A grid service-based Distributed Network Simulation Environment for computer networks education

2010 ◽  
Vol 20 (4) ◽  
pp. 654-665 ◽  
Author(s):  
Miguel L. Bote-Lorenzo ◽  
Juan I. Asensio-Pérez ◽  
Eduardo Gómez-Sánchez ◽  
Guillermo Vega-Gorgojo ◽  
Carlos Alario-Hoyos
Author(s):  
Miguel L. Bote-Lorenzo ◽  
Juan I. Asensio-Perez ◽  
Eduardo Gomez-Sanchez ◽  
Guillermo Vega-Gorgojo ◽  
Yannis A. Dimitriadis ◽  
...  

2018 ◽  
Vol 21 (4) ◽  
pp. 1899-1915 ◽  
Author(s):  
Sergio Serrano-Iglesias ◽  
Eduardo Gómez-Sánchez ◽  
Miguel L. Bote-Lorenzo ◽  
Juan I. Asensio-Pérez ◽  
Manuel Rodríguez-Cayetano

Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.


Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding node by computing the behaviour. The intermediate nodes selected for routing the data packets proves the legitimacy of each other by getting the passive acknowledgement process within a predefined time to live (TTL) time. Further, grey hole and black hole attacks are considered in the network simulation environment as they drastically affect the network metrics during the communication because of their severe attacking characteristics. The proposed mechanism is validated over conventional routing mechanisms against packet loss and network delay parameters in the presence of black hole and grey hole routing attacks.


2004 ◽  
Vol 14 (2) ◽  
pp. 116-148 ◽  
Author(s):  
George F. Riley ◽  
Mostafa H. Ammar ◽  
Richard M. Fujimoto ◽  
Alfred Park ◽  
Kalyan Perumalla ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document