scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

An XG-PON module for the NS-3 network simulator

TL;DR: The aim is to provide a standards-compliant, configurable, and extensible module that can simulate XG-PON with reasonable speed and can support a wide range of research topics.
Abstract: 10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regarded as one of the key technologies for future Internet access networks. In this paper, we propose and discuss the design and implementation of an XG-PON module for the NS-3 network simulator. The aim is to provide a standards-compliant, configurable, and extensible module that can simulate XG-PON with reasonable speed and can support a wide range of research topics. These include analysing and improving the performance of XG-PON, studying the interactions between XG-PON and the upper-layer protocols, and investigating its integration with various wireless networks.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: Simulation results show that Dynamic Path Privacy has better performances compared to some related region based algorithms such as IAPIT scheme, half symmetric lens based localization algorithm (HSL) and sequential approximate maximum a posteriori (AMAP) estimator scheme, but also provides better locatable ratio.
Abstract: Many applications of location based services (LBSs), it is useful or even necessary to ensure that LBSs services determine their location. For continuous queries where users report their locations periodically, attackers can infer more about users' privacy by analyzing the correlations of their query samples. The causes of path privacy problems, which emerge because the communication by different users in road network using location based services so, attacker can track continuous query information. LBSs, albeit useful and convenient, pose a serious threat to users' path privacy as they are enticed to reveal their locations to LBS providers via their queries for location-based information. Traditional path privacy solutions designed in Euclidean space can be hardly applied to road network environment because of their ignorance of network topological properties. In this paper, we proposed a novel dynamic path privacy protection scheme for continuous query service in road networks. Our scheme also conceals DPP (Dynamic Path Privacy) users' identities from adversaries; this is provided in initiator untraceability property of the scheme. We choose the different attack as our defending target because it is a particularly challenging attack that can be successfully launched without compromising any user or having access to any cryptographic keys. The security analysis shows that the model can effectively protect the user identity anonymous, location information and service content in LBSs. All simulation results confirm that our Dynamic Path Privacy scheme is not only more accurate than the related schemes, but also provide better locatable ratio where the highest it can be around 95 % of unknown nodes those can estimate their position. Furthermore, the scheme has good computation cost as well as communication and storage costs.Simulation results show that Dynamic Path Privacy has better performances compared to some related region based algorithms such as IAPIT scheme, half symmetric lens based localization algorithm (HSL) and sequential approximate maximum a posteriori (AMAP) estimator scheme.

62 citations


Additional excerpts

  • ...We conduct simulations using NS-3 Simulator [51]....

    [...]

Journal ArticleDOI
Imran Memon1
TL;DR: An Authentication key establishment protocol for IPv6-based Road networks is introduced and a new authentication method based on a cryptographic protocol including a zero-knowledge proof that each node must use to convince another node on the possession of certain secret without revealing anything about it is described, which allows encrypted communication during authentication.
Abstract: The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the road network environment by means of providing a variety of services including users' privacy and authentication. Authenticated key agreement protocol is a useful cryptographic primitive, which can be used to protect the confidentiality, integrity and authenticity for transmitted data over insecure networks. From the point of view of the management of pre-shared secrets, one of the advantages of three-party authenticated key agreement protocols is that they are more suitable for use in a network with large numbers of users compared with two-party authenticated key agreement protocols. Using smart cards is a practical, secure measure to protect the secret private keys of a user. In this paper, we introduce an Authentication key establishment protocol for IPv6-based Road networks. In this architecture, a mobile vehicle obtains a unique address from a neighbor mobile vehicle or a road side unit without duplicate address detection, and the leaving mobile vehicle's address space can be automatically reclaimed for reassignment. If the next mobile vehicle located is in transmission range, then the mobile vehicle forwards the packets; if not, then it carries the packets until meeting. The carry mostly occurs on sparsely populated road segments; with long carry distances having long end-to-end packet delays. On the other hand, we also describe a new authentication method based on a cryptographic protocol including a zero-knowledge proof that each node must use to convince another node on the possession of certain secret without revealing anything about it, which allows encrypted communication during authentication. The proposed protocol featured with the following characteristics: Firstly, it offers anonymous authentication: a message issuer can authenticate itself. Secondly, it provides confidential: the secrecy of the communication content can be protected. The address configuration scheme must lower the cost in order to enhance the scalability. Thirdly, it is efficient: it achieves low storage requirements, fast message verification and cost-effective identity tracking in case of a dispute. In this paper, we evaluate the performance of this protocol. The data results show that protocol effectively improves the address configuration performance and our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the road network environment as compared to other related schemes in the literature.

60 citations


Cites methods from "An XG-PON module for the NS-3 netwo..."

  • ...We use NS-3 [36] to evaluate the performance, and the simulation parameters are shown in Table 5....

    [...]

Journal ArticleDOI
TL;DR: This systematic literature review aims to analyze, basing its investigation on available literature, the adoption of a popular network simulator, namely ns-3, and its use in the scientific community, and how extensible it is in practice according to the experience of authors.
Abstract: Complexity of current computer networks, including e.g., local networks, large structured networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform analysis and support design. Simulation is a tool of paramount importance to encompass all the different aspects that contribute to design quality and network performance (including as well energy issues, security management overheads, dependability), due to the fact that such complexity produces several interactions at all network layers that is not easily modellable with analytic approaches. In this systematic literature review we aim to analyze, basing our investigation on available literature, the adoption of a popular network simulator, namely ns-3, and its use in the scientific community. More in detail, we are interested in understanding what are the impacted application domains in which authors prefer ns-3 to other similar tools and how extensible it is in practice according to the experience of authors. The results of our analysis, which has been conducted by especially focusing on 128 papers published between 2009 to 2019, reveals that 10% of the evaluated papers were discarded because they represented informal literature; most of the studies presented comparisons among different network simulators, beyond ns-3 and conceptual studies related to performance assessment and validation and routing protocols. Only about 30% of considered studies present extensions of ns-3 in terms of new modules and only about 10% present effective case studies demonstrating the effectiveness of employing network simulator in real application, except conceptual and modeling studies.

59 citations

Journal ArticleDOI
TL;DR: An optimized DBA known as optimized round-robin (optimized-RR) that support front-hauling over XG-PONs is proposed that shows significant improvement in upstream delay and utilization as well as lower packet loss and jitter forFront-haul uplink traffic transmitted via XG -PON in virtualized C-RAN architecture.
Abstract: Time division multiplexing passive optical network (TDM-PON) technologies are viewed as an attractive solution for flexible and cost-efficient mobile front-haul for cloud radio access network (C-RAN) architecture. However, it is a challenge for TDM-PONs to meet the strict latency requirement of mobile front-haul in C-RAN because they use a dynamic bandwidth allocation (DBA) mechanism to manage upstream traffic. The latency issue of TDM-PON based mobile front-haul has been extensively investigated in the literature with particular focus on IEEE TDM-PON (e.g., 10G-EPON). However, ITU TDM-PONs such as XG-PON and XGS-PON have not yet even been explored in the context of mobile front-haul. To cover this gap, we first evaluate the performance of two recently proposed XG-PON-standard-compliant DBAs, namely, group-assured GIANT (gGIANT) and round-robin DBA (RR-DBA), over simulated mobile front-haul traffic. We conclude based on our evaluation that neither RR-DBA nor gGIANT satisfies the delay required for mobile front-haul. Therefore, we propose an optimized DBA known as optimized round-robin (optimized-RR) that support front-hauling over XG-PONs. The performance evaluation of our optimized DBA against gGIANT and RR-DBA shows significant improvement in upstream delay and utilization as well as lower packet loss and jitter for front-haul uplink traffic transmitted via XG-PON in virtualized C-RAN architecture.

46 citations


Cites methods from "An XG-PON module for the NS-3 netwo..."

  • ...To evaluate the performance of our algorithm against gGIANT and RR-DBA, we conducted multiple simulation experiments in the network simulator NS-3 using the XG-PON module [26]....

    [...]

Journal ArticleDOI
TL;DR: A new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem is proposed and the cost analysis and performance evaluation indicate that the frame-work can reduced cost factor and achieve good performance.
Abstract: In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods.

40 citations

References
More filters
01 Sep 1981

3,411 citations

Proceedings ArticleDOI
14 Jun 2009
TL;DR: A performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS reveals large differences according to both run-time performance and memory usage.
Abstract: A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the standard network simulation tool, other network simulators have gained more and more attention during the last years. In this paper, we briefly survey new developments in the field of network simulation and conduct a performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS. Our results reveal large differences according to both run-time performance and memory usage.

468 citations


"An XG-PON module for the NS-3 netwo..." refers background in this paper

  • ...has also been reported that NS-3 performs much better than other simulators in terms of simulation speed and memory overhead [23]....

    [...]

Proceedings ArticleDOI
21 Mar 2011
TL;DR: A novel module developed for the simulation of the LTE technology with the ns-3 simulator focuses mainly on modeling the E-UTRA part of the system, with a particular attention on the aspects related to the channel, PHY and MAC layers.
Abstract: In this paper, we present a novel module developed for the simulation of the LTE technology with the ns-3 simulator. It focuses mainly on modeling the E-UTRA part of the system, with a particular attention on the aspects related to the channel, PHY and MAC layers. First we discuss the overall modeling assumptions according to which the module was designed. Subsequently, we describe in detail the architecture of the module and its components. Finally, we discuss an example simulation scenario.

192 citations


"An XG-PON module for the NS-3 netwo..." refers background in this paper

  • ...last few years, many new modules have been developed and added into NS-3, such as WiMAX module from Inria [11] and LTE module from CTTC [19]....

    [...]

Journal ArticleDOI
TL;DR: A multi-thread polling algorithm to effectively and fairly distribute the upstream bandwidth dynamically and to decrease the average packet delay and improve network throughput under varying offered loads is proposed and studied.
Abstract: With the advances in optical technology, the span of a broadband access network using passive optical network (PON) technology can be increased from today's standard of 20 km to 100 km or higher, and thereby serve a lot more users. Such an extended-reach PON is known as SuperPON in the literature, and we call it a long-reach PON (LR-PON). A major challenge in LR-PON is that the propagation delay (for data as well as control signals) between the telecom central office (CO) and the end user is increased by a very significant amount. Now, traditional PON algorithms for scheduling the upstream transmission, such as dynamic bandwidth allocation (DBA) algorithms, may not be sufficient; actually, they may lead to degraded performance because of the long delay of the CO-to- Users "control loop." This challenge motivates us to propose and study a multi-thread polling algorithm to effectively and fairly distribute the upstream bandwidth dynamically. This algorithm exploits the benefits of having multiple polling processes running simultaneously and enabling users to send bandwidth requests before receiving acknowledgement from the CO. We compare the proposed algorithm with traditional DBA, and show its advantage on average packet delay. We then analyze and optimize key parameters of the algorithm, such as initiating and tuning multiple threads, inter-thread scheduling, and fairness among users. Numerical results demonstrate the algorithm's advantage to decrease the average packet delay and improve network throughput under varying offered loads.

153 citations


"An XG-PON module for the NS-3 netwo..." refers background in this paper

  • ...Indeed, it has been a very hot topic to study DBA algorithms for EPON and GPON [12][15][22]....

    [...]

  • ...For instance, it is valuable to study the impacts on the performance of XG-PON, when the propagation delay is much longer than that of the current PON networks [22]....

    [...]

  • ...In [22], the authors developed their own simulator to study dynamic bandwidth assignment (DBA) algorithms when the physical reach is much longer than the current PON networks....

    [...]

Proceedings ArticleDOI
02 Mar 2009
TL;DR: This paper proposes and discusses in detail the design and implementation of an IEEE 802.16 WiMAX module for ns-3, with the Point-to-Multipoint (PMP) mode and the WirelessMAN-OFDM PHY layer, to provide a standard-compliant and well-designed implementation of the standard.
Abstract: ns-3 is a recently released next generation simulator intended as a replacement of the popular ns-2. It enables a highly rich set of features and is expected to become the first choice of the scientific community soon. ns-3 is in its evolution phase and work at different fronts is still ongoing. With the recent emergence of broadband wireless networks, simulation support for such networks, especially IEEE 802.16 WiMAX, is becoming a necessity. In this paper, we propose and discuss in detail the design and implementation of an IEEE 802.16 WiMAX module for ns-3, with the Point-to-Multipoint (PMP) mode and the WirelessMAN-OFDM PHY layer. Our module implements fundamental functions of the convergence sublayer (CS) and the MAC common-part sublayer (CPS), including QoS scheduling services, bandwidth request/grant mechanism, and a simple uplink scheduler. The aim is to provide a standard-compliant and well-designed implementation of the standard.

137 citations


"An XG-PON module for the NS-3 netwo..." refers background in this paper

  • ...last few years, many new modules have been developed and added into NS-3, such as WiMAX module from Inria [11] and LTE module from CTTC [19]....

    [...]