Location:
Search - NS2 MAC new
Search list
Description: Document containing details regarding changes to be made in ns2 to implement a new ieee 802.11 mac protocol.
Platform: |
Size: 24576 |
Author: prashub |
Hits:
Description: 讲解如何往NS2中添加新的MAC协议,很详细-NS2 explain how to add a new MAC protocol, in great detail
Platform: |
Size: 7168 |
Author: 朱云 |
Hits:
Description: 如何在NS2下,如何添加一个新的Mac协议,里面附有本人自己的安装经验,因为文档本身有错误。-How to NS2, how to add a new Mac the agreement, which is installed with my own experience, because the document itself has an error.
Platform: |
Size: 25600 |
Author: 最初的梦想 |
Hits:
Description: 本文在研究IEEE802.16e协议和SIP协议的基础上,提出了利用
SIP解决IEEE802.16接入网络中端到端切换的新方案。该方案采用跨
层切换的设计思想,联合MAC层和应用层SIP协议,在底层链路切换
的同时,完成应用层会话的修改,加快了切换过程,减少了切换时延,
提高了切换成功率。本文基于NS2仿真平台,完成了相应的仿真平台
搭建过程,实现了SIP协议模块和WiMAX协议模块的融合,扩展了SIP
协议模块的部分消息,最终在基于SIP协议模块和WiMAX协议的统一
NS2平台上实现了基于WiMAX接入、支持SIP扩展功能的SIP会话建
立和修改过程。
- On the basis of study of WiMfAX and SIP, a new mechanism using
SIP to achieve end-to-end handoff under IEEE802.16e access networks is
Ob
proposed
handoffs,
in this thesis. The mechanism adopts a cross-layer design
which means that the l}iIAC layer handoff procedure can
interleaved with that of the application layer. During the handoff at link
Platform: |
Size: 4511744 |
Author: 汪舵 |
Hits:
Description: The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security considered essential.
However, because of limited resources and low computing capacity of a sensor node, the
development of a mechanism that ensures security is a real design challenges.
In this report we have tried to propose a new security mechanism dedicated to WSN. Our
main objective is to secure the process of transferring data to the base station. The proposed
protocol protects transferred data against intruder nodes attacks, using a security
mechanism based on the use of control message MAC (Message Authentication Code) for
authentication. Our protocol performances are evaluated using the simulator NS2.
Platform: |
Size: 2359296 |
Author: magazana |
Hits:
Description: 本文着重研究网络中使用的MAC协议对语音传输过程的影响,以及无线传
感器网络中适用的语音编码算法。本文首先综述了现有无线传感器网络中常用
的MAC协议,对这些协议进行了分析比较。提出了一种新的基于TDMA的MAC
协议VR-TDMA,为了测试提出的协议性能,在NS2仿真平台上对该协议进行
了仿真,结果证明该协议具有良好的实时性能。然后研究了几种常用语音编码
算法的性能,通过比较研究,认为ADPCM语音编码算法的性能符合无线传感
器网络应用的要求,并对该算法进行了简化,减少了算法运行的计算量。实际
测试表明,算法具有良好的性能。
-In this paper,we concentrate on the mac protocols of wireless sensor networks,
especially the impact imposed on speech transmition.We also want to find a speech
coder which is fit for wireless sensor networks.Firstly,we intorduce the existing mac
protocol,such aS IEEE802.1 1,SMAC protocol,TRAMA protocol,DMAC protoc01.
Moreover we analyse and make comparison of them.Secondly,we propose a new
mac protocol named VR-TDMA.Simulation in NS2 proves that this protocol Canhave pleasing performance in real.time application.Thirdly,we
make a comparison
of some famous speech encoders.The result indicates that ADPCM(Adaptive
Di脏rential Pulse Code Modulation)is simpler than advanced low bit。rate VOICe
coding techniques and doesn’t require as heavy caculations.In this work,We simplify
the algorithm in order tO make it fit for the networks beaer.Actual tests prove that
this simplified algorithm work well in wireless sensor networks.
Platform: |
Size: 3294208 |
Author: 曾晓丽 |
Hits:
Description: In last decades, the demand of wireless spectrum has
increased rapidly with the development of mobile communication
services. Recent studies recognize that traditional fi xed spectrum
assignment does not use spectrum effi ciently. Such a wasting
phenomenon could be amended after the present of cognitive
radio. Cognitive radio is a new type of technology that enables
secondary usage to unlicensed user. This paper presents an
Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive
radios to access unoccupied resource opportunistically and coex-
ist with wireless local area network (WLAN). By a primary traffi c
predication model and transmission etiquette, OC-MAC avoids
producing fatal damage to licensed users. Then a ns2 simulation
model is developed to evaluate its performance in scenarios with
coexisting WLAN and cognitive network.-In last decades, the demand of wireless spectrum has
increased rapidly with the development of mobile communication
services. Recent studies recognize that traditional fi xed spectrum
assignment does not use spectrum effi ciently. Such a wasting
phenomenon could be amended after the present of cognitive
radio. Cognitive radio is a new type of technology that enables
secondary usage to unlicensed user. This paper presents an
Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive
radios to access unoccupied resource opportunistically and coex-
ist with wireless local area network (WLAN). By a primary traffi c
predication model and transmission etiquette, OC-MAC avoids
producing fatal damage to licensed users. Then a ns2 simulation
model is developed to evaluate its performance in scenarios with
coexisting WLAN and cognitive network.
Platform: |
Size: 177152 |
Author: eng |
Hits:
Description: Document to understand changes need to made in ns2 file system to implement new mac protocol
Platform: |
Size: 24576 |
Author: prashub |
Hits: