2017
DOI: 10.1007/978-3-319-64352-6_69
|View full text |Cite
|
Sign up to set email alerts
|

A Virtualized Computer Network for Salahaddin University New Campus of HTTP Services Using OPNET Simulator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Referring to Figure 1(a-b), IoT provides the Machine-to-Machine (M2M) interaction with short-range and long-range wireless technologies (such as ZigBee, Bluetooth, WiFi, Low Power Wide Area (LPWA)) by which the IoT devices have remotely interacted (connect, sensed and communicate) with each other via a network infrastructure and makes a more informed decision regarding the provision of the services via autonomous communication [9], [34], [35], [36], [37], [38], [39]. Moreover, the standard protocols of IoT networks are categorized based on application, service discovery, and infrastructure [40].…”
Section: Background Of the Internet Of Thingsmentioning
confidence: 99%
“…Referring to Figure 1(a-b), IoT provides the Machine-to-Machine (M2M) interaction with short-range and long-range wireless technologies (such as ZigBee, Bluetooth, WiFi, Low Power Wide Area (LPWA)) by which the IoT devices have remotely interacted (connect, sensed and communicate) with each other via a network infrastructure and makes a more informed decision regarding the provision of the services via autonomous communication [9], [34], [35], [36], [37], [38], [39]. Moreover, the standard protocols of IoT networks are categorized based on application, service discovery, and infrastructure [40].…”
Section: Background Of the Internet Of Thingsmentioning
confidence: 99%
“…In the Smuggler, possible ways are found and the shortest is selected. In the Donkeys mode, many donkey behaviors are used such as Run, Face & Suicide, and Face & Support [31,32,33,34,35,36] .…”
Section: Research Literaturementioning
confidence: 99%
“…Their findings showed that security and improved performance are inversely proportional and cannot be 100% achieved in every scenario, especially in the current cyber world as threats are becoming more and more substantial. For further information, readers are encouraged to read Rashid and Barznji, 2018).…”
Section: Literature Review or Backgroundmentioning
confidence: 99%