ns2 simulator
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 10)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Lakhdar Goudjil ◽  
Fouzi Semchedine

Abstract Power consumption is the most important factor to evaluate the performance of Wireless Sensor Networks (WSNs). Most sensor network Medium Access Control (MAC) protocols operate on the basis of a duty cycle mechanism. The asynchronous receiver initiated MAC duty cycle protocols are popular due to their relatively higher energy efficiency. However, recent advances harnessing the benefits of cooperative communication has become one of the solutions of MAC duty cycle protocol. In this article, we improve the RI-MAC protocol by introducing a short frame identifier to notify the sender when the receiver wakes up. This resolution reduces idle listening, which increases energy performance. When the sender node receives a short frame identifier, it cooperates with neighboring senders, which minimizes collisions.Our protocol is called: a Cooperative Short Frame Identifier Receiver Initiated MAC protocol, COSFI-RIMAC is an asynchronous MAC protocol cooperative service cycle initiated by the receiver. The simulation result on the NS2 simulator shows that the COSFI-RIMAC mechanism reduces power consumption, produces minor latency and increases the rate of packet delivery.


Author(s):  
Manish Kumar ◽  
Abhinav Bhandari

As the world is getting increasingly dependent on the Internet, the availability of web services has been a key concern for various organizations. Application Layer DDoS (AL-DDoS) attacks may hamper the availability of web services to the legitimate users by flooding the request queue of the web server. Hence, it is pertinent to focus fundamentally on studying the queue scheduling policies of web server against the HTTP request flooding attack which has been the base of this research work. In this paper, the various types of AL-DDoS attacks launched by exploiting the HTTP protocol have been reviewed. The key aim is to compare the requests queue scheduling policies of web server against HTTP request flooding attack using NS2 simulator. Various simulation scenarios have been presented for comparison, and it has been established that queue scheduling policy can be a significant role player in tolerating the AL-DDoS attacks.


System security assumes a vital job in this MANET and the customary method for ensuring the systems through firewalls and encryption programming is never again powerful and adequate. So as to give extra security to the MANET, interruption location components ought to be included. In this paper, particular affirmation is utilized for distinguishing vindictive hubs in the specially appointed system. NS2 is utilized to recreate and assess the proposed plan and look at it against the AACK. The acquired outcomes demonstrate that the specific affirmation conspire outflanks AACK as far as system bundle conveyance proportion and directing overhead. Portable Ad-hoc Network is an impermanent system made out of versatile hubs, associated by remote connections, without settled infrastructure. This paper proposes a novel component considered specific affirmation for taking care of issues that emerge with Adaptive Acknowledgment (AACK). Points of interest in this paper are security is expanded and can enhance the execution of the system.


Author(s):  
SYEDA GAUHAR FATIMA ◽  
SYEDA KAUSAR FATIMA ◽  
SYED MOHD ALI ◽  
SYED ABDUL SATTAR

Sign in / Sign up

Export Citation Format

Share Document