A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
This paper evaluates the performance of Centralized multicasting network with two sources and four receivers, attacked by five attacker. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet size of 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. Simulation is done using Network Simulator (NS2) on Linux and the graphs are drawn using xgraph.doi:10.5120/4641-4361 fatcat:qf4fy5torjbtbopy3e5es5ezte