Comparison of network simulators in IP networks

Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

Подобные документы

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    презентация, добавлен 10.06.2016

  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция, добавлен 15.04.2014

  • The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.

    статья, добавлен 22.07.2014

  • A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.

    статья, добавлен 15.04.2014

  • Revolutionary changes in the intellectual development of mankind. The emergence of a second human signaling system, awareness of the nature of the formation of cognitive abilities of the human brain and the formation of highly intelligent neural networks.

    статья, добавлен 15.04.2024

  • Обучение базовым возможностям геоинформационной системы АrcGis. Изучение ArcМap, ArcCatalog и данных геоинформационных систем. Анализ методов и процедур в географических информационных системах. Выполнение упражнений по изучению Network Analyst.

    курсовая работа, добавлен 16.11.2015

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    статья, добавлен 29.11.2016

  • The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.

    статья, добавлен 19.03.2024

  • Аналіз популярних сатиричних анімаційних проектів дорослого блоку на американському телеканалі Cartoon Network. Знайомство з особливостями виявлення загального портрету цільової аудиторії Adult Swim. Характеристика відомих представників інфотейнменту.

    статья, добавлен 21.04.2020

  • Данные о производительности сети, определение интервалов времени хранения. Принцип неопределенности Гейзенберга для SNMP-опроса (Simple Network Management Protocol). Стратегии установки пороговых значений. Просмотр данных и предоставление их потребителю.

    лекция, добавлен 17.04.2015

  • Предназначение устройства с числовым программным управлением, взаимодействие с устройствами более высокого уровня с применением новейших протоколов обмена информацией. Протокол Controller Area Network (ISO/DIS 11898) – организация сети, принцип работы.

    дипломная работа, добавлен 27.10.2010

  • Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.

    материалы конференции, добавлен 08.03.2014

  • Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. Сhallenges posed by Big Data analysis.

    статья, добавлен 18.02.2021

  • Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    статья, добавлен 09.10.2018

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

  • Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.

    книга, добавлен 08.03.2014

  • История развития нейросетей, характеристика их главных задач. Особенности архитектуры и параметры обучения. Краткое описание программы Neural Network Wizard. Изучение принципов работы программного эмулятора нейрокомпьютера. Сбор статистики по процессу.

    реферат, добавлен 14.10.2013

  • The concept and structure, as well as the laws of functioning of the Unified Modeling Language, history of its development. Precedents and conditions of effective use case diagrams. Research of a example of computer simulation and evaluation of results.

    презентация, добавлен 05.04.2016

  • Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.

    книга, добавлен 19.03.2014

  • Разработка на основе технологии Neural Network программных комплексов для прогнозирования различных явлений, статистической обработки данных в медицинском учреждении. Система принятия решений при управлении пациентопотоком в медицинских учреждениях.

    статья, добавлен 05.04.2020

  • Theoretical aspects of the development of digital platform for engineering controlling business. Digital platform as part of the global economy. Conceptual apparatus for the research. Problems of product exchange between the city and the rural settlement.

    дипломная работа, добавлен 14.12.2019

  • Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.

    книга, добавлен 08.03.2014

  • The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.

    статья, добавлен 06.07.2023

  • Автоматизация построения синтаксически и семантически правильной имитационной модели. Математическая теория систем массового обслуживания; модели Queue Network. Проверка синтаксической правильности модели в статье; использование графовой грамматики.

    статья, добавлен 26.04.2019

  • Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.

    статья, добавлен 09.09.2021

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.