2012
DOI: 10.2200/s00397ed1v01y201112cnt010
|View full text |Cite
|
Sign up to set email alerts
|

NS Simulator for Beginners

Abstract: Synthesis Lectures on Communication Networks is an ongoing series of 50-to 100-page publications on topics on the design, implementation, and management of communication networks. Each lecture is a self-contained presentation of one topic by a leading expert. The topics range from algorithms to hardware implementations and cover a broad spectrum of issues from security to multiple-access protocols. The series addresses technologies from sensor networks to reconfigurable optical networks. The series is designed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
4

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(41 citation statements)
references
References 34 publications
0
37
0
4
Order By: Relevance
“…This type of security management focuses on prevention technique, as it presents a set of management mechanisms based on trust and reputation to prevent malicious nodes from entering the trusted community. Moreover, depending solely on the trustworthiness and reputation of nodes is not suitable for applications where high degrees of accountability and security are required [5,29,112].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This type of security management focuses on prevention technique, as it presents a set of management mechanisms based on trust and reputation to prevent malicious nodes from entering the trusted community. Moreover, depending solely on the trustworthiness and reputation of nodes is not suitable for applications where high degrees of accountability and security are required [5,29,112].…”
Section: Discussionmentioning
confidence: 99%
“…Proposed in [5], this provides a policy-based network security management mechanism called the -Ripple Effect‖ to achieve integration and adaptation, and to activate different levels of security for ad hoc wireless systems. This mechanism has three distinguished functions:…”
Section: Policy-based Security Management For Ad Hoc Wireless Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Por esta razón no importará el gestor de cola utilizado en este caso, aspecto que si afectará en el siguiente escenario [17].…”
Section: Ip Sin Qos -Garantía De Ancho De Bandaunclassified
“…Through a simulation environment, many conditions can be studied such as scalability that is difficult to simulate in a real environment because of its very high cost, such as simulation of the dynamic and multipoint virtual private networks. Several scientific research simulators can be www.ijacsa.thesai.org used as OPNET Modeler, NS2… [8,9,10], but managing a dynamic and multipoint VPN under OPNET Modeler simulator requires firstly a mastery of the tool and secondly the technology, this is a good motivation to develop a system for automatically creating projects for various architectures of the same network, for this reason we have created an automation model for simulating dynamic multipoint and multi architectures Virtual Private Network, and a GUI man/machinery application designed for this type of networks.…”
Section: Introductionmentioning
confidence: 99%