To see the other types of publications on this topic, follow the link: Local area networks (Computer networks) – Design.

Journal articles on the topic 'Local area networks (Computer networks) – Design'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Local area networks (Computer networks) – Design.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Оrdabayeva G.К., Dzhusupbekova G.T., and Rakhymbek N. "DESIGN AND SIMULATION OF VIRTUAL LOCAL AREA NETWORK USING CISCO PACKET TRACER." BULLETIN 6, no. 388 (December 15, 2020): 6–14. http://dx.doi.org/10.32014/2020.2518-1467.176.

Full text
Abstract:
Modern local networks consist of several subscriber devices located inside the same building. Computers on the local network are interconnected using network equipment - switches. By default, all devices connected to the ports of the same switch can communicate by exchanging network packets. Computer networks of data transmission are the result of the information revolution and in the future will be able to form the main means of communication. The worldwide trend towards the integration of computers in the network is due to a number of important reasons, such as the acceleration of the transmission of information messages, the ability to quickly exchange information between users, receiving and transmitting messages (faxes, E-mail letters, electronic conferences, etc.) without leaving the workplace, the ability to instantly receive any information from anywhere in the world, as well as the exchange of information between computers of different manufacturers working under different software. A large number of broadcast packets sent by devices leads to a decrease in network performance, because instead of useful operations, the switches are busy processing data addressed to everyone at once. The situation forces us to divide such large networks into autonomous subnets; as a result, the logical structures of the network are different from the physical topologies. This article discusses VLAN technology (Virtual Local Area Network - VLAN), which allows you to divide one local network into separate segments.
APA, Harvard, Vancouver, ISO, and other styles
2

Olenev, V. L., I. Ya Lavrovskaya, L. I. Kurbanov, I. L. Korobkov, and Yu E. Sheynin. "COMPUTER AIDED DESIGN SYSTEM FOR SPACECRAFT ONBOARD NETWORKS." Issues of radio electronics, no. 8 (August 20, 2018): 145–53. http://dx.doi.org/10.21778/2218-5453-2018-8-145-153.

Full text
Abstract:
Modern spacecraft onboard networks consist of a large number of nodes which interact with each other via a communication network. SpaceWire is a new generation technology which is being integrated into new spacecraft systems. In order to check network operation on the early stages of network design it is reasonable to perform its software simulation. The paper provides an analysis of existing simulation tools for the on-board and local area networks. We overview the main abilities of the existing software and then propose the computer-aided design (CAD) system for SpaceWire onboard networks design and simulation - SANDS. This software will solve important tasks, which spacecraft developers face with during implementation of satellites and other space vehicles. SANDS system will support the full on-board network design and simulation flow, which begins from the network topology automated generation and finishes with getting the network structure, configuration and parameters setting, simulation results and statistics.
APA, Harvard, Vancouver, ISO, and other styles
3

Nicopolitidis, P., G. I. Papadimitriou, and A. S. Pomportsis. "Design alternatives for wireless local area networks." International Journal of Communication Systems 14, no. 1 (2001): 1–42. http://dx.doi.org/10.1002/dac.481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Filho, V. J. M. F., and R. D. Galvao. "Design of Interconnection of Local Area Networks." International Transactions in Operational Research 5, no. 3 (May 1998): 211–31. http://dx.doi.org/10.1111/j.1475-3995.1998.tb00116.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Malaney, Gary D. "The Design and Implementation of Local and Wide Area Networks in Student Affairs." Journal of Educational Technology Systems 20, no. 3 (March 1992): 231–39. http://dx.doi.org/10.2190/alwd-c6r0-q8mm-8cbb.

Full text
Abstract:
Local and wide area networks on college campuses in general and in student affairs in particular still represent a relatively new technology. Accordingly, literature on the design and operation of these computer systems is just beginning to appear in the academic computing journals. The purpose of this article is to contribute to the literature on networks by describing the design and implementation of a wide area network within a large division of student affairs at a major research university.
APA, Harvard, Vancouver, ISO, and other styles
6

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
7

Anderson, Thomas E., Susan S. Owicki, James B. Saxe, and Charles P. Thacker. "High speed switch scheduling for local area networks." ACM SIGPLAN Notices 27, no. 9 (September 1992): 98–110. http://dx.doi.org/10.1145/143371.143495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elbaum, R., and M. Sidi. "Topological design of local-area networks using genetic algorithms." IEEE/ACM Transactions on Networking 4, no. 5 (1996): 766–78. http://dx.doi.org/10.1109/90.541324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

El-Bawab, Tarek S., and Anura P. Jayasumana. "On the design of Robust-WDM local area networks." International Journal of Communication Systems 14, no. 2 (2001): 231–41. http://dx.doi.org/10.1002/dac.467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cobb, Richard, Edward R. Mansfield, and Joseph M. Mellichamp. "Development of design guidelines for local area CSMA/CD networks." SIMULATION 58, no. 4 (April 1992): 270–76. http://dx.doi.org/10.1177/003754979205800409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Karásek, M., A. Bellemare, and M. Menif. "Design of wideband hybrid amplifiers for local area networks." IEE Proceedings - Optoelectronics 148, no. 3 (June 1, 2001): 150–55. http://dx.doi.org/10.1049/ip-opt:20010552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Meirong, and Jingjing Yu. "Model Optimization of Computer-Aided English Teaching in Local Area Networks." Computer-Aided Design and Applications 19, S1 (March 23, 2021): 128–38. http://dx.doi.org/10.14733/cadaps.2022.s1.128-138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Teo, E. H., and N. D. Georganas. "Design and validation of a transport protocol for local area networks." Computer Communications 9, no. 3 (June 1986): 115–20. http://dx.doi.org/10.1016/0140-3664(86)90014-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Teslyuk, Vasyl, Andriy Sydor, Vincent Karovič, Olena Pavliuk, and Iryna Kazymyra. "Modelling Reliability Characteristics of Technical Equipment of Local Area Computer Networks." Electronics 10, no. 8 (April 16, 2021): 955. http://dx.doi.org/10.3390/electronics10080955.

Full text
Abstract:
Technical systems in the modern global world are rapidly evolving and improving. In most cases, these are large-scale multi-level systems and one of the problems that arises in the design process of such systems is to determine their reliability. Accordingly, in the paper, a mathematical model based on the Weibull distribution has been developed for determining a computer network reliability. In order to simplify calculating the reliability characteristics, the system is considered to be a hierarchical one, ramified to level 2, with bypass through the level. The developed model allows us to define the following parameters: the probability distribution of the count of working output elements, the availability function of the system, the duration of the system’s stay in each of its working states, and the duration of the system’s stay in the prescribed availability condition. The accuracy of the developed model is high. It can be used to determine the reliability parameters of the large, hierarchical, ramified systems. The research results of modelling a local area computer network are presented. In particular, we obtained the following best option for connecting workstations: 4 of them are connected to the main hub, and the rest (16) are connected to the second level hub, with a time to failure of 4818 h.
APA, Harvard, Vancouver, ISO, and other styles
15

Christensen, K. J., L. C. Haas, F. E. Noel, and N. C. Strole. "Local area networks—Evolving from shared to switched access." IBM Systems Journal 34, no. 3 (1995): 347–74. http://dx.doi.org/10.1147/sj.343.0347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Winasis, Bima Putra, and Bambang Sugiantoro. "Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification." IJID (International Journal on Informatics for Development) 6, no. 2 (November 28, 2018): 1. http://dx.doi.org/10.14421/ijid.2017.06201.

Full text
Abstract:
A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
APA, Harvard, Vancouver, ISO, and other styles
17

Sommer, Jörg, Elias A. Doumith, and Andreas Reifert. "Cost-Based Topology Optimization of Embedded Ethernet Networks." International Journal of Embedded and Real-Time Communication Systems 2, no. 1 (January 2011): 1–22. http://dx.doi.org/10.4018/jertcs.2011010101.

Full text
Abstract:
During past decades, Ethernet progressively became the most widely used Local Area Network (LAN) technology. Apart from LAN installations, Ethernet also became attractive for other application areas such as industrial control, automotive, and avionics. In traditional LAN design, the objective is to minimize the network deployment cost. However, in embedded networks, additional constraints and ambient conditions add to the complexity of the problem. In this paper, the authors propose a Simulated Annealing (SA) algorithm to optimize the physical topology of an embedded Ethernet network. The various constraints and ambient conditions are modeled by a cost map. For networks with small number of nodes and/or switches, the authors were able to find the optimal solutions using adapted algorithms. These solutions will serve as a lower bound for the solutions obtained via the SA algorithm. However, the adapted algorithms are time consuming and application specific. The paper shows that the SA algorithm can be applied in all cases and finds (near-) optimal solutions.
APA, Harvard, Vancouver, ISO, and other styles
18

Bahri, Abderraouf, and Steven Chamberland. "On the wireless local area network design problem with performance guarantees." Computer Networks 48, no. 6 (August 2005): 856–66. http://dx.doi.org/10.1016/j.comnet.2004.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Spragins, J. "Protocol Design for Local and Metropolitan Area Networks [New Books and Multimedia]." IEEE Network 10, no. 2 (March 1996): 5. http://dx.doi.org/10.1109/mnet.1996.486965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kremer, W., D. Hubner, S. Hoff, T. P. Benz, and W. Schafer. "Computer-aided design and evaluation of mobile radio local area networks in RTI/IVHS environments." IEEE Journal on Selected Areas in Communications 11, no. 3 (April 1993): 406–21. http://dx.doi.org/10.1109/49.219554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

GEN, MITSUO, and RUNWEI CHENG. "EVOLUTIONARY NETWORK DESIGN: HYBRID GENETIC ALGORITHMS APPROACH." International Journal of Computational Intelligence and Applications 03, no. 04 (December 2003): 357–80. http://dx.doi.org/10.1142/s1469026803001075.

Full text
Abstract:
In recent years we have evidenced an extensive effort in the development of computer communication networks, which have deeply integrated in human being's everyday life. One of the important aspects of the network design process is the topological design problem involved in establishing a communication network. However, with the increase of the problem scale, the conventional techniques are facing the challenge to effectively and efficiently solve those complicated network design problems. In this article, we give a brief survey on our recent research works of network design problems by using genetic algorithms (GAs), such as, multistage process planning problem, fixed charge transportation problem, minimum spanning tree problem, centralized network design, and local area network design, shortest path problem, minimum cost maximum flow problem, and optimal scheduling problems based on network topology. All these problems are illustrated from the point of genetic representation encoding skill and the genetic operators with hybrid strategies. Numerical experiments show the effectiveness and efficiency of such kind of GA-based approach.
APA, Harvard, Vancouver, ISO, and other styles
22

Khan, Salman A., and Andries P. Engelbrecht. "Fuzzy hybrid simulated annealing algorithms for topology design of switched local area networks." Soft Computing 13, no. 1 (April 8, 2008): 45–61. http://dx.doi.org/10.1007/s00500-008-0292-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Luhanga, Mathew L., and Cuthbet E. B. Amos. "Analytical Modeling of a Large Local Area Network - Part I: Internet Traffic Characterization." Tanzania Journal of Engineering and Technology 31, no. 2 (December 31, 2008): 52–60. http://dx.doi.org/10.52339/tjet.v31i2.430.

Full text
Abstract:
The goal of both IP network operators and the end users is to get the highest performance from the system for a given cost. This makes Performance a key criterion in the design, procurement, and use of computer and communication systems. In order to address problems associated with performance degradation of operational communicationssystems, over the last decade, traffic engineering techniques have emerged in an attempt to optimize communication systems’ performance and ensure more efficient use of their resources. One of these techniques is analytical modeling. Analytic performance models are an excellent tool for quickly evaluating the performance of operational or new systems. They are also well suited to comparing the performance of several alternative designs. However, analytical models can only be developed once detailed knowledge of characteristics of trafficcarried by a network is available. In Part I of this paper, traffic characterization of traffic carried by the largest Local Area Network (LAN) in Tanzania, University of Dar es Salaam Network (UDSMNET) is carried out. In Part II of this paper, an analytical model based on the Discrete Time Markov Modulated Poisson Process is proposed and validated for performance analysis of IP networks.
APA, Harvard, Vancouver, ISO, and other styles
24

Estepa, Rafael, Antonio Estepa, and Thiago Cupertino. "A productivity-oriented methodology for local area network design in industrial environments." Computer Networks 55, no. 9 (June 2011): 2303–14. http://dx.doi.org/10.1016/j.comnet.2011.03.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kwon, Y., Y. Fang, and H. Latchman. "Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks." IEEE Transactions on Wireless Communications 3, no. 3 (May 2004): 793–807. http://dx.doi.org/10.1109/twc.2004.827731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

MASUDA, Akeo, and Shigeru SHIMAMOTO. "A Cross-Layer Design of User Cooperation for Rate Adaptive Wireless Local Area Networks." IEICE Transactions on Communications E92-B, no. 3 (2009): 776–83. http://dx.doi.org/10.1587/transcom.e92.b.776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Allahdadi, Anisa, Ricardo Morla, and Jaime S. Cardoso. "802.11 wireless simulation and anomaly detection using HMM and UBM." SIMULATION 96, no. 12 (September 22, 2020): 939–56. http://dx.doi.org/10.1177/0037549720958480.

Full text
Abstract:
Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Model (HMM) and Universal Background Model (UBM) on data that is inexpensive to obtain. We then generate a number of network anomalous scenarios in OMNeT++/INET network simulator and compare the detection outcomes with those in baseline approaches—RawData and Principal Component Analysis. The experimental results show the superiority of HMM and HMM-UBM models in detection precision and sensitivity.
APA, Harvard, Vancouver, ISO, and other styles
28

Khan, Salman A., and Andries P. Engelbrecht. "A new fuzzy operator and its application to topology design of distributed local area networks." Information Sciences 177, no. 13 (July 2007): 2692–711. http://dx.doi.org/10.1016/j.ins.2007.01.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Farsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (February 1988): 482. http://dx.doi.org/10.1177/109634808801200259.

Full text
Abstract:
Local area networks (LANs) are probably the most flexible and adaptable to customizing communications systems. LANs can virtually fit any location/site requirements. They can be tailored for any number of users, any application type and any cost/performance ratio. LANs can work with small (micro computers), medium (mini computers) and large/complex (mainframe) systems. This great flexibility which is due to several factors like, distributed architecture design, software standards, and hardware independence technology make LANs easy to use in a computer laboratory environment. Currently, many hospitality institutions are investigating the feasibility of using LANs in their computer laboratory. However, LANs are still costly, and sometimes difficult to install.
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Samuel C., and Peter Winter. "LTE-Advanced and IEEE 802.11ac." International Journal of Information and Learning Technology 32, no. 4 (August 3, 2015): 221–34. http://dx.doi.org/10.1108/ijilt-04-2013-0016.

Full text
Abstract:
Purpose – Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach – It reviews existing literature and enabling technologies and proposes integrating both wide-area Long Term Evolution-Advanced (LTE-Advanced) and local-area IEEE 802.11ac networks for seamless, gigabit-speed services. A decision framework for moving toward such architecture and a cost/benefit analysis are also presented. Findings – Integrating both LTE-Advanced and IEEE 802.11ac networks for seamless connectivity is technically and organizationally feasible, provided that a higher-education institution has faculty and staff that require locational and interactional mobility. The cost/benefit analysis also shows that moving to the new architecture has potential benefits that can accrue to the higher-education institution. Research limitations/implications – With the coming availability of these wide-area and local-area gigabit networks, a new architecture that can ubiquitously supports mobile workers may be advantageous to universities and colleges. Originality/value – To the best of the authors’ knowledge, this paper is one of the first that proposes such integrated architecture in the context of higher-education institutions. In addition to the examination of technological issues and proposed architecture, the decision framework, and cost/benefit analysis should be valuable for institutions contemplating the move toward the new architecture and for guiding further research in this area.
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar, Dr Vinod, Mr Sandeep Agarwal, and Mr Avtar Singh. "Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 2 (July 27, 2013): 94–97. http://dx.doi.org/10.24297/ijct.v5i2.3528.

Full text
Abstract:
In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS handshake between sender and receiver (TT). Since it is not possible for an attacker to assume the RSS exactly for a sender by a receiver, it is an useful measure for intrusion detection. We propose that we can develop a dynamic profile for the communicating nodes based on their RSS values through monitoring the RSS values periodically for a specific Mobile Station (MS) or a Base Station (BS) from a server. Monitoring observed TT values at the server provides a reliable passive detection mechanism for session hijacking attacks since it is an unspoofable parameter related to its measuring entity. If the weight value is greater than a threshold value, then the corresponding node is considered as an attacker. By suitably adjusting the threshold value and the weight constants, we can reduce the false positive rate, significantly. By simulation results, we show that our proposed technique attains low misdetection ratio and false positive rate while increasing the packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
32

Jha, Kishlay, Guangxu Xun, and Aidong Zhang. "Continual representation learning for evolving biomedical bipartite networks." Bioinformatics 37, no. 15 (February 3, 2021): 2190–97. http://dx.doi.org/10.1093/bioinformatics/btab067.

Full text
Abstract:
Abstract Motivation Many real-world biomedical interactions such as ‘gene-disease’, ‘disease-symptom’ and ‘drug-target’ are modeled as a bipartite network structure. Learning meaningful representations for such networks is a fundamental problem in the research area of Network Representation Learning (NRL). NRL approaches aim to translate the network structure into low-dimensional vector representations that are useful to a variety of biomedical applications. Despite significant advances, the existing approaches still have certain limitations. First, a majority of these approaches do not model the unique topological properties of bipartite networks. Consequently, their straightforward application to the bipartite graphs yields unsatisfactory results. Second, the existing approaches typically learn representations from static networks. This is limiting for the biomedical bipartite networks that evolve at a rapid pace, and thus necessitate the development of approaches that can update the representations in an online fashion. Results In this research, we propose a novel representation learning approach that accurately preserves the intricate bipartite structure, and efficiently updates the node representations. Specifically, we design a customized autoencoder that captures the proximity relationship between nodes participating in the bipartite bicliques (2 × 2 sub-graph), while preserving both the global and local structures. Moreover, the proposed structure-preserving technique is carefully interleaved with the central tenets of continual machine learning to design an incremental learning strategy that updates the node representations in an online manner. Taken together, the proposed approach produces meaningful representations with high fidelity and computational efficiency. Extensive experiments conducted on several biomedical bipartite networks validate the effectiveness and rationality of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
33

Sumardi, Sopian, and Mohammad Taufan Asri Zaen. "Perancangan Jaringan Komputer Berbasis Mikrotik Router OS Pada SMAN 4 Praya." Jurnal Informatika dan Rekayasa Elektronik 1, no. 1 (May 4, 2018): 50. http://dx.doi.org/10.36595/jire.v1i1.32.

Full text
Abstract:
Information and Communication Technology (ICT) is a very important requirement in the implementation of education. Becoming a necessity for SMAN 4 Praya as an upper secondary educational institution to build computer network technology considering the complexity of the problems faced in the administrative system as well as the teaching and learning process. ICTs need to be well-designed to ensure that resources can be utilized optimally and mission vision can be achieved as expected. The design of computer networks at SMAN 4 Praya uses the Network Development Life Cycle (NDLC) approaches as a development method, covering a number of stages analysis, design, prototype simulation, implementation, monitoring and management. The process of analysis is divided into several processes, namely user needs analysis, device requirement analysis (hardware, software, brainware), network needs analysis, feasibility analysis (feasibility of infrastructure and human resource feasibility), and through network topology analysis by designing architecture and computer network design. Network Design Local Area Network (LAN) and Wireless Fidelity (WiFi) based on Mikrotik RouterOS. Implementation of the use of Mikroutik RouterOS on the Internet network SMAN 4 Praya can provide effective and optimal results to divide the bandwidth of each client as as reserved, and allows administrators in managing the network to remain stable and provide maximum results.
APA, Harvard, Vancouver, ISO, and other styles
34

Sarkar, Nurul I. "Design and Evaluation of a Cross-Layer Framework for Improving 802.11 Networks." International Journal of Business Data Communications and Networking 9, no. 1 (January 2013): 11–27. http://dx.doi.org/10.4018/jbdcn.2013010102.

Full text
Abstract:
This paper reports on the design and evaluation of a class of cross-layer design (CLD) framework for improving the performance of 802.11-based wireless local area networks (WLANs). While various CLD approaches have been proposed for improving the performance of WLANs in recent years, the problem of efficient channel utilization, higher throughput, lower packet delay, and fairness has not been fully solved yet. To overcome the performance problems of 802.11, we propose a CLD framework which is based on a cross-layer medium access control (MAC) protocol called the channel-aware buffer unit multiple access (C-BUMA). In the framework, the radio propagation (i.e. physical layer) is combined with the MAC sub-layer to develop a robust cross-layer communication. By sharing channel information with the MAC protocol, the approach reduced unnecessary packet transmissions, and hence reduced bandwidth wastage and significantly improved the system performance. The proposed CLD method is evaluated by extensive simulation experiments. A comparison with 802.11 standards is provided. Results obtained show that the network achieves up to 13.5% higher throughput, 56% lower packet delay, 40% better fairness, and 38% lower packet dropping with the proposed CLD. We also found that the proposed CLD outperforms Pham’s CLD with respect to network throughput and packet dropping. The analysis and empirical results reported in this paper provide some insights into the design and evaluation of a CLD framework for improving data rate of 802.11 networks which may help researchers in this field to overcome the remaining design issues and challenges.
APA, Harvard, Vancouver, ISO, and other styles
35

Klincewicz, John G., and David F. Lynch. "Designing an IP Link Topology for a Metro Area Backbone Network." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 1 (January 2013): 26–42. http://dx.doi.org/10.4018/jitn.2013010103.

Full text
Abstract:
Massive increases in IP (Internet Protocol) traffic have led to rapid deployment of IP-based networks in metropolitan (metro) areas. In order to facilitate this deployment, computer-based design tools are needed. One of the most difficult decisions that engineers face in designing an IP network is choosing the IP link topology (i.e., the set of router-to-router connections). This is especially complicated when it is also necessary to route these IP links over an underlying physical network of optical fibers. In this paper, the authors describe a new heuristic for simultaneously designing a backbone IP link topology for a metro area network, and routing these IP links over a given physical network. The IP network must be designed for survivability in the event of a network failure (i.e., the loss of a physical link, router or IP link). Initially, they employ a Construction Heuristic that explicitly considers the number of router-to-router connections that would be carried over each physical link. In this way it seeks to minimize the impact of any single physical link failure. An optional Local Search routine then attempts to improve on the solution by a sequence of topology changes. IP link routings are adjusted at each topology change. This heuristic is readily able to be incorporated into an interactive design tool. Some computational experience is described.
APA, Harvard, Vancouver, ISO, and other styles
36

Osman, Mohd Nizam, Khairul Anwar Sedek, Nor Arzami Othman, Muhammad Afiqhakimi Rosli, and Mushahadah Maghribi. "Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation." Journal of Computing Research and Innovation 6, no. 2 (September 1, 2021): 29–40. http://dx.doi.org/10.24191/jcrinn.v6i2.190.

Full text
Abstract:
Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN). This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity.
APA, Harvard, Vancouver, ISO, and other styles
37

Mahmood, Adnan, Hushairi Zen, and Al-Khalid Othman. "An optimized travelling time estimation mechanism for minimizing handover failures and unnecessary handovers from cellular networks to WLANs." International Journal of Pervasive Computing and Communications 11, no. 1 (April 7, 2015): 2–16. http://dx.doi.org/10.1108/ijpcc-06-2014-0034.

Full text
Abstract:
Purpose – The paper aims to propose an optimized handover necessity estimation scheme for a mobile terminal (MT) traversing from a third-generation (3G) cellular network into the wireless local area network (WLAN) cell for reducing the number of handover failures and unnecessary handovers. Design/methodology/approach – The proposed optimized handover necessity estimation scheme comprises of two algorithms – a “travelling time prediction” reliant on consecutive received signal strength (RSS) measurements and MT’s velocity, and a “time threshold estimation” depending on the handover latency, WLAN’s cell radius, tolerable handover failure probability and the tolerable unnecessary handover probability. Findings – Our performance analysis reveals that the suggested mechanism effectively minimizes the number of handover failures and unnecessary handovers by 60 per cent as compared to the already proposed schemes in the literature. Originality/value – The convergence of Internet and wireless mobile communication accompanied by a massive increase in the number of cellular subscribers has led mobility management to emerge as a significant and challenging domain for wireless mobile communication over the Internet. Mobility management enables serving networks to locate roaming terminals for the call delivery (location management) and ensures a seamless connection as MT enters into the new service area (handover management). In this manuscript, an optimized handover necessity estimation scheme has been envisaged for reducing the probability of handover failures and unnecessary handovers from 3G cellular networks to WLANs to provide optimal network utilization along with an enhanced user satisfaction. Performance analysis reveals that the suggested scheme yields enhanced results as compared to the schemes already proposed in the literature.
APA, Harvard, Vancouver, ISO, and other styles
38

Aliwa, Emad, Omer Rana, Charith Perera, and Peter Burnap. "Cyberattacks and Countermeasures for In-Vehicle Networks." ACM Computing Surveys 54, no. 1 (April 2021): 1–37. http://dx.doi.org/10.1145/3431233.

Full text
Abstract:
As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.
APA, Harvard, Vancouver, ISO, and other styles
39

Bononi, Luciano, Marco Conti, and Lorenzo Donatiello. "Design and Performance Evaluation of a Distributed Contention Control (DCC) Mechanism for IEEE 802.11 Wireless Local Area Networks." Journal of Parallel and Distributed Computing 60, no. 4 (April 2000): 407–30. http://dx.doi.org/10.1006/jpdc.1999.1612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Abdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (January 12, 2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.

Full text
Abstract:
Automatic means to manage the security in moderate and large networks are of extreme importance to avoid error-prone manual techniques. This paper paves the way to develop an automatic network security management (NSM) system that is both flexible in deciding the system’s objectives and efficient in using the valuable network bandwidth with a relatively low transmission overhead. The required flexibility and efficiency are obtained using mobile agents (MA) to collect the required security information from various network components and devices, and using ontology to specify the required security policies in such a way understandable by the MA’s software. A simplified NSM prototype is developed, implemented, and tested over a typical local area network to investigate the validity of the suggested ideas. The MA travels through the network and collects the necessary information using an ontology-based security policy. Next, it may either return back to the network administrator to let him decide and perform the suitable actions, or alternatively the MA may take the appropriate decisions. This prototype is tested to examine its functionality and performance using a simple local area network consisting of three computers with different configurations. The developed MA was able to understand the ontology and move around the network. It has properly detected the components that are wrongly configured. It should be made clear that the design is scalable and can be directly applied to more computers in a local area network or even in a wide area network.
APA, Harvard, Vancouver, ISO, and other styles
41

JIANG bo. "The Network Flow Prediction Model Design based on Wavelet Analysis and Restrained Local Area Perssad." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 301–8. http://dx.doi.org/10.4156/jcit.vol8.issue6.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gui, Jinsong, and Jianglin Liu. "An Efficient Radio Access Resource Management Scheme Based on Priority Strategy in Dense mmWave Cellular Networks." Wireless Communications and Mobile Computing 2020 (September 15, 2020): 1–19. http://dx.doi.org/10.1155/2020/8891660.

Full text
Abstract:
In millimeter wave (mmWave) communication systems, beamforming-enabled directional transmission and network densification are usually used to overcome severe signal path loss problem and improve signal coverage quality. The combination of directional transmission and network densification poses a challenge to radio access resource management. The existing work presented an effective solution for dense mmWave wireless local area networks (WLANs). However, this scheme cannot adapt to network expansion when it is applied directly to dense mmWave cellular networks. In addition, there is still room for improvement in terms of energy efficiency and throughput. Therefore, we firstly propose an efficient hierarchical beamforming training (BFT) mechanism to establish directional links, which allows all the small cell base stations (SBSs) to participate in the merging of training frames to adapt to network expansion. Then, we design a BFT information-aided radio access resource allocation algorithm to improve the downlink energy efficiency of the entire mmWave cellular network by reasonably selecting beam directions and optimizing transmission powers and beam widths. Simulation results show that the proposed hierarchical BFT mechanism has the smaller overhead of BFT than the existing BFT mechanism, and the proposed BFT information-aided radio access resource allocation algorithm outperforms the existing corresponding algorithm in terms of average energy efficiency and throughput per link.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Zhenghua, Jin Qian, Chongxin Fang, Guoshu Liu, and Quan Su. "Coordinated Control of Distributed Traffic Signal Based on Multiagent Cooperative Game." Wireless Communications and Mobile Computing 2021 (June 1, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693636.

Full text
Abstract:
In the adaptive traffic signal control (ATSC), reinforcement learning (RL) is a frontier research hotspot, combined with deep neural networks to further enhance its learning ability. The distributed multiagent RL (MARL) can avoid this kind of problem by observing some areas of each local RL in the complex plane traffic area. However, due to the limited communication capabilities between each agent, the environment becomes partially visible. This paper proposes multiagent reinforcement learning based on cooperative game (CG-MARL) to design the intersection as an agent structure. The method considers not only the communication and coordination between agents but also the game between agents. Each agent observes its own area to learn the RL strategy and value function, then concentrates the Q function from different agents through a hybrid network, and finally forms its own final Q function in the entire large-scale transportation network. The results show that the proposed method is superior to the traditional control method.
APA, Harvard, Vancouver, ISO, and other styles
44

LIU, J. S. "Design and Performance Evaluation of a Distributed Transmission Control Protocol for Wireless Local Area Network." IEICE Transactions on Communications E89-B, no. 6 (June 1, 2006): 1837–45. http://dx.doi.org/10.1093/ietcom/e89-b.6.1837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hu, Liang, Jiejun Hu, Tao Fu, Jiyang Bao, and Feng Wang. "Asymmetric network information cache based on mobile traffic in software-defined network." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401881989. http://dx.doi.org/10.1177/1687814018819894.

Full text
Abstract:
Software-defined network is an encouraging research area that realizes updates throughout an entire network, and a wireless network is ubiquitous in an up-to-date world. The combination of these techniques, which is referred to as a wireless software-defined network, has been a significant development in numerous testbeds. The extensive use of distributed controllers that achieved elastic extension and are fault tolerant in large-scale wireless networks is hopeful. Despite their profits, they generate significant overhead in synchronizing network information. Thus, power-hungry wireless software-defined network devices limit the usage of distributed controllers in wireless networks. The patterns of storing network information have a crucial effect on controller performances, as they determine the probability of processing requests based on local data. To address this problem, we identify a better pattern for controllers to retain proper network information to balance costs in terms of both synchronous traffic and response time. We analyze the characteristics of distributed controllers and propose an overhead model of a distributed controller in a wireless software-defined network. Based on this model, we design an asymmetric network information cache to make trade-offs among different controller architectures. The asymmetric network information cache measures real-time network traffic and computes the traffic among sub-networks controlled by controller nodes. Then, the controller asymmetrically caches suitable network data to substantially busier nodes. The experimental results indicate that the asymmetric network information cache achieves a trade-off between synchronous traffic and the average response time.
APA, Harvard, Vancouver, ISO, and other styles
46

Qi, Yi, Yuze Dong, Zhongzhi Zhang, and Zhang Zhang. "Hitting Times for Random Walks on Sierpiński Graphs and Hierarchical Graphs." Computer Journal 63, no. 9 (April 17, 2020): 1385–96. http://dx.doi.org/10.1093/comjnl/bxz080.

Full text
Abstract:
Abstract The Sierpiński graphs and hierarchical graphs are two much studied self-similar networks, both of which are iteratively constructed and have the same number of vertices and edges at any iteration, but display entirely different topological properties. Both graphs have a large variety of applications: Sierpiński graphs have a close connection with WK-recursive networks that are employed extensively in the design and implementation of local area networks and parallel processing architectures, while hierarchical graphs can be used to model complex networks. In this paper, we study hitting times for several absorbing random walks in Sierpiński graphs and hierarchical graphs. For all considered random walks, we determine exact solutions to hitting times for both graphs. The obtained explicit expressions indicate that the hitting times in both graphs behave quite differently. We show that the structural difference of the graphs is responsible for the disparate behaviors of their hitting times.
APA, Harvard, Vancouver, ISO, and other styles
47

Palanisamy, A. R., G. M. Tamilselvan, and A. Pushparaghavan. "Design of high-speed 10-Gb/s wired/FSO systems for local area communication networks for maximum reach." Photonic Network Communications 38, no. 2 (July 27, 2019): 206–18. http://dx.doi.org/10.1007/s11107-019-00860-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Peng, Song Zhang, Jian Qiu, Xingfa Shen, and Jianhui Zhang. "A redistribution method to conserve data in isolated energy-harvesting sensor networks." Computer Science and Information Systems 8, no. 4 (2011): 1009–25. http://dx.doi.org/10.2298/csis110420066l.

Full text
Abstract:
In ambient monitoring applications, the sensing field may be so far away from the data center that causes the direct relay routes between the sensor network and the data center impossible. Typically, in such isolated sensor network, data is stored in a distributed manner and collected by data mule. To improve the efficiency, sensed data is normally stored near the area where the mule will pass by with respect to storage limitation. However, previous researches didn?t consider the energy constraint and energy harvesting capability of nodes. The purpose of this paper is to design a solution for fair data storage under space and energy limitation only based on local information. We propose a heuristic Distributed Energy-aware Data Conservation method (DEDC), which considers following two issues: i)where to store data with respect to energy and space storage, ii) how to prioritize the transmission of important data. Simulation has shown that the method is effective, energy efficient and robustness.
APA, Harvard, Vancouver, ISO, and other styles
49

Kennedy, Christopher E., Dan J. Dechene, and Abdallah Shami. "Design, implementation, and evaluation of a field-programmable gate array-based wireless local area network synchronizer." Wireless Communications and Mobile Computing 13, no. 12 (August 23, 2011): 1082–94. http://dx.doi.org/10.1002/wcm.1163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gade, Sri Harsha, and Sujay Deb. "A Novel Hybrid Cache Coherence with Global Snooping for Many-core Architectures." ACM Transactions on Design Automation of Electronic Systems 27, no. 1 (January 31, 2022): 1–31. http://dx.doi.org/10.1145/3462775.

Full text
Abstract:
Cache coherence ensures correctness of cached data in multi-core processors. Traditional implementations of existing protocols make them unscalable for many core architectures. While snoopy coherence requires unscalable ordered networks, directory coherence is weighed down by high area and energy overheads. In this work, we propose Wireless-enabled Share-aware Hybrid (WiSH) to provide scalable coherence in many core processors. WiSH implements a novel Snoopy over Directory protocol using on-chip wireless links and hierarchical, clustered Network-on-Chip to achieve low-overhead and highly efficient coherence. A local directory protocol maintains coherence within a cluster of cores, while coherence among such clusters is achieved through global snoopy protocol. The ordered network for global snooping is provided through low-latency and low-energy broadcast wireless links. The overheads are further reduced through share-aware cache segmentation to eliminate coherence for private blocks. Evaluations show that WiSH reduces traffic by and runtime by , while requiring smaller storage and lower energy as compared to existing hierarchical and hybrid coherence protocols. Owing to its modularity, WiSH provides highly efficient and scalable coherence for many core processors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography