Thursday, December 29, 2011

[ns] implementing ospf protocol code in ns2.

hello ns2 users,
im a beginner at using ns2. im persuing a mini final year project in
implementing ospf protocol in ns2. i have implemented some basic codes in
ns2. but i cudnt come implement the ospf protocol code. please can anyone
help me out? im really stuck and i dont have any professional help to guide
me through this.
i would be really thankful if someone could help me out with the ospf code.
looking forward to getting a reply very soon..
thank you.
u can email me at paradisepush@yahoo.in
--
View this message in context: http://old.nabble.com/implementing-ospf-protocol-code-in-ns2.-tp33049469p33049469.html
Sent from the ns-users mailing list archive at Nabble.com.

[ns] MAC 802

Hi Dear friends

In simulation script, in this command " set val(mac)
Mac/802_15_4 "
Where is the detailed information of this protocol (Mac/802_15_4)?
Is there any special file in NS2 about Mac 802?

[ns] acess point in ns2

hi evry body,

I need to simulate a network architecture (WLAN) with access point ,
but i didn't found any concept of it. We need to know if there is any
support available for Access Point ?

help me please


--
Bien Cordialement
Ben Rhaiem OLFA.
Etudiante Mastère Informatique et Multimédia (I2M).
---

Wednesday, December 28, 2011

Re: [ns] I can not set the position of HA,FA in nam

hi sir , i was wondering if you were able to fix this problme coz i have the
same problme
please let me know if you can
thanks

刘耀斯 wrote:
>
>
>
> I'm using ns-2.28 for the simulation of Mobile IP.
>
> I set the positions of MN(MobileNode), HA(HomeAgent), FA1(ForeignAgent),
> FA2 are (10,10), (10,10), (800,20), (800,800). And the topo that I set is
> 1000*1000. When the ns run, the positions of HA and FA are not what I set
> in NAM.However the MN's position is correct.
>
> I'd appreciate any help and any pointer to how I can find & fix this
> problem.
>
>
>
>
> The TCL scpirt as follow:
>
> set opt(chan) Channel/WirelessChannel
> set opt(prop) Propagation/TwoRayGround
> set opt(netif) Phy/WirelessPhy
> set opt(mac) Mac/802_11
> set opt(ifq) Queue/DropTail/PriQueue
> set opt(ll) LL
> set opt(ant) Antenna/OmniAntenna
> set opt(ifqlen) 50
> set opt(nn) 1
> set opt(adhocRouting) DSDV
> set opt(x) 1000
> set opt(y) 1000
> set opt(stop) 200
> set opt(ftp1-start) 10.0
>
> set num_wired_nodes 2
>
> set ns_ [new Simulator]
>
> $ns_ node-config -addressType hierarchical
>
> AddrParams set domain_num_ 4
> lappend cluster_num 2 1 1 1
> AddrParams set cluster_num_ $cluster_num
> lappend eilastlevel 1 1 1 1 1
> AddrParams set nodes_num_ $eilastlevel
>
> set mytrace [open wiredcumwireless.tr w]
> set mynamtrace [open wiredcumwireless.nam w]
> $ns_ trace-all $mytrace
> $ns_ namtrace-all-wireless $mynamtrace $opt(x) $opt(y)
>
> set topo [new Topography]
>
> $topo load_flatgrid $opt(x) $opt(y)
>
> create-god [expr $opt(nn)+3]
>
> set temp {0.0.0 0.1.0};
> for {set i 0} {$i < $num_wired_nodes} {incr i} {
> set W($i) [$ns_ node [lindex $temp $i]]
> }
> $W(0) label "CN"
> $W(1) label "Gateway"
>
> $ns_ node-config -mobileIP ON \
> -adhocRouting $opt(adhocRouting) \
> -llType $opt(ll) \
> -macType $opt(mac) \
> -ifqType $opt(ifq) \
> -ifqLen $opt(ifqlen) \
> -antType $opt(ant) \
> -propType $opt(prop) \
> -phyType $opt(netif) \
> -channelType $opt(chan) \
> -topoInstance $topo \
> -wiredRouting ON \
> -agentTrace ON \
> -routerTrace OFF \
> -macTrace OFF \
>
>
> set HA [$ns_ node 1.0.0]
> set FA1 [$ns_ node 2.0.0]
> set FA2 [$ns_ node 3.0.0]
> $HA random-motion 0
> $FA1 random-motion 0
> $FA2 random-motion 0
>
> $HA set X_ 20.00
> $HA set Y_ 20.00
> $HA set Z_ 0.00
> $HA label "HA"
> $FA1 set X_ 800.00
> $FA1 set Y_ 200.00
> $FA1 set Z_ 0.00
> $FA1 label "FA1"
> $FA2 set X_ 800.00
> $FA2 set Y_ 800.00
> $FA2 set Z_ 0.00
> $FA2 label "FA2"
>
> $ns_ node-config -wiredRouting OFF
> set MN [$ns_ node 1.0.1]
> set node_(0) $MN
> $MN label "MN"
>
> set HAaddress [AddrParams addr2id [$HA node-addr]]
> [$MN set regagent_] set home_agent_ $HAaddress
>
> $MN set Z_ 0.00
> $MN set Y_ 10.00
> $MN set X_ 10.00
>
> $ns_ at 10 "$MN setdest 750.00 50.00 30.00"
> $ns_ at 100 "$MN setdest 900.00 900.00 30.00"
> $ns_ at 150 "$MN setdest 5.00 5.00 30.00"
>
> $ns_ duplex-link $W(0) $W(1) 5Mb 2ms DropTail
> $ns_ duplex-link $W(1) $HA 5Mb 2ms DropTail
> $ns_ duplex-link $W(1) $FA1 5Mb 2ms DropTail
> $ns_ duplex-link $W(1) $FA2 5Mb 2ms DropTail
> $ns_ duplex-link-op $W(0) $W(1) orient down
> $ns_ duplex-link-op $W(1) $HA orient left-down
> $ns_ duplex-link-op $W(1) $FA1 orient right-down
> $ns_ duplex-link-op $W(1) $FA2 orient right-up
>
> set tcp1 [new Agent/TCP]
> $tcp1 set class_ 2
> set sink1 [new Agent/TCPSink]
> $ns_ attach-agent $W(0) $tcp1
> $ns_ attach-agent $MN $sink1
> $ns_ connect $tcp1 $sink1
> set ftp1 [new Application/FTP]
> $ftp1 attach-agent $tcp1
> $ns_ at $opt(ftp1-start) "$ftp1 start"
>
> for {set i 0} {$i < $opt(nn)} {incr i} {
> $ns_ initial_node_pos $node_($i) 10
> }
>
> for {set i 0} {$i < $opt(nn)} {incr i} {
> $ns_ at $opt(stop).0 "$node_($i) reset";
> }
> $ns_ at $opt(stop).0 "$HA reset"
> $ns_ at $opt(stop).0 "$FA1 reset"
> $ns_ at $opt(stop).0 "$FA2 reset"
> $ns_ at $opt(stop).0002 "puts \"NS EXITING...\";$ns_ halt"
> $ns_ at $opt(stop).0001 "stop"
> proc stop {} {
> global ns_ mytrace mynamtrace
> close $mytrace
> close $mynamtrace
> exec nam wiredcumwireless.nam &
> exit 0
> }
> puts "Strating Simulation..."
> $ns_ run
>
> ------------------
>
>
>
>
>
> Best regards!
>
> YosefLiu
>

--
View this message in context: http://old.nabble.com/I-can-not-set-the-position-of-HA%2CFA-in-nam-tp32886852p33048957.html
Sent from the ns-users mailing list archive at Nabble.com.

[ns] convergence layer for bundle protocol in ns2

Nisha wrote:
>
>
> Hello! ns-users,
>
> I am working on delay tolerent network(DTN) in ns2. i want to
> implement tcp and udp convergence layer in ns2 for dtn netwotk.so
> convergence layer convert packets(segments) from transport layer to
> appropriate bundle for bundle protocol. please send me the code for
> convergence layer in ns2 also tcl file.
>
> Please help me.
>
>
> Thanking You.
>
>
>
>
--
View this message in context: http://old.nabble.com/convergence-layer-for-bundle-protocol-in-ns2-tp33046728p33046728.html
Sent from the ns-users mailing list archive at Nabble.com.

Re: [ns] Delay tolerant network (DTN) simulation in ns2

Nisha wrote:
>
>
> I have one link for DTN simulation in ns2
>
> http://www.illuvatar.nu/ns-dtn/code/
>
>
>

--
View this message in context: http://old.nabble.com/Delay-tolerant-network-%28DTN%29-simulation-in-ns2-tp32844846p33046235.html
Sent from the ns-users mailing list archive at Nabble.com.

[ns] Fwd: CBR rate and data rate

---------- Forwarded message ----------
From: Zubiya .. <zubiyaa@gmail.com>
Date: Wed, Dec 28, 2011 at 9:12 PM
Subject: CBR rate and data rate
To: ns-users@isi.edu


Hi!
I want to know that for different data rates how to select cbr rate?
for different data rates of 802.11a and 802.11b what should be the value
for cbr rate

Thanks in advance

--
Regards

--
Regards


LA ILAHA ILLALLAHU MUHAMMADUR RASOOLULLAH

[ns] CBR rate and data rate

Hi!
I want to know that for different data rate how to select cbr trate?
for different data rates of 802.11a and 802.11b what should be cbr value

Thanks in advance

--
Regards

[ns] Handover Scenario

hi ns users
does anyone have any handover scenario regarding mobile wimax , please if you do sent me i need it on my assignment please help me out ..
best regards to all

Tuesday, December 27, 2011

[ns] how to measure energy consumption

[ns] Rate Adaptation for the Multirate 802_11 using ARF Algorithm

Dear all,

I am trying to implement the link adaptation of the 802.11g using the ARF (or the RBAR) algorithm. I added the following piece of code to the adhoc_tcp.tcl (the sample file in the dei80211mr-1.1.4), but doesn't change the rate correctly. Can anyone provide me some hints in this regard?

set ra($i) [new RateAdapter/ARF]
$ra($i) attach2mac $mac($i)
$ra($i) use80211g
$ra($i) setmodeatindex 0

Thank you!
Firooz

[ns] FW: wimax simulation_nist module: multiple BSs

Hi Nor Affida M.Zin,


I have tried to run a simulation with 2 BS but failed. I didn't find any docs regarding this. So if you find let others also to know about this.

If anyone knows about this please replay.

 
,
Sajeeb Saha
10th Batch,CSEDU
+8801914754181

  


________________________________
From: Nor Affida M.Zin <insyirah12@hotmail.com>
To: ns-users@ISI.EDU
Sent: Tuesday, 27 December 2011, 14:34
Subject: [ns] FW: wimax simulation_nist module: multiple BSs


Hello,

Has anyone do the wimax simulation using the nist module? Can this module support the simulation for multiple base stations (BSs)?

Thanks and Regards
Nor Affida M. Zin
Postgraduate Student
Photonic Technology Center
Faculty of Electrical Engineering
Universiti Teknologi Malaysia

[ns] FW: wimax simulation_nist module: multiple BSs

Hello,

Has anyone do the wimax simulation using the nist module? Can this module support the simulation for multiple base stations (BSs)?

Thanks and Regards
Nor Affida M. Zin
Postgraduate Student
Photonic Technology Center
Faculty of Electrical Engineering
Universiti Teknologi Malaysia

Monday, December 26, 2011

[ns] [IEEE AOC 2012] Call for Papers

--------------------------------------------------------------------------------
                             CALL FOR PAPERS
                      Sixth IEEE WoWMoM Workshop on
           Autonomic and Opportunistic Communications (AOC 2012)
              June 25, 2012 - San Francisco, California, USA
                      http://cnd.iit.cnr.it/aoc2012/

                         jointly supported by the

                            SCAMPI project
                funded by the FP7-ICT Programme under the
       Future Internet Research and Experimentation (FIRE) initiative
                       http://www.ict-scampi.eu/

                                  and

                            RECOGNITION project
                funded by the FP7-ICT Programme under the
            Future and Emerging Technologies (FET) initiative
                     http://www.recognition-project.eu/


               Fast Track on Computer Communication Journal
                 http://www.elsevier.com/locate/comcom


           **** Submission Deadline --- February 17, 2012 ****
--------------------------------------------------------------------------------


The diffusion of lightweight,  powerful  portable devices,  also enriched with a
variety of sensing capabilities,  is enabling new ways for users' communication,
and laying the foundation for realizing  the ubiquitous networking idea.  Acting
either  as  the  main communication mode  or as complement  to  existing  mobile
network infrastructures, opportunistic networking  can leverage  the mobility of
end  users  and  enhance their  communication  capabilities.   The opportunistic
exploitation of extemporary  contacts  among  the users of the network paves the
way to a  number of applications but also poses  new and challenging problems to
the  networking research community.   The AOC 2012 workshop aims at serving as a
meeting point  for people  working in the area and a forum for exchanging ideas,
discussing solutions,  and sharing experiences among researchers, professionals,
and  application  developers,  both  from industry  and academia.  As  with  the
previous  five editions  of the AOC workshop series,  the scope  of  this year's
workshop  will remain  on general issues related to opportunistic networking and
computing.  Yet,  AOC 2012  will have  a primary interest in  new directions  of
opportunistic communications,  such as service composition techniques, scenarios
of co-existence  with infrastructure networks,  and  insights to their operation
coming from other disciplines such as game theory  and cognitive psychology. The
workshop  will solicit  original papers  addressing  theoretical  and  practical
aspects of autonomic and opportunistic communications but also papers describing
prototype implementations and deployments.


Topics of interest for AOC 2012 include, but are not limited to:

*   Routing, transport, and reliability issues
*   Techniques for data dissemination and replication
*   Applications and middleware support, mobile social networking applications
*   Mobility models and statistical analysis of mobility traces
*   Context and social awareness mechanisms and algorithms
*   Co-existence of opportunistic networks with infrastructure mobile wireless
  networks
*   Service composition in autonomic and opportunistic networks
*   Cognition-driven information processing and decision making
*   Performance modelling, scaling laws, and fundamental limits for autonomic
  and opportunistic communications
*   Game-theoretic insights to the operation of autonomic and opportunistic
  networks
*   Participatory and urban sensing in autonomic and opportunistic networks
*   Trust, security, and reputation
*   Autonomic and opportunistic communication testbeds and prototypes,
  measurement data from real experiments
*   Socio-economic models for  autonomic and opportunistic communications

PAPER SUBMISSION AND PUBLICATION
--------------------------------

Papers should neither have been published elsewhere  nor being currently under
review  by another conference or journal.  Manuscripts are limited to 6 pages,
single  spacing,  double  column,  and  must  strictly  adhere to the template
format.  Guidelines  on  paper  submission  and  formatting  are available  at
http://cnd.iit.cnr.it/aoc2012/.

Accepted papers will appear in the symposium proceedings published by IEEE. At
least  one author of  each accepted paper  is required to register and present
his/her  work at  the workshop.  There  will be no  separate  registration for
workshop, but one single registration will cover both conference and workshops
participation.

Extended versions  of workshop selected papers will be considered for possible
fast  track publication  on  the  Computer Communications  Journal (Elsevier).


IMPORTANT DATES
---------------
Full papers due:   February 17, 2012
Notification:          April 4, 2012
Workshop:              June 25, 2012


ORGANIZING COMMITTEE
--------------------

WORKSHOP Chairs
Merkouris Karaliopoulos,  University of Athens, Greece
Chiara Boldrini, IIT-CNR, Italy

STEERING Committee
Marco Conti, IIT-CNR, Italy
Silvia Giordano, SUPSI, Switzerland
Ioannis Stavrakakis, University of Athens, Greece

PUBLICITY Chairs
Fabio Pezzoni, IIT-CNR, Italy
Pushpendra Singh, IIIT Delhi, India


PROGRAM COMMITTEE (confirmed so far)
------------------------------------

Gergely Acs, BUTE, Hungary
Eleonora Borgia, IIT-CNR, Italy
Vania Conan, Thales, France
Serge Fdida, UPMC, Paris VI, France
Laura Galluccio, University of Catania, Italy
Nidhi Hegde, Technicolor, France
Tristan Henderson, University of St. Andrews, UK
Gunnar Karlsson, KTH, Sweden
Mohan Kumar, University of Texas at Arlington, USA
Kyunghan Lee, North Carolina State University, USA
Franck Legendre, ETH Zurich, Switzerland
Daniele Miorandi, Create-net, Italy
Refik Molva, Eurecom, France
Valtteri Niemi, Nokia, Switzerland
Katia Obraczka, University of California, Santa Cruz, USA
Konstantinos Oikonomou, Ionian University, Greece
Joerg Ott, HUT, Finland
Elena Pagani, Universita' degli Studi di Milano, Italy
Andrea Passarella, IIT-CNR, Italy
Daniele Puccinelli, SUPSI, Switzerland
Christian Rohner, Uppsala University, Sweden
Fabrizio Sestini, EU Commission
Abdullatif Shikfa, Alcatel Lucent Bell Labs, France
Thrasyvoulos Spyropoulos, EURECOM, France
Roger Whitaker, Cardiff University, UK
Hongyi Wu, University of Louisiana at Lafayette, USA
Eiko Yoneki, University of Cambridge, UK
Franco Zambonelli, University of Modena-Reggio, Italy


====================================================
Fabio Pezzoni - AOC2012 Publicity Chair

  Institute for Informatics and Telematics (IIT)
  Italian National Research Council (CNR)
  Via G. Moruzzi, 1 - 56124 Pisa, Italy
  phone: +39 050 315 2195
  email: fabio.pezzoni@iit.cnr.it
====================================================

[ns] Perl script which analyses a new-tracefile generated from an ns2 simulation.

Dear All,

In my ns2 MANET studies I have developed a Perl script which analyses a
new-tracefile and computes several metrics and measurements from the trace
file. The tool is capable of handling AODV, DSR, OLSR and DSDV traces.

Once I get the necessary authorisation from my superiors, I am interested
in sharing this tool together with the documentation. How can I share such
code and documentation. And what is the right procedure which I need to
follow to share this tool?

Thanks for your support.
Best regards,
Eric

Sunday, December 25, 2011

[ns] -how to set the pause time inside Tcl Script

Dear NS users,

I generated a movement model using the ./setdest. I did it with parameters such as speed and pause time. But actually, I am running my script depending on the average speed of nodes and I want to set the pause time value depending on the value of the average speed.

So, could you tell me please if I can change the pause time value from within the Tcl script please.

Thank you in advance

Thamer Jahamneh

Saturday, December 24, 2011

[ns] ns vanet protocol

Hi,
i need the code of the vanet protocol GPCR. I plan to implement it on ns2
help me plz
thkx
Fatma

Friday, December 23, 2011

[ns] WRP and FSR

Dear All,

I am new to ns2, i want to simulate the WRP and FSR routing protocols
for MANET. I have installed ns2.34 and working. Please send me the
required patches with instruction.

I will be very thankful to you.

Thanks in advance
Seeking for kind response

Regards
Aziz
aziz.buner@gmail.com

[ns] How can a route cache be deleted of a node using DSR protocol ?

> Hello Experts,
> Is it possible to delete route cache of a source node at
> certain time if the topology is using DSR routing protocol. What is the tcl
> code for this ?
>


> Reply please.....Thanx n Regards
>
> Chandrabhan Pradhan
>
MTech, CSE

> 9993559009
>
>

[ns] security implementation

hi all . does anyone have a tcl script scenario of implementing authentication features or any security  protocol on handover wimax any security implementation will help thank a lot 

Wednesday, December 21, 2011

[ns] Security features in ns-2

can you please let me know if i can implement any security protocal in ns-2 , like PKM version 1 or 2
i want to put security features to a handover model on mobile wimax ,
ps: am using ns-2.29 with nist mobility model
thanks all

[ns] Deadline extension || CfP: SMART 2012 || May 27 - June 1, 2012 - Stuttgart, Germany

INVITATION:

=================
Please, consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish
original scientific results to SMART 2012.

The submission deadline is extended to January 16, 2012.

In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals:
http://www.iariajournals.org
=================


============== SMART 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

SMART 2012, The First International Conference on Smart Systems, Devices and Technologies

May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/SMART12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPSMART12.html

- regular papers
- short papers (work in progress)
- posters
- ideas


Submission page: http://www.iaria.org/conferences2012/SubmitSMART12.html
Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards,
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to,
topic areas.


All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: http://www.iaria.org/editorialrules.html

All tracks/topics are open to both research and industry contributions.

SMART 2012 Topics (topics and submission details: see CfP on the site)

Future cities
Digital cities
Senseable city networks
Smart houses
Dynamic urban communications
Knowledge on urban economy
Public display and search
Indoor communications
SHUI (Smart Home User Interfaces)
Smart mobility
Pervasive urban applications
Ubiquitous computing in digital cities
Mobile crowdsourcing applications
Rural communications
Ambient assisted living
Smart multimedia services
Smart antennas
Smart urban electric cars
Smart atmospheric and population migration measurements
Smart energy and optimal consumption
Smartphones
Smart spaces
Ecological cities
Interactions between smart cities
Health informatics in smart cities
Mobility monitoring and control in smart environments
Navigating in smart environments
Smart information processing
Smart analytics
Internet of things in smart environments
Social networking in smart environments
Use Cases for Smart Homes/Cities
Sociocultural challenges in smart environments
Costs associated with smart cities

------------------------------

Technical Program Committee [open, in progress]
http://www.iaria.org/conferences2012/ComSMART12.html
====================

[ns] Deadline extension || CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart, Germany

INVITATION:

=================
Please, consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish
original scientific results to ICIMP 2012.
The submission deadline is extended to January 16, 2012.
In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals:
http://www.iariajournals.org
=================


============== ICIMP 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection
May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/ICIMP12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html

- regular papers
- short papers (work in progress)
- posters
- ideas


Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html

Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards,
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to,
topic areas.


All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: http://www.iaria.org/editorialrules.html


ICIMP 2012 Topics (topics and submission details: see CfP on the site)

TRASI: Internet traffic surveillance and interception

Methods and context to classify legal and illegal traffic; Methods and procedure to classify wanted and undesired
traffic; Overloads, attacks, and failures; Detection of attacks via protocols and applications; Undesired traffic
evaluation; Traffic identification caused by malicious code (spam, virii, and worms, etc.); Traffic profile during
disaster recovery; Traffic during active emergency services; Early warning on growing undesired traffic; Access control
and audit detection points; Denial of service; Spoofing; Lawful interception; Multi-modal undesired traffic detection;
Measurements and data mining correlation; Countermeasures on undesired traffic

IPERF: Internet performance

Performance-oriented design; Active and passive performance monitoring; Performance metrics and measurements;
Measurement-based performance evaluation in Internet; System measurement and monitoring; Performance model verification
and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical performance; Performance of Internet routing;
Performance optimization; Internet performance prediction; Internet performance evaluation studies; Internet performance
testbeds; Performance evaluation of Web search engines; Performance evaluation of P2P systems

RTSEC: Security for Internet-based real-time systems

Security and availability of Web Services; Security/Performance trade-off; Distributed systems security; Language-based
security; Formalisms for security and protocol verification; Performance on firewall protected real-time systems; Security
management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response
security service; Protecting emergency communications from misuse and exploitation; Maintaining security in the face of
disaster; Intrusion prevention and detection systems; Secure networks from web-based threats

DISAS: Disaster prevention and recovery

Survivable networks on chips; Intrusion detection and defense; Alerting systems based on outstanding network events;
Recovery methods in various networks; Disaster diagnosis and continuity plans; Fighting mechanisms for disaster of
networks and applications; Global positioning systems; Vehicle localization and navigation systems; Disaster relief
agencies to perform recovery operations; Survivability-driven defense and do-it-yourself disaster recovery; Security
during disaster recovery; Budgeting disaster recovery; Networks emergency services; Reliable emergency communications and
applications; Response to the networks emergency services; Disaster prevention and recovery; Fighting mechanisms for
disaster of networks and applications; Networks resiliency methods; Recovery in various networks; Theory on robust
networks; Customer protection and serviceability perception; Cost models and business impact; Cultural and legal aspects;
Future advanced network development and evolution; Standards and guidelines; Lawful interception and defense strategies;
Security issues with emergency services and disaster recovery

EMERG: Networks and applications emergency services

Survivability architecture for e-commerce; Emergency and non-emergency services; Emergency coverage and intermittent
services; PSAPs and emergency services; Future 911 PSAP message interfaces; Reliable emergency communications; Next
generation of emergency communications; Response to the networks emergency services; Voice emergency notification services

MONIT: End-to-end sampling, measurement, and monitoring

Internet monitoring techniques and procedures; Monitoring tools, functions, and metrics; Combining, filtering, and
reporting monitoring metrics; Theory and practice on sampling/inversion problem (accuracy, complexity, etc.); Distributed
and adaptive sampling techniques; Sampling & inverting traffic with passive and active systems; Internet end-to-end
measurements from a sampling perspective; Impact of sampling on anomaly detection; Mechanisms for sampling the Internet
traffic or collected traces; On-line and off-line metrics and measurements; Incident estimation and monitoring; Internet
access monitoring; Spy software; Internet monitoring, filtering and blocking software; Monitoring Internet traffic to
optimize network bandwidth; Remote monitoring

REPORT: Experiences & lessons learnt in securing networks and applications

Platforms for electronic distribution of plane tickets; Platforms for electronic distribution of hotel booking; Data
accuracy; E-trade strengths and weaknesses; Malicious spyware; Blocking without quarantining the systems/networks;
Out-of-band intrusion prevention; Antivirus e-mail gateways software; Security and vulnerability engineering

USSAF: User safety, privacy, and protection over Internet

Countermeasures on fraud prevention; Trust, trust estimators, and trust mitigation in public e-business; Customer
protection and serviceability perception; Privacy impacts of emergency presence services; Authentication/authorization;
Biometric methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security
analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages;
Presence protocols; Priority user service

SYVUL: Systems vulnerabilities

Vulnerability specification languages; System vulnerability assessment; Formal methods for safety-critical systems;
Prediction capabilities of vulnerability discovery models; Highly vulnerable systems; Critical vulnerabilities; Errors and
configurations leading to vulnerabilities; Incident reports and handling; Networks resiliency methods; Capacity planning
for resilience and emergency; Operational resilience; Theory of disaster-tolerant systems; Web service vulnerability;
Protocol vulnerability; Vulnerabilities in database systems; Vulnerability in control systems; Vulnerability analysis and.
requirements for the security; Vulnerabilities by self-managed sensors; Recovery by disruption resource procedures; Common
vulnerability scoring systems; Cost models and vulnerability business impact

SYDIA: Systems diagnosis

Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; Process algebras for systems diagnosis;
Probabilistic diagnosis of multiprocessor systems; Self-diagnosis in distributed systems; Cognitive system diagnosis;
System diagnosis using propagation models; Technical intuition in systems diagnosis; Managing conflicts in systems
diagnosis; Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; Remote system diagnosis; Diagnosis licensing;
Real-time symptom detection and fixing actions; Forensic/real-time/anticipative diagnosis; Diagnosing mobility-oriented
systems; Diagnosis of discrete event systems; Diagnosis of complex dynamical systems

CYBER-FRAUD: Cyber fraud

Epidemiological models for warware and cyber-crime propagation; Record and retrieval of cyber-crimes; Forensic
analysis; Cyber-crime prevention; Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed cyber-attacks;
Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Spyware and malware; Cyber-pranks, hoaxes;
Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and security of
cyber-reports; Fighting cyber-crimes; Cyber-crime laws

BUSINESS: Business continuity

Regulatory compliance; Techniques for business continuity planning in the real world; Business contingency and
resumption planning; Emotional continuity management; Semiotic engineering of online services; Emergency preparedness for
industry and commerce; Updating, auditing and testing plans; Reduce downtime with continuous backup; Global connectivity
and international formats; Web-based planning tools; Automatic high speed notification and response for business
continuity; Centralized management; Businesses continuity planning software; On-demand business transformation

RISK: Risk assessment

Risk assessment information systems; Modeling risk assessment; Risk Assessment methods; Global risk assessment;
Qualitative risk assessments; Quantitative risk assessment; Challenges in risk assessment; Risk assessment for economy;
Risk assessment for security of communications systems; Safety risk assessment; Health system risk assessment; Integrated
risk assessment; Planning tools for proactive risk assessment; Risk management; Risk factors and economic impact; Risk
metrics and calibration; Precaution and risk balance; Risk and economic analysis of terrorism events; Risk analysis for
extreme events; Life cycle assessment in decision making; Environmental risk assessment; Credit ratings risk assessment;
Risk Assessment statistics & numerical data; Risk assessment standards; Risk assessment tools and support software

TRUST: Privacy and trust in pervasive communications

Trust development and management; Engineering requirements for trust management; Formalisms for trust specification,
verification and validation; Logics for the analysis of trust and for reasoning about trust; Legal framework for online
trust environments; Trust in semantic Web services; Reputation systems; Distributed trust management; Trust on anonymous
documents; Privacy and trust; Trust in collaborative work and risk assessment; Risk analysis to assess user trust; Human
behaviors in trusted environments; Trust in virtual communities; Trust mediation in knowledge management; Trust planning
and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; Identity Management in pervasive environments
(requirements, levels of abstractions, context, protection, etc.); Assurance (compliance, assurance, audit, security
requirements)

RIGHT: Digital rights management

Ontology and frameworks on digital rights management; Digital rights property languages; Semantic and encoding of
digital rights; Rights granularity; Digital right technologies; Digital rights management schemes; Federated digital
rights management; Distributed digital rights management; Copyright protection schemes; Digital rights management ands
social norms; Faire use, innovation, and competition; Trading fair use for digital rights management; Digital rights
management and open access; Privacy engineering for digital rights management; Value-centered design for digital rights
management; Free software and digital rights management; P2P and digital rights management; Broadband/IPTV content
protection and digital rights management; Digital right management and content licensing; Digital rights management issues
in real-time and safety/mission systems; RFID tags for digital rights management; Digital rights management in learning
systems; Legal policy and digital right management

BIOTEC: Biometric techniques

Models and techniques for biometric technologies; Finger, facial, iris, voice, and skin biometrics; Biometric security;
Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric
technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of
biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware;
Biometric standards

EMDRM: Enterprise & Media DRM

Digital Policy Management; Enterprise Rights Management (adoption and case studies); DRM Interoperability; Operational
Risk Management; Compliance and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate Governance; Content and
Knowledge Management (financial, CAD, IP, trade secrets, etc.); Interorganizational System (IOS); Retention Policies and
Classification; Traceability, Monitoring, tracking, usage metering, audit trails

--------------------
Technical Program Committee
http://www.iaria.org/conferences2012/ComICIMP12.html
====================

[ns] strenge behivor in NS2.29 + NIST mobility model

---------- Forwarded message ----------
From: El Hadi Cherkaoui <elhadi.cherkaoui@gmail.com>
Date: Wed, 21 Dec 2011 13:03:18 +0100
Subject: [ns] strenge behivor in NS2.29 + NIST mobility model
To: ns-users@isi.edu

Dear ns users,

I am working on the NIST mobility model for heterogeneous network. In
my tcl script I have set one wifi AP , 1 wimax BS and enable UMTS
communications for the whole coverage area.

The AP and BS are set in the seme position (1000,1000)

I set the position of my terminal (containing 3
interfaces:wifi+umts+wimax) on (800,1000) and moves straight toward
(2500,1000)

My Wifi AP coverage is 50 meters ie from (950 to 1050)m and my Wimax
coverage is 1km (0 to 2000)m

I expect that with a defined Handover algorithm receive packets:
>From 800 to 950: wimax
>From 950 to 1050: wifi
>From 1050 to 2000: wimax
>From 2000 to 2500: umts

but I figure it out that from 1000 to 1050 wifi packets are dropped by
the AP and not flow is received in this region .... why ?

second scenario, I start the movement of mobil from x=1001 to 2500 and
it receives perfectly wifi packet in the zone [1000-1050].

So my question is : why when only the terminal crosses the center of
the AP it doesn't receive any wifi packets ?

thanx in adv for your reply !!

H.

Monday, December 19, 2011

[ns] I don't know how to load the scenario-file in probabilistic distribution !!!!!!

Dear Ns-Users,

Actually, I am trying to implement the " Probabilistic Algorithm in NS2".

The problem is; when I generate a scenario file in a randomly distributed nodes in the network, I give the scenario file a filename using ./setdest.

But when I run the simulation it tells me that it cannot readt the scenario file. So I am afraid that I miss something and do not know it indeed.

the syntax to implement the tcl script is:

Script usage is : ns pbcast_randsim.tcl -scenfile (scenario-file) -prob (probability) 


 I use the following when implementing:

tamer@zeid:~/ns-allinone-2.34/ns-2.34/pbcast$ ns pbcast_randsim.tcl -scenfile scen-20 -prob 0.6


and it gives me the following:

num_nodes is set 20
couldn't read file "scen-20": no such file or directory
    while executing
"source.orig scen-20"
    ("uplevel" body line 1)
    invoked from within
"uplevel source.orig [list $fileName]"
    invoked from within
"if [$instance_ is_http_url $fileName] {
set buffer [$instance_ read_url $fileName]
uplevel eval $buffer
} else {
uplevel source.orig [list $fileName]
..."
    (procedure "source" line 8)
    invoked from within
"source $val(scenfile)"
    (file "pbcast_randsim.tcl" line 113)

The defining options are the following:

# ======================================================================
# Define options
# ======================================================================
set val(chan)           Channel/WirelessChannel    ;# channel type
set val(prop)           Propagation/TwoRayGround   ;# radio-propagation model
set val(netif)          Phy/WirelessPhy            ;# network interface type
set val(mac)            Mac/802_11                 ;# MAC type
set val(ifq)            Queue/DropTail/PriQueue    ;# interface queue type
set val(ll)             LL                         ;# link layer type
set val(ant)            Antenna/OmniAntenna        ;# antenna model
set val(ifqlen)         50                         ;# max packet in ifq
set val(nn)             20                        ;# default number of mobilenodes
set val(rp)             AODV                       ;# routing protocol
set val(sc)"/home/tamer/ns-allinone-2.34/ns-2.34/indep-utils/cmu-scen-gen/setdest/scen-20"   ;# scenario file
set val(x)500.0   ;
set val(y)500.0   ;
set val(simtime)100.0   ; #sim time

 Could any one help please?

Thank you in advance.

Best Wishes
 
Thamer Al-Jahamneh

[ns] Last 2 days for 2nd IEEE SCPA 2012 [ICC'12 WS]

Apologies for crossposting

-------------------- CALL FOR PAPERS -----------------

The 2nd IEEE Internacional Workshop of Smart Communication Protocols and Algorithms (IEEE SCPA 2012 - Summer)
June 10-15, 2012, Ottawa, CANADA
In conjunction with IEEE ICC 2012
http://scpa.it.ubi.pt/2012

Selected papers will be invited to the Special Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581)

Communication protocols and algorithms are needed to communicate network devices and exchange data between them. The appearance of new technologies usually comes with a protocol procedure and communication rules that allows data communication while taking profit of this new technology. Recent advances in hardware and communication mediums allow proposing new rules, conventions and data structures which could be used by network devices to communicate across the network. Moreover, devices with higher processing capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.

Smart communication protocols and algorithms make use of several methods and techniques (such as machine learning techniques, decision making techniques, knowledge representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between them. They can be used to perceive the network conditions, or the user behavior, in order to dynamically plan, adapt, decide, take the appropriate actions, and learn from the consequences of its actions. The algorithms can make use of the information gathered from the protocol in order to sense the environment, plan actions according to the input, take consciousness of what is happening in the environment, and take the appropriate decisions using a reasoning engine. Goals such as decide which scenario fits best its end-to-end purpose, or environment prediction, can be achieved with smart protocols and algorithms. Moreover, they could learn from the past and !
use this knowledge to improve futur
e decisions.

In this workshop, researchers are encouraged to submit papers focused on the design, development, analysis or optimization of smart communication protocols or algorithms at any communication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement, performance optimization and network secure are included in the workshop.

We welcome technical papers presenting analytical research, simulations, practical results, position papers addressing the pros and cons of specific proposals, and papers addressing the key problems and solutions. The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, deployments, implementations, running experiments and applications.

Topics of interest:
Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal, including, but are not limited to, the following topic areas:
- Smart network protocols and algorithms for multimedia delivery
- Application layer, transport layer and network layer cognitive protocols
- Cognitive radio network protocols and algorithms
- Automatic protocols and algorithms for environment prediction.
- Algorithms and protocols to predict data network states.
- Intelligent synchronization techniques for network protocols and algorithms
- Smart protocols and algorithms for e-health
- Software applications for smart algorithms design and development.
- Dynamic protocols based on the perception of their performance
- Smart protocols and algorithms for Smartgrids
- Protocols and algorithms focused on building conclusions for taking the appropriate actions.
- Smart Automatic and self-autonomous ad-hoc and sensor networks.
- Artificial intelligence applied in protocols and algorithms for wireless, mobile and dynamic networks.
- Smart security protocols and algorithms
- Smart cryptographic algorithms for communication
- Artificial intelligence applied to power efficiency and energy saving protocols and algorithms
- Smart routing and switching protocols and algorithms
- Cognitive protocol and algorithm models for saving communication costs.
- Any kind of intelligent technique applied to QoS, content delivery, network Monitoring and network management.
- Smart collaborative protocols and algorithms
- Problem recognition and problem solving protocols
- Genetic algorithms, fuzzy logic and neural networks applied to communication protocols and algorithms

Important Dates
Submission Deadline (Extended): December 20, 2011
Acceptance Notification: February 10, 2012
Camera Ready Deadline: March 1, 2012

Submission guidelines:
All submissions must be full papers in PDF format and uploaded on EDAS (http://edas.info//N11477).
All submissions should be written in English with a maximum paper length of five (5) printed pages (10-point font) including figures without incurring additional page charges.

General Chairs
Jaime Lloret, Univ. Politecnica Valencia, Spain
Joel Rodrigues, Inst. of Telecommunications, Univ. of Beira Interior, Pt

TPC Chairs
Ivan Stojmenovic, University of Ottawa, Canada
Kai Lin, Dalian University of Technology, China

Poster Chairs
Binod Vaidya, University of Ottawa, Canada
Bin Wei, AT&T, USA

Industry Chairs
Haohong Wang, Cisco
Chi-Ming Chen, AT&T, USA

Keynote Chair
Mbaye B. Sene, Cheikh Anta Diop University, Dakar, Senegal

Publicity Chairs
Sandra Sendra, Univ. Politecnica Valencia, Spain
Alejandro Canovas, Univ. Politecnica Valencia, Spain

Web Chair
Miguel Garcia, Univ. Politecnica Valencia, Spain

[ns] Deadline extension || CfP: AICT 2012 || May 27 - June 1, 2012 - Stuttgart, Germany

INVITATION:

=================
Please, consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish
original scientific results to AICT 2012.
The submission deadline is extended to January 16, 2012.
In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals:
http://www.iariajournals.org
=================

============== AICT 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

AICT 2012, The Eighth Advanced International Conference on Telecommunications
May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/AICT12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPAICT12.html

- regular papers
- short papers (work in progress)
- posters
- ideas

Submission page: http://www.iaria.org/conferences2012/SubmitAICT12.html

Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards,
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to,
topic areas.


All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: http://www.iaria.org/editorialrules.html

AICT 2012 Topics (topics and submission details: see CfP on the site)

Signal processing, protocols and standardization

Standardization (IEEE 802.17, Policy Models, Etc.); IEEE 802.11 engineering; Telecommunications protocol engineering;
Future networks: protocol and standards; Standardization (IEEE 802.15, IEEE 802.16); Communication theory, signal
processing, modulation; Modulation, coding and synchronization; Propagation, antennas and channel characterization; Signal
separation and Interference rejection; Critical infrastructure protection

Ad Hoc, autonomic and sensor networks

Autonomic home networking; Sensor, mesh, and Ad hoc networks; Programmable networks; Active networks; Self-organization
and network reconfiguration; Partial and intermittent resources and services; Unicast and multicast routing; Radio
resource sharing in wireless networks; Energy-efficient communications; Vehicular Ad hoc networks; Underwater sensor
networks; Emerging sensor technologies; Intelligent video surveilance; Multi-sensor surveillance;

Wireless technologies

3G And 4G Mobile communications services; Evolution from 2G To 2.5G, 3G and beyond; Wireless multimedia and networks and
systems; Cellular and Ad hoc networks; Mobile broadband technologies; Mobile software (agents); Wireless access (WPAN,
WLAN, WLL); Wireless communications antennas and propagation and transmission technologies; Vertical, horizontal and
diagonalhandover; Broadband wireless technology (HSDPA, HSUPA, LTE, Wimax, Wiran); Cross-layer modeling and design;
Heterogeneity and diversity; Ultra-wideband communications (UWB); Wireless hacking;

Management, operation and control networks

Monitoring telecommunications systems; Network management contingency challenges; Real-time traffic and QoS; Performance
and QoS, traffic engineering (MPLS, Diffserv, Intserv, Etc.); Telecommunications management and control of heterogeneous
networks; Mobility control and mobility engineering; Mobile video surveillance; Mobility and QoS management;
Communications networks security; Information security; IPR and network security;

Core technologies and access technologies and networks

Wireless-fiber convergence; Metro/Access networks; Broadband access networks and services; Next Generation Networks and
technologies; Future Internet; Inteligent & Smart networks; Grid, Cluster and Internet computing; Designing and management
of optical networks; Performance of optical networks; Future technologies in optical communications; PLC (Homeplug, OPERA,
UPA, CEPCA, IEEE, HD-PLC Alliance);

Future applications and services

Service-oriented architectures; E-Learning and mobile learning on telecommunications; SOHO (Small Offices/Home Offices;
Emerging telecommunications software tools; Object and component technologies in telecommunication software; Platforms for
Web Services-based applications and services; Web Services communications, applications, and performance; Applications in
telemedicine; Security and trust in future services applications;

Optical Technologies

Optical internetworking architectures; Novel architectures for optical routers and switches; Optical packet / burst
switching; Optical multi-wavelength label switching; Optical network performance modeling; Optical network control and
management; Measurement, monitoring and supervision techniques; Security and privacy in optical networks; Optical access
networks designs and protocols; High speed optical LANs and gigabit Ethernet; Energy efficiency in optical networks;
Inter-working between optical and wireless networks; Optical Grids, optical networking for cloud computing; Optical
integrated circuits and novel transmission methods; Standards for optical internetworking; Optical networks for future
Internet design; Multi-domain routing protocols for IP over optical networks; Control and management protocols for IP over
optical networks; Next-generation IP networking and Optical Internet; Development prospect for Optical Internet; Optical
transmission systems and technologies; Optical access systems and technologies; Optical devices

Cognitive radio

Cognitive radio technologies and opportunistic spectrum utilization; Spectrum sensing technologies; Dynamic spectrum
access; Information theory and performance limits of dynamic spectrum access; Distributed algorithms for spectrum
detection and cooperative spectrum sensing; Inter- and Intra- standards interoperability; Cross-layer algorithms based on
spectrum sensing techniques; Advanced signal processing techniques for cognitive radio; Physical-layer design of software
radio and cognitive radio transceivers; Interference and coexistence analysis; Radio resource allocation; Decision making;
Game theory; Cognitive radio with reinforcement learning; SWR and CR management; Cognitive radio sensing in the large and
feature detection; Spectrum and performance management in cognitive radio networks; Cognitive radio applications; Future
Internet with cognitive technologies; Flexible and opportunistic wireless access; Multimedia communications through
cognitive networks; Regulatory policies on spectrum sharing for future broadband networks; Cognitive radio standards;
Cognitive radio architecture for equipments; Enabling SDR technology for cognitive radio; Hardware reconfigurability;
Testbbeds

Teletraffic modeling and management

Traffic and performance measurements; Traffic characterization and modeling; Trends and patterns; Scaling phenomena;
Packet and flow level models; Traffic control and QosS; Queuing theory and queuing networks; Performance evaluation;
Scheduling and admission control; Reservation and priority mechanisms; Overload control; Broadcast and multicast traffic
control; Analytical and numerical analysis; Network design and optimization of wired and wireless networks; Mobility and
resource management; Traffic monitoring and management; Traffic engineering in multi-technology networks; Internet traffic
engineering; Traffic grooming; Simulation methodology for communications networks; Simulation models and tools;

E-Learning and telecommunications

Architecture of learning technology systems; Advanced uses of multimedia and hypermedia; Integrated learning and
educational environments; National and international projects on e-learning and telecommunications; Remote and wireless
teaching technologies; Navigational aspects for learning; e-Learning industry and universities programs; Anytime/anywhere
e-learning and wearable network devices; Tutoring e-learning applications and services; Cost models for e-learning on
telecommunications; Satellite technologies for e-learning; Teaching e-learning methodologies and technologies; Adaptive
e-learning and intelligent applications/tools; Agent technology; Training e-learning teachers; Practical uses of authoring
tools; Application of metadata and virtual reality; Collaborative learning/groupware; Intelligent tutoring systems;
Internet based systems; Application of instructional design theories; Evaluation of learning technology systems; Standards
related activities;

----------------------
Technical Program Committee [open, in progress]

http://www.iaria.org/conferences2012/ComAICT12.html
====================

I was told you needed email lists

Are you looking for lists for your email campaign?
We have what you need.

Healthcare Lists
including:
    *Physicians
    *Chirporactors
    *Dentists
    *Veterinarians
    *Hospitals
    *Optometrists
    *Psychologists
    *Massage Therapists
    *Oncology Doctors
    *AND MORE
Click here to get more details and samples on all the lists we have.

Business Lists including:
    *Schools
    *Churches
    *Realtors
    *Attorneys
    *Manufacturers
    *Financial Planners
    *Insurance Agents
    *IT professionals
    *Canadian Businesses
    *UK Businesses
    *Indian Businesses
    *AND MORE
Click here for a catalog of all our lists and detailed samples.

Consumer Lists including:
    *Homeowners
    *Credit Inquiries
Click here for detailed samples and a catalog of all our lists

We respect your privacy, to be excluded from any future communication please click here.




Sunday, December 18, 2011

[ns] Last 2 days for paper submission in IEEE ICC2012-SaCoNet-III: Ottawa Canada

===============================================================
We apologize in advance if you receive multiple copies of this CFP.
SaCoNet III: Extended Deadline is Dec 20, 2011 and Selected papers will be published
in International Journal of Internet Protocol
Technology:
http://www.inderscience.com/browse/index.php?journalID=144
===============================================================

IEEE ICC 2012: 3rd IEEE International Workshop on
SmArt COmmunications in
NEtwork Technologies (SaCoNeT-III)
http://www.lissi.fr/saconet2012/doku.php
Selected best papers of the workshop will invited for
further
consideration
for a Special issue of the International Journal of Internet
Protocol Technology
To be held in conjunction with the
IEEE International Conference on Communications (ICC 2012)
http://www.ieee-icc.org/index.html, Ottawa Canada.

IMPORTANT DATES
Submission deadline:        20 December 2011
Submission Link:            http://edas.info/N11473
Authors Notification:      10 February  2012
Final Manuscript:          31 March 2012
Workshop Date:              June 10 -15 2012
=========================================================

SCOPE
-----------
As continuity of the first and the second edition of SaCoNet (ex. SaCoNaS),
the scope of SaCoNet-III focused on how smart communications has affect
some aspects (protocols, design, equipment, algorithms,
paradigm, power,
etc.) for a large family of applications (Healthcare, Medical, Underwater,
Vehicular, Robotic, etc.) using network technologies (Sensor Networks,
MANET, VANET, etc.).  The objective is to deal with the growing
overlap between both autonomous systems and the future generation of
network technologies embedded in Internet and cloud computing for a wide
variety of applications (underwater, vehicular, medical, robotic, etc.).
Indeed, autonomous applications embedded in complex configurations and
dynamic environments have rapidly expanded from classical applications where
different modular devices, actuators and sensors interact closely.  This has impacted
considerably the control of a given system in a centralized manner. Current
trends are to propose new autonomic architecture schemes that manage and
control future emerging networks: sky of clouds, Internet of things, Smart
Grids, etc.
Healthcare and wellness applications such as helping elderly
people, assisting dependent persons, habitat monitoring in a smart
environment constitute some of the potential scenarios of convergence
between autonomous systems and smart network technologies. These
applications, (which are based on high-level commands) accomplish some
specific tasks, reveal new challenges regarding mechanic design,
portability, acceptability, power support and efficiency, control theory,
etc. In addition to portability and low-power systems, which are vital
challenges that limit substantially the efficiency of any autonomous system
based application; network paradigms should also take into account issues
related to cost, scalability and security.

This workshop will highlight the overlapping of these two domains
of autonomous systems and the smart network technologies devoted
for different applications for a large variety of
domains:
Healthcare, Medical, Underwater, Vehicular, Robotic, etc. Issues related to
concepts, new technologies, testbeds and trials, and protocols will
elicit particular attention. All submitted papers will be rigorously
reviewed and we will select papers based on their originality,
timeliness, significance, and relevance to the workshop. All accepted
papers must be presented and at least on author needs to register for the
paper to be included in the workshop proceedings. Submitted papers should
not be under consideration for publication anywhere else.

The workshop solicits papers addressing, but are not limited to,
the following topics:
·Cloud Computing and Internet of things
·Architecture and protocol for wireless based sensor networks
·Vehicular applications of autonomous behavior
·Underwater applications
·Rural applications
·Secure, scalable and low cost network paradigms
applications
·Energy optimization of autonomous systems
·Autonomous manipulation using service robots
·Virtual networks and distributed Agent Platform
·Pervasive communication in autonomous application fields
·Rehabilitation robotics, exoskeletons, smart textile clothes and
wearable robots applications
·Context-awareness and ubiquitous applications
·Techniques of sensing, actuation and recognition
·Design modeling and control of autonomous robotic systems
·Assistive robotic technology
·Monitoring and security of autonomous systems in intelligent environment
·Context awareness using sensor networks
·Network based transmission architecture for controlling autonomous systems
·Real-time network based structure using sensors, actuators and transducers


SUBMISSION GUIDELINES:
-----------------------------------------
The workshop accepts only novel, previously unpublished papers.
Prospective
authors are encouraged to submit a 5-page standard IEEE conference style
paper (
http://www.ieee.org/conferences_events/conferences/publishing/templates.html)
to this workshop (including all text, figures, and references)
through EDAS submission system ( http://edas.info/N11473). One additional
page may be allowed but with additional publication fee. Accepted papers
must be
presented at the workshop. The
presenter must register for the
workshop before the deadline for author registration (
http://www.lissi.fr/saconet2012/doku.php?id=wiki:important_dates). Failure
to register before the deadline will result in
automatic withdrawal of the
paper from
the workshop proceedings and the program.


ORGANIZING COMMITTEE
-----------------------------------------
Steering Committee:
Abdelhamid Mellouk, UPEC University, France, Chair
Sherali Zeadally, University of the District of Columbia, USA
Samer Mohammed, UPEC University, France

General Chair: Abdelhamid Mellouk, UPEC University, France, Chair

TPC Co-Chairs: Xavi Masip-Bruin, Univ. Politècnica de Catalunya, Spain
Scott Fowler, Linköping University, Sweden
Ibrahim Kamel, University of Sharjah, UAE

Best
regards,
________________________________
Nadeem Javaid, Ph.D. (University of Paris-Est, France),
Assistant Professor, Dept. of Electrical Engineering,
COMSATS Institute of IT, Park Road, Chak-Shahzad, 44000, Islamabad, Pakistan.
nadeemjavaid@comsats.edu.pk/@ieee.org/@yahoo.com,
Office#: +92 (0)51 9049207,Mobile#: +92 (0)300 5792728.
http://ww3.comsats.edu.pk/faculty/FacultyDetails.aspx?Uid=1211

__._,_.___
Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (2)
Recent Activity: * New Members 1
Visit Your Group
MARKETPLACE
Stay on top of your group activity without leaving the page you're on - Get the Yahoo! Toolbar now.<img width="1" height="1" alt="" src="http://us.bc.yahoo.com/b?P=2e1570fc-2a01-11e1-99aa-1f9089149bae&T=1clol9et2%2fX%3d1324272035%2fE%3d1705136382%2fR%3dgroups%2fK%3d5%2fV%3d2.1%2fW%3dH%2fY%3dYAHOO%2fF%3d1956565430%2fH%3dY29udGVudD0iV2Vic2l0ZV9TZXJ2aWNlcztHcm91cHM7R287RmxpY2tyO0hvdGpvYnM7WWFob29fVGVjaDtQb2RjYXN0cztGaW5hbmNlO01haWw7QnJpZWZjYXNlOyIgZGlzYWJsZXNodWZmbGluZz0iMSIgc2VydmVJZD0iMmUxNTcwZmMtMmEwMS0xMWUxLTk5YWEtMWY5MDg5MTQ5YmFlIiBzaXRlSWQ9IjQ0NTI1NTEiIHRTdG1wPSIxMzI0MjcyMDM1NDMyMDE1IiA-%2fQ%3d-1%2fS%3d1%2fJ%3d28228962&U=13cnvb53p%2fN%3d6auEQkoGYqI-%2fC%3d493064.14543979.14562481.13298430%2fD%3dMKP1%2fB%3d6060255%2fV%3d1">

Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use
.

__,_._,___

Saturday, December 17, 2011

[ns] changes for running round robin over multiple interfaces

Dear Users,

please help me to get the code for round robin algorithm over multiple
interfaces. the multiple interfaces support is added by Ramon aguero.
In that paper he explained how to broadcast packets in place that i
want sent packets in round robin fashion. please help me it is very
helpful for my master thesis.

thanking you
siva
+91-8880137201

[ns] Last 3 days-ICC2012-SaCoNet-III: Deadline Dec 20, Ottawa Canada

  

===============================================================
We apologize in advance if you receive multiple copies of this CFP.
SaCoNet III: Extended Deadline is Dec 20, 2011 and Selected papers will be published
in International Journal of Internet Protocol Technology:
http://www.inderscience.com/browse/index.php?journalID=144
===============================================================

IEEE ICC 2012: 3rd IEEE International Workshop on
SmArt COmmunications in
NEtwork Technologies (SaCoNeT-III)
http://www.lissi.fr/saconet2012/doku.php
Selected best papers of the workshop will invited for further
consideration
for a Special issue of the International Journal of Internet
Protocol Technology
To be held in conjunction with the
IEEE International Conference on Communications (ICC 2012)
http://www.ieee-icc.org/index.html, Ottawa Canada.

IMPORTANT DATES
Submission deadline:        20 December 2011
Submission Link:            http://edas.info/N11473
Authors Notification:      10 February  2012
Final Manuscript:          31 March 2012
Workshop Date:              June 10 -15 2012
=========================================================

SCOPE
-----------
As continuity of the first and the second edition of SaCoNet (ex. SaCoNaS),
the scope of SaCoNet-III focused on how smart communications has affect
some aspects (protocols, design, equipment, algorithms, paradigm, power,
etc.) for a
large family of applications (Healthcare, Medical, Underwater,
Vehicular, Robotic, etc.) using network technologies (Sensor Networks,
MANET, VANET, etc.).  The objective is to deal with the growing
overlap between both autonomous systems and the future generation of
network technologies embedded in Internet and cloud computing for a wide
variety of applications (underwater, vehicular, medical, robotic, etc.).
Indeed, autonomous applications embedded in complex configurations and
dynamic environments have rapidly expanded from
classical
applications where different modular devices, actuators and sensors
interact closely.  This has impacted considerably the control of a given
system in a centralized manner. Current
trends are to propose new autonomic architecture schemes that manage and
control future emerging networks: sky of clouds, Internet of things, Smart
Grids, etc. Healthcare and wellness applications such as helping elderly
people, assisting dependent persons, habitat monitoring in a smart
environment constitute some of the potential scenarios of convergence
between autonomous systems and smart network technologies. These
applications, (which are based on high-level commands) accomplish some
specific tasks, reveal new challenges regarding mechanic design,
portability, acceptability, power support and efficiency, control theory,
etc. In addition to portability and low-power systems, which are vital
challenges that limit
substantially the efficiency of any autonomous system
based application; network paradigms should also take into account issues
related to cost, scalability and security.

This workshop will highlight the overlapping of these two domains
of autonomous systems and the smart network technologies devoted
for different applications for a large variety of domains:
Healthcare, Medical, Underwater, Vehicular, Robotic, etc. Issues related to
concepts, new technologies, testbeds and trials, and protocols will
elicit particular attention. All submitted papers will be rigorously
reviewed and we will select papers based on their originality,
timeliness, significance, and relevance to the workshop. All accepted
papers must be presented and at least on author needs to register for the
paper to be included in the workshop proceedings. Submitted papers should
not be under consideration for publication anywhere else.

The
workshop solicits papers addressing, but are not limited to,
the following topics:
·Cloud Computing and Internet of things
·Architecture and protocol for wireless based sensor networks
·Vehicular applications of autonomous behavior
·Underwater applications
·Rural applications
·Secure, scalable and low cost network paradigms applications
·Energy optimization of autonomous systems
·Autonomous manipulation using service robots
·Virtual networks and distributed Agent Platform
·Pervasive communication in autonomous application fields
·Rehabilitation robotics, exoskeletons, smart textile clothes and
wearable robots applications
·Context-awareness and ubiquitous applications
·Techniques of sensing, actuation and recognition
·Design modeling and control of autonomous robotic systems
·Assistive robotic technology
·Monitoring and security of autonomous systems in intelligent
environment
·Context awareness using sensor networks
·Network based transmission architecture for controlling autonomous systems
·Real-time network based structure using sensors, actuators and transducers


SUBMISSION GUIDELINES:
-----------------------------------------
The workshop accepts only novel, previously unpublished papers. Prospective
authors are encouraged to submit a 5-page standard IEEE conference style
paper (
http://www.ieee.org/conferences_events/conferences/publishing/templates.html)
to this workshop (including all text, figures, and references)
through EDAS submission system ( http://edas.info/N11473). One additional
page may be allowed but with additional publication fee. Accepted papers
must be
presented at the workshop. The
presenter must register for the
workshop before the deadline for author registration (
http://www.lissi.fr/saconet2012/doku.php?id=wiki:important_dates). Failure
to register before the deadline will result in automatic withdrawal of the
paper from the workshop proceedings and the program.


ORGANIZING COMMITTEE
-----------------------------------------
Steering Committee:
Abdelhamid Mellouk, UPEC University, France, Chair
Sherali Zeadally, University of the District of Columbia, USA
Samer Mohammed, UPEC University, France

General Chair: Abdelhamid Mellouk, UPEC University, France, Chair

TPC Co-Chairs: Xavi Masip-Bruin, Univ. Politècnica de Catalunya, Spain
Scott Fowler, Linköping University, Sweden
Ibrahim Kamel, University of Sharjah, UAE

Best
regards,
________________________________
Nadeem Javaid, Ph.D. (University of Paris-Est, France),
Assistant Professor, Dept. of Electrical Engineering,
COMSATS Institute of IT, Park Road, Chak-Shahzad, 44000, Islamabad, Pakistan.
nadeemjavaid@comsats.edu.pk/@ieee.org/@yahoo.com,
Office#: +92 (0)51 9049207,Mobile#: +92 (0)300 5792728.
http://ww3.comsats.edu.pk/faculty/FacultyDetails.aspx?Uid=1211

[ns] How can a route cache be deleted of DSR protocol ?

Hello Experts,
> How can we clear/ delete the routing cache(primary_cache,
> secondary_cache) of DSR protocol in between a data transfer so that the
> source will again make a route search ? Can it be done via a TCL script or
> i will have to touch the C++ part ??
>


> Reply please.....Thanx n Regards
>
> Chandrabhan Pradhan
> 9993559009
>
>

[ns] error in running the simulation

Dear Ns-Users,

I am running a tcl file under ns2.34. Every things seems to go well with me, but at the end of running the simulation it gives me the following:


ns: _o3 prepare-to-stop: can't read "lagent": no such variable
    while executing
"foreach i $lagent {
$i stop
}"
    (procedure "_o3" line 3)
    (Simulator prepare-to-stop line 3)
    invoked from within
"_o3 prepare-to-stop"

Could any body help please?

 Thank you in advance.

 
Tamer Al-Jahamneh

Friday, December 16, 2011

Re: [ns] On-the-fly ns2 interpreter

Hi all,

I fixed this problem by creating a shared library of ns (similar to the
cygwin approach), i.e. libns.so, and linking it to my code.

Upon closer inspection, ~ns/lib/ns-lib.tcl:128 has "class Simulator"
commented. It is instead provided by an OTcl class in
~ns/common/simulator.[h/cc]. Dynamically linking libns.so provided the
missing class definition and solved the error that I reported earlier.

I guess this falls under the "grey area" mentioned in the documentation:
http://isi.edu/nsnam/ns/doc/node6.html

On to greener pastures.

Best,
Nikhil

On Tue, Dec 13, 2011 at 3:30 PM, Nikhil Karnad <nikhil.karnad@gmail.com>wrote:

> Hi everyone,
>
> Firstly, great job to the team on the wiki, forums, and mailing lists. It
> really helped me to get to speed with ns2.
>
> I'd like to use ns2 along with external packet data sources in real-time,
> e.g. a message received on a socket on my linux PC should be sent over the
> network currently being simulated in ns2. My current understanding is that
> the events have to be specified in a Tcl script before the simulation is
> run (via the Simulator class/command). Once the simulation is running, and
> a packet arrives on my socket, I would like to "inject" an event into the
> simulator.
>
> The rest of my code is in C++. My approach: I extracted some of the code
> from the ns source (~ns/common/tclAppInit.cc) and tried to create an
> instance of the interpreter myself, and then plan to use Tcl::eval() and
> its variants to interface with the simulator in real-time...similar to what
> ns does on an input script file. I'm having trouble with the EmbeddedTcl
> codes from "~ns/gen/ns_tcl.cc" and "~ns/gen/ptypes.cc". After calling
> et_ns_ptypes.load() and et_ns_lib.load(), I was assuming that the ns2 OTcl
> classes would be available, but when I run 'tcl.evalc("set ns [new
> Simulator]");', I get the following run-time error:
>
> mytest:
>> [code omitted because of length]
>> : invalid command name "Simulator"
>> while executing
>> "Simulator proc address-format {} {
>> return [Simulator set AddressFormat_]
>> }"
>>
>
> What am I missing from the ns2 source that imported the class definitions
> into the Tcl interpreter? Is there a scoping difference between
> Tcl::evalc() and Tcl_Eval()?
>
> Any help is greatly appreciated. For those interested, the simple code I
> have is available here:
> http://pastebin.com/LXmsgiya
>
> Thanks,
> Nikhil

Re: [ns] Problem compiling ns-2: I can not include "p802.15.4.h"

On 12/16/2011 01:27 AM, David Rodenas wrote:
>
> Hi all
>
> I found the solution: http://old.nabble.com/Error-while-including-wireless-phy.h-td21661874.html. I think it is an important BUG in ns-2.
>
> Thanks for the help.
>
> David Rodenas Herráiz

I filed a bug for this:
https://sourceforge.net/tracker/?func=detail&aid=3461137&group_id=149743&atid=775392

a patch to fix would be welcome, or else I will fix it myself at some point.

- Tom

[ns] Specific Hierarchical address format to have an ipv4 like address

Hi all,
how to use the specific hierarchical address format.
from the manual it has this syntax:$ns set-address-format hierarchical <#n hierarchy levels> <#bits for level1> <#bits for level 2> ....<#bits for nth level>
so i followed that and i wrote in my tcl script:$ns_ set-address-format hierarchical 4 8 8 8 8
and when i created the nodes i have
set temp {0.0.0.0 0.0.0.1 0.0.0.2 } for {set i 0} {$i < $val(nn) } {incr i} { set node_($i) [$ns_ node [lindex $temp $i] ] $node_($i) random-motion 0 }
however, the messages now are dropped once they reached the destination. here is a part from the tracing file:
r 4.613981632 _2_ RTR --- 4 SIP_200 270 [13a 2 1 800] ------- [0.0.0.1:0 0.0.0.2:0 30 0.0.0.2] D 4.613981632 _2_ RTR NRTE 4 SIP_200 270 [13a 2 1 800] ------- [0.0.0.1:0 0.0.0.2:0 29 0.0.0.2]

also when i do "cout" to print the node address as following iph->daddr() = shv->node_;
where node_ is of nsaddr_t; i get 512 or 256 instead of of 0.0.01 for example.
also i noticed that RTR is forwarding the messages instead of sending them .what should i do to fix this problem? do I need to change any thing in the routing protocol?

basically what i am trying to achieve is given each node an ipv4-like address format. i dont need the ipv4 features i just need that the ip address of each node to look like ipv4 ; i.e. 192.86.23.1
i am using ns2.27 on Ubuntu-10.10. and i am working on the SIP module by Rui Prior and i am kaming it working in ad hoc using AODV routing protocol
Regards,Maram

Re: [ns] Problem compiling ns-2: I can not include "p802.15.4.h"

Hi all 

I found the solution: http://old.nabble.com/Error-while-including-wireless-phy.h-td21661874.html. I think it is an important BUG in ns-2. 

Thanks for the help. 
 
David Rodenas Herráiz

>________________________________
> De: David Rodenas <drodenasherraiz@yahoo.es>
>Para: "ns-users@isi.edu" <ns-users@ISI.EDU>
>Enviado: jueves 15 de diciembre de 2011 20:07
>Asunto: [ns] Problem compiling ns-2: I can not include "p802.15.4.h"
>
>
>Hi all
>
>I am working with ns-2, in particular, with the wpan (IEEE 802.15.4) module. I created a new class (classEnergy) where I need to call some functions from Mac802_15_4 class. To do this, I need to include the "wpan/p802_5_4.h" header but the compiler reports the following:
>
>In file included from ./wpan/p802_15_4phy.h:58,
>                 from ./wpan/p802_15_4mac.h:57,
>                 from wpan/classEnergy.cc:17:
>./mac/wireless-phy.h:121: error: expected identifier before 'r'
>./mac/wireless-phy.h:121: error: expected `}' before 'r'
>./mac/wireless-phy.h:121: error: expected unqualified-id before 'r'
>./mac/wireless-phy.h:123: error: expected unqualified-id before "private"
>./mac/wireless-phy.h:123: error: expected `,' or `;' before "private"
>./mac/wireless-phy.h: In function `EnergyModel* em()':
>./mac/wireless-phy.h:129: error: `node' undeclared (first use this function)
>./mac/wireless-phy.h:129: error: (Each undeclared identifier is reported only once for each function it appears in.)
>./mac/wireless-phy.h: At global scope:
>./mac/wireless-phy.h:131: error: `friend' can only be specified inside a class
>./mac/wireless-phy.h:132: error: expected declaration before '}' token
>In file included from ./wpan/p802_15_4phy.h:58,
>                 from ./wpan/p802_15_4mac.h:57,
>                 from wpan/classEnergy.cc:17:
>./mac/wireless-phy.h:42:1: unterminated #ifndef
>In file included from ./wpan/p802_15_4mac.h:57,
>                 from wpan/classEnergy.cc:17:
>./wpan/p802_15_4phy.h:53:1: unterminated #ifndef
>In file included from wpan/classEnergy.cc:17:
>./wpan/p802_15_4mac.h:53:1: unterminated #ifndef
>make: *** [wpan/classEnergy.o] Error 1
>
>I should note that if I don't include "p802_15_4mac.h", the problem dissapears, but I can't use mac functions( e.g. MCPS_DATA_request()).
>
>I searched this same problem on the Web (google and ns2 help) and I found similar problems (http://www.mail-archive.com/ns-users@isi.edu/msg06434.html), but the solution has not been provided. 
>
>I appreciate all the help possible, because I don't know what to do.
>
>Thanks in advance
>
>David Rodenas Herráiz
>
>
>

Thursday, December 15, 2011

Low Priced Databases - B2B,B2C, Healthcare

Are you looking for lists for your email campaign?
We have what you need.

Healthcare Lists
including:
    *Physicians
    *Chirporactors
    *Dentists
    *Veterinarians
    *Hospitals
    *Optometrists
    *Psychologists
    *Massage Therapists
    *Oncology Doctors
    *AND MORE
Click here to get more details and samples on all the lists we have.

Business Lists including:
    *Schools
    *Churches
    *Realtors
    *Attorneys
    *Manufacturers
    *Financial Planners
    *Insurance Agents
    *IT professionals
    *Canadian Businesses
    *UK Businesses
    *Indian Businesses
    *AND MORE
Click here for a catalog of all our lists and detailed samples.

Consumer Lists including:
    *Homeowners
    *Credit Inquiries
Click here for detailed samples and a catalog of all our lists

We respect your privacy, to be excluded from any future communication please click here.




Business/Consumer/Healthcare Data - budget pricing

Are you looking for lists for your email campaign?
We have what you need.

Healthcare Lists
including:
    *Physicians
    *Chirporactors
    *Dentists
    *Veterinarians
    *Hospitals
    *Optometrists
    *Psychologists
    *Massage Therapists
    *Oncology Doctors
    *AND MORE
Click here to get more details and samples on all the lists we have.

Business Lists including:
    *Schools
    *Churches
    *Realtors
    *Attorneys
    *Manufacturers
    *Financial Planners
    *Insurance Agents
    *IT professionals
    *Canadian Businesses
    *UK Businesses
    *Indian Businesses
    *AND MORE
Click here for a catalog of all our lists and detailed samples.

Consumer Lists including:
    *Homeowners
    *Credit Inquiries
Click here for detailed samples and a catalog of all our lists

We respect your privacy, to be excluded from any future communication please click here.




[ns] Problem compiling ns-2: I can not include "p802.15.4.h"

Hi all

I am working with ns-2, in particular, with the wpan (IEEE 802.15.4) module. I created a new class (classEnergy) where I need to call some functions from Mac802_15_4 class. To do this, I need to include the "wpan/p802_5_4.h" header but the compiler reports the following:

In file included from ./wpan/p802_15_4phy.h:58,
                 from ./wpan/p802_15_4mac.h:57,
                 from wpan/classEnergy.cc:17:
./mac/wireless-phy.h:121: error: expected identifier before 'r'
./mac/wireless-phy.h:121: error: expected `}' before 'r'
./mac/wireless-phy.h:121: error: expected unqualified-id before 'r'
./mac/wireless-phy.h:123: error: expected unqualified-id before "private"
./mac/wireless-phy.h:123: error: expected `,' or `;' before "private"
./mac/wireless-phy.h: In function `EnergyModel* em()':
./mac/wireless-phy.h:129: error: `node' undeclared (first use this function)
./mac/wireless-phy.h:129: error: (Each undeclared identifier is reported only once for each function it appears in.)
./mac/wireless-phy.h: At global scope:
./mac/wireless-phy.h:131: error: `friend' can only be specified inside a class
./mac/wireless-phy.h:132: error: expected declaration before '}' token
In file included from ./wpan/p802_15_4phy.h:58,
                 from ./wpan/p802_15_4mac.h:57,
                 from wpan/classEnergy.cc:17:
./mac/wireless-phy.h:42:1: unterminated #ifndef
In file included from ./wpan/p802_15_4mac.h:57,
                 from wpan/classEnergy.cc:17:
./wpan/p802_15_4phy.h:53:1: unterminated #ifndef
In file included from wpan/classEnergy.cc:17:
./wpan/p802_15_4mac.h:53:1: unterminated #ifndef
make: *** [wpan/classEnergy.o] Error 1

I should note that if I don't include "p802_15_4mac.h", the problem dissapears, but I can't use mac functions( e.g. MCPS_DATA_request()).

I searched this same problem on the Web (google and ns2 help) and I found similar problems (http://www.mail-archive.com/ns-users@isi.edu/msg06434.html), but the solution has not been provided. 

I appreciate all the help possible, because I don't know what to do.

Thanks in advance

David Rodenas Herráiz

Counter

blogger analytics