SRP Algorithm Simulation By:Andrey Klinger Michael Gustus Evgeny Muzikantov Supervisor: Itai Dabran.

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
CISCO Discovery Protocol (CDP) ByAlexander Alperovich Alexandra Davidov Boris Kostenko.
The Laboratory of Computer Communication and Networking Cisco Development Protocol Cisco Development Protocol.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Spatial Reuse Ring Networks Chun-Hung Chen Department of Computer Science and Information Engineering National Taipei University of Technology
SANS A Simple Ad hoc Network Simulator Nicolas Burri Roger Wattenhofer Yves Weber Aaron Zollinger.
The Laboratory of Computer Communication and Networking SRP Simulation Over Ethernet.
A combinational media access protocol for multicast traffic in single-hop WDM lans Student : T.H Lin Teacher : H.T Wu Date : 7.28.
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
Lesson 1: Configuring Network Load Balancing
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
Network Simulation Internet Technologies and Applications.
Windows Server 2008 Chapter 11 Last Update
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
HiVision SNMP Software.
Process-to-Process Delivery:
Data Communications and Networks
WELCOME.
OMNET++. Outline Introduction Overview The NED Language Simple Modules.
1 An Extensible Videoconference Tool for a Collaborative Computing Network Junjun He.
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
The Computer Communication Lab (236340) Winter Resilient Packet Ring GUI Simulator Developed By: Anton Spirkov Slava
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Network Simulator-2 Sandeep singla 1998A2A7540. NS-2 A discrete event simulator Focused on modeling network protocols –Wired, wireless –TCP,UDP,unicast,multicast.
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
ECE Department: University of Massachusetts, Amherst ECE 354 Lab 4: Remote Control of a Digital Camera.
William Stallings Data and Computer Communications
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
1 Introduction to NS-2 r Tutorial overview of NS m Create basic NS simulation r Walk-through a simple example m Model specification m Execution and trace.
Lesson 11: Configuring and Maintaining Network Security
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.
Computer Simulation of Networks ECE/CSC 777: Telecommunications Network Design Fall, 2013, Rudra Dutta.
FDDI Network Security.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
David B. Johnson Rice University Department of Computer Science DSR Draft Status Monarch Project 57th IETF.
Transmission Control Protocol A Reliable, Connection-Oriented, Byte-Stream Service Lab 9.
ECE 544 Group Project : Routing KC Huang. Objective Application: message multicast. A message is sent from one sender to 1~3 recipients. Reach a protocol.
COMPUTER NETWORKS CS610 Lecture-22 Hammad Khalid Khan.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Chap. 2 Network Models.
Introduction to ns-2: “The” Network Simulator
© 2002, Cisco Systems, Inc. All rights reserved.
Data and Computer Communications by William Stallings Eighth Edition
Computer Simulation of Networks
Chapter 3: Open Systems Interconnection (OSI) Model
Process-to-Process Delivery:
ECE 544 Group Project : Routing
Technologies and Applications of Computer Networks
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

SRP Algorithm Simulation By:Andrey Klinger Michael Gustus Evgeny Muzikantov Supervisor: Itai Dabran

Introduction

The Spatial Reuse Protocol (SRP) was developed by Cisco for use with ring-based media. It derives its name from the spatial reuse properties of the packet handling procedure. SRP is the underlying technology used in the Cisco Dynamic Packet Transport (DPT) family of products.

Introduction SRP uses a bidirectional dual counter-rotating ring topology. The rings are referred to as "inner" and "outer". Both rings are concurrently utilized for transporting data and SRP control packets. SRP uses a bidirectional dual counter-rotating ring topology. The rings are referred to as "inner" and "outer". Both rings are concurrently utilized for transporting data and SRP control packets.

Introduction Protocol qualities Support of priority trafficSupport of priority traffic Fairness among nodes using the ring (not implemented in this project)Fairness among nodes using the ring (not implemented in this project) Support for ring based redundancy, like wrapSupport for ring based redundancy, like wrap Scalability across a large numberScalability across a large number of nodes attached to a ring

Goals

Our main goal was to learn the SRP protocol and implement it over UDP.Our main goal was to learn the SRP protocol and implement it over UDP.

Goals Protocol implementation tasks: 1.Basic node functionality that includes Layer2 accounting and SRP high/low priority queues. 2.Ring topology discovery. 3.Ring selection algorithm and wrap recovery.

Implementation

The project consists of 2 programs: Node programNode program Master programMaster program

Implementation The Node Sends and receives data packets over wrapped/unwrapped rings.Sends and receives data packets over wrapped/unwrapped rings. Sends and receives topology packets.Sends and receives topology packets. Unicast and Multicast sending.Unicast and Multicast sending. Gathering statistics of it’s behavior.Gathering statistics of it’s behavior.

Implementation The Node consists of 3 modules: 1.Hardware emulation module Layer-2 senders, receivers and buffers. 2.Software emulation module Layer-3 sender/receiver, topology discovery. 3.Testing module Generates traffic according to some schema. Log performance and draw graphs.

Implementation

User Interface

Implementation The Node provides different info about itself: Topology logTopology log Layer-2 Sender and Receiver logsLayer-2 Sender and Receiver logs Statistics logStatistics log Errors logErrors log

Implementation Connects between nodes.Connects between nodes. Changes the throughput of the ring.Changes the throughput of the ring. Changes the topology request timeout for the nodes.Changes the topology request timeout for the nodes. Master Provides simple, user-friendly, graphic interface to control the ring character-istics and its state. Used to set network parameters before and during simulation.

Implementation User Interface

The user guide

There are 2 work modes available: Master mode. Network with Master. All simulator options are available in this mode.Master mode. Network with Master. All simulator options are available in this mode. Node mode. Network without Master. Some options are not available.Node mode. Network without Master. Some options are not available.

The user guide 1.1 Adding nodes to network Run Node application on any computer you want to run it on. The following window appears:

The user guide 1.2 In Master mode After you added all the nodes you wanted to the network, the Master screen will show something like this: Connect

The user guide 2.0 Starting simulation In Master mode click Actions | Run, or if you didn't connect yet: Action | Connect & Run or just press the "GO" button

The user guide 3.0 Choosing testing scheme You can let the network run as it is, with just occasional topology packets being sent.You can let the network run as it is, with just occasional topology packets being sent. You can specify a sending scheme for each node.You can specify a sending scheme for each node. You can give all node same scheme file by opening it at Master (the file canYou can give all node same scheme file by opening it at Master (the file can still specify different schemas for each Node).

The user guide 3.1 Scheme file format

The user guide 4.0 Viewing graphs 4.0 Viewing graphs 6 graphs are shown on each Node: Left sender and right sender.Left sender and right sender. Transmit left low & Transmit right low buffers.Transmit left low & Transmit right low buffers. Transit 2left low buffer & Transit 2right low buffers.Transit 2left low buffer & Transit 2right low buffers.

Changing network options

Forcing wrap In Master mode, double click on a link. It will change link status from Connected (bold green) to Wrapped (dashed red). To remove wrap, double click on the link again.In Master mode, double click on a link. It will change link status from Connected (bold green) to Wrapped (dashed red). To remove wrap, double click on the link again.

Changing network options ThroughputThroughput Limit throughput of each link to given amount of bytes/second. Topology timeoutTopology timeout The time, Node will wait for any topology packet before generating its own, is a random number distributed uniformly between given timeout, and given timeout times 2. Master Options

And now… Lets see some SRP in action…