Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing | Contact experts in Computer Networks to get answers
1,854 views 386 posts
Questions related to Computer Networks
symmetric key cipher (block or stream cipher) providing partial decryption of data at some points. Although the entire data is not been decrypted but the data decrypted to that specific point...
04 May 2016 1,986 4 View
Network simulation is a one of the most major evaluation methodologies in the area of computer networks. What are the main Network simulators that been used in the field of communication systems?
27 April 2016 6,442 6 View
04 April 2016 4,987 7 View
I need simulate slotted aloha by opnet modeler
04 April 2016 9,513 7 View
i am having a hard time understanding the concept of hamming distance. i have watched many videos on youtube which shows how to find hamming distance between two codewords. But how can i find the...
04 April 2016 1,806 3 View
We all or some of us have an idea of the capabilities of Zeus which is still commercial as we speak. Zeus has managed to steal a lot of millions of $$ and a pretty good amount of personal...
22 March 2016 1,644 3 View
Apart from cluster based approach in MTC or M2M communication, in which groups are formed to scale down the signaling overhead, is there any other approach/technique/scenario in MTC which can be...
03 March 2016 5,425 3 View
In the field of access control policy, anyone can provide an explanation of the difference between SAML and XACML. In an Attribute Based Access Control models, can both be applied simultaneously?
02 February 2016 2,411 4 View
I have to decide the area of research for my Master's and would like to know the current research trend in the field of computer networking.
02 February 2016 8,908 1 View
What is the best way to store rule sets generated from Genetic Algorithm for Intrusion Detection System (IDS) ? And how can this rule be used for testing new network traffic ?
01 January 2016 9,710 8 View
in order to describe or discover the current dependent relationship (interaction )between agents, i want to find a method which can generate the network for the current agents based simply on the...
01 January 2016 9,446 1 View
If system 1 sends an email to system 2. System 1 should receive an email that system 2 received or read email. Is this feasible?
01 January 2016 321 7 View
Hi all, I am looking for datasets (small-medium size) representing computer networks. For example, nodes can be PC, servers, routers and an arc between two nodes indicates a physical (or virtual)...
01 January 2016 3,558 8 View
What are the research areas for computer networks ?
28 December 2015 2,731 26 View
12 December 2015 9,281 26 View
I installed the CRCN patch on ns2.31. when i try to get the throughput results like the link below, about maccon protocol (test4maccon.tcl+topo4.tcl) i get the same result in the link. but it is...
12 December 2015 1,794 4 View
In wsn, nodes energy play a vital role for long life of network.
12 December 2015 8,123 4 View
hello every one, I am wondering if ndn does not use any information of users for sending Interest message, how this network deliver data to the user.Moreover, I would like to say that the Data...
12 December 2015 2,145 3 View
10 December 2015 6,927 3 View
04 December 2015 6,788 3 View
04 December 2015 9,453 3 View
Does someone know any software or routine for nonlinear transformation from MNI to Talairach space? I have to convert whole data-tables so a commandline routine would be appropriate. I'm working...
11 November 2015 4,812 1 View
Can the destination node determine which path the packet took in the network by looking at some field ? Trivial solution is to insert all the intermediate nodes while the packet is traversing the...
11 November 2015 3,001 13 View
50 VM machines boot from San , for backup design solution without cost consideration which is the best solution? 1) using the second SAN storage with the same config as primary SAN 2)using another...
11 November 2015 8,766 3 View