نتایج جستجو برای: opnet

تعداد نتایج: 1006  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

امروزه ارائه خدمات تلفنی روی شبکه های سوئیچینگ بسته ای به عنوان یکی از موضوعات اساسی حوزه شبکه مطرح شده است تا برخی معایب سیستم های سنتی سوئیچینگ مداری (از قبیل بالابودن هزینه ارتباط و نگهداری) را مرتفع کرده و سرویس های تکمیلی را نیز ارائه دهد. از جمله اهداف کلیدی در ارائه خدمات تلفنی، حفظ کیفیت خدمات می باشد. اما شبکه های موجود معمولاً شبکه هایی بر مبنای بهترین تلاش بوده و برای کاربردهای بلادر...

2012
Kuldeep Vats Monika Sachdeva Krishan Saluja Amit Rathee

In this paper discusses and evaluates “Optimized Link State Routing Protocol” OLSR routing protocol to better performance. Using OPNET simulator tools for the performance of OLSR routing protocol simulation, create in small network (30 nodes), medium size network (40 nodes) and large network (50 nodes) the complexity of the mobile ad-hoc network. The MPR count,”HELLO”message sent ,routing traff...

2014
Kapil Chawla Kuldeep Vats

In this paper analysis and performance of OLSR and TORA routing protocols is done. We used OPNET Simulation tool we created a network containing 50 mobile nodes with data rate 1 Mbps and 2 Mbps with transmission power 0.005 watts and buffer size 256000 bits each node moves randomly in the network and simulation time was 1500 sec. TORA and OLSR routing protocols were compared in terms of Traffic...

2013
Ravi Sindal Nidhi Jaiswal

A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried without any centralized control. The ease of deployment and the infrastructure less nature of Mobile Ad Hoc Networks (MANET) make them highly desirable for present day multi media communications. In this paper we analyze the performance of TCP/IP based application protocol ...

2009
Karl Benkič

Routing protocol development and evaluation is still very interesting research topic in wireless sensor networks (WSN). There are two options for evaluating the routing protocols: evaluation on the real WSN or evaluation in simulator. The evaluation on the real network takes a lot of time and it can be quite expensive, so, evaluation in the simulator is common researchers selection. When using ...

2013
Mohammed ERRITALI Bouabid El Ouahidi

The objective of this work is to compare with simulating, using OPNET the performance of five Ad hoc routing protocols: DSR, AODV, OLSR ,TORA and GRP , and to examine the impact of mobility and the density of nodes on the behavior of these protocols in a Vehicular Ad hoc NETwork (VANET). The results show that there is not a protocol that is favorite for all evaluation criteria. Indeed, each pro...

Journal: :CoRR 2011
H. A. Esmaili Mohammad Reza Khalili Shoja Hossein Gharaee

Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing proto...

2005
D. R. Basgeet P. Dugenie D. Kaleshi

This paper presents a new mathematical framework of a Scalable Mobility Model (SMM) to characterise user movement behaviour, which can be applied to a wide number of network scenarios ranging from Local Area Networks (LAN) to Wide Area Networks (WAN). The core technique to describe the spatial and temporal behaviour of mobile users is the introduction of a novel concept referred to as Pole of G...

2013
Mitko Bogdanoski

The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection a...

2003
Agustin Zaballos Guiomar Corral Isard Serra Jaume Abella

Network security nowadays has become a major priority for both network design and implementation. Due to this fact, the interest in making network communications secure has increased at the same rate as the accessibility to Internet services. Although security is a critical issue in e-business, it is often impossible to measure its effectiveness in real life because of the network administrator...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید