Welcome![Sign In][Sign Up]
Location:
Search - NS2 MAC new

Search list

[Program docmac2.pdf.tar

Description: Document containing details regarding changes to be made in ns2 to implement a new ieee 802.11 mac protocol.
Platform: | Size: 24576 | Author: prashub | Hits:

[Internet-NetworkNS2_how_to_add_new_MAC

Description: 讲解如何往NS2中添加新的MAC协议,很详细-NS2 explain how to add a new MAC protocol, in great detail
Platform: | Size: 7168 | Author: 朱云 | Hits:

[CommunicationAdd_Mac_Protocol_In_NS2

Description: 如何在NS2下,如何添加一个新的Mac协议,里面附有本人自己的安装经验,因为文档本身有错误。-How to NS2, how to add a new Mac the agreement, which is installed with my own experience, because the document itself has an error.
Platform: | Size: 25600 | Author: 最初的梦想 | Hits:

[Program docRESEARCH_ON_END-TO-END_HANDOFF

Description: 本文在研究IEEE802.16e协议和SIP协议的基础上,提出了利用 SIP解决IEEE802.16接入网络中端到端切换的新方案。该方案采用跨 层切换的设计思想,联合MAC层和应用层SIP协议,在底层链路切换 的同时,完成应用层会话的修改,加快了切换过程,减少了切换时延, 提高了切换成功率。本文基于NS2仿真平台,完成了相应的仿真平台 搭建过程,实现了SIP协议模块和WiMAX协议模块的融合,扩展了SIP 协议模块的部分消息,最终在基于SIP协议模块和WiMAX协议的统一 NS2平台上实现了基于WiMAX接入、支持SIP扩展功能的SIP会话建 立和修改过程。 - On the basis of study of WiMfAX and SIP, a new mechanism using SIP to achieve end-to-end handoff under IEEE802.16e access networks is Ob proposed handoffs, in this thesis. The mechanism adopts a cross-layer design which means that the l}iIAC layer handoff procedure can interleaved with that of the application layer. During the handoff at link
Platform: | Size: 4511744 | Author: 汪舵 | Hits:

[Technology Managementstage

Description: The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security considered essential. However, because of limited resources and low computing capacity of a sensor node, the development of a mechanism that ensures security is a real design challenges. In this report we have tried to propose a new security mechanism dedicated to WSN. Our main objective is to secure the process of transferring data to the base station. The proposed protocol protects transferred data against intruder nodes attacks, using a security mechanism based on the use of control message MAC (Message Authentication Code) for authentication. Our protocol performances are evaluated using the simulator NS2.
Platform: | Size: 2359296 | Author: magazana | Hits:

[Communication-MobileWireless-multimedia-sensor-networks

Description: 本文着重研究网络中使用的MAC协议对语音传输过程的影响,以及无线传 感器网络中适用的语音编码算法。本文首先综述了现有无线传感器网络中常用 的MAC协议,对这些协议进行了分析比较。提出了一种新的基于TDMA的MAC 协议VR-TDMA,为了测试提出的协议性能,在NS2仿真平台上对该协议进行 了仿真,结果证明该协议具有良好的实时性能。然后研究了几种常用语音编码 算法的性能,通过比较研究,认为ADPCM语音编码算法的性能符合无线传感 器网络应用的要求,并对该算法进行了简化,减少了算法运行的计算量。实际 测试表明,算法具有良好的性能。 -In this paper,we concentrate on the mac protocols of wireless sensor networks, especially the impact imposed on speech transmition.We also want to find a speech coder which is fit for wireless sensor networks.Firstly,we intorduce the existing mac protocol,such aS IEEE802.1 1,SMAC protocol,TRAMA protocol,DMAC protoc01. Moreover we analyse and make comparison of them.Secondly,we propose a new mac protocol named VR-TDMA.Simulation in NS2 proves that this protocol Canhave pleasing performance in real.time application.Thirdly,we make a comparison of some famous speech encoders.The result indicates that ADPCM(Adaptive Di脏rential Pulse Code Modulation)is simpler than advanced low bit。rate VOICe coding techniques and doesn’t require as heavy caculations.In this work,We simplify the algorithm in order tO make it fit for the networks beaer.Actual tests prove that this simplified algorithm work well in wireless sensor networks.
Platform: | Size: 3294208 | Author: 曾晓丽 | Hits:

[Internet-Networkcognitive-mac-coexistence

Description: In last decades, the demand of wireless spectrum has increased rapidly with the development of mobile communication services. Recent studies recognize that traditional fi xed spectrum assignment does not use spectrum effi ciently. Such a wasting phenomenon could be amended after the present of cognitive radio. Cognitive radio is a new type of technology that enables secondary usage to unlicensed user. This paper presents an Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive radios to access unoccupied resource opportunistically and coex- ist with wireless local area network (WLAN). By a primary traffi c predication model and transmission etiquette, OC-MAC avoids producing fatal damage to licensed users. Then a ns2 simulation model is developed to evaluate its performance in scenarios with coexisting WLAN and cognitive network.-In last decades, the demand of wireless spectrum has increased rapidly with the development of mobile communication services. Recent studies recognize that traditional fi xed spectrum assignment does not use spectrum effi ciently. Such a wasting phenomenon could be amended after the present of cognitive radio. Cognitive radio is a new type of technology that enables secondary usage to unlicensed user. This paper presents an Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive radios to access unoccupied resource opportunistically and coex- ist with wireless local area network (WLAN). By a primary traffi c predication model and transmission etiquette, OC-MAC avoids producing fatal damage to licensed users. Then a ns2 simulation model is developed to evaluate its performance in scenarios with coexisting WLAN and cognitive network.
Platform: | Size: 177152 | Author: eng | Hits:

[Industry research802.11_ns2_modify.pdf.tar

Description: Document to understand changes need to made in ns2 file system to implement new mac protocol
Platform: | Size: 24576 | Author: prashub | Hits:

CodeBus www.codebus.net