OMNET++ Execution: Installation, Setting up the Project, Simulation Program's Launch, Protocol for Message Conversation, Research Question, Protocols, Communication Process

Verified

Added on  2023/06/09

|21
|3492
|61
AI Summary
This article provides a step-by-step guide to install OMNET++ 4.6 on Windows 7 Ultimate 32-bit and set up the project. It also explains the protocol for message conversation and research questions. Additionally, it explores the communication process and protocols used in the network.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
OMNET++ EXECUTION

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Software versions
OMNET : OMNETPP-4.6.
JDK : JDK 1.8.
OS : WINDOWS
2. Installation procedure
Step 1: check your os version help the command is “dxdiag
Click “ok” button
1
Document Page
Os is windows 7 ultimate 32-bit Network
Step 2: download the omnet 4.6 win32 version from online help the link is
https://omnetpp.org/omnetpp/summary/30-omnet-releases/2291-omnet-4-6-win32-source-
ide-mingw-zip
Click download button
2
Document Page
Step 3: download completed after extract the file into c:\\
Extract the file into c:\
3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Extract the file into c:\
Extracting the file…
Step 4: extracting process completed after go to omnet install address (c:\omnetpp-4.6)
to select and double click “mingwenv.cmd” file
4
Document Page
Double click “mingwenv.cmd” file
Ask security warning so click “run” to proceed
Click “run” to proceed
Step 5: next type 3 commands to install omnetpp into your Network, there are
1) . Setenv
2) ./configure
3) make
5
Document Page
Omnet++ installation
Step 6: command 1 is “. Setenv”
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Your path contains is “good” means proceed the next step else fix the error
Step 8: the final command is “make”
7
Document Page
Install omnet 4.6 is completed after start the omnet ide type the command “omnetpp”
8
Document Page
Install omnet 4.6 is completed after start the omnet ide type the command “omnetpp”
Starting omnet ide..
9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
3. Setting up the project
Start the OMNeT++ IDE by typing omnetpp in your terminal. Once in the IDE,
choose New -> OMNeT++ Project from the menu.
4. Adding a C++ files
Open a Files by choosing File--Open---- Source Files
5. Simulation program’s Launch
After all the above mentioned steps are completed, the simulation can be
launched with the selection of %omnetpp.ini (either the editor area or the Project
Explorer). Then, press on the button stating, Run.
10
Document Page
Output Screenshots
6. Protocol for Message Conversation
Conveying Messages
Solitary communication is a principle. For example, the music video or the email
message, can be sent over the Network from the source to the destination as one enormous
persistent stream of bits. If the messages were really sent via this way, it implies that no other
device will contain the capacity of sending or receiving the messages on a similar Network,
when this information movement was processing. Such vast floods of information will end up
with huge delays. Then, in case the interconnected Network framework‘s connection failed
during transmission, there are possibilities of losing the total message and this message has to
be fully retransmitted. A superior method includes separating the information into small and
highly sensible pieces for sending over the Network. Such a division of information stream
into little parts is known as division. Sectioning messages contains a couple of essential
advantages. To start with, by sending the individual smaller pieces from the source to the
destination, on the Network a wide range of discussions could be interleaved. The procedure
11
Document Page
utilized for interleaving the bits of independent discussions together on the Network is
referred as multiplexing. The second division could build the unwavering quality of the
Network communication. The different bits of every single message requires no venture to
every part of a similar pathway over the Network from source to destination. On the off
chance that a specific way winds up congested with information movement or comes up
short, singular bits of the message can in any case be coordinated with the destination
utilizing the exchange pathways. If that piece of the message neglects reaching the
destination, just the parts that are missing should be restransmitted.
All communication, regardless of whether up close and personal or over a Network, is
administered by foreordained guidelines called conventions. These conventions are particular
to the attributes of the discussion. In our everyday individual communication, the standards
we use to impart more than one medium, similar to a phone call, are not really the same as
the conventions for utilizing another medium, for example, sending a letter. Consider what
number of various principles or conventions oversee all the distinctive strategies for
communication that exist on the planet today. Effective communication between has on a
Network requires the connection of a wide range of conventions. A gathering of between
related conventions that are important to play out a communication work is known as a
convention suite. These conventions are executed in programming and equipment that is
12

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
stacked on each host and Network device. Outstanding amongst other approaches to picture
how the majority of the conventions communicate on a specific host is to see it as a stack. A
convention stack indicates how the individual conventions inside the suite are executed on
the host. The conventions are seen as a layered chain of command, with each more elevated
amount benefit contingent upon the usefulness characterized by the conventions appeared in
the lower levels. The lower layers of the stack are worried about moving information over the
Network and giving administrations to the upper layers, which are centred on the substance
of the message being sent and the UI.
Encryption and Decryption
A critical angle in the empire of software improvement is the security of information
that moves through open correspondence channels. In our web applications, there is a
concentrated trade of information by means of various conventions, similar to http, between
customer applications which exhibited as program, versatile and work area applications and
server side applications. The significance and secrecy of information might be distinctive
relying upon the specifics of the web application, and the likelihood of block attempt by an
outsider increments with flawlessness of hacking methods in its realm. The AES and RSA
calculations are being utilized. Web Socket was picked as informing convention. In the
meantime it's the quickest informing form between the backend and front-end, it composes
less code upkeep and focus on the procedure of encryption. RSA is a lopsided encryption
calculation, in light of utilizing open and private keys. A message is scrambled utilizing an
open key and can be decoded just with a private key. The general population key might be
accessible to all framework clients, and private ought to be kept classified in a scrambled
shape. Not at all like symmetric encryption, asymmetric encryption is an overwhelming
activity and requires critical processing power. Likewise there is a farthest point on message
length which can be encoded utilizing an awry calculation relying upon a key length.
Normally, this calculation is utilized to acquire a key of the symmetric encryption
calculations by which an encryption happens after, and for computerized testaments marking.
13
Document Page
Processes
Client decrypts the message and composes it on screen. At that point RSA
scrambled message sends to backend.
Backend decrypts RSA message from a customer and log it into support.
Server produces AES key, and sends it a customer.
Client decrypts RSA encoded AES key, logs it on screen. Customer sends
AES scrambled message to a server.
Server decodes AES message from customer and logs it on comfort. Server
sends AES scrambled message to customer.
Client decodes AES message and it is signed on screen.
7. Research Question
1. Identify the security concerns and problems the paper addresses?
2. Identify the kind of faults?
3. Define formalize the new technologies and applications to secure a vehicular social
network?
4. Define the security performance metrics?
5. Develop the methodology and process for developing the vehicular social network?
6. What kind of QoS monitoring tools needs to be developed?
7. What mechanisms needs to be developed to control processes?
8. Protocols
14
Document Page
This paper needs to use the following protocols to secure, Privacy and Trust Framework for
Vehicular Social Network. These are,
Communication Protocols
Broadcasting Protocols
Counter based protocols
Address based Protocols
Network coding aided broadcasting protocols
Standards that Govern Communications
All correspondence, regardless of whether up close and personal or over a Network, is
administered by foreordained tenets called conventions. These conventions are particular to
the qualities of the discussion. In our everyday individual correspondence, the principles we
use to convey more than one medium, similar to a phone call, are not really similar to
conventions for utilizing the other medium. For example, letter sending. Consider what
number of various standards or conventions oversee all the distinctive techniques for
correspondence that exist on the planet today. Effective correspondence between contains the
Network which needs connection of various conventions. Gathering of between related
conventions that are important to play out correspondence work is known as a convention
suite. These conventions are actualized in the programming and equipment which are stacked
on each host and Network device. Outstanding amongst other approaches to envision how the
majority of the conventions interface on the specific host for viewing as the stack. The
convention stack demonstrates how an individual convention inside the suite is actualized on
the host. Conventions are seen as layered chain of command, where each one has more
elevated amount of benefit contingent upon the usefulness characterized by the conventions
appeared in the lower levels. Stack’s lower layers are worried about moving information over
the Network, then for the upper layers it gives administration. These layers are middleed on
the substance of the message that is being sent and the UI.
Utilizing layers for depicting up close and personal correspondence
For instance, consider two individuals conveying up close and personal. As illustrated
in the figure, it is possible to utilize 3 layers for depicting this movement. The physical layer,
at the base layer contains a couple of individuals, where each one has a voice which could
express the words so anyone might hear. Then, at the next layer, the tenets layer, contains a
consent for talking about the typical dialect. Whereas, at the layer which is best, the substance
layer, the words really talked on the correspondence. If the discussion is observed, it is noted
that we will not really observe the "layers" skimming in the space. It must be understood that
15

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
the utilization of layers refers to a model and, all things are considered. It provides an
approach for helpfully breaking the perplexing assignment into the parts and depicts how the
function actually takes place.
Protocols of the Network
At human level, certain correspondence rules are considered as formal and the others are just
comprehended, or certain, in view of custom and practice. For the devices to effectively
impart, the Network convention suite has to portray exact necessities as well as the
collaborations. Networks administration convention suites depict procedures, for example,
The organization or the message’s structure.
Strategy which organizes the devices shares the data related to the
pathways with different Networks.
When and how the blunder and the framework messages are passed among
the devices.
The information’s setup and end exchange sessions.
Singular conventions in a convention suite might be merchant particular and exclusive.
Restrictive, in such a unique situation, implies the one organization or the merchant controls
which shows the meaning of the convention and it capacities. Certain restrictive conventions
could be utilized by various associations with authorization from the proprietor. The others
must be actualized on hardware fabricated by an exclusive seller.
The Protocols’ Interaction
A case of utilization of the convention suite in an arranged correspondence refers to a
collaboration among the web server and the internet browser. Such an association utilizes
various conventions and gauges during the time spent trading data between them. The diverse
conventions cooperate to guarantee that the messages are gotten and comprehended by the
two gatherings. Precedents of such conventions includes:
Application Protocol
The Hypertext Transfer Protocol (HTTP) denotes the typical convention which
oversees the method that the web server and the web client cooperates. The HTTP
characterizes the substances and arranges the solicitations and reactions traded among the
client and the server. The client and the web server programming actualizes the HTTP as a
major aspect of the application. HTTP convention depends on the different conventions for
overseeing the process of transporting the messages among the client and the server.
Transport Protocol
16
Document Page
The Transmission Control Protocol (TCP) refers to a vehicle convention which deals
with individual discussions among the web server and the web client. The TCP isolates the
messages of HTTP into smaller parts known as sections, for sending it to the client’s
destination. Likewise, it is in-charge to control the rate and the size, at which the messages
are traded among the client and the server.
Internetwork Protocol
The Internet Protocol (IP) is the well-known internetwork convention. It is in-charge
to take the designed sections from the TCP, typifying them into bundles, appointing the
fitting addresses. Then it chooses the best way for meeting the destination.
Network Access Protocols
Network get to conventions portrays a couple of important capacities as follows, the
administration of information interface and on the media the information’s physical
transmission. From the IP, the Information interface administration conventions takes the
parcels and arranges them to be transmitted over the media. Norms and conventions for the
physical media administer how the signs are sent over the media and how they are deciphered
by the accepting clients. For the media, on the Network interface cards, the handsets execute
proper norms which are being utilized.
Communication Process
TCP/IP display depicts the usefulness of conventions which makes TCP/IP convention suite.
Such conventions are actualized on both sending the host and for accepting the hosts, then it
collaborates to give end-to-end conveyance of the uses over the Network.
An entire correspondence process incorporates which means the following:
At the application layer, the Information production, the starting source of the end
device.
Division and exemplification of information as it goes down the convention stack
in the source end device.
At the Network, the information’s Age on the media gets to the stack layer.
The information transportation via, internetwork comprises of media and any go-
between devices.
Information gathering at the Network gets to the destination layer of the end
device.
De-capsulation and reassembly of the information as it leaves behind the stack in
the destination device
17
Document Page
Passing this information to the destination application at the Application layer of
the destination end device
While the system’s messages are being sent, the convention stack on a host’s work
starts to finish it. In the web server precedent, the TCP/IP model is utilized for showing the
way toward sending the HTML page to the client. Application layer convention, HTTP, starts
the procedure by conveying the HTML arranged site page information to the Transport layer.
There, the application information are split into the TCP portions. Every TCP section is
provided a mark known as, header, where it contains the data of which is the running process
on the destination PC that must receive the message. It likewise contains the data to empower
the destination procedure to reassemble the information back to its unique arrangement. The
Transport layer exemplifies the site page HTML information inside the fragment and sends it
to the Internet layer, where the IP convention is executed. Here the whole TCP section is
epitomized inside an IP bundle, which includes another mark, called the IP header. The IP
header contains source and destination have IP addresses, and also data important to convey
the bundle to its relating destination process. Next, the IP parcel is sent to the Network
Access layer Ethernet convention where it is exemplified inside a casing header and trailer.
Each casing header contains a source and destination physical address. The physical address
interestingly distinguishes the devices on the neighbourhood arrange. The trailer contains
mistake checking data. At long last the bits are encoded onto the Ethernet media by the server
NIC.
9. Attacks
9.1 Replay attack
A replay assault happens when an aggressor duplicates a flood of messages between two
gatherings and replays the stream to at least one of the gatherings. Except if moderated, the
PCs subject to the assault will process the stream as authentic messages, bringing about a
scope of awful outcomes, for example, excess requests of a thing. Replay assaults are utilized
for access or change assaults. This can likewise happen security testaments from frameworks,
for example, Kerberos. The assailant resubmits the endorsement, wanting to be approved by
the confirmation framework, and go around whenever affectability.
18

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
9.2 Man in middle attack
A man-in-the-middle assault is a sort of digital assault where a noxious on-screen
character embeds herself into a discussion between two gatherings, imitates the two
gatherings and accesses data that the two gatherings were attempting to send to one another.
A man-in-the-middle assault enables a malignant on-screen character to capture, send and get
information implied for another person, or not intended to be sent by any means, without
either outside gathering knowing until the point that it is past the point of no return.
A MITM assault happens when a correspondence between two frameworks is blocked by
an outside element. This can occur in any type of online correspondence, for example, email,
internet based life, web surfing, and so forth. In addition to the fact that they are attempting to
listen in on your private discussions, they can likewise focus on all the data inside your
gadgets.
9.3 Reflection attack
Reflection assault is a technique for assaulting a test reaction verification framework that
uses a similar convention in the two bearings. That is, a similar test reaction convention is
utilized by each side to confirm the opposite side. The basic thought of the assault is to trap
the objective into giving the solution to its very own test.
19
Document Page
9.4 Impersonation attack
Impersonation assaults are propelled by utilizing other hub's character, for example,
MAC or IP address. Impersonation assaults in some cases are the initial step for most
assaults, and are utilized to dispatch further, more advanced assaults. In all actuality remote
systems need proper security framework, and give potential assailants simple transport
medium access. Maverick remote passageways merit specific consideration since they are not
approved for activity. They are normally introduced either by representatives or by
programmers. Consideration has been paid to discovering mavericks by utilizing: Wireless
sniffing instruments, strolling through offices and searching for passages that have approved
Medium Access Control (MAC) addresses, seller name, or security design. A focal comfort
joined to the wired side of the system for observing, a free Transmission Control Protocol
(TCP) port scanner that distinguishes empowered TCP ports. Exactly when source send any
message to particular focuses inside the structure then that debilitating focus additionally
recoup that rub and misused all the data Impersonation strike is key driver of plotting assault
in which exchanged off center imbued toxic center point into the framework likewise make
number of imitated copy of vindictive center for doing future attacks all in all framework.
20
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]