• Title/Summary/Keyword: OPNET Simulation

Search Result 138, Processing Time 0.023 seconds

Scheduling Algorithm for Military Satellite Networks using Dynamic WDRR(Weighted Deficit Round Robin) (군사용 위성통신망을 위한 동적 WDRR기반의 스케줄링 알고리즘)

  • Lee, Gi-Yeop;Song, Kyoung-Sub;Kim, Dong-Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.196-204
    • /
    • 2013
  • In this paper, a scheduling algorithm is proposed for military satellite networks to improve QoS(Quality of Service) based on WDRR(Weighted Deficit Round Robin) method. When the packet size that has been queued to be larger, the proposed scheme DWDRR(Dynamic WDRR) method give appropriate additional quantum using EWMA(Exponentially Weighted Moving Average). To demonstrate an usefulness of proposed algorithm using OPNET modeler that built the simulation environment, reliability and real-time availability of the proposed algorithm is analyzed. The simulation results show an availability of proposed scheme in terms of reduce queuing delay and packet drop rate compared and analyzed the existing algorithms WRR(Weighted Round Robin), DRR(Deficit Round Robin) and WDRR with DWDRR.

Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System (침입탐지시스템에서 경보정보에 대한 대응 능력 모델링 및 성능분석)

  • Jeon Yong-Hee;Jang Jung-Sook;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.855-864
    • /
    • 2005
  • In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed system. At first, we model the arrival process of alert information resulted from abnormal traffic. In order to model the situation in which alert information is intensively produced, we apply the IBP(Interrupted Bernoulli Process) which may represent well the burstiness of traffic. Then we perform the simulation in order to gain some quantitative understanding of the system for our performance parameters. Based on the results of the performance analysis, we analyze factors which may hinder in accelerating the speed of security node, and would like to present some methods to enhance performance.

A Study on Cross-Layer Network Synchronization Architecture for TDMA-Based Mobile Ad-Hoc Networks (TDMA 기반 MANET을 위한 계층교차적 네트워크 동기 아키텍처 연구)

  • Seo, Myung-Hwan;Kim, Joung-Sik;Cho, Hyung-Weon;Jung, Sung-Hun;Park, Jong-Ho;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.647-656
    • /
    • 2012
  • TDMA MAC protocol in MANET requires precise network synchronization between nodes though network topology changes continuously due to node mobility and the effect of propagation environment. In this paper we propose in-band cross-layer network synchronization architecture for TDMA-based MANETs. In the proposed architecture TDMA MAC protocol and proactive routing protocol cooperate closely to rapidly detect network partition and merge caused by node mobility and to precisely maintain network synchronization. We also implement the proposed synchronization architecture in OPNET simulator and evaluate the performance of it in various simulation scenarios. Simulation results show that our architecture stably maintains network time synchronization in both network partition and merge situations.

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Non-preemptive Queueing Model of Spectrum Handoff Scheme Based on Prioritized Data Traffic in Cognitive Wireless Networks

  • Bayrakdar, Muhammed Enes;Calhan, Ali
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.558-569
    • /
    • 2017
  • In this study, a non-preemptive M/G/1 queueing model of a spectrum handoff scheme for cognitive wireless networks is proposed. Because spectrum handoff gives secondary users an opportunity to carry on their transmissions, it is crucially important to determine the actions of primary users. In our queueing model, prioritized data traffic is utilized to meet the requirements of the secondary users. These users' packets are categorized into three different priority classes: urgent, real-time, and non-real time. Urgent data packets have the highest priority, while non-real time data packets have the lowest priority. Riverbed (OPNET) Modeler simulation software was used to simulate both reactive and proactive decision spectrum handoff schemes. The simulation results were consistent with the analytical results obtained under different load and traffic conditions. This study also revealed that the cumulative number of handoffs can be drastically decreased by exploiting priority classes and utilizing a decent spectrum handoff strategy, such as a reactive or proactive decision-based strategy.

Hybrid Communication Network Architectures for Monitoring Large-Scale Wind Turbine

  • Ahmed, Mohamed A.;Kim, Young-Chon
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.6
    • /
    • pp.1626-1636
    • /
    • 2013
  • Nowadays, a rapid development in wind power technologies is occurring compared with other renewable energies. This advance in technology has facilitated a new generation of wind turbines with larger capacity and higher efficiency. As the height of the turbines and the distance between turbines increases, the monitoring and control of this new generation wind turbines presents new challenges. This paper presents the architectural design, simulation, and evaluation of hybrid communication networks for a large-scale wind turbine (WT). The communication network of WT is designed based on logical node (LN) concepts of the IEC 61400-25 standard. The proposed hybrid network architectures are modeled and evaluated by OPNET. We also investigate network performance using three different technologies: Ethernet-based, WiFi-based, and ZigBee-based. Our network model is validated by analyzing the simulation results. This work contributes to the design of a reliable communication network for monitoring and controlling a wind power farms (WPF).

Delay Performance Analysis of the NAK-based SR-ARQ Protocol with the Reverse Acknowledgment (RA) Scheme

  • Han, Je-Chan;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.989-997
    • /
    • 2008
  • The reverse acknowledgment (RA) scheme supports a fast loss recovery for negative acknowledgment (NAK)-based selective repeat automatic repeat request (SR-ARQ) by detecting a retransmission failure quickly before a retransmission timer expires. In this paper, we evaluate the performance of a NAK-based SR-ARQ protocol with the RA scheme and compare it with the conventional NAK-based SR-ARQ protocol. Particularly, we propose a simple analysis model for the transport delay of the NAK-based SR-ARQ protocol considering the traffic condition, the retransmission persistence, the timer-based retransmissions and the RA scheme's behavior. Both NAK-based SR-ARQ protocols with and without the RA scheme are implemented by using the OPNET simulator. We verified the analysis model's accuracy through the simulation results. Also, we evaluate the performance of the NAK-based SR-ARQ protocol with the RA scheme based on analysis and simulation results.

A Gateway Protocol Architecture for Zigbee Based Wireless Sensor Network Interconnecting TCP/IP Networks

  • Qiu, Peng;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.176-180
    • /
    • 2009
  • This paper investigates protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network, in which Zigbee sensors are connected over the IEEE802.15.4 communication protocol standard. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience. In accordance, the common gateway interface technology satisfying users on the web browser to efficiently manage and query the sensors in the wireless sensor networks, ubiquitously, is also introduced. Finally, a simulation prototype for the web-sensor gateway is proposed and verified using OPNET simulation tool.

  • PDF

Simulation Analysis of RICH-DP for Real-time Service in Multi-Channel Networks (다중채널 무선망에서 실시간 서비스를 제공하기 위한 RICH-DP 시뮬레이션 분석)

  • 김철규;최덕규
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.133-133
    • /
    • 2001
  • 무선 근거리 지역망(Wireless LAN;WLAN) 환경에서 다중 채널을 이용하여 실시간 서비스를 제공하기 위한 매체 접근제어 계층에서의 채널의 사용 구간 할당 방법을 제안하고, 컴퓨터 모의 실험을 통하여 제한된 방식의 실시간 서비스 지원 성능과 채널의 사용 효율을 분석한다. 제안한 채널 사용 구간 할당 방안은 개선된 매체 접근 제어 프로토콜 RICH-DP (Receiver-Initiated Channel-Hopping with Dual Polling)를 바탕으로 한다. 무선 환경에서 RTS-CTS를 사용하는 프로토콜은 SRMA, MACA, MACAW, IEEE 802.11, FAMA 등이 있다. 최근에 단일 채널을 환경에서 RICH(Receiver Initiated Channel-Mopping) 프로토콜이 제안되었다. RICH는 충돌 회피를 위해서 경쟁 구간에서 충돌 감지(carrier sensing)을 사용한다. RICH는 제한된 어플케이션에 국한되는 단절이 있다. 반면에 RICH-DP는 다중 채널 환경에서 충돌 감지와 특별한 코드(spreading code) 할당 없이 일반화된 충돌 회피를 제공한다. 실시간 서비스를 이용하자 차는 단말들로 하여금 RICH-DP를 사용하여 서비스를 제공할 때, 대역폭에 대한 정보를 AP(Access Point)로 전송토록 함으로써 비경쟁 구간에서 뿐 아니라, 경쟁구간에서도 높은 채널 효율이 얻어질 수 있도록 하고 있다. 제한된 방안의 성능 평가를 위한 모의 실험은 OPNET를 이용하여 실시간 서비스 데이터를 7개의 상태 천이를 갖는 VBR 소스로 모델링하고 비동기 트래픽들은 Poisson 소스로 모델링하여 실시간 서비스 단발들의 이용 대역폭과 채널 처리율과 시스템 지연시간을 성능 평가 인자로 하여 수행하였다. 논문에서 제한된 방법을 적용한 개선된 RICH-DP을 모의 실험을 통하여 분석한 결과 기존의 제한된 RICH-DP는 실시간 서비스에 대한 처리율이 낮아지며 서비스 시간이 보장되지 못했다. 따라서 실시간 서비스에 대한 새로운 제안된 기법을 제안하고 성능 평가한 결과 기존의 RICH-DP보다 성능이 향상됨을 확인 할 수 있었다.

  • PDF

End-to-End QoS Enhancement in Mobile WiMAX Systems (모바일 와이맥스 시스템에서의 종단간 서비스 품질 향상)

  • Choo, Sang-Min;Oh, Sung-Min;Cho, Sung-Hyun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.415-424
    • /
    • 2008
  • In this paper, we compare the QoS performance enhancement schemes according to the network architecture of mobile WiMAX system in order to improve the end-to-end QoS performance and propose QoS parameter mapping method and IP packet scheduling algorithm. To evaluate the end-to-end QoS performance, we implemented an end-to-end simulator of mobile WiMAX system using OPNET. Simulation results show that the proposed QoS parameter mapping scheme reduces the average delay of VoIP packet and improves uplink resource efficiency. And also, when the proposed IP packet scheduling algorithm is applied to the system, the end-to-end packet transmission delay of VoIP service can be reduced by 44-67 percent compared to FIFO and WRR scheduler.