• Title/Summary/Keyword: network simulator

Search Result 944, Processing Time 0.026 seconds

IARAM: Internet Attack Representation And Mapping Mechanism for a Simulator (IARAM: 시뮬레이터를 위한 인터넷 공격 표현 및 맵핑 기법)

  • Lee, Cheol-Won;Kim, Jung-Sik;Kim, Dong-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.89-102
    • /
    • 2008
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the attack of internet worm has grown. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. By this reason, we often use the modeling network simulation technique. But, it also has problem that it difficult to apply each worm attacks to simulation. In this paper, we propose worm attack representation and mapping methods for apply worm attack to simulation. The proposed method assist to achieve the simulation efficiency. And we can express each worm attacks more detail. Consequently, the simulation of worm attacks has the time-efficiency and the minuteness.

An Experimental Study on Pairwise Key Pre-distribution Schemes of Wireless Sensor Networks Considering 3D Environments (3D 환경을 고려한 무선 센서 네트워크의 키 사전 분배 기법 실험 연구)

  • Yun, Hyemin;Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.975-980
    • /
    • 2020
  • To protect wireless sensor networks (WSNs), various key distribution and management schemes have been proposed. However, most of them conducted simulations and experiments for performance evaluation by considering only the two-dimensional (2D) environments. In this paper, we investigate the effect of real-world three-dimensional (3D) topographic features on the key pre-distribution schemes for WSNs. For this purpose, we analyze and compare the performance of three pairwise key pre-distribution schemes in 2D and 3D environments: full pairwise (FP), random pairwise (RP), and full and random pairwise (FRP) schemes. For the experiments, we employ a network simulator NS-3 and 3D graphic tools such as Blender and Unity. As a result, we confirm that there was a difference in the performance of each scheme according to the actual 3D terrain and that the location-based FRP that considers deployment errors, has the highest efficiency in many aspects.

Construction of a Virtual Mobile Edge Computing Testbed Environment Using the EdgeCloudSim (EdgeCloudSim을 이용한 가상 이동 엣지 컴퓨팅 테스트베드 환경 개발)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1102-1108
    • /
    • 2020
  • Mobile edge computing is a technology that can prepare for a new era of cloud computing and compensate for shortcomings by processing data near the edge of the network where data is generated rather than centralized data processing. It is possible to realize a low-latency/high-speed computing service by locating computing power to the edge and analyzing data, rather than in a data center far from computing and processing data. In this article, we develop a virtual mobile edge computing testbed environment where the cloud and edge nodes divide computing tasks from mobile terminals using the EdgeCloudSim simulator. Performance of offloading techniques for distribution of computing tasks from mobile terminals between the central cloud and mobile edge computing nodes is evaluated and analyzed under the virtual mobile edge computing environment. By providing a virtual mobile edge computing environment and offloading capabilities, we intend to provide prior knowledge to industry engineers for building mobile edge computing nodes that collaborate with the cloud.

A Non-Linear Overload Control Scheme for SIP Proxy Queues (SIP 프록시 큐의 비선형적 과부하 제어 방법)

  • Lee, Jong-Min;Jeon, Heung-Jin;Kwon, Oh-Jun
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Recently, the Internet telephony has been used rather than the traditional telephony by many Internet users, with low cost. Session Initiation Protocol(SIP) is the standard of application layer protocol for establishment and disconnection of the session for Internet telephony. SIP mainly runs over the UDP for transport. So in case of the loss of the INVITE request message, the message is retransmitted by an appropriate timer for reliable transmission of the UDP message. Though the retransmission is useful for ensuring the reliability of SIP messages sent by the users, it may cause the overload traffic in the SIP proxy server. The overload in SIP proxy servers results in the loss of many input messages. This paper presents a non-linear overload control algorithm to resolve the overload condition of the server. we simulate our proposed algorithm using the network simulator ns-2. The simulation results show that the throughput of the server with the proposed algorithm have been improved about 12% compared to the existing linear control algorithm.

A Study on Design of Safety Transmission Unit for Next-Generation Train Control System (차세대 열차제어시스템 안전전송장치 설계에 관한 연구)

  • Tae-Woon Jung;Ho-Cheol Choo;Chae-Joo Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.563-570
    • /
    • 2023
  • The Safety Transmission Unit(STU) is a critical device used in railway systems to ensure safe and efficient operations by providing communication between trains and railway infrastructure. It is responsible for transmitting vital information and commands, allowing for the control and coordination of train movements. The STU plays a crucial role in maintaining the safety of passengers, crew, and the overall railway network. This paper presents the design and testing of a STU for the next-generation wireless-based train control system. An analysis of european and domestic standards was conducted to review requirements and ensure the design of a STU for the train control system meets international standards. Based on this analysis, hardware and software designs were developed to create an internationally recognized level of safety for the communication device. To verify the functionality of the STU, a simulator was developed, and it was confirmed that the designed features were successfully implemented.

ABS Ratio Estimation Considering the Number of UEs in CRE Regions for LTE-A Heterogeneous Networks (LTE-A 기반 이종 네트워크에서 CRE 영역내 단말들의 수를 고려한 ABS 비율 산출 방법)

  • Sun, Jong-Suk;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.104-112
    • /
    • 2017
  • The CRE (Cell Range Expansion) that selects the small cell with more efficient uplink resources has been developed by 3GPP to relieve the problem of the traffic imbalance due to the power differences between macro and small cells in HetNet. In addition, ABS (Almost Blank Subframes) has been proposed to resolve the signal interference problem due to the operation CREs. This paper proposes an effective method to calculate the ABS ratio by considering the proportion of the number of UEs in CRE and macro cell ranges, as well as the number of small cells in a macro cell. The proposed method has been implemented on the LTESim simulator, and compared with previously proposed methods. The experimental results show that the proposed method can improve the throughput and packet loss ratio performances. In particular, it is also shown that CRE bias values affect those performances, and there exist effective CRE bias values to derive the best performances.

Comparing State Representation Techniques for Reinforcement Learning in Autonomous Driving (자율주행 차량 시뮬레이션에서의 강화학습을 위한 상태표현 성능 비교)

  • Jihwan Ahn;Taesoo Kwon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.3
    • /
    • pp.109-123
    • /
    • 2024
  • Research into vision-based end-to-end autonomous driving systems utilizing deep learning and reinforcement learning has been steadily increasing. These systems typically encode continuous and high-dimensional vehicle states, such as location, velocity, orientation, and sensor data, into latent features, which are then decoded into a vehicular control policy. The complexity of urban driving environments necessitates the use of state representation learning through networks like Variational Autoencoders (VAEs) or Convolutional Neural Networks (CNNs). This paper analyzes the impact of different image state encoding methods on reinforcement learning performance in autonomous driving. Experiments were conducted in the CARLA simulator using RGB images and semantically segmented images captured by the vehicle's front camera. These images were encoded using VAE and Vision Transformer (ViT) networks. The study examines how these networks influence the agents' learning outcomes and experimentally demonstrates the role of each state representation technique in enhancing the learning efficiency and decision- making capabilities of autonomous driving systems.

Design and Performance Evaluation of a New SR-ARQ with an Adaptive Timer and Delayed NAK for Improving Handover Performance in Next-Generation Mobile Communication Networks (차세대 이동 통신망에서 핸드오버 성능 향상을 위한 적응형 타이머와 지연 NAK을 이용한 SR-ARQ 설계 및 성능 평가)

  • Park, Man-Kyu;Choi, Yun-Chul;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young;Kim, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.48-59
    • /
    • 2009
  • Next generation mobile communication system will have various access networks and provide seamless multimedia data service to mobile nodes. The WiNGS system, one of these access network, has superior RAT(Radio Access Technology) and network connectivity other than previous ones. In this paper, we propose link-layer SR-ARQ between mobile node and WAGW to solve packet re-ordering problem during handover. In the proposed scheme, we apply the adaptive timer at the SR-ARQ sender to reduce unnecessary packet retransmission during handoff and delayed NAK algorithm at the SR-ARQ receiver for delaying NAK response due to temporary out-of-sequenced frames. We evaluate the performance of the proposed scheme by implementing the new SR-ARQ protocol at the link-layer using ns-2 simulator, and show the handover performance is improved greatly by preventing unnecessary retransmission.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Performance Evaluation of LTE-A Random Access Procedure for IoT Service (IoT 서비스를 위한 LTE-A 랜덤 액세스 절차 성능 평가)

  • Yoo, Seung-Su;Lee, Sung-Hyung;Shin, Jaesheung;Oh, Sung-Min;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.965-973
    • /
    • 2016
  • As increase of IoT services in wireless communications, the performance evaluation is required to connects massive number of devices in LTE-A system. Existing performance analysis of 3GPP TR 37.868 is shown the limited results up to the number of devices only 30,000 in a cell. So, it is required the performance analysis according to various parameter values in the greater number of devices environment. In this paper, to evaluate the performance, we developed the new modules to simulate LTE-A random access procedures because of a limit that accommodate massive number of devices in existing LTE module. The simulator was developed by OPNET and it can support up to 100,000 devices per cell. This paper also represents the performance analysis results according to the number of preambles, the maximum number of preamble transmissions, backoff indicator and msg2 window size in the same environment with 3GPP TR 37.868. This results are expected to be utilized such as the transition to 5G network and standardization activities.