• Title/Summary/Keyword: NS-2 Simulation

Search Result 409, Processing Time 0.026 seconds

Design and Implementation of MPλS Simulator based on ns-2 Network Simulator (ns-2 네트워크 시뮬레이터 기반의 MPλS 시뮬레이터의 설계 및 구현)

  • 서선영;이봉환;황선태;윤찬현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.119-128
    • /
    • 2003
  • The rapid increase of Internet users, diversity of application services, high speed data transmission, and extension of application areas have resulted in exponential growth of Internet traffic. In order to satisfy the increasing demand of bandwidth, the MPλS protocol, which is based on MPLS for efficient integration of WDM and IP protocols, has been suggested by IETF. In this paper, we present an MPλS simulator which enables to simulate various MPλS function such as optical crossconnect (OXC), multi-wavelength links, routing and wavelength assignment(RWA), and MPλS signaling and control. The simulator is developed based on the ns-2, an widely used multi-protocol network simulator. The function of the simulator is validated by running many simulation based on various scenarios and performance measures such as throughput and blocking probability. The simulator could be widely utilized for validation of proposed protocols before developing real optical network systems.

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 (NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석)

  • Kim, Jung-Yoon;Song, Se-Hwa;Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.184-190
    • /
    • 2009
  • WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.

An Effective Scheduling Algorithm in IEEE 802.11e HCCA (IEEE 802.11e HCCA에서의 효율적인 Scheduling Algorithm)

  • Kim, Sung-Ryun;Lee, Chae-Woo
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.19-20
    • /
    • 2007
  • IEEE 802.lie is a new standard to support Quality of Service. HCCA(HCF controlled channel access) is a channel access mechanism, which polls the Qos-stations, utilized by the HC in AP. In this paper, we proposed an efficient scheduling algorithm in HCCA and compared with existing algorithms. Extensive simulation has done in ns-2 and the simulation results show our algorithm outperforms existing algorithms.

  • PDF

Simulation of the Magnetic Pulse Compression Modulator using Electromagnetic Transients Program (자기압축회로의 EMTP 시뮬레이션)

  • Choi, Young-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.07c
    • /
    • pp.2182-2183
    • /
    • 2005
  • A pulse generator of one stage magnetic pulse compression modulator was simulated by electromagnetic transients program (EMTP). The pulse generator was expected to generate ${\sim}80kV$ peak voltage, ${\sim}140ns$ pulse width and about $70{\sim}75%$ energy delivery efficiency from initial charge capacitor $(0.2{\mu}F)$ to dummy load $(25{\Omega})$. From this simulation, the scheme of pulse circuit could be estimated as a practically reasonable design.

  • PDF

End-to-end Transmission Performance of VoIP Traffics based on Mobility Pattern over MANET with IDS (IDS가 있는 MANET에서 이동패턴에 기반한 VoIP 트래픽의 종단간 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.773-778
    • /
    • 2014
  • IDS(Intrusion Detection System) can be used as a countermeasure for blackhole attacks which cause degrade of transmission performance by causing of malicious intrusion to routing function of networks. In this paper, effects of IDS for transmission performance based on mobility patterns is analyzed for MANET(Mobile Ad-hoc Networks), a suggestion for effective countermeasure is considered. Computer simulation based on NS-2 is used in performance analysis, VoIP(Voice over Internet Protocol) as an application service is chosen for performance measure. MOS(Mean Opinion Score), call connection ratio and end-to-end delay is used as performance parameter.

Transmission Performance of VoIP Traffics on Underwater MANET (수중 MANET에서 VoIP 트래픽의 전송 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.12
    • /
    • pp.1187-1192
    • /
    • 2016
  • Performance analysis results are limited to of network level, because network level transmission parameters are used for performance measure and analysis of network design, construction and operation on underwater MANET, With this way of performance analysis based on network level, it is not easy to analyze transmission performance related with user level transmission quality. In this paper, transmission performance focused on application traffic be required by user is investigated to supplement weakness of performance analysis based on network level. Voice traffic, which is expected to be increasingly used on underwater MANET, is considered as application service, Some conditions for underwater MANET will be proposed to support transmission quality, MOS, CCR and EED, etc.. A computer simulation based on NS-2 is used for performance measure, voice traffic is generated as VoIP specification.

A Study on Control Scheme for Fairness Improvement of Assuared Forwarding Services in Differentiated Service Network (DiffServ 망에서 AF 서비스의 공평성 향상을 위한 제어 기법)

  • Kim, Byun-gon;Jeong, Dong-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.649-652
    • /
    • 2015
  • Previous marking policy for the AF service of TCP traffic in the Diffserv network have no sufficient consideration on the effect of RTT and target rate. In this paper, in order to improve fairness Index by the effect RTT difference of TCP traffic, we propose the modified TSW3CDM(Time Sliding Window Three Color Dynamic Marker) based on average transfer rate estimation and the flow state. The proposed algorithm is dynamic marking policy that do allocate band width in proportion to transmission rate. To evaluate the performance of the proposed algorithm, We accomplished a computer simulation using NS-2. From simulation results, the proposed TSW3CDM algorithm improves fairness index by comparison with TSW3CM.

  • PDF

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

Transmission Performance of Voice Traffic on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 음성 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1411-1416
    • /
    • 2015
  • Grayhole attack, one of attack to MANET routing function, is very severe in point of view of causing results which disturbs normal transmission function of network with uneasy finding of attacks. In this paper, effects of grayhole attack to application service on MANET is analyzed. Based on this analysis, some conditions is suggested for anti-intrusion to operate an application service on MANET under grayhole attack. This study is done with computer simulation based on NS-2 be added grayhole attack function which is implemented in this paper.

Computing Methods of Node Traversal Time of ERS Algorithm to Reduce the Retransmission Rate in AODV Routing Protocol (AODV 라우팅 프로토콜에서 재전송률을 낮추기 위한 ERS 알고리즘의 노드순회시간 계산방법)

  • Sun Chang-Yoon;Kang Seung-Ho;Lim Hyeong-Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.447-454
    • /
    • 2006
  • An ad-hoc network routing protocol, AODV(Ad-hoc On-demand Distance Vector) initially uses ERS(Expanding Ring Search) algorithm to control the RREQ(Route Request) retransmission in the route discovery process. Because ERS uses the fixed NTT(Node Travesal Time), it does not reflect accurately ad-hoc network environment. In this paper, we propose an improved ERS algorithm which lowers the retransmission rate. It uses RREP(Route Reply) and gives different weights in NTT of each node in accordance with the adjacency to an originating node. To show the effectiveness of the proposed algorithm, we perform a simulation using ns2. The simulation results showed that the proposed algorithm has better performance than existing algorithms.