[ns] to run a .cc file

2012-01-31 Thread Revathi Elangovan

I am having a .cc file and a .h file.. Can anyone pls help me to run it in
ns2...

Thanks in advance...


Re: [ns] to run a .cc file

2012-01-31 Thread Luca Bedogni

Hi
you need to make a tcl script in order to run a simulation, the cc
and h files only define the structure of your code.

Regards
--
Luca Bedogni
PhD Candidate in Computer Science
University of Bologna
http://lbedogni.web.cs.unibo.it



On Tue, Jan 31, 2012 at 10:00 AM, Revathi Elangovan
revathicse@gmail.com wrote:

 I am having a .cc file and a .h file.. Can anyone pls help me to run it in
 ns2...

 Thanks in advance...




Re: [ns] re quest for code for adding malicious nodes in aodv

2012-01-31 Thread Joseph Munuulo

Hi, kindly follow this link. it will be very useful. let me know what you
think after you have tried it out. http://elmurod.net/?p=196

On Tue, Jan 31, 2012 at 8:54 AM, BINDU PRASAD cbindupra...@gmail.comwrote:



 Hai
   I want to implement malicious nodes functionality in aodv
 using ns2.pls help me.also if anyone know about wormhole attack
 implementation too pls help me
 --
 View this message in context:
 http://old.nabble.com/request-for-code-for-adding-malicious-nodes-in-aodv-tp33234109p33234109.html
 Sent from the ns-users mailing list archive at Nabble.com.




-- 
Regards,

Munuulo Joseph Wanuume
Management Information Systems Unit
Makerere University Business School
P.O. Box 1337,
Kampala
Mob
+256 712 730826
+256 701 730826
+256 771 899893


[ns] [IEEE AOC 2012] Call for Papers

2012-01-31 Thread Fabio Pezzoni


   CALL FOR PAPERS  
Sixth IEEE WoWMoM Workshop on   
 Autonomic and Opportunistic Communications (AOC 2012)  
June 25, 2012 - San Francisco, California, USA  
http://cnd.iit.cnr.it/aoc2012/

   jointly supported by the 
 
  SCAMPI project
  funded by the FP7-ICT Programme under the 
 Future Internet Research and Experimentation (FIRE) initiative 
 http://www.ict-scampi.eu/   

and

  RECOGNITION project   
  funded by the FP7-ICT Programme under the 
  Future and Emerging Technologies (FET) initiative 
   http://www.recognition-project.eu/


 Fast Track on Computer Communication Journal   
   http://www.elsevier.com/locate/comcom


  Submission Deadline --- February 17, 2012 



The diffusion of lightweight,  powerful  portable devices,  also enriched with a
variety of sensing capabilities,  is enabling new ways for users' communication,
and laying the foundation for realizing  the ubiquitous networking idea.  Acting
either  as  the  main communication mode  or as complement  to  existing  mobile
network infrastructures, opportunistic networking  can leverage  the mobility of
end  users  and  enhance their  communication  capabilities.   The opportunistic
exploitation of extemporary  contacts  among  the users of the network paves the
way to a  number of applications but also poses  new and challenging problems to
the  networking research community.   The AOC 2012 workshop aims at serving as a
meeting point  for people  working in the area and a forum for exchanging ideas,
discussing solutions,  and sharing experiences among researchers, professionals,
and  application  developers,  both  from industry  and academia.  As  with  the
previous  five editions  of the AOC workshop series,  the scope  of  this year's
workshop  will remain  on general issues related to opportunistic networking and
computing.  Yet,  AOC 2012  will have  a primary interest in  new directions  of
opportunistic communications,  such as service composition techniques, scenarios
of co-existence  with infrastructure networks,  and  insights to their operation
coming from other disciplines such as game theory  and cognitive psychology. The
workshop  will solicit  original papers  addressing  theoretical  and  practical
aspects of autonomic and opportunistic communications but also papers describing
prototype implementations and deployments.


Topics of interest for AOC 2012 include, but are not limited to:

*   Routing, transport, and reliability issues
*   Techniques for data dissemination and replication
*   Applications and middleware support, mobile social networking applications
*   Mobility models and statistical analysis of mobility traces
*   Context and social awareness mechanisms and algorithms
*   Co-existence of opportunistic networks with infrastructure mobile wireless
networks
*   Service composition in autonomic and opportunistic networks
*   Cognition-driven information processing and decision making
*   Performance modelling, scaling laws, and fundamental limits for autonomic
and opportunistic communications
*   Game-theoretic insights to the operation of autonomic and opportunistic
networks
*   Participatory and urban sensing in autonomic and opportunistic networks
*   Trust, security, and reputation
*   Autonomic and opportunistic communication testbeds and prototypes,
measurement data from real experiments 
*   Socio-economic models for  autonomic and opportunistic communications



PAPER SUBMISSION AND PUBLICATION


Papers should neither have been published elsewhere  nor being currently under
review  by another conference or journal.  Manuscripts are limited to 6 pages,
single  spacing,  double  column,  and  must  strictly  adhere to the template
format.  Guidelines  on  paper  submission  and  formatting  are available  at
http://cnd.iit.cnr.it/aoc2012/.

Accepted papers will appear in the symposium proceedings published by IEEE. At
least  one author of  each accepted paper  is required to register and present
his/her  work at  the workshop.  There  will be no  separate  registration for
workshop, but one single registration will cover 

[ns] CBQ as ifq for wireless node

2012-01-31 Thread m ali

All ns-users
How can i use class based queuing (CBQ) as
interface queue for wireless node.

Regards
Moazzam



[ns] CONFIDANT mechanism for DSR

2012-01-31 Thread zie


I want to implement Trust MANET protocol namely CONFIDANT mechanism.
However, I didn't know how to compile (makefile) it under NS-2.
Anyone...please teach me how to compile it..
This is the link of thesis contains the codes.

http://www2.imm.dtu.dk/pubdb/views/publication_details.php?id=3961
-- 
View this message in context: 
http://old.nabble.com/CONFIDANT-mechanism-for-DSR-tp33236000p33236000.html
Sent from the ns-users mailing list archive at Nabble.com.