To see the other types of publications on this topic, follow the link: Computer Networking.

Journal articles on the topic 'Computer Networking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer Networking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Matsukata, J. "Computer networking for large computers in Universities." ACM SIGCOMM Computer Communication Review 17, no. 5 (October 1987): 78–87. http://dx.doi.org/10.1145/55483.55492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gudhka, Drashti. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 78–87. http://dx.doi.org/10.22214/ijraset.2024.57862.

Full text
Abstract:
Abstract: This paper presents a comprehensive overview of computer networking, covering fundamental concepts and modern advancements. It explores core networking principles, including models, architectures, and essential layers. Emphasising contemporary trends, it delves into topics like network security (Zero Trust Architecture, AI/ML), Software-Defined Networking (SDN), IoT security challenges, 5G and Mobile Edge Computing (MEC), network performance optimisation, Big Data analytics, and eco-friendly networking strategies. Aimed at students, researchers, and professionals, this overview serves as a valuable resource for understanding both foundational principles and cutting-edge developments in networking.
APA, Harvard, Vancouver, ISO, and other styles
3

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
4

Sussex, Roland, and Peter White. "Electronic Networking." Annual Review of Applied Linguistics 16 (March 1996): 200–225. http://dx.doi.org/10.1017/s0267190500001513.

Full text
Abstract:
In Physical terms, the Net—a term used generically—is a global system of computer linked by optical cable, telephone connections, microwave, and satellites. It comprises a number of individual networks, from LANs (Local Area Networks in individual institutions) to the largest, the Internet. (See Appendix Glossary for terminology explanations.) In January 1993, the Matrix News estimated that the Net comprised 2,152,000 host computers and 18,150,000 users. Now, in mid-1995, these figures are 3,500,000 host computers and 55 million users world-wide. From its beginnings in the U.S. military establishment, it now reaches into education, research, business and commerce, government, and private use. France is connecting its entire education system to the Internet. And the U.S.A. is leading the way not only in numbers of connections to the Internet, but also in providing access for non-university education fields. The Net is arguably the most dramatic new communications technology of the latter part of the 20th century.
APA, Harvard, Vancouver, ISO, and other styles
5

Smed, Jouni. "Networking for Computer Games." International Journal of Computer Games Technology 2008 (2008): 1. http://dx.doi.org/10.1155/2008/928712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maddux, Cleborne D. "Computer Networking in Education:." Computers in the Schools 6, no. 1-2 (December 14, 1989): 37–43. http://dx.doi.org/10.1300/j025v06n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kearsley, Greg. "Networking computer based instruction." Education and Computing 1, no. 2 (April 1985): 109–16. http://dx.doi.org/10.1016/s0167-9287(85)93794-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

JENNINGS, D. M., L. H. LANDWEBER, I. H. FUCHS, D. J. FARBER, and W. R. ADRION. "Computer Networking for Scientists." Science 231, no. 4741 (February 28, 1986): 943–50. http://dx.doi.org/10.1126/science.231.4741.943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Farsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (February 1988): 482. http://dx.doi.org/10.1177/109634808801200259.

Full text
Abstract:
Local area networks (LANs) are probably the most flexible and adaptable to customizing communications systems. LANs can virtually fit any location/site requirements. They can be tailored for any number of users, any application type and any cost/performance ratio. LANs can work with small (micro computers), medium (mini computers) and large/complex (mainframe) systems. This great flexibility which is due to several factors like, distributed architecture design, software standards, and hardware independence technology make LANs easy to use in a computer laboratory environment. Currently, many hospitality institutions are investigating the feasibility of using LANs in their computer laboratory. However, LANs are still costly, and sometimes difficult to install.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Qian. "Hardware-Free Network Internals Exploration." International Journal of Innovative Teaching and Learning in Higher Education 5, no. 1 (February 21, 2024): 1–16. http://dx.doi.org/10.4018/ijitlhe.339002.

Full text
Abstract:
In undergraduate computer networking courses, the ideal scenario involves demonstrating network communications with multiple interconnected computers and a packet sniffer tool. However, practical challenges arise when attempting hands-on exercises, such as accessing or reconfiguring physical computers for online networking practice. Additionally, certain network concepts, like routing and switching, are typically discussed theoretically due to the limitations of observing external network packet transfers and the constraints faced by institutions in maintaining the necessary hardware for hands-on practice. This paper introduces a simulation-based approach to facilitate the teaching and learning of computer networking internals in an online environment, eliminating the need for dedicated hardware devices. The paper outlines various simulation activities and experiments designed to assist instructors in teaching and enable students to explore these internal networking concepts effectively.
APA, Harvard, Vancouver, ISO, and other styles
11

Simour, Lhoussain. "Networking Identities." International Journal of Virtual Communities and Social Networking 2, no. 2 (April 2010): 32–42. http://dx.doi.org/10.4018/jvcsn.2010040103.

Full text
Abstract:
Electronic connections allow the individual to be at various global sites while sitting in front of his or her computer. By being electronically connected, one’s participation in virtual worlds raises important questions about the nature of our communities and problematizes our identities. This paper examines how experiences in virtual interactions affect people’s real lives and what impact computer mediated communication has on the formation of a virtual community and its relation to individuals’ identities. Virtual communities stimulate experiences that redefine the basic concepts and contexts that have characterized the essence of human societies. They offer new contexts for rethinking the concept of identity and provide a new space for exploring the extent to which participation in computer mediated interaction modifies the subject in terms of identity, leading to a reconstruction and a reconstitution of self.
APA, Harvard, Vancouver, ISO, and other styles
12

Caesar, Matthew, and Bruce Davie. "Great educators in computer networking." ACM SIGCOMM Computer Communication Review 51, no. 2 (April 11, 2021): 31–37. http://dx.doi.org/10.1145/3464994.3465001.

Full text
Abstract:
This interview is part of a series on Great Educators in Computer Networking, where we interview some of the most impactful and skilled educators in our field. Here, we interviewed Australian Bruce Davie, the self-described computer scientist/engineer/runner/cyclist, who agreed to talk to us about his thoughts on computer networking education, his role in it, his thoughts about the big ideas in our field, and how the pandemic is changing our work. Bruce has over 30 years of industry experience and is well known for a broad spectrum of educational initiatives such as co-authoring several textbooks, as well as his contributions to many networking standards and technologies, including IP quality of service, network virtualization, software defined networking, and more
APA, Harvard, Vancouver, ISO, and other styles
13

Onoe, Youichi, Hiroyasu Ishiguro, and Shigemi Naganawa. "Computer networking for petroleum engineers." Journal of the Japanese Association for Petroleum Technology 61, no. 2 (1996): 176–81. http://dx.doi.org/10.3720/japt.61.176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Naganawa, Shigemi, and Youici Onoe. "Computer networking for petroleum engineers." Journal of the Japanese Association for Petroleum Technology 61, no. 3 (1996): 260–65. http://dx.doi.org/10.3720/japt.61.260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Furutani, Akito, Yukio Tasaka, and Shigemi Naganawa. "Computer networking for petroleum engineers." Journal of the Japanese Association for Petroleum Technology 61, no. 4 (1996): 325–30. http://dx.doi.org/10.3720/japt.61.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Holliday, Mark A. "Animation of computer networking concepts." Journal on Educational Resources in Computing 3, no. 2 (June 2003): 2. http://dx.doi.org/10.1145/982753.982755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Robertson, Gladene, Leonard P. Haines, Robert Sanche, and Wanda Biffart. "Positive Change through Computer Networking." TEACHING Exceptional Children 29, no. 6 (July 1997): 22–30. http://dx.doi.org/10.1177/004005999702900607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fey, Marion H. "SHARING WRITING THROUGH COMPUTER NETWORKING." Reading & Writing Quarterly 13, no. 4 (October 1997): 383–88. http://dx.doi.org/10.1080/1057356970130408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Woodward, John, Douglas Carnine, Russell Gersten, Lisa Moore, and Nancy Golden. "Using Computer Networking for Feedback." Journal of Special Education Technology 8, no. 4 (June 1987): 28–35. http://dx.doi.org/10.1177/016264348700800403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Voss, D. "COMPUTER SCIENCE: Biologically Inspired Networking." Science 311, no. 5769 (March 31, 2006): 1837b. http://dx.doi.org/10.1126/science.311.5769.1837b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rickman, Jon, Merry McDonald, Gary McDonald, and Phillip Heeler. "Enhancing the computer networking curriculum." ACM SIGCSE Bulletin 33, no. 3 (September 2001): 157–60. http://dx.doi.org/10.1145/507758.377672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Russo, G. "Basic Principles of Computer Networking." International Astronomical Union Colloquium 110 (1989): 99–101. http://dx.doi.org/10.1017/s0252921100003079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ray, A. "Networking for computer-integrated manufacturing." IEEE Network 2, no. 3 (May 1988): 40–47. http://dx.doi.org/10.1109/65.3272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tienari, Martti. "Computer networking of Nordic universities." BIT 25, no. 1 (March 1985): 65–69. http://dx.doi.org/10.1007/bf01934988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Patel, Ahmed. "The principles of computer networking." Computer Communications 13, no. 3 (April 1990): 175. http://dx.doi.org/10.1016/0140-3664(90)90104-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Smith, J. M. "Selected challenges in computer networking." Computer 32, no. 1 (1999): 40–42. http://dx.doi.org/10.1109/2.738302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ruedenberg, Lucia. "Jewish Resources in Computer Networking." Shofar: An Interdisciplinary Journal of Jewish Studies 12, no. 3 (1994): 80–95. http://dx.doi.org/10.1353/sho.1994.0117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Huddleston, Lauren. "Computer networking for policy research." Strategic Change 2, no. 3 (May 1993): 177. http://dx.doi.org/10.1002/jsc.4240020309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kaur, Gagandeep. "A review on computer networking." International Journal of Engineering in Computer Science 1, no. 1 (January 1, 2019): 52–56. http://dx.doi.org/10.33545/26633582.2019.v1.i1a.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bantu Raphaël, Muloway Muambila. "Acrostics in Computer Networking Jargon: A Morphosemantic Analysis." International Journal of Scientific Research and Management 10, no. 11 (November 4, 2022): 15–21. http://dx.doi.org/10.18535/ijsrm/v10i11.al01.

Full text
Abstract:
Acrostics are becoming more and more widespread in computer networking jargon. Most books on computer networking, written in English or French, use them without giving their meanings in order to avoid confusion that may arise in the heads of EFL learners since the form of these acrostics resembles the one of already existing words. This phenomenon needs being tackled since there is not any research related to acrostics used in computer networking jargon. The study uses a corpus of 31 acrostics collected from different books of computer networking. It referred to a morphosemantic approach to analyze these data. Based on the analysis of data, the findings reveal that the acronyms used in computer networking have the same form with some words of English or French. However, there is not any semantic relationship between these words and the acrostics used in the computer networking jargon. Hopefully, this study will help EFL learners/teachers enhance their learning/teaching of English as they are involved in computer networking field.
APA, Harvard, Vancouver, ISO, and other styles
31

Muloway Muambila Bantu, Raphaël. "A Transitivity Analysis of some Compounds in Computer Networking Jargon." International Journal of Scientific Research and Management 10, no. 10 (October 30, 2022): 949–61. http://dx.doi.org/10.18535/ijsrm/v10i10.ec03.

Full text
Abstract:
There have been numerous attempts by linguists to investigate into the ideational function of language. However, most researches concerning transitivity analysis base themselves only on the clause. Scant attention has been paid to compounds, as linguistic devices that can be used to see how the experience of computer networking is represented. This study uses Hallidayan transitivity to analyze some compounds found in computer networking jargon, as most of the words in it are compound nouns. The study aims to identify how language is manipulated by computer networking persons to construe the experience of computer networking. To conduct this study, a sample of 166 was drawn from the population of 262 compounds that were collected from different books on computer networking. The collected compounds were those expressing technical terms of computer networking. The findings reveal that mental processes are not used to construe the experience of computer networking. By contrast, material processes and relational processes are used to construe the experience of computer networking. These processes are realized in different configurations.
APA, Harvard, Vancouver, ISO, and other styles
32

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Full text
Abstract:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
33

Thapliyal, Shivankur. "A Newly Proposed Prospective and Robust Computer Networking Model Architecture Based on the Infrastructure of Cloud Computing Contrivance." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 331–37. http://dx.doi.org/10.22214/ijraset.2021.37901.

Full text
Abstract:
Abstract: Computer Networking Play’s a major role for data communication or data sharing and data transmissions from one location to another, which are geographically differ, but in today’s scenario where the main and primary major concerns are not to data transfer but also utilize all resources with greater efficiency and also preserves the confidentiality and integrity of the messages with respect to speed and time with lower Bandwidth and also consume a very low computational costs with low power supply and redirect to optimality. Cloud Computing also play’s a significant role to access data at geographically different locations. So In this paper we create a fusion of Computer Networking Architecture and Cloud Computing Architecture and released a very much superior fundamentally strong Cloud computing based Computer Networking model, which works on the concepts of ‘Virtualization’. Because when the number of hardware components (Servers) drastically increases all factors which are responsible to make possible networking among nodes are also consume each resources at extreme level, and networking becomes complex and slow, that’s why we used the concept of Virtual Machine. In this paper we proposed a Computer Networking model using the concepts of Cloud Computing. This model also suitable for data transmission but also take concern the most significant feature of Computer Networking, which is Data Security. This model also used some Proxy servers/ firewalls to take concern some security mechanisms. In this paper we also proposed Communication Oriented model among the Intercluster domains that how one node which belongs to another CLOUD cluster make possible communication among other InterCLOUD clusters with respect to data security measures. In this paper we proposed three models related to this networking model, which is CLOUD Networking Infrastructure, Connection Oriented model, Communication Oriented model. The detailed description of all three models are in the upcoming sections of this paper. Keywords: Cloud computing based computer networking model, A virtual model for computer networking, Computer Networking model based on virtualization, Virtualization based computer networking model.
APA, Harvard, Vancouver, ISO, and other styles
34

Wafula, J. M. C. "Computer enhanced imagery: local area networking." Health Informatics 1, no. 1 (March 1995): 15–17. http://dx.doi.org/10.1177/146045829500100104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kuzminsky, M., and A. Mendkovich. "Non-commercial computer networking in Russia." IEEE Transactions on Professional Communication 37, no. 2 (June 1994): 70–72. http://dx.doi.org/10.1109/47.291570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Schilling, Nancy. "Computer Networking for Native American Schools:." Computers in the Schools 8, no. 1-3 (April 29, 1991): 187–90. http://dx.doi.org/10.1300/j025v08n01_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dy-Liacco, T. E. "Modern control centers and computer networking." IEEE Computer Applications in Power 7, no. 4 (October 1994): 17–22. http://dx.doi.org/10.1109/67.318916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Karshmer, A. I., and J. N. Thomas. "Computer networking on cable TV plants." IEEE Network 6, no. 6 (November 1992): 32–40. http://dx.doi.org/10.1109/65.166903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Obaidat, M. S. "Recent advances in computer communications networking." Computer Communications 26, no. 15 (September 2003): 1723–26. http://dx.doi.org/10.1016/s0140-3664(03)00041-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Litvak, Jorge. "Computer networking in the health sector." Telematics and Informatics 4, no. 3 (January 1987): 211–14. http://dx.doi.org/10.1016/s0736-5853(87)80032-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lombard, Carol G. "Conceptual metaphors in computer networking terminology." Southern African Linguistics and Applied Language Studies 23, no. 2 (May 2005): 177–85. http://dx.doi.org/10.2989/16073610509486382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Reklaitis, Vytautas, and Jim Strom. "Computer networking: Academic development and education." New Review of Information Networking 1, no. 1 (January 1995): 129–43. http://dx.doi.org/10.1080/13614579509516852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hsin, Wen-Jung. "Student Motivation in Computer Networking Courses." InSight: A Journal of Scholarly Teaching 2 (August 1, 2007): 32–36. http://dx.doi.org/10.46504/02200703hs.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Washer, Peter. "Professional networking using computer-mediated communication." British Journal of Nursing 11, no. 18 (October 2002): 1215–18. http://dx.doi.org/10.12968/bjon.2002.11.18.10581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bonaventure, O., Q. De Coninck, F. Duchêne, A. Gégo, M. Jadin, F. Michel, M. Piraux, C. Poncin, and O. Tilmans. "Open educational resources for computer networking." ACM SIGCOMM Computer Communication Review 50, no. 3 (July 22, 2020): 38–45. http://dx.doi.org/10.1145/3411740.3411746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Erlinger, Michael. "Lab exercises for computer networking courses." ACM SIGCSE Bulletin 38, no. 3 (September 26, 2006): 305. http://dx.doi.org/10.1145/1140123.1140210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Odom, W. "Computer Networking First-Step - [Book Review." IEEE Communications Magazine 43, no. 4 (April 2005): 8. http://dx.doi.org/10.1109/mcom.2005.1421893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Abdul Rashid, Nazre bin, Md Zahar Bin Othman, Rasyidi Bin Johan, and Salman Firdaus Bin Hj. Sidek. "Cisco Packet Tracer Simulation as Effective Pedagogy in Computer Networking Course." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (September 25, 2019): 4. http://dx.doi.org/10.3991/ijim.v13i10.11283.

Full text
Abstract:
The Computer Networking course commonly taught in mixed mode involving lecture and practical session whereas beside face-to-face theory session, students need to experience hands-on activities in order to appreciate the technology and contents. Nevertheless the abstraction in Computer Networking course such as the complexity in TCP/IP network layering, the connection and configuration of client and server’s framework, differences in static and dynamic IP address configuration had imposed a great challenge for students to understand and grab the main concept of computer networking technology. As such, an approach of using computer network simulation and visualization tool in teaching and learning Computer Networking course is seen beneficial for educators and students. In this research, computer network simulation software of CISCO Packet Tracer was utilized in Computer Networking (MTN3023) course. Students (N=55) were exposed to CISCO Packet Tracer on which they developed Wide Area Network (WAN) that consists of configuration activities of Personal Computer (PC), Servers and Switches according to CISCO standard. Subsequently, student’s feedback and their insight on the effectiveness of CISCO packet Tracer in learning computer networking were probed using questionnaire. All the feedbacks were investigating statistically using SPSS 16.0. From the analysis, the descriptive results shown that all students were agreed (N=32 : Strongly Agree; N=23 : Agree) that CISCO Packet Tracer had successfully help them to understand several key concepts of computer networking and at the same quash some abstractions they faced in the course. In a nutshell, CISCO Packet Tracer as a simulation and visualization tool had been proven to be an effective software in supporting the teaching and learning of computer networking course.
APA, Harvard, Vancouver, ISO, and other styles
49

Kayssi, Ayman, Sanaa Sharafeddine, and Houda Karaki. "Computer-based laboratory for data communications and computer networking." Computer Applications in Engineering Education 12, no. 2 (2004): 84–97. http://dx.doi.org/10.1002/cae.20002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sadiku, Isiaka Babatunde, Wumi Ajayi, Wilson Sakpere, Temilola John-Dewole, and R. A. Badru. "Effect of Traditional and Software-Defined Networking on Performance of Computer Network." Scientific Journal of Informatics 9, no. 2 (October 10, 2022): 111–22. http://dx.doi.org/10.15294/sji.v9i2.31315.

Full text
Abstract:
Purpose: Computer networks and the Internet are changing the way we communicate, learn, work, and even play. Conventional computer networks are not smart enough towards processes that contribute to improving online control transaction of services and demand for unlimited communication services. Hence, computer networking has to go smart.Methods: This paper explores the effect of different computer networking types - traditional computer networking (D0) and Software-Defined Networking (D1). The paper combined traditional computer networking (D0) with Software-Defined Network (D2) running applications (A1, A2, A3, A4 and A5) with the host sending 5 packets (P1, P2, P3, P4 and P5) across the networks emulated using Mininet network emulation to observe various performance parameters on the network.Result: It was observed that Application A1 recorded the highest bandwidth, throughput and latency. The least bandwidth, throughput and latency were observed in A4. The result showed that below 80% of the IPv4 packet size (65,507 bytes) of running application, the higher the bandwidth the higher the throughput. Also, the lower the latency the more statistically similar the jitter experienced. Packet P1 has the highest bandwidth and throughput usage with high latency. The results indicate that the higher the bandwidth and throughput, the higher the latency observed in the packet sent across the network. Traditional computer networking (D1) recorded the highest bandwidth and throughput with the highest jitter. The correlation result showed that the jitter decreases with increasing bandwidth and throughput.Novelty: This study provides information on traditional computer networking and Software-Defined Networking. The result validates studies that observed significant F-value and stability in the SDN application-awareness experiment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography