Comparison of network simulators in IP networks

Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

Подобные документы

  • The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.

    дипломная работа, добавлен 30.06.2015

  • Facebook as a social networking service launched in February 2004. Facts and expert’s opinion concerning using it. Join common-interest user groups or organized by workplace. Update like enough to keep your page interesting. Questions for beginners.

    презентация, добавлен 25.01.2014

  • This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.

    книга, добавлен 08.03.2014

  • The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.

    эссе, добавлен 13.09.2011

  • Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.

    статья, добавлен 20.01.2017

  • Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.

    книга, добавлен 08.03.2014

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа, добавлен 02.09.2016

  • An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.

    книга, добавлен 08.03.2014

  • The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.

    статья, добавлен 15.09.2012

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа, добавлен 17.03.2016

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • A network protocol as a specification for the format and relative timing of the messages exchanged. Formalizing why and how vulnerabilities occur in protocols. Previous models. Automated tools. Terminology relationships. A network time protocol exploit.

    статья, добавлен 15.09.2012

  • Review general information about the Internet, its purpose, and it by using. Characteristic features of the Internet as a huge educational resource for teachers. Defining features of the use of social networking sites in English language teaching.

    реферат, добавлен 03.06.2015

  • Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.

    статья, добавлен 26.06.2016

  • The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.

    дипломная работа, добавлен 13.09.2017

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • The process of helicopter pilots training by simulator. Analyzed the aviation accidents due to human factor. The way of estimation of pilots training by simulators. The formalization of the educational process with the control of training information.

    статья, добавлен 26.06.2016

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    статья, добавлен 25.03.2016

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.

    статья, добавлен 21.03.2024

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    реферат, добавлен 05.01.2014

  • Различные типы Network Address Translation, которые могут использоваться при передаче потоковых данных. Сложность обеспечения передачи потоковых данных через преобразование сетевых адресов. Применение стандартизованных технологий в сокращенном варианте.

    статья, добавлен 29.04.2017

  • Silicon Valley - home to many of the world's largest technology corporations as well as thousands of small startups. Zhongguancun as a technology hub in Haidian District, Beijing, China. Features of notable education and research centers in the USA.

    доклад, добавлен 15.03.2014

  • The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

    контрольная работа, добавлен 07.08.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.