Open-Source Network Simulation Tools: An Overview
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a specific network algorithm that needed a large amount of time and cost. The simulator helps the network developer to check whether the network is able to work in the real world. Thus both the time and cost of testing the functionality of the network have been reduced and implementations are made easy. Network simulators are also particularly useful in allowing the network designers to test new networking protocols or to change the existing protocols in a controlled and reproducible manner. In this paper, we discuss on different open-source simulators, present a comprehensive survey on current open-source network simulators and introduce the main features of different open-source network simulator and consider their advantages and disadvantages. We hope this survey for those people who feel difficult to select the appropriate open-source network simulators for their research.
Authors and Affiliations
Suraj G. Gupta , Mangesh M. Ghonge , Parag D. Thakare , Dr. P. M. Jawandhiya
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL SYSTEM
Image mining is a vital technique which is used to mine knowledge from image. This is simply an expansion of data mining. The function of image mining is to retrieve similar image from huge database. The developm...
Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation.
TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission...
Intelligent System for detecting, Modeling, Classification of human behavior using image processing, machine vision and OpenCV
Surveillance Cameras has proven to be a key factor in enhancing the public security in many countries around the world . In spite of advancements in image processing and machine vision techniques very less is app...
STUDY OF QUANTUM CRYPTOGRAPHY
t-The concept of quantum cryptography involves the quantum physics by which two parties can establish a secure key exchange. The security in such system is defined by the laws of quantum physics. Quantum cryptography...
Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT
Non-stationary signal processing applications use standard non-redundant DWT (Discrete Wavelet Transform) which is very powerful tool. But it suffers from shift sensitivity, absence of phase information, and poor directi...