A computer network simulation tutorial for COMNET III

Download
Author
Sullivan, Jeffrey Edward
Date
1996-06Advisor
Sridhar, Suresh
Boger, Dan C.
Metadata
Show full item recordAbstract
The military is heavily reliant on the transfer of information among various networks in its day-to-day operations. With fewer defense dollars available for the development of new systems, the use of commercial- off-the-shelf (COTS) hardware to build military information networks is becoming commonplace. The critical nature of much of this information requires that knowledge of the performance characteristics of the networks through which this information travels be known. These characteristics allow network managers and designers to plan for future growth of the network, analyze network reliability, and plan for the construction of new networks. One method to determine the performance characteristics of a network is through the use of modeling and simulation. COMNET III release 1., 1n is a COTS network simulation application which may be used to model and simulate both local and wide area networks. This thesis provides a tutorial to explain the theory used in the application for the modeling and simulation of networks. Each chapter presents the theory of several objects which may be used in the application, states a network problem which is to be analyzed, provides step- by-step instructions to build a model to analyze the network problem, and presents the results of the network simulation.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Exploring Blockchain Adoption Supply Chains: Opportunities and Challenges
Gheorghe, Adrian V.; Keskin, Omer F.; Pour, Farinaz Sabz Ali; Tatar, Unal (Monterey, California. Naval Postgraduate School, 2022-03-31); ODU-AM-22-026In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions ...