[ns] throughput is higher than cbr rate

2013-01-21 Thread Fazlullah Khan

Hi every body
My throughput is higher than the CBR rate?
I think it is not possible, anybody know the reason.

-- 
Regards
Fazlullah Khan


[ns] Preliminary Call for Participation - PerCom'13, San Diego, March 18-22, 2013

2013-01-21 Thread Payton, Jamie


PRELIMINARY CALL FOR PARTICIPATION

=
Eleventh IEEE International Conference on Pervasive Computing and Communications

   PerCom 2013
  http://www.percom.org
   San Diego, USA
   March 18 - 22, 2012

Sponsored by: IEEE Computer Society, University of Texas at Arlington
Technically co-sponsored by: IEEE TCCC, IEEE TCPP
Industry Sponsors: Qualcomm, NICTA, IBM Research
Other Sponsors: National Science Foundation, Pervasive and Mobile Computing 
Journal (ELSEVIER)



  *** Early Registration Deadline: February 26, 2013 ***
http://percom.org/?q=registration


Main Features:
*** Two keynote speeches - see http://www.percom.org/?q=keynote
*** 19 Full Papers and 8 Concise Contributions - see below
*** Panel on Intelligent Devices and Smart Spaces²
*** Best Papers Session
*** Work-in-Progress Session - see http://www.percom.org/?q=wip
*** Demonstration Session - see http://www.percom.org/?q=demos
*** PhD Forum - see http://www.percom.org/?q=phdforum
*** 12 Workshops - see http://www.percom.org/?q=listofworkshops

  =
   Preliminary Program Outline
  =

March 18: Pre-conference Workshops
March 19-21: Main Conference
March 19-20: Keynotes
March 19: Demo and WiP sessions
March 19: Welcome Reception
March 20: Best Papers Session, PhD Forum
March 20: Conference Banquet
March 21: Panel
March 22: Post Conference Workshops

  =
 Keynote Speakers
  =

Dr Roy Want, Research Scientist, Google Inc., USA
The Golden Age of Pervasive Computing

Prof. David Culler, Howard Friesen Chair and Chair of Electrical Engineering 
and Computer Science, Department of Electrical Engineering and Computer 
Science, University of California, Berkeley, USA
Pervasive Communication and Interaction to make the Built Environment Better 
and more Sustainable
  =
 Panel
  =

Panel topic:
Intelligent Devices and Smart Spaces²
   Panel Chair:
Peter Marx, Qualcomm, USA

  =
 Program
  =

   FULL PAPERS


*   Supero: A Sensor System for Unsupervised Residential Power Usage 
Monitoring, Dennis Phillips (Michigan State University, USA); Rui Tan 
(Advanced Digital Sciences Center, Singapore); Mohammad Mahdi Moazzami 
(Michigan State University, Iran); Guoliang Xing (Michigan State University, 
USA); Jinzhu Chen (Michigan State University, USA); David Yau (Advanced Digital 
Sciences Center, Singapore)

*   Scheduling Sensors for Monitoring Sentient Spaces using an Approximate 
POMDP Policy, Ronen Vaisenberg (University of California - Irvine, USA); 
Alessio Della Motta (University of California, Irvine, USA); Sharad Mehrotra 
(University of California, Irvine, USA); Deva Ramanan (University of California 
- Irvine, USA)

*   Providing Privacy-Aware Incentives for Mobile Sensing, Qinghua Li 
(Pennsylvania State University, USA); Guohong Cao (Pennsylvania State 
University, USA)

*   Where Has My Battery Gone? Finding Sensor Related Energy Black Holes in 
Smartphone Applications, Yepang Liu (The Hong Kong University of Science and 
Technology, Hong Kong); Chang Xu (Nanjing University, P.R. China); Shing-Chi 
Cheung (The Hong Kong University of Science and Technology, P.R. China)

*   PIKE: Enabling Secure Interaction with PIggybacked Key-Exchange, 
Wolfgang Apolinarski (University of Duisburg-Essen, Germany); Marcus Handte 
(University of Duisburg-Essen, Germany); Umer Iqbal (Universität Duisburg-Essen 
Germany, Germany); Pedro Jose Marrón (University of Duisburg-Essen and 
Fraunhofer FKIE, Germany)

*   Effective Routine Behavior Pattern Discovery from Sparse Mobile Phone 
Data via Collaborative Filtering, Jiangchuan Zheng (Hong Kong University of 
Science and Technology, Hong Kong); Siyuan Liu (Carnegie Mellon University, 
USA); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)

*   METIS: Exploring mobile phone sensing offloading for efficiently 
supporting social sensing applications, Kiran K. Rachuri (University of 
Cambridge, United Kingdom); Christos Efstratiou (University of Cambridge, 
United 

[ns] how to analyse the performance metrics of AODV, DSR DSDV in ns-2

2013-01-21 Thread Rajib Das

Hi
Can anybody help to calculate the throughput, end-to-end delay and
normalised routing load of
AODV, DSR and DSDV protocol. For reference i am giving one sample table.
How the sample is made. plz help me to calculate such parameter. plz plz
help me. I want to analyse this performance metrics. Thanks a lot.

Performance Comparison for 20 nodes packet size 1000 bytes and 0.015sec

* *

*Packet Sent*

*Packet Received*

*PDF*

*Throughput*

*End-to-End Delay*

*Normalised Routing Load*

*AODV*

*1200*

*368*

*30.7*

*20.4*

*2.5*

*4*

*DSDV*

*1200*

*148*

*12.3*

*8.2*

*2.3*

*7.9*

*DSR*

*1200*

*316*

*26.3*

*17.6*

*2.2*

*7.1*
*
*

-- 
*With regards*
*
Rajib Das
Assam India.
*


[ns] Deadline extension: ICIMP 2013 || June 23 - 28, 2013 - Rome, Italy

2013-01-21 Thread Cristina Pascual


INVITATION:

=
Please consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish original scientific results to 
ICIMP 2013.

The submission deadline is February 7, 2013.

Authors of selected papers will be invited to submit extended article versions 
to one of the IARIA Journals: http://www.iariajournals.org
=


== ICIMP 2013 | Call for Papers ===

CALL FOR PAPERS, TUTORIALS, PANELS

ICIMP 2013, The Eighth International Conference on Internet Monitoring and 
Protection

June 23 - 28, 2013 - Rome, Italy


General page: http://www.iaria.org/conferences2013/ICIMP13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPICIMP13.html

- regular papers

- short papers (work in progress)

- posters

Submission page: http://www.iaria.org/conferences2013/SubmitICIMP13.html


Submission deadline: February 7, 2013

Sponsored by IARIA, www.iaria.org


Extended versions of selected papers will be published in IARIA Journals:  
http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: 
http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: 
http://www.thinkmind.org


Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, implementations, running experiments, 
applications, and industrial case studies. Authors are invited to submit 
complete unpublished papers, which are not under review in any other conference 
or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, Technical/marketing/business 
presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: 
http://www.iaria.org/editorialrules.html


ICIMP 2013 Topics (topics and submission details: see CfP on the site)


TRASI: Internet traffic surveillance and interception

   Methods and context to classify legal and illegal traffic; Methods and 
procedure to classify wanted and undesired traffic; Overloads, attacks, and 
failures; Detection of attacks via protocols and applications; Undesired 
traffic evaluation; Traffic identification caused by malicious code (spam, 
virii, and worms, etc.); Traffic profile during disaster recovery; Traffic 
during active emergency services; Early warning on growing undesired traffic; 
Access control and audit detection points; Denial of service; Spoofing; Lawful 
interception; Multi-modal undesired traffic detection; Measurements and data 
mining correlation; Countermeasures on undesired traffic

IPERF: Internet performance

   Performance-oriented design; Active and passive performance monitoring; 
Performance metrics and measurements; Measurement-based performance evaluation 
in Internet; System measurement and monitoring; Performance model verification 
and validation; Stochastic modeling (queues,  Petri nets, etc.); Statistical 
performance; Performance of Internet routing; Performance optimization; 
Internet performance prediction; Internet performance evaluation studies; 
Internet performance testbeds; Performance evaluation of Web search engines; 
Performance evaluation of P2P systems

RTSEC: Security for Internet-based real-time systems

   Security and availability of Web Services; Security/Performance trade-off; 
Distributed systems security; Language-based security; Formalisms for security 
and protocol verification; Performance on firewall protected real-time systems; 
Security management in real-time systems; Metrics and techniques for security 
risk assessment; Internet monitoring and response security service; Protecting 
emergency communications from misuse and exploitation; Maintaining security in 
the face of disaster; Intrusion prevention and detection systems; Secure 
networks from web-based threats

DISAS: Disaster prevention and recovery

   Survivable networks on chips; Intrusion detection and defense; Alerting 
systems based on outstanding network events; Recovery methods in various 
networks; Disaster diagnosis and continuity plans; Fighting mechanisms for 
disaster of networks and applications; Global positioning systems; Vehicle 
localization and navigation systems; Disaster relief agencies to perform 
recovery operations; Survivability-driven defense and do-it-yourself disaster 
recovery; Security during disaster recovery; Budgeting disaster recovery; 
Networks emergency services; Reliable emergency communications and 
applications; Response to the networks emergency services; Disaster prevention 
and recovery; Fighting mechanisms for disaster of networks and applications; 
Networks resiliency methods; Recovery in various networks; Theory on robust 
networks; Customer protection and serviceability 

[ns] cwnd value calculation of ns2???

2013-01-21 Thread abinaya rajendhiran

can anyone tell me how cwnd value for a tcp is estimated in ns2?
-- 
Reagards.,
R.Abinaya,B.Tech,(M.E)


[ns] Simulate 802.11b or g

2013-01-21 Thread Behnaz Bostanipour

Hi,

Does any body have an example of how should I put the parameters of 
Mac-802_11Ext or Mac_802_11 to implement 802.11 b or g?
I know that some patch written for this in ns-miracle but it seems complicated 
to use.

Thanks,
Behnaz