Search results for "Network simulation"

showing 9 items of 29 documents

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

QoS Based Routing Protocol for Intra-Mesh Infrastructure Communications

2015

International audience; Mesh Networks (WMNs) have been considered as a promising alternative to conventional wired networks, thanks to its flexibility and easy deployment. Thus, to ensure a satisfying level of QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD), we propose a novel QoS based routing protocol for wireless mesh environments, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to enhance scalability issues within the mesh infrastructure. HQMR is composed of two routing sub-protocols: a reactive routing sub-protocol for intra-infrastructure communications and a proactive QoS based multi-tree routin…

Routing protocolDynamic Source RoutingPerformance EvaluationComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technologyClusteringNetwork simulationRouting Information Protocol[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringWirelessWireless Mesh NetworkIMRRHierarchical routingZone Routing ProtocolStatic routingVoice over IPQoS Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless mesh networkAdaptive quality of service multi-hop routingbusiness.industryQuality of servicePolicy-based routingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsOrder One Network ProtocolAd hoc wireless distribution serviceIEEEDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingInterior gateway protocol020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

IMRR and IMPR Routing Protocols For Inter and Intra Wireless Mesh Communications

2015

Given the evolution of wireless technologies, Wireless Mesh Networks (WMN) have appeared as an emerging low-cost solution to ensure last-mile connectivity to the Internet network. However, providing real-time and streaming applications, such as VoIP (Voice over IP) and VoD (Video on Demand), with a satisfying QoS level is considered as an important challenge within these networks. In this paper, we propose a QoS based routing protocol, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to improve the scalability of mesh networks. HQMR is composed of two routing sub- protocols: a reactive QoS based routing protocol for intra-mesh infrastructure communications and a pr…

Routing protocolStatic routingZone Routing ProtocolDynamic Source Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputer scienceHQMRDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolNetwork simulationWireless Routing ProtocolQoS020206 networking & telecommunications02 engineering and technologyWMNRouting protocolLink-state routing protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture

2005

This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…

Service (systems architecture)Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOpen Shortest Path FirstMultiprotocol Label SwitchingAdmission controllaw.inventionNetwork simulationTraffic engineeringlawNext-generation networkInternet ProtocolTelephonyStream Control Transmission ProtocolSoftware architecturebusinesscomputerComputer network
researchProduct

Rule based reasoning for network management

2006

This paper focuses on improving network management by the adoption of artificial intelligence techniques. We propose a distributed multi-agent architecture for network management, where a logical reasoner acts as a managing entity capable of directing, coordinating, and triggering monitoring and management actions in the proposed architecture. The logical inference system has been devised to enable automated isolation, diagnosis, and to repair network anomalies, thus enhancing the reliability, performance, and security of the network. The measurements of network events are captured by programmable sensors deployed on the network devices and are collected by the network management entity whe…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial intelligenceComputer networkComputer sciencebusiness.industrySemantic reasonerFormal logiccomputer.software_genreNetworking hardwareNetwork management applicationNetwork simulationIntelligent computer networkNetwork managementElement management systemKnowledge based systemsData miningbusinesscomputerNetwork management station
researchProduct

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct

HINTS: A novel approach for realistic simulations of vehicular communications

2012

One of the main challenges in the Vehicular Ad-Hoc Networks (VANETs) research domain is the simulation of vehicular communications using realistic mobility models. Several efforts have been put lately in this purpose; yet, the proposed models are either inappropriate, or carry significant disadvantages. In this paper, we propose a novel approach for realistic simulations in vehicular networks, inspired from the hierarchical video and image compression technique. We developed HINTS (Hybrid Integration of Network and Traffic Simulators), the correspondent platform, engendered from the integration of SUMO, a traffic simulator and NS-3, a network simulator after adding some supplemental modules…

Vehicular communication systemsImage codingMobility modelVehicular ad hoc networkComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSimulationTraffic simulatorNetwork simulationImage compressionDomain (software engineering)2012 Global Information Infrastructure and Networking Symposium (GIIS)
researchProduct

Network Reconfiguration Suitability for Scientific Applications

2008

This paper analyzes the communication pattern of several scientific applications and how they can make profit of network reconfiguration in order to adapt network topology to the communication needs so that total execution time is reduced. By using an analysis methodology based on real application executions, we study the variation of the required communication bandwidth with time and also the global interprocedural communication patterns. Results show that required bandwidth between each pair of processes does not significantly fluctuates, leading to a constant use of the links and therefore discouraging dynamic reconfigurations of the network during execution time. Nevertheless, the group…

Wireless ad hoc networkComputer sciencebusiness.industryDistributed computingMessage passingMessage Passing InterfaceSystem on a chipNetwork reconfigurationbusinessNetwork topologyNetwork simulationComputer network2008 37th International Conference on Parallel Processing
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct