• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.029 seconds

Clustering based Routing Algorithm for Efficient Emergency Messages Transmission in VANET (차량 통신 네트워크에서 효율적인 긴급 메시지 전파를 위한 클러스터링 기반의 라우팅 알고리즘)

  • Kim, Jun-Su;Ryu, Min-Woo;Cha, Si-Ho;Lee, Jong-Eon;Cho, Kuk-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3672-3679
    • /
    • 2012
  • Vehicle Ad hoc Network (VANET) is next-generation network technology to provide various services using V2V (Vehicle-to-Vehicle) and V2I (Vehicle-to-Infrastructure). In VANET, many researchers proposed various studies for the safety of drivers. In particular, using the emergency message to increase the efficiency of traffic safety have been actively studied. In order to efficiently transmit to moving vehicle, to send a quick message to as many nodes is very important via broadcasting belong to communication range of vehicle nodes. However, existing studies have suggested a message for transmission to the communication node through indiscriminate broadcasting and broadcast storm problems, thereby decreasing the overall performance has caused the problem. In addition, theses problems has decreasing performance of overall network in various form of road and high density of vehicle node as urban area. Therefore, this paper proposed Clustering based Routing Algorithm (CBRA) to efficiently transmit emergency message in high density of vehicle as urban area. The CBRA managed moving vehicle via clustering when vehicle transmit emergency messages. In addition, we resolve linkage problem between vehicles according to various form of road. The CBRA resolve link brokage problem according to various form of road as urban using clustering. In addition, we resolve broadcasting storm problem and improving efficacy using selection flooding method. simulation results using ns-2 revealed that the proposed CBRA performs much better than the existing routing protocols.

Enhancement of Return Routability Mechanism for Optimized-NEMO Using Correspondent Firewall

  • Hasan, Samer Sami;Hassan, Rosilah
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.41-50
    • /
    • 2013
  • Network Mobility (NEMO) handles mobility of multiple nodes in an aggregate manner as a mobile network. The standard NEMO suffers from a number of limitations, such as inefficient routing and increased handoff latency. Most previous studies attempting to solve such problems have imposed an extra signaling load and/or modified the functionalities of the main entities. In this paper, we propose a more secure and lightweight route optimization (RO) mechanism based on exploiting the firewall in performing the RO services on behalf of the correspondent nodes (CNs). The proposed mechanism provides secure communications by making an authorized decision about the mobile router (MR) home of address, MR care of address, and the complete mobile network prefixes underneath the MR. In addition, it reduces the total signaling required for NEMO handoffs, especially when the number of mobile network nodes and/or CNs is increased. Moreover, our proposed mechanism can be easily deployed without modifying the mobility protocol stack of CNs. A thorough analytical model and network simulator (Ns-2) are used for evaluating the performance of the proposed mechanism compared with NEMO basic support protocol and state-of-the-art RO schemes. Numerical and simulation results demonstrate that our proposed mechanism outperforms other RO schemes in terms of handoff latency and total signaling load on wired and wireless links.

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

A New Packet Forwarding Architecture For Fairness Improvement in Wireless Sensor Network (무선 센서 네트워크 환경에서 공정성 향상을 위한 새로운 패킷 전송 구조)

  • Song, Byung-Hun;Lee, Hyung-Su;Ham, Kyung-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.215-217
    • /
    • 2004
  • In wireless sensor networks, fair allocation of bandwidth among different nodes is one of the critical problems that effects the serviceability of the entire system. Fair bandwidth allocation mechanisms, like fair queuing, usually need to maintain state, manage buffers, and perform packet scheduling on a per flow basis, and this complexity may prevent them from being cost-effectively implemented and widely deployed. It is a very important and difficult technical issue to provide packet scheduling architecture for fairness in wireless sensor networks. In this paper, we propose an packet scheduling architecture for sensor node, called FISN (Fairness Improvement Sensor Network), that significantly reduces this implementation complexity yet still achieves approximately fair bandwidth allocations. Sensor node for sensing estimate the incoming rate of each sensor device and insert a label into each transmission packet header based on this estimate. Sensor node for forwarding maintain no per flow state; they use FIFO packet scheduling augmented by a probabilistic dropping algorithm that uses the packet labels and an estimate of the aggregate traffic at the gathering node. We present the detailed design, implementation, and evaluation of FISN using simulation. We discuss the fairness improvement and practical engineering challenges of implementing FISN in an experimental sensor network test bed based on ns-2.

  • PDF

Improving the Performance of TCP over Wired-Wireless Networks Using the Received Signal Strengths of Mobile Host (이동호스트의 수신신호를 이용한 유무선 혼합망에서의 TCP 성능 향상)

  • Kim, Jin-Hee;Kwon, Kyun-Hee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.635-640
    • /
    • 2006
  • The Snoop in the BS (Base Station) performs a local retransmission over wired-wireless networks to recover packet loss quickly. However, when the MH (Mobile Host) leaves the reception range of the signal, the local retransmission causes performance to degrade. In this paper, we minimize the packet loss and local retransmission caused by the unreachability from BS to MH to improve network performance. To do this, we suggest to add RSS(Received Signal Strengths) flag bit in ACK packet of MH. By using this flag bit, the BS decides whether it retransmits or not to minimize packet loss. The result of the simulation by ns-2 shows a big improvement of performance in the networks.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

Policy-based Resource Management for QoS Support in Cellular Networks (셀룰라 시스템에서 서비스품질(QoS)을 보장하기 위한 정책기반 자원관리 기법 연구)

  • Choi Sung-Gu;Jun Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.344-348
    • /
    • 2006
  • This paper proposes a QoS policy for cellular networks which support the policy based network management scheme. The policy exploits the existing underlying DiffServ mechanism and the priority-based packet scheduler in order to provide the packets with different handling priority depending on their belonging traffic classes. The simulation results reveals the effectiveness of the proposed policy under the network congestion; it shows that the goodput of the real-time traffic is not affected at all in spite of the surge of the non real-time traffic.

Sliding Mode Congestion Control of Differentiated-services Networks (차등화 서비스 네트워크의 슬라이딩 모드 혼잡 제어)

  • Park, Ki-Kwang;Hwang, Young-Ho;Ko, Jin-Hyeok;Yang, Hai-Won
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.1828-1829
    • /
    • 2006
  • In this paper, we propose sliding mode congestion controller for differentiated-services network. Two important issue in differentiated-services architecture are bandwidth guarantee and fair sharing of unsubscribed bandwidth among TCP flows with and without bandwidth reservation. We use tight upper and lower bounds for various settings of differentiated-services parameters using the loss-bounded model. The Sliding mode congestion controller scheme is designed using nonlinear control theory based on a nonlinear model of the network that is generated using fluid flow consideration. The methodology used is general and independent of technology, as for example TCP/IP or ATM. The sliding mode congestion controller methodology has been applied to an TCP network. We use NS-2 simulation to demonstrate that the proposed control methodology achieves the desired behavior of the network, and possesses important attributes. as e.g, stable and robust behavior, high utilization with bounded delay and loss, together with good steady-state and transient behavior.

  • PDF

Design of Receiver-Initiated Asynchronous MAC Protocol for Energy-Efficiency in WSNs (전력 효율을 위한 수신자 기반 비동기 센서 MAC 프로토콜 설계)

  • Park, In-Hye;Lee, Hyung-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.873-875
    • /
    • 2014
  • In this paper we describe an asynchronous MAC protocol with receiver-initiated duty cycling for energy-efficiency in wireless sensor networks(WSN). Legacy asynchronous MAC protocols, X-MAC and PW-MAC, has weaknesses which generates too many control packets and has data collision problem between multiple transmitters, respectively. Therefore, we propose a receiver-initiated asynchronous MAC protocol which generates control packets from transmitter to complement these disadvantages. Compared to the prior asynchronous duty cycling approaches of X-MAC and PW-MAC, the proposed protocol shows a improvement in energy-efficiency, throughput and latency from simulation results.

Design and Implementation of a protocol for stable transmission of emergency information in WBAN environment (WBAN 환경에서 응급 정보의 안정적 전송을 위한 프로토콜 설계 및 구현)

  • Lee, Dong Ho;Wang, Jong Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.57-65
    • /
    • 2010
  • Application of WBAN technology in medical field facilitates the prevention of diseases by collecting the vital signs remotely. It also enables to prevent the accidental emergency situation in advance plus long-tem monitoring of patients with chronic diseases such as heart diseases, hypertension, or the elderly and infirm. For emergency patients, major vital signal information collected by the 'Sensing' should have the top priority and such information should be transferred as promptly as possible without competition. In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. However, LR-WPAN IEEE 802.15.4 technology does not consider such emergency message handling features. To deal with aforementioned issues, the IEEE 802.15.4 super frame protocol structure has been designed for stable transfer of emergency information in WBAN environment in this study, and alternation to super frame structures have been made, allowing GTS(Guaranteed Time Slot) can be used first at CFP (Contention Free Period) by reserving the resources in advance and prioritize the emergency signals. NS-2 has been utilized for the performance test and analysis.