22 research outputs found

    Security and Network Analysis Using Simulation

    Get PDF
    ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because of its ability to model the entire networking domain, including its routers, switches, protocols, servers, and the individual applications they support. ITGuru improves network researchers\u27 and instructors\u27 ability to identify and solve problems throughout the network. The OpNET Corporation provides a FREE academic copy of their simulation environment to universities for both teaching and research

    ITGuru - A Powerful Network Simulation Environment for Teaching and Research

    Get PDF
    ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because of its ability to model the entire network, including its routers, switches, protocols, servers, and the individual applications they support. ITGuru improves network designers and instructors the ability to identify and solve problems throughout their network. ITGuru assesses application impact, automates diagnostic testing, expedites server capacity planning and consolidation, analyzes failure impact, and enables network growth plannin

    Software Development Productivity and Cycle Time Reduction

    Get PDF
    Increasing software developers\u27 productivity and reducing the software development process\u27 cycle time are key goals for organizations responsible for building software applications. This paper proposes four major areas impacting an organization\u27s ability to increase developer productivity and reduce development cycle time. The four areas are (1) organizational structure and climate, (2) reward system, (3) software development process and (4) the use of software design and testing tools

    Using an Easy-to-Use and Free Tool in Teaching and Researching Networks and Security Issues

    Get PDF
    ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because of its ability to model the entire networking domain, including its routers, switches, protocols, servers, and the individual applications they support. ITGuru improves network researchers\u27 and instructors\u27 ability to identify and solve problems throughout the network. The OpNET Corporation provides a FREE academic copy of their simulation environment to universities for both teaching and research

    Qualitative Evaluation of Latency and Packet Loss in a Cloud-based Games

    Get PDF
    On-demand multimedia services are more popularthan ever and continue to grow. Consumers can now streammusic, movies, television, and video games at the push of abutton. Such services typically require a minimum connectionspeed to support streaming. However, transient network effectssuch as packet loss and delay variation can play a crucial role indetermining the user quality of experience (QoE) in streamingmultimedia systems. This paper will seek to establish thesubjective impact of negative network effects on the userexperience of a popular cloud-based on-demand video gameservice

    Free Tools for Teaching & Researching Wireless Networking Concepts

    Get PDF
    As wireless networking and security become more prevalent in the market, more and more computer science programs are incorporating courses in wireless networks or at the least, devoting a significant percentage of the advanced networking courses to wireless topics. As a result, in addition to industry practitioners, there is a growing interest among university researchers and faculty regarding tools used for teaching and researching in wireless networking concepts.This tutorial will demonstrate two free tools, Network Stumbler and ITGuru\u27s wireless module (academic version is free)

    The Future Leading Mobility Protocol: Mobile IPv4 OR Mobile IPv6?

    Get PDF
    Mobile computing has become an important area of computer networking and is expected to play a fundamental role in the ubiquitous access of Internet resources in the future. In recent years, we have seen increasing demand from end-users to access network resources from anywhere and at anytime from all kinds of devices. A greater degree of connectivity is almost becoming mandatory in todays business world. In addition, mobility of end-users is placing further requirements on network systems and protocols to provide uninterrupted services. Mobile network protocol such as Mobile IPv4 has emerged as one of the promising solutions capable of providing uninterrupted connectivity. It allows the users to roam beyond their home network while still maintain their own home IP address. Similarly, Mobile IPv6 is the protocol that deals with the mobility for the IPv6 nodes. This protocol allows an IPv6 node to be mobile, and arbitrarily change its location on the IPv6 Internet while still maintaining its existing connections.We have done a study of the MobileIP technology, and the components that support this technology. We investigated the impact of mobility on the performance of voice and video conferencing applications over Mobile IPv4 and Mobile IPv6. Through this paper, we have made an attempt to identify the strengths and weaknesses of the two mobility protocols and discover which protocol leads the future generation Internet.This paper is organized as follows. The first part briefly overviews the two mobility protocols (Mobile IPv4 and IPv6). The second part describes the basic scenarios of the network model that are required to conduct such evaluation, followed by the results of the simulation. Final part describes the conclusion of our study

    A Taxonomy of Free Network Sniffers for Teaching and Research

    Get PDF
    Today\u27s networking environment has become very complex. Networks have been growing in size rapidly and have come to support more complex applications. As result, troubleshooting and maintaining networks has become cumbersome and has created the need for new specialized tools such as Network Protocol Analyzers, better known as Network Sniffers .Network Sniffers have become critical tools in today\u27s networking management and troubleshooting processes. They enable network managers to evaluate and examine the data running through their network by troubleshooting network performance problems and identifying certain network faults. Network Sniffers can help identify network attacks and detect security threats; they can be used in intrusion detection systems.Besides their usage in the technical environment, network sniffers can be used for educational and research purposes. They can be used to help understand packets\u27 architecture and traffic patterns generated by common network applications. Network Sniffers can also be used to evaluate protocol performance and assist in protocol development. Despite their usefulness, network sniffers can be harmful when used by hackers. With network sniffers, hackers can capture data and steal information from targeted networks.This study consists of two major efforts. The first major effort entails researching and determining a set of criteria to use in evaluating and comparing network sniffers. The second major effort involves using the criteria to evaluate and compare three free network sniffers, thus building a taxonomy. The three free network sniffers used in this study were Ethereal, EtherSnoop and Packetyzer. Each of these three sniffers was evaluated and tested. Then their features and capabilities were compared

    A Comparative Study of Email Forensic Tools

    Get PDF
    Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only various fields that can be forged by hackers or malicious users, but also the flexibility of composing, editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications. Towards this direction, a number of open source forensics tools have been widely used by the practitioners. However, these tools have been developed in an isolated manner rather than a collaborative approach. Given that email forensic tool users need to understand to what extent a tool would be useful for his/her circumstances and conducting forensic analysis accordingly. In this paper, we examine a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic
    corecore