Description: Document containing details regarding changes to be made in ns2 to implement a new ieee 802.11 mac protocol. Platform: |
Size: 24576 |
Author:prashub |
Hits:
Description: 在网络仿真模拟工具下实现的MAC层最基本的CSMA协议-In the network simulation tool for the MAC layer to achieve the most basic CSMA protocol Platform: |
Size: 4096 |
Author:kaigo |
Hits:
Description: 网络仿真模拟工具NS2下实现的支持传感器网络的MAC协议SMAC-Network simulation tool NS2 under the support of sensor network MAC protocol SMAC Platform: |
Size: 23552 |
Author:kaigo |
Hits:
Description: 无线传感器网络802.15.4MAC层协议在仿真软件NS2上的实现-802.15.4MAC wireless sensor network layer protocol in the simulation software on the achievement of NS2 Platform: |
Size: 24576 |
Author:蒋子峰 |
Hits:
Description: Ad hoc网络中基于dsr路由协议改进的路由算法FETdsr,实现了在路由层跨层感知MAC层拥塞状况,从而选择拥塞较轻的路径。-Routing protocol for ad hoc networks based on dsr in NS2 simulation.
Achieved in the routing layer cross-layer aware MAC layer congestion status, and thus choose less congested paths. Platform: |
Size: 185344 |
Author:lily |
Hits:
Description: 车载自组网的发展与现状,包括网络结构 主要特点,应用举例,难点与重点,研究现状,物理层参数,MAC 层协议,帧结构,接入方式,802.11DCF,RR-ALOHA,CSMA/CA 和RR-ALOHA 的比较,路由协议
-Vehicle Development and Status of ad hoc networks, including the main features of network structure, application examples, difficulties with focused, current research, physical layer parameters, MAC layer protocol, frame structure, access methods, 802.11DCF, RR-ALOHA, CSMA/CA and RR-ALOHA comparison of routing protocols Platform: |
Size: 1007616 |
Author:张鸿云 |
Hits:
Description: 基于NS2的无线Mesh网络的MAC层的协议,IEEE802.16-NS2 for Wireless Mesh Networks based on the MAC layer protocol, IEEE802.16 Platform: |
Size: 22528 |
Author:yaya |
Hits:
Description: The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security considered essential.
However, because of limited resources and low computing capacity of a sensor node, the
development of a mechanism that ensures security is a real design challenges.
In this report we have tried to propose a new security mechanism dedicated to WSN. Our
main objective is to secure the process of transferring data to the base station. The proposed
protocol protects transferred data against intruder nodes attacks, using a security
mechanism based on the use of control message MAC (Message Authentication Code) for
authentication. Our protocol performances are evaluated using the simulator NS2. Platform: |
Size: 2359296 |
Author:magazana |
Hits:
Description: 本文着重研究网络中使用的MAC协议对语音传输过程的影响,以及无线传
感器网络中适用的语音编码算法。本文首先综述了现有无线传感器网络中常用
的MAC协议,对这些协议进行了分析比较。提出了一种新的基于TDMA的MAC
协议VR-TDMA,为了测试提出的协议性能,在NS2仿真平台上对该协议进行
了仿真,结果证明该协议具有良好的实时性能。然后研究了几种常用语音编码
算法的性能,通过比较研究,认为ADPCM语音编码算法的性能符合无线传感
器网络应用的要求,并对该算法进行了简化,减少了算法运行的计算量。实际
测试表明,算法具有良好的性能。
-In this paper,we concentrate on the mac protocols of wireless sensor networks,
especially the impact imposed on speech transmition.We also want to find a speech
coder which is fit for wireless sensor networks.Firstly,we intorduce the existing mac
protocol,such aS IEEE802.1 1,SMAC protocol,TRAMA protocol,DMAC protoc01.
Moreover we analyse and make comparison of them.Secondly,we propose a new
mac protocol named VR-TDMA.Simulation in NS2 proves that this protocol Canhave pleasing performance in real.time application.Thirdly,we
make a comparison
of some famous speech encoders.The result indicates that ADPCM(Adaptive
Di脏rential Pulse Code Modulation)is simpler than advanced low bit。rate VOICe
coding techniques and doesn’t require as heavy caculations.In this work,We simplify
the algorithm in order tO make it fit for the networks beaer.Actual tests prove that
this simplified algorithm work well in wireless sensor networks. Platform: |
Size: 3294208 |
Author:曾晓丽 |
Hits:
Description: In last decades, the demand of wireless spectrum has
increased rapidly with the development of mobile communication
services. Recent studies recognize that traditional fi xed spectrum
assignment does not use spectrum effi ciently. Such a wasting
phenomenon could be amended after the present of cognitive
radio. Cognitive radio is a new type of technology that enables
secondary usage to unlicensed user. This paper presents an
Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive
radios to access unoccupied resource opportunistically and coex-
ist with wireless local area network (WLAN). By a primary traffi c
predication model and transmission etiquette, OC-MAC avoids
producing fatal damage to licensed users. Then a ns2 simulation
model is developed to evaluate its performance in scenarios with
coexisting WLAN and cognitive network.-In last decades, the demand of wireless spectrum has
increased rapidly with the development of mobile communication
services. Recent studies recognize that traditional fi xed spectrum
assignment does not use spectrum effi ciently. Such a wasting
phenomenon could be amended after the present of cognitive
radio. Cognitive radio is a new type of technology that enables
secondary usage to unlicensed user. This paper presents an
Opportunistic Cognitive MAC Protocol (OC-MAC) for cognitive
radios to access unoccupied resource opportunistically and coex-
ist with wireless local area network (WLAN). By a primary traffi c
predication model and transmission etiquette, OC-MAC avoids
producing fatal damage to licensed users. Then a ns2 simulation
model is developed to evaluate its performance in scenarios with
coexisting WLAN and cognitive network. Platform: |
Size: 177152 |
Author:eng |
Hits: