General :: Installing Ns-2.1b5 In Fedora 14 For Implement Leach Algorithm?
Apr 27, 2011
i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.
otherwise please intimate what linux flavour will be suitable for ns-2.1b5
View 2 Replies
ADVERTISEMENT
Apr 5, 2011
I have just added LEACH to Ns 2.35. HAd to make a couple of changes, but it has passed all the validation tests.
Now, while trying to run LEACH, am stuck at ::
I know this is from uamps.tcl. I know the file is there, and the env variables are set.
View 1 Replies
View Related
Feb 2, 2011
I am trying to run leach ns2.27 on ns2.34, how to do it am currently using ubuntu 10.4
View 14 Replies
View Related
Feb 23, 2011
i needed to implement leach protocol in ns2using linux redhat but i need the codes for leach protocol
View 2 Replies
View Related
Aug 13, 2010
I am working on wsn security. I need to include the leach protocol as my model is hierarchial. I have found many threads about patching leach in ns2.27..But i need to know how can i include patch of leach in ns2.34 in ubuntu 9.10?
View 7 Replies
View Related
Mar 18, 2011
how to add patch for leach protocol in ns2.33 in ubuntu 9.10
View 2 Replies
View Related
Aug 11, 2011
I am trying to find a leach protocol implementation for ns2.34 but all links available are dealing with ns2.27 Are the instructions valid for ns2.34?
View 4 Replies
View Related
Jun 11, 2011
I need source code of leach protocol for NS2
View 1 Replies
View Related
Apr 25, 2010
I try to write a code that allows ns to simulate the operation of the leach protocol in a network but I can not find documentation that would allow me to do that. how should be the configuration of nodes and the base.
View 1 Replies
View Related
May 3, 2011
I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?
View 2 Replies
View Related
Sep 8, 2010
is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?
View 1 Replies
View Related
Mar 10, 2010
I have followed following steps to implement, ftp upload by test1 user.
Code:
1. Add group ftp-users
# /usr/sbin/groupadd ftp-users
2. User test1 has been added to the group of ftp-users with /home/ftp-docs as home directory
# /usr/sbin/usermod -g ftp-users -d /home/ftp-docs test1
3. Ownership and permission of /home/ftp-docs has been changed to provide read/write access to user test1 and group ftp-users
# chown test1.ftp-users /home/ftp-docs
# chmod 770 /home/ftp-docs
But My intention is for the user who login with test1 user privileges, he should not be able to browse any other directories say /, /var /etc etc. Also he should not be able to change to any other directory. How can I accomplish this ?
View 2 Replies
View Related
Apr 15, 2011
How can we implement HMIPv6 in ns2? Can we adapt it directly by implementing MIPv6 or we need any ,for example HMIPv6.cc?
View 7 Replies
View Related
Feb 16, 2010
Is there any function like mkdir() or link() for command ls? If not, how is ls implemented?
View 4 Replies
View Related
Nov 24, 2010
How would I ensure that whenever any user changes the password it should meet following.
1)It should be more than 7 Characters.
2)Atleast one Upper case character,digit and special character present.
3)Password is not same as username or dictionary word .
4)User should get email after changing his password(I have already setup mail account and tested the setup).
Code:
Distribution Detail
# lsb_release -a
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID: EnterpriseEnterpriseServer
Description: Enterprise Linux Enterprise Linux Server release 5.2 (Carthage)
Release: 5.2
Codename: Carthage
# uname -a
Linux OFSMUW-VMGR-51 2.6.18-92.el5PAE #1 SMP Fri May 23 22:26:05 EDT 2008 i686 i686 i386 GNU/Linux
View 8 Replies
View Related
Oct 26, 2010
Does anybody know how to implement packet reordering in NS2? I would be very glad if someone provide me with appropriate tcl script or give a link.
View 3 Replies
View Related
Jul 11, 2010
i want to implement different mobility models in ns2, but i can not it
View 2 Replies
View Related
Jun 2, 2010
I am running vsftpd-2.2.2-3 on my Fedora 12 box. This box has multiple IPs. What I am looking for is make vsftpd listen on those multiple IPs and when a user FTPs to a certain IP, they get landed to the home directory that has been configured for the IP.
This feature is there in Proftpd and is called virtual hosting. I tried to find for Vsftpd such feature, but couldn't find out exactly how to implement in it. how to implement virtual hosting in Vsftpd?
View 1 Replies
View Related
May 11, 2011
I have implemented LEACH on ns2.35. But, the simulation results vary highly from the LEACH paper. The energy consumption in ns2.35 seems to be 4-5 times that of the LEACH paper (which used ns2.1b5). So, I assume it is due to differences in ns2 versions.
View 2 Replies
View Related
Apr 4, 2010
How to add new patch for leach protocol in ns2.34 in ubuntu9.10
View 8 Replies
View Related
Jul 14, 2011
The only reason why I don't use Linux (even though I prefer Linux over Windows, and can do everything faster and more efficiently) is because each time I try to learn about dm-crypt I give up.
Can someone point me in the right direction for full OTFE on Linux (like TrueCrypt)?
View 1 Replies
View Related
Sep 4, 2010
I would like to create the shell which would support the LS command in C++. And the way the command prompt can be changed.
View 7 Replies
View Related
May 12, 2011
Am configured SVN on Ubuntu 10.04 ,It's Working fine ;svn access method is svn://ipaddress .In this method am not encrypting the password ,Currently my passwd (/homesvnMyProject/conf )file like that [users]test = testNow i want to Implement the password Encryption for any users, without implementing svn+ssh:// method
View 1 Replies
View Related
Dec 21, 2010
How can implement pfexec in Linux? Can i use sudo in Linux?
View 1 Replies
View Related
Feb 11, 2010
how to implement proxy server with firewall and the client users should be authinticated by asking username & password while opening their web browsers and finally i want to see the websites visted list of all the client computers On cent os 5.3
View 1 Replies
View Related
Jan 20, 2011
I want to implement squid with quota restriction based on username.
View 4 Replies
View Related
Aug 2, 2010
Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.
View 1 Replies
View Related
Apr 27, 2011
I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?
View 3 Replies
View Related
Oct 5, 2010
What would be the best program to write my algorithm, before sending them to my teacher?
View 4 Replies
View Related
Jan 3, 2011
there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?
View 7 Replies
View Related