搜索资源列表
nist_aodv2
- AODV路由算法的OPNET环境仿真实现-The AODV The OPNET simulation to achieve
aodvcope.tar
- 运用NS2仿真,将COPE与AODV相结合实现-Using NS2 simulation, combining the COPE and AODV
aodv1
- aodv的一种代码的脚本,在仿真aodv时若不会用系统自带的工具进行场景,数据流的生成,可以用这个现成的-the aodv a code scr ipt, simulation aodv not use the system comes with tools for scene data stream generated, you can use this ready-made
ns2
- This a NS2 project simulation with AODV added to AWK scr ipts protocol in order to do the performance study of the system-This is a NS2 project simulation with AODV added to AWK scr ipts protocol in order to do the performance study of the system
ns_aodv.tar
- ns网络仿真分析,对aodv无线网络分析。-ns network simulation, analysis aodv wireless network.
ADHOCnetworkblackhole
- ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。 www.1-fun.com 推荐-Simul
aodv_25
- tcl scr ipt for 25 nodes simulation in AODV protocol
NS_Fundamentals_1-6.pdf.tar
- simulation of Aodv under different traffic condition
DEBT
- 改进路由协议AODV,使之在NS2仿真的稀疏Ad-hoc网路(DTN)中具有更高的数据包投递率,更低的时间延迟。-Improved routing protocols AODV, NS2 simulation Sparse Ad-hoc Network (DTN) has a higher packet delivery ratio, lower latency.
New-folder-(2)
- 2 Introduction This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language. Here is
2ap36nos.tcl
- simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 1-simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 100
wireless
- A 3 node wireless simulation TCL scr ipt that uses AODV. The scr ipt also plots congestion windows for TCP packets.
NS2_AODV_detail
- 我自己加上别人的经验总结的使用NS2仿真AODV研究算法优势劣势的详细过程,以及测试新无线Trace格式的awk文件-My own experience of others summed together using NS2 simulation AODV algorithm in detail the advantages and disadvantages of the process, as well as testing new wireless Trace awk file forma
Node-Initialization
- Three wireless nodes are created and they are configured with specific parameters of a mobile wireless node. After creating the nam file and trace file, we set up topography object. set node_ ($i) [$ns node] is used to create the nodes. Location of t
awk
- aodv在ns2下的仿真代码,很好的学习材料-aodv in ns2 simulation code
Simulation_AODV-in_castalia.tar
- Some result of simulation AODV in castalia
aodvattacker
- AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently im
aodv1
- simulation aodv par ns2
rajesh-project400.project
- simulation of aodv routing protocol using opnet simulator14.5
2ap36nos.tcl
- simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 1-simulation of wireless sensor network using aodv protocol, 36 sensor nodes, 2 access point and scenario of 100 x 100