2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2012
DOI: 10.1109/acsat.2012.87
|View full text |Cite
|
Sign up to set email alerts
|

Customized Ping Tool for Smart Grid Communication Network Testing

Abstract: Heterogeneous and hybrid smart grid communication network is a network that comprises of different communication mediums and technologies.Performance evaluation is one of the main concerns in smart grid communication system. In any smart grid communication implementation, to determine the performance factor of the network, a testing of an end-to-end process flow is required. Therefore, an effective testing tool plays a crucial role in evaluating the performance of smart grid communications. Ping is currently o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The application provides users with a series of levels where the user would control how bundles of information or “packets” were routed between devices in a simulated network. These levels would have the user learn about topics such as routing, weighted graphs, algorithms, pinging, and a cybersecurity attack known as the “man in the middle” [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. All of these levels remain in the second version which we called as ML version of the application and were improved to more intuitively convey the ideas being taught.…”
Section: Application Developmentmentioning
confidence: 99%
“…The application provides users with a series of levels where the user would control how bundles of information or “packets” were routed between devices in a simulated network. These levels would have the user learn about topics such as routing, weighted graphs, algorithms, pinging, and a cybersecurity attack known as the “man in the middle” [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. All of these levels remain in the second version which we called as ML version of the application and were improved to more intuitively convey the ideas being taught.…”
Section: Application Developmentmentioning
confidence: 99%