A model for deploying an opportunistic MAC protocol in NS-2 | IEEE Conference Publication | IEEE Xplore