TARVOS Computer Networks Simulator

  •        91

Discrete event-based network simulator, supports simulating MPLS architecture, several RSVP-TE protocol functionalities and fast recovery.




Related Projects


The main two development paths: the first military representative of the United States civilian, the first way to improve after popular and practical use in Japan as the representative of the commercialization of education followed to improve the way. China should belong to the latter, although the military-industrial sector applications earlier, but not converted to civilian use, rapid development and popularization or in the past 20 years. In recent years, the critical period of the urgent nee

cdmsimulator - A CDMA simulator written in Java for High Performance Networks class, in ICMC-USP.

A CDMA simulator written in Java for High Performance Networks class, in ICMC-USP.

networking-bagpipe - Neutron agent and drivers for BaGPipe-based BGP VPNs

Driver and agent code to use BaGPipe lightweight implementation of BGP-based VPNs as a backend for Neutron.BGP-based VPNs rely on extensions to the BGP routing protocol and dataplane isolation (e.g. MPLS-over-x, VXLAN) to create multi-site isolated virtual networks over a shared infrastructure, such as BGP/MPLS IPVPNs (RFC4364) and E-VPN (RFC7432). They have been heavily used in IP/MPLS WAN backbones since the early 2000's.

my-bachelor-thesis - WEP prootocol security analysis in 802.11 WLAN computer networks

WEP prootocol security analysis in 802.11 WLAN computer networks


Visual cryptography is a powerful technique which combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares which can be stacked together to approximately recover the original image. The physical transparency stacking type of decryption allows for the recovery of the traditional visual cryptography quality image. In this paper, quantification and analysis is done based on various performance parameters of vi

NS 3 - Network Simulator

Ns is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

google-perftools - Fast, multi-threaded malloc and performance analysis tools

Fast, multi-threaded malloc and performance analysis tools

Kong - The Microservice API Gateway

Kong is a cloud-native, fast, scalable, and distributed Microservice Abstraction Layer (also known as an API Gateway, API Middleware or in some cases Service Mesh). Backed by the battle-tested NGINX with a focus on high performance, Kong was made available as an open-source platform in 2015. Under active development, Kong is used in production at thousands of organizations from startups, Global 5000 and Government organizations.

networking-bgpvpn - APIs and framework to attach BGP VPNs to Neutron networks

This project provides an API and Framework to interconnect BGP/MPLS VPNs to Openstack Neutron networks, routers and ports.The Border Gateway Protocol and Multi-Protocol Label Switching are widely used Wide Area Networking technologies. The primary purpose of this project is to allow attachment of Neutron networks and/or routers to VPNs built in carrier provided WANs using these standard protocols. An additional purpose of this project is to enable the use of these technologies within the Neutron networking environment.

cluster-scheduler-simulator - Automatically exported from code

This simulator can be used to prototype and compare different cluster scheduling strategies and policies. It generates synthetic cluster workloads from empirical parameter distributions (thus generating unique workloads even from a small amount of input data), simulates their scheduling and execution using a discrete event simulator, and finally permits analysis of scheduling performance metrics.While the simulator will simulate job arrival, scheduler decision making and task placement, it does not simulate the actual execution of the tasks or variation in their runtime due to shared resources.

ASM - Java bytecode manipulation and analysis framework

ASM is an all purpose Java bytecode manipulation and analysis framework. It can be used to modify existing classes or dynamically generate classes, directly in binary form. Provided common transformations and analysis algorithms allow to easily assemble custom complex transformations and code analysis tools.

S2 Services Excel Recovery

MS recommended Excel recovery methods in one GUI - adds 4 of its own.


Fast flexible simulator of spiking neural networks. Easy to use graphical user interface with comprehensive monitoring facilities. Integrates with the NeMo CUDA simulator and the iSpike interface for the iCub robot.

ObjectDetectionUsingCntk - Fast R-CNN Object Detection on Azure using CNTK

Object Detection is one of the main problems in Computer Vision. Traditionally, this required expert knowledge to identify and implement so called “features” that highlight the position of objects in the image. Starting in 2012 with the famous AlexNet paper, Deep Neural Networks are used to automatically find these features. This lead to a huge improvement in the field for a large range of problems.This tutorial uses Microsoft Cognitive Toolkit's (CNTK) fast R-CNN implementation (see the Fast R-CNN section for a description) which was shown to produce state-of-the-art results for Pascal VOC, one of the main object detection challenges in the field.

Performance Analysis of Logs (PAL) Tool

Ever have a performance problem, but don't know what performance counters to collect or how to analyze them? The PAL (Performance Analysis of Logs) tool is a powerful tool that reads in a performance monitor counter log and analyzes it using known thresholds.

recovery - This is the recovery tool for lemote computer

This is the recovery tool for lemote computer

Restore, backup and recovery

RESTORE is a complete enterprise network backup and recovery solution. It is scalable to a complete backup solution for multiple workstations, servers and data centers. It operates over local area networks, wide area networks, and the Internet.

nervana-lib-gpu-performance-preview - Fast GPU kernels for convolutional networks.

This is a proof-of-concept preview release of the main GPU kernels used in a convolutional neural network (CNN). They are being incorporated into a forthcoming release of Nervana's full-featured Deep Learning Library, which is currently in limited beta. The preview includes convolutional fprop-backprop-update kernels, dense matrix multiply (GEMM) kernels, and automatically generated element-wise kernels. The kernels use an underlying 16-bit representation used in a recent paper by Courbariaux et

Amazon DSSTNE: Deep Scalable Sparse Tensor Network Engine

DSSTNE (pronounced "Destiny") is an open source software library for training and deploying recommendation models with sparse inputs, fully connected hidden layers, and sparse outputs. Models with weight matrices that are too large for a single GPU can still be trained on a single host. DSSTNE has been used at Amazon to generate personalized product recommendations for our customers at Amazon's scale.

MPLS for Linux

MPLS for Linux is a project to implement a MPLS (Multi Protocol Label Switching) stack for the Linux kernel, and portable versions of the signaling protocols associated with MPLS.