Error!!

340 views
Skip to first unread message

khamd...@gmail.com

unread,
Feb 6, 2018, 1:46:10 PM2/6/18
to Network Simulator 2 (NS2)
INITIALIZE THE LIST xListHead
 (_o329 cmd line 1)
    invoked from within
"_o329 cmd wormhole-peer _o351"
    invoked from within
"catch "$self cmd $args" ret"
    invoked from within
"if [catch "$self cmd $args" ret] {
set cls [$self info class]
global errorInfo
set savedInfo $errorInfo
error "error when calling class $cls: $args" $..."
    (procedure "_o329" line 2)
    (SplitObject unknown line 2)
    invoked from within
"[$n14 set ll_(0)] wormhole-peer [$n15 set ll_(0)]"
    (file "worm-16.tcl" line 171)


Help me with this error.

knudfl

unread,
Feb 6, 2018, 2:29:20 PM2/6/18
to Network Simulator 2 (NS2)
The file "worm-16.tcl" is a wormhole simulation. Can be run with an unmodified 'ns' :

$ ns-orig worm-16.tcl

Or with a byzantine-attacs modified ns2  ( ns-2.29 )  :
$ ns229-ByzantineAttacs-el6 worm-16.tcl

To run the attack example, wormhole-Mellia.tcl  → wormhole-ex.tar.gz
https://drive.google.com/file/d/1P9o4lpyJviyDQfVnFQA52zMKvDtThNiP/view?usp=sharing
... you can install an ns2 application, for your OS ....
1) byzantine-attacks-ns_2.29-ubuntu16_amd64.deb or 2) byzantine-attacks-ns-2.29-1.x86_64.rpm
Links
1) https://drive.google.com/file/d/11xo7eUhvipfrn3CNHA8-Dg7gari4_tFs/view?usp=sharing
2) https://drive.google.com/file/d/1o94Y945iwj9CK4sfSc1TwBxI4dg3vvwi/view?usp=sharing
..... both providing /usr/local/bin/ns229-ByzantineAttacs-el6

All ns2 examples https://drive.google.com/drive/folders/0B7S255p3kFXNSmRYb2lGcDRUdWs?usp=sharing
All ns2 patches https://drive.google.com/drive/folders/0B7S255p3kFXNZ2lWZDBRSW40Q00?usp=sharing
worm-16.tcl_nam.jpg
Message has been deleted

khamd...@gmail.com

unread,
Feb 7, 2018, 12:37:27 AM2/7/18
to Network Simulator 2 (NS2)
Thank you very much sir.
How do we calculate the Round Trip Time(RTT) for a single node?

knudfl

unread,
Feb 7, 2018, 8:21:06 AM2/7/18
to Network Simulator 2 (NS2)
May be some hints with Google ....
https://www.google.com/webhp?hl=all&gws_rd=ssl#hl=en&q=ns2+Round+Trip+Time

Example http://www.engr.iupui.edu/~dskim/tutorials/print.php?article=ns2
Quote
578:   immediately, so that the round-trip-time can be calculated.
599:   calculate the round-trip-time.
735:   called, with the id of the pinged node and the round-trip-time (in
820:              $from with round-trip-time $rtt ms."
Message has been deleted

knudfl

unread,
Feb 7, 2018, 8:30:46 AM2/7/18
to Network Simulator 2 (NS2)
The ns-Tutorial is attached with line numbers ...
 http://www.engr.iupui.edu/~dskim/tutorials/print.php?article=ns2

cat-n__ns-Tutorial.txt

khamd...@gmail.com

unread,
Feb 7, 2018, 11:17:36 AM2/7/18
to Network Simulator 2 (NS2)
Thanks a lot, sir.

Tania Almira

unread,
Mar 26, 2018, 2:11:33 AM3/26/18
to Network Simulator 2 (NS2)


On Wednesday, February 7, 2018 at 8:30:46 PM UTC+7, knudfl wrote:
The ns-Tutorial is attached with line numbers ...
 http://www.engr.iupui.edu/~dskim/tutorials/print.php?article=ns2

Thanks for your sharing sir. i wanna ask somethin about worm-16.tcl, in this file we know that wormhole is created in n14 and n15. But why when we run the file, wormhole is just passing n14 and n9 not n15. can you explain the analogy in worm-16.tcl? thank you 

knudfl

unread,
Mar 26, 2018, 4:53:18 AM3/26/18
to Network Simulator 2 (NS2)
@Tania Almira ,   Hi.

A guess :  No specific communication is set for `node 15´.
... It's your choice if you want to edit any example ... to any different behavior.
  • The edited worm-16.tcl is attached as 15worm-16.tcl
15worm-16.tcl

Tania Almira

unread,
Mar 26, 2018, 6:06:04 AM3/26/18
to Network Simulator 2 (NS2)
thanks for the reply sir :)

I want to ask, for a wormhole attack does not it need two malicious nodes? but in the worm-16.tcl source code when the wormhole is enabled the packet passed only through nodes 12, 14, 9, and 13. It means that the malicious nodes are nodes 14 and 9. whereas in source code it is written that the malicious node are nodes 14 and 15. can you help me to understand the purpose of the source code? And is there any file that i must edited if i want to implement wormhole in my file .tcl? 


Thank you sir

knudfl

unread,
Mar 26, 2018, 6:27:20 AM3/26/18
to Network Simulator 2 (NS2)
@Tania Almira.

»» source code it is written that the malicious node are nodes 14 and 15 «« :
Please do not use the random words "source code", but tell which file you are now talking about.
.. And files have line numbers : Please specify.

And : No matter which node you set for something →
If this node isn't used for send or receive, why expect any traffic / any events ?

walid zizo

unread,
Mar 27, 2018, 10:30:23 AM3/27/18
to Network Simulator 2 (NS2)
Hello everyone
how to make a node wait for all the RREPs for the analyzes
And thank you in advance

testi...@gmail.com

unread,
May 5, 2019, 12:40:17 AM5/5/19
to Network Simulator 2 (NS2)

Hello sir, I want to ask, I have edited the file section NS-2.35 - mac looks at sources like that for wormholes, and uses AODV routing protocol, do I have to change for the AODV.cc and AODV.h, is it not ? and send my .tcl, if the # sign I remove to activate the wormhole is an error in that section, if using # it runs normally but the attack is inactive because it is added #


pliss help me thanks 
2worm14.tcl

knudfl

unread,
May 5, 2019, 6:59:26 AM5/5/19
to Network Simulator 2 (NS2)
[$n14 set ll_(0)] wormhole-peer [$n15 set ll_(0)]
#[$n15 set ll_(0)] wormhole-peer [$n14 set ll_(0)]

One "wormhole" is supposed to work. (Line 173) . 
Line 174 is commented out with " # ".  For unknown reasons.

Please redo your question : Split up "the one long line not quite clear text" →
Like ....
I have edited the file section NS-2.35/mac/.
... looks at sources like that for wormholes,  and uses AODV routing protocol.
Do I have to change for the AODV.cc and AODV.h ?

If the # sign I remove to activate the wormhole is an error in that section.
if using # it runs normally but the attack is inactive because it is added # .

I.e. not quite clear what you mean :  Please write short lines with each explanation / questions.

tester 1231

unread,
May 5, 2019, 8:02:11 AM5/5/19
to ns-u...@googlegroups.com

well sir, i'm sorry about that, the point is i'm confused for configuring wormhole in NS 2, i don't have aodv.cc and .h for wormhole attacks, if you have very much I need the file

pliss thanksss 

knudfl

unread,
May 5, 2019, 11:12:54 AM5/5/19
to Network Simulator 2 (NS2)
@tester 1231.

For an ns-2.35 with no modifications, see "ex, a stock ns-2.35".
For a Mac and aodv(-uu) modified ns-2.29, see "ns-2.29 + ByzantineAttacks".


ex, a stock ns-2.35
15worm-16.tcl
2worm14.tcl
worm-16.tcl

ns-2.29 + ByzantineAttacks
wormhole-CA.tcl
wormhole-Mellia.tcl
worm.tcl

Application / executable :
byzantine-attacks-ns_2.29-ubuntu16_amd64.deb
https://drive.google.com/file/d/11xo7eUhvipfrn3CNHA8-Dg7gari4_tFs/view?usp=sharing
....  Provides /usr/local/bin/ns229-ByzantineAttacs-el6

$ ns229-ByzantineAttacs-el6 wormhole-CA.tcl
$ ns229
-ByzantineAttacs-el6 wormhole-Mellia.tcl
$ ns229
-ByzantineAttacs-el6 worm.tcl

C++ code ... byzantine-attacks_2_ns229.patch
https://drive.google.com/file/d/1R6lizZuPeTwjbrlzQCkbh_F1CkA4E4ud/view?usp=sharing

tester 1231

unread,
May 5, 2019, 11:22:47 PM5/5/19
to ns-u...@googlegroups.com
Hi sir, I have changed the MAC file for wormhole, meaning I use .tcl which is ns-2.29 + ByzantineAttacks and why should there be a byzantine attack pack in that file? has wormhole + byzantine been changed?

knudfl

unread,
May 6, 2019, 6:27:47 AM5/6/19
to Network Simulator 2 (NS2)
@tester 1231 ,   Hi.

»» I have changed the MAC file for wormhole «« :     Which changes ?

»» I use .tcl which is ns-2.29 + ByzantineAttacks «« : 
Which *.tcl?   And how is it related to ns-2.29 + ByzantineAttacks ?

»» why should there be a byzantine attack pack in that file? «« :     The file name is missing.

»» has wormhole + byzantine been changed? «« :   Changed from what to ???
  • A suggestion : Split up your text / your questions to 3 (4) separate paragraphs
  • I.e. one long line with questions makes it unclear what you actually mean.
..... Can also be you are asking questions about things I have no knowledge about.
Which means you may have to search the Net yourself, and read some (many) of the reports.pdf that you may find about the subjects.

priya

unread,
Sep 30, 2019, 11:12:14 AM9/30/19
to Network Simulator 2 (NS2)
sir, i m using ns 2.35 sir...i got this error sir...plzz give me the solution sir..ubuntu 18.04

 (_o351 cmd line 1)
    invoked from within
"_o351 cmd wormhole-peer _o329"

    invoked from within
"catch "$self cmd $args" ret"
    invoked from within
"if [catch "$self cmd $args" ret] {
set cls [$self info class]
global errorInfo
set savedInfo $errorInfo
error "error when calling class $cls: $args" $..."
    (procedure "_o351" line 2)

    (SplitObject unknown line 2)
    invoked from within
"[$n15 set ll_(0)] wormhole-peer [$n14 set ll_(0)]"
    (file "2worm14.tcl" line 174)


knudfl

unread,
Sep 30, 2019, 2:06:23 PM9/30/19
to Network Simulator 2 (NS2)
@priya ,   Hi.

I guess you have edited "2worm14.tcl" : 
There is no `wormhole-peer´ in 2worm14.tcl by default. The lines are commented out with # :
2worm14.tcl:173:                #[$n14 set ll_(0)] wormhole-peer [$n15 set ll_(0)]
2worm14.tcl:174:                #[$n15 set ll_(0)] wormhole-peer [$n14 set ll_(0)]

The wormhole examples with `wormhole-peer´ settings are "byzantine attack examples".
(  wormhole-CA.tcl, wormhole-Mellia.tcl ).

You can use the executable `/usr/local/bin/ns229-ByzantineAttacs-el6´
....  Install  byzantine-attacks-ns_2.29-ubuntu16_amd64.deb

Download .... and install
sudo gdebi Downloads/byzantine-attacks-ns_2.29-ubuntu16_amd64.deb

Simulation :  $ ns229-ByzantineAttacs-el6 wormhole-Mellia.tcl

priya

unread,
Oct 6, 2019, 2:57:40 AM10/6/19
to Network Simulator 2 (NS2)
thank you sir.....it's working

dinesh babu

unread,
Oct 7, 2019, 8:34:15 AM10/7/19
to ns-u...@googlegroups.com
Hi I received a query regarding the ns2 coding. Can we help you out to solve the issue..


knudfl

unread,
Oct 7, 2019, 9:56:31 AM10/7/19
to Network Simulator 2 (NS2)
@dinesh babu :

Network Coding is off topic in a wormhole thread !    Ask here :

Antra

unread,
Jan 24, 2020, 11:47:05 PM1/24/20
to Network Simulator 2 (NS2)
hello,

I can't install sudo gdebi Downloads/byzantine-attacks-ns_2.29-ubuntu16_amd64.deb

as I have a 32-bit system.

Please help me here.
Message has been deleted

knudfl

unread,
Jan 25, 2020, 4:34:52 AM1/25/20
to Network Simulator 2 (NS2)
@Antra ,   Hi.

Well, 32bits OS :  You can build an ns-2.35 with the wormhole_ns235.patch
.... see https://groups.google.com/forum/?fromgroups#!searchin/ns-users/wormhole_ns235.patch%7Csort:date/ns-users/4Cg-tcWycDM/fyJfm1RgDAAJ
 →  →   my first post,  January 18  2020

Build example, ns-2.35 + wormhole, with e.g. Ubuntu 18.04 :
sudo apt install g++-4.8
tar xvf ns-allinone-2.35_gcc5.tar.gz
https
://drive.google.com/file/d/0B7S255p3kFXNVVlxR0ZNRGVORjQ/view?usp=sharing
cd ns
-allinone-2.35/
patch
-p0 < wormhole_ns235.patch          
https
://drive.google.com/file/d/1YErI9TdsZjjgIRDjoRgZMLi0u-zM1WWy/view?usp=sharing
export CC=gcc-4.8 CXX=g++-4.8 && ./install   ## if 16.04 it's just ./install
cd ns
-2.35/
cp ns ns235
-wormhole
sudo cp ns235
-wormhole /usr/local/bin/
----------- Simulation ------------
ns235-wormhole 2worm14.tcl


.... The patch will edit three mac/ files, and add the directory wormhole-ex/ :
With the latest simulation examples of "wormhole peer"


wormhole-ex-2.tar.gz
ns2-INFO.txt
Reply all
Reply to author
Forward
0 new messages