• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.023 seconds

The network reliability based OLSR protocol (네트워크의 신뢰도를 고려한 OLSR 프로토콜)

  • Woo, Hyun-Jae;Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.68-76
    • /
    • 2008
  • It is difficult to maintain mutes in the mobile ad hoc network (MANET) due to the high probability of disconnected routes break by frequent change of topology. The links can have the different reliability about data transmission due to these characteristics. Hence a measure which can evaluate this reliability and a algorithm which reflects this are required. In this paper, we propose routing algorithm based on reliability about transmission. First the bayesian inference which infers the hypothesis by past information is considered to obtain the link's transmission reliability. The other is that the link-based reliability estimation model which considers each link's reliability additionally is proposed while the standard uses only Dijkstra's shortest path algorithm. the simulation results using NS-2 show that the performance of proposed algorithm is superior to the standard OLSR in terms of throughput and stability.

The establishment of Proactive Routing Selection and Maintenance Algorithms for Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크에서 사전 활성화 라우팅 선택과 관리유지 알고리즘의 구축)

  • Cho, Young-Joo;Lee, Yeo-Jin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.73-80
    • /
    • 2007
  • In conventional on-demand mobile ad hoc routing algorithms, an alternate path is sought only after an active path is broken. It incurs a significant cost in terms of money and time in detecting the disconnection and establishing a new route. In this thesis, we propose proactive route selection and maintenance to conventional mobile ad hoc on-demand routing algorithms. The key idea for this research is to only consider a path break to be likely when the signal power of a received packet drops below an optimal threshold value and to generate a forewarning packet. In other words, if a path is lost with high probability, the neighboring node that may easily be cut off notifies the source node by sending a forewarning packet. Then the source node can initiate route discovery early and switched to a reliable path potentially avoiding the disconnection altogether. For the simulational study, network simulator(NS2) is used. The result of simulation shows that the algorithm significantly improves the performance of networks comparing to conventional on-demand routing protocols based on DSR and AODV in terms of packet delivery ratio, packet latency and routing overhead.

Adaptive Congestion Control Scheme of TCP for Supporting ACM in Satellite PEP System (위성 PEP시스템에서 ACM 지원을 위한 적응형 TCP 혼잡제어기법)

  • Park, ManKyu;Kang, Dongbae;Oh, DeockGil
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • Currently satellite communication systems usually use the ACM(Adaptive Coding and Modulation) to extend the link availability and to increase the bandwidth efficiency. However, when ACM system is used for satellite communications, we should carefully consider TCP congestion control to avoid network congestions. Because MODCODs in ACM are changed to make a packet more robust according to satellite wireless link conditions, bandwidth of satellite forward link is also changed. Whereas TCP has a severe problem to control the congestion window for the changed bandwidth, then packet overflow can be experienced at MAC or PHY interface buffers. This is a reason that TCP in transport layer does not recognize a change of bandwidth capability form MAC or PHY layer. To overcome this problem, we propose the adaptive congestion control scheme of TCP for supporting ACM in Satellite PEP (Performance Enhancing Proxy) systems. Simulation results by using ns-2 show that our proposed scheme can be efficiently adapted to the changed bandwidth and TCP congestion window size, and can be useful to improve TCP performance.

TCP CAE : Improving Wireless TCP under Reverse Background Congestion through Comparative ACK-based Estimator (TCP CAE: ACK기반 역방향 네트워크의 혼잡 감지기법)

  • Kim, Jae-Hyun;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2008
  • TCP receivers deliver ACK packets to senders for reliable end-to-end transfer. When ACK packets are not transferred properly because of network congestion, the performance of TCP degrades. This paper proposes a reverse congestion warning mechanism and a congestion handling mechanism in heterogeneous networks with heavy background traffic in the backward direction. Help from TCP receivers or hardware such as routers and gateways other than the ACK packets themselves is not necessary. TCP senders compare the arrival intervals of ACK data passed from receivers and the difference in t imestamp values echoed by receivers. According to the simulation results using the NS-2 network simulator, the proposed scheme shows a performance elevation of 20% greater than Reno, 150% greater than New Reno, and 450% greater than Westwood, respectively, under heterogeneous networks and that the error rate of the radio link is 1% when the backward network is congested.

  • PDF

Energy Efficient Congestion Control Scheme in Ad-hoc Networks (Ad-hoc 통신망의 에너지 효율적인 혼잡 제어 기법)

  • Cho, Nam-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.369-379
    • /
    • 2006
  • In recent years, there have been many researches about Ad-hoc Networks which is available to communicate freely between mobile devices by using multi-hop without any support of relay base or access point. TCP that used the most widely transport protocol in the Internet repeats packet loss and retransmission because it increases congestion window size by using reactive congestion control until packet loss occurs. As a result of this, energy of mobile device is wasted unnecessarily. In this paper, we propose TCP-New Veno in order to improve the energy efficiency of mobile device. According to the state of network, the scheme adjusts appropriate size of congestion window. Therefore, the energy efficiency of mobile device and utilization of bandwidth are improved by the scheme. From the simulation by using ns-2, we could see more improved energy efficiency with TCP-New Veno than those with TCP in Ad-hoc Networks.

TAS: TCP-Aware Sub-layer over IEEE 802.11-based wireless LANs (IEEE 802.11 기반 무선랜에서 TCP 인진서브 계층 TAS)

  • Choi, Nak-Jung;Jung, Ha-Kyung;Ryu, Ji-Ho;Seok, Yong-Ho;Choi, Yang-Hee;Kwon, Tae-Kyoung
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.355-368
    • /
    • 2006
  • This paper introduces a new split-TCP approach for improving TCP performance over IEEE 802.11-based wireless LANs. TCP over wireless LANs differently from wired networks is not aggressive, which is a fundamental reason for poor performance. Therefore, we propose TAS (TCP-Aware Sub-layer) to migigate this problem. Our scheme extends the split-connection approach that divides a connection into two different connections at a split point such as an access point (AP). Using TAS, a wireless node emulates TCP ACK packets using MAC ACK frames, instead of receiving real TCP ACK packets. We compared TAS with both normal TCP and I-TCP (Indirect TCP) by NS2 simulation. Results show that TAS achieves higher throughput, more fair resource allocation and, in power-saving mode, shorter delays.

Group Mobility Control Mechanism for Micro Unmanned Aerial Vehicle (소형 무인 비행체 집단의 이동성 제어 기법)

  • Nam, Su-Hyun;Choi, Myung-Whan;Choi, Hyo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.99-107
    • /
    • 2012
  • We propose control mechanism of UAV(Unmanned Aerial Vehicle) group for making the communication network to the base station after the target is found. We assume UAVs can communicate to each other by wireless LAN without existing communication infrastructure. UAVs started to fly in linear formation, after finding target, UAVs move to the base station to send the information about the target. At least one UAV stays the position that the target is found. This paper explains the mechanism supporting reliable connectivity during UAV group's flying. We verify the proposed scheme and evaluate the performance through NS-2 simulation. The proposed scheme can be applied to the disaster area and war zone, which the existing communication infrastructure cannot be worked.

An Efficient Peer-to-Peer Streaming Scheme Based on a Push-Mesh Structure (푸시-메시 구조 기반의 효율적인 피어투피어 스트리밍 기법)

  • Kim, Jin-Sung;Kim, Dong-Il;Kim, Eun-Sam;Pae, Sung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.81-89
    • /
    • 2010
  • The research on peer-to-peer streaming schemes has largely focused on tree-push and mesh-pull structures. However, the tree-push structure has a defect that the tree restructuring time is long, and the mesh-pull structure has long startup delay and lag time from source servers. In this paper, we propose a new peer-to-peer live streaming scheme based on a push-mesh structure that takes advantages of tree-push and mesh-pull structure simultaneously. This structure basically provides the mesh-pull mechanism for data transmission and utilizes peers with high network upload capacity. It also supports the push mechanism along with paths from a source server, super peers, and selected general peers. By NS-2 simulation experiments, we finally show that our proposed scheme can achieve shorter startup delay than the mesh-pull structure, similar lag time to tree-push structure and best playback continuity among the three schemes.

Performance Analysis of DoS Security Algorithm for Multimedia Contents Services (멀티미디어 콘텐츠의 서비스거부 방지 알고리즘 성능분석)

  • Jang, Hee-Seon;Shin, Hyun-Chul;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.19-25
    • /
    • 2010
  • In this paper, the performance of the DoS information security algorithm is evaluated to provide the multimedia traffic between the nodes using the multicasting services. The essence technology for information security to distribute the multimedia contents is presented. Under the multicasting services, a node participating new group needs a new address and the node compares the collision with the existing nodes, then DoS attack can be occurred between the nodes by a malicious node. Using the NS2 simulator, the number of DoS attacks, the average number of trials to generate new address, and the average time to create address are analyzed. From simulation results, the efficient algorithm with relevant random number design according to the DRM network is needed to provide secure multimedia contents distribution.

MAC Aware Multi-Channel Routing Protocol for Multi-Interface Ad-Hoc Wireless Networks (다중-인터페이스 애드-혹 무선 네트워크를 위한 MAC 인식 다중-채널 라우팅 프로토콜)

  • Lim, Hunju;Joung, Sookyoung;Lee, Sungwha;Park, Inkap
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.249-258
    • /
    • 2013
  • In multi-hop ad hoc networks, multi-interface multi-channel architecture is being noticing as methodology to improve the effective bandwidth and end-to-end throughput, But since existing routing metrics designed for networks based on single-interface exactly can not reflects the nature of networks based on multi-interface multi-channel, we are not expected the effect of throughput improvement. there had been proposal of MCR that discover high throughput by using metrics such as channel diversity and interface switching cost. however, MCR have an problem that is degraded it's performance in congested networks, because it not reflects the impact of traffic load. in this paper, we propose MAMCR metric, which select high throughput paths under congested conditions by combination MCR with channel access time metric, and conform it's the effect of performance improvement by ns-2 simulation.