نتایج جستجو برای: ns2 simulator

تعداد نتایج: 32400  

Journal: :CoRR 2014
R. Kaniezhil C. Chandrasekar

The paper focuses on improving the spectrum sharing using NSU, FLS and Traffic Pattern Prediction and also made comparison that traffic pattern prediction provides a better way of improving the spectrum utilization and avoids the spectrum scarcity. This helps to increase the number of active users, ease of identification of optimal users to use the spectrum with maximized coverage of the spectr...

2014
Mahdi Mosleh Hagar Noori Arash Nikdel

One of the most important problems in the wireless sensor networks is the detection of events in a certain area (target area). This challenge is an important case in the wireless sensor network research and it is named the coverage problem. Regarding the sensors redundancy, we can improve the network lifetime by activating enough number of nodes and making the others sleep. Also, proposing a me...

Journal: :J. Comput. Science 2014
Sebastien Linck Emmanuel Mory Julien Bourgeois Eugen Dedu François Spies

The major purpose of this paper is to transmit an existing video above a complete simulated video streaming architecture based on Network Simulator (NS2). Thanks to our architecture, the visual quality evaluation of the distributed streaming platform under various conditions is simplified. Indeed, the received video can be easily visualized using a classic video client or be compared using the ...

2004
Suhaidi Hassan

Absfract-The. Multi-rate Multicast Congestion Control (MR-MCC) scheme has been considered as a suitable scheme for multicasting, for .a very large heterogeneous group of receivers. In. this work, we proposea new design of MR-MCC using explicit rate.adjustment based on TCP throughput equation and Packet-pair Probe. The design . goals are: scalability, resporkiveness, fast convergence, fairness (...

2002
Thomas Heide Clausen Laurent Viennot

In this paper, we describe the Optimized Link State Routing Protocol (OLSR) [19],[20], a proactive routing protocol for Mobile Ad-hoc NETworks (MANETs). We evaluate its performance through exhaustive simulations using the Network Simulator 2 (ns2) [1], and compare with other ad-hoc protocols, specifically the Ad-hoc On-Demand Distance Vector (AODV) [4] routing protocol and the Dynamic Source Ro...

2016
Manish Korde Binod Kumar Yanghee Choi

Mobile devices are beginning to have multiple wireless interfaces. There is a need for these devices to move freely across different networks and achieve seamless handoff across heterogeneous wireless network. In our simulation we performed handover between Wi-Fi (WLAN) and WiMAX network using link trigger [1] mechanism at Layer2. The trigger generated at Layer2 helps in reducing disconnection ...

2017
Amandeep Kaur Gurpreet Singh

Mobile ad-hoc network is a self-organized in which mobile nodes can be established anywhere without any need of central administration. In MANET resources are limited and topology is highly dynamic, so routing has been a very important area of research. Many routing protocols have been proposed by researchers. Still, there is some routing protocols can be proposed. In this paper, an attempt has...

2010
Giuseppe Araniti Igor Bisio Mauro De Sanctis

In the framework of the so called InterPlaNetary (IPN) Internet, the paper surveys possible advanced communications and networking solutions applied by a specific IPN node architecture. The proposed solutions have been preliminarily evaluated by using the ns2 simulator by considering possible network status changes due to the nodes’ movements, typical in the deep space scenario. In particular, ...

2010
Longxiang Gao Ming Li Bai Li Wanlei Zhou

In this paper we studied several virtual routing structures (ring, ring-tree, cord, and mesh) which are scalable, independent on addresses, based on local information and partialglobal information for routing packets. These virtual routingstructures are built on the top of the backbone nodes whichare selected by considering power, connections, and immobilitymetrics.Our experimental results on t...

Journal: :CoRR 2016
S. Boujaada Y. Qaraai S. Agoujil M. Hajar

In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید