-
-
[
Visual C++ (VC++)]
distcp.rar
Binding arp attack code, forced arp binding, the binding force of a MAC wrong IP address, ARP can also be used for deception, the transfer of its communications data
-
-
[
PDF]
2028.rar
... (Ayrı k Fourier dö nüş ümü tabanlı cepstrum) ve MFCC (Mel Frequency Cepstral Coefficients) ‘nin konuş macı dan bağ ı msı z konuş ma tanı ma sistemlerindeki performansları değ erlendirilmiş tir. De ...
-
[
Visual Basic (VB)]
chap3ppt.rar
1. Contents get mac is access card machines addresses procedures; 2. Contents GetIpAddress under machine name and IP address of the domain name acquisition procedures; 3. Contents getlocalip is access to local machine ip address; 4. Contents of ping ping ...
-
[
Unix_Linux]
FTEdsr.rar
Routing protocol for ad hoc networks based on dsr in NS2 simulation.
Achieved in the routing layer cross-layer aware MAC layer congestion status, and thus choose less congested paths.
-
[
PPT]
adhoc_tutorial_PPT.rar
Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer description of the protocol algorithm used, problems, TCP and UDP protocol performance comparison, the security problems, and so help to understand the ...
-
[
Tcl-Tk]
zmac.tar.gz
Z mac is the medium access control which is the combination of both TDMA and CDMA
-
[
Tcl-Tk]
drandNS2.tar.gz
Z mac is the medium access control which is the combination of both TDMA and CDMA
-
[
C#(.net)]
WMIip.rar
WMI access card with the IP address & MAC code, more convenient, faster speed, The next step is to amend the IP & function of the MAC
-
[
C#(.net)]
netcarIP.rar
on this and a similar, REG is used to obtain IP addresses Card & MAC code, more convenient. speed is fast, the next step is to amend the IP & function of the MAC