[ns] kindly help me

2007-02-15 Thread sachin dahiya

  
i m trying to implement selective tcp in ns. my ns2 ver is ns-2.29 on 
cygwin.the procedure for ns 2.27 on linux is gven by the crator of this code as 
follows:
To run Selective-TCP:

1. Copy the following files in the ~ns-allinone/ns2.27/tcp/

tcp-newreno.cc
tcp.h
tcp-sink.h
tcp-sink.cc

2. Copy the following file in the ~ns-allinone/ns2.27/tcl/lib/

ns-default.tcl

3. The file 'nspath' has the required path settings. 


4. Recompile NS 

To Recompile

* Goto ~ns-allinone/ns2.27/ and type 
./make clean
./make depend
./make

but when i follow thses steps it could not work.is there any body who helped me 
in implementing this stcp .my ns2 path is usr/local/nsallinone-2.29/ns-2.29.
the above file used is attached in this mail.
specially the  3rd  4th step does not work.



[ns] kindly help me with the simulation of Sinkholes Attacks (ad-hoc network) on ns-2

2006-01-20 Thread Ashutosh Srivastava



Ashutosh Srivastava [EMAIL PROTECTED] wrote:dear all ,
   I am supposed to simulate the Sinkhole attack (made on 
Ad-Hoc Networks) . As i am quite new to  ns-2 programming I am unable to do so 
.The main problem is that how do we create routing tables for the different 
nodes in the ad-hoc network (or Mobile Network)  and then how can we 
represent the sending of information from a compromised node that it has the 
shortest route for a number of nodes . Kindly helpme 
  out as I am stuck badly here .Any sort of inputs are welcome .I am also 
including a definition of the sinkhole attacks at the bottom .

Expecting  a quick relief .
   
   
   
   
Sinkhole attacks 
  By carrying out a sinkhole attack, a compromised node tries to attract the 
data to itself from all neighboring nodes. Since this would give access to all 
data to this node, the sinkhole attack is the basis for many other attacks 
likes eavesdropping or data alteration. Sinkhole attacks make use of the 
loopholes in routing algorithms of ad hoc networks and present themselves to 
adjacent nodes as the most attractive partner in a multihop route. Even though 
by definition nodes on the network layer of an ad hoc network are equal, 
sinkhole attacks might be very effective on application level, where nodes may 
have different roles. This means, that as stated  the effect of sinkhole 
attacks on networks with centralized entities can be especially grave, because 
by impersonating the centralized node or its neighbors, the adversary can get 
access to the biggest part of the data flowing through the network.


Send instant messages to your online friends http://in.messenger.yahoo.com