To see the other types of publications on this topic, follow the link: NS2 simulator.

Journal articles on the topic 'NS2 simulator'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'NS2 simulator.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

V Raj, Shruthi, and Hemanth S R. "Simulation of ACO Technique Using NS2 Simulator." International Journal of Engineering Trends and Technology 23, no. 8 (2015): 403–6. http://dx.doi.org/10.14445/22315381/ijett-v23p277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wijekoon, Janaka, Erwin Harahap, and Hiroaki Nishi. "Service-oriented Router Simulation Module Implementation in NS2 Simulator." Procedia Computer Science 19 (2013): 478–85. http://dx.doi.org/10.1016/j.procs.2013.06.064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MOUSSA, Neila, Farah Nasri, and Rached Tourki. "NOC Architecture Comparison with Network Simulator NS2." International Journal of Engineering Trends and Technology 13, no. 7 (2014): 340–46. http://dx.doi.org/10.14445/22315381/ijett-v13p269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdo Asaad, Hasan Abdul Raqib, and Belal Al-Fuhaidi. "An Efficient Routing Method for Protection Data Flow in the MPLS Network." Journal of Science and Technology 22, no. 2 (2018): 25–39. http://dx.doi.org/10.20428/jst.v22i2.1286.

Full text
Abstract:
This paper presents an efficient method for rerouting traffic in the Multiprotocol Label Switching (MPLS) network, when a fault occurs in the working link. The method has been designed to handle both single and multiple faults based on the protection switching and rerouting techniques. The proposed method leads to less packets loss, has better Packet Delivery Ratio (PDR), good throughput and eliminates packet disorder. The proposed method has been simulated using the Network Simulator (NS2) version 2.34 and the simulation results have shown that the proposed method significantly improves the network performance in comparison to similar existing methods.
 Keywords: MPLS network, Working link, Protection switching, Rerouting, Network simulator.
APA, Harvard, Vancouver, ISO, and other styles
5

Lakshmi, N. Naga, P. Karthik, P. Shiva Sai, and A. Sai Vishal. "Implementation of DOS Attack Using NS2." International Journal of Emerging Science and Engineering 12, no. 6 (2024): 1–4. http://dx.doi.org/10.35940/ijese.f9859.12060524.

Full text
Abstract:
This paper presents a comprehensive study on the implementation of a Denial of Service (DOS) attack using NS2, a widely-used network simulator. The project involves the installation and configuration of NS2 and NAM on Ubuntu, the design of a realistic network topology, and the generation of TCP and UDP traffic to simulate a DOS attack. By evaluating the impact of the attack on network performance metrics such as throughput and latency, this study aims to enhance understanding of DOS attacks in simulated environments and propose effective mitigation strategies. The findings contribute to the field of network security by providing insights into the behavior of DOS attacks and highlighting the importance of proactive defense mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
6

N., Naga Lakshmi. "Implementation of DOS Attack Using NS2." International Journal of Emerging Science and Engineering (IJESE) 12, no. 6 (2024): 1–4. https://doi.org/10.35940/ijese.F9859.12060524.

Full text
Abstract:
<strong>Abstract:</strong> This paper presents a comprehensive study on the implementation of a Denial of Service (DOS) attack using NS2, a widely-used network simulator. The project involves the installation and configuration of NS2 and NAM on Ubuntu, the design of a realistic network topology, and the generation of TCP and UDP traffic to simulate a DOS attack. By evaluating the impact of the attack on network performance metrics such as throughput and latency, this study aims to enhance understanding of DOS attacks in simulated environments and propose effective mitigation strategies. The findings contribute to the field of network security by providing insights into the behavior of DOS attacks and highlighting the importance of proactive defense mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.

Full text
Abstract:
AbstractNs2 is an open-source communications network simulator primarily used in research and teaching. Ns2 provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Although Ns2 is a widely used powerful simulator, it lacks a way to measure networks that are used to assess reliability and performance metrics (e.g., the number of packets transferred from source to destination, delay in packets, packet loss, etc.) and it does not analyse the trace files it produces. The data obtained from the simulations are not straightforward to analyse. Ns2 is still unable to provide any data analysis statistics or graphics as requested. Moreover, the analysis of the Ns2 trace file using any software scripts requires further steps by a developer to do data processing and then produce graphical outputs. Lack of standardisation of tools means that results from different users may not be strictly comparable. There are alternative tools; however, most of them are not standalone applications, requiring some additional libraries. Also, they lack a user-friendly interface. This article presents the architecture and development considerations for the NsGTFA (Ns2 GUI Trace File Analyser) tool, which intends to simplify the management and enable the statistical analysis of trace files generated during network simulations. NsGTFA runs under Windows and has a friendly graphical user interface. This tool is a very fast standalone application implemented in VC++, taking as input an Ns2 trace file. It can output two-dimensional (2D) and 3D graphs (points, lines, and bar charts) or data sets, whatever the trace file format (Tagged, Old, or New). It is also possible to specify the output of standard network performance metrics. NsGTFA satisfies most user needs. There is no complex installation process, and no external libraries are needed.
APA, Harvard, Vancouver, ISO, and other styles
8

Nemade, Chetana Hemant. "Execution Evaluation of AODV Protocol Using NS2 Simulator for Emergency Automobile." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 1792–801. http://dx.doi.org/10.47059/revistageintec.v11i4.2237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Wen Zhi. "Network Congestion Control Algorithm Simulation Research Based on NS2." Applied Mechanics and Materials 713-715 (January 2015): 2455–61. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2455.

Full text
Abstract:
Network congestion control problem is one of the most key problems in network study. This paper studies different versions of TCP source port algorithm such as Tahoe, Reno, NewReno, SACK and Vegas, and makes simulation research on linear network and dumbbell network environment algorithm by using NS2 network simulator, and finally it concludes that: when there is no competition in the network, it is better to choose Vegas algorithm; when there is competition, choose Reno, NewReno, or Sack algorithm is more advisable.
APA, Harvard, Vancouver, ISO, and other styles
10

Balogh, Tomáš, and Martin Medvecký. "Average Bandwidth Allocation Model of WFQ." Modelling and Simulation in Engineering 2012 (2012): 1–7. http://dx.doi.org/10.1155/2012/301012.

Full text
Abstract:
We present a new iterative method for the calculation of average bandwidth assignment to traffic flows using a WFQ scheduler in IP based NGN networks. The bandwidth assignment calculation is based on the link speed, assigned weights, arrival rate, and average packet length or input rate of the traffic flows. We prove the model outcome with examples and simulation results using NS2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Hye-Sun, and Ki-Tae Hwang. "NS2 based Simulator for Performance Evaluation of P2P Streaming Systems." KIPS Transactions:PartD 14D, no. 5 (2007): 555–64. http://dx.doi.org/10.3745/kipstd.2007.14-d.5.555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Aguirre, Edgar Alirio, Luis Fernando Pedraza Martínez, and Gabriel Puerta. "Evaluación del establecimiento de la métrica de enrutamiento WCETT en una red de radio cognitiva." Revista Tecnura 17, no. 35 (2013): 55. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2013.1.a05.

Full text
Abstract:
Este artículo presenta la evaluación del establecimiento de la métrica de enrutamiento WCETT (Weighted Cumulative Expected Transmission Time) para una red de radio cognitiva basado en la aplicación CRCN (Cognitive Radio Cognitive Network Simulator) la cual se desarrolla bajo el entorno de simulación NS2 (Network Simulator 2) donde se comparò el throughput de los protocolos MAC802.11, MACCON, MACN, Simple y TDMA.
APA, Harvard, Vancouver, ISO, and other styles
13

Tippannavar, Sanjay, Meghana N, and Yashwanth S D. "A Security Protocol for V2V Communication using NS2 Network Simulator." International Journal of Innovative Research in Advanced Engineering 10, no. 03 (2023): 49–57. http://dx.doi.org/10.26562/ijirae.2023.v1003.02.

Full text
Abstract:
The principles of MANETs, or mobile ad hoc networks, form the foundation of vehicular ad hoc networks (VANETs). Vanet was first introduced as "Car to Vehicle ad hoc mobile communication and networking" in 2001. In order to build a communication network and transfer data among vehicles, Vanet were invented. Vanet uses a variety of means to establish communication, including vehicle-to-vehicle communication. In this project, both roadside-to-roadside and vehicle-to-roadside communications are employed, and vehicle-to-roadside communication is taken into consideration. A different term for VANETs is Intelligent Transportation Networks. The "Internet of Vehicles" (Vanet) has expanded into a larger system and will ultimately become the internet. There will be a "Internet of autonomous vehicles" in the not too distant future. Wireless networking is used by Vanets for networking and communication; even LTE and 5G may be used by vanets. In this project, a protocol is being developed to provide security for the established connection in Vanet, i.e., to recognise and stop any network intrusions. The NS2 network simulator is used to implement this protocol for testing purposes.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Zhengyou, Wan Wang, Yanhui Xia, et al. "Visual Quality Assessment after Network Transmission Incorporating NS2 and Evalvid." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/267403.

Full text
Abstract:
On the basis of Evalvid tool integrated in NS2 (Network Simulator version 2), the paper gets new set of tools, myEvalvid, to establish the simulation and evaluation platform for multimedia transmission. Then the paper investigates the effects of various influence factors when multimedia information is transmitted in the network and the relationships among these factors. Based on the analysis, the paper gets different evaluation models, respectively. In this paper, we study the impact on performance of several basic source and network parameters of video streams, namely, GOP (Group of Pictures) pattern, compression quantitative parameters, packet length, and packet error rate. Simulation results show that different parameters lead to different distortion levels which are calculated according to the reconstruction images at the receiver and the original images. The experimental results show that the video transmission and quality evaluation model we designed can evaluate multimedia transmission performance over complex environment very well.
APA, Harvard, Vancouver, ISO, and other styles
15

Mr.Ranjeet, Ramesh Suryawanshi*. "SIMULATION AND IMPLEMENTATION OF NETWORK TOPOLOGY USING NS2." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 291–95. https://doi.org/10.5281/zenodo.192907.

Full text
Abstract:
Data communication and networking are changing the way we do business and the way we live.The development of the personal computer brought about tremendous changes for business, industry,science and education.A similar revolution is occurring in data communication and networking.Technological advances are making it possible for communication links to carry more and faster signals.As computer networks evolved, it has changed whole idea of communication which provides lot of benefits to the user.Research in data communication and networking has resulted in number of new technologies.One of the most popular technology of computer network is internet.The internet was invented with goal of exchanging data such as text,audio,video and image to any part of world. For interconnectivity between end users, network topology describe the physical appearance and interconnection between arrangement of computers, cables and other component in a data communication network.So we can say network topology is the backbone of any computer network.In this paper, computer networks with different types of topology is implemented and simulated using network simulator NS2
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Tong Qing, Guang Jie Han, Chuan Zhu, and Chen Yu Zhang. "Application Research on Aqua-Sim for Underwater Acoustic Sensor Networks." Advanced Materials Research 605-607 (December 2012): 1046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.1046.

Full text
Abstract:
In this paper, we present a simulator based on NS2 for Underwater Acoustic Sensor Networks (UASNs), named Aqua-Sim, which simulates the attenuation of underwater acoustic channels and the collision behaviors effectively. In addition, Aqua-Sim supports 3D network deployment and provides some MAC and routing protocols. Through communication between two nodes and localization of unknown nodes, the application examples of Aqua-Sim are shown. We also present the graphical user interface of Aqua-3D using an example application.
APA, Harvard, Vancouver, ISO, and other styles
17

Prasad, A.Y*1 &. DR R. Balakrishna2. "AN OPTIMIZED SOLUTION FOR MEASURES OF NETWORK LIFE TIME AND ENERGY CONSUMPTION USING IMPROVED ENERGY EFFICIENT LEACH PROTOCOL IN MANET." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 2 (2019): 102–12. https://doi.org/10.5281/zenodo.2566000.

Full text
Abstract:
The different advancements in the wireless communication led to the network with sensors connected. The node restricted with the power in the WSN is a major constraint. The node action to sense the data and forwarding to the sink needs efficient battery usage for increasing the network lifetime. So, in this research work the primary objective is to improve the network lifetime.&nbsp; In this paper the LEACH protocol is simulated using NS2 simulator for a fixed size network of 1000 m X 1000 m with 150 nodes for a data packet of 812 transmitted for 10 (dimension) and the simulation is carried out for 30 (dimension). The simulation observed parameters are packet delivery ratio, energy consumption, and throughput. The overall residual energy obtained is 202.213 for simulation time of 30.
APA, Harvard, Vancouver, ISO, and other styles
18

Cai, Zhi Qiang, Rong Sheng Lv, and Shi Wen Sun. "One QoS Routing Algorithm for Load Balancing in IP Backbone Networks: Design and Simulation." Applied Mechanics and Materials 427-429 (September 2013): 2664–67. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2664.

Full text
Abstract:
Quality of Service (QoS) routing is intent to find feasible routes according to QoS constraints and optimize utilization of whole network resources. In order to solve bandwidth-guaranteed QoS routing problem, a simple but effective routing algorithm based on precomputation scheme with load balancing consideration, is proposed. The algorithm is implemented and simulated using Network Simulator (NS2). Research results showed that the proposal can keep some links free from becoming bottlenecks earlier, avoid congestion caused by unbalanced traffic load distribution, and improve performance of IP backbone networks.
APA, Harvard, Vancouver, ISO, and other styles
19

Liza, Farhana Ferdusi, and Khan Md. Al-Farabi. "Handover Delay Optimization in PMIPV6 Domain Through Improved Update Latency." DIU Journal of Science & Technology 6, no. 1 (2024): 9–16. https://doi.org/10.5281/zenodo.13731657.

Full text
Abstract:
This paper proposes an efficient low update latency handover scheme for Proxy Mobile IPv6 (PMIPv6)-a Network-based mobility management protocol. The major aspect that introduces high latency during Mobile Node (MN) handover between Mobile Access gateways (MAGs) of the same PMIPv6 domain has been analyzed. The analysis included MN profile acquirement by MAG agent and handover process between MAG agents. From this analysis, an improved solution that optimizes the handover delay has been provided. The solution has been verified by simulation in Network Simulator 2(NS2).
APA, Harvard, Vancouver, ISO, and other styles
20

Atul, R. Halmare &. Poonam T. Bedarkar. "TOPOLOGICAL DESIGN OF NETWORKS FOR TCP-IP USING NS2." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY [ICEMESM-18] (April 27, 2018): 219–24. https://doi.org/10.5281/zenodo.1232307.

Full text
Abstract:
A network is basically the interconnection of two or more devices.&nbsp; The&nbsp; study&nbsp; of&nbsp; arrangement&nbsp; or&nbsp; mapping&nbsp; of&nbsp; elements&nbsp; such as links&nbsp; and&nbsp; nodes of&nbsp; a&nbsp; network&nbsp; is called as network&nbsp; topology. Data communication and networking are changing in the way we do business and the way we live. Advances in Technology are making it possible for communication links to carry more and faster signals as well as data. Research in data communication and networking has resulted in number of new technologies. Popular technology of computer network is internet. For&nbsp; interconnectivity between&nbsp; end&nbsp; users,&nbsp; network&nbsp; topology&nbsp; describe&nbsp; the&nbsp; physical&nbsp; appearance&nbsp; and&nbsp; interconnection between arrangement of computers, cables and other component. So we can say network topology is the backbone of any computer network. In this paper, computer networks with different types of topology is implemented and simulated using network simulator NS2 for TCP-IP Protocol
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Li, Xiaoke Jin, Chenhe Lu, Zongbo Wei, and Jin Li. "Modelling and Simulation on Acoustic Channel of Underwater Sensor Networks." Wireless Communications and Mobile Computing 2021 (November 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/8263600.

Full text
Abstract:
The reliability of the modelling system mainly depends on the simulation of underwater acoustic channel characteristics. The reliability of simulator is improved because of the use of Bellhop in NS-Miracle. World Ocean Simulation System (WOSS) can retrieve the data of marine environment by accessing the database of seabed depth, sound speed profile and seabed sediment, and transmit them to Bellhop simulator automatically, so that the model is closer to the actual underwater acoustic transmission channel than not using WOSS. In order to verify the reliability of NS2/NS-Miracle simulation system with WOSS, a centralized underwater sensor network with five nodes is simulated on the integrated simulation system. The characteristic empirical model, Bellhop Ray-Tracing model, and WOSS combined with Bellhop model are, respectively, adopted to simulate underwater acoustic channel. The results of three types of simulation, such as average throughput, average delay, and packet error rate, and simulation time are very close under the same condition. It proves that the accuracy of integrated simulation system is as excellent as that of NS-Miracle. However, WOSS can automatically acquire the actual sea environment parameters and provide them to the simulator, which can improve the authenticity of the simulation system. Furthermore, three MAC protocols, Aloha-CS, CSMA/CA, and DACAP, are simulated on the integrated simulation system under the same condition including ocean environment, network topology, and parameters. The results show that the performance of CSMA/CA is greater than the other protocols in such networks. It also proves that the integrated simulation system can accurately simulate the relevant characteristics of the MAC protocol.
APA, Harvard, Vancouver, ISO, and other styles
22

U., Pavan Kumar. "IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 67–83. https://doi.org/10.5281/zenodo.4289544.

Full text
Abstract:
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
APA, Harvard, Vancouver, ISO, and other styles
23

B N, Prof Yuvaraju, and Dr Niranjan N. Chiplunkar. "Scenario Based Performance Analysis of variants of TCP using NS2-Simulator." International Journal of Computer Applications 4, no. 9 (2010): 20–24. http://dx.doi.org/10.5120/855-1197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.

Full text
Abstract:
Abstract: To put it simply, a Mobile Ad-Hoc Network (MANET) is indeed a network of wireless mobile hosts that have formed temporarily without the use of any dedicated infrastructure or centralized administration. The network's nodes are selforganizing &amp; self-configuring because of their mobility. The hosts also serve as routers. Their job is to route information to and from other network nodes. Routing protocols are essential in MANETs because they determine the best ways to get from one node to another. Any ad hoc network's routing protocol should be designed with the ever-evolving topology in mind. For this reason, it is important to set up a path between any two nodes that uses as little bandwidth as possible and as few hops as possible in the routing process. Due to the transient and ever-changing nature of mobile ad hoc networks, designing suitable routing protocols is difficult. For MANETs, routing protocols can be either proactive or reactive. Features and difficulties of MANETs are discussed in this work. Furthermore, both proactive and reactive routing systems, as described earlier, are discussed in detail. Additionally, DSDV, DSR, and AODV are compared with one another in terms of attributes and performance. Finally, certain articles that have dealt with routing in MANET are critically examined.
APA, Harvard, Vancouver, ISO, and other styles
25

Zoraida, B., and G. Indumathi. "Comparison of software defined networking with traditional networking using NS2 simulator." International Journal on Information Technologies and Security 15, no. 3 (2023): 3–14. http://dx.doi.org/10.59035/tbww1651.

Full text
Abstract:
The Software Defined Network (SDN) is an emerging concept in network engineering that entails the decoupling of the control plane and data plane. The data plane is executed on discrete nodes, while a centralised control plane is accountable for overseeing network-wide functionalities. In conventional networks, the integrated planes are incorporated into the network suite, and the transmission is determined by the route. In this work, the traditional way of routing using a communication plane is compared with routing using an SDN controller. The present study employs the NS2 simulator to evaluate the quality of service performance under high background traffic conditions. In the event of network congestion, it is imperative to utilize the available bandwidth to its fullest extent in order to increase the rate of bit transmission per second. The results of the traditional network and SDN network based on various parameters like Ambiguous collision, Delay, Jitter, Availability and Latency are compared in this paper. The results show that the SDN network's performance is better with concerning time.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Yun Han, Gui He Qin, and Yang Nan. "The Simulation Platform of Logical Ring in CAN Network Management." Applied Mechanics and Materials 427-429 (September 2013): 2174–78. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2174.

Full text
Abstract:
In order to guarantee the communication of logical ring designed properly during the development of Controller Area Network (CAN) Network Management (NM) system complied with OSEK/VDX direct NM specification, it is necessary to investigate its performance in various work conditions. However, this usually costs much time and work consumption to reproduce specific work conditions in a distributed CAN network. By the simulation platform of logical ring developed with Network Simulator 2 (NS2), this paper provided an efficient test tool, which much reduced the consumption of specific work condition reproduction.
APA, Harvard, Vancouver, ISO, and other styles
27

Thamizhmaran, K., and A. Charles. "Comparison of on-demand routing protocol for MANET using simulation." i-manager's Journal on Communication Engineering and Systems 11, no. 1 (2022): 13. http://dx.doi.org/10.26634/jcs.11.1.18659.

Full text
Abstract:
In the test lab, the study includes the behavior of the network and many services and applications it supports; other aspects of the environment can also be modified in a controlled manner to evaluate how the network will perform under different circumstances. Network designers can test completely new network protocols or make changes to existing one using network simulators in a controlled and reproducible manner. This paper discussed the Dynamic Source Routing (DSR) reactive routing protocol, which was modeled using eight different types of network simulators and an active node count of 80 without any malicious nodes. Based on the analysis of the results of the simulators, Network Simulator 2 (NS2) demonstrated the highest packet delivery rate compared to other simulators.
APA, Harvard, Vancouver, ISO, and other styles
28

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhanced system for ns2 trace file analysis with network performance evaluation." Iraqi Journal of Intelligent Computing and Informatics (IJICI) 1, no. 2 (2022): 119–30. http://dx.doi.org/10.52940/ijici.v1i2.22.

Full text
Abstract:
One of the critical challenges facing operators around the world is how to ensure that everything is running smoothly as well as how to analyze the performance of the network. Nonetheless, the analytic system must be precise, user-friendly, and quick enough to depict network performance in real time. Network performance is essential for ensuring service quality. In this light, the Network Simulator NS-2 is generally employed for network research on the widely-used UNIX and Windows systems. Next, the network scenarios are generated using network simulation scripts, and upon completion of the simulation, trace files that record network events are generated. Information that might be utilized in a performance study could be recorded in trace files. This could include the total number of packets sent, their arrival times, any delays or losses, and so on. This trace file analysis problem arises mostly because NS-2 does not provide any visualization options for analyzing simulation results (trace files). A system is proposed to analyze the NS2 trace file and facilitate data extraction and evaluation. The main feature of this system is the Java language for network performance evaluation. And to prove the validity of the system, the system was compared with the Trace graph, where the speed of the new system was very high.
APA, Harvard, Vancouver, ISO, and other styles
29

Sangeeta Vhatkar. "Performance and QoS Assessment in WSN: Comparative Analysis of MBC, ECHERP, and PDCH Routing Methods." Journal of Electrical Systems 20, no. 4s (2024): 2176–84. http://dx.doi.org/10.52783/jes.2324.

Full text
Abstract:
Objective: The objective of this research is to assess the performance and Quality of Service (QoS) provided by PDCH when compared with ECHERP and MBC routing protocols(RPs) within Wireless Sensor Networks (WSNs). Methods: Utilizing the NS2 Simulator, this paper provides an in-depth exploration of three hierarchical RPs viz. Equalized Cluster Head Election RP (ECHERP), Mobility Based Clustering (MBC), and PDCH (PEGASIS with Double Cluster head). A thorough examination of each protocol's performance is conducted, focusing on a range of QoS metrics such as Energy Consumption, Packet Drop Ratio, Throughput, and Delay. Findings: A comparative assessment is conducted between PDCH, ECHERP, and MBC, extracting QoS parameters. The examination and findings reveal that PDCH exhibits superior performance over ECHERP by 26.15%, 20%, 15.71%, and 37.73%. Similarly, PDCH outperforms MBC by 23.19%, 14.29%, 4.87%, and 15.13% across the mentioned parameters. Novelty: In this simulation, the NS2 software is utilized, with a specific emphasis on the suggested parameters. These metrics are crucial for evaluating the overall performance of different RPs in Wireless Sensor Networks (WSNs).
APA, Harvard, Vancouver, ISO, and other styles
30

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Full text
Abstract:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive &amp; hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp; active attacks. Sinkhole is one of severe kind of attack which attempts to attract most of network traffic towards it &amp; degrade the performance of network. this paper, shows performance metrics as throughput, PDR, End to end delay &amp; Packet loss. Simulation is carried out using widely used simulator NS2.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
31

Amena, Begum, Zahidur Rahman Md., Nancy Nurunnahar, and Enamul Haq Md. "Comparative Performance Evaluation of Mobile Ad-hoc Network Routing Protocols using NS2 Simulator." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 707–13. https://doi.org/10.35940/ijrte.C4691.099320.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is an independent assortment of mobile users that communicate over moderately bandwidth constrained wireless links. MANET&rsquo;s topology is dynamic that can change rapidly because the nodes move freely and can organize themselves randomly; has the advantage of being quickly deployable. Although numerous routing protocols have been proposed for mobile ad hoc networks, there is no universal scheme that works well in scenarios with different network sizes, traffic loads and node mobility patterns, so mobile ad hoc routing protocol election presents a great challenge. In this paper, an attempt has been made to compare the performance of three routing protocols in Mobile Ad-hoc Networks &ndash; Ad-Hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination Sequenced Distance Vector (DSDV). We have evaluated the performance of these routing protocols with varying the number of mobile nodes and packet sizes on the basis of four important metrics such as packet delivery ratio, average end to end delay, normalized routing overhead and throughput. Network Simulator version 2.35 (NS-2.35) is used as the simulation tool for evaluating these performance metrics. The outcome of this research shows that AODV protocol outperforms DSDV and DSR protocols.
APA, Harvard, Vancouver, ISO, and other styles
32

Chabou, Zakaria, Adnane Addaim, and Abdessalam Ait Madi. "Enhancing performance of slotted ALOHA protocol for IoT covered by constellation low-earth orbit satellites." Bulletin of Electrical Engineering and Informatics 13, no. 6 (2024): 4030–40. http://dx.doi.org/10.11591/eei.v13i6.8158.

Full text
Abstract:
Recently, constellation of satellites has drawn a lot of interest from academia and industry as potential solution for extensive coverage of wide range of internet of things (IoT). In this work, IoT devices was assumed to be covered by constellation of low-earth orbit (LEO) satellites where the medium access control (MAC) technique called slotted ALOHA is employed. In this article, we use a constellation of satellites to reduce the collision domain and enhancing performance in order to obtain maximum results. We have carried out some modeling and simulations to optimize the number of satellites with different erasure probabilities with respect to IoT devices in order to enhance throughput and stability of slotted ALOHA protocol using the network simulator 2 (NS2). The numerical results have shown an improvement in terms of throughput and stability. And the simulation of the same system using NS2 is conducted and shows a good correlation with the theoretical study. Where the throughput reached 0.82% instead of 0.52%. Our findings offer proof that this method helps to use large number of IoT, and reduce collisions compared to conventional slotted ALOHA.
APA, Harvard, Vancouver, ISO, and other styles
33

Patel, Suraj. "Performance Analysis of Routing Protocols in Mobile Ad-hoc Networks (MANETs) Using NS2: A Comparative Study of AODV, DSR, and DSDV." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem37624.

Full text
Abstract:
MANET stands for Mobile Adhoc Network also called a wireless Adhoc network or Adhoc wireless network that usually has a routable networking environment on top of a Link Layer ad hoc network. A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. The characteristics of an ad-hoc network can be explored on the base of routing protocols. Simulation can be defined as “Imitating or estimating how actions might happen in a real situation”. It can engage in the complex mathematical modeling, combinations and role playing without the aid of technology. The value deceit in the pacing you under realistic conditions that modify as a result of behavior of others involved, so you cannot expect the sequence of events or the final result. For this purpose we first study and explain these protocols and then we use the Network Simulator – 2.35 (NS2) tool and analysis the performance metrics Packet Delivery ratio, End to End delay, Throughput and Residual Energy. Keywords: Ad-hoc Network, DSDV, NS2, AODV, DSR, Routing Protocols.
APA, Harvard, Vancouver, ISO, and other styles
34

Zamani, Elham, and Mohammadreza Soltanaghaei. "The Improved Overhearing Backup AODV Protocol in MANET." Journal of Computer Networks and Communications 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/6463157.

Full text
Abstract:
Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable routing is one of the research aspects of MANET. In this paper, a proposed method, called M-AODV, which is a type of overhearing backup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the improvement of packet delivery rate and reduction of overhead and delay. Moreover, to assess the security of the proposed protocol, we simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results showed that M-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount of overhead had been increased.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Runtong, Fuzhi Chu, Quan Yuan, and Wei Dai. "A Study on an Energy Conservation and Interconnection Scheme between WSN and Internet Based on the 6LoWPAN." Mobile Information Systems 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/592613.

Full text
Abstract:
Wireless sensor network (WSN), which has broad application prospects, consists of small nodes with sensing, computation, and communications capabilities. IPv6 is used over low power WPAN (wireless personal area network) which is run by 6LoWPAN technology on the LoWPAN devices. In order to establish seamless connection of two heterogeneous networks, that is, WSN and IPv6 network, this paper proposes an improved energy conservation and interconnection scheme (ECIS) based on the analysis of the current schemes. Detailed design of each functional component in the new scheme is proposed, and an expansion of the SSCS module in NS2 802.15.4 simulator is examined. Comprehensive experiments on the simulation platform show that the newly proposed scheme is advantageous over existing results.
APA, Harvard, Vancouver, ISO, and other styles
36

Sharma, Saurabh, Dipti Jindal, and Rashi Agarwal. "Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-hoc Network." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1305. http://dx.doi.org/10.11591/ijece.v8i3.pp1305-1314.

Full text
Abstract:
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
APA, Harvard, Vancouver, ISO, and other styles
37

Syed S, Syes Abdul, and T. Senthil Kumaran. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp306-310.

Full text
Abstract:
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
38

Saurabh, Sharma, Jindal Dipti, and Agarwal Rashi. "Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-hoc Network." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1305–14. https://doi.org/10.11591/ijece.v8i3.pp1305-1314.

Full text
Abstract:
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
APA, Harvard, Vancouver, ISO, and other styles
39

S., Syes Abdul Syed, and Senthil Kumaran T. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306–10. https://doi.org/10.11591/ijeecs.v9.i2.pp306-310.

Full text
Abstract:
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
40

Bali, Akanksha, Malvika Ashok, and Megha Mahajan. "Performance Analysis of Routing Protocols under Security Issues through Use of NS2 Simulator." International Journal of Computer Applications 180, no. 20 (2018): 38–44. http://dx.doi.org/10.5120/ijca2018916478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mohapatra, S., and P. Kanungo. "Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator." Procedia Engineering 30 (2012): 69–76. http://dx.doi.org/10.1016/j.proeng.2012.01.835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hasan, Mohammad Shahidul, Christopher Harding, Hongnian Yu, and Alison Griffiths. "Modeling delay and packet drop in Networked Control Systems using network simulator NS2." International Journal of Automation and Computing 2, no. 2 (2005): 187–94. http://dx.doi.org/10.1007/s11633-005-0187-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Danda, Nandhini, and K. Suresh Babu Dr. "Vehicular Ad-Hoc Networks (VANET)." International Journal of Innovative Science and Research Technology 7, no. 4 (2022): 533–40. https://doi.org/10.5281/zenodo.6519390.

Full text
Abstract:
Wir simulate VANET connection using NS2 and several protocols such as ADV, DSDV and DSR and then compare their performance using PDR (PDR). High PDR protocols are regarded as efficient and dependable. We&#39;re utilising packet encryption and decryption in our project to keep communications between cars safe. Both vehicles will send and receive encrypted signals about the distance and other traffic conditions while they are in close proximity, and these messages will be decoded when they are received. The VANET sensor cannot be hacked by anyone who is able to decipher the messages that are exchanged in the network. Our SUMO simulator is used to produce traffic mobility traces, which are then used to calculate protocol performance in NS2. The NS2 protocol will send alerts when a car arrives within a certain distance of another vehicle in this trail. When two vehicles get within a certain distance of one another, they exchange encrypted and decrypted distance messages, and one of the vehicles will halt and resume motion when the road is clear. I&#39;ll present the implementation in video so you can see the results for yourself. I&#39;ll plot the PDR performance of the DSDV, AODV, and DSR protocols after they&#39;ve all been run
APA, Harvard, Vancouver, ISO, and other styles
44

Rashad, Zahraa Khazal. "Evaluating the Impact of Mid-Link Bandwidth Constraints on Video Streaming Performance Using NS2." International journal of Computer Networks & Communications 16, no. 5 (2024): 77–90. http://dx.doi.org/10.5121/ijcnc.2024.16505.

Full text
Abstract:
A detailed simulation study of video streaming over a simple best-effort network topology is conducted using Network Simulator 2 (NS2). The simulation involves transmitting a video stream across a simple network topology where the central link's data rate varies to simulate different cases. The network topology consists of : node 0 (sender), node 3 (receiver), and nodes 1 and 2 as intermediate nodes. The study aims to examine the impact of mid-link bandwidth variations on packet loss during video transmission. Specifically, the mid-link connecting nodes experience bandwidth reductions to 10, 8, and 5 Mbps. By adjusting the mid-link bandwidth, we simulate scenarios that typically cause packet drops and measure the resulting packet loss for each bandwidth configuration. The simulation results provide insights into how bandwidth constraints affect video streaming performance, emphasizing the correlation between reduced mid-link capacity and increased packet drop rates. The results indicate that maintaining the video encoding constant while reducing the mid-link bandwidth to half of its required capacity results in an approximately 30% rise in dropped packets and a fivefold increase in end-to-end delay. This significant packet loss severely degrades the video quality, highlighting the importance of adequate mid-link bandwidth for maintaining high-quality transmission.
APA, Harvard, Vancouver, ISO, and other styles
45

Flizikowski, Adam, Marcin Przybyszewski, and Witold Hołubowicz. "Evaluation of wimax admission control algorithms in mobile voip scenarios with batch arrivals and nbldpc fec." Image Processing & Communications 18, no. 1 (2013): 45–56. http://dx.doi.org/10.2478/v10248-012-0072-5.

Full text
Abstract:
Abstract This paper presents results of assessing quality of VoIP conversations in WiMAX networks using the nbLDPC (non-binary Low- Density Parity-Check) FEC in mobility scenarios that are based on the real world terrain charactristics around simulated BS. System under test (SUT) is instrumented with three Call Admission Control (CAC) mechanisms (namely EMAC, ARAC and nsc-ARAC). These algorithms are evaluated against controlling the VBR traffic that comes with burst arrivals. The first algorithm relies on calculating simple exponential weighted moving average (EWMA) of the overall resource consumption whereas the other two ARAC algorithms perform calculations discerning between the new, the ongoing and the finishing connections thus providing more accurate resource estimations (but the ARAC tracks the history of requests as well). In order to evaluate their performance authors rely on a cell-level based simulation environment that relies on the cooperative use of well known simulators - ns2 and Matlab. Previous work in the field is enhanced by improving the fidelity of proposed IEEE 802.16 simulator. Authors demonstrate the influence of increasing number of arrivals per one batch as well as testing the "zero hour" scenario (system saturation). In order to include nbLDPC codes in SUT’s mobile channels, a method called Link-To-System interface (L2S) has been implemented.
APA, Harvard, Vancouver, ISO, and other styles
46

Mohammed, Ahmed Jubair, Hamid Hassan Mustafa, A. Mostafa Salama, et al. "Competitive analysis of single and multi-path routing protocols in MANET." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 1 (2020): 293–300. https://doi.org/10.11591/ijeecs.v19.i1.pp293-300.

Full text
Abstract:
A mobile ad-hoc network (MANET) refers to a dynamic and wireless network, which can be designed without an existing infrastructure as every node serves as a router. A MANET is a self-configuring system of mobile nodes that are connected wirelessly. Every node serves as a sink, as well as a router to send packets. The movement of the nodes is not restricted as they can move in any direction, and they have the ability to get organized into a network. Due to their free and independent movement, they do not have a fixed position; they often change positions. In this study, the dynamic source routing (DSR) and Ad-hoc on multipath demand distance vector (AOMDV) protocols are compared using Network Simulator NS2.35. DSR is a reactive gateway discovery algorithm whereby the connection of a MANET mobile device is established only on demand. Basically, AOMDV was specially tailored for adhoc networks that are highly dynamic to respond to link failures and breakages in the network. It ensures that the paths for destinations are sustained, and it defines the new routing information using destination serial numbers to ensure loop freedom always while avoiding problems. More so, it is a protocol that is based on a timer that can discover ways through which the mobile nodes respond to link breakages and change in topology. A comparison of protocols has been carried out individually and jointly with the aim of evaluating their performance. The performance is measured in terms of End-to-End Delay, Packet Delivery Ratio, Packet Loss Ratio, and Routing Overhead Ratio. The performance of the routing protocols was done using two scenarios; when there is a change in the simulation time and when there is a change in the number of nodes.
APA, Harvard, Vancouver, ISO, and other styles
47

K., Prabu, and Thamizhmaran K. "A Review of FIFO Design for Wireless Network." Journal of Research and Advancement in Electrical Engineering 6, no. 3 (2023): 18–21. https://doi.org/10.5281/zenodo.10148054.

Full text
Abstract:
<i>Wireless network can be applied in many of technologies such as satellite system, Television remote control, Computer interface devices, GPS system.&nbsp;"Faulty nodes" are nodes that operate abnormally due to a failure or mishap. The other type is known as "malicious nodes," and it refers to those that have been compromised by attacker.&nbsp;FIFO queuing in scheduling algorithm using NS2 simulator. In this work, the performance of First in First out (FIFO) scheduling algorithm is evaluated to attain Quality of Service (QoS).</i>
APA, Harvard, Vancouver, ISO, and other styles
48

Mohammed, Marwan Aziz. "Performance Study of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks Based on Network Simulator NS2." Sulaimani Journal for Engineering Sciences 2, no. 2 (2015): 7–12. http://dx.doi.org/10.17656/sjes.100020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mohammed, Marwan Aziz. "Performance Study of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks Based on Network Simulator NS2." Sulaimani journal for engineering sciences 2, no. 2 (2015): 7–12. http://dx.doi.org/10.17656/sjes.10020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

K., Thamizhmaran. "A Review of PQ Model for Infrastructureless Network." Recent Trends in Control and Converter 6, no. 3 (2023): 14–16. https://doi.org/10.5281/zenodo.10168573.

Full text
Abstract:
<i>Wireless based dipole networks increased in security-basic applications, in view of their inborn asset obliged qualities, they are inclined to different security assaults, and a Dark opening assault is a sort of assault that genuinely influences information assortment. To overcome that test, a functioning recognition based security and trust steering plan named Dynamic Trust is proposed for WSNs. Route security in priority queuing in scheduling algorithm using NS2 Simulator. In this work, perform of priority queuing algorithm is evaluated to attain quality of Service (QoS).</i>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!