• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.03 seconds

A Design of Sensor Web service Framework for Wireless Sensor Networks Environment (무선 센서 네트워크 환경에 대한 센서 웹 서비스 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Byung-Joo;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.123-131
    • /
    • 2009
  • In this paper, we design ZigBee RF based framework for mobile web service on collected data by sensor node and transmitting data to data base by sensor network and remote sensing server through wireless connection. The proposed system is an integrated platform of sensor network for the sensor management and providing SOA based sensor web access. This paper combines SOA technology with sensor network. composes sensor node as web view, and provides high capability. extensiveness, reliability, and usability to the user who accesses to sensor web. The mobile message conversion module, SOAP message processing module. WSDL message generator, and mobile web service module is embodied for improving the capacity of the framework. The capacity evaluation of local wireless communication system which is proposed in this paper is analyzed through NS-2 simulation.

Design and Performance Evaluation of a New SR-ARQ with an Adaptive Timer and Delayed NAK for Improving Handover Performance in Next-Generation Mobile Communication Networks (차세대 이동 통신망에서 핸드오버 성능 향상을 위한 적응형 타이머와 지연 NAK을 이용한 SR-ARQ 설계 및 성능 평가)

  • Park, Man-Kyu;Choi, Yun-Chul;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young;Kim, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.48-59
    • /
    • 2009
  • Next generation mobile communication system will have various access networks and provide seamless multimedia data service to mobile nodes. The WiNGS system, one of these access network, has superior RAT(Radio Access Technology) and network connectivity other than previous ones. In this paper, we propose link-layer SR-ARQ between mobile node and WAGW to solve packet re-ordering problem during handover. In the proposed scheme, we apply the adaptive timer at the SR-ARQ sender to reduce unnecessary packet retransmission during handoff and delayed NAK algorithm at the SR-ARQ receiver for delaying NAK response due to temporary out-of-sequenced frames. We evaluate the performance of the proposed scheme by implementing the new SR-ARQ protocol at the link-layer using ns-2 simulator, and show the handover performance is improved greatly by preventing unnecessary retransmission.

Transmission Performance of Application Traffics on High Speed Railway Communications (고속철도통신에서 응용 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.771-776
    • /
    • 2017
  • LTE-R mobile communication technology based on LTE is used to supply various signal and exchange information required for safety operation of train on high speed railway communication system. In this paper, transmission performance of application traffic which is transferred on high speed communication based on LTE-R is analyzed. And some suggestions for application traffic transmission of high speed railway communication will be considered. Computer simulation is used to analyze performance of CBR, VBR as application traffic. Throughput, delay and packet loss rate is used as performance measurement and analysis parameters.

Analysis of a Roller Guide Container Stacking System Applicable to the Mobile Harbor (모바일 하버 컨테이너 적재 유도 시스템에서 롤러 가이드 적용 및 해석)

  • Oh, Tae-Oh;Park, Jung-Hong;Kim, Kwang-Hoon;Son, Kwon
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.23 no.9
    • /
    • pp.620-626
    • /
    • 2011
  • The purpose of this study is to evaluate a simulation model of a stacking guidance system (SGS) with a roller guide applicable to the mobile harbor. The study used a small-scale model (1/20) made of wood with rollers in order to compare the dynamic analysis with experiment results. The law of similarity was applied for the validation of the scaled model. In order to construct a more realistic simulation model, the damping coefficient of the dynamic model was adjusted to 0.5 Ns/mm for the wood-to-wood contact condition based on the experimental results. Using this validated model, dynamic simulations were also carried out for containers of 20, 30, and 40 tons. The results showed that the reaction force of the roller guide was increased from 74.7 kN to 91.2 kN as the weight of container increased. For the design of a roller guide for SGS, the results obtained in this study can be used to reduce the reaction force by employing a rubber roller or a highly damped rotational joint.

Cross-layer Design of Private MAC with TH-BPPM and TH-BPAM in UWB Ad-hoc Networks

  • Parvez, A.Al;Khan, M.A.;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1189-1197
    • /
    • 2006
  • Ultra-wideband(UWB) is a killer technology for short-range wireless communications. In the past, most of the UWB research focused on physical layer but the unique characteristics of UWB make it different to design the upper layer protocols than conventional narrow band systems. Cross-layer protocols have received high attention for UWB networks. In this paper, we investigate the performance of two physical layer schemes: Time Hopping Binary Pulse Position Modulation(TH-BPPM) and Time Hopping Binary Pulse Amplitude Modulation (TH-BPAM) with proposed private MAC protocol for UWB ad-hoc networks. From pulse level to packet level simulation is done in network simulator ns-2 with realistic network environments for varying traffic load, mobility and network density. Our simulation result shows TH-BPAM outperforms TH-BPPM in high traffic load, mobility and dense network cases but in a low traffic load case identical performance is achieved.

Routing Protocols for VANETs: An Approach based on Genetic Algorithms

  • Wille, Emilio C. G.;Del Monego, Hermes I.;Coutinho, Bruno V.;Basilio, Giovanna G.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.542-558
    • /
    • 2016
  • Vehicular Ad Hoc Networks (VANETs) are self-configuring networks where the nodes are vehicles equipped with wireless communication technologies. In such networks, limitation of signal coverage and fast topology changes impose difficulties to the proper functioning of the routing protocols. Traditional Mobile Ad Hoc Networks (MANET) routing protocols lose their performance, when communicating between vehicles, compromising information exchange. Obviously, most applications critically rely on routing protocols. Thus, in this work, we propose a methodology for investigating the performance of well-established protocols for MANETs in the VANET arena and, at the same time, we introduce a routing protocol, called Genetic Network Protocol (G-NET). It is based in part on Dynamic Source Routing Protocol (DSR) and on the use of Genetic Algorithms (GAs) for maintenance and route optimization. As G-NET update routes periodically, this work investigates its performance compared to DSR and Ad Hoc on demand Distance Vector (AODV). For more realistic simulation of vehicle movement in urban environments, an analysis was performed by using the VanetMobiSim mobility generator and the Network Simulator (NS-3). Experiments were conducted with different number of vehicles and the results show that, despite the increased routing overhead with respect to DSR, G-NET is better than AODV and provides comparable data delivery rate to the other protocols in the analyzed scenarios.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

A Simulation-Based Study of FAST TCP Compared to SCTP: Towards Multihoming Implementation Using FAST TCP

  • Arshad, Mohammad Junaid;Saleem, Mohammad
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.275-284
    • /
    • 2010
  • The current multihome-aware protocols (like stream control transmission protocol (SCTP) or parallel TCP for concurrent multipath data transfer (CMT) are not designed for high-capacity and large-latency networks; they often have performance problems transferring large data files over shared long-distance wide area networks. It has been shown that SCTP-CMT is more sensitive to receive buffer (rbuf) constraints, and this rbuf-blocking problem causes considerable throughput loss when multiple paths are used simultaneously. In this research paper, we demonstrate the weakness of SCTP-CMT rbuf constraints, and we then identify that rbuf-blocking problem in SCTP multihoming is mostly due to its loss-based nature for detecting network congestion. We present a simulation-based performance comparison of FAST TCP versus SCTP in high-speed networks for solving a number of throughput issues. This work proposes an end-to-end transport layer protocol (i.e., FAST TCP multihoming as a reliable, delaybased, multihome-aware, and selective ACK-based transport protocol), which can transfer data between a multihomed source and destination hosts through multiple paths simultaneously. Through extensive ns-2 simulations, we show that FAST TCP multihoming achieves the desired goals under a variety of network conditions. The experimental results and survey presented in this research also provide an insight on design decisions for the future high-speed multihomed transport layer protocols.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

The Effects of Backhole Attack on Lattice Structure MANET (격자구조 MANET에서 블랙홀 공격의 영향)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.578-581
    • /
    • 2014
  • Blackhole attack, a kinds of attacks to routing function, can cause critical effects to network transmission function, Especially, on MANET(Mobile Ad-hoc Network) which it is not easy to prepare functions to respond malicious intrusion, transmission functions of entire networks could be degraded. In this paper, effects of blackhole attack to network transmission performance is analyzed on lattice structured MANET. Specially, performance is measured for various location of blackhole attack on lattice MANET, and compared with the performance of random structured MANET. This paper is done with computer simulation, VoIP(Voice over Internet Protocol) traffic is used in simulation. The results of this paper can be used for data to deal with blackhole attack.

  • PDF