• Title/Summary/Keyword: NS-2 Simulation

Search Result 409, Processing Time 0.037 seconds

Video Replay by Frame Receive Order Relocation Method in the Wire and Wireless Network (유무선 네트워크에서 프레임 수신 순서 재할당 방법을 사용한 동영상 재생)

  • Kang, Dong-Jin;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.135-142
    • /
    • 2016
  • When video service is performed in simulation using NS-2(Network Simulation-2), the video replay is performed as the received frame order. In the existing video replay method based on the received frame order, as the frame orders of receiver and transmitter are different, the receiver buffer does not have the effect that the packets between the frames of transmitter buffer holds a regular size and packet dense and sparsity phenomenon in the receiver buffer is made by the irregular packet size due to the unpredictable reversed order of received partial frames. The above dense and sparsity phenomenon increases the probability of buffer overflow and underflow generation. To prevent these problems, the proposed frame receive order relocation method adds an extra replay buffer which rearranges the order of receive frame as the order of transmit frame, so it has the effect that the packets between the transmit frames keeps a regular size. Through the simulation using NS-2 and JSVM(Joint Scalable Video Model), the generation number of buffer overflow and underflow, and PSNR(Required Peak Signal to Noise Ratio) performance between the existing method and proposed method were compared. As a result, it was found that the proposed method would have better performance than the existing method.

Design of a 64×64-Bit Modified Booth Multiplier Using Current-Mode CMOS Quarternary Logic Circuits (전류모드 CMOS 4치 논리회로를 이용한 64×64-비트 변형된 Booth 곱셈기 설계)

  • Kim, Jeong-Beom
    • The KIPS Transactions:PartA
    • /
    • v.14A no.4
    • /
    • pp.203-208
    • /
    • 2007
  • This paper proposes a $64{\times}64$ Modified Booth multiplier using CMOS multi-valued logic circuits. The multiplier based on the radix-4 algorithm is designed with current mode CMOS quaternary logic circuits. Designed multiplier is reduced the transistor count by 64.4% compared with the voltage mode binary multiplier. The multiplier is designed with Samsung $0.35{\mu}m$ standard CMOS process at a 3.3V supply voltage and unit current $5{\mu}m$. The validity and effectiveness are verified through the HSPICE simulation. The voltage mode binary multiplier is achieved the occupied area of $7.5{\times}9.4mm^2$, the maximum propagation delay time of 9.8ns and the average power consumption of 45.2mW. This multiplier is achieved the maximum propagation delay time of 11.9ns and the average power consumption of 49.7mW. The designed multiplier is reduced the occupied area by 42.5% compared with the voltage mode binary multiplier.

End-to-End Performance of VoIP Traffics over Large Scale MANETs (대규모 MANET에서 VoIP 트래픽의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2011
  • In this paper, End-to-End VoIP(Voice over Internet Protocol) performance over large scale MANET(Mobile Ad-hoc Networks) is evaluated. VoIP implementation model, which can be used for large scale MANET, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. Call connection ratio as a connection performance, MOS and network delay as a transmission performance, packet loss rate as other performance is measured with this simulation. Finally, maximum $10{\sim}15km^2$ as a single MANET, 500 nodes and 100 call connections is suggested for VoIP implementation and operation conditions over large scale MANETs.

Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions (다중침해가 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.257-262
    • /
    • 2012
  • In this paper, transmission performance for serval VoIP traffics is meaured and analysised over MANET(Mobile Ad-hoc Networks) under some types of intrusions. VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, network delay, packet loss rate and call connection rate is measured for transmission performance. With analysis of measued data, characteristics of each traffics for transmission performance parameters is showed on MANET under multi intrusions, As a results of this paper, some recommendation condtion for codec selection and blackhole intrusion is suggested to implement VoIP services on MANET under multi intrusions like as DDoS and blockhole intrusions.

A study on the Design and Implementation of Simulator adapted in AMI Network environment (AMI 네트워크 환경에 적합한 시뮬레이터 설계 및 구현에 관한 연구)

  • Yang, Il-Kwon;Jung, Nam-Joon;Lee, Sang-Ho
    • The KIPS Transactions:PartA
    • /
    • v.18A no.6
    • /
    • pp.281-292
    • /
    • 2011
  • In this paper, a simulator adapted in AMI network environment with NS-2 was designed and implemented. The limited AMI operation environment such as processing times of data, network protocol and system performance can be simulated to find out the optimal AMI formations. Consequently, it is simulated under conditions that are closely analogous to the actual networks and each device. In future, the result of simulation would be applied to AMI network, mitigated the waste of resources and much contributed towards the real optimal AMI deployments in utilities.

Implementation and performance evaluation of the ONU&OLT supporting VPN in the ATM-PON (ATM-PON 환경에서 VPN지원을 위한 ONU와 OLT 기능 구현 및 성능 분석)

  • 박미리;장성호;이대봉;장종옥
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.306-310
    • /
    • 2002
  • Today, corporations are approach to inside information using public network such as Internet groping economical way to utilize public network to corporation information network without buying equipment. But, special quality of internet, Virtual Private Net (VPN) that it uses net that is observed as technology that can be guaranteed public safety division transmission and data securitybecause of can not secure data transmission. In this paper. add VPN function ONU&OLT of ATM-PON system and propose SCB (Single Copy Broadcasting). When there is VPN function to ATM network, the speed can be fast, and reduce rain track pick quantity during time more. Performance analysis network simulation that use NS-2.

  • PDF

Transmission Performance of MANET under Multiple Blackhole Attacks (다중 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.783-786
    • /
    • 2015
  • Hole attack, which is disturbed transmission function through change of routing information, can cause critical results for MANET as non-infrastructure network. Backhole attack, as a typical hole attack, is one malicious attack which is disabled network transmission function by assumption of transmission data through modification of routing information. It is very important to evaluate transmission performance caused by blackhole attack, because transmission performance of MANET is affective with blackhole attack. In this paper, transmission performance is analyzed with MANET under multiple blackhole attacks caused multiple blackhole nodes. Computer simulation based on NS-2 is used as analysis tool and voice traffic is considered ad application service on MANET.

  • PDF

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance

  • Lee, Hoo-Rock;Chung, Kyung-Yul;Jhang, Kyoung-Son
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.237-246
    • /
    • 2013
  • Maintenance Access Hatches are used to ensure urban safety and aesthetics while facilitating the management of power lines, telecommunication lines, and gas pipes. Such facilities necessitate affordable and effective surveillance. In this paper, we propose a FiCHS (Fixed Cluster head centralized Hierarchical Static clustering) routing protocol that is suitable for underground maintenance hatches using WSN (Wireless Sensor Network) technology. FiCHS is compared with three other protocols, LEACH, LEACH-C, and a simplified LEACH, based on an ns-2 simulation. FiCHS was observed to exhibit the highest levels of power and data transfer efficiency.

A Congestion Control Mechanism in Wireless Sensor Networks (무선 센서 네트워크에서 혼잡 제어 메커니즘)

  • Joo, Jeong-Ran;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.75-82
    • /
    • 2007
  • Wireless Sensor Network(WSN) is composed of a large number of sensor nodes and accomplish a common task such as environment monitoring or asset tracking. This paper proposed a congestion control mechanism applying the ECN mechanism and the cross layer design to cope with temporal congestion in WSN. We experimented with the proposed congestion control mechanism using ns-2 simulator and measured the throughput of sink node. Simulation results show that the suggested mechanism can improve the performance of packet throughput by dealing with the congestion of network efficiently.

  • PDF