[ns] Simulate 802.11b or g
Hi, Does any body have an example of how should I put the parameters of Mac-802_11Ext or Mac_802_11 to implement 802.11 b or g? I know that some patch written for this in ns-miracle but it seems complicated to use. Thanks, Behnaz
[ns] cwnd value calculation of ns2???
can anyone tell me how cwnd value for a tcp is estimated in ns2? -- Reagards., R.Abinaya,B.Tech,(M.E)
[ns] Deadline extension: ICIMP 2013 || June 23 - 28, 2013 - Rome, Italy
INVITATION: = Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to ICIMP 2013. The submission deadline is February 7, 2013. Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org = == ICIMP 2013 | Call for Papers === CALL FOR PAPERS, TUTORIALS, PANELS ICIMP 2013, The Eighth International Conference on Internet Monitoring and Protection June 23 - 28, 2013 - Rome, Italy General page: http://www.iaria.org/conferences2013/ICIMP13.html Call for Papers: http://www.iaria.org/conferences2013/CfPICIMP13.html - regular papers - short papers (work in progress) - posters Submission page: http://www.iaria.org/conferences2013/SubmitICIMP13.html Submission deadline: February 7, 2013 Sponsored by IARIA, www.iaria.org Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org Please note the Poster and Work in Progress options. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels. Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html ICIMP 2013 Topics (topics and submission details: see CfP on the site) TRASI: Internet traffic surveillance and interception Methods and context to classify legal and illegal traffic; Methods and procedure to classify wanted and undesired traffic; Overloads, attacks, and failures; Detection of attacks via protocols and applications; Undesired traffic evaluation; Traffic identification caused by malicious code (spam, virii, and worms, etc.); Traffic profile during disaster recovery; Traffic during active emergency services; Early warning on growing undesired traffic; Access control and audit detection points; Denial of service; Spoofing; Lawful interception; Multi-modal undesired traffic detection; Measurements and data mining correlation; Countermeasures on undesired traffic IPERF: Internet performance Performance-oriented design; Active and passive performance monitoring; Performance metrics and measurements; Measurement-based performance evaluation in Internet; System measurement and monitoring; Performance model verification and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical performance; Performance of Internet routing; Performance optimization; Internet performance prediction; Internet performance evaluation studies; Internet performance testbeds; Performance evaluation of Web search engines; Performance evaluation of P2P systems RTSEC: Security for Internet-based real-time systems Security and availability of Web Services; Security/Performance trade-off; Distributed systems security; Language-based security; Formalisms for security and protocol verification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure networks from web-based threats DISAS: Disaster prevention and recovery Survivable networks on chips; Intrusion detection and defense; Alerting systems based on outstanding network events; Recovery methods in various networks; Disaster diagnosis and continuity plans; Fighting mechanisms for disaster of networks and applications; Global positioning systems; Vehicle localization and navigation systems; Disaster relief agencies to perform recovery operations; Survivability-driven defense and do-it-yourself disaster recovery; Security during disaster recovery; Budgeting disaster recovery; Networks emergency services; Reliable emergency communications and applications; Response to the networks emergency services; Disaster prevention and recovery; Fighting mechanisms for disaster of networks and applications; Networks resiliency methods; Recovery in various networks; Theory on robust networks; Customer protection and serviceability per
[ns] how to analyse the performance metrics of AODV, DSR & DSDV in ns-2
Hi Can anybody help to calculate the throughput, end-to-end delay and normalised routing load of AODV, DSR and DSDV protocol. For reference i am giving one sample table. How the sample is made. plz help me to calculate such parameter. plz plz help me. I want to analyse this performance metrics. Thanks a lot. Performance Comparison for 20 nodes packet size 1000 bytes and 0.015sec * * *Packet Sent* *Packet Received* *PDF* *Throughput* *End-to-End Delay* *Normalised Routing Load* *AODV* *1200* *368* *30.7* *20.4* *2.5* *4* *DSDV* *1200* *148* *12.3* *8.2* *2.3* *7.9* *DSR* *1200* *316* *26.3* *17.6* *2.2* *7.1* * * -- *With regards* * Rajib Das Assam India. *
[ns] Preliminary Call for Participation - PerCom'13, San Diego, March 18-22, 2013
PRELIMINARY CALL FOR PARTICIPATION = Eleventh IEEE International Conference on Pervasive Computing and Communications PerCom 2013 http://www.percom.org San Diego, USA March 18 - 22, 2012 Sponsored by: IEEE Computer Society, University of Texas at Arlington Technically co-sponsored by: IEEE TCCC, IEEE TCPP Industry Sponsors: Qualcomm, NICTA, IBM Research Other Sponsors: National Science Foundation, Pervasive and Mobile Computing Journal (ELSEVIER) *** Early Registration Deadline: February 26, 2013 *** http://percom.org/?q=registration Main Features: *** Two keynote speeches - see http://www.percom.org/?q=keynote *** 19 Full Papers and 8 Concise Contributions - see below *** Panel on "Intelligent Devices and Smart Spaces² *** Best Papers Session *** Work-in-Progress Session - see http://www.percom.org/?q=wip *** Demonstration Session - see http://www.percom.org/?q=demos *** PhD Forum - see http://www.percom.org/?q=phdforum *** 12 Workshops - see http://www.percom.org/?q=listofworkshops = Preliminary Program Outline = March 18: Pre-conference Workshops March 19-21: Main Conference March 19-20: Keynotes March 19: Demo and WiP sessions March 19: Welcome Reception March 20: Best Papers Session, PhD Forum March 20: Conference Banquet March 21: Panel March 22: Post Conference Workshops = Keynote Speakers = Dr Roy Want, Research Scientist, Google Inc., USA "The Golden Age of Pervasive Computing" Prof. David Culler, Howard Friesen Chair and Chair of Electrical Engineering and Computer Science, Department of Electrical Engineering and Computer Science, University of California, Berkeley, USA "Pervasive Communication and Interaction to make the Built Environment Better and more Sustainable" = Panel = Panel topic: "Intelligent Devices and Smart Spaces² Panel Chair: Peter Marx, Qualcomm, USA = Program = FULL PAPERS * Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring, Dennis Phillips (Michigan State University, USA); Rui Tan (Advanced Digital Sciences Center, Singapore); Mohammad Mahdi Moazzami (Michigan State University, Iran); Guoliang Xing (Michigan State University, USA); Jinzhu Chen (Michigan State University, USA); David Yau (Advanced Digital Sciences Center, Singapore) * Scheduling Sensors for Monitoring Sentient Spaces using an Approximate POMDP Policy, Ronen Vaisenberg (University of California - Irvine, USA); Alessio Della Motta (University of California, Irvine, USA); Sharad Mehrotra (University of California, Irvine, USA); Deva Ramanan (University of California - Irvine, USA) * Providing Privacy-Aware Incentives for Mobile Sensing, Qinghua Li (Pennsylvania State University, USA); Guohong Cao (Pennsylvania State University, USA) * Where Has My Battery Gone? Finding Sensor Related Energy Black Holes in Smartphone Applications, Yepang Liu (The Hong Kong University of Science and Technology, Hong Kong); Chang Xu (Nanjing University, P.R. China); Shing-Chi Cheung (The Hong Kong University of Science and Technology, P.R. China) * PIKE: Enabling Secure Interaction with PIggybacked Key-Exchange, Wolfgang Apolinarski (University of Duisburg-Essen, Germany); Marcus Handte (University of Duisburg-Essen, Germany); Umer Iqbal (Universität Duisburg-Essen Germany, Germany); Pedro Jose Marrón (University of Duisburg-Essen and Fraunhofer FKIE, Germany) * Effective Routine Behavior Pattern Discovery from Sparse Mobile Phone Data via Collaborative Filtering, Jiangchuan Zheng (Hong Kong University of Science and Technology, Hong Kong); Siyuan Liu (Carnegie Mellon University, USA); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong) * METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications, Kiran K. Rachuri (University of Cambridge, United Kingdom); Christos Efstratiou (University of Cambridge, United Kin
[ns] throughput is higher than cbr rate
Hi every body My throughput is higher than the CBR rate? I think it is not possible, anybody know the reason. -- Regards Fazlullah Khan