Welcome![Sign In][Sign Up]
Location:
Search - networks course source

Search list

[SourceCodeASP.NET网络选课系统

Description: 网络选课系统-Network Course Selection System
Platform: | Size: 76800 | Author: 不死鱼 | Hits:

[JSP/JavasensorNet

Description: 用java语言仿真传感器网络中的谣传算法,是课程设计的源码。用Java实现GUI界面。-Java language used in the simulation of sensor networks rumors algorithm, is the source of course design. Realize GUI interface using Java.
Platform: | Size: 10240 | Author: 刘年 | Hits:

[Other Embeded programExperimentalCourseinWirelessSensorNetworks

Description: 无线传感器网络实验教程(徐永军等编著)各章实验源代码-Experimental Course in Wireless Sensor Networks (edited by Yongjun Xu, etc.) source code of the various chapters of the experiment
Platform: | Size: 4496384 | Author: | Hits:

[OtherNMAP-and-Nessus-usage

Description: Nmap 是一款开放源代码的网络探测和安全审核的工具。它的设计目标是快速地扫描大型网络,当然用它扫描单个主机也没有问题。Nmap使用原始IP报文来发现网络上有哪些主机,它们提供什么服务(应用程序名和版本),那些服务运行在什么操作系统(包括版本信息)中,它们使用什么类型的报文过滤器/防火墙,以及其它功能。-Nmap is an open source network exploration and security auditing tools. Its design goal is to rapidly scan large networks, of course, use it to scan a single host no problem. Nmap using the original IP newspaper text to discovery which hosts on the network, they provide what services (application name and version) those services running what operating system (including version information), they use what type of packet filtering device/firewall , as well as other functions.
Platform: | Size: 2383872 | Author: leeo | Hits:

[Program doccontikiOS-notes

Description: this Contiki programming course. Contiki is a state-of-the-art, open source operating system for sensor networks and other networked embedded devices . Contiki was the first operating system for sensor networks to provide TCP/IP communication (with the uIP stack), loadable modules , threading on top of its event-driven kernel , protothreads , protocol-independent radio networking (with the Rime stack) cross-layer network simulation (with COOJA and MSPSim ), and softwarebased power profiling . Recent features include a networked shell and the memory efficient flash-based Coffee file system . This course can be performed using the COOJA and MSPSim simulators as well as Tmote Sky boards. We will look at various cool Contiki and COOJA features such as the COOJA timeline, Contiki’s Rime stack and protothreads, power profiling with Contiki and MSPSim, the Coffee file system and others.-this is Contiki programming course. Contiki is a state-of-the-art, open source operating system for sensor networks and other networked embedded devices . Contiki was the first operating system for sensor networks to provide TCP/IP communication (with the uIP stack), loadable modules , threading on top of its event-driven kernel , protothreads , protocol-independent radio networking (with the Rime stack) cross-layer network simulation (with COOJA and MSPSim ), and softwarebased power profiling . Recent features include a networked shell and the memory efficient flash-based Coffee file system . This course can be performed using the COOJA and MSPSim simulators as well as Tmote Sky boards. We will look at various cool Contiki and COOJA features such as the COOJA timeline, Contiki’s Rime stack and protothreads, power profiling with Contiki and MSPSim, the Coffee file system and others.
Platform: | Size: 328704 | Author: Fatma | Hits:

[Othersecurity

Description: Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Platform: | Size: 2048 | Author: bvc | Hits:

CodeBus www.codebus.net