Dear all:
I am working on a simulation using NS-2.27. I have following question.
In "mac-802_11.cc", the function "Mac802_11::send(Packet *p, Handler *h)",
there are two kinds of timers: BackoffTimer and DeferTimer. I confuse the
difference between BackoffTimer and DeferTimer. I canno
Dear all:
I am working on a simulation using NS-2.27. I want to test the the effect of
fragmentation threshold of 802.11 MAC on network throughput, and adjust this
threshold dynamically in runtime. However, the fragmentation mechanism had not
been implemented in this version or other versio
Hello dear..
Actually I am very new in both of NS2 and Snort IDS
May I ask you ,
How to simulate and apply snort Intrusion detection (IDS) open source code In
ns2 for wireless ad hoc network??I dont know is there any way? and how??
I want to apply it for my wireless network,but i dont
Hello dear all
actually I am very new in both of ns2 and snort
1.How to simulate and apply snort IDS open source code In ns2 for wireless
ad hoc network??I dont know is there any way? and how??
Actually ,I dont know how to use Snort intrusoin detection source code in
NS2?
I want
Hello dear all
May I ask you ,how to simulate and apply snort IDS open source code In ns2
for wireless netowork??
I dont know actually how to use Snort intrusoin detection source code in NS2?
I want to apply it for my wireless network,but i dont know how?
Thank you in advance
regard
Hi all,
I'am implementing 802.16 mac protocol. I examined other protocols. I
remarked that there are 2 functions for packet pointer creation alloc() et
allocpkt().
1. What are the difference between these functions? [allocpkt() et alloc()]
2. Why in 802.11, there are no explicit data buffer alloca
Hi all,
Could we verify the scalability of a new wireless protocol using NS-2.29?
What is the maximum number of wireless nodes we can use in a single
simulation with NS-2.29?
Thank You
Best regards
Ramzi Tka
Hi, dear all:
I used ns-2 to simulate the performance of zigbee network, for which I
used p802_15_4mac and p802_15_4phy as the MAC and PHY of this network.
As it was a indoor environment so I chose shadowing propagation model
as the channel model for this simulation, but when I set the deviati