File Exchange
NetSim File Exchange is an online platform that provides access to a wide range of user-contributed NetSim projects, code, and documentation. All the projects below have been verified by the NetSim R&D team. EDU users can accelerate their R & D utilizing the code available - it can help solve complex problems, save time, and streamline workflows. All these resources are freely available to licensed NetSim users.
Want to contribute? Email your NetSim project code with documentation to support(at)tetcos(dot)com. Our team will review it and get back.
NetSim v13.3
(Feb. 2023) - "Currently Shipping"
- NetSim Utilities
- 5G Networks
- LTE
- Internet of Things
- Wireless Sensor Networks
- VANETs
- Internetworks
- MANETs
- Cognitive Radio Networks
- Military Radio
- Machine learning with NetSim
NetSim v13.2
(Oct. 2022) - "Previously Shipping"
Note: These are projects designed for Edu Users.
- NetSim Utilities
- 5G Networks
- LTE
- Internet of Things
- Wireless Senor Network
- VANETs
- Internetworks
- Cognitive Radio Networks
NetSim v13.1
(Dec. 2021)
- 5G Pathloss File Input for GNB
- 5G Radio Measurements
- CC AODV
- CR Channel Notching
- DIO Suppression Attack in RPL
- DoS Attack in 5G
- DoS Attack in Internetworks
- DoS Attack in Iot
- Dynamic Clustering in WSN
- Dynamic Traffic Light Control in NetSim VANETs
- FDI Attack in RPL
- Interfacing NetSim with NodeRed and IBM Watson
- Intrusion detection system MANETs
- Intrusion detection system in LEACH
- LEACH in WSN
- Localization in WSN NetSim
- Longley Rice Prpogation Model
- LTE UAV Simulation MATLAB Interfacing
- MANET VANET Rebroadcast
- MISTY ENCRYPTION
- Modeling Obsctacles in LTE
- NetSim Batch Automation
- NetSim Mobility File Generator
- NetSim-Multi Parameter Sweeper
- Network Scenario generator
- PEGASIS in WSN
- Primary User Emulation (PUE) Attack
- RPL DIS Flooding
- RPL-DODAG Visualization
- SDWSN based Location Aware Routing Protocol
- Secure AODV
- SinkHole Attack DSR
- Sinkhole Attack in AODV
- SinkHole attack in IoT RPL
- SOM Clustering in WSN
- T-LEACH in WSN
- UAV Simulation MATLAB Interfacing
- Wireless Energy Harvesting for IOT
NetSim v13
(April 2021)
- 5G Parameter Logging and Plotting
- 5G Pathloss File Input for GNB
- CC AODV
- CR Channel Notching
- DIO Suppression Attack in RPL
- DoS Attack in 5G
- DoS Attack in Internetworks
- DoS Attack in Iot
- Dynamic Clustering in WSN
- Dynamic Traffic Light Control in NetSim VANETs
- FDI Attack in RPL
- Heterogeneous LEACH in WSN
- ICMP Flooding Attack
- Interfacing NetSim with Node-RED and IBM Watson
- Intrusion detection system MANETs
- Intrusion detection system in LEACH
- LEACH in WSN
- Localization in WSN
- LTE UAV Simulation with MATLAB Interfacing
- MANET VANET Rebroadcast
- MISTY ENCRYPTION
- Modeling Obstacles in LTE
- NetSim Mobility File Generator
- NetSim Multi Parameter Sweeper
- NetSim Batch Automation
- Network Scenario generator
- PEGASIS in WSN
- Primary User Emulation (PUE) Attack
- RPL DoDAG Visualization
- RPL DIS Flooding
- SDWSN based Location Aware Routing Protocol
- SecureAODV
- SinkHole Attack AODV
- SinkHole Attack DSR
- SinkHole attack in IoT RPL
- SOM Clustering in WSN
- TLEACH in WSN
- UAV Simulation MATLAB Interfacing
- Wireless Energy Harvesting for IoT
NetSim v12.1/v12.2
(March / September 2020)
- CC AODV
- Channel Notching in 802.22 Cognitive Radio Networks
- DIO suppression attack in IoT networks running RPL
- DIS Flooding Attack in IOT networks running RPL
- DOS Attack in IOT
- DOS Attack in Internetworks
- DOS Attack in 5G
- Dynamic Clustering in WSN with MATLAB
- Dynamic Traffic Light Control in NetSim VANETs
- False Data Injection Attack in IOT with Node Red Interfacing
- Heterogeneous LEACH for WSN
- Intrusion detection system for MANETs
- Intrusion detection system for LEACH
- IOT Application - Interfacing with Node Red and IBM Watson
- LEACH protocol for WSN
- Localization in WSN
- LTE Discontinuous Reception DRX
- LTE X2 Handover
- NetSim Batch Automation
- NetSim Multi-Parameter Sweeper
- NetSim Network Topology Generator
- Misty Encryption algorithm
- Modeling Obstacles in LTE
- PEGASIS protocol in WSN
- Primary User Emulation PUE Attack Cognitive Radio
- Probability based rebroadcasting in VANETs
- RPL DODAG Visualization
- SDWSN based Location Aware Routing
- Secure AODV
- Sinkhole attack in IoT running RPL
- Sinkhole attack in MANETs running DSR
- SinkHole Attack AODV
- SOM neural network Clustering energy optimization WSN
- TLEACH in WSN
- UAV Communication simulation with NetSim-MATLAB interfacing
- Wireless Energy Harvesting for IoT
NetSim v12
(September 2019)
- Channel Notching in 802.22 Cognitive Radio Networks
- Dynamic Clustering in WSN with MATLAB
- Heterogeneous LEACH for WSN
- Intrusion detection system for MANETs
- Intrusion detection system for LEACH
- LEACH protocol for WSN
- Localization in WSN
- LTE Discontinuous Reception DRX
- LTE X2 Handover
- NetSim Batch Automation
- Misty Encryption algorithm
- Modeling Obstacles in LTE
- PEGASIS protocol in WSN
- Primary User Emulation PUE Attack Cognitive Radio
- Probability-based rebroadcast in MANET and VANET
- RPL DODAG Visualization
- Secure AODV
- Sinkhole attack in IoT running RPL
- Sinkhole attack in MANETs running DSR
- SinkHole Attack AODV
- SOM neural network Clustering energy optimization WSN
- T LEACH in WSN
- Wireless Energy Harvesting for IoT
NetSim v11.1
(Mar. 2019)
- Dynamic-Clustering-in-WSN-with-MATLAB
- Heterogeneous-LEACH-for-WSN
- Intrusion-detection-system-for-MANETs
- Intrusion-detection-system-in-LEACH
- LEACH-protocol-for-WSN
- Localization-in-WSN
- LTE-X2-Handover
- Misty-Encryption-algorithm-v11.1
- Modeling-Obsctacles-in-LTE
- PEGASIS-protocol-in-WSN
- Primary-User-Emulation-PUE-Attack-Cognitive-Radio
- Probability-based-rebroadcast-in-MANET-and-VANET
- RPL-DODAG-Visualization
- Secure-AODV
- Sink-hole-attack-in-IoT-running-RPL
- Sink-hole-attack-in-MANETs-running-DSR
- SinkHole-Attack-AODV
- SOM-neural-network-Clustering-evergy-optimization-WSN-v11.1
- T-LEACH-in-WSN
- Wireless-Energy-Harvesting-for-IOT
NetSim v11.0
(Oct. 2018)
- Intrusion-Detection-in-LEACH
- Dynamic-Clustering-in-WSN
- PEGASIS-in-WSN
- 802.22-Primary-User-Emulation-PUE-Attack
- LEACH-in-WSN
- LTE-Handover
- Sink-Hole-Attack-AODV
- Sink-Hole-Attak-in-MANET-using-DSR
- Sink-Hole-Attack-in-LEACH
- Wireless_Energy_Harvesting_for_IOT
- NetSim_Batch_Automation
- Mysty_Encryption
- Rebroadcasting-VANET
- Secure-AODV
- Localization-WSN
- Sink Hole attack in IoT_RPL
- Modeling obstacles in LTE
- WSN Clustering using Self Organizing Map Neural Network for optimizing energy consumption
NetSim v10.2
(Feb.
2018)
- Fog Computing in IOT
- Sinkhole attack in IOT networks running RPL
- Channel notching in 802,22 Cognitive Radio Networks
- Primary User emulation attack in 802.22 Cognitive Radio Networks
- Energy harvesting in IOT networks
- LEACH protocol for WSNs
- Localization in WSNs
- Example of adding your own encryption
- Sink hole attack for DSR based MANETs
- Sink hole attack in AODV based MANETs
- Secure AODV routing protocol for MANETs
- LTE X2 Handover
- Modeling Obstacles in LTE
- RPL Dodag formation visualization in IOT networks
- Dynamic Clustering in WSN with MATLAB interface
- WSN Clustering using Self Organizing Map Neural Network for optimizing energy consumption
- Temperature sensors in NetSim
- DDOS Attacks in IOT Networks
- TLEACH protocol for WSNs
NetSim v10.1
(Dec. 2017)
- Sinkhole attack in IOT networks running RPL (Documentation & Code)
- Channel notching in 802,22 Cognitive Radio Networks
- Primary User emulation attack in 802.22 Cognitive Radio Networks
- Energy harvesting in IOT networks
- RPL Dodag formation visualization in IOT networks
- LEACH protocol for WSNs
- Localization in WSNs
- Example of adding your own encryption
- Failing nodes for reliability analysis in MANETs
- Sink hole attack for DSR based MANETs
- Sink hole attack in AODV based MANETs
- Secure AODV routing protocol for MANETs
- LTE X2 Handover
- Modeling Obstacles in LTE
- NetSim Batch Process For Automated Running of Large Number of Simulations
- NetSim Emulator Raspberry PI Interfacing
NetSim v10
(June 2017)
- Sinkhole attack in IOT running RPL (Documentation & Code)
- WSN Clustering using Self Organizing Map Neural Network for optimizing energy consumption
- Sinkhole attacks in DSR MANET
- Dynamic Clustering in WSN with MATLAB interface
- LEACH protocol for WSNs
- NetSim RPL DODAG Visualization with MATLAB interface
- Secure AODV
- Sinkhole attack in AODV MANET
- Simulating virtual temperature sensors
- Addition of Mistry Encryption Algorithm
- MATLAB Interfacing - Nakagami Fading
- Failing nodes for reliability analysis in MANETs
- Primary user emulation attack in Cognitive Radio Networks
- Intrusion Detection System
- Localization in WSN
NetSim v9.1
(Aug 2016)
- Dynamic Clustering in WSN with MATLAB interface (Zip file with documentation and code)
- Sinkhole attacks in MANET (DSR) in NetSim v9.1 (Zip file with documentation and code)
- Cognitive Radio channel notching (Zip file with documentation and code)
- Primary User Emulation Attack in Cognitive Radio (Zip file with documentation and code)
- Wireless Energy Harvesting in IOT (Zip file with documentation and code)
- LEACH protocol for WSNs in NetSim v9.1 (Zip file with documentation and code)
- Failing nodes for reliability analysis in MANET (Zip file with documentation and code)
- Modelling and Simulation of sensing and communication of real world phenomena using NetSim WSN 9.1
- Transferring a real file in WSN simulation in NetSim v9.1 (Zip file with documentation and code)
- Sinkhole attack using AODV (Zip file with documentation and code)
- Temperature sensors in NetSim (Zip file with documentation and code)
- Matlab Interfacing - Nakagami(Zip file with documentation and code)
- Addition of Mysty Encryption Algorithm(Zip file with documentation and code)
- Secure AODV (Zip file with documentation and code)
- Real Time plotting of spectrum usage in 802.22 CR Networks (Zip File with Documentation & Code)
NetSim v9
(Feb
2016)
- Dynamic Clustering in WSN (Zip file with documentation and code)
- Intrusion Detection system for MANETS (Zip file with documentation and code)
- Interfacing NetSim with SUMO for VANETs (Zip file with documentation and code)
- Primary User Emulation Attack in Cognitive Radio (Zip file with documentation and code)
- Sinkhole attack in AODV (Zip file with documentation and code)
- LEACH protocol for WSNs in NetSim v9 (Zip file with documentation and code)
- Failing nodes for reliability analysis in MANET (Zip file with documentation and code)
- Sinkhole attacks in MANET in NetSim v9 (Zip file with documentation and code)
- NETSIM MATLAB Interfacing (Zip file with documentation and code)
- Transferring a real file in WSN simulation in NetSim v9 (Zip file with documentation and code)
- Channel notching in CR(Zip file with documentation and code)
NetSim v8.3
(June 2015)
- Intrusion Detection system for MANETS in NetSim v8.3 (Zip file with documentation and code)
- LEACH protocol for WSNs in NetSim v8.3 (Zip file with documentation and code)
- Cognitive Radio channel notching in v8.3 (Zip file with documentation and code)
- Sinkhole attacks in MANET in NetSim v8.3 (Zip file with documentation and code)
- Zigbee code walk through in NetSim v8.2 (zip file)
- Cognitive Radio code walk through in NetSim v8.2(zip file)