Welcome![Sign In][Sign Up]
Location:
Search - mobile wireless nodes.

Search list

[ActiveX/DCOM/ATLAgilla_v3.0.3.tar

Description: Agilla: a mobile agent middleware for wireless sensor networks. Agilla enables users to inject mobile agents into a wireless sensor network. Agents are autonomous computational entities that can migrate or clone across nodes in a wireless sensor network. Two types of migration and clone instructions are provided: \"strong\" in which both code and state is maintained, and \"weak\" in which only the code is maintained. Agilla facilitates inter-agent coordination via localized tuple spaces, remote tuple space operations, and a neighbor list.
Platform: | Size: 453850 | Author: zsheng | Hits:

[ActiveX/DCOM/ATLAgilla_v3.0.3.tar

Description: Agilla: a mobile agent middleware for wireless sensor networks. Agilla enables users to inject mobile agents into a wireless sensor network. Agents are autonomous computational entities that can migrate or clone across nodes in a wireless sensor network. Two types of migration and clone instructions are provided: "strong" in which both code and state is maintained, and "weak" in which only the code is maintained. Agilla facilitates inter-agent coordination via localized tuple spaces, remote tuple space operations, and a neighbor list. -Agilla: a mobile agent middleware for wireless sensor networks. Agilla enables users to inject mobile agents into a wireless sensor network. Agents are autonomous computational entities that can migrate or clone across nodes in a wireless sensor network. Two types of migration and clone instructions are provided: strong in which both code and state is maintained, and weak in which only the code is maintained. Agilla facilitates inter-agent coordination via localized tuple spaces, remote tuple space operations, and a neighbor list.
Platform: | Size: 453632 | Author: zsheng | Hits:

[Internet-Network9aodv

Description: In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Significant examples include establishing survivable, efficient, dynamic communication for emergency operations, disaster relief efforts, and military networks. Such network scenarios cannot rely on centralized and organized connectivity, and can be conceived as applications of mobile ad hoc networks. A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are decentralized, where all network activity including discovering the
Platform: | Size: 10240 | Author: Andre | Hits:

[Windows MobileMANET

Description: manet code for making routing table for mobile nodes in a wireless network
Platform: | Size: 2048 | Author: parag | Hits:

[Internet-Networkaodv-uu-0.9.5

Description: 无线自组网按需平面距离矢量路由协议(Ad hoc On-Demand Distance Vector Routing,AODV),是应用于无线网状网络(也称作无线Ad hoc网络)中进行路由选择的路由协议,它能够实现单播和多播路由。该协议是Ad Hoc网络中按需生成路由方式的典型协议。 -In MANETs without centralized infrastructures,mobile nodes communicate with each other over multi-hop wireless links if they are out of wireless transmis-sion range.It means that each node should commit it-self to forward data packets froma neighboring n
Platform: | Size: 302080 | Author: arlenesmile | Hits:

[SCMucMultiIfacesSupport

Description: Due to the rapid growth of Wireless Communications devices, it is now believed that the relevance of Multi-Radio devices will highly increase in the near future. The research community has been trying to extend their analysis and simulation models so as to include this type of nodes. This is also the case of the Network Simulator framework, and there has recently been quite a large interest from its community to extend its mobile node architecture so as to be able to include more than one radio interface to work simultaneously. After analyzing the different solutions that were available, we propose a set of changes to be done, so as to be able to use devices having multiple interfaces within the ns-2 framework. These changes and modifications are summarized in the howto "Adding Multiple Interface Support in NS-2",
Platform: | Size: 333824 | Author: yans | Hits:

[Windows DevelopPublic-key-infra-.tcl

Description: it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile nodes-it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile nodes
Platform: | Size: 2048 | Author: Dinesh444 | Hits:

[Internet-Networkw1

Description: 在本次实验中,分为「移动节点无线区网」及「固定节点无线区网」两种环境来探讨。我调整MAC协议(共(2种)、路由协议(共2种)、网络拓扑(共5种)、节点数目(共3种)、节点密度(共1种)、传输距离(共1种),因此固定节点实验的结果有2*2*5*(3)=60种。由于节点密度、传输距离该二项参数之变动与网络拓扑的维持造成很大的冲突,所以对于节点密度的影响,时间上只来得及作线状拓扑上的节点密度分析,其它种拓扑的密度皆不改变。而全部的传输距离只采用250m的设定,传输距离的设定见下文-In this experiment, divided into "mobile node wireless area networks"and the "fixed node in the wireless area network " to discuss the two environments. I adjusted the MAC protocol (a total of (2 species), routing protocols (2 species), the network topology (5 species), the number of nodes (3 species), the node density (total 1 species), distance (total 1 species) Therefore, the experimental results of fixed nodes, 2* 2* 5* (3) = 60. Since the node density, transmission range of the two parameters change in the maintenance of the network topology caused great conflict, so the impact of node density , the time just in time for the linear topology of the node density analysis, neither the density of other types of topology change. and all of the transmission distance of 250m using only the setting, the setting distance below 聆聽以拼音方式閱讀
Platform: | Size: 2048 | Author: james | Hits:

[Windows Developfirefighter_opnet_report

Description: According to the Firefighter scenario (see Figure 1), wireless sensor nodes are deployed in the building rooms by mobile firefighter (fm). Command post is placed at the floor entrance. It is the gateway (gw) to the fire station outside or connected via internet, etc. Firefighter carrying a collection of sensor nodes, moves and visits every room on the way, places there and turns on one sensor node, then this node initiates the transmission of messages. Messages are sent periodically from every static sensor node both to the gateway and to the firefighter (fm). Also messages are sent from firefighter node to the gateway. Firefighter movement path is shown as arrow directed downwards and to the left.
Platform: | Size: 155648 | Author: Leontin | Hits:

[Program docProposal(Draft)

Description: Routing and Load balancing in MANET using Particle Swarm Optimization Abstract Mobile Ad Hoc Networks (MANET) is a collection of wireless mobile nodes, which dynamically form a temporary network, without using any existing network infrastructure or centralized administration. These are often called infrastructure-less networking since the mobile nodes in the network dynamically establish routing paths between themselves. Routing which is responsible for directing data packets from a source node to a given destination node is one of the hard tasks in MANET, this is due to the mobility of the network elements and the lack of central control. Although
Platform: | Size: 7168 | Author: Riham | Hits:

[Program docProposal(Draft)manet

Description: Routing and Load balancing in MANET using Particle Swarm Optimization Abstract Mobile Ad Hoc Networks (MANET) is a collection of wireless mobile nodes, which dynamically form a temporary network, without using any existing network infrastructure or centralized administration. These are often called infrastructure-less networking since the mobile nodes in the network dynamically establish routing paths between themselves. Routing which is responsible for directing data packets from a source node to a given destination node is one of the hard tasks in MANET, this is due to the mobility of the network elements and the lack of central control. Although
Platform: | Size: 7168 | Author: Riham | Hits:

[Program docijns-2007-v5-n2-p158-166

Description: Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fi xed node, each node acts as a router, providing routing capability for the MANET. Various protocols for discovery of routes be- tween any two MANET nodes have been designed. These protocols are broadly categorized as on-demand proto- cols and table driven protocols. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (AODV) are the two most matured on-demand routing protocols, while Optimized Link State Routing Protocol (OLSR) and Topology Dissemination Based on Reverse-Path For- warding (TBRPF) are the two most matured table driven routing protocols. This paper proposes enhancements in DSR to provide secured route discovery and improved
Platform: | Size: 176128 | Author: payal | Hits:

[AI-NN-PR10.1.1.11.5905

Description: This paper compares performance of nite impulse response (FIR) adaptive linear equalizers based on the recursive least-squares (RLS) and least mean square(LMS) algorithms in nonstationary uncorrelated scattering wireless channels. Simulation results, in terms of steady-state mean-square estimation error (MSE) and average bit-error rate (BER) metrics, are found for the frequency selective Rayleigh fading wireless channel experienced in a mobile ad hoc network where nodes are lognormally shadowed from each other. For the nonstationary channel models considered, RLS is always found to outperform LMS.
Platform: | Size: 844800 | Author: almoudamer3 | Hits:

[Internet-Networkpellegrino.pdf

Description: MANET mean Mobile Ad hoc NETwork or Multi-hop Ad hoc NETwork ● It is a wireless open network ● a temporary meshed network formed by a collection of mobile nodes ● a fully self-organized network ● not rely on any established infrastructure for the network initialization and operation
Platform: | Size: 501760 | Author: Pritha | Hits:

[Windows Mobilezrp2

Description: Zone routing Protocol code for wireless communication between mobile nodes. The nodes are communicating with each other having routing algorithm.
Platform: | Size: 2048 | Author: Shyam | Hits:

[Windows Mobilezrp1

Description: It is the 1st program for Zone routing Protocol code for wireless communication between mobile nodes. The nodes are communicating with each other having routing algorithm.
Platform: | Size: 2048 | Author: Shyam | Hits:

[Internet-Network802.11-Implementation-in-ns-2

Description: A Tutorial of 802.11 Implementation in ns-2 -Ns-2 [1] is a packet-level simulator and essentially a centricdiscrete event scheduler to schedule the events such as packet and timer expiration. Centric event scheduler cannot accurately emulate “events handled at the same time” in real world, that is, events are handled one by one. However, this is not a serious problem in most network simulations, because the events here are often transitory. Beyond the event scheduler, ns-2 implements a variety of network components and protocols. Notably, the wireless extension, derived from CMU Monarch Project [2], has 2 assumptions simplifying the physical world: (1) Nodes do not move significantly over the length of time they transmit or receive a packet. This assumption holds only for mobile nodes of high-rate and low-speed. Consider a node with the sending rate of 10Kbps and moving speed of 10m/s, during its receiving a packet of 1500B, the node moves 12m. Thus, the surrounding can change significantly and cause reception
Platform: | Size: 157696 | Author: Malek | Hits:

[Program docmulti-path-algorithm

Description: In this paper we introduce a new routing algorithm for wireless sensor networks. The aim of this algorithm is to provide on-demand multiple disjoint paths between a data source and a destination. Our Multipath On-Demand Routing Algorithm (MDR) improves the reliability of data routing in a wireless mobile network while maintaining the amount of overhead traffic at a low value. An important feature of MDR is that it is very robust against the average speed of the nodes in the network. Even for very high values of the mobility, the algorithm succeeds in delivering the data to the destination.
Platform: | Size: 30720 | Author: Starlin T S | Hits:

[matlabwangluofugai

Description: 无线传感器网络节点定位的移动信标节点路径规划,利用冗余度的方法对网络节点进行最优布置。-Optimal placement of wireless sensor network node positioning mobile beacon node path planning, the redundancy of the network nodes.
Platform: | Size: 416768 | Author: 陈龙震 | Hits:

[LabViewfunction-TDSR

Description: Ad-hoc networks refer to temporary networks which form for special purposes. Mobile ad-hoc networks (MANETs) are networks which use no network assisting element for routing, but every node has the role of router and actively participates in data forwarding. Security problems in MANETs are specified and investigated separately, because in these infrastructureless networks, in addition to all available problems in a wired or wireless network, there are some more problems. Since all connections are available in wireless form and they are audible, so they can be changeable. Also nodes themselves are involved in routing, so existence of a malicious node can lead to the destruction of the network and one of the most important challenges in these networks
Platform: | Size: 12288 | Author: shadi | Hits:
« 1 23 »

CodeBus www.codebus.net