Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (8)
Energy Model for Wireless Sensor Network
no vote
This Code is written in TCL Script language, It is based on energy model, we can analysis the performance of each node with respect to energy and calculate the residual energy at each node by simulating this code with NS2 and analysis .tr file
siddu761143
2016-08-23
0
1
Flooding Routing Protocol for Wireless Sensor Netw
no vote
This Code is written in TCL Script language, It is based on energy model, we can analysis the performance of each node with respect to energy and calculate the residual energy at each node by simulating this code with NS2 and analysis .tr file, this code works for wsn wfrp protocol only.
siddu761143
2016-08-23
0
1
AWK Scripts
4.0
it consist of Awk script, which are usually used to calculate the performance metrics such as packet loss, throughput, delay,packet delivery ratio, normalized ratio packet received and sent 
siddu761143
2016-08-23
2
1
Fixed AODV routing protocol
4.0
Application background A secure version of AODV called Secure AODV (SAODV). It provides features such as integrity, authentication, and non-repudiation of routing data. It incorporates two schemes for securing AODV. To preserve the collaboration mechanism of AODV, SAODV includes a kind of delegation feature that allows intermediate nodes to reply to RREQ messages. This is called the double signature : when a node A generates a RREQ message, in addition to the regular signature, it can include a second signature, which is computed on a fictitious RREP message towards A itself. Intermediate nodes can store this second signature in their routing table, along with other routing information related to node A. If one of these nodes then receives a RREQ towards node A, it can reply on behalf of A with a RREP message, similarly to what happens with regular AODV. To do so, t
siddu761143
2016-08-23
0
1
Realization of watchdog
no vote
Application background Implementation of watchdog helps to identify the nodes which are misbehaving in the wireless network using NS2.34   Key Technology The above implementation of watchdog is done on AODV routing protocol, Which helps to send the data packets in secured manner.
siddu761143
2016-08-23
1
1
Malicious nodes in NS2 encoding
4.0
Application background malicious node creation in mobile ad hoc network Key Technology TCl Script coding, Network Simulator tool Ns2, maobie adhoc network
siddu761143
2016-08-23
2
1
Mobile grid network simulation
no vote
Application background Simulation of AODV and AOMDV routing protocols in Grid Network Key Technology Routing Protocols(AODV and AOMDV), Network Simulator 2, Mobile Grid Network, TCL/TK Script coding, Netwoork Animator(NAM), Through the help of above code we can analysis performance metrics such as Average Jitter, Average End-to-End Delay, and Throughput.
siddu761143
2016-08-23
0
1
NS2 all awk script files
no vote
Application background AWK Scripts are very good in processing the data from the log (trace files) which we get from NS2. If you want to process the trace file manually and get the results easily. Key Technology For example for NS2 simulation, first of all one has to write a TCL script which is run via terminal. Output of TCL is a trace file which is further processed through AWK script to get the network performance  such as throughput,Jitter, average end-to-end delay, packet delivery ratio, total packet received,
siddu761143
2016-08-23
8
1
No more~