Sort by
  1. Language:Tcl/Tk
  2. Category:Linux programming
  3. Time:ALL
  4. View:500—1000 times
Remove all
Language More Hide
Category More Hide


olsr routing protocol  behavior for Ad hoc networks with multiple traffic types that implemented in ns2 network simulator....

802 ns2 tcl file

size:14px;">,发件人等待随机期的时间,并尝试再次无条件传输 (即与概率 = 1)。1 持续 CSMA 使用 CSMA/CD 系统包括以太网. 非持久性 非持久性 CSMA 是一种非侵略性的传输算法。准备好发送数据 (站) 发件人时,...

3 code for routing aodv & DSDV &DSR

output target-output" style="margin: 0px 0px 5px; padding: 0px; line-height: 22px; font-size: 14px; color: rgb(51, 51, 51); font-family: arial;">这3的代码写的敌人模拟3协议的网络包括:AODV,DSR路由协议这个代码写在形式语言TCL和完整的运行。NS 2写这个代...

AODV PROTOCOL implementation and awk file to extract data fron .tr

This project creates whole implementation of AODV in NS2 version 2.35 .however it can be written and simulated in ubuntu installed ns2 . So as ns creates new format of .tr trace file we need awk screept to extract data from this file to plot xgraphs. .awk file will extract throughput , end to end de...

Tcl Code of Routing protocols

you can use this codes to evaluate the performances of routing protocols in ad hoc networks. with different code of metrics (CRN, PDR , Débit ...) Best Regards...

OLSR tcl file

OLSR Optimized Link State Routing protocol is a proactive protocol. It is a advanced version of Link State Routing. the key concept MPR (Multi Point Relay) is used in OLSR. In OLSR, only nodes, selected as MPRs, are responsible for forwarding control traffic. This reduces the no of tr...

Selfish node detection using DSR

Selfish node detection using  DSR protocol in  mobile adhoc wireless we creat 4 selfish nodes and totals nodes are 20. this topology is 500*500 and uses random way point mobility model....

Reducing energy consumption by clustering and mobility of sinks

I have created a clusters (collection of nodes)... For energy efficiency i implement mobility for sinks... To avoid congestion clusters and rendezvous node was introduced... The cluster head is the node one among the cluster.. The cluster head collect data from all the nodes in its cluster which avo...

Psedo ID changing in wireless sensor networks

This program is used to change vehicle id during small social spots. the code has 37 wireless sensor nodes and use DES Encryption algorithm to change vehicle id's....

wireless sensor network



Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D