Network Simulation By Mouse (NSBM): A GUI Approach for Teaching Computer Networks with the ns Simulator

نویسندگان

  • Michael Welzl
  • Muhammad Ali
  • Sven Hessler
چکیده

The ns network simulator is a common tool frequently used for teaching the fundamentals of computer networks. However, our experience with students has shown that writing long ns scripts is not appreciated by them. Hence, we used a custom-made visualization tool — NSBM — where topologies are created using a mouse and then the TCL script is generated automatically. The tool is interactive and has an easy interface to create topologies and define agents and protocols that govern the communication setup. The feedback of students was relatively encouraging as the majority found it to be useful in learning networking fundamentals.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Comparative study of computer simulation softwares

One of the methods for analyzing systems is simulation. Network simulation is a technique that models the behavior of the network by performing transaction calculations between different network entities and using mathematical formulas and taking observations from network products. A network simulator is a piece of software or hardware that predicts the behavior of a computer network without a ...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Practical Approach for Constructing a Parallel Network Simulator

Network simulation is widely used in network research to evaluate the performance of various network protocols and control algorithms. With the development of computer networks, the network models grow in size and complexity, so the execution time of simulation can be unbearably long. In this paper, we present a practical approach to construct a parallel network simulator which is based on the ...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006