Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - wireless mobility
Search - wireless mobility - List
基于J2ME的一个可用的手机蓝牙程序,程序包括Server及Clien端(建议采用NetBeans 4.1+netbeans mobility 4_1+J2ME Wireless Toolkit 2.2)-availability of a Bluetooth phone procedures, The procedures include Server and Client ends (proposed NetBeans 4.1 netbean 's mobility 4_1 J2ME Wireless Toolkit 2.2)
Update : 2008-10-13 Size : 7.56kb Publisher : 赵龙

DL : 0
[wireless—Mobile Network] l MobiWan is a Mobile IPv6 extension for the NS simulator l MobiWan: NS-2 extensions to study mobility in Wide-Area IPv6 Networks l NS2 + MobiWan2的安裝 l MobiWan的安裝 (From Wireless Netorwork Lab at Beijing University of Posts and Telecommunications) l Ant-like Mobile Agents - NS2 Patch l SUMO – Simulation of UrBan Mobility ( AN open source traffic simulation package)
Update : 2008-10-13 Size : 2.64mb Publisher : 李炜

DL : 0
* Network Coding Network Simulator * * 06/10/05 - Aaron Drew * * This simulator is designed to test out the performance of a variety of network coding approaches. * * It simulates networks with dynamic topologies, reading from NS2 compatible node mobility files. * I assume that: * - wireless nodes are effected by a simple exponentially distributed noise floor. * - latency = distance x speed of light + fixed processing time + random jitter. * * These assumptions can be easily changed in the code below. * * The simulator is a simple discrete event-based simulator like NS2, GloMoSim and others but designed specifically to support * my network coding experiments. It has callbacks for 'transmit buffer empty' and may eventually support 'in air' collisions * of packets and multiple radio channels. I didn't want to have to build upon the unnecessary MAC layers that exist in the * other simulators. * * The network coding module in rlnc.h implements basic block encoding and decoding as well as block generation by intermediate * nodes that have received partial data.
Update : 2011-06-20 Size : 11.74kb Publisher : yeyueyushen@163.com

DL : 0
本章主要介绍GSM 有关的基础知识,诸如:GSM 发展简史、数字移动通信 技术、GSM 系统结构及相关接口、TDMA 帧结构、GSM 的区域定义及GSM 识别号、无线接口的逻辑信道及系统消息、GSM 系统的移动性管理和安全性 管理以及GSM 移动网络结构和信令网等。-This chapter introduces the basic knowledge of GSM-related, such as: GSM development history, digital mobile communication technology, GSM system architecture and related interfaces, TDMA frame structure, GSM regional definition and GSM identification numbers, logical channel wireless interfaces and systems news GSM system mobility management and security management, and GSM mobile network architecture and signaling networks.
Update : 2025-02-17 Size : 629kb Publisher : littleboy85

DL : 0
[wireless—Mobile Network] l MobiWan is a Mobile IPv6 extension for the NS simulator l MobiWan: NS-2 extensions to study mobility in Wide-Area IPv6 Networks l NS2 + MobiWan2的安裝 l MobiWan的安裝 (From Wireless Netorwork Lab at Beijing University of Posts and Telecommunications) l Ant-like Mobile Agents - NS2 Patch l SUMO – Simulation of UrBan Mobility ( AN open source traffic simulation package)-[wireless-Mobile Network] l MobiWan is a Mobile IPv6 extension for the NS simulatorl MobiWan: NS-2 extensions to study mobility in Wide-Area IPv6 Networksl NS2+ MobiWan2 installation l MobiWan installation (From Wireless Netorwork Lab at Beijing University of Posts and Telecommunications) l Ant-like Mobile Agents- NS2 Patchl SUMO- Simulation of UrBan Mobility (AN open source traffic simulation package)
Update : 2025-02-17 Size : 2.64mb Publisher : 李炜

无线通信的各种运动模型。适用于移动通信、无线传感器网络等领域。 包括:Random walk、random waypoint、random direction、boundless simulation area、 gauss-markov等运动模型 - probabilistic random walk -Wireless communication range of motion model. Applicable to mobile communication, wireless sensor networks and other fields. Including: Random walk, random waypoint, random direction, boundless simulation area, gauss-markov model, such as sports- probabilistic random walk
Update : 2025-02-17 Size : 29kb Publisher : netest08

DL : 0
Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends
Update : 2025-02-17 Size : 4kb Publisher : Muni

DL : 0
Advances of diverse wireless access technologies are defining the trends of future wireless networks, named Next Generation Wireless Networks (NGWN), where several access technologies will coexist and devices will be equipped with different network interfaces, in order to take advantage of each access technology. In NGWN communication maintenance is a concept willing to reach. Therefore, strategies to tackle mobility and multihoming issues are required. In this paper we propose an extension of HIP in order to cover challenges that end to end mobility presents in NGWN. Our approach consists on sending access technology related information before handover execution occurs, in order to optimize handover process. Moreover, the extension tackles QoS issues by sending application requirements as well as restrictions or improvements affecting its performance in the new access technology.
Update : 2025-02-17 Size : 979kb Publisher : serag

This dissertation contributes a jam-resistant communications protocol for use in mobile ad-hoc network (MANET). Speci c focus is given to the network layer rout- g of packets within a MANET. A MANET is a self-organizing multi-hop wireless twork that is comprised of many mobile hosts communicating wirelessly. As a result their mobility and dependence on wireless communications, network layer routing especially prone to errors. An algorithm has been developed using the concept concurrent codes to allow for jam-resistant wireless communications without a pre- shared secret. The algorithm allows for the recovery of messages even in the presence of signi cant noise. Experimental results show that a cross-layer protocol designed to take advantage of this property allows for more e ective communications in noisy environments such as disaster sites where current network protocols experience signif- icant packet loss rates. Ultimately, this research presents a communications protocol
Update : 2025-02-17 Size : 5.83mb Publisher : venkata

The mobility framework provides abstractions needed to develop network protocols for non-stationary wireless nodes.
Update : 2025-02-17 Size : 1.05mb Publisher : lemon7777

Performance of AODV Routing Protocol using Group and Entity Mobility Models in Wireless Sensor Networks. S H Manjula, C N Abhilash, Shaila K, K R Venugopal, L M Patnaik
Update : 2025-02-17 Size : 314kb Publisher : ayalcin

本文讨论了802.11标准定义的无线局域网的两种组网结构IBSS和ESS的工作原理,分析了它们的多地址帧结构在组网中的功能和作用,讨论了MAC协议对无线站点的移动性支持方面的不足,以及在组建多跳无线网时需要进一步解决的问题。-This article discusses the 802.11 standard defines two types of wireless LAN networking structure of the working principle of IBSS and ESS, and analysis of their multi-frame structure of the network address of the function and role in the discussion of the MAC protocol for wireless mobility support site deficiencies, as well as in the formation of multi-hop wireless networks need further problems.
Update : 2025-02-17 Size : 70kb Publisher : zt

Mobility Models for Wireless Ad-hoc Network Research
Update : 2025-02-17 Size : 893kb Publisher : kantaria

The proposed routing protocol for Wireless Sensor Network is hierarchical and cluster based. The protocol supports mobility in the Sensor Nodes as well as in the Sink. The entire protocol is described in terms of two phases namely Setup Phase and Data Forwarding Phase. After deployment of the Sensor Nodes entire sensor field in divided into some logical clusters and each cluster contains Sensor Nodes with different roles such as Gateway Node, Cluster Head Node and Ordinary Sensor Node. Majority of the computation intensive tasks are carried out in the Sink. Simulation results show the energy efficiency of the proposed protocol. The performance of the proposed protocol has been compared with that of CBR mobile WSN and results show better performance of the proposed protocol. Future scope of the work is outlined.
Update : 2025-02-17 Size : 702kb Publisher : Mohamed Rias

Double Mobility Mitigates Fading in Ad hoc Wireless Networks
Update : 2025-02-17 Size : 118kb Publisher : 李李

tcl script for wireless random waypoint mobility model.
Update : 2025-02-17 Size : 1kb Publisher : Dimuthu

The purpose of the project is to maintain efficient management of mobility in wireless networks, such that it allows maintaining mobile terminals ongoing communications while moving through IP network.
Update : 2025-02-17 Size : 618kb Publisher : RLVIJAY

该网络场景包含无线和有线两种方式,并且还有分层的移动模型-The simulation topology consists of a mixed wired and wireless scenario in which a hierarchical mobility model is used.
Update : 2025-02-17 Size : 5kb Publisher : 孙珍

In this paper, we study the issue of sensor network deployment using limited mobility sensors. By limited mobility, we mean that the maximum distance that sensors are capable of moving to is limited. Given an initial deployment of limited mobility sensors in a field clustered into multiple regions, our deployment problem is to determine a movement plan for the sensors to minimize the variance in number of sensors among the regions and simultaneously minimize the sensor movements. Our methodology to solve this problem is to transfer the nonlinear variance/movement minimization problem into a linear optimization problem through appropriate weight assignments to regions. In this methodology, the regions are assigned weights corresponding to the number of sensors needed.
Update : 2025-02-17 Size : 975kb Publisher : ShAzZ

无线广域网、无线城域网、无线局域网、无线个域网、无线体域网等无线网络 的基本特点,然后从无线网络的开放性、移动性、动态变化以及传输信号的不稳定性和终端设备等方面比较 了无线网络安全和有线网络安全的区别,最后提出并详细解释了解决无线网络安全问题的一般思路。-This article firstly introduces basic characteristics of various wireless networks, such as wireless wide area network, wireless metropolitan area network, wireless local area network, wireless personal area network, and wireless body area network. Next, the comparisons of wireless network security and wired network security are presented in terms of openness, mobility, dynamic topology generation, signal channel instability, and properties of terminal devices. Finally, a general research method for solving security problems in wireless networks is proposed and explained in details.
Update : 2025-02-17 Size : 1.13mb Publisher : song
« 12 3 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.