• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.026 seconds

A TCP-Friendly Congestion Control Scheme using Hybrid Approach for Reduction of Transmission Delay for Real-Time Video Stream (실시간 비디오 스트림의 전송지연 축소를 위한 TCP 친화적 하이브리드 혼잡제어 기법)

  • 김형진;조정현;나인호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.304-309
    • /
    • 2004
  • Recently, the needs for multimedia stream such as digital audio and video in the Internet has increased tremendously. Unlike TCP, the UDP protocol, which has been used to transmit streaming traffic thorough the Internet, does not apply any congestion control mechanism to regulate the data flow thorough the shared network And it leads to congestion collapse of the Internet and results in long-term transmission delay. To avoid any adverse effect on the current Internet functionality, a now protocol of modification or addition of some functionality to perform congestion control and to reduce huge transmission delay in transmitting of multimedia stream are in study. TCP-friendly congestion control mechanism is classified into two : one is window-based congestion control scheme using general window management functionalities, the other is rate-based congestion control scheme using TCP modeling equation. In this paper, we propose an algorithm for improving the transmitting rate on a hybrid TCP-friendly congestion control scheme combined with widow-based and late-based congestion control for multimedia stream. And we also simulate the performance of improved TEAR implementation using NS. With He simulation results, we show that the improved TEAR can provide better fairness and lower rate fluctuations than TCP.

A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level (노드의 악의적 행위패턴 및 신뢰수준 기반의 MANET Secure 라무팅 방안)

  • Park, Seong-Seung;Park, Gun-Woo;Ryu, Keun-Ho;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.103-117
    • /
    • 2009
  • In MANET(Mobile Ad-Hoc Network), providing security to routing has been a significant issue recently. Existing studies, however, focused on either of secure routing or packet itself where malicious operations occur. In this paper, we propose SRPPnT(A Secure Routing Protocol in MANET based on Malicious Pattern of Node and Trust Level) that consider both malicious behavior on packet and secure routing. SRPPnT is identify the node where malicious activities occur for a specific time to compose trust levels for each node, and then to set up a routing path according to the trust level obtained. Therefore, SRPPnT is able to make efficient countermeasures against malicious operations. SRPPnT is based on AODV(Ad-Hoc On-Demand Distance Vector Routing). The proposed SRPPnT, from results of the NS-2 network simulation. shows a more prompt and accurate finding of malicious nodes than previous protocols did, under the condition of decreased load of networks and route more securely.

Channel Model and Wireless Link Performance Analysis for Short-Range Wireless Communication Applications in the Terahertz Frequency (테라헤르츠 대역 주파수에서 근거리 무선 통신 응용을 위한 채널 모델 및 무선 링크 성능 분석)

  • Chung, Tae-Jin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.9
    • /
    • pp.868-882
    • /
    • 2009
  • In this paper, channel model and wireless link performance analysis for the short-range wireless communication system applications in the terahertz frequency which is currently interested in many countries will be described. In order to realize high data rates above 10 Gbps, the more wide bandwidths will be required than the currently available bandwidths of millimeter-wave frequencies, therefore, the carrier frequencies will be pushed to THz range to obtain larger bandwidths. From the THz atmospheric propagation characteristics based on ITU-R P.676-7, the available bandwidths were calculated to be 68, 48 and 45 GHz at the center frequencies of 220, 300 and 350 GHz, respectively. With these larger bandwidths, it was shown from the simulation that higher data rate above 10 Gbps can be achieved using lower order modulation schemes which have spectral efficiency of below 1. The indoor propagation delay spread characteristics were analyzed using a simplified PDP model with respect to building materials. The RMS delay spread was calculated to be 9.23 ns in a room size of $6\;m(L){\times}5\;m(W){\times}2.5\;m(H)$ for the concrete plaster with TE polarization, which is a similar result of below 10 ns from the Ray-Tracing simulation in the reference paper. The indoor wireless link performance analysis results showed that receiver sensitivity was $-56{\sim}-46\;dBm$ over bandwidth of $5{\sim}50\;GHz$ and antenna gain was calculated to be $26.6{\sim}31.6\;dBi$ at link distance of 10m under the BPSK modulation scheme. The maximum achievable data rates were estimated to be 30, 16 and 12 Gbps at the carrier frequencies of 220, 300 and 350 GHz, respectively, under the A WGN and LOS conditions, where it was assumed that the output power of the transmitter is -15 dBm and link distance of 1 m with BER of $10^{-12}$. If the output power of transmitter is increased, the more higher data rate can be achieved than the above results.

A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios

  • Wang, Lusheng;Chang, Kun;Wang, Xiumin;Wei, Zhen;Hu, Qingxin;Kai, Caihong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4122-4143
    • /
    • 2018
  • Because of the increment in network scale and test expenditure, simulators gradually become main tools for research on key problems of wireless networking, such as radio resource management (RRM) techniques. However, existing simulators are generally event-driven, causing unacceptably large simulation time owing to the tremendous number of events handled during a simulation. In this article, a mass-processing framework for RRM simulations is proposed for the scenarios with a massive amount of terminals of Internet of Things accessing 5G communication systems, which divides the time axis into RRM periods and each period into a number of mini-slots. Transmissions within the coverage of each access point are arranged into mini-slots based on the simulated RRM schemes, and mini-slots are almost fully occupied in dense scenarios. Because the sizes of matrices during this process are only decided by the fixed number of mini-slots in a period, the time expended for performance calculation is not affected by the number of terminals or packets. Therefore, by avoiding the event-driven process, the proposal can simulate dense scenarios in a quite limited time. By comparing with a classical event-driven simulator, NS2, we show the significant merits of our proposal on low time and memory costs.

Performance of an Active Channel Scanning Scheme for Fast Handover in Mobile Wireless LAN Systems (이동무선 LAN 시스템의 고속핸드오버를 위해 능동적인 유효채널탐색방식의 성능분석)

  • Yoon, Hong;Lim, Jae-Myung;Yoon, Chong-Ho;Kim, Se-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.44-53
    • /
    • 2006
  • In this paper, we propose a new Active Channel Scanning scheme by scanning active channels employed by neighbor APs' with the handover counts and non overlap channel information for fast handover. Under the proposed scheme, the mobile which has finished handover to connect a new APsends the neighbor AP's channel information learned by itself during handover to the new AP. And then, the new AP relays the neighbor channel information to the old AP. It decides a priority by handover counts and non overlap channel information for building a Neighbor Channel Table(NCT), and also sends the table information to its associated mobile nodes, periodically. As a result each mobile can scan only active neighbor APs' channels when performs handover based on the referring to NCT information. Using NS-2 Simulator, we applied to supposed ACS that the result of simulation decides to sort by handover counts and non overlap channel information. we evaluate our proposed ACS scheme based on NCT along with the full scanning scheme and the selective scanning scheme. From simulation results, we show that the proposed scheme is advantageous over the other two schemes in terms of the number of scanning channels and the scanning latency.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

An Efficient Hardware Implementation of AES Rijndael Block Cipher Algorithm (AES Rijndael 블록 암호 알고리듬의 효율적인 하드웨어 구현)

  • 안하기;신경욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.53-64
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm, "Rijndael". An iterative looping architecture using a single round block is adopted to minimize the hardware required. To achieve high throughput rate, a sub-pipeline stage is added by dividing the round function into two blocks, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. The round block is implemented using 32-bit data path, so each sub-pipeline stage is executed for four clock cycles. The S-box, which is the dominant element of the round block in terms of required hardware resources, is designed using arithmetic circuit computing multiplicative inverse in GF($2^8$) rather than look-up table method, so that encryption and decryption can share the S-boxes. The round keys are generated by on-the-fly key scheduler. The crypto-processor designed in Verilog-HDL and synthesized using 0.25-$\mu\textrm{m}$ CMOS cell library consists of about 23,000 gates. Simulation results show that the critical path delay is about 8-ns and it can operate up to 120-MHz clock Sequency at 2.5-V supply. The designed core was verified using Xilinx FPGA board and test system.

A Modified Random Early Detection Algorithm: Fuzzy Logic Based Approach

  • Yaghmaee Mohammad Hossein
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.337-352
    • /
    • 2005
  • In this paper, a fuzzy logic implementation of the random early detection (RED) mechanism [1] is presented. The main objective of the proposed fuzzy controller is to reduce the loss probability of the RED mechanism without any change in channel utilization. Based on previous studies, it is clear that the performance of RED algorithm is extremely related to the traffic load as well as to its parameters setting. Using fuzzy logic capabilities, we try to dynamically tune the loss probability of the RED gateway. To achieve this goal, a two-input-single-output fuzzy controller is used. To achieve a low packet loss probability, the proposed fuzzy controller is responsible to control the $max_{p}$ parameter of the RED gateway. The inputs of the proposed fuzzy controller are 1) the difference between average queue size and a target point, and 2) the difference between the estimated value of incoming data rate and the target link capacity. To evaluate the performance of the proposed fuzzy mechanism, several trials with file transfer protocol (FTP) and burst traffic were performed. In this study, the ns-2 simulator [2] has been used to generate the experimental data. All simulation results indicate that the proposed fuzzy mechanism out performs remarkably both the traditional RED and Adaptive RED (ARED) mechanisms [3]-[5].

Design of a Single Pulse Laser Range Finder with Er:Yb:glass Microchip Lasers (어븀:이터븀:유리 마이크로칩 레이저를 이용한 단펄스 거리측정기 설계)

  • Koh, Hae Seog;Lee, Chang Jae;Park, Choong Bum;Jeon, Hyoung Ha;Ahn, Pil Dong;Park, Do Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.295-305
    • /
    • 2018
  • We present a passively Q-switched monolithic Er:Yb:glass microchip laser developed in our lab. The microchip laser can produce pulses at 1535 nm of the 'eye-safe' wavelengths with the pulse energy of 50 uJ and the pulse width of 4-6 ns. Using the laser we also designed and developed a pulsed Er:Yb:glass microchip laser rangefinder. Expressions for background and signal power, noise, and signal-to-noise ratio are reviewed. A computer simulation was used to optimize laser power, receiver aperture, and preamplifier bandwidth for the efficient system design of the laser rangefinder. Experimental results are presented to compare with the theory.

Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks

  • Abdalla, Ahmed Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.167-174
    • /
    • 2022
  • Vehicular Ad hoc Networks are considered as special kind of Mobile Ad Hoc Networks. VANETs are a new emerging recently developed, advanced technology that allows a wide set of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). Delay Tolerant Networks (DTN) are networks that allow communication in the event of connection problems, such as delays, intermittent connections, high error rates, and so on. Moreover, these are used in areas that may not have end-to-end connectivity. The expansion from DTN to VANET resulted in Vehicle Delay Tolerant Networks (VDTN). In this approach, a vehicle stores and carries a message in its buffer, and when the opportunity arises, it forwards the message to another node. Carry-store-forward mechanisms, packets in VDTNs can be delivered to the destination without clear connection between the transmitter and the receiver. The primary goals of routing protocols in VDTNs is to maximize the probability of delivery ratio to the destination node, while minimizing the total end-to-end delay. DTNs are used in a variety of operating environments, including those that are subject to failures and interruptions, and those with high delay, such as vehicle ad hoc networks (VANETs). This paper discusses DTN routing protocols belonging to unicast delay tolerant position based. The comparison was implemented using the NS2 simulator. Simulation of the three DTN routing protocols GeOpps, GeoSpray, and MaxProp is recorded, and the results are presented.