Download ns-3-model-library

Transcript
ns-3 Model Library, Release ns-3.16
• ns3::Packet::FindFirstMatchingByteTag
• ns3::Packet::RemoveAllByteTags
• ns3::Packet::RemoveHeader
• ns3::Packet::RemoveTrailer
• ns3::Packet::CreateFragment
• ns3::Packet::RemoveAtStart
• ns3::Packet::RemoveAtEnd
• ns3::Packet::CopyData
Dirty operations will always be slower than non-dirty operations, sometimes by several orders of magnitude. However, even the dirty operations have been optimized for common use-cases which means that most of the time, these
operations will not trigger data copies and will thus be still very fast.
21.2 Node and NetDevices Overview
This chapter describes how ns-3 nodes are put together, and provides a walk-through of how packets traverse an
internet-based Node.
Figure 21.3: High-level node architecture
196
Chapter 21. Network Module