Comparison of network simulators in IP networks

Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

Подобные документы

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    статья, добавлен 20.01.2016

  • Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.

    контрольная работа, добавлен 14.05.2017

  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья, добавлен 22.08.2021

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.

    презентация, добавлен 28.12.2013

  • The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.

    статья, добавлен 23.10.2020

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга, добавлен 08.03.2014

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • Research of the problem of training IT industry specialists, experience in teaching the basics of programming to educational applicants. Description of the Applied Technologies that contribute to the formation of competencies of IT industry specialists.

    статья, добавлен 06.04.2023

  • Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.

    статья, добавлен 16.08.2022

  • Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.

    статья, добавлен 23.05.2023

  • Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.

    статья, добавлен 18.09.2020

  • Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.

    дипломная работа, добавлен 04.12.2019

  • Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.

    диссертация, добавлен 30.09.2016

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    статья, добавлен 23.02.2016

  • The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.

    презентация, добавлен 09.03.2016

  • The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.

    статья, добавлен 10.10.2023

  • Develop a mechanism that identifies the line with Romanian chromatic words on the basis of computer technologies. The first phase of development of the dictionary meanings of poetic colors. Cooperation of linguists and specialists in informatics.

    статья, добавлен 23.02.2016

  • The opportunities of the GeoGebra dynamic geometry environment. Capabilities of the system for creating drawings, tables of experimental data and their application in conducting research work. The examples of solving some elementary geometry problems.

    статья, добавлен 25.05.2017

  • Development new field of design - multimedia design. Communication of computer processes. Composition as a fundamental factor in the creation of multimedia products. Realization of the idea of project. Compositional organization of multimedia project.

    статья, добавлен 10.05.2018

  • Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.

    дипломная работа, добавлен 02.05.2015

  • Online proctoring techniques to prevent academic misconduct during online tests. The resources and requirements for the dissemination of online examinations in educational institutions in Sri Lanka. Ways to improve and spread online proctoring systems.

    статья, добавлен 16.08.2023

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.

    дипломная работа, добавлен 23.09.2018

  • Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.

    статья, добавлен 08.08.2021

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.