Welcome![Sign In][Sign Up]
Location:
Search - ns2 code for vanet

Search list

[OtherMANET.tar

Description: ns-2 simulation code manet
Platform: | Size: 96256 | Author: ilayaraja | Hits:

[Othervanet_Skeleton_for_NS-2

Description: 基于NS-2的车辆Ad Hoc网络(VANET)的一个应用层协议框架,包含了代码和pdf说明文档-It is a VANET application protocol skeleton based on NS-2. Both source code and doc are included in RAR packet.
Platform: | Size: 185344 | Author: phenix | Hits:

[OtherNS2-Adhoc-contrast

Description: NS下的adhoc的路由协议比较 分析了仿真场景的生成,源代码的应用和仿真脚本的分析-NS under the adhoc routing protocol of a comparative analysis of the simulation scene generation, the application of source code analysis and simulation scripts
Platform: | Size: 261120 | Author: c | Hits:

[xml-soap-webservicea.nod

Description: Source code for Vanet project. This is in xml, used in sumo. you can use MOVE tool to connect between NS2 and sumo
Platform: | Size: 2048 | Author: chetan | Hits:

[Communication-Mobileperfect

Description: Code for vanet in ns2
Platform: | Size: 6144 | Author: harsh | Hits:

[Internet-NetworkSybil-attack-in-Vanets

Description: ns2 code for simulation of sybil attack in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11], the attacker who disguised itself as ID A sends wrongly the messages such as the information transmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations. It throws other vehicles into confusion. That is, as the objective of a Sybil attack is to make other vehicles change the route on the road or leave the road for the attacker, a Sybil attack can be a serious threat because it causes great damage to a VANET s function.This code will simulate sybil attack-ns2 code for simulation of sybil attack in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11], the attacker who disguised itself as ID A sends wrongly the messages such as the information transmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations. It throws other vehicles into confusion. That is, as the objective of a Sybil attack is to make other vehicles change the route on the road or leave the road for the attacker, a Sybil attack can be a serious threat because it causes great damage to a VANET s function.This code will simulate sybil attack
Platform: | Size: 27648 | Author: saadawais | Hits:

[Communicationo

Description: VANET BASED PATH PLANNING FOR ITS tcl code in NS2
Platform: | Size: 2048 | Author: san | Hits:

[Communication-Mobilens2_source-code-of-vanet-_119867.tar

Description: source code of vanet using ns2 .helpful for students and researcher . c++ code
Platform: | Size: 15360 | Author: mohammad | Hits:

[Internet-NetworkThroughput_Wireless

Description: vanet source code script for simulation by ns2
Platform: | Size: 19456 | Author: hung | Hits:

[Program docAd hoc ns2

Description: Matlab code for VANET
Platform: | Size: 33792 | Author: Ggas | Hits:

CodeBus www.codebus.net