Thursday, 4 April 2013

New Wireless Packet Trace Format in NS2


New Wireless Packet Trace Format can be activated by adding following TCL statement in the simulation script :

$ns_ use-newtrace

The new wireless trace format is as follows:

<tag> <tag_value> [-<subtag> <subtag_value>]

where <tag> is a one-letter or two-letter option tag, indicating the meaning of the following <tag_value>. Optionally, <subtag> is the subtag whose value is specified in <subtag_value>. The list of option tags and sub-tags as well as their meaning is given bellow :


General Information :

-t  Time

Node Information(-N?) :

-Ni  Node ID
-Nl  Trace level : AGT/RTR/MAC 

-Ne  Energy Level
-Nx,-Ny,-Nz,-Nw  Node Cordinates

IP Information(-I?):

-Is  Source Port
-It  Packet Type
-If  Flow ID
-Iv  Time to live
-Id  Destination Port
-Il  Packet size
-Ii  Unique ID

Next Hop (-H?):

-Hs  ID of this node

MAC Level Information(-M?):

-Ms  Source Ethernet Address
-Md  Destination Ethernet Address
-Mt  Ethernet Type
-Ma  Packet Transmission Time

Application information-ARP (-P arp -P?):

 -Ps   Source address
 -Pm  Source MAC address
 -Po   Either "REQUEST" or "REPLY"
 -Pd   Destination IP Address
 -Pa   Destination MAC address

 Application information-CBR (-P cbr -P?):

 -Pi    Sequence number
 -Pf          The number of time this picket has been forwarded
 -Po   Min. number of hops to reach the destination as indicated by GOD. The default value when GOD is not in use is -1

 Application information - TCP(-P tcp -P?):

 -Ps   Sequence number
 -Pf    same as that of CBR
 -Pa   Acknowledge number acknowledgement number
 -Po   same as that of CBR

Consider Following Example for explanation of this Format :

 s -t 31.000000000 -Hs 0 -Hd -2 
-Ni 0 -Nx 19.36 -Ny 17.32 -Nz 0.00 -Ne -1.000000 
-Nl AGT -Nw --- -Ma 0 -Md 0 -Ms 0 -Mt 0
-Is 0.0 -Id 1.0 -It tcp -Il 40 -If 2 -Ii 3 -Iv 32 
-Pn tcp -Ps 0 -Pa 0 -Pf 0 -Po 0


  • At 31 second, this record traces Node 0 at the agent AGT level. 
  • Node 0 is located at the coordinate (19.36,17.32,0). 
  • The reasons string (i.e., -Nw) is empty. 
  • The record does not trace the node energy level (-Ne -1). 
  • The packet is sent from the address 0 port 0 to the node with the address 1 port 0. 
  • The packet type is “tcp” whose size is 40 bytes (i.e., this is the SYN packet). 
  • The flow ID is 2. The packet unique ID is 3. 
  • The time to live is 32.
  • This packet has never been forwarded before. The number of hops to destination as indicated by GOD is zero (i.e., GOD is not active).



Thursday, 13 December 2012

Difference Between Virus,Worms,Trojan and Spyware


We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other .

Ok lets start from the introduction of viruses

Virus :- A virus is a self replicating program that attaches itself to an executable file.When the file is executed the virus automatically gets executed and enters into system memory .Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.

Worms : Worms are very similar to viruses but differ in way that they donot bind themselves to executable files instead to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.

Trojan Horse :- A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.

Spyware :- A spyware is a program that secretly monitor and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.These are not limited to just spying but can also send data to remote computers .

Sunday, 28 October 2012

Apache Hadoop

Hadoop, an Apache open-source project, is a framework written in Java for running applications on large clusters of commodity hardware and incorportates features to manage unstructured, semi-structured, and structured data.It is a collection of open-source components built on top of a distributed file system that was designed specifically for very large-scale data operations.

Apache Hadoop detailed Presentation . Download it here. if you want more material then post comments...

Access Blocked Website from any wifi router of colleges



Spotflux harnesses the power of the cloud to conduct millions of real-time checks for invasive tracking, advertisements, malware, and other bugs that pose a threat to your identity or your data.


1. Just enable spotflux and continue enjoying the internet as you always do.
2. Your internet traffic is encrypted and sent through the spotflux cloud.
3. Spotflux's cloud runs millions of calculations to remove ads, tracking cookies, and other things that follow you around the web.
4. Viruses and malware are zapped and destroyed.
5. The location and identity of your devices are concealed.
6. Your connection to the internet is safer, more private, and unrestricted.



Just Download and Install Spotflux utility to access any website from anywhere.