2 Simulation program » History » Version 37
MOURA, Ninon, 03/23/2016 09:55 AM
1 | 2 | MERIOCHAUD, Antoine | h3. 2. Simulation program |
---|---|---|---|
2 | 1 | MERIOCHAUD, Antoine | |
3 | 2 | MERIOCHAUD, Antoine | h4. 2.1. Simulation |
4 | 1 | MERIOCHAUD, Antoine | |
5 | 29 | MOURA, Ninon | First simulation as been run without modem. |
6 | 1 | MERIOCHAUD, Antoine | |
7 | 37 | MOURA, Ninon | # Step 1. |
8 | 36 | MOURA, Ninon | Line commands to configure the PC engines are described in part II.3. It must be done for both PC engines. |
9 | 29 | MOURA, Ninon | |
10 | 1 | MERIOCHAUD, Antoine | On user interface only. |
11 | 37 | MOURA, Ninon | # Step 4. Addition of space delay to user interface (p5p1) |
12 | 35 | MOURA, Ninon | @tc qdisc add dev p5p1 root netem delay 300ms @ |
13 | 1 | MERIOCHAUD, Antoine | |
14 | 37 | MOURA, Ninon | # Step 5. Test connection and delay from 192.168.2.1 to 192.168.3.1 |
15 | 35 | MOURA, Ninon | @ping 192.168.3.1 -I 192.168.2.1@ |
16 | 35 | MOURA, Ninon | |
17 | 37 | MOURA, Ninon | # Step 6. Implementation of routing rules in order to use PEPSal. Indeed PEPSal uses port 5000, consequently TCP flow must be redirected on this port. |
18 | 35 | MOURA, Ninon | @ |
19 | 1 | MERIOCHAUD, Antoine | iptables -t mangle -A PREROUTING -s 192.168.2.1 --proto tcp --tcp-flags ALL SYN -j QUEUE |
20 | 24 | MOURA, Ninon | iptables -t nat -A PREROUTING -s 192.168.2.1 --proto tcp -j REDIRECT --to-port 5000 |
21 | 3 | MOURA, Ninon | iptables -t mangle -A PREROUTING -d 192.168.2.1 --proto tcp --tcp-flags ALL SYN -j QUEUE |
22 | 24 | MOURA, Ninon | iptables -t nat -A PREROUTING -d 192.168.2.1 --proto tcp -j REDIRECT --to-port 5000 |
23 | 35 | MOURA, Ninon | @ |
24 | 24 | MOURA, Ninon | |
25 | 24 | MOURA, Ninon | Display all rules to verify |
26 | 35 | MOURA, Ninon | @iptables -t mangle -t nat -L@ |
27 | 26 | MOURA, Ninon | |
28 | 28 | MOURA, Ninon | Step 7 Execution of PEPSal on port |
29 | 35 | MOURA, Ninon | @pepsal -a 192.168.2.1@ |
30 | 24 | MOURA, Ninon | |
31 | 1 | MERIOCHAUD, Antoine | Then a TCP flow is simulated thanks to the iperf command. |
32 | 4 | MOURA, Ninon | |
33 | 4 | MOURA, Ninon | |
34 | 4 | MOURA, Ninon | h4. 2.2. Post processing |
35 | 1 | MERIOCHAUD, Antoine | |
36 | 4 | MOURA, Ninon | In order to get information on TCP packets, the tcpdump commmand is executed. The save option is run and data are collected in a file.pcap. |
37 | 1 | MERIOCHAUD, Antoine | Command is: |
38 | 35 | MOURA, Ninon | @tcpdump tcp -w fileName.pcap@ |
39 | 31 | MOURA, Ninon | |
40 | 1 | MERIOCHAUD, Antoine | Files transfert from PC engine right to local computer as following: |
41 | 35 | MOURA, Ninon | @ scp labo@192.168.0.201:Proj3/*. @ |
42 | 14 | MOURA, Ninon | |
43 | 14 | MOURA, Ninon | The file generated by tcpdump command is compatibile with wireshark. Wireshark is a free network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Thanks to this tool, we could compare with and without PEPSal: |
44 | 14 | MOURA, Ninon | * throughput, |
45 | 3 | MOURA, Ninon | * sequence number packets, |
46 | 1 | MERIOCHAUD, Antoine | * windows size evolution. |
47 | 1 | MERIOCHAUD, Antoine | |
48 | 1 | MERIOCHAUD, Antoine | Tests in terms of quality of usage, such as download a web browser, were planed. However due to difficulties in network configuration, those tests will not be run. |