搜索资源列表
ijetaepaperacceptancenotificationvolume3issue8aug
- ijeate paper based on performance evaluation on AODV
Node-Initialization
- Three wireless nodes are created and they are configured with specific parameters of a mobile wireless node. After creating the nam file and trace file, we set up topography object. set node_ ($i) [$ns node] is used to create the nodes. Location of t
blackholeaodv.tcl.tar
- simulating blackhole attack in aodv using ns-2
grayholeaodv
- source code for grayhole aodv
wireless routing protocal
- aodv routing protocol for wireless networks
awk
- aodv在ns2下的仿真代码,很好的学习材料-aodv in ns2 simulation code
aodv20
- AODV protocol in Adhoc network
aodv40
- AODV for 40 node in Adhoc network
aodv60
- AODV for 60 node in Adhoc network
aodv80
- Report about AODV and DSR in Adhoc
ADODV-5
- A TCL scr ipt for simulating 5 node AODV in NS2
OADV routing protocol implement in c++
- In AODV, routes are discovered in an on-demand basis and are maintained as long as they are required. Like DSDV it maintains a sequence number, which it increases each time it finds a change in the topology of its neighborhood. This sequence number e
aodv100
- Simulator aodv protocol 100 nodes
aodv10
- this is file aodv about 10 node
caodv
- 基于ns2的aodv协议实现,以及cope aodv的源码,实现等-Based on the ns2 aodv protocol implementation, as well as cope aodv source, realization
ns-mcast
- ns2实现muticast aodv的代码文件,方便大家实现对aodv协议的研究-achieve muticast aodv ns2 code file, to facilitate the study of aodv protocol to achieve
aodvTestRouting1.2.tar
- TEsting AODV in Castalia simulator
Simulation_AODV-in_castalia.tar
- Some result of simulation AODV in castalia
aodvattacker
- AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently im
aodv
- adov的.cc文件,用于学习分析---有备注-adov' s. cc file analysis for learning