2 Simulation program » History » Version 24

MOURA, Ninon, 03/23/2016 12:50 AM

1 2 MERIOCHAUD, Antoine
h3. 2. Simulation program
2 1 MERIOCHAUD, Antoine
3 2 MERIOCHAUD, Antoine
h4. 2.1. Simulation
4 1 MERIOCHAUD, Antoine
5 4 MOURA, Ninon
Insertion des lignes de commandes SANS MODEM sur PEP right:
6 1 MERIOCHAUD, Antoine
7 24 MOURA, Ninon
8 24 MOURA, Ninon
Remote Terminal: ssh connexion
9 1 MERIOCHAUD, Antoine
~
10 1 MERIOCHAUD, Antoine
ssh labo@192.168.0.200
11 24 MOURA, Ninon
~
12 24 MOURA, Ninon
13 24 MOURA, Ninon
Super User Connexion
14 24 MOURA, Ninon
~
15 1 MERIOCHAUD, Antoine
sudo su
16 1 MERIOCHAUD, Antoine
~
17 24 MOURA, Ninon
18 24 MOURA, Ninon
Definition of p5p1 IP adress
19 24 MOURA, Ninon
~
20 3 MOURA, Ninon
ifconfig p5p1 192.168.2.2
21 24 MOURA, Ninon
~
22 24 MOURA, Ninon
23 24 MOURA, Ninon
Definition of p6p1 IP adress
24 24 MOURA, Ninon
~
25 1 MERIOCHAUD, Antoine
ifconfig p5p1 192.168.3.1
26 24 MOURA, Ninon
~
27 3 MOURA, Ninon
28 24 MOURA, Ninon
Add space delay to user interface
29 24 MOURA, Ninon
~
30 1 MERIOCHAUD, Antoine
tc qdisc add dev p5p1 root netem delay 600ms
31 24 MOURA, Ninon
~
32 3 MOURA, Ninon
33 3 MOURA, Ninon
# Test connection and delay
34 3 MOURA, Ninon
# from 192.168.2.1 to 192.168.3.1
35 3 MOURA, Ninon
ping 192.168.3.1 -I 192.168.2.1
36 1 MERIOCHAUD, Antoine
37 24 MOURA, Ninon
Re-routing rule to in order to use PEPSal
38 24 MOURA, Ninon
~
39 1 MERIOCHAUD, Antoine
iptables -t mangle -A PREROUTING -s 192.168.2.1 --proto tcp --tcp-flags ALL SYN -j QUEUE
40 1 MERIOCHAUD, Antoine
iptables -t nat -A PREROUTING -s 192.168.2.1 --proto tcp -j REDIRECT --to-port 5000
41 1 MERIOCHAUD, Antoine
iptables -t mangle -A PREROUTING -d 192.168.3.1 --proto tcp --tcp-flags ALL SYN -j QUEUE
42 3 MOURA, Ninon
iptables -t nat -A PREROUTING -d 192.168.3.1 --proto tcp -j REDIRECT --to-port 5000
43 24 MOURA, Ninon
~
44 3 MOURA, Ninon
45 24 MOURA, Ninon
Display all rules
46 24 MOURA, Ninon
~
47 3 MOURA, Ninon
iptables -t mangle -t nat -L
48 24 MOURA, Ninon
~
49 24 MOURA, Ninon
Proxy PEPSal
50 24 MOURA, Ninon
~
51 24 MOURA, Ninon
pepsal -a 192.168.2.1
52 24 MOURA, Ninon
~
53 3 MOURA, Ninon
54 4 MOURA, Ninon
Then a TCP flow is simulated thanks to the iperf command.
55 1 MERIOCHAUD, Antoine
56 1 MERIOCHAUD, Antoine
57 4 MOURA, Ninon
h4. 2.2. Post processing
58 4 MOURA, Ninon
59 4 MOURA, Ninon
In order to get information on TCP packets, the tcpdump commmand is executed. The save option is run and data are collected in a file.pcap.
60 1 MERIOCHAUD, Antoine
Command is:
61 4 MOURA, Ninon
tcpdump tcp -w fileName.pcap
62 1 MERIOCHAUD, Antoine
63 4 MOURA, Ninon
# Files transfert from PC engine right to local computer
64 4 MOURA, Ninon
scp labo@192.168.0.201:Proj3/*. 
65 14 MOURA, Ninon
66 14 MOURA, Ninon
The file generated by tcpdump command is compatibile with wireshark. Wireshark is a free network protocol analyzer. It lets you see what's happening on your network at a microscopic level. Thanks to this tool, we could compare with and without PEPSal:
67 14 MOURA, Ninon
* throughput,
68 3 MOURA, Ninon
* sequence number packets,
69 1 MERIOCHAUD, Antoine
* windows size evolution.
70 1 MERIOCHAUD, Antoine
71 1 MERIOCHAUD, Antoine
Tests in terms of quality of usage, such as download a web browser, were planed. However due to difficulties in network configuration, those tests will not be run.