[ns] newreno tcp explanation help-reg

2013-02-25 Thread abinaya rajendhiran

hi all!!
   plz, can anyone tell me where the fast recovery and fast retransmit
mechanisms is coded in tcp-new reno.cc file

-- 
Reagards.,
R.Abinaya,B.Tech,(M.E)


[ns] CFP: Special Issue on Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

2013-02-25 Thread Jaime Lloret Mauri


Special Issue on Intrusion Detection and Security Mechanisms for Wireless 
Sensor Networks

International Journal of Distributed Sensor Networks
ISI Thomson Impact Factor (2011): 0.203

Call for Papers

Wireless sensor networks are gaining significant interest from academia and 
industry. Wireless sensor networks are multihop, self-organizing, self-healing, 
and distributed in nature. These characteristics also increase vulnerability 
and expose sensor networks to various kinds of security attacks. Advance 
security mechanisms and intrusion detection systems (IDSs) can play an 
important role in detecting and preventing security attacks.

This special issue aims to gather recent advances in the area of security 
aspect of wireless sensor networks. It welcomes research and review articles 
that focus on the challenges and the state-of-the-art solutions. The papers 
will be peer reviewed and will be selected on the basis of their quality and 
relevance to the topic of this special issue. Potential topics include, but are 
not limited to:

• Intrusion detection systems
• Secure neighbor discovery, localization, and mobility
• Security architectures, deployments, and solutions
• Denial of service attacks and countermeasures
• Intrusion prevention techniques
• Adaptive defense systems
• Trust establishment and privacy
• Confidentiality, integrity, and availability assurance
• Authentication and access control
• Secure routing protocols
• Cryptography, encryption algorithms, and key management schemes
• Experimental validation and experiences with testbed and/or deployment

Before submission authors should carefully read over the journal's Author 
Guidelines, which are located at 
http://www.hindawi.com/journals/ijdsn/guidelines/. Prospective authors should 
submit an electronic copy of their complete manuscript through the journal 
Manuscript Tracking System at 
http://mts.hindawi.com/author/submit/journals/ijdsn/ids/ according to the 
following timetable:

Manuscript Due  Friday, 1 March 2013
First Round of Reviews  Friday, 24 May 2013
Publication DateFriday, 19 July 2013

Lead Guest Editor

S. Khan, IIT, Kohat University of Science and Technology (KUST), Kohat, Pakistan

Guest Editors

Jaime Lloret, Integrated Management Coastal Research Institute, Polytechnic 
University of Valencia, Valencia, Spain
Jonathan Loo, School of Engineering and Information Sciences, Middlesex 
University, London, UK



Re: [ns] [Aodvimpl] Modelling RREQ Flooding attack in AODV

2013-02-25 Thread itishi saxena



Hello Frd,

In ns2-aodv, RREQ is raised whenever a packet is added to the rqueue.If you 
want to send RREQ randomly without looking at your rqueue then you can use recv 
function and just call RREQ with some condition.

I think it will work for you.
Itishi



 From: teklay gebremichael teklis...@yahoo.com
To: aodvimpl-pub...@lists.sourceforge.net 
aodvimpl-pub...@lists.sourceforge.net 
Sent: Monday, 25 February 2013 7:15 PM
Subject: [Aodvimpl] Modelling RREQ Flooding attack in AODV
 

Hello every one,

I am currently working on a simulation study of Prevention of Flooding Attack 
in AODV routing protocol. I want just one of the nodes to be malicious and 
send fake RREQ to the network but i am new to the AODV code and don't know the 
things to be added or modified in the existing code of AODV and reflect this in 
the TCL code of the simulation.

Can any one suggest me on how to proceed to model the flooding attack?

Thanks in advance!
Teklay
--
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_feb
___
Aodvimpl-public mailing list
aodvimpl-pub...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/aodvimpl-public


[ns] seq id analysis of ns2 trace file

2013-02-25 Thread abinaya rajendhiran

hi all.,
i tried to analyze the number of packets retransmitted from trace file
using awk script... i hav traced out the seq count (since each packet has
unique sequence id) and i got the count values as follows,

Index: 75 Count: 1
Index: 76 Count: 1
Index: 77 Count: 1
Index: 78 Count: 1
Index: 79 Count: 1
Index: 80 Count: 1
Index: 81 Count: 23
Index: 85 Count: 1
Index: 88 Count: 2
Index: 91 Count: 3
Index: 93 Count: 2
Index: 95 Count: 2
Index: 97 Count: 2
Index: 99 Count: 2
Index: 101 Count: 2
Index: 103 Count: 2
Index: 105 Count: 2
Index: 107 Count: 2

can any help me to know the reason why the ack for seq id 81 is sent 23
timesis it possible to send dat much ack ???

-- 
Reagards.,
R.Abinaya,B.Tech,(M.E)