intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network simulator ns-2

Xem 1-15 trên 15 kết quả Network simulator ns-2
  • In this paper, we provide analyses performance of IEEE 802.11, 802.15.4 MAC and S-MAC protocols in terms of throughput, energy consumption and data packet delivery. Our simulation results show that S-MAC protocol with active and sleep cycle consumes energy less than about 10% and 15% compared to IEEE 802.15.4 and IEEE 802.11 MAC protocols respectively.

    pdf7p chauchaungayxua11 23-03-2021 11 1   Download

  • In this paper, we implement and analyses performance of multiple black hole attack nodes simultaneously in AODV routing protocol in terms of throughput, energy efficiency and data packet delivery. Our simulation results show that the more attackable nodes in network simultaneously, the lower the energy efficiency and network performance.

    pdf7p chauchaungayxua11 23-03-2021 8 1   Download

  • In this paper, we measured multiple black hole attacks simultaneously in Network Simulator 2 (NS2) in terms of throughput, energy efficiency and data packet delivery. We also proposed a simple solution for detection and avoidance black hole attacks.

    pdf7p chauchaungayxua11 23-03-2021 11 2   Download

  • This paper highlights the distinction between cluster merging and cluster diffusion, presents architecture for carrying out efficient diffusion and finally compares these two approaches under various network conditions. Simulations are carried out in Network Simulator (NS2) which shows that cluster diffusion can be rendered efficient when multiple edge nodes are used for inter-cluster communication.

    pdf6p blossom162 31-03-2019 16 0   Download

  • In this paper we propose an adaptive congestion control algorithm using cross layer design, which out-performs even during constrained situation. For analyzing the performance we have chosen four popular routing protocols such as AODV, DSR, DSDV and TORA. We also observe through simulation in NS2 that AODV out-performs other routing protocols in normal situation and DSR out-performs in constraint environment.

    pdf8p byphasse043256 24-03-2019 18 0   Download

  • Performance of the proposed caching algorithms is evaluated by simulating in NS2 under various ad hoc network scenarios. Simulation results reveal that, proposed solution successfully created data diversity in the adhoc networks which leads to an efficient data access.

    pdf5p byphasse043256 24-03-2019 18 0   Download

  • To evaluate the performance of the proposed algorithm we simulate it in the NS2 simulator. Our experimental results show that proposed solution provides high quality location monitoring services for end users and guarantees the location privacy of the monitored persons.

    pdf5p byphasse043256 24-03-2019 19 0   Download

  • The proposed protocol is implemented in NS2 network simulator and compared with traditional AODV. The results show an improvement in both QoS parameters and Energy efficiency without introducing significant overhead.

    pdf7p byphasse043256 23-03-2019 22 2   Download

  • Scheduling in a node plays an important role in improving the efficiency of exploiting the bandwidth of optical burst switched networks. This article focuses on analyzing the role of FDL buffer in scheduling and evaluating its performances basing on the simulation results on NS2.

    pdf11p thiendiadaodien_9 04-03-2019 27 0   Download

  • The primary focus of this paper is to present an adon technique named ‘Explicit No’ with reduced complexity, for evaluating trust worthiness of a neighboring node. This scheme helps in mitigating the effect of malicious nodes by correct identification. Results are presented through simulation in NS2.

    pdf6p girlsseek 27-02-2019 21 1   Download

  • In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.

    pdf6p girlsseek 27-02-2019 27 0   Download

  • This article proposes a valid route testing mechanism (VRTM) and integration of VRTM into AODV protocol to make DWAODV which is able to detect and prevent the wormhole attacks. Using Network Simulator (NS2), we evaluate the security effectiveness of DWAODV protocol on random movement network topology at high speed.

    pdf16p thuyliebe 05-10-2018 37 4   Download

  • The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths.

    pdf22p thuyliebe 05-10-2018 71 0   Download

  • Lab 2, Network Simulator ns2. Ns2 Tutorial: Languages, Ns2, Nam, Assignment #2.

    pdf35p son2483 29-10-2010 85 8   Download

  • Part I: NS fundamentals, Wired world, Walk-thru an example NS script. Part II: Visualization tools & other utilities, Help and references. Outcome of this tutorial: You know the concept of ns2. You are able to set-up a network topology on your own (with nameditor). You are able to add traffic like ftp/telnet or cbr to your simulation. You are able to start the ns and the nam. You understand the ns-script code generated by nam-editor.

    pdf55p son2483 29-10-2010 145 44   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2