Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing | Contact experts in Computer Networks to get answers
1,855 views 386 posts
Questions related to Computer Networks
Regarding the updated information about the topic
05 May 2014 2,606 0 View
Is there an application that could tell the web pages visited by each user in my LAN?
05 May 2014 5,767 2 View
Does anyone have any suggestions as to how I can design a packet capture application that identifies IP addresses and is able to resolve the IP addresses back to URLs so as to detect the websites...
05 May 2014 1,003 0 View
Be precise with the answer please.
05 May 2014 9,671 6 View
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall? Or, what tools you using to analyse and test the...
03 May 2014 1,945 5 View
In order to security provision in radio access network of mobile communication networks we use encryption methods, I was wondering what method is used to keep confidentiality in core network.
13 April 2014 6,610 2 View
Simulation of Application Layer DDoS attack
04 April 2014 8,694 2 View
I have noticed that many good journal/conference papers (including some research books) have some non-smooth curve plotting, such as for packet delivery ratio (PDR), End-to-End (E2E) communication...
04 April 2014 3,985 2 View
We sent H.264 on the LAN using VLC and got link usage about 50% to >100% more than the video rate set in the application. Based on headers of RTP, UDP, IP and Ethernet, the difference should be...
04 April 2014 5,475 1 View
I want to implement attack on a wireless ad hoc network.
04 April 2014 3,677 4 View
I have been trying to run a simulation of a simple UMTS network running on an IP backbone but I have repeatedly received the same error: "Error in GTP process model: Wrong Core Network...
04 April 2014 7,857 2 View
1.) Suppose there are three nodes 1,2,3 performing AODV routing protocol. 2.) Node1 generates the traffic to Node3 and the route is via node2. 3.) the rate of generation of the packet by node1...
04 April 2014 3,299 2 View
see above
24 March 2014 4,597 6 View
I need to model SMA with StarUML. An AML plugin is required. Currently the only platform offering this modeling language is an extension of StarUML proposed by the company Whitestein...
03 March 2014 7,340 9 View
From what I researched it could be used for extraction of relevant information out of coarse building vector data maps (BVDM) for channel prediction. Can this be used in UE and then reported to BS?
03 March 2014 8,201 0 View
Is it possible?
03 March 2014 7,606 2 View
Traffic model.
03 March 2014 1,178 2 View
03 March 2014 1,758 6 View
Hi, does it make sense to use CBR Application with TCP Agent in NS2?
03 March 2014 7,771 0 View
I know NS and GloMoSim for Ad-hoc networks. Is there a simulator used for home networks?
03 March 2014 3,780 8 View
While poisoning an ARP cache, it is the legitimate user whose reply is received first rather than the attacker's fake reply when a corresponding request is sent. Maybe because the attacker is...
28 February 2014 1,838 14 View
Hell everybody, i'm searching for real security protocols have been analyzed by YAPA، AVISPA ، Scyther، athina and others. Can you help me??
28 February 2014 9,618 2 View
Can someone describe the steps to follow to simulate an architecture of intrusion detection based in MAS with Madkit platform?
14 February 2014 6,232 3 View
02 February 2014 2,232 4 View