• Title/Summary/Keyword: Mobile Simulator

Search Result 351, Processing Time 0.023 seconds

Transmission Performance of VoIP Traffic over MANETs (MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1109-1116
    • /
    • 2010
  • In this paper, some performance characteristics of VoIP(Voice over Internet Protocol) for MANET(Mobile Ad-hoc Networks) with simulation is studied and appropriate condition for implementation of VoIP service is suggested. VoIP simulator is implemented with NS(Network Simulator)-2. VoIP traffic for simulation is generated with some codecs of G.711, G.723.1, G.726-32, G.729A, GSM.AMR and iLBC. As simulation results for traffic transmission under $670{\times}670m$ 50node MANET environment, performance data for MOS(Mean Opinion Score), network delay, packet loss rate and transmission bandwidth are measured. Normalized analysis about measured results shows that maximum VoIP connection satisfying VoIP service quality condition is 15.

Mobile IP Performance Improvement by Use of Fast Handoff Mechanism (Fast Handoff 기법을 이용한 Mobile IP 성능 향상)

  • Cho, Hyun-Jang;Yang, Hee-Won;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.401-405
    • /
    • 2003
  • Mobile IP is proposed to support IP mobility by IETF. In this article we proposed to minimize delay and packet loss during the handoff by using of fast handoff mechanism. we analyzed performance of basic handoff and proposed handoff by using ns-2 simulator. This proposed mechanism can used the base of research to support efficient handoff under Mobile IPv6 Environment.

  • PDF

Development of End-to-end Numerical Simulator for Next Generation GNSS Signal Design

  • Shin, Heon;Han, Kahee;Won, Jong-Hoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.4
    • /
    • pp.153-164
    • /
    • 2019
  • This paper presents the development of an end-to-end numerical simulator for signal design of the next generation global navigation satellite system (GNSS). The GNSS services are an essential element of modern human life, becoming a core part of national infra-structure. Several countries are developing or modernizing their own positioning and timing system as their demand, and South Korea is also planning to develop a Korean Positioning System (KPS) based on its own technology, with the aim of operation in 2034. The developed simulator consists of three main units such as a signal generator, a channel unit, and a receiver. The signal generator is constructed based on the actual navigation satellite payload model. For channels, a simple Gaussian channel and land mobile satellite (LMS) multipath channel environments are implemented. A software receiver approach based on a commercial GNSS receiver model is employed. Through the simulator proposed in this paper, it is possible to simulate the entire transceiver chain process from signal generation to receiver processing including channel effect. Finally, numerical simulation results for a simple example scenario is analyzed. The use of the numerical signal simulator in this paper will be ideally suited to design a new navigation signal for the upcoming KPS by reducing the research and development efforts, tremendously.

Development of Simulator for AIS Algorithm Verification (AIS 알고리즘 검증용 시뮬레이터 개발)

  • Lee, Hyo-Sung;Lee, Seung-Min;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.478-480
    • /
    • 2005
  • The AIS(Automatic Identification System) transmits the position of ships and other information to prevent accidents which could occur in the sea. It has to be developed SOTDMA(Self-Organized Time Division Multiple Access) Algorithm which is important on wireless communication method for the AIS because It is based on ITU(International Telecommunication Union) M.1371-1 of the international standard therefore, we need to develop a performance evaluation simulator efficiently to develop and analyze SOTDMA Algorithm. This paper shows the method of designing it. Real ships access The VHF maritime mobile band but in this performance evaluation simulator several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. The ships apply for real virtual data which got from assistance hardware and The SOTDMA Algorithm driving state verifies the performance evaluation simulator by IEC(International Electrotechnical commission) 61993-2. After verifying results the performance evaluation simulator is correctly satisfied with IEC 61993-2. So we expect that it helps not only the AIS technology developed but also verify new SOTDMA Algorithm.

  • PDF

A Simulator Development of Surface Warship Torpedo Defense System considering Bubble-Generating Wake Decoy (기포발생식 항적기만기를 고려한 수상함 어뢰방어체계 시뮬레이터 개발)

  • Wooshik Kim;Myoungin Shin;Jisung Park;Ho Seuk Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.416-427
    • /
    • 2024
  • The wake-homing underwater guided weapon that detects and tracks wake generated during voyage of a surface ship is impossible to avoid with the present acoustic deception torpedo defense system. Therefore, research on bubble-generating wake decoy is necessary to deceive wake-homing underwater guided weapon. Experiments in various environments are required to verify the effective operation method and performance of the wake decoy, but performance verification through underwater experiment is limited. In this paper, we develop a simulator for an torpedo defense system of surface ship, which is applied bubble-generating wake decoy, against acoustic, wake, and hybrid homing underwater guided weapon attack. The simulator includes surface ship model, acoustic decoy(static, mobile) model, bubble-generating wake decoy model, search and motion model of underwater guided weapon and so on. By integrating various models, MATLAB GUI simulator was developed. Through the simulation results for various environmental variables by this simulator, it is judged that effective operation method and performance verification of the bubble-generating wake decoy can be performed.

Survey on 3GPP Core Network Simulator (3GPP 코어 네트워크 시뮬레이터 기술 동향)

  • S.J. Shin;D.Y. Lee;T.H. Na;C.S. Lee;T.Y. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.2
    • /
    • pp.77-92
    • /
    • 2024
  • The 3GPP (3rd Generation Partnership Project) mobile communication standard has emerged as a leading standard in the market over the past 20 years, driving continuous development in protocol stacks and libraries that support the standard within simulation software for communication network research. We summarize and analyze seven communication network simulators that support the 3GPP standard specifications related to core network technologies. Through comparisons, we aim to offer valuable insights for researchers and engineers engaged into research and development related to mobile communication networks based on 3GPP standards. Our findings can provide assistance for making informed decisions on simulator selection.

Design of the Advanced Mobile Teletraffic Model and Object Classes for Mobile Simulator (이동통신 시뮬레이터를 위한 개선된 텔레트래픽 모델과 객체 클래스 설계)

  • Yoon, Young-Hyun;Kim, Sang-Bok;Lee, Jeong-Bae;Lee, Sung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.509-518
    • /
    • 2004
  • Many simulators have been developed and are being used for the complex and various mobile communication service environments. Each of these simulators has its own teletraffic model that consists of traffic source model and network traffic model. In this paper, network traffic model and traffic source model, which are based on the data gathered in real environment, are defined in order to get more accurate simulation results in the mobile communication simulation for the urban region. The network traffic model suggested in this paper reflects the hourly call generation rate and call duration time by analyzing the data collected from actually installed base station by the time and place, and the traffic source model includes the delivery share ratio and average speed information in the region where the base station is installed. This paper defined and designed Mobile Host object that reflects the suggested traffic source model, and Call Generator object that reflects the network traffic model, and other objects support both objects. Using the teletraffic model suggested in the paper, user mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent (오용 침입탐지 시스템에서 모바일 에이전트를 이용한 보안규칙 관리에 관한 연구)

  • Kim, Tae-Kyung;Lee, Dong-Young;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.525-532
    • /
    • 2003
  • This paper describes intrusion detection rule management using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed approach, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2 (Network Simulator) with respect to time.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agen (오용침입탐지시스템에서보바일에이전트를이용한보안규칙관리에관한연구)

  • Kim, Tae-Kyoung;Seo, Hee-Suk;Kim, Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.781-790
    • /
    • 2004
  • This paper describes intrusion detection rule mangement using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed appraoch, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2(Network Simulator) with respect to time.

  • PDF

About the Location of Base Stations for a UMTS System: Analytical Study and Simulations

  • Zola Enrica;Barcelo Francisco
    • Journal of Communications and Networks
    • /
    • v.8 no.1
    • /
    • pp.49-58
    • /
    • 2006
  • One of the first decisions that a radio network designer must take is the location of base stations and the distance between them in order to give the best coverage to a region and, possibly, to reduce deployment costs. In this paper, the authors give an insight to this matter by presenting a possible solution to a real problem: Planning the base stations layout for a universal mobile telecommunications system (UMTS) in the city of Barcelona. At the basis of this problem, there is the interdependence between coverage and capacity in a wideband-code division multiple access (W-CDMA) system, which is a new element in the planning of BS layout for mobile communications. This aspect has been first treated with an analytical study of the cell coverage range for a specific environment and service. The achieved results have been checked with the help of snapshot simulations together with a geographical information system (GIS) tool incorporated in the simulator that allows to perform analysis and to visualize results in a useful way. By using the simulator, it is also possible to study a more complex environment, that of a set of base stations providing multiple services to a large number of users.