scholarly journals On the Fidelity of NS-3 Simulations of Wireless Multipath TCP Connections

Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7289
Author(s):  
Monika Prakash ◽  
Atef Abdrabou

The multipath transmission control protocol (MPTCP) is considered a promising wireless multihoming solution, and the 3rd generation partnership project (3GPP) includes it as a standard feature in the fifth-generation (5G) networks. Currently, ns-3 (Network Simulator-3) is widely used to evaluate the performance of wireless networks and protocols, including the emerging MPTCP protocol. This paper investigates the fidelity of the Linux kernel implementation of MPTCP in the ns-3 direct code execution module. The fidelity of MPTCP simulation is tested by comparing its performance with a real Linux stack implementation of MPTCP using a hardware testbed for two different setups. One setup emulates the existence of a bottleneck link between the sending and receiving networks, whereas the other setup does not have such a bottleneck. The fidelity of ns-3’s simulation is tested for four congestion control algorithms, namely Cubic, linked-increases algorithm (LIA), opportunistic LIA (OLIA) and wVegas for relatively short and long data flows. It is found that the uplink MPTCP throughput performance exhibited by the ns-3 simulator matches the hardware testbed results only if the flows are long-lived and share no common bottleneck link. Likewise, the MPTCP throughput achieved during a downlink scenario using the ns-3 simulator and the hardware testbed are close to each other across all algorithms except wVegas regardless of the flow size if there is no bottleneck link. Moreover, it is observed that the impact of LTE handover on MPTCP throughput is less significant in the simulator than the real hardware testbed, and it is setup-dependent.

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1387
Author(s):  
Oswaldo Sebastian Peñaherrera-Pulla ◽  
Carlos Baena ◽  
Sergio Fortes ◽  
Eduardo Baena ◽  
Raquel Barco

Cloud Gaming is a cutting-edge paradigm in the video game provision where the graphics rendering and logic are computed in the cloud. This allows a user’s thin client systems with much more limited capabilities to offer a comparable experience with traditional local and online gaming but using reduced hardware requirements. In contrast, this approach stresses the communication networks between the client and the cloud. In this context, it is necessary to know how to configure the network in order to provide service with the best quality. To that end, the present work defines a novel framework for Cloud Gaming performance evaluation. This system is implemented in a real testbed and evaluates the Cloud Gaming approach for different transport networks (Ethernet, WiFi, and LTE (Long Term Evolution)) and scenarios, automating the acquisition of the gaming metrics. From this, the impact on the overall gaming experience is analyzed identifying the main parameters involved in its performance. Hence, the future lines for Cloud Gaming QoE-based (Quality of Experience) optimization are established, this way being of configuration, a trendy paradigm in the new-generation networks, such as 4G and 5G (Fourth and Fifth Generation of Mobile Networks).


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


With traffic increase in a wireless network beyond its capacity and as the number of connected devices continue to grow, the quality of service (QoS) degrades. In this paper we study the impact of mobility on throughput in the case of an infrastructure wireless network using IEEE 802.11 Wi-Fi standard. Since we found in the literature that the mobility of stations can have an impact on the quality of service, we try to remedy to this by implementing a new access category reserved for mobile stations. First we compare the throughput between static and mobile nodes, both connected to a QoS station. Then we propose our new model that consists of adding a new access category used by mobile nodes regardless of their traffic category. The study was made by simulating different scenarios using Network Simulator-3 (NS-3). We found that the throughput may vary depending on the simulation scenario. The simulation results show that with the proposed solution the mobile nodes can have a better throughput.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 189 ◽  
Author(s):  
Sijia Zhan ◽  
Dan Tang ◽  
Jianping Man ◽  
Rui Dai ◽  
Xiyin Wang

Low-rate denial of service (LDoS) attacks reduce the quality of network service by sending periodical packet bursts to the bottleneck routers. It is difficult to detect by counter-DoS mechanisms due to its stealthy and low average attack traffic behavior. In this paper, we propose an anomaly detection method based on adaptive fusion of multiple features (MAF-ADM) for LDoS attacks. This study is based on the fact that the time-frequency joint distribution of the legitimate transmission control protocol (TCP) traffic would be changed under LDoS attacks. Several statistical metrics of the time-frequency joint distribution are chosen to generate isolation trees, which can simultaneously reflect the anomalies in time domain and frequency domain. Then we calculate anomaly score by fusing the results of all isolation trees according to their ability to isolate samples containing LDoS attacks. Finally, the anomaly score is smoothed by weighted moving average algorithm to avoid errors caused by noise in the network. Experimental results of Network Simulator 2 (NS2), testbed, and public datasets (WIDE2018 and LBNL) demonstrate that this method does detect LDoS attacks effectively with lower false negative rate.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 521 ◽  
Author(s):  
Seonghyeon Gong ◽  
Changhoon Lee

The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased the diversity and complexity of the network. This change diversifies the attacker’s attack vectors, increasing the impact and damage of cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced cyber threats proactively by analyzing and sharing security-related data. However, the performance of CTI systems can be significantly compromised by creating and disseminating improper security policies if an attacker intentionally injects malicious data into the system. In this paper, we propose a blockchain-based CTI framework that improves confidence in the source and content of the data and can quickly detect and eliminate inaccurate data for resistance to a Sybil attack. The proposed framework collects CTI by a procedure validated through smart contracts and stores information about the metainformation of data in a blockchain network. The proposed system ensures the validity and reliability of CTI data by ensuring traceability to the data source and proposes a system model that can efficiently operate and manage CTI data in compliance with the de facto standard. We present the simulation results to prove the effectiveness and Sybil-resistance of the proposed framework in terms of reliability and cost to attackers.


Author(s):  
Atef Abdrabou ◽  
Monika Prakash ◽  
Ahmed S. AlShehi ◽  
Sirag-Eldin Ahmed ◽  
Mohamed Darwish

2020 ◽  
Vol 16 (2) ◽  
pp. 155014772090975
Author(s):  
Yoohwa Kang ◽  
Changki Kim ◽  
Donghyeok An ◽  
Hyunsoo Yoon

Various technologies have been developed for the efficient use of the multiple radio access technologies resource at the radio access network level or other network levels to improve user service quality in mobile communication networks. In long-term evolution, mobile carriers are commercializing radio access network-level traffic aggregation technologies such as licensed-assisted access-long-term evolution, long-term evolution-unlicensed, and long-term evolution-wireless local area network aggregation, which use the multi-accesses of the 3rd Generation Partnership Project and WiFi, and the multipath transmission control protocol–based traffic aggregation technologies at the L3 network level. The standardization of 3rd Generation Partnership Project Release 16, which is scheduled to be completed by 2020, is under progress to support the traffic aggregation technology at the L3 network level through a multi-access 5G network. Multipath transmission control protocol is also considered as a traffic aggregation technology. However, it is difficult to apply the multipath transmission control protocol employment model used in long-term evolution to the 5G network structure as it is due to the change to a common core architecture that accommodates multiple radio access technologies through one common interface. Therefore, this article proposes an optimal 5G system architecture and a multipath transmission control protocol adaptation method to support the access traffic steering function based on multipath transmission control protocol in a 3rd Generation Partnership Project 5G mobile communication network. We have verified the development of the multipath transmission control protocol–based multi-access traffic steering technology by implementing the proposed solution in a commercial server on a testbed based on the 5G system standard of 3rd Generation Partnership Project Release 15. Furthermore, this article defines problems that occur when implementing the multipath transmission control protocol–based multi-access traffic steering system and proposes relevant solutions. Based on the implementation results, it is demonstrated that the proposed multipath transmission control protocol–based multi-access traffic steering system can perform traffic steering in the 3rd Generation Partnership Project 5G network.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1556
Author(s):  
Manuel García Sánchez ◽  
Alejandro Santomé Valverde ◽  
Isabel Expósito

The 28 GHz band is one of the available bands in Frequency Range 2 (FR2), above 6 GHz, for fifth generation (5G) communications. The propagation characteristics at this frequency band, together with the bandwidth requirements of 5G communications, make it suitable for ultra-dense smart cell networks. In this paper, we investigate the performance of a radio channel in the presence of moving, scattering sources for a small cell at 28 GHz, located at a bus stop. To do so, measurements of the channel complex impulse response with a sweep time delay cross-correlation sounder were made and then used to examine the distribution of multipath components. Besides analyzing the delay spread caused by the channel, we also evaluate the impact on the Doppler spectrum (DS) caused by the vehicles passing near the bus stop. We show that delay components are grouped in clusters exhibiting exponential decay power. We also show that the DS varies with time as vehicles pass by, so the channel cannot be considered stationary. We propose an empirical DS model, where the model parameter should change with time to describe the non-stationary nature of the radio channel. We have also found that the DS with maximum spread is similar for channel contributions in different delay clusters.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Ricardo Marco Alaez ◽  
Jose M. Alcaraz Calero ◽  
Qi Wang ◽  
Fatna Belqasmi ◽  
May El Barachi ◽  
...  

Fourth-Generation (4G) mobile networks are based on Long-Term Evolution (LTE) technologies and are being deployed worldwide, while research on further evolution towards the Fifth Generation (5G) has been recently initiated. 5G will be featured with advanced network infrastructure sharing capabilities among different operators. Therefore, an open-source implementation of 4G/5G networks with this capability is crucial to enable early research in this area. The main contribution of this paper is the design and implementation of such a 4G/5G open-source testbed to investigate multioperator infrastructure sharing capabilities executed in virtual architectures. The proposed design and implementation enable the virtualization and sharing of some of the components of the LTE architecture. A testbed has been implemented and validated with intensive empirical experiments conducted to validate the suitability of virtualizing LTE components in virtual infrastructures (i.e., infrastructures with multitenancy sharing capabilities). The impact of the proposed technologies can lead to significant saving of both capital and operational costs for mobile telecommunication operators.


2005 ◽  
Vol 33 (1) ◽  
pp. 315-326 ◽  
Author(s):  
Yaoping Ruan ◽  
Vivek S. Pai ◽  
Erich Nahum ◽  
John M. Tracey

Sign in / Sign up

Export Citation Format

Share Document