• Title/Summary/Keyword: Network Simulator 2

Search Result 392, Processing Time 0.026 seconds

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

A Performance Comparison of Routing Protocols for Mobile Ad hoc Networks using the NS-3 (NS-3를 사용한 이동 애드혹 네트워크용 라우팅 프로토콜 성능 비교)

  • Jang, Jaeshin;Ngo, Van-Vuong;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.308-316
    • /
    • 2015
  • In this paper, we carried out performance comparison of four routing protocols that had been proposed for mobile ad hoc networks using the NS-3 network simulator. Those four routing protocols consist of two proactive routing protocols, DSDV(destination-sequenced distance vector) and OLSR(optimized link state routing), and two reactive routing protocols, AODV(ad-hoc on-demand distance vector) and DSR(dynamic source routing). Two performance metrics, system throughput and packet delivery ratio, are adopted and performance evaluation was carried out in a square communication area where each communicating mobile node moves independently. Numerical results show that the AODV routing protocol provides the best performance among those four routing protocols.

Hierarchical Performance Modeling and Simulation of Scalable Computer System (확장성을 고려한 계층적 시스템 성능 모델 및 시뮬레이션)

  • 김흥준
    • Journal of the Korea Society for Simulation
    • /
    • v.4 no.2
    • /
    • pp.1-16
    • /
    • 1995
  • The performance of a computer system depends on the system architecture and workload, and the high performance required in many applications can be achieved by the scalability of the system architecture and workload. This paper presents scalable workload, a performance metric of scalable speedup and hierarchical modeling for the scalable computer system as well as the development of the object-oriented simulator spmplC++ Which is an advanced C++ version of the discrete event-driven simulation environment smplE. In addition, this paper presents two examples of applying scalable speedup, hierarchical modeling and simulator smplC++ to analyze the performance effect of the sclcbility in a multiprocessor system and a network-based client/server system.

  • PDF

Development of a Simulator for Evolutionary Robots using Multi-robot Cooperation (다수 로봇 협업을 이용한 진화 로봇 시뮬레이터의 개발)

  • Son, Yun-Sik;Park, Ji-Woo;Jung, Jin-Woo;Oh, Se-Man
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.90-96
    • /
    • 2009
  • In the original model-based paradigm in the field of motion planning of robots, robots had to play the focal role of considering all situations under which they made decisions and operate. Such paradigm makes it difficult to respond efficiently to the dynamically shifting environment such as disaster area. In order to handle such a situation that may be changed dynamically, a technology that allows a dynamic execution of data transmission and physical/network connection between multiple robots based on scenarios is required. In this paper, we deal with evolutionary robots that adapt to any given environment and execute scenarios, specially focused on the development of a simulator to test the evolutionary process of cooperated multiple robots.

  • PDF

A study on the Power Efficiency of S-MAC Protocol for Unicast Communication (Unicast 통신에서의 S-MAC Protocol의 전력 효율성 연구)

  • Baek, Se-Hyeon;Kim, Yeong-Beom
    • 한국ITS학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.154-157
    • /
    • 2008
  • 유비쿼터스 센서 네트워크에서 전력 효율을 높이는 것은 매우 중요한 과제이다. 노드의 전력 소비를 줄이기 위해 다양한 mac protocol 들이 제안되어 왔고, 본 논문에서는 ns2(network simulator) tool을 이용하여 Wei Ye, John Heidemann, Deborah Estrin 이 2002년에 발표한 S-MAC Protocol 의 전력효율을 기존의 IEEE 802.11 MAC 과 비교하였다.

  • PDF

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

Enhanced MAC Scheme to Support QoS Based on Network Detection over Wired-cum-Wireless Network

  • Kim, Moon;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2006
  • In these days, wireless data services are becoming ubiquitous in our daily life because they offers several fundamental benefits including user mobility, rapid installation, flexibility, and scalability. Moreover, the requests for various multimedia services and the Quality of Service (QoS) support have been one of key issues in wireless data communications. Therefore the research relative to Medium Access Control (MAC) has been progressing rapidly. Especially a number of QoS-aware MAC schemes have been introduced to extend the legacy IEEE 802.11 MAC protocol which has not guaranteed any service differentiation. However, none of those schemes fulfill both QoS features and channel efficiency although these support the service differentiation based on priority. Therefore this paper studies a novel MAC scheme, referred to as Enhanced Distributed Coordination Function with Network Adaptation (EDCF-NA), for enhancements of both QoS and medium efficiency. It uses a smart factor denoted by ACK rate and Network Load Threshold (TH). In this paper, we study how the value of TH has effect on MAC performance and how the use of optimal TH pair improves the overall MAC performance in terms of the QoS, channel utilization, collision rate, and fairness. In addition, we evaluate and compare both the performance of EDCF-NA depending on several pairs of TH and the achievement of various MAC protocols through simulations by using Network Simulator-2 (NS-2).

Traffic Engineering Based on Local States in Internet Protocol-Based Radio Access Networks

  • Barlow David A.;Vassiliou Vasos;Krasser Sven;Owen Henry L.;Grimminger Jochen;Huth Hans-Peter;Sokol Joachim
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.377-384
    • /
    • 2005
  • The purpose of this research is to develop and evaluate a traffic engineering architecture that uses local state information. This architecture is applied to an Internet protocol radio access network (RAN) that uses multi-protocol label switching (MPLS) and differentiated services to support mobile hosts. We assume mobility support is provided by a protocol such as the hierarchical mobile Internet protocol. The traffic engineering architecture is router based-meaning that routers on the edges of the network make the decisions onto which paths to place admitted traffic. We propose an algorithm that supports the architecture and uses local network state in order to function. The goal of the architecture is to provide an inexpensive and fast method to reduce network congestion while increasing the quality of service (QoS) level when compared to traditional routing and traffic engineering techniques. We use a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm. We use the network simulator ns-2 as the core of our simulation environment. Around this core we built a system of pre-simulation, during simulation, and post-processing software that enabled us to simulate our traffic engineering architecture with only very minimal changes to the core ns-2 software. Our simulation environment supports a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm.

Low Power Time Synchronization for Wireless Sensor Networks Using Density-Driven Scheduling

  • Lim, HoChul;Kim, HyungWon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.84-92
    • /
    • 2018
  • For large wireless sensor networks running on battery power, the time synchronization of all sensor nodes is becoming a crucial task for waking up sensor nodes with exact timing and controlling transmission and reception timing. However, as network size increases, this synchronization process tends to require long processing time consume significant power. Furthermore, a naïve synchronization scheduler may leave some nodes unsynchronized. This paper proposes a power-efficient scheduling algorithm for time synchronization utilizing the notion of density, which is defined by the number of neighboring nodes within wireless range. The proposed scheduling algorithm elects a sequence of minimal reference nodes that can complete the synchronization with the smallest possible number of hops and lowest possible power consumption. Additionally, it ensures coverage of all sensor nodes utilizing a two-pass synchronization scheduling process. We implemented the proposed synchronization algorithm in a network simulator. Extensive simulation results demonstrate that the proposed algorithm can reduce the power consumption required for the periodic synchronization process by up to 40% for large sensor networks compared to a simplistic multi-hop synchronization method.

A Study on Production Well Placement for a Gas Field using Artificial Neural Network (인공신경망 시뮬레이터를 이용한 가스전 생산정 위치선정 연구)

  • Han, Dong-Kwon;Kang, Il-Oh;Kwon, Sun-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.17 no.2
    • /
    • pp.59-69
    • /
    • 2013
  • This study presents development of the ANN simulator for well placement of infill drilling in gas fields. The input data of the ANN simulator includes the production time, well location, all inter well distances, boundary inter well distance, infill well position, productivity potential, functional links, reservoir pressure. The output data includes the bottomhole pressure in addition to the production rate. Thus, it is possible to calculate the productivity and bottomhole pressure during production period simultaneously, and it is expected that this model could replace conventional simulators. Training for the 20 well placement scenarios was conducted. As a result, it was found that accuracy of ANN simulator was high as the coefficient of correlation for production rate was 0.99 and the bottomhole pressure 0.98 respectively. From the resultes, the validity of the ANN simulator has been verified. The term, which could produce Maximum Daily Quantity (MDQ) at the gas field and the productivity according to the well location was analyzed. As a result, the MDQ could be maintained for a short time in scenario C-1, which has the three infill wells nearby aquifer boundary, and a long time in scenario A-1. In conclusion, it was found that scenario A maintained the MDQ up to 21% more than those of scenarios B and C which include parameters that might affect the productivity. Thus, the production rate can be maximized by selecting the location of production wells in comprehensive consideration of parameters that may affect the productivity. Also, because the developed ANN simulator could calculate both production rate and bottomhole pressure, respectively, it could be used as the forward simulator in a various inverse model.