نتایج جستجو برای: ns2 simulator
تعداد نتایج: 32400 فیلتر نتایج به سال:
There has been substantial interest from researchers in the development and contribution of modules in NS2. One of the challenges in NS2 modeling is to seamlessly integrate real world traffic data into the NS2 network model. Normally the traffic in NS2 is generated from the traffic agents such as TCP and UDP agents whose parameters are based on certain statistical distribution. The aim of this ...
The main goal of this paper is to present how to use network simulator(NS2)simulation for designingnetworks and using Cryptography algorithm as to security information. It briefly describes the basic networks categories, analyzes networks, brieflydescribes their components and technologies, explains the Wi-Fitechnologyand analyzesproperty sources related to networksimulatorand its detaileddescr...
Performance evaluation of TCP traffic in OBS networks has been under intensive study, since TCP constitutes the majority of Internet traffic. As a reliable and publicly available simulator, ns2 has been widely used for studying TCP/IP networks; however ns2 lacks many of the components for simulating optical burst switching networks. In this paper, an ns2 based OBS simulation tool (nOBS), which ...
Wireless Sensor Networks (WSNs) became popular for many real world applications. The applications Thus source anonymity became a challenge problem in such networks. Unauthorized paper we implement a solution using NS2 simulations. energy efficient methods are very important for WSN. One. Study of Soil-Structure Interaction Problems Using Mixed. FEMBEM Formulations. 32 Study and Simulation of Pr...
Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that dynamically form network temporarily without any support central management. Moreover, every node in MANET moves arbitrarily making the multi-hop topology to change randomly at uncertain times. There are several familiar routing protocols like AODV, DSR, and DSDV etc. which have been proposed for providing communication...
Network security has become very important and foremost issue for the personal computer users, organizations, business and military. With the advent of internet, security has become the major concern. The main objective of this research is to simulate and analyze the effect of queuing algorithms RED and DROPTAIL with CPR on the TCP targeted LDDoS attack flows. LDDoS attack is more vulnerable to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید