Wireless System Specification And Design Computer Science Essay

Categories: Network

As reference in the old chapter, radio detector webs face many menaces against routing protocols which can impact their behavior and the intent of planing them. I have decided to make my probe on the effectivity of Black hole onslaught on WSN and how this onslaught could do a serious harm on the web topology and the routing protocols. There ground of taking this onslaught is because many people has done some researches on Black Hole onslaught and we want to utilize some of their consequences to make our probe on.

In this chapter, I am traveling to place the specification of this undertaking and the designs of the simulation I have used to imitate, trial, and analyses the consequences.

This subdivision will depict the specification of the undertaking and what the simulation must make to let us to finish the probe. So, we need to imitate our undertaking utilizing such a plan to let us to acquire some end product consequences that can be used to make the probe on.

Get quality help now
Prof. Finch
Prof. Finch
checked Verified writer

Proficient in: Network

star star star star 4.7 (346)

“ This writer never make an mistake for me always deliver long before due date. Am telling you man this writer is absolutely the best. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

We want to make a simulation that is able to make several things which can be described in the undermentioned points:

In this subdivision, we will depict the design of this undertaking and what we are traveling to make to run into the consequences of making this probe on. I am traveling to utilize Network Simulator ( NS2 ) to imitate different scenarios with and without the onslaught. NS-2 can be downloaded for free from many web sites [ 31 ] . It runs on Windows and UNIX systems, but it requires Cygwin to be installed on Windows to run NS-2 [ 7 ] .

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

Tool Command Language ( TCL ) is used to make the topology and simulates the web. NS-2 is a really utile plan that is used to imitate wired and wireless webs. It comes in different versions that are described as ns-2.xx. The version figure from NS-2 that we have used is ns-2.33 ( allinone-ns.2.33 ) .

We are traveling to hold three different scenarios to make our probe on and to let us to compare the end product consequence of each scenario. The figure of nodes in each web topology is between 10 to 23 nodes which are distributed along 800*800. The ground to hold 10 to 23 nodes in the web is to cut down the sum of the traffics and the informations that are generated between nodes, therefore to let us to hold few informations to make the probe and comparing. There are two types of web traffics which are TCP and UDP traffics is traveling to be used in these scenarios to compare the effectual of the onslaught on each type. The purpose of utilizing these different types of traffics is because they are quit differs in their functionality and the TCP is a connexion oriented that must have an recognition from the receiving system depends on WC that it set to before continue directing the staying packages. Whereas, UDP is a connectionless that does non necessitate recognitions from the receiving system.

In this undertaking, we need to utilize one of the routing protocols to make the probe on and to see the affect of the onslaught on that routing protocol, hence, we have used AODV routing protocol. AODV is one of the routing protocols that are used by Wireless Sensor Networks ( WSN ) . This protocol has been described briefly in the old chapter is reactive routing protocol. Many researches have been carried out on this type of routing protocol which allows us to acquire some utile informations from.

In add-on to that, we have followed the instructions of implementing a new routing protocol in NS-2 that are done by others research workers to let the adversary node to act as Black hole node. This new protocol needs some alterations in the existent C++ codification for AODV protocol and some executions as good. After that, we have to add this protocol to ns2 and recompile it to let alterations to be effected.

Finally, to make the probe, we need to hold an onslaught on the web to let us to roll up the informations, analysis it, and so compare it with the informations from the web that has no onslaught on. We have decided to imitate Black Hole Attack on the web which allows the antagonist to tract all nodes to direct their packages through it and so merely drop them and guarantee that those packages are no more propagated in the web.

Network Simulator ( NS2 ) :

Network Simulator ( NS ) has been developed at the University of California Berkley which is a distinct simulator plan. It has been written in C++ and OTcl ( Object-oriented Tool Command Language ) . Since 1995, NS becomes a portion of the Virtual InterNetwork Testbed ( VINT ) undertaking which is supported by DARPA that develops tools for simulation consequences and analysis them and converts web topologies to NS formats. It has the ability to implement different objects of the web such as User Datagram Protocol ( UDP ) and Transmission Control Protocol ( TCP ) , wired and wireless applications, traffic beginning behavior like Telnet, Web, File Transfer Protocol ( FTP ) , Changeless Bit Rate ( CBR ) and more [ 22, 23 ] . The basic construction of NS-2 is:

Degree centigrades: UsersuserDesktop he projects 2 view.jpg

Figure 12: NS-2 Position

At the top bed of the simulation, OTcl is a book translator used to construe user simulation books by NS and it works with C++ codifications where it is to the full compatible to this scheduling linguistic communication [ 22, 23 ] .

We have used ns-2.33 for several grounds such as it allows us to make the nodes in fixed place and gives some other nodes such motions.

OTCL book:

OTCL is an extension of the TCL scripting linguistic communication and used by NS to make objects, initiate events scheduler, tell the traffic beginnings the starting and stoping clip to convey packages, and to put up the web topology by utilizing objects in the library [ 7 ] . All objects are used in NS are OTCL objects whether they are written in C++ or OTCL. The user can compose its ain OTCL book to do a new web object or can utilize the object library to do a compound object.

Network Animator ( NAM ) :

Network Animator which is known as NAM is a sample tool for inspiring package hint informations ( i.e. a graphical user interface ) . It is a TCL/TK based life tool which is used to demo the existent universe web and package simulation hints in an easy manner. It supports package degree life, topology layout, and other informations review tools [ 7,30 website ] .

Output File Format:

When we created the simulation, we have used a TCL book to drive everything occurs in the web simulation to a file format which is called & A ; acirc ; ˆ?Trace File & A ; acirc ; ˆA? . We can happen in this file all information such as node energy, transmittal node, response node, conveying packages, having packages, and some other informations. All these informations are used to analysis and supervise the public presentation of the web.

Network Environment:

To make the probe, we have three different scenarios for the web topology. The intent of that is to acquire different end product consequences from each scenario and so make comparings between them to happen how an onslaught could impact on the web. In each web, we have 22 or 23 detector nodes communicate with each other utilizing wireless channels and AODV routing protocol. We have used TCP and UDP packages in each one to see how affectional is the onslaught on each type and which 1 has the serious impact.

2.2.1. First Scenario:

In the first scenario, we have simulated a radio detector web without any onslaught to calculate out the end product of this web and compare it with other end products of the other webs. We have 22 detector nodes and each detector node in the web is working all right and there are traffics between nodes in the radio web where the transmittal and response are operated in good manner. The radio detector web and the informations flow between nodes behave usually.

2.2.2. Second Scenario:

We have 23 detector nodes where 22 nodes are normal detector nodes and one node is the adversary node. These nodes are distributed among the web topology in fixed places and the antagonist is located a spot far off from those nodes. In this scenario, we have divided into two sub-scenarios. In the first portion, we have a normal web and we have generated CBR traffics conveying from node 1, 5, and 7 which are received by the sink node 0 and node 10 send its packages to node 11 and eventually node 20 to node 21. These transmittals are started at 5 m/s and terminal after 25 m/s during the simulation.

In the 2nd portion, we have generated new CBR traffics between the same nodes get downing at 35 m/s until the last transmittal from node 20 at 45 m/s. In here, we set motion to the antagonist at 25 m/s with the velocity of 500 m/s to hold a new location in the Centre of the web. The ground of turn uping the antagonist in the Centre is to hold the most affect on many nodes in the web. The adversary attracts all nodes want to convey their packages to direct them through it even if the antagonist does non hold a path to the finish node. Then, the antagonist merely drops all received packages without send oning them to the targeted node.

2.2.3. Third Scenario:

In the concluding scenario, we have besides the same figure of nodes used in the 2nd scenario. CBR traffics are besides generated between the same nodes which are get downing at 5 m/s until 25 m/s clip. The difference between scenario 2 and 3 is the adversary motion. In this one, we have moved the antagonist to the Centre of the web earlier than the 2nd scenario. The antagonist has started to travel to its new location at 2 m/s with the same velocity of 500 m/s. The purpose of puting the antagonist earlier this clip is give it the whole control over all packages conveying during the simulation clip. The web so will be affected severely this clip more than the other old scenarios because the antagonist will be in Centre of the web between detector nodes and when they want to direct their packages, the will direct them through the antagonist. Therefore, the antagonist will guarantee that those packages are non propagated any farther in the web by dropping them all.

Consequences:

In this subdivision, we are traveling to demo the end product consequences of each scenario we have simulated. The analyses of these consequences will be described in chapter 5.

First Scenario Consequences:

In this scenario, we have simulated a normal Wireless Sensor Network which consists of 21 detector nodes distributed over 800*800 web topology. We have two types of web traffics have been used between the nodes during 60 m/s clip. The consequences will be discussed in more inside informations in the chapter 5.

TCP Traffics:

In here, we have generated TCP traffics between some detector nodes in the web. The transmission nodes are node 1, 5, 7, 10, and 20. The sink nodes are node 0, 11, and 21. The figure of directing and having packages is demoing the undermentioned tabular array:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

54

0

54

5

62

0

62

7

30

0

30

10

50

11

50

20

58

21

58

UDP Traffics:

We have here the consequence of conveying CBR traffics by the same nodes we have used with TCP traffics. The following tabular array shows the figure of conveying and having packages:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

42

0

No ack

5

40

0

No ack

7

40

0

No ack

10

42

11

No ack

20

42

21

No ack

Second Scenario Consequences:

We have divided this scenario in two parts. The first portion will take the first 25 m/s from the simulation clip and without an onslaught on the web. The 2nd portion will hold the Black Hole onslaught on the web merely after the first portion finished until the simulation is stopped and we will see the consequences of both TCP and UDP traffics.

TCP Traffics:

TCP Traffics without an Attack:

We have generated the same TCP traffics we have done in the first scenario utilizing the same nodes. The coming tabular array shows the end product of this portion that has no onslaught:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

54

0

54

5

62

0

62

7

30

0

30

10

50

11

50

20

58

21

58

TCP Traffics with an Attack:

This tabular array will demo the affective of the onslaught on this type of traffics in the 2nd portion of the simulation:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

2

0

0

5

2

0

0

7

2

0

2

10

58

11

58

20

62

21

62

UDP Traffics without an Attack:

This tabular array shows the consequence of CBR traffic of the first portion of the simulation before assailing the web:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

42

0

No ack

5

40

0

No ack

7

40

0

No ack

10

42

11

No ack

20

42

21

No ack

UDP Traffics with an onslaught:

This is the consequence of the 2nd parts of the web after lunching the onslaught:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

10

0

No ack

5

16

0

No ack

7

10

0

No ack

10

0

11

No ack

20

40

21

No ack

Third Scenario Results:

In the 3rd scenario, we have lunched the Black Hole onslaught after 5m/s from get downing the simulation and before any node starts to direct any TCP or UDP packages.

TCP Traffics:

We can see in the undermentioned tabular array the consequence of TCP traffic when the web has been attack by the Black Hole onslaught during the whole simulation:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

58

0

58

5

4

0

4

7

0

0

0

10

0

11

0

20

58

21

58

UDP Traffics:

The affective of Black Hole onslaught on CBR can be seen on the undermentioned tabular array during the clip of simulation:

Sending Node

Number of Sending Packages

Receiving Node

Number of Receiving Packages

1

42

0

No ack

5

0

0

No ack

7

0

0

No ack

10

0

11

No ack

20

42

21

No ack

Decision:

To sum up with, we have presented in this chapter the specification of this undertaking and what we need to make our probe on including the type of routing protocol used by normal nodes and the demand for making a new routing protocol which is used by the adversary node. Then, we have described the design of the undertaking and all tools that have been used to imitate it. Last, we have shown the consequences of TCP and UDP traffics on different scenarios and will be described in more inside informations in chapter 5. In the coming chapter, we will depict the execution of all used protocols and how we managed to imitate the onslaught on the web.

Updated: Nov 01, 2022
Cite this page

Wireless System Specification And Design Computer Science Essay. (2020, Jun 02). Retrieved from https://studymoose.com/wireless-system-specification-and-design-computer-science-new-essay

Wireless System Specification And Design Computer Science Essay essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment