aodv |
|
- Classification:Communications / Mobile - wireless network
- Development Tool:VC
- Sise:33.0 KB
- Upload time:2012/3/16 20:20:15
- Uploader:sajid457
- Download Statistics:
|
Description |
ad hoc on-demand distance vector routing
File list:
Mobility related terminology IETF Memo.doc
If you are a member, Log in. If you are not a member, Please register
|
Related source code |
[blackholeaodv] - the code contains the information about selfish node performance.
[Tcl-script-for-implementing-AODV-rou...] - Description:This network consists of 22 nodes. After creating the nam file and trace file, we set up topography object. Set node_ ($i) [$ns node] is used to create the nodes. Here we set the initial position for the every node by using initial_node_pos. server1 and server2 also created in this program. After that $Val (stop) is used to tell to nodes when the simulation ends. the nodes have Tcp connection. An "udp" agent is attached to node0, and a connection is established to udp "null" agent attached to server1 and node18 and etc.. As default, the maximum size of a packet that "udp" agent can generate is 1KByte. A tcp "null" agent generates and sends ACK packets to the sender (tcp agent) and frees the received packets. The Cbr is set to start at 0.0 sec and stop at 4.1 sec. Here we were using AODV routing protocol. The annotation trace is used to trace the details.
[aodv] - source code of aodv
[routing_aodv] - aodv routing protocol complete source code for mobile ad hoc networks
[AODVzip] - AODV protocol in tcl simulated in JSim
[wrls-aodv.tcl] - tcl script for AODV simulation. this is not my code, i got it from internet
[a-saodv_0.1.1.taaar] - these are complete ASAODV codes
[IDS_of_blackhole_attacksaodv] - Intrusion detection for black hole attack on AODV protocol.
[aa-saodv] - it is also a source code for SAODV protocol integrity of the source code has been tested. |
Download Address |
DownLoad
|
Comments: Don't forget to comment after downloading! Comment... |
|