• Title/Summary/Keyword: Network Simulator 2

Search Result 392, Processing Time 0.027 seconds

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Performance Evaluation of AAL2 Bandwidth Gain on $I_{ub}$ in UMTS Network (UMTS망의 $I_{ub}$에서 AAL2 대역이득 성능평가)

  • 이현진;김재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.739-746
    • /
    • 2004
  • An ATM/AAL2 is standardized to transmit delay sensitive application services, which has small size packet, efficiently. An AAL2 transmission scheme is used to deliver voice and data traffic on the lob interface between base station (Node-B) and Radio Network Controller (RNC) in UMTS network. To predict AAL2 performance, a detailed end-to-end UMTS network performance simulator was developed. We performed detailed simulation(cell packing density and bandwidth gain) for voice and data services in UTRAN. The results indicate that the maximum bandwidth gain in Node-B is about 17% and the bandwidth gain of AAL2 multiplexing in $I_{ub}$ for data services is less than that for voice service. Futhermore, the more offered load increase the more the bandwidth gain decreases in a concentrator.

Performance Enhancement for Vertical Handover in Heterogeneous Wireless Networks Using Freeze DeadLine (이기종 무선망 환경에서 Freeze DeadLine 기법을 통한 수직 핸드오버의 성능개선)

  • Jeong, Hyeon-Jin;Choi, Seung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.499-509
    • /
    • 2014
  • In this paper, we propose that a FDL(Freeze DeadLine) Algorithm to solve handover problems in heterogeneous wireless networks. Many previous studies concentrated on low level layer to solve handover problems. In this paper, however, we concentrate on high level handover problems such as network layer and transport layer. We analyze handover's problems of transport layer in Heterogeneous wireless network, propose the FLD algorithm for better performance than others studies. The Proposed method is analyzed by theoretical frames and we verify that the propose method using the NS-2(Network Simulation - 2).

Modeling and Network Simulator Implementation for analyzing Slammer Worm Propagation Process (슬래머 웜 전파과정 분석을 위한 네트워크 모델링 및 시뮬레이터 구현)

  • Lim, Jae-Myung;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we present a simulation model of Slammer worm propagation process which caused serious disruptions on Internet in the you of 2003 and analyze the process of Slammer by using NS-2. Recently introduced NS-2 modeling called "Detailed Network-Abstract Network Model" had enabled packet level analysis. However, it had deficiency of accommodating only small sized network. By extending the NS-2 DN-AN model to AN-AN model (Abstract Network-Abstract Network model), it is effectively simulated that the whole process from the initial infection to the total network congestion on hourly basis not only for the Korean network but also for the rest of the world networks. Furthermore, the progress of the propagation from Korean network to the other country was also simulated through the AN-AN model. 8,848 hosts in Korean network were infected in 290 second and 66,152 overseas hosts were infected in 308 second. Moreover, the scanning traffics of the worm at the Korean international gateway saturated the total bandwidth in 154 seconds for the inbound traffic and in 135 seconds for the outbound one.

QoS Packet-Scheduling Scheme for VoIP Services in IEEE 802.16e Systems

  • Jang, Jae-Shin;Lee, Jong-Hyup;Cheong, Seung-Kook;Kim, Young-Sun
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.36-41
    • /
    • 2009
  • The IEEE 802.16 wireless metropolitan area network (WMAN) standard is designed to correct expensive communication costs in CDMA-based mobile communication systems and limited coverage problems in wireless LAN systems. Thus, the IEEE 802.16e standard can provide mobile high-speed packet access between mobile stations and the Internet service provider through the base station with cheap communication fees. To efficiently accommodate voice over IP (VoIP) services in IEEE 802.16 systems, an uplink quality of service packet-scheduling scheme is proposed, and its performance is evaluated with an NS-2 network simulator in this paper. Numerical results show that this proposed scheme can increase the system capacity by 100% more than in the unsolicited rand service (UGS) scheme and 30% more than the extended real-time polling service (ertPS) scheme, respectively.

Evaluation of MANET Protocol Scheme for TICN System (TICN체계하 MANET 프로토콜 분석)

  • Son, Hye-Joung;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.469-475
    • /
    • 2009
  • TMMR(Tactical Multiband Multirole Radio) is one of the important equipments for TICN which is our next military tactical communication system and it supplies to the distribution of traffic of C2(Command & Control) and SA(Situation Awareness) for unit of Brigade and below. In this paper, we define the tactical needs of military communication, and evaluate MANET(Mobile Ad-hoc Network) protocol for the future digital battle-field through performance comparison with a network simulator.

A realization of simulator for reliability verification of the communication network PICNET-NP (PICNET-NP 통신망의 신뢰성 검증을 위한 시뮬레이션 구현)

  • Lee, S.W.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2212-2215
    • /
    • 2002
  • This dissertation suggests and implements a middle level network which is called PICNET-NP (Plant Implementation and Control Network for Nuclear Power Plant). PICNET-NP is based partly on IEEE 802.4 token-passing bus access method and partly on IEEE 802.3 physical layer. For this purpose a new interface a physical layer service translator, is introduced. A control network using this method is implemented and applied to a distributed real-time system. To verify the performance of proposed protocol experimental were carried out, and the following results are obtained. 1) proper initialization of the protocol. 2) normal receiving and transmission of data. 3) proper switching of transmission media in case of a fault condition on the one of transmission media. The proposed protocol exhibits the excellent performance in the experimental system. From the test results in the experimental system, the proposed protocol, PICNET-NP, can be used for the upgrading of a nuclear power plant and the distributed control system in the next generation of nuclear power plant.

  • PDF

A Performance Comparison of Ad-hoc Wireless Network Routing Protocols (Ad Hoc 무선망의 Routing Protocol 성능 비교분석)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.208-213
    • /
    • 2003
  • Recently, a variety of new routing protocols targeted specifically wireless mobile nodes environment have been developed. This paper presents the results of a detailed packet level simulation comparing two multi-hop wireless ad-hoc network routing protocols that cover a range of design choices between DSDV and DSR. And we suggest a performance comparison of network routing protocols through NS-2 simulator.

New Contention Resolution algorithm for Optical Burst Switch (광 버스트 스위치를 위한 새로운 충돌 해결 알고리즘)

  • Jeong Myoung Soon;Eom Jin seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12A
    • /
    • pp.1285-1290
    • /
    • 2004
  • In this paper, a new algorithm for contention resolution in optical burst switched network is proposed and simulated. The proposed algorithm is made from the all mixing of wavelength conversion, deflection routing, segmentation, and optical fiber delay line buffering. We analysis the performance of the proposed contention resolution algorithm by using ns-2. The application of the algorithm into Korea backbone network shows the superior performance of a low burst loss probability.

ROV Manipulation from Observation and Exploration using Deep Reinforcement Learning

  • Jadhav, Yashashree Rajendra;Moon, Yong Seon
    • Journal of Advanced Research in Ocean Engineering
    • /
    • v.3 no.3
    • /
    • pp.136-148
    • /
    • 2017
  • The paper presents dual arm ROV manipulation using deep reinforcement learning. The purpose of this underwater manipulator is to investigate and excavate natural resources in ocean, finding lost aircraft blackboxes and for performing other extremely dangerous tasks without endangering humans. This research work emphasizes on a self-learning approach using Deep Reinforcement Learning (DRL). DRL technique allows ROV to learn the policy of performing manipulation task directly, from raw image data. Our proposed architecture maps the visual inputs (images) to control actions (output) and get reward after each action, which allows an agent to learn manipulation skill through trial and error method. We have trained our network in simulation. The raw images and rewards are directly provided by our simple Lua simulator. Our simulator achieve accuracy by considering underwater dynamic environmental conditions. Major goal of this research is to provide a smart self-learning way to achieve manipulation in highly dynamic underwater environment. The results showed that a dual robotic arm trained for a 3DOF movement successfully achieved target reaching task in a 2D space by considering real environmental factor.