Tcl script for improvement of network performance until the user is satisfied.

Page 32: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

20

Figure 3.2: Flowchart of network performance analysis

Page 33: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

21

3.4 Performance metrics

The performance metrics used in this proposed project are as follows:

1. Average Throughput: It is the measure of total information conveyed in a unit of time

(Nayak and Sinha, 2016).

2. Latency: It is the normal time a packet takes to achieve the goal (Marcotte and Olson, 2016).

3. Jitter: The difference in packet delay time known jitter. It is occurred due to network

congestion, an unexpected changing in network topology or link break (Kumar, et al., 2017).

4. Packet delivery ratio: It is the percentage of application layer packets successfully received

to the aggregate sent (Chaubey et al. 2015).

3.5 Proof of Concept

Figure 3.3: Install NS2 and NAM

Page 34: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

22

Figure 3.4: Input Tcl script in NS2

Figure 3.5: Install and run NAM

Page 35: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

23

3.6 Hardware and Software requirement

Hardware and software are important things to ensure the successful of this project. Thus, these

hardware and software has its own role and function in the completion of each steps. The details

on hardware and software are as shown in Table 3.1 and 3.2 below.

Hardware Description

Laptop Processor: Intel® Core™ i5-6200U CPU @ 2.30 GHz

RAM: 8 GB

Operating system: Ubuntu 16.04

Table 3.1: List of hardware used

Software Description

Ubuntu 16.04 Main used operating system and act as server

Windows 2010 Second used operating system for documentation of report

NS2 Simulation used to simulate network tested

NAM An animation tool which is employed to view the network

simulation trace data. It supports topology layout, level packet

animation, and various data inspection tools.

Perl Analyser of trace file produced by NS2

XGraph, MATLAB Plot graph for better understanding and pattern observation in

performance analysis

Microsoft Office 2016 Platform for documentation and presentation slides

Google Chrome and

Mozilla Firefox

Browser to run system and do research and related studies about

project

Table 3.2: List of software used

Page 36: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

24

3.7 Summary

In this chapter, the methodology of this project is explained. The flow of this project is being

shown in the framework and detailed view of how the whole system works is display on the

data model. Therefore, the requirements of the project are being shown in perfect order and can

carry out the minimum error.

Page 37: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

25

REFERENCES

1. Elliotte R. H., (2013), Java Network Programming Fourth Edition. pp.26.

2. James F. K. and Keith W. R., (1999), Computer Networking Sixth Edition. pp. 52.

3. Behrouz A. F., (2012), Data Communication and Networking Fifth Edition. pp. 7-17.

4. Jorge L. O., (2012). Guide to Wireless Communication Third Edition. pp. 18-56.

5. Whitman, M. E. and Mattord, H. J. (2010). Management of Information Security Third

Edition. pp. 171.

6. Sloman, M. (ed.), (1994), Networks and Distributed Systems Management, Addison

Wesley Longman Publishing Co., Inc., Boston, MA, USA.

7. Nandhini, U., Nivetha, B. and Shobana, D. (2016). An Analysis of Linux Operating System.

International Journal of Trend in Research and Development, Volume 3(1), ISSN:2394-

9333.

8. Hussain A. A. and Dr. Christian Bach. (2014). Operating System and Decision Making.

ASEE 2014 Zone I Conference. pp. 80-85.

9. Genita G. and Biswaraj Sen, (2015), “Design and Simulation of Wireless Sensor Network

in NS2”, International Journal of Computer Applications (0975 – 8887), Volume 113 No.

16.

10. Nayak, P. and P. Sinha, (2016). “Analysis of Random Way Point and Random Walk

Mobility Model for Reactive Routing Protocols for MANET Using Netsim Simulator.”

Proceedings - AIMS 2015, 3rd International Conference on Artificial Intelligence,

Modelling and Simulation 427–32.

11. Marcotte, R. J. and E. Olson, (2016). “Adaptive Forward Error Correction with

Adjustable-Latency QoS for Robotic Networks.” Proceedings - IEEE International

Conference on Robotics and Automation 2016–June:5283–88.

Page 38: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

26

12. Kumar, S., G. S. Agrawal, and S. K. Sharma, (2017). “Impact of Mobility on MANETs

Routing Protocols Using Group Mobility Model.” International Journal of Wireless and

Microwave Technologies 7(2):1–12. Retrieved (http://www.mecs-press.org/ijwmt/ijwmt-

v7-n2/v7n2-1.html).

13. Chaubey, N., A. Aggarwal, S. Gandhi, and K. A. Jani. (2015). “Performance Analysis of

TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying

Network Size.” International Conference on Advanced Computing and Communication

Technologies, ACCT 2015:320–24.

Page 39: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

27

APPENDIX

Page 40: IMPLEMENTATION OF NETWORK PERFORMANCE ANALYSIS FOR ... · I hereby declare that this report is based on my original work except for quotations and citations, which have been duly

28

Gantt Chart (FYP 1)

Activity/Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

1. FYP briefing by KPP

2. Discussion and selection of the proposal topic

3. Project title proposal

4. Details on project background, problem statement, objectives,

scope and limitation

5. Detail on Literature Review

6. Proposal progress presentation and panel’s evaluation

7. Correction on proposal

8. Framework discussion

9. Configuration of NS2

10. Draft proposal submission

11. Correction on proposal

12. Discussion and preparation of project presentation

13. Conference of project presentation

14. Final presentation and panel’s evaluation

15. Final report submission and supervisor’s evaluation