搜索资源列表
AODVp
- AODV算法的ns2模拟,很好地解释了这个经典算法的实现-AODV algorithm ns2 simulation, a good explanation of this classic algorithm to achieve
dsr.tcl
- Dynamic Source Routing - is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at
Simulation_and_Analysis_of_Ad-hoc_On-demand_Dista
- simulation and performance analysis of aodv base paper
SUMOROUTER
- 利用TIGER 数据库,构建一个实际道路地图作为仿真场景,借助SUMO 交通仿真器和NS2 网络仿真平台,评估ADOV、DSR、 DSDR 3 种路由协议在城市场景车载自组网(VANET)中的适用性-This paper refers TIGER database, builds a realistic road map as simulation scene. It evaluates the applicability of three routing protocols inclu
Tcl-script-to-create-dynamic-wirless-nodes-with-A
- Tcl scr ipt to create dynamic wirless nodes,set initial postion,and set color of node with AODV. Descr iption: In this program used to generate the nodes only there is no any other connection between the nodes. After creating the nam file and
Tcl-script-to-create-fixed-wirless-nodes-with-AOD
- Descr iption: This network consists of 3 nodes. In this program we generate nodes only there is no any other connection between the nodes. After creating than am file and trace file, we set up topography object. Set node_ ($i) [$ns node] is use
nist_aodv2
- AODV路由算法的OPNET环境仿真实现-The AODV The OPNET simulation to achieve
aodvcope.tar
- 运用NS2仿真,将COPE与AODV相结合实现-Using NS2 simulation, combining the COPE and AODV
aodv1
- aodv的一种代码的脚本,在仿真aodv时若不会用系统自带的工具进行场景,数据流的生成,可以用这个现成的-the aodv a code scr ipt, simulation aodv not use the system comes with tools for scene data stream generated, you can use this ready-made
ns2
- This a NS2 project simulation with AODV added to AWK scr ipts protocol in order to do the performance study of the system-This is a NS2 project simulation with AODV added to AWK scr ipts protocol in order to do the performance study of the system
ns_aodv.tar
- ns网络仿真分析,对aodv无线网络分析。-ns network simulation, analysis aodv wireless network.
ADHOCnetworkblackhole
- ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。 www.1-fun.com 推荐-Simul
aodv_25
- tcl scr ipt for 25 nodes simulation in AODV protocol
NS_Fundamentals_1-6.pdf.tar
- simulation of Aodv under different traffic condition
DEBT
- 改进路由协议AODV,使之在NS2仿真的稀疏Ad-hoc网路(DTN)中具有更高的数据包投递率,更低的时间延迟。-Improved routing protocols AODV, NS2 simulation Sparse Ad-hoc Network (DTN) has a higher packet delivery ratio, lower latency.
New-folder-(2)
- 2 Introduction This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language. Here is
2ap36nos.tcl
- simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 1-simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 100
wireless
- A 3 node wireless simulation TCL scr ipt that uses AODV. The scr ipt also plots congestion windows for TCP packets.
NS2_AODV_detail
- 我自己加上别人的经验总结的使用NS2仿真AODV研究算法优势劣势的详细过程,以及测试新无线Trace格式的awk文件-My own experience of others summed together using NS2 simulation AODV algorithm in detail the advantages and disadvantages of the process, as well as testing new wireless Trace awk file forma
Node-Initialization
- Three wireless nodes are created and they are configured with specific parameters of a mobile wireless node. After creating the nam file and trace file, we set up topography object. set node_ ($i) [$ns node] is used to create the nodes. Location of t