• Title/Summary/Keyword: Network Simulator 2

Search Result 391, Processing Time 0.026 seconds

Traffic Congestion Management on Urban Roads using Vehicular Ad-hoc Network-based V2V and V2I Communications (차량 애드혹 네트워크 기반 V2V와 V2I 통신을 사용한 시내 도로에서의 교통 체증 관리)

  • Ryu, Minwoo;Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.9-16
    • /
    • 2022
  • The nodes constituting the vehicle ad hoc network (VANET) are vehicles moving along the road and road side units (RSUs) installed around the road. The vehicle ad hoc network is used to collect the status, speed, and location information of vehicles driving on the road, and to communicate with vehicles, vehicles, and RSUs. Today, as the number of vehicles continues to increase, urban roads are suffering from traffic jams, which cause various problems such as time, fuel, and the environment. In this paper, we propose a method to solve traffic congestion problems on urban roads and demonstrate that the method can be applied to solve traffic congestion problems through performance evaluation using two typical protocols of vehicle ad hoc networks, AODV and GPSR. The performance evaluation used ns-2 simulator, and the average number of traffic jams and the waiting time due to the average traffic congestion were measured. Through this, we demonstrate that the vehicle ad hoc-based traffic congestion management technique proposed in this paper can be applied to urban roads in smart cities.

A Network Adaptive SVC Streaming Protocol for Improving Video Quality (비디오 품질 향상을 위한 네트워크 적응적인 SVC 스트리밍 프로토콜)

  • Kim, Jong-Hyun;Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.363-373
    • /
    • 2010
  • The existing QoS mechanisms for video streaming are short of the consideration for various user environments and the characteristic of streaming applying programs. In order to overwhelm this problem, studies on the video streaming protocols exploiting scalable video coding (SVC), which provide spatial, temporal, and qualitative scalability in video coding, are progressing actively. However, these protocols also have the problem to deepen network congestion situation, and to lower fairness between other traffics, as they are not equipped with congestion control mechanisms. SVC based streaming protocols also have the problem to overlook the property of videos encoded in SVC, as the protocols transmit the streaming simply by extracting the bitstream which has the maximum bit rate within available bandwidth of a network. To solve these problems, this study suggests TCP-friendly network adaptive SVC streaming(T-NASS) protocol which considers both network status and SVC bitstream property. T-NASS protocol extracts the optimal SVC bitstream by calculating TCP-friendly transmission rate, and by perceiving the network status on the basis of packet loss rate and explicit congestion notification(ECN). Through the performance estimation using an ns-2 network simulator, this study identified T-NASS protocol extracts the optimal bitstream as it uses TCP-friendly transmission property and perceives the network status, and also identified the video image quality transmitted through T-NASS protocol is improved.

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

A study on Packet Losses for Guaranteering Response Time of Service (서비스 응답시간 보장을 위한 패킷 손실에 관한 연구)

  • Kim Tae-Kyung;Seo Hee-Seok;Kim Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.201-208
    • /
    • 2005
  • To guarantee the quality of service for user request, we should consider various kinds of things. The important thing of QoS is that response time of service is transparently suggested 'to network users. We can know the response time of service using the information of network latency, system latency, and software component latency, In this paper, we carried out the modeling of network latency and analyzed the effects of packets loss to the network latency, Also, we showed the effectiveness of modeling using the NS-2. This research can help to provide the effective methods in case of SLA(Service Level Agreement) agreement between service provider and user.

  • PDF

A congestion control scheme estimating global channel busy ratio in VANETs

  • Kim, Tae-won;Jung, Jae-il;Lee, Joo-young
    • Journal of IKEEE
    • /
    • v.21 no.2
    • /
    • pp.115-122
    • /
    • 2017
  • In vehicular safety service, every vehicle broadcasts Basic Safety Message (BSM) periodically to inform neighbor vehicles of host vehicle information. However, this can cause network congestion in a region that is crowded with vehicles resulting in a reduction in the message delivery ratio and an increase in the end-to-end delay. Therefore, it could destabilize the vehicular safety service system. In this paper, in order to improve the congestion control and to consider the hidden node problem, we propose a congestion control scheme using entire network congestion level estimation combined with transmission power control, data rate control and time slot based transmission control algorithm. The performance of this scheme is evaluated using a Qualnet network simulator. The simulation result shows that our scheme mitigates network congestion in heavy traffic cases and enhances network capacity in light traffic cases, so that packet error rate is perfectly within 10% and entire network load level is maintained within 60~70%. Thus, it can be concluded that the proposed congestion control scheme has quite good performance.

Circular Ethernet-based In-Vehicle Network Protocol (링 형태의 이더넷 기반의 차량 내 네트워크 프로토콜)

  • Park, Pu-Sik;Cho, Jong-Chan;Yoon, Jong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.401-407
    • /
    • 2007
  • This paper proposes the ethernet-based in-vehicle networking method for "body" and "multimedia" domains. The ethernet-based in-vehicle networking method should modify the topology and the layer 2 for traffic shaping. In this paper, we simulate the two ring networking systems, the Media Oriented Systems Transport (MOST) and the proposed system with the shaping by the network simulator 2 and evaluate each performance. In addition, we demonstrate the proposed networking system to exchange two kinds of traffic, i.e., QoS data and best-effort data, on the ring network constituting of three nodes. Finally this paper expects to substitute the ethernet-based in-vehicle network for the MOST in advance.

  • PDF

Evaluating of Traffic Flow Distributed Control Strategy on u-TSN(ubiquitous-Transportation Sensor Network) (V2I 통신을 이용한 교통류 분산제어 전략 수립 및 평가)

  • Kim, Won-Kyu;Lee, Min-Hee;Kang, Kyung-Won;Kim, Byung-Jong;Kang, Yeon-Su;Oh, Cheol;Kim, Song-Ju
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.3
    • /
    • pp.122-131
    • /
    • 2009
  • Ubiquitous-Transportation sensor network is able to realize a vehicle ad-hoc network. Since there are some problems in an existing ITS system, the new technology and traffic information strategies are requirements in this advanced system, u-TSN. The purposes of this paper is to introduce the components on u-TSN system, establish new traffic strategies for this system, and then evaluate these strategies by making a comparative study of ITS and using micro traffic simulator, AIMSUN. The strategy evaluated by AIMSUN is position-based multicast strategy which provides traffic information to vehicles using V2I (vehicle to Infrastructure) communication. This paper focuses on the providing real-time route guidance information when congestion is occurred by the incidents. This study estimates total travel time on each route by API modules. Result from simulation experiments suggests that position-based multicast strategy can achieve more optimal network performance and increased driver satisfaction since the total accumulated travel times of both the major road and the total system on position-based multicast strategy are less than those on VMS.

  • PDF

SNMP Information Based Hierarchical Routing Mechanism for QoS Improvement of Smooth Handoff in Mobile IP (모바일 IP에서 Smooth Handoff의 QoS 향상을 위한 SNMP 정보 기반의 계층 라우팅 메카니즘)

  • 유상훈;박수현;이이섭;백두권
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.61-66
    • /
    • 2003
  • Mobile IP has been designed only to maintain communication as they move form place to place, so it doesn't guarantee Quality of Service(QoS). QoS in mobile IP is important to provide multimedia and real-time applications services in mobile, and it is closely related to handoff delay. Therefore, handoff delay problem is actively studied to guarantee QoS as a main issue in mobile IP research area Next generation Mobile IPv6 resolve this problem somewhat, triangle problem for first packet and handoff delay still remain. In this paper, we suggest SNMP Information-based routing that adds keyword management method to Information-based routing in active network in order to resolve such a problem, and then suggest QoS controlled handoff based on SNMP Information-Based routing. After modeling of suggested method and existing handoff method simulations we carried out with NS-2 for performance evaluation. The results of simulations show the some improvement on handoff delay, and therefore on QoS improvement.

  • PDF

Cycle-accurate NPU Simulator and Performance Evaluation According to Data Access Strategies (Cycle-accurate NPU 시뮬레이터 및 데이터 접근 방식에 따른 NPU 성능평가)

  • Kwon, Guyun;Park, Sangwoo;Suh, Taeweon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.4
    • /
    • pp.217-228
    • /
    • 2022
  • Currently, there are increasing demands for applying deep neural networks (DNNs) in the embedded domain such as classification and object detection. The DNN processing in embedded domain often requires custom hardware such as NPU for acceleration due to the constraints in power, performance, and area. Processing DNN models requires a large amount of data, and its seamless transfer to NPU is crucial for performance. In this paper, we developed a cycle-accurate NPU simulator to evaluate diverse NPU microarchitectures. In addition, we propose a novel technique for reducing the number of memory accesses when processing convolutional layers in convolutional neural networks (CNNs) on the NPU. The main idea is to reuse data with memory interleaving, which recycles the overlapping data between previous and current input windows. Data memory interleaving makes it possible to quickly read consecutive data in unaligned locations. We implemented the proposed technique to the cycle-accurate NPU simulator and measured the performance with LeNet-5, VGGNet-16, and ResNet-50. The experiment shows up to 2.08x speedup in processing one convolutional layer, compared to the baseline.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.