Hi,
You may add -g to the compilation options (gcc -g ...). This can be done
in the Makefile.in file. Then you will be able to launch the gdb
debugger on ns executable file by:
gdb ns
In the opened interpreter use the following commands:
r the_name_of_my_script.tcl
bt
And gdb will provide
Hi!
I need help about integrate NS-2 into a real network.
I would like that a real client communicates with a node within the simulator
or with another node external to the simular (eg. a server). I saw the emulator
extension, and now I can use ns-2 as a gateway, but I don't know how make
dear Ns-users,
I am modelling some traffic with Pareto and Exponential Applications. But I
notice that the bit rate that is really generated by these Applications is
different from the one specified in rate_ variable. For example if I specify
a bitrate of 100kb/s, a on/time of 10ms a off time
Hallo
I am a new user for NS2 and I use ns-allinone-2.29.
Can anyone help me .. How can i run AODV code?
thanks
On 6/23/06, Varrian Hall [EMAIL PROTECTED] wrote:
Hello,
I have been racking my brain trying to figure out how to simulate a
mobile using communicating to a node in a wired domain through a base
station. Please assist with this issue. Nothing I'm trying is working.
thanks,
This
On 6/23/06, Gilles Bertrand [EMAIL PROTECTED] wrote:
Hi,
You may add -g to the compilation options (gcc -g ...). This can be done
in the Makefile.in file. Then you will be able to launch the gdb
debugger on ns executable file by:
gdb ns
In the opened interpreter use the following
Chao Hai,
well to the best of my knowledge, gdb should not have to knwo where to look
for the files as it is launched on an executable. What is is used for is to
know in which function the problem happens. Then you should know in which
file you have implemented this function (else a grep command
All,
When using shadowing propagation model setting
path loss to 2 (range 2 to 3.7) and standard deviation to 3 (range 2 to 3)
mainly suites an indoor environment.
Propagation/Shadowing set pathlossExp_ 2.0
Propagation/Shadowing set std_db_ 3.0
my questions are:
1. Is the above
On 6/23/06, Gilles Bertrand [EMAIL PROTECTED] wrote:
well to the best of my knowledge, gdb should not have to knwo where to look
for the files as it is launched on an executable. What is is used for is to
know in which function the problem happens. Then you should know in which
file you have
Hi all,
That would be a bad idea if you go offline to discuss this topic or any
other topic by which others can benefit as well. At least I learned from
this discussion ;-)
Regards
- Original Message -
From: Gilles Bertrand [EMAIL PROTECTED]
To: Hai Nam [EMAIL PROTECTED]
Cc:
Hi Shafiq,
you are right, I know :o) This suggestion was done in case more detailled
and very specific help was required, which is not the case :o)
Regards,
--
Gilles BERTRAND
Telecom INT - University of Stuttgart
Hello:
Besides S-MAC, are there any other popular MACs such as the B-MAC available
for NS2?
Thanks for your help
John
Hello Everyone,
I am currently trying to add a clustering protocol to the existing protocol
stack of the wireless node in ns2. The final modified stack consists of
clustering layer right below the routing layer. I did make all the necessary
modifications in the ns2 code and tried to run
Hello,
I have created two nodes in ns2 which are connected to each other using two
links.
I have created also two different UDP flows on n0 (source node) to be
transmitted to n1 (destination node).
Is it possible to have packets belonging to flow 1 routed from one link and
packets belonging to
14 matches
Mail list logo