2 Simulation program » History » Version 5
MOURA, Ninon, 03/23/2016 12:19 AM
1 | 2 | MERIOCHAUD, Antoine | h3. 2. Simulation program |
---|---|---|---|
2 | 1 | MERIOCHAUD, Antoine | |
3 | 2 | MERIOCHAUD, Antoine | h4. 2.1. Simulation |
4 | 1 | MERIOCHAUD, Antoine | |
5 | 4 | MOURA, Ninon | Insertion des lignes de commandes SANS MODEM sur PEP right: |
6 | 1 | MERIOCHAUD, Antoine | |
7 | 5 | MOURA, Ninon | # Remote Terminal: ssh connexion |
8 | 5 | MOURA, Ninon | ssh labo@192.168.0.200 |
9 | 5 | MOURA, Ninon | # Super User Connexion |
10 | 5 | MOURA, Ninon | sudo su |
11 | 3 | MOURA, Ninon | |
12 | 3 | MOURA, Ninon | # Definition of p5p1 IP adress |
13 | 3 | MOURA, Ninon | ifconfig p5p1 192.168.2.2 |
14 | 3 | MOURA, Ninon | # Definition of p6p1 IP adress |
15 | 3 | MOURA, Ninon | ifconfig p5p1 192.168.3.1 |
16 | 3 | MOURA, Ninon | |
17 | 3 | MOURA, Ninon | # Add space delay to user interface |
18 | 3 | MOURA, Ninon | tc qdisc add dev p5p1 root netem delay 600ms |
19 | 3 | MOURA, Ninon | |
20 | 3 | MOURA, Ninon | # Test connection and delay |
21 | 3 | MOURA, Ninon | # from 192.168.2.1 to 192.168.3.1 |
22 | 3 | MOURA, Ninon | ping 192.168.3.1 -I 192.168.2.1 |
23 | 3 | MOURA, Ninon | |
24 | 3 | MOURA, Ninon | # Re-routing rule to in order to use PEPSal |
25 | 3 | MOURA, Ninon | iptables -t mangle -A PREROUTING -s 192.168.2.1 --proto tcp --tcp-flags ALL SYN -j QUEUE |
26 | 3 | MOURA, Ninon | iptables -t nat -A PREROUTING -s 192.168.2.1 --proto tcp -j REDIRECT --to-port 5000 |
27 | 3 | MOURA, Ninon | iptables -t mangle -A PREROUTING -d 192.168.3.1 --proto tcp --tcp-flags ALL SYN -j QUEUE |
28 | 3 | MOURA, Ninon | iptables -t nat -A PREROUTING -d 192.168.3.1 --proto tcp -j REDIRECT --to-port 5000 |
29 | 3 | MOURA, Ninon | |
30 | 3 | MOURA, Ninon | # Display all rules |
31 | 3 | MOURA, Ninon | iptables -t mangle -t nat -L |
32 | 3 | MOURA, Ninon | |
33 | 3 | MOURA, Ninon | # Proxy PEPSal |
34 | 1 | MERIOCHAUD, Antoine | # pepsal -a 192.168.2.1 |
35 | 3 | MOURA, Ninon | |
36 | 4 | MOURA, Ninon | Then a TCP flow is simulated thanks to the iperf command. |
37 | 3 | MOURA, Ninon | |
38 | 4 | MOURA, Ninon | |
39 | 1 | MERIOCHAUD, Antoine | h4. 2.2. Post processing |
40 | 1 | MERIOCHAUD, Antoine | |
41 | 4 | MOURA, Ninon | In order to get information on TCP packets, the tcpdump commmand is executed. The save option is run and data are collected in a file.pcap. |
42 | 4 | MOURA, Ninon | Command is: |
43 | 4 | MOURA, Ninon | tcpdump tcp -w fileName.pcap |
44 | 1 | MERIOCHAUD, Antoine | |
45 | 4 | MOURA, Ninon | # Files transfert from PC engine right to local computer |
46 | 1 | MERIOCHAUD, Antoine | scp labo@192.168.0.201:Proj3/*. |
47 | 4 | MOURA, Ninon | |
48 | 4 | MOURA, Ninon | The file generated by tcpdump command is compatibile with wireshark. Wireshark is a free network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Thanks to this tool, we could compare with and without PEPSal: |
49 | 4 | MOURA, Ninon | - throughput, |
50 | 4 | MOURA, Ninon | - sequence number packets, |
51 | 4 | MOURA, Ninon | - windows size evolution. |
52 | 3 | MOURA, Ninon | |
53 | 1 | MERIOCHAUD, Antoine | Tests in terms of quality of usage, such as download a web browser, were planed. However due to difficulties in network configuration, those tests will not be run. |