Pantech eLearning

pantechlogo
Search
Close this search box.

Top 10 NS2 Projects

What is Network Simulator

Network Simulator (NS) is a discrete event-driven network simulation tool for studying the dynamic nature of communication networks with Top 10 NS2 Projects we see how it provides substantial support for simulation of different protocols over wired and wireless networks.

 

Top 10 NS2 Projects

  1. Black Hole Attack in Mobile ADHOC Networks
  2. Intrusion Detection in Wireless Sensor Networks
  3. Wireless Sensor Network LEACH Protocol
  4. Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network
  5. Privacy preserving Data Aggregation in WSN
  6. Delay Analysis in Mobile ADHOC Networks
  7. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
  8. An Efficient and Robust Addressing Protocol for Node Auto-configuration in Ad Hoc Networks
  9. A Highly Effective and Efficient Route Discovery & maintenance in DSR
  10. Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network

     

    1. Black Hole Attack in Mobile ADHOC Networks

    The black hole problem is one of the security attacks that occur in mobile ad hoc networks. It is to exploit the sequence number included in any packet header. Computer simulation shows ad hoc distance vector routing scheme verify of the route to the destination depending at a minimum cost of delay in the networks. It simulated the mobile ad hoc network scenarios which include black hole node using NS Network Simulator program. This implemented a new protocol that drops data packets after receiving and tested the black hole implementation, to demonstrate its effects.

     

    1. Intrusion Detection in Wireless Sensor Networks

    Intrusion Detection provides a solution by analyzing the network in order to detect abnormal behavior of the sensor nodes. Wireless Sensor Networks are vulnerable to various security threats that can degrade the network’s performance and may cause the sensors to send wrong information to the sink. It is attributed to new applications designed with large-scale networks consisting of devices capable of performing computations on the sensed data and processing the data for transmitting to remote locations. These reasons impose security mechanisms to be employed on the highly vulnerable sensor networks that are robust enough to handle attacks from adversaries.

     

    1. Wireless Sensor Network LEACH Protocol

    The protocol adds feature for LEACH to reduce the consumption of the network resource in each round. It is simulated and the results show a significant reduction in network energy consumption compared to LEACH. The sensor nodes are an effective technique for achieving these goals. It adds feature to LEACH to reduce the consumption of the network resource in each round. The protocol is simulated and the results show a significant reduction in network energy consumption compared to LEACH. An energy-efficient LEACH algorithm for wireless sensor networks which takes the energy and position factors of each node into account to optimize the cluster head election and data transmission mode.

     

    1. Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network

    Wireless Sensor Networks (WSN) an unbalanced load allocation results in congestion. It is to combine the ideas of clustering and then traffic distributed in network. In clustering, each node takes part in cluster head formation. This helps in enhancing the energy consumption. WSN include thousands of resource-constrained sensors to monitor the surroundings, collect data and transfer it to remote servers for further processing. It is considered highly flexible networks, which has been a fundamental challenge in these types of networks and given the deployment size and the associated quality concerns such as resource management, scalability, and reliability.

     

    1. Privacy preserving Data Aggregation in WSN

    Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. It is to bridge the gap between collaborative data collection by wireless sensor networks and data privacy. The simulation results of schemes to a typical data aggregation scheme where no data privacy protection is provided. It is developed to provide privacy preservation in a much simpler way with the help of a secure key management scheme and randomized data perturbation technique. The simulation results compare the performance to a typical data aggregation scheme where no data privacy protection is provided.

     

    1. Delay Analysis in Mobile ADHOC Networks

    It provides insights on comparing performances between single and multi-radio environment with some interesting findings like periodic nature for intra-node delay with oscillating frequency distribution. It presents an experimental methodology to obtain an estimate of average intra-node delay and inter-node delay for packets of variable payload size in both single radio and multi-radio environment without the constraint of clock synchronization between the nodes. This provides insights on comparing performances between single and multi-radio environment for intra-node delay with oscillating frequency distribution.

     

    1. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

    A clustering method that uses hybrid CS for sensor networks. The sensor nodes are organized into clusters. The analytical model between the size of clusters and number of transmissions in the hybrid CS method, aiming at finding the optimal size of clusters that can lead to minimum number of transmissions. Compressive sensing (CS) can reduce the number of data transmissions and balance the traffic load throughout networks. The relationship between the size of clusters and number of transmissions in the hybrid CS method aiming at finding the optimal size of clusters that can lead to minimum number of transmissions.

     

    1. An Efficient and Robust Addressing Protocol for Node Auto-configuration in Ad Hoc Networks

    An Efficient and Robust addressing protocol for node auto configuration in Ad hoc network deals about the efficient management of every node. It analyzes a lightweight protocol that configures mobile ad hoc nodes based on a distributed database stored in filters that reduces the control load and makes the robust to losses and network partitions. It evaluates the performance of protocol, considering joining nodes and network initialization. The simulation results show that protocol resolves all the address collisions and reduces the control traffic when compared to previously protocols.

     

    1. A Highly Effective and Efficient Route Discovery & maintenance in DSR

    It is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. This network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. A protocol which eliminates the problem which occur in the DSR protocol like inconsistency occur due to routing information in the route cache of stale node. It reduces the delay time in the network as compared to DSR by utilizing effective path and maintenance procedure.

     

    1. Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network

    In order to maximize through out of network performance of routing strategies based on nodes. Experimental results show that algorithms work well even when the traffic of the network is very heavy. A global dynamic routing strategy for network systems based on the information of the queue length of nodes. Under this routing strategy, the traffic capacity is further improved. With time delay of updating the corresponding paths, the system capacity remains constant, while the travel time for packets increases.

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.