Essays about: "opnet security"

Showing result 1 - 5 of 6 essays containing the words opnet security.

  1. 1. OPNET Analysis of VoIP over MPLS VPN with IP QoS

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Bilal Zahid Rana; Shahid Ali; [2011]
    Keywords : IP; VoIP; MPLS; VPN; QoS; MPLS VPN;

    Abstract : There are many disadvantages (cost, lack of security, difficult to manage large networks, support to non-sensitive applications, delay, etc.) associated with traditional networking, IP network, ATM and Frame relay networking. READ MORE

  2. 2. Analysis of Black Hole attack on MANETs Using different MANET routing protocol

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Shoaib Ur-Rehman; Irshan Ullah; [2010]
    Keywords : MANET; Black Hole; Routing Protocols.;

    Abstract : ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). READ MORE

  3. 3. Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : IRSHAD ULLAH; SHOAIB UR REHMAN; [2010]
    Keywords : MANET; Black Hole; Routing Protocols;

    Abstract : Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). READ MORE

  4. 4. Investigation of Interworked IMS Architecture In Terms Of Traffic Security

    University essay from Blekinge Tekniska Högskola/Sektionen för ingenjörsvetenskap

    Author : Aftab Ur Rehman; [2009]
    Keywords : IMS; Network Domain Security; Security Gateways; Traffic Security; Authentication and Encryption Algorithms. ;

    Abstract : IMS is the buzz word in today’s telecom industry and believed to be the strongest candidate for the next generation all IP networks. Since it converge the traditional cellular network and global internet, it inherits all the IP based network security issues and exposed to a verity of threats in term of access and traffic security. READ MORE

  5. 5. Security and Performance Analysis of Topology-Based Intrusion Detection System in Ad Hoc Networks

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : UMUNNA CHRISTIAN CHEZZ CHETACHI; [2009]
    Keywords : Ad-hoc networks; cluster topology; Intrusion detection system; jammer attack Security;

    Abstract : As Wireless ad-hoc Networks are becoming an increasingly emerging technology taking a centre stage in exciting research areas which has attracted many research attentions in communication systems, the need for efficient intrusion detection techniques to enhance network security and privacy has gained significant prominence. Intrusion detection systems(IDS) in ad- hoc networks provides an effective method to improve the security, energy efficiency of transmission nodes allowing better spatial reuse of the wireless channel and control over network resources in order to optimize node security and the transmit power thereby maintaining network connectivity. READ MORE