[ns] strenge behivor in NS2.29 + NIST mobility model

2011-12-21 Thread El Hadi Cherkaoui

-- Forwarded message --
From: El Hadi Cherkaoui elhadi.cherka...@gmail.com
Date: Wed, 21 Dec 2011 13:03:18 +0100
Subject: [ns] strenge behivor in NS2.29 + NIST mobility model
To: ns-users@isi.edu

Dear ns users,

I am working on the NIST mobility model for heterogeneous network. In
my tcl script I have set one wifi AP , 1 wimax BS and enable UMTS
communications for the whole coverage area.

The AP and BS are set in the seme position (1000,1000)

I set the position of my terminal (containing 3
interfaces:wifi+umts+wimax) on (800,1000)  and moves straight toward
(2500,1000)

My Wifi AP coverage is 50 meters ie from (950 to 1050)m and my Wimax
coverage is 1km (0 to 2000)m

I expect that with a defined Handover algorithm receive packets:
From 800 to 950: wimax
From 950 to 1050: wifi
From 1050 to 2000: wimax
From 2000 to 2500: umts

but I figure it out that from 1000 to 1050 wifi packets are dropped by
the AP and not flow is received in this region  why ?

second scenario, I start the movement of mobil from x=1001 to 2500 and
it receives perfectly wifi packet in the zone [1000-1050].

So my question is : why when only the terminal crosses the center of
the AP it doesn't receive any wifi packets ?

thanx in adv for your reply !!

H.



[ns] Deadline extension || CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart, Germany

2011-12-21 Thread Cristina Pascual


INVITATION:

=
Please, consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish 
original scientific results to ICIMP 2012.
The submission deadline is extended to January 16, 2012.
In addition, authors of selected papers will be invited to submit extended 
article versions to one of the IARIA Journals: 
http://www.iariajournals.org
=


== ICIMP 2012 | Call for Papers ===

CALL FOR PAPERS, TUTORIALS, PANELS

ICIMP 2012, The Seventh International Conference on Internet Monitoring and 
Protection
May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/ICIMP12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html

- regular papers
- short papers (work in progress)
- posters
- ideas


Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html

Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: 
http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, 
implementations, running experiments, applications, and industrial case 
studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or 
journal in the following, but not limited to, 
topic areas.


All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: 
http://www.iaria.org/editorialrules.html


ICIMP 2012 Topics (topics and submission details: see CfP on the site)

TRASI: Internet traffic surveillance and interception

   Methods and context to classify legal and illegal traffic; Methods and 
procedure to classify wanted and undesired 
traffic; Overloads, attacks, and failures; Detection of attacks via protocols 
and applications; Undesired traffic 
evaluation; Traffic identification caused by malicious code (spam, virii, and 
worms, etc.); Traffic profile during 
disaster recovery; Traffic during active emergency services; Early warning on 
growing undesired traffic; Access control 
and audit detection points; Denial of service; Spoofing; Lawful interception; 
Multi-modal undesired traffic detection; 
Measurements and data mining correlation; Countermeasures on undesired traffic

IPERF: Internet performance

   Performance-oriented design; Active and passive performance monitoring; 
Performance metrics and measurements; 
Measurement-based performance evaluation in Internet; System measurement and 
monitoring; Performance model verification 
and validation; Stochastic modeling (queues,  Petri nets, etc.); Statistical 
performance; Performance of Internet routing; 
Performance optimization; Internet performance prediction; Internet performance 
evaluation studies; Internet performance 
testbeds; Performance evaluation of Web search engines; Performance evaluation 
of P2P systems

RTSEC: Security for Internet-based real-time systems

   Security and availability of Web Services; Security/Performance trade-off; 
Distributed systems security; Language-based 
security; Formalisms for security and protocol verification; Performance on 
firewall protected real-time systems; Security 
management in real-time systems; Metrics and techniques for security risk 
assessment; Internet monitoring and response 
security service; Protecting emergency communications from misuse and 
exploitation; Maintaining security in the face of 
disaster; Intrusion prevention and detection systems; Secure networks from 
web-based threats

DISAS: Disaster prevention and recovery

   Survivable networks on chips; Intrusion detection and defense; Alerting 
systems based on outstanding network events; 
Recovery methods in various networks; Disaster diagnosis and continuity plans; 
Fighting mechanisms for disaster of 
networks and applications; Global positioning systems; Vehicle localization and 
navigation systems; Disaster relief 
agencies to perform recovery operations; Survivability-driven defense and 
do-it-yourself disaster recovery; Security 
during disaster recovery; Budgeting disaster recovery; Networks emergency 
services; Reliable emergency communications and 
applications; Response to the networks emergency services; Disaster prevention 
and recovery; Fighting mechanisms for 
disaster of networks and applications; Networks resiliency methods; Recovery in 
various networks; Theory on robust 
networks; Customer protection and serviceability perception; Cost models and 
business impact; Cultural and legal aspects; 
Future advanced network development and evolution; Standards and guidelines; 

[ns] Deadline extension || CfP: SMART 2012 || May 27 - June 1, 2012 - Stuttgart, Germany

2011-12-21 Thread Cristina Pascual


INVITATION:

=
Please, consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish 
original scientific results to SMART 2012.

The submission deadline is extended to January 16, 2012.

In addition, authors of selected papers will be invited to submit extended 
article versions to one of the IARIA Journals: 
http://www.iariajournals.org
=


== SMART 2012 | Call for Papers ===

CALL FOR PAPERS, TUTORIALS, PANELS

SMART 2012, The First International Conference on Smart Systems, Devices and 
Technologies

May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/SMART12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPSMART12.html

- regular papers
- short papers (work in progress)
- posters
- ideas


Submission page: http://www.iaria.org/conferences2012/SubmitSMART12.html
Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: 
http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, 
implementations, running experiments, applications, and industrial case 
studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or 
journal in the following, but not limited to, 
topic areas.


All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: 
http://www.iaria.org/editorialrules.html

All tracks/topics are open to both research and industry contributions.

SMART 2012 Topics (topics and submission details: see CfP on the site)

Future cities
Digital cities
Senseable city networks
Smart houses
Dynamic urban communications
Knowledge on urban economy
Public display and search
Indoor communications
SHUI (Smart Home User Interfaces)
Smart mobility
Pervasive urban applications
Ubiquitous computing in digital cities
Mobile crowdsourcing applications
Rural communications
Ambient assisted living
Smart multimedia services
Smart antennas
Smart urban electric cars
Smart atmospheric and population migration measurements
Smart energy and optimal consumption
Smartphones
Smart spaces
Ecological cities
Interactions between smart cities
Health informatics in smart cities
Mobility monitoring and control in smart environments
Navigating in smart environments
Smart information processing
Smart analytics
Internet of things in smart environments
Social networking in smart environments
Use Cases for Smart Homes/Cities
Sociocultural challenges in smart environments
Costs associated with smart cities

--

Technical Program Committee [open, in progress]
http://www.iaria.org/conferences2012/ComSMART12.html




[ns] Security features in ns-2

2011-12-21 Thread zmezm 14

can you please let me know if i can implement any security protocal in ns-2 , 
like PKM version 1 or 2
i want to put security features to a handover model on mobile wimax , 
ps: am using ns-2.29 with nist mobility model 
thanks all