1 / 6

Neco CORE Modules

Behaviour & Communication. Network Coding Specifics. Statistics / Output Analysis. Network Topologies. Neco CORE Modules. NS-3 Bindings. Scheduler. Graphics (Visualization Tool). Behaviour & Communication. Channel / Link Behaviour Node Behaviour Protocol Specifications.

Download Presentation

Neco CORE Modules

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Behaviour & Communication Network Coding Specifics Statistics / Output Analysis Network Topologies Neco CORE Modules NS-3 Bindings Scheduler Graphics (Visualization Tool)

  2. Behaviour & Communication • Channel / Link Behaviour • Node Behaviour • Protocol Specifications • Interpreter for scripting • Language for simulation • specification

  3. Network Coding Specifics • Finite Field Arithmetic

  4. Graphics (Visualization tool) • Visualization of the network topology • Visualization of interaction between nodes • Visualization of degree of information for each node

  5. Neco Additional Modules Behaviour & Communication Statistics / Output Analysis P2P Networks Security Protocols Entropy and Mutual Information Metrics

  6. Neco - Research Goals (NIP) • Security: • Eavesdropping • Evaluate the rank that each node has access to in several random graphs using RLNC • Make a simulation testbed for SPOC and integrate other NC security technologies • Byzantine • Evaluate impact of topology in dissemination of Byzantine packets • Derive optimal topologies for prevention of dissemination of Byzantine packets

More Related