• Title/Summary/Keyword: NS-3 네트워크 시뮬레이터

Search Result 37, Processing Time 0.025 seconds

A Performance Comparison of Routing Protocols for Mobile Ad hoc Networks using the NS-3 (NS-3를 사용한 이동 애드혹 네트워크용 라우팅 프로토콜 성능 비교)

  • Jang, Jaeshin;Ngo, Van-Vuong;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.308-316
    • /
    • 2015
  • In this paper, we carried out performance comparison of four routing protocols that had been proposed for mobile ad hoc networks using the NS-3 network simulator. Those four routing protocols consist of two proactive routing protocols, DSDV(destination-sequenced distance vector) and OLSR(optimized link state routing), and two reactive routing protocols, AODV(ad-hoc on-demand distance vector) and DSR(dynamic source routing). Two performance metrics, system throughput and packet delivery ratio, are adopted and performance evaluation was carried out in a square communication area where each communicating mobile node moves independently. Numerical results show that the AODV routing protocol provides the best performance among those four routing protocols.

Design of Operation-Level Simulator for Wireless Sensor Network (무선센서네트워크용 동작레벨 시뮬레이터 설계)

  • Lee, Doo-Wan;Kim, Min-Je;Lee, Kang-Whan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.733-739
    • /
    • 2011
  • Recently, a lots of research proposals and results on mobile sensor network are actively announced. The most of such works are based on general-purposed network simulators such as ns-2, mathlab, etc. But, It is not easy to model and simulate the detail activities of each sensor node, data deliveries between them, and its cost such as power consumption and resource utilization, so that the simulation results of those simulators show the limited aspects of overall networks features or performance metrics. In this paper proposed, power consumption of each node, performance, mobility, and location information in operation-level of the network that can simulate a wireless sensor network simulator platform. Because the network routing algorithm analysis of being developed in an existing becomes available, the proposed simulator can usability in the new network routing algorithm development.

A Design of a Co-simulator Integrates a System-on-Chip Simulator and Network Simulator for Development Environments of Prototype Network Devices (네트워크 디바이스의 프로토타입 개발 환경을 위한 시스템-온-칩 시뮬레이터와 네트워크 시뮬레이터의 통합 시뮬레이터 설계 및 구현)

  • Lee, He-Eung;Park, Soo-Jin;Gwak, Dong-Eun;Park, Hyun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.754-766
    • /
    • 2010
  • In the wireless communication protocols, a network device is responsible for the operation of lower-layers. The network device consists of hardware and software modules, so it can be designed using system-on-chip simulator. The simulator design needs the support of a network simulator as well as system-on-chip simulator, because the network device interact with various higher layer communication protocols. Therefore the co-simulator can become a development environment of the network device through the combining of them. In this paper we propose a co-simulator combining these two simulators. The proposed co-simulator does not degrade performance due to integrations. Also, it is easy to integrate them because the implementation of the kernel is independent.

Traffic Generation Method of Sampled Values for Smart Grid (스마트 그리드를 위한 샘플 값들의 트래픽 발생 방안)

  • Hwang, Sung-Ho;Park, Kyung-Won;Park, Jeong-Do;Song, Han-Chun;Park, Jae-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.225-230
    • /
    • 2015
  • This study presents a method for generating IEC 61850 Sampled Values(SV) traffic by combining the emulation function of network simulator ns-3 with the actual communication equipment. For the SV traffic generation and reception, the emulation function of the network simulator ns-3 is used, while as a communication network, the actual communication equipment, switches are used. In addition, the SV traffic frames generated are analyzed, using Wireshark, and it is confirmed that the SV traffic frames are generated accurately. The method for the SV traffic generation proposed in the present study will be very useful when various SV traffics are generated under the environment of an actual substation.

Design and Implementation of a Multi-level Simulation Environment for WSN: Interoperation between an FPGA-based Sensor Node and a NS3 (FPGA 기반 센서 노드와 NS3 연동을 통한 다층 무선 센서 네트워크 모의 환경 설계 및 구현)

  • Seok, Moon Gi;Kim, Tag Gon;Park, Daejin
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.43-52
    • /
    • 2016
  • Wireless sensor network (WSN) technology has been implemented using commercial off-the-shelf microcontrollers (MCUs), In this paper, we propose a simulation environment to realize the physical evaluation of FPGA-based node by considering vertically cross-layered WSN in terms of physical node device and network interconnection perspective. The proposed simulation framework emulates the physical FPGA-based sensor nodes to interoperate with the NS3 through the runtime infrastructure (RTI). For the emulation and interoperation of FPGA-based nodes, we extend a vendor-providing FPGA design tool from the host computer and a script to execute the interoperation procedures. The standalone NS-3 is also revised to perform interoperation through the RTI. To resolve the different time-advance mechanisms between the FPGA emulation and event-driven NS3 simulation, the pre-simulation technique is applied to the proposed environment. The proposed environment is applied to IEEE 802.15.4-based low-rate, wireless personal area network communication.

GOOSE Traffic Generator Using Network Emulation (네트워크 에뮬레이션을 이용한 GOOSE 트래픽 발생기)

  • Hwang, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.209-214
    • /
    • 2016
  • IEC 61850 is a protocol used to reduce the cost of design, installation and maintenance of the Substation Automation System. GOOSE traffic used in IEC 61850 plays an important role for control, protection and automation of the substation. This study implemented a GOOSE traffic generator using the emulation function of NS-3 network simulator, by using protocols provided by a network simulator and another protocols provided by real communication equipment. The generated GOOSE traffic was analyzed with Wireshark, and it was found that the traffic was generated exactly as expected. Besides, this study measured the GOOSE traffic delay due to the increase of the number of switches according to network topology. It is expected that the GOOSE traffic generator implemented by this study will be efficiently used when experiments are performed on actual substation environments.

Analysis of Effects of Hidden Nodes and CCA Deferment Algorithm on IEEE 802.15.4 Performance Using ns-2 Simulator (ns-2 시뮬레이터를 이용한 은닉 노드와 CCA 지연 알고리즘이 IEEE 802.15.4 네트워크의 성능에 미치는 영향 분석)

  • Lee, Kang-Woo;Hyun, Gyu-Wan;Shin, Youn-Soon;Ahn, Jong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.393-406
    • /
    • 2009
  • This paper introduces two functions added to the current version of ns-2 simulator for better accuracy of IEEE 802.15.4 network simulations. The first one is to automatically place hidden nodes over the ring topology in which the coordinator is centered, when the number of hidden nodes and total number of nodes is given. Collisions of signals can be distinguished into the trace file according to the ways of participation of hidden nodes. The second one is the CCA deferment algorithm described in IEEE 802.15.4-2006 standard which is not implemented in the current version of ns-2. Owing to these additional functions, we can carry out the precise analysis of the performance effects of hidden nodes and CCA deferment algorithm on 802.15.4 networks. Simulation results present at least 66% of performance degradation in throughput and drastic increase of collision probability up to 90% from 65% by just a single hidden node. Besides, 2006 standard for CCA deferment algorithm gives 19% lower collision probability and 38% higher performance.

A Routing Protocol for Improving Path Stability in Mobile Ad-hoc Networks (애드혹 네트워크에서 경로 안정성 향상을 위한 라우팅 프로토콜)

  • Kim, Hyungjik;Choi, Sunwoong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1561-1567
    • /
    • 2015
  • Nodes of Mobile ad-hoc network usually use the energy-limited battery. Balanced energy consumptionis important to maintain path's stability. In this paper, we focus on improving the stability of the routing path in mobile ad-hoc networks. For that purpose, we propose a new routing protocol to find the highest minimum node residual energy path among shortest paths. The largest path of minimum value of the remain energy has a longer life than other paths to improve the reliability to data-transmission. Using ns-3 simulator, we show that the proposed routing protocol can provide more long-life stable routing path than AODV and EA-AODV.

Performance Evaluation of the new AODV Routing Protocol with Cross-Layer Design Approach (교차 계층 설계 기법을 사용한 새로운 AODV 라우팅 프로토콜 설계 및 성능평가)

  • Jang, Jaeshin;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.768-777
    • /
    • 2020
  • In this paper, we describe recent research results on AODV routing protocol, which is widely deployed at mobile ad hoc networks, and AODV related routing protocols with multi-path routing schemes. We suggest the critical problems which minimum hop routing schemes have, such as AODV routing protocol, and then, propose a new C-AODV routing protocol with two routing metrics: the primary metric is the hop count, the secondary metric is the sum of link delay times. We implemented C-AODV protocol by modifying AODV at the NS-3, and thus, elaborate on how we change the original AODV source code of NS-3 in order to implement the C-AODV scheme. We show numerical comparison of C-AODV scheme with the original AODV scheme and then, discuss how much the C-AODV enhances routing performance over AODV protocol. In conclusion, we present future research items.

An Experimental Study on Pairwise Key Pre-distribution Schemes of Wireless Sensor Networks Considering 3D Environments (3D 환경을 고려한 무선 센서 네트워크의 키 사전 분배 기법 실험 연구)

  • Yun, Hyemin;Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.975-980
    • /
    • 2020
  • To protect wireless sensor networks (WSNs), various key distribution and management schemes have been proposed. However, most of them conducted simulations and experiments for performance evaluation by considering only the two-dimensional (2D) environments. In this paper, we investigate the effect of real-world three-dimensional (3D) topographic features on the key pre-distribution schemes for WSNs. For this purpose, we analyze and compare the performance of three pairwise key pre-distribution schemes in 2D and 3D environments: full pairwise (FP), random pairwise (RP), and full and random pairwise (FRP) schemes. For the experiments, we employ a network simulator NS-3 and 3D graphic tools such as Blender and Unity. As a result, we confirm that there was a difference in the performance of each scheme according to the actual 3D terrain and that the location-based FRP that considers deployment errors, has the highest efficiency in many aspects.