Sort by
  1. Language:Tcl/Tk
  2. Category:All
  3. Time:ALL
  4. View:100—300 times
Remove all
Language More Hide
Category More Hide


1.install ns-allinone-2.31 orginal software in your linux pc. 2.then remove or rename the aodv protocol from ns-allinone-2.31/ns-2.31. 3.then paste this files aodv,tclfiles,input.tcl inside ns-allinone-2.31/ns-2.31. goto terminal and type cd ns-allinone-2.31 and then cd ns-2.31 and type mak...

Mixed security

Application background we bring novelties to secure military MANET communication for three main points: Cryptographic methods used in MANETs, hybrid key management protocols and structural organization of the military MANETs. As a new approach, we use Hybrid Crypto Secure Signcryption Scheme &n...


Very effective in improving TCP throughput of satellite communications network solutions: satellite agency. This information is in the satellite agent in NS2 simulation and modeling, very indicative....

Z mac is the medium access control which is the combination of both TDMA and CDM...

Z mac is the medium access control which is the combination of both TDMA and CDMA...

geographic greedy forwarding

There are several types of ad hoc routing protocols, such as proactive, reactive, geographic stateless routing, and so on. I believe geographic stateless routing is the simplest routing protocol to be implemented in ns2. Why it is the simplest? It is because the property of stateless indicates that...

Mobile nodes that has some packet losses

The 8 mobile nodes were created.. When it comes into transmission range it starts transmits the packets.. Due to mobility the nodes move away from transmission range. So there is some packet losses occur.....

Performance analysis of UDP

Initially create a scenario with number of nodes required and specify their positions and also their links.Set up a UDP connection by attaching a UDP agent and a CBR traffic over UDP connection. To evaluate the performance of UDP , run the perl script . in the perl script specify the infile to node...


HELLO THIS IS NOT WORKING CODE OF LEACH.DONT DOWNLOAD ITRedistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # 1. Redistributions of source code must retain the above copyright # notice, this list of condit...

aodv source code

It is  a 3-node example for ad-hoc simulation with AODV . Besides the source code ,it contents some important annotation to helps you to better understand the meaning of the code...

prev 1 2 3 4 5 6 7 8 9 10 ... 13 next


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D