Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Introduction to Network Simulator NS2December 2011
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-1-4614-1405-6
Published:02 December 2011
Pages:
536
Skip Bibliometrics Section
Reflects downloads up to 12 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Introduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models. Also included are chapters on summary of debugging, variable and packet tracing, result compilation, and examples for extending NS2. Two appendices provide the details of scripting language Tcl, OTcl and AWK, as well object oriented programming used extensively in NS2.

Cited By

  1. Chandavarkar B (2023). Media Independent Handover and Mobile IPv6-Based UDP Performance Evaluation Suite for Heterogeneous Wireless Networks, Wireless Personal Communications: An International Journal, 129:2, (1197-1228), Online publication date: 1-Mar-2023.
  2. Darabkh K, Al-Akhras M, Zomot J and Atiquzzaman M (2022). RPL routing protocol over IoT, Journal of Network and Computer Applications, 207:C, Online publication date: 1-Nov-2022.
  3. ACM
    Kocoloski B, Hussain A, Troglia M, Ardi C, Cheng S, DeAngelis D, Symonds C, Collins M, Goodfellow R and Schwab S Case Studies in Experiment Design on a minimega Based Network Emulation Testbed Proceedings of the 14th Cyber Security Experimentation and Test Workshop, (83-90)
  4. Sandhu J, Verma A and Rana P (2020). An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks, Wireless Personal Communications: An International Journal, 112:1, (325-352), Online publication date: 1-May-2020.
  5. Aswale S and Ghorpade V (2019). Performance evaluation of various link quality metrics using cross layer routing for wireless multimedia sensor networks, International Journal of Communication Networks and Distributed Systems, 23:1, (1-24), Online publication date: 1-Jan-2019.
  6. Shukla S and Kumar M (2020). Optimized MRAI Timers for Border Gateway Protocol in Large Networks, International Journal of Distributed Systems and Technologies, 10:4, (31-44), Online publication date: 1-Oct-2019.
  7. Sra P and Chand S (2019). QoS in Mobile Ad-Hoc Networks, Wireless Personal Communications: An International Journal, 105:4, (1599-1616), Online publication date: 1-Apr-2019.
  8. Yeh C, Tu C and Hung S (2019). Rapid Hybrid Simulation Methods for Exploring the Design Space of Signal Processors with Dynamic and Scalable Timing Models, Journal of Signal Processing Systems, 91:3-4, (247-259), Online publication date: 1-Mar-2019.
  9. Duan Y, Lee V, Lam K, Nie W and Liu K (2019). A cross-layer design for data dissemination in vehicular ad hoc networks, Neural Computing and Applications, 31:7, (2869-2887), Online publication date: 1-Jul-2019.
  10. Azzuhri S, Mhd Noor M, Jamaludin J, Ahmedy I, Md Noor R and Mitton N (2018). Towards a Better Approach for Link Breaks Detection and Route Repairs Strategy in AODV Protocol, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  11. ACM
    Kumar P, Yu C, Yuan Y, Foster N, Kleinberg R and Soulé R YATES Proceedings of the Symposium on SDN Research, (1-7)
  12. Khanna G and Chaturvedi S (2018). A Comprehensive Survey on Multi-hop Wireless Networks, Wireless Personal Communications: An International Journal, 101:2, (677-722), Online publication date: 1-Jul-2018.
  13. Feng Y, Wu X and Hu Y (2018). Forecasting Research on the Wireless Mesh Network Throughput Based on the Support Vector Machine, Wireless Personal Communications: An International Journal, 99:1, (581-593), Online publication date: 1-Mar-2018.
  14. Gao Z, Chen D, Yao N, Lu Z and Chen B (2018). A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs, Wireless Personal Communications: An International Journal, 98:1, (651-663), Online publication date: 1-Jan-2018.
  15. Kwon K, Kim S, Ha M and Kim D (2018). Traffic-aware stateless multipath routing for fault-tolerance in IEEE 802.15.4 wireless mesh networks, Wireless Networks, 24:5, (1755-1774), Online publication date: 1-Jul-2018.
  16. ACM
    Gehr T, Misailovic S, Tsankov P, Vanbever L, Wiesmann P and Vechev M (2018). Bayonet: probabilistic inference for networks, ACM SIGPLAN Notices, 53:4, (586-602), Online publication date: 2-Dec-2018.
  17. ACM
    Gehr T, Misailovic S, Tsankov P, Vanbever L, Wiesmann P and Vechev M Bayonet: probabilistic inference for networks Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, (586-602)
  18. ACM
    Ben Chigra Y, Ghadi A and Bouhorma M Novel metric for performance evaluation of routing in MANETs Proceedings of the 3rd International Conference on Smart City Applications, (1-4)
  19. ACM
    Xu X, Liao Q and Zhao J An energy aware and load balancing routing protocol for mobile ad hoc networks Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, (1-5)
  20. ACM
    Yan L and McKeown N (2017). Learning Networking by Reproducing Research Results, ACM SIGCOMM Computer Communication Review, 47:2, (19-26), Online publication date: 2-May-2017.
  21. Qasaimeh M, Aljallad S and Al-Qassas R (2017). A Group Leader Location Hiding Technique for VANETs, International Journal of Distributed Systems and Technologies, 8:3, (67-80), Online publication date: 1-Jul-2017.
  22. Kaur P, Kaur D and Mahajan R (2017). Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet, Wireless Personal Communications: An International Journal, 96:1, (47-63), Online publication date: 1-Sep-2017.
  23. Sharma D, Patra A and Kumar C (2017). P-AODV, Wireless Personal Communications: An International Journal, 95:4, (4381-4402), Online publication date: 1-Aug-2017.
  24. Haseeb K, Bakar K, Abdullah A and Darwish T (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks, Wireless Networks, 23:6, (1953-1966), Online publication date: 1-Aug-2017.
  25. Xavier R, Granville L, Volckaert B and Turck F (2017). Elastic Resource Allocation Algorithms for Collaboration Applications, Journal of Network and Systems Management, 25:4, (699-734), Online publication date: 1-Oct-2017.
  26. Alipio M, Tiglao N, Grilo A, Bokhari F, Chaudhry U and Qureshi S (2017). Cache-based transport protocols in wireless sensor networks, Journal of Network and Computer Applications, 88:C, (29-49), Online publication date: 15-Jun-2017.
  27. Taherkhani N and Pierre S (2016). Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm, IEEE Transactions on Intelligent Transportation Systems, 17:11, (3275-3285), Online publication date: 1-Nov-2016.
  28. Haseeb K, Bakar K, Abdullah A, Ahmed A, Darwish T and Ullah F (2016). A dynamic Energy-aware fault tolerant routing protocol for wireless sensor networks, Computers and Electrical Engineering, 56:C, (557-575), Online publication date: 1-Nov-2016.
  29. Park J, Lee J, Kim S, Jang K and Yang S (2016). A forwarding scheme based on swarm intelligence and percolation centrality in opportunistic networks, Wireless Networks, 22:8, (2511-2521), Online publication date: 1-Nov-2016.
  30. Guan S, De Grande R and Boukerche A An HLA-based Cloud Simulator for Mobile Cloud Environments Proceedings of the 20th International Symposium on Distributed Simulation and Real-Time Applications, (128-135)
  31. Qin Y, Yang W, Ye Y and Shi Y (2016). Analysis for TCP in data center networks, Journal of Network and Computer Applications, 68:C, (140-150), Online publication date: 1-Jun-2016.
  32. Taherkhani N and Pierre S (2016). Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 108:C, (15-28), Online publication date: 24-Oct-2016.
  33. Michaloliakos A, Rogalin R, Zhang Y, Psounis K and Caire G (2016). Performance modeling of next-generation WiFi networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 105:C, (150-165), Online publication date: 4-Aug-2016.
  34. Kerrache C, Lagraa N, Calafate C, Cano J and Manzoni P (2016). T-VNets, Computer Communications, 93:C, (68-83), Online publication date: 1-Nov-2016.
  35. Chughtai O, Badruddin N, Awang A and Rehan M (2016). Congestion-aware and traffic load balancing scheme for routing in WSNs, Telecommunications Systems, 63:4, (481-504), Online publication date: 1-Dec-2016.
  36. Tiwari R and Kumar N (2016). An adaptive cache invalidation technique for wireless environments, Telecommunications Systems, 62:1, (149-165), Online publication date: 1-May-2016.
  37. Saldana J (2016). On the effectiveness of an optimization method for the traffic of TCP-based multiplayer online games, Multimedia Tools and Applications, 75:24, (17333-17374), Online publication date: 1-Dec-2016.
  38. Ahmed A, Bakar K, Channa M and Khan A (2016). A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network, Mobile Networks and Applications, 21:2, (272-285), Online publication date: 1-Apr-2016.
  39. Kerrache C, Calafate C, Lagraa N, Cano J and Manzoni P (2016). RITA, Security and Communication Networks, 9:17, (4428-4442), Online publication date: 25-Nov-2016.
  40. Shabut A, Dahal K, Bista S and Awan I (2015). Recommendation Based Trust Model with an Effective Defence Scheme for MANETs, IEEE Transactions on Mobile Computing, 14:10, (2101-2115), Online publication date: 1-Oct-2015.
  41. Lee J, Kim S, Yoon J and Yang S (2015). Snapshot, Wireless Networks, 21:6, (2055-2068), Online publication date: 1-Aug-2015.
  42. ACM
    Jeffrey M, Subramanian S, Yan C, Emer J and Sanchez D A scalable architecture for ordered parallelism Proceedings of the 48th International Symposium on Microarchitecture, (228-241)
  43. ACM
    Li Y and Boukerche A (2015). QuGu, ACM Transactions on Multimedia Computing, Communications, and Applications, 11:4, (1-23), Online publication date: 2-Jun-2015.
  44. ACM
    Gore R, Reynolds Jr. P, Kamensky D, Diallo S and Padilla J (2015). Statistical Debugging for Simulations, ACM Transactions on Modeling and Computer Simulation, 25:3, (1-26), Online publication date: 7-May-2015.
  45. Abid B, Nguyen T and Seba H (2015). New data aggregation approach for time-constrained wireless sensor networks, The Journal of Supercomputing, 71:5, (1678-1693), Online publication date: 1-May-2015.
  46. Al-Jobouri L, Fleury M and Ghanbari M (2014). Engineering wireless broadband access to IPTV, Journal of Visual Communication and Image Representation, 25:7, (1493-1506), Online publication date: 1-Oct-2014.
  47. Mehdi K, Lounis M, Bounceur A and Kechadi T CupCarbon Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, (126-131)
  48. Suznjevic M, Saldana J, Matijasevic M, Fernández-Navajas J and Ruiz-Mas J (2014). Analyzing the effect of TCP and server population on massively multiplayer games, International Journal of Computer Games Technology, 2014, (2-2), Online publication date: 1-Jan-2014.
  49. ACM
    Kumawat H and Meena G Characterization, Detection and Mitigation of Low-Rate DoS attack Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  50. ACM
    Pediaditakis D, Rotsos C and Moore A Faithful reproduction of network experiments Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, (41-52)
  51. Kerrache C, Calafate C, Lagraa N, Cano J and Manzoni P Hierarchical adaptive trust establishment solution for vehicular networks 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  52. Xavier R, Moens H, Volckaert B and De Turck F Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (564-570)
Contributors
  • The University of British Columbia
  • University of Manitoba

Reviews

S. Nagaraj

Computer networks are ubiquitous today. For networking research, a series of discrete event network simulators-ns-1, ns-2, and ns-3-has been developed. This book on ns-2 can be used as a reference by researchers, as well as by undergraduate and postgraduate students. It will be useful for courses related to computer networks. The first edition of this book was published in 2009 [1]. This second edition corrects the typographical errors found in the first edition and tries to improve the descriptive language. It has added exercises at the end of the chapters that are meant to be used for assignments, lab exercises, and exam questions. The second edition is essentially the same as the first edition, except for the new chapter on wireless mobile ad hoc networks. More examples have been included and some of the chapters have been rewritten. The appendices are essentially unchanged. The authors have developed companion online resources for their book, including updates, discussion boards, elaborated explanations of various topics, slides, questions and answers, and errata. The chapter titles provide an outline of the topics covered: "Simulation of Computer Networks"; "Introduction to Network Simulator 2 (NS2)"; "Linkage between OTcl and C++ in NS2"; "Implementation of Discrete-Event Simulation in NS2"; "Network Objects: Creation, Configuration, and Packet Forwarding"; "Nodes as Routers or Computer Hosts"; "Link and Buffer Management"; "Packets, Packet Headers, and Header Format"; "Transport Control Protocols Part 1: Overview and User Datagram Protocol Implementation"; "Transport Control Protocols Part 2: Transmission Control Protocol"; "Application: User Demand Indicator"; "Wireless Mobile Ad Hoc Networks"; "Developing New Modules for NS2"; "Postsimulation Processing: Debugging, Tracing, and Result Compilation"; and "Related Helper Classes." The appendices cover programming essentials, a review of polymorphism, and the BSD link list and bit-level functions. The references are current and the indices are helpful. The authors have tried to make improvements over their first edition. ns-2 has become very popular and hence this revised second edition is to be welcomed. However, it is unfortunate that ns-2 is just being maintained whereas ns-3 is being actively developed. It will be helpful if the authors can bring out a book on ns-3. Nevertheless, I recommend this book for all those who are using ns-2 or plan to use it in the future. It will serve as a useful reference. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations