• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.02 seconds

Tiered-MAC: An Energy-Efficient Hybrid MAC Protocol for Wireless Sensor Networks (Tiered-MAC: 무선 센서 네트워크를 위한 에너지 효율적인 하이브리드 MAC 프로토콜)

  • Lee, Han-Sun;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.42-49
    • /
    • 2010
  • Because sensor nodes operate with the limited power based on battery which cannot be easily replaced, energy efficiency is a fundamental issue pervading the design of communication protocols developed for wireless sensor networks. In wireless networks, energy efficient MAC protocols can usually be described as being either a contention-based protocol or a schedule-based protocol. It is suitable to use combination of both contention-based protocol and schedule-based protocol, because the strengths and weaknesses of these protocols are contrary to each other. In this paper, in order to minimize energy consumption of sensor nodes and maximize network lifetime, we propose a new MAC protocol called "Tiered-MAC" The Tiered-MAC uses a schedule-based TDMA inside maximum transmission range of sink node and a contention-based CSMA otherwise. Therefore, by efficiently managing the congested traffic area, the Tiered-MAC reduces the unnecessary energy consumption. Based on the ns-2 simulation result, we prove that the Tiered-MAC improves the energy-efficiency of sensor network nodes.

A New Bandwidth Allocation Scheme for Hard Real-time Communication on Dual IEEE 802.11 WLANs (이중 IEEE 802.11 WLAN에서 경성 실시간 통신을 위한 대역폭 할당)

  • Lee, Jung-Hoon;Kang, Mi-Kyung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.633-640
    • /
    • 2005
  • This paper proposes and analyzes a message scheduling scheme and corresponding bandwidth allocation method for the hard real-time communication on dual standard 802.11 Wireless LANs. By making the superframeof one network precede that of the other by half, the dual network architecture can minimize the effect of deferred beacon and reduce the worst case waiting timeby half. The effect of deferred beacon is formalized and directly considered to decide the polling schedule of PCF phase. Simulation results executed via ns-2 show that the proposed scheme can improve the schedulability by 3$36\%$ for real-time messages and give $9\%$ more bandwidth to non-real-time messages for the given stream sets, compared with the network whose bandwidth is just doubled with the same MAC.

A Fast Code Propagation Scheme in Wireless Sensor Networks (무선 센서 네트워크에서 신속한 코드 전송 기법)

  • Lee, Han-Sun;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.1-10
    • /
    • 2008
  • Once the sensor node in wireless sensor networks is installed, it usually operates without human intervention for a long time. The remote code update scheme is required because it is difficult to recall the sensor node in many situations. Therefore, studies on the reliable and efficient transport protocol for code propagation in wireless sensor networks have been increasingly done. However, by considering only the stability aspect of transmission, most of previous works ignore the consideration on the fast code propagation. This results the energy inefficiency by consuming unnecessary energy due to the slow code propagation. In this paper, in order to overcome limitation of the previous code propagation protocols, we propose a new code propagation protocol called "FCPP(Fast Code Propagation Protocol)". The FCPP aims at improving the reliability at well as performance. For this purpose, the FCPP accomplishes the fast code propagation by using the RTT-based transmission rate control and NACK suppression scheme, which provides a better the network utilization and avoids a unnecessary transmission delay. Based on the ns-2 simulation result, we prove that the FCPP Improves significantly both reliability and performance.

A dynamic WRR Algorithm for QoS Guarantee in DiffServ Networks (DiffServ 망에서 QoS를 보장하기 위한 동적 가중치 할당 알고리즘)

  • Chung, Dong-Su;Kim, Byun-Gon;Cho, Hae-Seong;Chung, Kyung-Taek;Kim, Nam-Hee;Lee, Jong-In
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.128-131
    • /
    • 2006
  • There are two traditional scheduling methods known as PQ and WRR in the DiffServ network, however, these two scheduling methods have some drawbacks. In this paper, we propose an algorithm that can be adopted in WRR scheduler with making up for weak points of PQ and WRR. The proposed algorithm produces the control discipline by the fuzzy theory to dynamically assigns the weight of WRR scheduler with checking the Queue status of each class. To evaluate the performance of the proposed algorithm, We accomplished a computer simulation using NS-2. In result, the proposed algorithm enhances the packet discard rate at the EF class than WRR scheduling method and the AF4 class than PQ scheduling method.

  • PDF

Bandwidth Dimensioning for High-Speed Internet Access Networks (초고속인터넷 가입자망의 대역설계)

  • Lee, Tae-Joon;Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1017-1027
    • /
    • 2006
  • Recently, Internet service providers are offering triple play service which combines voice and video services with the existing high speed Internet service under the common network infrastructure of IP protocol, so that they can create more benefit from operating a single network architecture. In line with this movement in the convergence of network and services, in this work we propose a bandwidth dimensioning method for the subscriber network of the IP network at flow level. To that purpose, let us propose a series of bandwidth dimensioning methods: bandwidth for best effort service only, bandwidth dimensioning for premium services, and bandwidth dimensioning schemes for the premium Internet services as well as the best effort service which comprise the TPS. Our link dimensioning method is based on the flow level that incorporates the flow blocking probability as a measure of grade of services(GoS), and investigates the characteristics of the proposed methods via extensive numerical experiments. After that, let us carry out a simulation experiment concerning the delay and loss performance of the packet scheduling for the premium services (QoS) using the bandwidth designed by our proposed method, via which the packet level quality of service (QoS) for the proposed link dimensioning method can be observed.

Design and Performance Evaluation of Wireless Ad-Hoc Network System based on IEEE 802.16j MMR (IEEE 802.16j MMR 기반 무선 애드 혹 네트워크 시스템 설계 및 성능 평가)

  • Ju, Kwangsung;Chung, Kwangsue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.723-733
    • /
    • 2012
  • In wireless ad hoc networks, packet loss and latency are frequently occurred by movement of node. As the number of transmission hops increases in these networks, the throughput is increasingly deteriorated. In this paper, we design the wireless ad hoc network system based on IEEE 802.16j MMR (Mobile Multi-hop Relay), which improves the network performance. Our wireless ad hoc network system used adaptively the nearest BS and Farthest BS scheduling algorithms for efficient data transmission and chose the optimal path that minimize data loss and latency. In order to evaluate performance of the wireless ad hoc network system based on IEEE 802.16j MMR, we used the LWX (Light Wimax) model of NS-2 simulator. Through the simulation, we analyzed the network performance for various scenarios.

Transmission Rate Control in Heterogeneous Wireless Networks Using Multiple Connections (이기종 무선 네트워크에서 다중연결을 이용한 전송률 제어)

  • Jeong, Hyeon-Jin;Choi, Seung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.993-1003
    • /
    • 2012
  • In this paper, we propose a method that wireless mobile nodes can obtain high throughput in heterogeneous wireless networks using multiple connections and it has low packet loses under handover situation. Currently, a mobile node exchanges data with server for one network connection. The proposed method can use high throughput because it doesn't only use one network(WLAN, 3G, etc.) but also use multiple wireless networks. When mobile nodes move to area to use multiple connection, mobile nodes request heterogeneous wireless networks using multiple connections message from the server and the server transmit packets using multiple connections. Also, this method doesn't disconnect previous networks, so packets losses are decreased. Using the NS-2 simulation, we verify that the propose method enhances throughput.

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 시공간 방식의 보안 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.11-16
    • /
    • 2007
  • This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.

Efficient Flooding in Ad hoc Networks using Cluster Formation based on Link Density (애드 혹 네트워크에서 링크밀도기반 클러스터 구축을 이용한 효율적인 플러딩)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.589-596
    • /
    • 2007
  • Although flooding has the disadvantages like a transmission of duplicated packets and a packet collision, it has been used frequently to find a path between a source and a sink node in a wireless ad hoc network. Clustering is one of the techniques that have been proposed to overcome those disadvantages. In this paper, we propose a new flooding mechanism in ad hoc networks using cluster formation based on the link density which means the number of neighbors within a node's radio reach. To reduce traffic overhead in the cluster is to make the number of non-flooding nodes as large as possible. Therefore, a node with the most links in a cluster will be elected as cluster header. This method will reduce the network traffic overhead with a reliable network performance. Simulation results using NS2 show that cluster formation based on the link density can reduce redundant flooding without loss of network performance.

Design and Evaluation of Neighbor-aware AODV Routing Protocol in Mobile Ad-hoc Network (이동 애드혹 네트워크에서 이웃노드 정보를 이용한 AODV 라우팅 프로토콜의 설계 및 평가)

  • Kim, Cheol-Joong;Park, Seok-Cheon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.213-220
    • /
    • 2008
  • A MANET is an autonomous, infrastructureless system that consists of mobile nodes. In MANET, on-demand routing protocols are usually used because network topology changes frequently. The current approach in case of broken routes is to flag an error and re-initiate route discovery either at the source or at the intermediate node. Repairing these broken links is a costly affair in terms of routing overhead and delay involved. Therefore, this paper propose a NAODV(Neighbor-aware AODV) protocol that stands on the basis of an AODV. It sets up the route rapidly if it operates for setting the route directly by using sequence number of neighbor nodes without re-search the route when the route to destination node is broken. Also, it reduces loss of packets. We use NS-2 for the computer simulation and validate that the proposed scheme is better than general AODV in terms of packet delivery ratio and average end-to-end delay. Also, when the proposed protocol is applied to the large ad-hoc network with multiple nodes, the performance is more efficient.