Dear all,
I'd like to make a simulation with ns-2 where the movement of the nodes is
modifiable by another program during the runtime of the ns-2 simulation. How
could I realize this? It seems that modifications of trace and movement files
are ignored by ns-2 after the files are read in by
Hi,
The standard of the AODV protocol contains a blacklist with nodes that are
excluded from the routing process. I did not find this blacklist in the ns-2
implementation of this protocol.
Did I miss this feature? If it is not implemented, how can I simulate a
blacklist?
Thank your
Hi all,
How could I simulate malicious nodes in mobile ad-hoc network with ns-2? These
nodes should drop forwarded packets instead of transmitting them to their
neighbours. I use the AODV routing protocol and the random waypoint model for
mobility.
What is the easiest way to implement the
Hello,
I'm trying to figure out how i can measure the created overhead which occured
in a network simulation. Actually we are trying to compare a new idea of
detecting malicious nodes with other old-fashion ways. One of our metrics is
the created overhead.
Assume we have a network with 100