Hi All, Our website moved to a new URL. Please bookmark the new link: https://ns2bloggers.blogspot.com/

PROGRAMS FOR YOU

 PERFORMANCE EVALUATION OF TCP

  • Performance Evaluation of TCP and CBR connections sharing a bottleneck linkClick here to download the program.
  • Performance Evaluation of TCP and CBR connections with random drops. Click here to download the program.
  • TCP connections with delays and initial transmission times created at random. Click here to download the program.
  • Short TCP files with several source nodes, sharing a single bottleneck link. Click here to download the program. 
  • A sophisticated tcl programming with extra monitoring features. Click here to download the program.

UNICAST AND MULTICAST ROUTING

  • Unicast routing. Click here to download the program.
  • Multicast routing,CTR. Click here to download the program.
  • Multicast routing,DVMRP. Click here to download the program.
  • Multicast routing,PIMDM. Click here to download the program.
  • Multicast routing,bi-directional shared tree. Click here to download the program.
QUEUING
  • TCP connections with a RED bottleneck buffer. Click here to download the program.
  • TCP connections with a DROP TAIL buffer. Click here to download the program.
  • Short TCP files with several source nodes, sharing a single bottleneck link with a RED buffer. Click here to download the program.
  • Script for RED QUEUE MONITORING. Click here to download the program. 
DIFFSERV
  • Short TCP files with several source nodes, sharing a single bottleneck link.It allows to how with proper choice of CIR, marking decreases losses of vulnerable packets (syns etc). Click here to download the program.
LOCAL AREA NETWORKS
  • IEEE 802 wireless. Click here to download the program.
  • CSMA protocol. Click here to download the program.
CLASSICAL QUEUING MODELS
  • An M/M/1 queue. Click here to download the program.
  • An M/M/1 queue with finite capacity. Click here to download the program.
MOBILE NETWORKS-MANET
  • TCP/FTP over a 3 nodes Ad-hoc network with DSDV routing protocol. Click here to download the program.
  • TCP/FTP over a 3 nodes Ad-hoc network with DSR routing protocol. Click here to download the program.
  • TCP/FTP over a 3 nodes Ad-hoc network with AODV routing protocol. Click here to download the program.
  • TCP/FTP over a 3 nodes Ad-hoc network with TORA routing protocol. Click here to download the program.
  • TCP/FTP over a 4 nodes Ad-hoc network with TORA routing protocol. Click here to download the program.
  • TCP/FTP over a 30 node Ad-hoc network with AODV routing protocol. Click here to download the program.
  • UDP/CBR over 5 node,10 node,50 node Ad-hoc network with AOMDV routing protocol. Click links to download the program. 1. 5 node  2. 10 node  3. 50 node 
  • UDP/CBR over 30 nodes with attacker node with AODV routing protocol. Click here to download the program.



WEB SERVER SIMULATION
  • Script for Web Server Simulation. Click here to download programs.
    Simulated Network topology. 

WIRED CUM WIRELESS NETWORKS

  • wired network nodes connected to wireless network nodes through base station Click here to download program
WPAN-WIRELESS PERSONAL AREA NETWORK  

  • WPAN TCL Script.Click here to download program 

WORM HOLE ATTACK

  • Example network of 2 worm holes and 14 nodes. Click here to download program

60 comments :

  1. Nice..very useful...waiting 4 more...

    ReplyDelete
  2. how to store ip adress in a array in ns2?

    ReplyDelete
    Replies
    1. we can see ip adress from trace file.NS2 nodes have hirearchichal addressing scheme which is similar to IP adderss but it is not the same. When using trace-all in NS2, a trace string is created in a trace file.it also have source and destination addresses.

      The structhdr_ip, IP packet header contains information about source and destination of a packet.NS2 utilizes data type ns_addr_t defined in file ˜ns/config.h to store node address. ns_addr_t is a struct data type, which contains two members: addr_ and port_. Both members are of type int32_t, which is simply an alias for int data type and file ˜ns/autoconf-win32.h. While addr_ specifies the node address, port_ identifies the attached port The variables src_ and dst_ of IP header are of class ns_addr_t. Hence, src_.addr_ and src_.port_ store the node address and the port of the sending agent, respectively. Similarly, the packet will be sent to a receiving agent attached to port dst_.port_ of a node with address dst_.addr_. function offset(off) and function access(p), which are essential to access IP header of a packet.

      Delete
    2. In all the simulator the IP addresses are denoted as a nodeid. In ns2 all the nodes possess an address called SIM address with which the nodes are identified.

      Delete
  3. Do You Have any idea how to take source and Destination and find shortest path using AODV algorithm. Multiple path come it select best one?
    I am trying it from last

    ReplyDelete
    Replies
    1. we didnt get u... please explain your need...

      Delete
  4. do you have any program on aodv to find the distance source to destination..(hope count)

    ReplyDelete
    Replies
    1. please check our awk codes.. u can find awk codes for finding network statistics

      Delete
  5. Have you any code for store the ip adress ia a array?..my probs is that..in a radio coverage area ,i will compare the distance of all node to source node and find the max distance node ip adress. return the max-distance node ip to the source.

    also i more question..if a am divide the total coverage area. source node is centered of the monitoring region and also assuming that the monitoring region is divided into three fixed zone like zone1, zone2 and zone3 each of degree 120 depending upon the radio coverage area of the source node. how to write the code in ns2

    ReplyDelete
    Replies
    1. BEGIN {
      print "IP Address\tAccess Count\tNumber of sites";
      }
      {
      Ip[$3]++;
      count[$3]+=$NF;
      }
      END{
      for (var in Ip)
      print var,"\t",Ip[var],"\t\t",count[var];
      }

      Delete
  6. source node is centered of the monitoring region and also assuming that the monitoring region is divided into three fixed zone like zone1, zone2 and zone3 each of degree 120 depending upon the radio coverage area of the source node. using ip address we find the max distance(a) of each zone.after finding max distance can i use aodv protocol to know the destination(d)..simply the distance a to d of each zone using aodv protocol.
    plz help me i am in big problem.

    ReplyDelete
  7. if you give me your mail id i will send you detail.with picture..it wii be more simple to understood.

    ReplyDelete
    Replies
    1. i am sending a mail..plz check.. and i am waiting your reply

      Delete
  8. plz send me the code for RPL routing protocol

    ReplyDelete
  9. Please send me the .tcl file for OLSR routing protocol. its very necessary for me ....................................please

    ReplyDelete
  10. My mail id is maibansal@gmail.com please send me the code its very urgent

    ReplyDelete
  11. This comment has been removed by the author.

    ReplyDelete
  12. please, i want to know if it's possible to create domotic protocol using ns2.
    Think you

    ReplyDelete
    Replies
    1. there is no inbuilt protocol stack of domotic protocol in NS2 try another software

      Delete
  13. Does anyone have an idea of CONFIDANT protocol implementation on DSR?

    ReplyDelete
    Replies
    1. plz refer http://infoscience.epfl.ch/record/385/files/BucheggerL02.pdf

      Delete
  14. please can anyone share with me code for VOIP over SCTP and UDP protocols in wireless network!

    this is my e-mail: m_thamir@hotmail.com

    please it's vary important to me.
    waiting for yours reply!

    ReplyDelete
    Replies
    1. mail your requirements to ns2blogger@gmail.com

      Delete
  15. Thank you so much for running this page.

    Could you please tell me, how to run HTTP over TCP? Could you please share the code?

    Thanks.

    ReplyDelete
  16. @asad ali :thankz for your support;
    we will upload the program soon..stay tuned...:)

    ReplyDelete
  17. Plz i have to realize a platform simulation for Vanet so the network simulation with ns2 works fine but i dont know how to get a graph analyzing for example the bit error rate by each sent paquets or the performance depends on trafic type connection CBR or TCP. i will be gratefull for helping me

    ReplyDelete
    Replies
    1. use xgraph or GNU plot for graphical analysis

      Delete
  18. Thank you for running this helpful website.... appreciate your contribution..

    ReplyDelete
  19. For AODV 30 node tcl script showing packet delivery ratio ( s:3188580 r:3850200, r/s Ratio:1.2075 ) but i'm confused about this is it possible receive data is greater than send data ?

    ReplyDelete
    Replies
    1. we have changed the program. plz check it once again

      Delete
  20. Hello,
    I'm trying code for leach protocol. but got stucked with cluster forming and selecting cluster head. Could you help me by providing some sample codes with tell above issue.


    Thanks and Regards,
    Manjunath

    ReplyDelete
  21. hi
    anybody has the code for diffserv in wireless network
    thanks

    ReplyDelete
  22. Hi

    In the beginning thanks for all administrative on this nice blog. I'm M.S.c student and have message about" Traffic Prediction In Cloud Computing", My goal from this message is finding the shortest-path between the source and destination. Now i'm used NS2 and work with wireless network and used AODV for this purpose. Plz can u provide me the code for this. If u can, then where i should put this code in aodv files (AODV.h/.cc) or where?. If u cannot help me, then if u have a code to enhance the end-to-end delay, throughput, ..etc. in AODV?

    Plz if u can help me, then reply me and i will give u my e-mail ok

    ReplyDelete
    Replies
    1. normally AODV use shortest path.. its hard to modify .cc files...

      Delete
  23. sir i am dng project on worm hole attack
    plz send the patch and basic tcl script for worm hole attack

    ReplyDelete
  24. Hi to all

    I have an algorithm use to enhance the performance of the AODV protocol. Can anyone here has the ability in the programming for this algorithm. If u can do it then i will upload the algorithm with it's extra files also.

    Thanks to all who care about my post :)

    ReplyDelete
  25. i'm using trust based concept in routing. i dont know how to assign trust values using trust table and how to link it with nodes. could you help me??

    ReplyDelete
    Replies
    1. caculate pdr value of each node and compare it with a particular value

      Delete
  26. Sir,
    I'am researching wormhole attack in aodv protocol.
    Can you send me NS2 code wormhole attack, please!!!
    Thank you so much.

    ReplyDelete
    Replies
    1. I have downloaded worm.tcl ( WORM HOLE ATTACK- Example network of 2 worm holes and 14 nodes.) but when I run the error.([$n14 set ll_(0)] wormhole-peer [$n15 set ll_(0)] ).
      can you help me please?

      Delete
  27. Can you send ns2 code SAODV,TAODV for me? thank you so much

    ReplyDelete
  28. can u send SAODV and blackhole patch..............

    ReplyDelete
  29. Please send me the .tcl file for OLSR routing protocol. I write thesis "The concept of using energy metrics for route selection in OLSR routing protocol"and i need help. Thank you very much.

    ReplyDelete
  30. please any body help me,,,,,,
    i want aodv and saodv code with graph result,,,,,,
    please help me,,,,,,,,,

    ReplyDelete
  31. Please tell me how to set energy levels for different nodes and also how to use cryptographic algorithms in NS2

    ReplyDelete
  32. how to implement aodv protocol using fair share algorithm...please help me

    ReplyDelete
  33. Could you please guide on how to implement TPSN protocol for synchronisation of the nodes using DSDV routing protocol.

    ReplyDelete
  34. In Local Area Networks CSMA program. Why are the orient link commands between LAN nodes are commented out and the program is automatically working without those orient link commands. Plz reply

    ReplyDelete