2012
Yi, Jiazi
Cross Layer Interaction in NS2 Technical Report
Ecole Polytechnique, France 2012.
@techreport{yi-ns2-crosslayer-2012,
title = {Cross Layer Interaction in NS2},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/cross_layer_info_ns2.pdf},
year = {2012},
date = {2012-11-18},
institution = {Ecole Polytechnique, France},
abstract = {This document introduces how to obtain cross layer information in NS2 (layer 2 packet drop, queue length, etc.), with can be used for upper layer routing protocol. The routing protocol can be in NS2 native C++ or AgentJ Java code.},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
This document introduces how to obtain cross layer information in NS2 (layer 2 packet drop, queue length, etc.), with can be used for upper layer routing protocol. The routing protocol can be in NS2 native C++ or AgentJ Java code.
2008
Yi, Jiazi
A research on the IFQ of MPOLSR in NS2 Technical Report
Polytech'Nantes 2008.
@techreport{yi-ifq-2008,
title = {A research on the IFQ of MPOLSR in NS2},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/A_research_on_the_IFQ_of_MPOLSR_in_NS2.pdf},
year = {2008},
date = {2008-08-26},
institution = {Polytech'Nantes},
abstract = {This research is focused on the length of the interface queue (IFQ) of the MPOLSR protocol. The length of the IFQ in each node of the ad hoc network have big influence in the performance of the networks, both the data delivery ratio and the end-to-end delay. The full of the queue will result in packets loss and the congestion of the queue will cause longer delay. This work examined the behavior of the IFQ in the nodes and compared the performance in different protocols and configurations to give some clues about the IFQ in the future research.},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
This research is focused on the length of the interface queue (IFQ) of the MPOLSR protocol. The length of the IFQ in each node of the ad hoc network have big influence in the performance of the networks, both the data delivery ratio and the end-to-end delay. The full of the queue will result in packets loss and the congestion of the queue will cause longer delay. This work examined the behavior of the IFQ in the nodes and compared the performance in different protocols and configurations to give some clues about the IFQ in the future research.
Yi, Jiazi
A Survey on the security of MANETs Technical Report
Polytech'Nantes Nantes, France, 2008.
@techreport{yi-manet-security-2008,
title = {A Survey on the security of MANETs},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080330_A_Survey_on_the_security_of_MANETs.pdf},
year = {2008},
date = {2008-03-30},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {ad hoc networks. The purpose of this note is to give a quick review on the security related problems in MANETs, and to answer the question “at the moment, what do we have to deal with the security”. We first introduce the basic concepts of network security, and then come to the security changes and requirements. The key management and secure routing schemes are presented in section 3 and section 4. },
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
ad hoc networks. The purpose of this note is to give a quick review on the security related problems in MANETs, and to answer the question “at the moment, what do we have to deal with the security”. We first introduce the basic concepts of network security, and then come to the security changes and requirements. The key management and secure routing schemes are presented in section 3 and section 4.
Yi, Jiazi
A Survey on the Applications of MANET Technical Report
Polytech'Nantes Nantes, France, 2008.
@techreport{yi-manet-survey-2008,
title = {A Survey on the Applications of MANET},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080229_A_Survey_on_the_Applications_of_MANET.pdf},
year = {2008},
date = {2008-02-01},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This report examined the applications of MANET nowadays. The report not only reviews the pure general-purpose MANET, but also other specified MANETs: mesh networks, opportunistic networks, vehicular ad hoc networks and wireless networks. We can see that, although pure general-purpose MANET does not yet exist in the real world, the multihop ad hoc networking paradigm was successfully applied in several classes of networks that are penetrating the mass market.},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
This report examined the applications of MANET nowadays. The report not only reviews the pure general-purpose MANET, but also other specified MANETs: mesh networks, opportunistic networks, vehicular ad hoc networks and wireless networks. We can see that, although pure general-purpose MANET does not yet exist in the real world, the multihop ad hoc networking paradigm was successfully applied in several classes of networks that are penetrating the mass market.
2007
Yi, Jiazi
Summary of Routing Protocols in Mobile ad hoc Networks Technical Report
Polytech'Nantes Nantes, France, 2007.
@techreport{yi-manet-routing-survey-2007,
title = {Summary of Routing Protocols in Mobile ad hoc Networks},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Summary_of_Routing_Protocol_in_Mobile_Ad_Hoc_Networks_distribution.pdf},
year = {2007},
date = {2007-02-11},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This was a survey of MANETs finished at the beginning of my master project. },
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
This was a survey of MANETs finished at the beginning of my master project.