Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Design and Implementation of the Singhal token based mutual exclusion
[ Design and Implementation of the Singhal token based mutual exclusion algorithm in kernel-space of FreeBSD ]
| Data & Network Security Lab (DNSL)
| Room 501, Floor 5,
| Department of Computer Engineering
| Sharif University of Technology
| Azadi Ave., Tehran, Iran
Vahid Khodabakhshi <vkhodabakhshi@ce.sharif.edu>
Vahid Ranjbar <vranjbar@ce.sharif.edu>
Also see the Acknowledgement file
Please send bugs to our e-mail
niab - Network In A Box.
Create a virtual lab network inside one machine. A lab can include routers, firewalls, clients and servers connected by a network specified by you. [Linux Network Simulator, UML, user mode linux]