General :: Installing Ns-2.1b5 In Fedora 14 For Implement Leach Algorithm?

Apr 27, 2011

i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.

otherwise please intimate what linux flavour will be suitable for ns-2.1b5

View 2 Replies


ADVERTISEMENT

General :: Added LEACH To Ns 2.35 ?

Apr 5, 2011

I have just added LEACH to Ns 2.35. HAd to make a couple of changes, but it has passed all the validation tests.

Now, while trying to run LEACH, am stuck at ::

I know this is from uamps.tcl. I know the file is there, and the env variables are set.

View 1 Replies View Related

General :: Running Leach On Ns2.34?

Feb 2, 2011

I am trying to run leach ns2.27 on ns2.34, how to do it am currently using ubuntu 10.4

View 14 Replies View Related

General :: Codes For Leach Protocol In Ns2?

Feb 23, 2011

i needed to implement leach protocol in ns2using linux redhat but i need the codes for leach protocol

View 2 Replies View Related

General :: How To Install Leach Patch In Ns2.34 In Ubuntu 9.10?

Aug 13, 2010

I am working on wsn security. I need to include the leach protocol as my model is hierarchial. I have found many threads about patching leach in ns2.27..But i need to know how can i include patch of leach in ns2.34 in ubuntu 9.10?

View 7 Replies View Related

General :: Add Patch For Leach Protocol In Ns2.33 In Ubuntu 9.10?

Mar 18, 2011

how to add patch for leach protocol in ns2.33 in ubuntu 9.10

View 2 Replies View Related

General :: Find A Leach Protocol Implementation For Ns2.34?

Aug 11, 2011

I am trying to find a leach protocol implementation for ns2.34 but all links available are dealing with ns2.27 Are the instructions valid for ns2.34?

View 4 Replies View Related

General :: Source Code Of Leach Protocol For NS2?

Jun 11, 2011

I need source code of leach protocol for NS2

View 1 Replies View Related

General :: Write Ns Code That Implements LEACH In A Network

Apr 25, 2010

I try to write a code that allows ns to simulate the operation of the leach protocol in a network but I can not find documentation that would allow me to do that. how should be the configuration of nodes and the base.

View 1 Replies View Related

Fedora :: How To Change CPU Scheduling Algorithm

May 3, 2011

I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?

View 2 Replies View Related

General :: Kernel Scheduling Algorithm

Sep 8, 2010

is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?

View 1 Replies View Related

General :: Best Way To Implement FTP Upload

Mar 10, 2010

I have followed following steps to implement, ftp upload by test1 user.

Code:
1. Add group ftp-users
# /usr/sbin/groupadd ftp-users

2. User test1 has been added to the group of ftp-users with /home/ftp-docs as home directory
# /usr/sbin/usermod -g ftp-users -d /home/ftp-docs test1

3. Ownership and permission of /home/ftp-docs has been changed to provide read/write access to user test1 and group ftp-users
# chown test1.ftp-users /home/ftp-docs
# chmod 770 /home/ftp-docs

But My intention is for the user who login with test1 user privileges, he should not be able to browse any other directories say /, /var /etc etc. Also he should not be able to change to any other directory. How can I accomplish this ?

View 2 Replies View Related

General :: How To Implement HMIPv6 In NS2

Apr 15, 2011

How can we implement HMIPv6 in ns2? Can we adapt it directly by implementing MIPv6 or we need any ,for example HMIPv6.cc?

View 7 Replies View Related

General :: How To Implement LS Command In C

Feb 16, 2010

Is there any function like mkdir() or link() for command ls? If not, how is ls implemented?

View 4 Replies View Related

General :: How To Implement Password Policies

Nov 24, 2010

How would I ensure that whenever any user changes the password it should meet following.
1)It should be more than 7 Characters.
2)Atleast one Upper case character,digit and special character present.
3)Password is not same as username or dictionary word .
4)User should get email after changing his password(I have already setup mail account and tested the setup).

Code:
Distribution Detail
# lsb_release -a
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID: EnterpriseEnterpriseServer
Description: Enterprise Linux Enterprise Linux Server release 5.2 (Carthage)
Release: 5.2
Codename: Carthage
# uname -a
Linux OFSMUW-VMGR-51 2.6.18-92.el5PAE #1 SMP Fri May 23 22:26:05 EDT 2008 i686 i686 i386 GNU/Linux

View 8 Replies View Related

General :: Implement Packet Reordering In NS2?

Oct 26, 2010

Does anybody know how to implement packet reordering in NS2? I would be very glad if someone provide me with appropriate tcl script or give a link.

View 3 Replies View Related

General :: Implement Different Mobility Models In Ns2?

Jul 11, 2010

i want to implement different mobility models in ns2, but i can not it

View 2 Replies View Related

Fedora Servers :: Implement Virtual Hosting In Vsftpd?

Jun 2, 2010

I am running vsftpd-2.2.2-3 on my Fedora 12 box. This box has multiple IPs. What I am looking for is make vsftpd listen on those multiple IPs and when a user FTPs to a certain IP, they get landed to the home directory that has been configured for the IP.

This feature is there in Proftpd and is called virtual hosting. I tried to find for Vsftpd such feature, but couldn't find out exactly how to implement in it. how to implement virtual hosting in Vsftpd?

View 1 Replies View Related

Software :: Differences Between LEACH Results On Ns2.1b5 And Ns2.35?

May 11, 2011

I have implemented LEACH on ns2.35. But, the simulation results vary highly from the LEACH paper. The energy consumption in ns2.35 seems to be 4-5 times that of the LEACH paper (which used ns2.1b5). So, I assume it is due to differences in ns2 versions.

View 2 Replies View Related

Ubuntu :: Add New Patch For Leach Protocol In Ns2.34?

Apr 4, 2010

How to add new patch for leach protocol in ns2.34 in ubuntu9.10

View 8 Replies View Related

General :: Implement Full Disk Encryption?

Jul 14, 2011

The only reason why I don't use Linux (even though I prefer Linux over Windows, and can do everything faster and more efficiently) is because each time I try to learn about dm-crypt I give up.

Can someone point me in the right direction for full OTFE on Linux (like TrueCrypt)?

View 1 Replies View Related

General :: Creating A Shell Using C Which Could Implement LS Command

Sep 4, 2010

I would like to create the shell which would support the LS command in C++. And the way the command prompt can be changed.

View 7 Replies View Related

General :: Implement Password Encryption In Subversion SVN?

May 12, 2011

Am configured SVN on Ubuntu 10.04 ,It's Working fine ;svn access method is svn://ipaddress .In this method am not encrypting the password ,Currently my passwd (/homesvnMyProject/conf )file like that [users]test = testNow i want to Implement the password Encryption for any users, without implementing svn+ssh:// method

View 1 Replies View Related

General :: Implement Pfexec In System / Use Sudo In It?

Dec 21, 2010

How can implement pfexec in Linux? Can i use sudo in Linux?

View 1 Replies View Related

General :: Implement Proxy Server With Firewall?

Feb 11, 2010

how to implement proxy server with firewall and the client users should be authinticated by asking username & password while opening their web browsers and finally i want to see the websites visted list of all the client computers On cent os 5.3

View 1 Replies View Related

General :: Implement Squid With Quota Restriction Based On Username?

Jan 20, 2011

I want to implement squid with quota restriction based on username.

View 4 Replies View Related

Programming :: Implementation Of RSA Algorithm In C / C++

Aug 2, 2010

Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.

View 1 Replies View Related

Programming :: MD5 Algorithm Implementation

Apr 27, 2011

I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?

View 3 Replies View Related

Software :: Best Program To Write Algorithm?

Oct 5, 2010

What would be the best program to write my algorithm, before sending them to my teacher?

View 4 Replies View Related

Software :: Change The Algorithm Of A Node In Ns2?

Jan 3, 2011

there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?

View 7 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved