نتایج جستجو برای: opnet

تعداد نتایج: 1006  

2010
Rajan Vohra Manju Sharma

Wireless local area networks (WLANs) provide mobility and convenience to users, Communications may be cut off when mobile stations travel between cells. Wireless data connections have high bit error rates, low bandwidth and long delays. Therefore, it is very important to improve their loss performance. In this paper, our main contribution is to analyze and evaluate the throughput performance of...

2007
P. Pablo Garrido Manuel P. Malumbres Carlos T. Calafate

In this work we present the results of a comparative study between two well-known network simulators: ns-2 and OPNET Modeler. In particular, we focus on a performance evaluation of the IEEE 802.11e technology on Mobile Ad-hoc NETworks (MANETs) in both stationary and mobile scenarios. The paper describes the tested scenarios in detail, and discusses simulation results obtained with OPNET Modeler...

2004
N. Van den Wijngaert C. Blondia

This paper proposes both an urban mobility model for OPNET and a low latency handover mechanism for Mobile IPv4. The mobility model uses street data to navigate the nodes in a city: (1) semi-randomly according to street precedence level and a configurable bias towards direction, and (2) different modes of waypoint navigation. When roaming across WiFi access points, the mobile nodes need to cond...

2013
Jatin Gupta

A MANET network is assembly of sensor nodes, where each node acts as router. MANETs are not based on centralized structure; therefore each node is responsible for routing the data packets from source to destination. This is done by implementing a routing protocol. Routing plays very influential role in MANETs. In this paper work an attempt has been made to compare the OLSR with GRP routing prot...

2011
S CHANDRASEKHAR

This paper presents a complete network analyzer development for network delay in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. The network delay will measure based on transmission delay and propagation delay. This network analyzer software will test on delay generated by the ...

Journal: :Indian journal of science and technology 2023

Objectives: To propose an IoT-based design in edge computing environment for short ranges and long of real-time data streaming to the client. Methods: Multimedia is used this work. Here we have Opnet creating a physical architecture analyze quality-of-service parameters like delay, throughput, jitter different Ad-hoc routing protocols on-Demand Distance vector routing, Dynamic source Optimized ...

2008
WADHAH AL-MANDHARI KOICHI GYODA NOBUO NAKAJIMA Nobuo Nakajima

The routing protocols play an important role in the performance of the Ad-hoc mobile networks. The Ad-hoc On-Demand Distance Vector Routing Protocol (AODV) is a reactive routing protocol for mobile networks. The route discovery process in AODV is initiated only prior to link establishment for data communication. This research focuses on the effect of the Route states hold time parameter on the ...

2010
MOHAMAD HAIDAR

In this paper, a channel-assignment algorithm at the Access Points (APs) of a Wireless Local Area Network (WLAN) is proposed in order to maximize Signal-to-Interference Ratio (SIR) at the user level. We start with an initial channel assignment based on minimizing the total interference between APs. Based on this assignment, we calculate the SIR for each user. Then, another channel assignment is...

2013
Şerban Georgică Obreja Irinel Olariu Alexey Baraev Eugen Borcoci

Wireless Mesh Networks represent a good solution to offer Internet access in sparse population areas. The latest wireless technologies, such as WiMAX, offer high data rates services, but they are not designed for wireless mesh architectures. This paper proposes a wireless mesh solution based on WiMAX nodes equipped with smart antennas, and presents some tests for performance evaluation of the p...

2003

Public Key Infrastructure (PKI) is one of the primary weapons in the Department of Defense’s (DoD) “defense in depth” information assurance strategy, and will be used to sign all DoD e-mail messages by October 2003. PKI uses asymmetric “public” and “private” keys to sign and/or encrypt e-mail messages and other information. The effect of this additional workload on the existing network and serv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید