• Title/Summary/Keyword: 네트워크 시뮬레이터

Search Result 496, Processing Time 0.023 seconds

A Soft Handover Scheme Between UMTS and WLAN (UMTS와 WLAN 사이의 소프트 핸드오버 방안)

  • Seo, Won-Kyeong;Lee, Kang-Won;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.268-274
    • /
    • 2008
  • With the advances in wireless communication technologies, mobile users require to get seamless services anywhere and anytime. To relize these demands, network interworking and vertical handover are necessary between heterogeneous wireless access technologies with multi-interface mobile station. A lot of organizations are doing research on the network integration schemes based on loosely and tightly integrated architectures, and research on vertical handover schemes mainly based on Mobile IP in loosely integrated environments. But actually, the tightly integrated scheme can support more faster vertical handover because heterogeneous access networks are combined tightly. However, vertical handover schemes in tightly integrated environments are conceptually proposed without any detail signaling procedures. Therefore, this paper defines a tightly integrated architecture between UMTS and WLAN, and proposes a soft vertical handover signaling procedure. The proposed soft vertical handover scheme is evaluated by the OPNET simulator, and we confirm the proposed scheme can support seamless services.

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Log processing using messaging system in SSD Storage Tester (SSD Storage Tester에서 메시징 시스템을 이용한 로그 처리)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1531-1539
    • /
    • 2017
  • The existing SSD storage tester processed logs in a 1-N structure between server and client using TCP and network file system. This method causes some problems for example, an increase in CPU usage and difficulty in exception handling, etc. In this paper, we implement a log processing message layer that can deal with asynchronous distributed processing using open source messaging system such as kafka, RabbitMQ and compare this layer with existing log transmission method. A log simulator was implemented to compare the transmission bandwidth and CPU usage. Test results show that the transmission using the message layer has higher performance than the transmission using the message layer, and the CPU usage does not show any significant difference The message layer can be implemented more easily than the conventional method and the efficiency is higher than that of the conventional method.

Implementation of Simulation System for Performance Analysis of CDN based on Mobile P2P (모바일 P2P 기반의 CDN의 성능 평가를 위한 시뮬레이션 시스템 구축)

  • Kim, Yu-Doo;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.411-413
    • /
    • 2010
  • Now, smart phone markets are grows quickly. So it is needed research of CDN(Contents Delivery Network) technology for contents transmission in mobile networks. Especially the services of smart phone are focused on open platform model. So P2P(Peer to Peer) protocols will be used for mobile network because it is a distributed network architecture composed of participants that make a portion of their resources directly available to other network participants, without the need for a central server. Current research of P2P protocols for mobile network are not activated. The reason is appropriate in the mobile P2P network simulation environment, since it is not provided. So, in this paper we design a mobile P2P simulation system for CDN based on mobile P2P.

  • PDF

Performance of 802.11b/g under Different Data Rates and Traffic Rates in Mobile IPv4 Environment (모바일 IPv4환경에서 802.11b/g 데이터 전송률과 트래픽 수신에 따른 효율)

  • Shrestha, Anish Prasad;Pyun, Jae-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2195-2200
    • /
    • 2008
  • The use of WLAN technology specially 802.11 b and g has seen huge subscriber growth in a relatively short time period due to low cost and ease of installation of WLAN hardware. These technologies provide multiple data rates ranging from 1 to 54 Mbps depending on modulation used in physical layer. This paper presents the performance of 802.11b and g under different data rates in mobile IPv4 environment. OPNET is used in the study as the network simulator. The performance metrics used in this wort is data traffic received by a WLAN station roaming amongst Access Point(AP) of different ESSs. It is found that much data packets are lost during handover between mobile agents. The traffic received by the roaming station varies based on the data rates provided by two different WLAN technologies.

The DIO Interval Adjustment to Enhance Mobility in RPL (RPL에서 이동성 향상을 위한 DIO 전송 간격 조절)

  • Shin, Yejin;Seol, Soonuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1679-1686
    • /
    • 2019
  • The main purpose of this research is to propose an approach for solving the packet loss problem by quickly adapting to topology change when nodes move in RPL-based IoT environment. In order to enhance mobility, every node is aware of the mobility of its neighbor nodes and quantifies the mobility level based on the number of control messages and all received packets. According to the mobility level, the DIO timer is changed. The proposed approach allows nodes to change their DIO timers according to their mobility levels to adapt topology changes and update paths to the sink. The performance of the proposed approach is evaluated using a Contiki-based Cooja simulator in various moving speeds. The simulation results show that the proposed approach copes with mobility scenarios better than the standard RPL by ascertaining that the packet delivery ratio is improved by 31.03%.

Construction of a Virtual Mobile Edge Computing Testbed Environment Using the EdgeCloudSim (EdgeCloudSim을 이용한 가상 이동 엣지 컴퓨팅 테스트베드 환경 개발)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1102-1108
    • /
    • 2020
  • Mobile edge computing is a technology that can prepare for a new era of cloud computing and compensate for shortcomings by processing data near the edge of the network where data is generated rather than centralized data processing. It is possible to realize a low-latency/high-speed computing service by locating computing power to the edge and analyzing data, rather than in a data center far from computing and processing data. In this article, we develop a virtual mobile edge computing testbed environment where the cloud and edge nodes divide computing tasks from mobile terminals using the EdgeCloudSim simulator. Performance of offloading techniques for distribution of computing tasks from mobile terminals between the central cloud and mobile edge computing nodes is evaluated and analyzed under the virtual mobile edge computing environment. By providing a virtual mobile edge computing environment and offloading capabilities, we intend to provide prior knowledge to industry engineers for building mobile edge computing nodes that collaborate with the cloud.

Channel Modeling and RF Performance Verification in mmWave Bands Based on NS-3 (NS-3 기반의 mmWave 대역 채널 모델링 및 RF 성능 검증)

  • Seung-Min Lee;Jun-Seok Seo;Hong-Je Jang;Myung-Ryul Choi
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.650-656
    • /
    • 2023
  • This paper implements a channel model for mmWave bands using an NS-3-based 5G system-level simulator and analyzes the reliability and validity of the implemented model through RF performance verification. The channel model for RF performance verification in the mmWave bands consider parameters such as characteristics defined in 3GPP TR 38.901, beam-forming, antenna configuration, scenarios, among others. Furthermore, the simulation results verify compliance within the ranges permitted by the 3GPP standards and verify reliability in indoor environmental scenarios by exploiting the Radio Environment Map (REM). Therefore, the channel model implemented in this study is applicable to the actual design and establishment of 5G networks, presenting a method to evaluate and validate RF performance by adjusting various parameters.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

Customized Evacuation Pathfinding through WSN-Based Monitoring in Fire Scenarios (WSN 기반 화재 상황 모니터링을 통한 대피 경로 도출 알고리즘)

  • Yoon, JinYi;Jin, YeonJin;Park, So-Yeon;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1661-1670
    • /
    • 2016
  • In this paper, we present a risk prediction system and customized evacuation pathfinding algorithm in fire scenarios. For the risk prediction, we apply a multi-level clustering mechanism using collected temperature at sensor nodes throughout the network in order to predict the temperature at the time that users actually evacuate. Based on the predicted temperature and its reliability, we suggest an evacuation pathfinding algorithm that finds a suitable evacuation path from a user's current location to the safest exit. Simulation results based on FDS(Fire Dynamics Simulator) of NIST for a wireless sensor network consisting of 47 stationary nodes for 1436.41 seconds show that our proposed prediction system achieves a higher accuracy by a factor of 1.48. Particularly for nodes in the most reliable group, it improves the accuracy by a factor of up to 4.21. Also, the customized evacuation pathfinding based on our prediction algorithm performs closely with that of the ground-truth temperature in terms of the ratio of safe nodes on the selected path, while outperforming the shortest-path evacuation with a factor of up to 12% in terms of a safety measure.