19th International Symposium on High Performance Computing Systems and Applications (HPCS'05)
DOI: 10.1109/hpcs.2005.35
|View full text |Cite
|
Sign up to set email alerts
|

Netzwerk: Migration of a Packet-Switching Network Simulation Environment from MS Windows PC to Linux PC and to HPC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…We briefly describe the PSN model, developed in [16], [17], and its C++ simulator, called Netzwerk-1 ( [18], [19]) that we use in our study. The PSN model is an abstraction of the ISO OSI Network Layer Reference Model.…”
Section: A Packet Switching Network Modelmentioning
confidence: 99%
“…We briefly describe the PSN model, developed in [16], [17], and its C++ simulator, called Netzwerk-1 ( [18], [19]) that we use in our study. The PSN model is an abstraction of the ISO OSI Network Layer Reference Model.…”
Section: A Packet Switching Network Modelmentioning
confidence: 99%
“…We briefly describe the PSN model, developed in [5,6], and its C++ simulator, called Netzwerk-1 [10,11] that we use in our study. The PSN model is an abstraction of the ISO OSI Network Layer Reference Model.…”
Section: Description Of Packet Switching Network Modelmentioning
confidence: 99%
“…In Section 2, we describe briefly the PSN model used in our study [5,6,10,11]. In Section 3, we describe the experiments that we conducted using the PSN model and we introduce network performance indicators used in our study [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…First, we briefly describe our PSN model ( [9], [10]), its C++ simulator, Netzwerk ( [11], [12]]), and explain how they have been customized to model and simulate a "ping" type DDoS attacks. Next, we introduce definition of entropy functions of network-wide monitored packet traffic at selected sets of routers used by us in detection of DDoS attacks in our virtual experiments.…”
Section: Introductionmentioning
confidence: 99%