Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing | Contact experts in Computer Networks to get answers
2,822 views 399 posts
Questions related to Computer Networks
symmetric key cipher (block or stream cipher) providing partial decryption of data at some points. Although the entire data is not been decrypted but the data decrypted to that specific point...
05 May 2016 4,817 4 View
Can anyone please tell me the various parameters that affects the mobility of a network? Thanks!
05 May 2016 5,111 8 View
Is there any device to carry OLT output through Ethernet .It is required to carry the output of OLT through Ethernet airinterface Point to Point device to a distance end & covert it back as...
05 May 2016 2,143 1 View
I need to generate a random wireless network of nodes over an area 1000 x 1000 m2 having a specified average number of neighbors along the nodes. So, is there an equation or a certain random...
05 May 2016 902 4 View
04 May 2016 2,045 4 View
Network simulation is a one of the most major evaluation methodologies in the area of computer networks. What are the main Network simulators that been used in the field of communication systems?
27 April 2016 6,516 6 View
04 April 2016 5,058 7 View
I need simulate slotted aloha by opnet modeler
04 April 2016 9,565 7 View
i am having a hard time understanding the concept of hamming distance. i have watched many videos on youtube which shows how to find hamming distance between two codewords. But how can i find the...
04 April 2016 1,854 3 View
We all or some of us have an idea of the capabilities of Zeus which is still commercial as we speak. Zeus has managed to steal a lot of millions of $$ and a pretty good amount of personal...
22 March 2016 1,695 3 View
Apart from cluster based approach in MTC or M2M communication, in which groups are formed to scale down the signaling overhead, is there any other approach/technique/scenario in MTC which can be...
03 March 2016 5,471 3 View
In the field of access control policy, anyone can provide an explanation of the difference between SAML and XACML. In an Attribute Based Access Control models, can both be applied simultaneously?
02 February 2016 2,461 4 View
I have to decide the area of research for my Master's and would like to know the current research trend in the field of computer networking.
02 February 2016 8,950 1 View
What is the best way to store rule sets generated from Genetic Algorithm for Intrusion Detection System (IDS) ? And how can this rule be used for testing new network traffic ?
01 January 2016 9,774 8 View
in order to describe or discover the current dependent relationship (interaction )between agents, i want to find a method which can generate the network for the current agents based simply on the...
01 January 2016 9,494 1 View
If system 1 sends an email to system 2. System 1 should receive an email that system 2 received or read email. Is this feasible?
01 January 2016 398 7 View
Hi all, I am looking for datasets (small-medium size) representing computer networks. For example, nodes can be PC, servers, routers and an arc between two nodes indicates a physical (or virtual)...
01 January 2016 3,617 8 View
What are the research areas for computer networks ?
28 December 2015 2,792 26 View
12 December 2015 9,357 26 View
I installed the CRCN patch on ns2.31. when i try to get the throughput results like the link below, about maccon protocol (test4maccon.tcl+topo4.tcl) i get the same result in the link. but it is...
12 December 2015 1,851 4 View
In wsn, nodes energy play a vital role for long life of network.
12 December 2015 8,181 4 View
hello every one, I am wondering if ndn does not use any information of users for sending Interest message, how this network deliver data to the user.Moreover, I would like to say that the Data...
12 December 2015 2,206 3 View
10 December 2015 6,976 3 View
04 December 2015 6,839 3 View