Introduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models. Also included are chapters on summary of debugging, variable and packet tracing, result compilation, and examples for extending NS2. Two appendices provide the details of scripting language Tcl, OTcl and AWK, as well object oriented programming used extensively in NS2.
Cited By
- Chandavarkar B (2023). Media Independent Handover and Mobile IPv6-Based UDP Performance Evaluation Suite for Heterogeneous Wireless Networks, Wireless Personal Communications: An International Journal, 129:2, (1197-1228), Online publication date: 1-Mar-2023.
- Darabkh K, Al-Akhras M, Zomot J and Atiquzzaman M (2022). RPL routing protocol over IoT, Journal of Network and Computer Applications, 207:C, Online publication date: 1-Nov-2022.
- Kocoloski B, Hussain A, Troglia M, Ardi C, Cheng S, DeAngelis D, Symonds C, Collins M, Goodfellow R and Schwab S Case Studies in Experiment Design on a minimega Based Network Emulation Testbed Proceedings of the 14th Cyber Security Experimentation and Test Workshop, (83-90)
- Sandhu J, Verma A and Rana P (2020). An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 112:1, (325-352), Online publication date: 1-May-2020.
- Aswale S and Ghorpade V (2019). Performance evaluation of various link quality metrics using cross layer routing for wireless multimedia sensor networks, International Journal of Communication Networks and Distributed Systems, 23:1, (1-24), Online publication date: 1-Jan-2019.
- Shukla S and Kumar M (2020). Optimized MRAI Timers for Border Gateway Protocol in Large Networks, International Journal of Distributed Systems and Technologies, 10:4, (31-44), Online publication date: 1-Oct-2019.
- Sra P and Chand S (2019). QoS in Mobile Ad-Hoc Networks, Wireless Personal Communications: An International Journal, 105:4, (1599-1616), Online publication date: 1-Apr-2019.
- Yeh C, Tu C and Hung S (2019). Rapid Hybrid Simulation Methods for Exploring the Design Space of Signal Processors with Dynamic and Scalable Timing Models, Journal of Signal Processing Systems, 91:3-4, (247-259), Online publication date: 1-Mar-2019.
- Duan Y, Lee V, Lam K, Nie W and Liu K (2019). A cross-layer design for data dissemination in vehicular ad hoc networks, Neural Computing and Applications, 31:7, (2869-2887), Online publication date: 1-Jul-2019.
- Azzuhri S, Mhd Noor M, Jamaludin J, Ahmedy I, Md Noor R and Mitton N (2018). Towards a Better Approach for Link Breaks Detection and Route Repairs Strategy in AODV Protocol, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
- Kumar P, Yu C, Yuan Y, Foster N, Kleinberg R and Soulé R YATES Proceedings of the Symposium on SDN Research, (1-7)
- Khanna G and Chaturvedi S (2018). A Comprehensive Survey on Multi-hop Wireless Networks, Wireless Personal Communications: An International Journal, 101:2, (677-722), Online publication date: 1-Jul-2018.
- Feng Y, Wu X and Hu Y (2018). Forecasting Research on the Wireless Mesh Network Throughput Based on the Support Vector Machine, Wireless Personal Communications: An International Journal, 99:1, (581-593), Online publication date: 1-Mar-2018.
- Gao Z, Chen D, Yao N, Lu Z and Chen B (2018). A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs, Wireless Personal Communications: An International Journal, 98:1, (651-663), Online publication date: 1-Jan-2018.
- Kwon K, Kim S, Ha M and Kim D (2018). Traffic-aware stateless multipath routing for fault-tolerance in IEEE 802.15.4 wireless mesh networks, Wireless Networks, 24:5, (1755-1774), Online publication date: 1-Jul-2018.
- Gehr T, Misailovic S, Tsankov P, Vanbever L, Wiesmann P and Vechev M (2018). Bayonet: probabilistic inference for networks, ACM SIGPLAN Notices, 53:4, (586-602), Online publication date: 2-Dec-2018.
- Gehr T, Misailovic S, Tsankov P, Vanbever L, Wiesmann P and Vechev M Bayonet: probabilistic inference for networks Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, (586-602)
- Ben Chigra Y, Ghadi A and Bouhorma M Novel metric for performance evaluation of routing in MANETs Proceedings of the 3rd International Conference on Smart City Applications, (1-4)
- Xu X, Liao Q and Zhao J An energy aware and load balancing routing protocol for mobile ad hoc networks Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, (1-5)
- Yan L and McKeown N (2017). Learning Networking by Reproducing Research Results, ACM SIGCOMM Computer Communication Review, 47:2, (19-26), Online publication date: 2-May-2017.
- Qasaimeh M, Aljallad S and Al-Qassas R (2017). A Group Leader Location Hiding Technique for VANETs, International Journal of Distributed Systems and Technologies, 8:3, (67-80), Online publication date: 1-Jul-2017.
- Kaur P, Kaur D and Mahajan R (2017). Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet, Wireless Personal Communications: An International Journal, 96:1, (47-63), Online publication date: 1-Sep-2017.
- Sharma D, Patra A and Kumar C (2017). P-AODV, Wireless Personal Communications: An International Journal, 95:4, (4381-4402), Online publication date: 1-Aug-2017.
- Haseeb K, Bakar K, Abdullah A and Darwish T (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks, Wireless Networks, 23:6, (1953-1966), Online publication date: 1-Aug-2017.
- Xavier R, Granville L, Volckaert B and Turck F (2017). Elastic Resource Allocation Algorithms for Collaboration Applications, Journal of Network and Systems Management, 25:4, (699-734), Online publication date: 1-Oct-2017.
- Alipio M, Tiglao N, Grilo A, Bokhari F, Chaudhry U and Qureshi S (2017). Cache-based transport protocols in wireless sensor networks, Journal of Network and Computer Applications, 88:C, (29-49), Online publication date: 15-Jun-2017.
- Taherkhani N and Pierre S (2016). Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm, IEEE Transactions on Intelligent Transportation Systems, 17:11, (3275-3285), Online publication date: 1-Nov-2016.
- Haseeb K, Bakar K, Abdullah A, Ahmed A, Darwish T and Ullah F (2016). A dynamic Energy-aware fault tolerant routing protocol for wireless sensor networks, Computers and Electrical Engineering, 56:C, (557-575), Online publication date: 1-Nov-2016.
- Park J, Lee J, Kim S, Jang K and Yang S (2016). A forwarding scheme based on swarm intelligence and percolation centrality in opportunistic networks, Wireless Networks, 22:8, (2511-2521), Online publication date: 1-Nov-2016.
- Guan S, De Grande R and Boukerche A An HLA-based Cloud Simulator for Mobile Cloud Environments Proceedings of the 20th International Symposium on Distributed Simulation and Real-Time Applications, (128-135)
- Qin Y, Yang W, Ye Y and Shi Y (2016). Analysis for TCP in data center networks, Journal of Network and Computer Applications, 68:C, (140-150), Online publication date: 1-Jun-2016.
- Taherkhani N and Pierre S (2016). Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 108:C, (15-28), Online publication date: 24-Oct-2016.
- Michaloliakos A, Rogalin R, Zhang Y, Psounis K and Caire G (2016). Performance modeling of next-generation WiFi networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 105:C, (150-165), Online publication date: 4-Aug-2016.
- Kerrache C, Lagraa N, Calafate C, Cano J and Manzoni P (2016). T-VNets, Computer Communications, 93:C, (68-83), Online publication date: 1-Nov-2016.
- Chughtai O, Badruddin N, Awang A and Rehan M (2016). Congestion-aware and traffic load balancing scheme for routing in WSNs, Telecommunications Systems, 63:4, (481-504), Online publication date: 1-Dec-2016.
- Tiwari R and Kumar N (2016). An adaptive cache invalidation technique for wireless environments, Telecommunications Systems, 62:1, (149-165), Online publication date: 1-May-2016.
- Saldana J (2016). On the effectiveness of an optimization method for the traffic of TCP-based multiplayer online games, Multimedia Tools and Applications, 75:24, (17333-17374), Online publication date: 1-Dec-2016.
- Ahmed A, Bakar K, Channa M and Khan A (2016). A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network, Mobile Networks and Applications, 21:2, (272-285), Online publication date: 1-Apr-2016.
- Kerrache C, Calafate C, Lagraa N, Cano J and Manzoni P (2016). RITA, Security and Communication Networks, 9:17, (4428-4442), Online publication date: 25-Nov-2016.
- Shabut A, Dahal K, Bista S and Awan I (2015). Recommendation Based Trust Model with an Effective Defence Scheme for MANETs, IEEE Transactions on Mobile Computing, 14:10, (2101-2115), Online publication date: 1-Oct-2015.
- Lee J, Kim S, Yoon J and Yang S (2015). Snapshot, Wireless Networks, 21:6, (2055-2068), Online publication date: 1-Aug-2015.
- Jeffrey M, Subramanian S, Yan C, Emer J and Sanchez D A scalable architecture for ordered parallelism Proceedings of the 48th International Symposium on Microarchitecture, (228-241)
- Li Y and Boukerche A (2015). QuGu, ACM Transactions on Multimedia Computing, Communications, and Applications, 11:4, (1-23), Online publication date: 2-Jun-2015.
- Gore R, Reynolds Jr. P, Kamensky D, Diallo S and Padilla J (2015). Statistical Debugging for Simulations, ACM Transactions on Modeling and Computer Simulation, 25:3, (1-26), Online publication date: 7-May-2015.
- Abid B, Nguyen T and Seba H (2015). New data aggregation approach for time-constrained wireless sensor networks, The Journal of Supercomputing, 71:5, (1678-1693), Online publication date: 1-May-2015.
- Al-Jobouri L, Fleury M and Ghanbari M (2014). Engineering wireless broadband access to IPTV, Journal of Visual Communication and Image Representation, 25:7, (1493-1506), Online publication date: 1-Oct-2014.
- Mehdi K, Lounis M, Bounceur A and Kechadi T CupCarbon Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, (126-131)
- Suznjevic M, Saldana J, Matijasevic M, Fernández-Navajas J and Ruiz-Mas J (2014). Analyzing the effect of TCP and server population on massively multiplayer games, International Journal of Computer Games Technology, 2014, (2-2), Online publication date: 1-Jan-2014.
- Kumawat H and Meena G Characterization, Detection and Mitigation of Low-Rate DoS attack Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
- Pediaditakis D, Rotsos C and Moore A Faithful reproduction of network experiments Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, (41-52)
- Kerrache C, Calafate C, Lagraa N, Cano J and Manzoni P Hierarchical adaptive trust establishment solution for vehicular networks 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
- Xavier R, Moens H, Volckaert B and De Turck F Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (564-570)
Index Terms
- Introduction to Network Simulator NS2