• Title/Summary/Keyword: Ns-2

Search Result 1,729, Processing Time 0.028 seconds

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

A Scheduling Algorithm for Real-Time Traffic in IEEE802.11e HCCA (IEEE 802.11e HCCA 기반의 실시간 트래픽을 위한 스케줄링 알고리즘)

  • Joung, Ji-Noo;Kim, Jong-Jo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • In this paper we propose a scheduling algorithm for supporting Quality of Service(QoS) in IEEE 802.11e HCCA referred to as ASR-DRR and ASD-DRR, which aims at providing improved performance for the support of multimedia traffic. Although We identify the problem of the current IEEE 802.11e HCCA (Hybrid Coordination Function Controlled Channel Access) scheduler and its numerous variations, that the queue information cannot be notified to the Hybrid Coordinator (HC) timely, therefore the uplink delay lengthens unnecessarily. We suggests a simple solution and a couple of implementation practices, namely the Adaptive Scheduler with RTS/CTS (ASR) and Adaptive Scheduler with Data/Ack (ASD). They are both further elaborated to emulate the Deficit Round Robin (DRR) scheduler. They are also compared with existing exemplary schedulers through simulation, and shown to perform well.

Efficient Target Site Selection for an RNA-cleaving DNAzyme through Combinatorial Library Screening

  • Kim, Ki-Sun;Choi, Woo-Hyung;Gong, Soo-Jeong;Oh, Sang-taek;Kim, Jae-Hyun;Kim, Dong-Eun
    • Bulletin of the Korean Chemical Society
    • /
    • v.27 no.5
    • /
    • pp.657-662
    • /
    • 2006
  • Identification of accessible sites in targeted RNAs is a major limitation to the effectiveness of antisense oligonucleotides. A class of antisense oligodeoxynucleotides, known as the “10-23” DNA enzyme or DNAzyme, which is a small catalytic DNA, has been shown to efficiently cleave target RNA at purine-pyrimidine junctions in vitro. We have designed a strategy to identify accessible cleavage sites in the target RNA, which is hepatitis C virus nonstructural gene 3 (HCV NS3) RNA that encodes viral helicase and protease, from a pool of random DNAzyme library. A pool of DNAzymes of 58 nucleotides-length that possess randomized annealing arms, catalytic core sequence, and fixed 5'/3'-end flanking sequences was designed and screened for their ability to cleave the target RNA. The screening procedure, which includes binding of DNAzyme pool to the target RNA under inactive condition, selection and amplification of active DNAzymes, incubation of the selected DNAzymes with the target RNA, and target site identification on sequencing gels, identified 16 potential cleavage sites in the target RNA. Corresponding DNAzymes were constructed for the selected target sites and were tested for RNA-cleavage in terms of kinetics and accessibility. These selected DNAzymes were effective in cleaving the target RNA in the presence of $Mg^{2+}$. This strategy can be applicable to identify accessible sites in any target RNA for antisense oligonucleotides-based gene inactivation methods.

Influence of Sustain Pulse-Width on the Electrical and Optical characteristics in AC-PDPs

  • Jeong, Y.W.;Cho, T.S.;Kim, T.Y.;Choi, M.C.;Ahn, J.C.;Jeong, J.M.;Lim, J.Y.;Choi, S.H.;Chong, M.W.;Kim, S.S.;Ko, J.J.;Kim, D.I.;Lee, C.W.;Kang, S.O.;Cho, G.S.;Choi, E.H.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2000.04a
    • /
    • pp.155-158
    • /
    • 2000
  • Influence of sustain pulse-width on electro-luminous efficiency is experimentally investigated for surface discharge of AC-PDP. A square pulse with variable duty ratio and rising time of 300 ns has been used in the experiment. It is found that the firing voltage is decreased as the pulse-width is increased from 2 ${\mu}s$ to 8 ${\mu}s$ with sweeping frequency range of 10 kHz to 50 kHz. It has been found that the optimal sustain pulse-width is in the range of $3{\sim}4{\mu}s$ under driving frequency range of 30 kHz and 50 kHz, based on observation of memory coefficient, wall charge, and wall voltage as well as luminous efficiency.

  • PDF

A ROENTGENOCEPHALOMETRIC STUDY ON MAXILLARY PROTRUSION (상악전돌에 관한 방사선 두부계측학적 연구)

  • Chang, Young Il
    • The korean journal of orthodontics
    • /
    • v.10 no.1
    • /
    • pp.15-27
    • /
    • 1980
  • This study was undertaken to compare the craniofacial morphology of Class II, Division 1 malocclusion with that of normal occlusion in children, and to investigate the incidence of various Class II, Division 1 craniofacial skeletal patterns. The subjects consist of thirty seven boys and fifty three girls with Class II, Division 1 malocclusion, and forty six boys and eighty one girls 10-15 years with normal occlusion. Measurements were recorded, tabulated and analyzed on the lateral cephalograms by the degree of SNA, SNB and ANB. The following characteristics of the Class II, Division 1 skeletal pattern were observed. 1. The anteroposterior relationship of the maxilla to the cranium in the Class II, Division 1 was very similar to that of normal occlusion. 2, Mandible of the Class II, Division 1 malocclusion was in the posterior position in relation to the cranial anatomy when compared to normal. 3. The chin point as measured by SN Pog and NS Gn showed distal positioning in relation to normal occlusion. 4. SN to mandibular plane angle was large in Class II, Division 1 malocclusion. 5. Mandibular incisor inclination was not significantly different between Class II, Division 1 malocclusion and normal occlusion, but maxillary incisors inclined and positioned labially and consequently overjet was large in Class II, Division 1 malocclusion. 6. Class II, Division 1 malocclusion was divided into four types of craniofacial skeletal pattern. The most common Class II, Division 1 pattern was found to be type C in which SN-Mand. Pl. was above mean range of normal occlusion. The next frequent pattern was found to be type A in which maxilla and mandible were within normal range of protrusion while upper incisors were severly labially inclined.

  • PDF

Developing the Joint Employment System of Occupational Nurse Practitioners for the Minor Enterprises in Korea (part 1) (보건관리자 공동채용 모형 개발 (I) -산업간호사 의견을 중심으로-)

  • Lee, Sung Eun;Kim, Young Im;Chun, Kyung Za;Kim, Hwa Joong
    • Korean Journal of Occupational Health Nursing
    • /
    • v.7 no.1
    • /
    • pp.97-114
    • /
    • 1998
  • The occupational health services for the minor enterprises are poor comparing with that of large enterprises in Korea. In 1997, Korean government announced officially the law on joint employment system of occupational health practitioners to solve the problems. This study is to develop the model on the joint employment system of occupational nurse practitioners for minor enterprises in Korea based on the opinions of occupational health nurses (OH Ns). The data were collected by questionnares from October to November in 1997. The number of subjects was 210 occupational health nurses who had participated the mandatory nursing education program provided by the Korean Occupational Health Nurses Association(KOHNA). The response rate was 47.1%. The contents of questionnaires were general characteristics, occupational & job characteristics of OHNs, and the views on the joint employment system. The SAS-PC program was used for the statistical analysis. The results were as followed, (1) The proper number of industies was 3 and the appropriate number of workers was 448 for one joint employed occupational nurse practitioner (J EONP). (2) 44.7% of the OHNs wanted that the Ministry of Labor monitored the way and content of contraction b/w JEONP and minor emterprises, 82.6% of the OHNs wanted that KOHNA managed the employment informations. (3) The OHNs of occupational health agencies showed more positive attitude than the OHNs of private industries on the joint employment system. (4) 88.3% of the OHNs wanted the education training for JEONP. Especially in occupational hygiene and safety control. (5) The OHNs expected the role expansion of Occupational Health Nursing by JEONP system. At the same time they worried the adverse effects. For the successful execution of this system, it is necessary the cooperation among the Ministry of Labor, KOHNA, the minor enterprises, and the OHNs.

  • PDF

Provisioning QoS for WiFi-enabled Portable Devices in Home Networks

  • Park, Eun-Chan;Kwak, No-Jun;Lee, Suk-Kyu;Kim, Jong-Kook;Kim, Hwang-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.720-740
    • /
    • 2011
  • Wi-Fi-enabled portable devices have recently been introduced into the consumer electronics market. These devices download or upload content, from or to a host machine, such as a personal computer, a laptop, a home gateway, or a media server. This paper investigates the fairness among multiple Wi-Fi-enabled portable devices in a home network when they are simultaneously communicated with the host machine. First, we present that, a simple IEEE 802.11-based home network suffers from unfairness, and the fairness is exaggerated by the wireless link errors. This unfairness is due to the asymmetric response of the TCP to data-packet loss and to acknowledgment-packet loss, and the wireless link errors that occur in the proximity of any node; the errors affect other wireless devices through the interaction at the interface queue of the home gateway. We propose a QoS-provisioning framework in order to achieve per-device fairness and service differentiation. For this purpose, we introduce the medium access price, which denotes an aggregate value of network-wide traffic load, per-device link usage, and per-device link error rate. We implemented the proposed framework in the ns-2 simulator, and carried out a simulation study to evaluate its performance with respect to fairness, service differentiation, loss and delay. The simulation results indicate that the proposed method enforces the per-device fairness, regardless of the number of devices present and regardless of the level of wireless link errors; furthermore it achieves high link utilization with only a small amount of frame losses.

TCP NJ+: Packet Loss Differentiated Transmission Mechanism Robust to High BER Environments (TCP NJ+ : 높은 BER에 강인한 패킷 손실 원인별 처리기반 전송방식)

  • Kim, Jung-Rae;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.125-132
    • /
    • 2007
  • Transmission mechanisms that include an available bandwidth estimation algorithm and a packet loss differentiation scheme, in general, exhibit higher TCP performance in wireless networks. TCP New Jersey, known as the best existing scheme in terms of goodput, improves wireless TCP performance using the available bandwidth estimation at the sender and the congestion warning at intermediate routers. Although TCP New Jersey achieves 17% and 85% improvements in goodput over TCP Westwood and TCP Reno, respectively, we further improve TCP New Jersey by exploring improved available bandwidth estimation, retransmission timeout, and recovery mechanisms. Hence, we propose TCP New Jersey PLUS (shortly TCP NJ+), showing that under 1% packet loss rate, it outperforms 3% by TCP New Jersey and 5% by TCP Wes1wood. In 5% packet loss rate, a characteristic of high bit-error-rate wireless network, it outperforms other TCP variants by 19% to 104% in terms of goodput even when the network is in bi-directional congestion.

  • PDF

QoS-Aware Approach for Maximizing Rerouting Traffic in IP Networks

  • Cui, Wenyan;Meng, Xiangru;Yang, Huanhuan;Kang, Qiaoyan;Zhao, Zhiyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4287-4306
    • /
    • 2016
  • Network resilience provides an effective way to overcome the problem of network failure and is crucial to Internet protocol (IP) network management. As one of the main challenges in network resilience, recovering from link failure is important to maintain the constancy of packets being transmitted. However, existing failure recovery approaches do not handle the traffic engineering problem (e.g., tuning the routing-protocol parameters to optimize the rerouting traffic flow), which may cause serious congestions. Moreover, as the lack of QoS (quality of service) restrictions may lead to invalid rerouting traffic, the QoS requirements (e.g., bandwidth and delay) should also be taken into account when recovering the failed links. In this paper, we first develop a probabilistically correlated failure model that can accurately reflect the correlation between link failures, with which we can choose reliable backup paths (BPs). Then we construct a mathematical model for the failure recovery problem, which takes maximum rerouting traffic as the optimizing objective and the QoS requirements as the constraints. Moreover, we propose a heuristic algorithm for link failure recovery, which adopts the improved k shortest path algorithm to splice the single BP and supplies more protection resources for the links with higher priority. We also prove the correctness of the proposed algorithm. Moreover, the time and space complexity are also analyzed. Simulation results under NS2 show that the proposed algorithm improves the link failure recovery rate and increases the QoS satisfaction rate significantly.

A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network (무선 메쉬 망의 서비스 품질 향상을 위한 확률적 부하 분담 기법)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.375-382
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.