Showcases
navigate_next
Mobility
search
Quick search
code
Show Source
Table Of Contents
Showcases
Emulation
Testing a Linux Routing Daemon in a Simulated Environment
Using Simulated Applications in a Real Network
Using Real Applications in a Simulated Network
Time-Sensitive Networking
Time Synchronization
Clock Drift
Using gPTP
Per-Stream Filtering and Policing
Token Bucket based Policing
Statistical Policing
Peeking Under the Hood
Scheduling and Traffic Shaping
Time-Aware Shaping
Credit-Based Shaping
Asynchronous Shaping
Mixing Different Shapers
Peeking Under the Hood
Automatic Gate Schedule Configuration
Eager Gate Schedule Configuration
SAT-Solver-based Gate Schedule Configuration
TSNsched-based Gate Scheduling
Frame Replication and Elimination for Reliability
Manual Stream Configuration
Automatic Multipath Stream Configuration
Automatic Stream Configuration with Failure Protection
Multicast Streams with Failure Protection
Frame Preemption
Cut-Through Switching
Combining Features
Effects of Time Synchronization on Time-Aware Shaping
Frame Replication with Time-Aware Shaping
In-vehicle Network
Generic
PCAP Recording
Differentiated Services
Measurement
Measuring Channel Throughput
Measuring Channel Utilization
Measuring End-to-end Delay
Measuring Packet Delay Variation
Measuring Transmission Time
Measuring Propagation Time
Measuring Queueing Time
Measuring Residence Time
Measuring Data Rate
Measuring Time Along Packet Flows
Mobility
Mobility Models
Combining Mobility Models
3D Mobility
Routing
Exploring MANET Routing Protocols
Visualization
Visualizing Packet Drops
Visualizing Transport Path Activity
Visualizing Network Path Activity
Visualizing Data Link Activity
Visualizing Physical Link Activity
Visualizing Radio Medium Activity
Visualizing IPv4 Routing Tables
Displaying IP Addresses and Other Interface Information
Visualizing IEEE 802.11 Network Membership
Visualizing Transport Connections
Visualizing the Spectrum of Radio Signals
Visualizing Node Mobility
Instrument Figures
Styling and Appearance
Visualizing Submodule Information
Visualizing Statistics
3D Visualization
Visualizing Network Nodes
Visualizing the Physical Environment
Visualizing Terrain and Urban Environment
Wireless
Path Loss Models
Modeling Directional Antennas
MAC Protocols for Wireless Sensor Networks
IEEE 802.15.4 Smart Home
Power Consumption
Coexistence of IEEE 802.11 and 802.15.4
Wireless Signal Analog Domain Representations
IEEE 802.11 Throughput
IEEE 802.11 Handover
IEEE 802.11 Rate Control
IEEE 802.11 Fragmentation
IEEE 802.11 Quality of Service
IEEE 802.11 Block Acknowledgment
IEEE 802.11 Frame Aggregation
IEEE 802.11 Transmit Opportunity
Packet Loss vs. Distance Using Various WiFi Bitrates
The Hidden Node Problem
Multiple Wireless Interfaces
Crosstalk Between Adjacent IEEE 802.11 Channels
Tutorials
Wireless
Getting Started
Step 1. Two hosts communicating wirelessly
Step 2. Setting up some animations
Step 3. Adding more nodes and decreasing the communication range
Step 4. Setting up static routing
Step 5. Taking interference into account
Step 6. Using CSMA to better utilize the medium
Step 7. Turning on ACKs in CSMA
Step 8. Modeling energy consumption
Step 9. Configuring node movements
Step 10. Configuring ad-hoc routing (AODV)
Step 11. Adding obstacles to the environment
Step 12. Changing to a more realistic radio model
Step 13. Configuring a more accurate path loss model
Step 14. Introducing antenna gain
Conclusion
IPv4 Network Configurator
Getting Started
Step 1. Fully automatic IP address assignment
Step 2. Manually overriding individual IP addresses
Step 3. Automatically assigning IP addresses to a subnet from a given range
Step 4. Fully automatic static routing table configuration
Step 5. Manually overriding individual routes
Step 6. Setting different metric for automatic routing table configuration
Step 7. Configuring a hierarchical network
Step 8. Configuring a mixed wired/wireless network
Step 9. Leaving some part of the network unconfigured
Step 10. Configuring a completely wireless network
Step 11. Manually modifying an automatically created configuration
Step 12. Mixing different kinds of autorouting
Conclusion
Queueing
Getting Started
Active Source - Passive Sink
Passive Source - Active Sink
Enqueueing Packets
Dropping Packets from a Finite Queue
Ordering the Packets in the Queue
Storing Packets on Behalf of Multiple Queues
Priority Classifier
Weighted Round-Robin Classifier
Content-Based Classifier
Markov-Chain-Based Classifier
Generic Classifier
Priority Scheduler
Weighted Round-Robin Scheduler
Content-Based Scheduler
Markov-Chain-Based Scheduler
Generic Scheduler
Priority Buffer
Priority Queue
Building Complex Queues via Composition
Content-Based Filtering (Active Source)
Content-Based Filtering (Active Sink)
Ordinal-Based Dropper
RED Dropper
Time-Based Server
Token-Based Server
Generating Tokens Periodically
Generating Tokens after Received Packets
Generating Tokens When a Queue Becomes Empty
Generating Tokens Based on Received Signals
Limiting the Data Rate of a Packet Stream
Requesting Protocol-Specific Behavior for Packets
Requesting Protocol-Specific Behavior Based on Packet Data
Labeling Packets with Textual Tags
Leaky Bucket
Token Bucket
Delaying Packets
Connecting Multiple Active Sources to a Passive Sink
Connecting a Passive Source to Multiple Active Sinks
Blocking/Unblocking Packet Flow (Active Source)
Blocking/Unblocking Packet Flow (Active Sink)
Duplicating Packets from One Input to One Output
Duplicating Packets Based On Their Ordinal Number
Cloning Packets from One Input To Multiple Outputs
Preventing a Queue from Becoming Empty
Example: Request/Response-Based Communication
Example: Generating Telnet Traffic
Example: Simulating a Transmission Channel
Example: Input Queue Switching
Example: Output Queue Switching
Regression Testing and Fingerprints
Getting Started
About Fingerprint Testing
Easy to Handle Changes
Renaming a Submodule
Renaming a Module Parameter
Changing Packet Length
Changing a Timer
Adding New Events - Part 1
Adding New Events - Part 2
Removing Events
Accepting Fingerprint Changes
User’s Guide
Introduction
Using the INET Framework
Networks
Network Nodes
Network Interfaces
Queueing Model
Applications
Transport Protocols
The IPv4 Protocol Family
IPv6 and Mobile IPv6
Other Network Protocols
Internet Routing
Ad Hoc Routing
Differentiated Services
The MPLS Models
Point-to-Point Links
The Ethernet Model
Time-Sensitive Networking
The 802.11 Model
The 802.15.4 Model
MAC Protocols for Wireless Sensor Networks
Clock Model
The Physical Layer
The Transmission Medium
The Physical Environment
Node Mobility
Modeling Power Consumption
Network Emulation
Network Autoconfiguration
Scenario Scripting
Modeling Node Failures
Packet Filter Expressions
Collecting Results
Visualization
Instrument Figures
Appendix: Author’s Guide
History
Developer’s Guide
Introduction
Working with Packets
Communicating with Tags
Using Sockets
Testing
Appendix: Author’s Guide
Migrating Code from INET 3.x
NED Reference
← Back to the INET Site
Table Of Contents
Showcases
Emulation
Testing a Linux Routing Daemon in a Simulated Environment
Using Simulated Applications in a Real Network
Using Real Applications in a Simulated Network
Time-Sensitive Networking
Time Synchronization
Clock Drift
Using gPTP
Per-Stream Filtering and Policing
Token Bucket based Policing
Statistical Policing
Peeking Under the Hood
Scheduling and Traffic Shaping
Time-Aware Shaping
Credit-Based Shaping
Asynchronous Shaping
Mixing Different Shapers
Peeking Under the Hood
Automatic Gate Schedule Configuration
Eager Gate Schedule Configuration
SAT-Solver-based Gate Schedule Configuration
TSNsched-based Gate Scheduling
Frame Replication and Elimination for Reliability
Manual Stream Configuration
Automatic Multipath Stream Configuration
Automatic Stream Configuration with Failure Protection
Multicast Streams with Failure Protection
Frame Preemption
Cut-Through Switching
Combining Features
Effects of Time Synchronization on Time-Aware Shaping
Frame Replication with Time-Aware Shaping
In-vehicle Network
Generic
PCAP Recording
Differentiated Services
Measurement
Measuring Channel Throughput
Measuring Channel Utilization
Measuring End-to-end Delay
Measuring Packet Delay Variation
Measuring Transmission Time
Measuring Propagation Time
Measuring Queueing Time
Measuring Residence Time
Measuring Data Rate
Measuring Time Along Packet Flows
Mobility
Mobility Models
Combining Mobility Models
3D Mobility
Routing
Exploring MANET Routing Protocols
Visualization
Visualizing Packet Drops
Visualizing Transport Path Activity
Visualizing Network Path Activity
Visualizing Data Link Activity
Visualizing Physical Link Activity
Visualizing Radio Medium Activity
Visualizing IPv4 Routing Tables
Displaying IP Addresses and Other Interface Information
Visualizing IEEE 802.11 Network Membership
Visualizing Transport Connections
Visualizing the Spectrum of Radio Signals
Visualizing Node Mobility
Instrument Figures
Styling and Appearance
Visualizing Submodule Information
Visualizing Statistics
3D Visualization
Visualizing Network Nodes
Visualizing the Physical Environment
Visualizing Terrain and Urban Environment
Wireless
Path Loss Models
Modeling Directional Antennas
MAC Protocols for Wireless Sensor Networks
IEEE 802.15.4 Smart Home
Power Consumption
Coexistence of IEEE 802.11 and 802.15.4
Wireless Signal Analog Domain Representations
IEEE 802.11 Throughput
IEEE 802.11 Handover
IEEE 802.11 Rate Control
IEEE 802.11 Fragmentation
IEEE 802.11 Quality of Service
IEEE 802.11 Block Acknowledgment
IEEE 802.11 Frame Aggregation
IEEE 802.11 Transmit Opportunity
Packet Loss vs. Distance Using Various WiFi Bitrates
The Hidden Node Problem
Multiple Wireless Interfaces
Crosstalk Between Adjacent IEEE 802.11 Channels
Tutorials
Wireless
Getting Started
Step 1. Two hosts communicating wirelessly
Step 2. Setting up some animations
Step 3. Adding more nodes and decreasing the communication range
Step 4. Setting up static routing
Step 5. Taking interference into account
Step 6. Using CSMA to better utilize the medium
Step 7. Turning on ACKs in CSMA
Step 8. Modeling energy consumption
Step 9. Configuring node movements
Step 10. Configuring ad-hoc routing (AODV)
Step 11. Adding obstacles to the environment
Step 12. Changing to a more realistic radio model
Step 13. Configuring a more accurate path loss model
Step 14. Introducing antenna gain
Conclusion
IPv4 Network Configurator
Getting Started
Step 1. Fully automatic IP address assignment
Step 2. Manually overriding individual IP addresses
Step 3. Automatically assigning IP addresses to a subnet from a given range
Step 4. Fully automatic static routing table configuration
Step 5. Manually overriding individual routes
Step 6. Setting different metric for automatic routing table configuration
Step 7. Configuring a hierarchical network
Step 8. Configuring a mixed wired/wireless network
Step 9. Leaving some part of the network unconfigured
Step 10. Configuring a completely wireless network
Step 11. Manually modifying an automatically created configuration
Step 12. Mixing different kinds of autorouting
Conclusion
Queueing
Getting Started
Active Source - Passive Sink
Passive Source - Active Sink
Enqueueing Packets
Dropping Packets from a Finite Queue
Ordering the Packets in the Queue
Storing Packets on Behalf of Multiple Queues
Priority Classifier
Weighted Round-Robin Classifier
Content-Based Classifier
Markov-Chain-Based Classifier
Generic Classifier
Priority Scheduler
Weighted Round-Robin Scheduler
Content-Based Scheduler
Markov-Chain-Based Scheduler
Generic Scheduler
Priority Buffer
Priority Queue
Building Complex Queues via Composition
Content-Based Filtering (Active Source)
Content-Based Filtering (Active Sink)
Ordinal-Based Dropper
RED Dropper
Time-Based Server
Token-Based Server
Generating Tokens Periodically
Generating Tokens after Received Packets
Generating Tokens When a Queue Becomes Empty
Generating Tokens Based on Received Signals
Limiting the Data Rate of a Packet Stream
Requesting Protocol-Specific Behavior for Packets
Requesting Protocol-Specific Behavior Based on Packet Data
Labeling Packets with Textual Tags
Leaky Bucket
Token Bucket
Delaying Packets
Connecting Multiple Active Sources to a Passive Sink
Connecting a Passive Source to Multiple Active Sinks
Blocking/Unblocking Packet Flow (Active Source)
Blocking/Unblocking Packet Flow (Active Sink)
Duplicating Packets from One Input to One Output
Duplicating Packets Based On Their Ordinal Number
Cloning Packets from One Input To Multiple Outputs
Preventing a Queue from Becoming Empty
Example: Request/Response-Based Communication
Example: Generating Telnet Traffic
Example: Simulating a Transmission Channel
Example: Input Queue Switching
Example: Output Queue Switching
Regression Testing and Fingerprints
Getting Started
About Fingerprint Testing
Easy to Handle Changes
Renaming a Submodule
Renaming a Module Parameter
Changing Packet Length
Changing a Timer
Adding New Events - Part 1
Adding New Events - Part 2
Removing Events
Accepting Fingerprint Changes
User’s Guide
Introduction
Using the INET Framework
Networks
Network Nodes
Network Interfaces
Queueing Model
Applications
Transport Protocols
The IPv4 Protocol Family
IPv6 and Mobile IPv6
Other Network Protocols
Internet Routing
Ad Hoc Routing
Differentiated Services
The MPLS Models
Point-to-Point Links
The Ethernet Model
Time-Sensitive Networking
The 802.11 Model
The 802.15.4 Model
MAC Protocols for Wireless Sensor Networks
Clock Model
The Physical Layer
The Transmission Medium
The Physical Environment
Node Mobility
Modeling Power Consumption
Network Emulation
Network Autoconfiguration
Scenario Scripting
Modeling Node Failures
Packet Filter Expressions
Collecting Results
Visualization
Instrument Figures
Appendix: Author’s Guide
History
Developer’s Guide
Introduction
Working with Packets
Communicating with Tags
Using Sockets
Testing
Appendix: Author’s Guide
Migrating Code from INET 3.x
NED Reference
← Back to the INET Site
Mobility
¶
These showcases demonstrate mobility support of INET:
Mobility Models
Combining Mobility Models
3D Mobility
Previous
Measuring Time Along Packet Flows
Next
Mobility Models