To see the other types of publications on this topic, follow the link: Networking - Local Area Networks (LANs).

Journal articles on the topic 'Networking - Local Area Networks (LANs)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Networking - Local Area Networks (LANs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Farsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (February 1988): 482. http://dx.doi.org/10.1177/109634808801200259.

Full text
Abstract:
Local area networks (LANs) are probably the most flexible and adaptable to customizing communications systems. LANs can virtually fit any location/site requirements. They can be tailored for any number of users, any application type and any cost/performance ratio. LANs can work with small (micro computers), medium (mini computers) and large/complex (mainframe) systems. This great flexibility which is due to several factors like, distributed architecture design, software standards, and hardware independence technology make LANs easy to use in a computer laboratory environment. Currently, many hospitality institutions are investigating the feasibility of using LANs in their computer laboratory. However, LANs are still costly, and sometimes difficult to install.
APA, Harvard, Vancouver, ISO, and other styles
2

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
3

Sussex, Roland, and Peter White. "Electronic Networking." Annual Review of Applied Linguistics 16 (March 1996): 200–225. http://dx.doi.org/10.1017/s0267190500001513.

Full text
Abstract:
In Physical terms, the Net—a term used generically—is a global system of computer linked by optical cable, telephone connections, microwave, and satellites. It comprises a number of individual networks, from LANs (Local Area Networks in individual institutions) to the largest, the Internet. (See Appendix Glossary for terminology explanations.) In January 1993, the Matrix News estimated that the Net comprised 2,152,000 host computers and 18,150,000 users. Now, in mid-1995, these figures are 3,500,000 host computers and 55 million users world-wide. From its beginnings in the U.S. military establishment, it now reaches into education, research, business and commerce, government, and private use. France is connecting its entire education system to the Internet. And the U.S.A. is leading the way not only in numbers of connections to the Internet, but also in providing access for non-university education fields. The Net is arguably the most dramatic new communications technology of the latter part of the 20th century.
APA, Harvard, Vancouver, ISO, and other styles
4

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jing. "Building Bridges among Local Area Networks." Advanced Materials Research 605-607 (December 2012): 2383–86. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2383.

Full text
Abstract:
This paper introduces the principles and functions of network bridge. The bridge is a storage and forwarding device that connects two LANs. It can be used to connect networks with the same or similar system structures, then the networks being connected would have the same logical, linked control procedures. It is a data link layer connection, and it helps achieving communications between different LANs.
APA, Harvard, Vancouver, ISO, and other styles
6

Milne, Ian. "Security in local area networking." Data Processing 28, no. 5 (June 1986): 267. http://dx.doi.org/10.1016/0011-684x(86)90277-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Latchman, H. A., and L. W. Yonge. "Power line local area networking." IEEE Communications Magazine 41, no. 4 (April 2003): 32–33. http://dx.doi.org/10.1109/mcom.2003.1193971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuklina, M. V., A. I. Trufanov, V. V. Kuklina, N. E. Krasnoshtanova, E. A. Istomina, D. V. Kobylkin, E. A. Batotsyrenov, A. A. Tikhomirov, and E. Altangerel. "Land use in remote areas: socio-economic prospects." IOP Conference Series: Earth and Environmental Science 885, no. 1 (October 1, 2021): 012030. http://dx.doi.org/10.1088/1755-1315/885/1/012030.

Full text
Abstract:
Abstract Okinsky district (the Republic of Buryatia, Russia) is characterized by entanglement of heterogeneous economies formed by the global demand for gold, Chinese values of jade, remnants of Soviet planning systems at the local and municipal level, traditional Soyot and Buryat land use practices, and nascent extreme and recreational tourist flows. In a situation when most of the economic and social relations remain informal and rarely captured in the official documents, landscapes become the most visible marker of changes and intersecting and sometimes conflicting networks of diverse multiscale relations. Using the interviews and in-situ observations we collected and analysed data on the pertinent social, cultural, and professional ties and examined local expectations on education, living conditions and economic prospects. Networking as a key conception has been used to untangle the complexity of the studied systems, interconnections and interdependencies of the system components. A new draft network model stimulates experts to assess if the changes planned for the regional development really benefit people in local communities, nation in whole and in global scale. In addition, the new discourse of ecosystem services motivates experts to discuss the prospects for the ecological specialization of the territories from different angles while preserving biodiversity.
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Gary. "Federal government local area networking issues." Telematics and Informatics 3, no. 2 (January 1986): 101–5. http://dx.doi.org/10.1016/s0736-5853(86)80003-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

U, Chaithra H., and Vani H.R. "Link-Level Simulator for Wireless local Area Network." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 314. http://dx.doi.org/10.23956/ijermt.v6i7.232.

Full text
Abstract:
Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN with advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.
APA, Harvard, Vancouver, ISO, and other styles
11

Duffy, T. R. "Data communications and local area networking handbook." Data Processing 28, no. 5 (June 1986): 272. http://dx.doi.org/10.1016/0011-684x(86)90286-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Köhnen, Christopher, Christian Überall, Muttukrishnan Rajarajan, Rudolf Jäger, and Veselin Rakočević. "Autonomous QoS Management and Policing in Unmanaged Local Area Networks." Journal of Computer Networks and Communications 2015 (2015): 1–24. http://dx.doi.org/10.1155/2015/790375.

Full text
Abstract:
The high increase of bandwidth-intensive applications like high definition video streaming in home and small office environments leads to QoS challenges in hybrid wired/wireless local area networks. These networks are often not QoS aware and may contain bottlenecks in their topology. In addition, they often have a hybrid nature due to the used access technology consisting of, for example, Ethernet, wireless, and PowerLAN links. In this paper, we present the research work on a novel autonomous system for hybrid QoS in local area networks, called QoSiLAN, which does not rely on network infrastructure support but on host cooperation and works independently of the access technology. We present a new QoS Signalling Protocol, policing and admission control algorithms, and a new lightweight statistical bandwidth prediction algorithm for autonomous resource management in LANs. This new QoS framework enables link based, access-medium independent bandwidth management without network support. We provide evaluation results for the novel bandwidth prediction algorithm as well as for the QoSiLAN framework and its protocol, which highlight the features, robustness, and the effectiveness of the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
13

Anitha, G., V. Vijayakumari, and S. Thangavelu. "A Comprehensive Study and Analysis of LEACH and HEED Routing Protocols for Wireless Sensor Networks – With Suggestion for Improvements." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (March 1, 2018): 778. http://dx.doi.org/10.11591/ijeecs.v9.i3.pp778-783.

Full text
Abstract:
<p>The main interesting aspect of the digital era is the widely spread ease of communication from one end of the world to the other end of the world. There is a revolution in communication, digitalization, globalization, video calling, wireless data transfer and this is possible due to networking. Initially computer networks is the data sharing where data such as documents, file, reports, presentation files, videos, images etc can be shared within a local network or remotely connected networks. Traditional data networking is to empower end-to-end information transfer. The data in such networks are carried across point-to-point links and the intermediate nodes just forward the packets, where the payload of the packets is not modified. Traditional LANs need wires, which may be difficult to set up in some situations.</p><p>It is very much understandable and clearly visible that wired communication is being completely overtaken by wireless technologies in the recent past. Wireless LANs, by its very nature, empowers with increased mobility and flexibility. Wi-Fi devices get connected to the internet through WLAN and access points. 2.4 GHz and 5 GHz ISM bands are used by Wi-Fi. Also, it is to be understood that, a wireless adhoc network is distributed in its nature. It is also to be noted that, the adhoc nature makes these network to rely on any of the pre-existing infrastructure. The data forwarding shall happen from the nodes very much dynamically based on the connectivity and the routing algorithm used. </p>
APA, Harvard, Vancouver, ISO, and other styles
14

Blagorazumov, A. K., I. G. Kirpichev, and D. V. Petrov. "Isolation of corporate local area networks using server virtualization." Civil Aviation High Technologies 22, no. 6 (December 26, 2019): 100–111. http://dx.doi.org/10.26467/2079-0619-2019-22-6-100-111.

Full text
Abstract:
Secure enterprises have Local Area Networks (LANs) that store and process sensitive data that should not be accessed from outside. At the same time, no modern enterprise can successfully function without a LAN which provides the Internet access for the computers of the sales department, technical support service and E-mail server. In order to ensure information security, these two network segments are usually physically isolated from each other by means of exception of any cable interconnections. Enterprises with high demands for server uptime use server virtualization, which requires connecting physical servers to disk storage of virtual server image files. When highly reliable servers are needed only in one of two independent corporate network segments, the cost of creating such a server cluster is reasonable and fast paying off. But when a company encounters the need to place a small but highly reliable server into another network segment, the following problem arises: only server cluster with expensive components can provide the required reliability, but to solve the tasks assigned to the new server, the cluster computing capacity would be too high, and deploying of a cluster would be extremely costly and economically unjustified. On the other hand, the required computing capacity for a new server would be taken from the existing server cluster by creating a new virtual server without any expenses. However, in such case it is necessary to ensure isolation of the new virtual server from the network segment the physical hosts servers are connected to. The article examines the methods of configuring the LAN that allow to isolate virtual and physical servers at the network level. The authors also consider the episode when it is necessary to transfer files between the two computers located in the LAN segments isolated from each other and gives the appropriate solution.
APA, Harvard, Vancouver, ISO, and other styles
15

Tenti, Paolo, and Tommaso Caldognetto. "Generalized Control of the Power Flow in Local Area Energy Networks." Energies 15, no. 4 (February 15, 2022): 1416. http://dx.doi.org/10.3390/en15041416.

Full text
Abstract:
Local area energy networks (E-LANs) are cyber-physical systems whose physical layer is a meshed low-voltage microgrid fed by a multiplicity of sources, i.e., utilities, energy storage systems, and distributed power sources. The cyber layer includes distributed measurement, control, and communication units, located at end-user premises, as well as centralized supervision and dispatchment control. As compared with standard microgrid, the E-LAN encompasses the ability for end-users to actively contribute to the operation of the microgrid while acting as independent energy traders in the electrical market. Operational goals include active contribution of end-users to power sharing, loss reduction, voltage stability, demand response, fault identification and clearing, isolation of sub-grids for maintenance, islanding, and black start. Economic goals include the possibility, for each end-user, to decide in every moment, based on convenience, how his energy and power capacity is shared with other users, e.g., for demand response or to trade energy in the electric market. This paper introduces a comprehensive theoretical approach of E-LAN control to achieve all the above operational goals while providing a high level of dynamic protection against faults or other events affecting the system functionality, e.g., overloads or fast transients. It shows that meshed microgrids are the necessary infrastructure to implement the desired functionalities.
APA, Harvard, Vancouver, ISO, and other styles
16

Sarkar, Nurul I., and Kashif Nisar. "Performance of VoIP in Wired-Cum-Wireless Ethernet Network." International Journal of Interdisciplinary Telecommunications and Networking 4, no. 4 (October 2012): 1–25. http://dx.doi.org/10.4018/jitn.2012100101.

Full text
Abstract:
The Voice over Internet Protocol (VoIP) is a rapidly growing technology that enables transport of voice over data networks such as Ethernet Local Area Networks (LANs). This growth is due to the integration of voice and data traffic over the existing network infrastructure, low cost, and improved network management offered by the technology. This paper reports on the performance of VoIP traffic characteristics in a wired-cum-wireless Ethernet LAN. The effect of increasing the number of VoIP wireless clients, different voice codec schemes, and packet arrival distributions on system performance is investigated. Through various simulation experiments under realistic network scenarios, such as Small Office Home Office (SOHO) and campus networks, this paper provides an insight into the performance of VoIP over Ethernet LANs. Simulation results show that VoIP clients and voice codec schemes have significant effect on system performance. The authors preformed OPNET-based simulations to validate their experiments.
APA, Harvard, Vancouver, ISO, and other styles
17

Cheng, Yuan, Qiang Fan, Yun Shan Tang, and Wei Wei Miao. "Packet-Loss Distinguishing Based Link Adaptation Enhancement for Wireless LANs." Advanced Materials Research 403-408 (November 2011): 1859–64. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1859.

Full text
Abstract:
As we know, packet losses in wireless local area networks (WLANs) are due to collisions or link errors. In this paper, a new strategy that distinguishes the cause of packet losses in medium access control (MAC) layer is introduced. Based on the strategy, link adaptation algorithms, including the payload size adaptation algorithm and the data rate adaptation algorithm, are proposed and employed in WLANs. Simulation results show that both algorithms increase system throughput significantly.
APA, Harvard, Vancouver, ISO, and other styles
18

Bresnick, Arnold. "Networking, mainframes and local area networks at the Bureau of Labor Statistics." Statistical Journal of the United Nations Economic Commission for Europe 6, no. 2 (August 1, 1989): 177–82. http://dx.doi.org/10.3233/sju-1989-6206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Douligeris, C., and D. D. Vergados. "Wireless local area networking: QoS provisioning and resource management." IEEE Network 19, no. 4 (July 2005): 3–5. http://dx.doi.org/10.1109/mnet.2005.1470676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Youm, Sungkwan, and Eui-Jik Kim. "Latency and Jitter Analysis for IEEE 802.11e Wireless LANs." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/792529.

Full text
Abstract:
This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs) in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF) differentiates classes of service and to characterize the probability distribution of the medium access control (MAC) layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP) calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.
APA, Harvard, Vancouver, ISO, and other styles
21

Nyirenda, Clement N., Dawoud S. Dawoud, Fangyan Dong, Michael Negnevitsky, and Kaoru Hirota. "A Fuzzy Multiobjective Particle Swarm Optimized TS Fuzzy Logic Congestion Controller for Wireless Local Area Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 15, no. 1 (January 20, 2011): 41–54. http://dx.doi.org/10.20965/jaciii.2011.p0041.

Full text
Abstract:
A Takagi-Sugeno Fuzzy Logic Congestion Detection (TSFLCD) mechanism is proposed for IEEE 802.11 wireless Local Area Networks. A Fuzzy Preference based Multi-Objective Particle Swarm Optimization (FPMOPSO) mechanism, for tuning the input membership functions and the output scalars, is also proposed. An online adaptation mechanism that finetunes the output scalars based on system dynamics is implemented. Compared to the Adaptive Random Early Detection (ARED) and the Mamdani inference based Fuzzy Logic Congestion Detection (FLCD) mechanisms, simulation results show that the TSFLCD mechanism leads to more than 40% reduction in packet loss rate. It also leads to more than 25% and up to 14% reductions in jitter and delay respectively for real time traffic. This work lays a foundation for the development of simple multiobjective fuzzy congestion controllers in wireless LANs.
APA, Harvard, Vancouver, ISO, and other styles
22

Hartawan, I. Nyoman Buda, and I. Wayan Sudiarsa. "ANALISIS KINERJA INTERNET OF THINGS BERBASIS FIREBASE REAL-TIME DATABASE." Jurnal RESISTOR (Rekayasa Sistem Komputer) 2, no. 1 (April 21, 2019): 6–17. http://dx.doi.org/10.31598/jurnalresistor.v2i1.371.

Full text
Abstract:
Internet of Things (IoT) technology makes it possible to monitor and control environmental conditions and electronic devices remotely via the internet. To be used as a monitoring and control tool, the IoT must be able to be operated in realtime. IoT must be able to provide information about an environmental condition and control electronic devices in real time. In this study a remote lighting control system was built using Firebase as a database that is able to turn on/off lights in realtime. The system is built using NodeMCU ESP8266 and android applications so that it is easier to implement on smartphones. The purpose of this study is to perform a performance analysis of firebase as a database that is able to update data in real time via the internet. Testing is done using various types of network connections such as 3G networks, 4G networks, and Local Area Networks (LANs). The test results show that Firebase supports the application of IoT that is capable of updating data in realtime, but the type of network connection used provides a varied delay effect. The average delay generated on 3G networks, 4G networks and LANs is 3.57 seconds, 1.42 seconds and 1.4 seconds.
APA, Harvard, Vancouver, ISO, and other styles
23

Stephenson, Eugenie. "MULTIDISCIPLINARY EMERGING PERSPECTIVES ON BUILDING AND MAINTAINING NETWORKS IN AGING." Innovation in Aging 3, Supplement_1 (November 2019): S560. http://dx.doi.org/10.1093/geroni/igz038.2070.

Full text
Abstract:
Abstract This presentation is a reflective piece on developing and staging of the inaugural Gerontology Student Workforce Day at the Georgia Capitol held in January 2016 through coordination with the state-level Council on Aging (GCOA: Georgia-Council-on-Aging). The aims of this initiative focused on bridging students’ gerontology education and career aims with current legislative concerns for older adults at the state level through networking and advocacy efforts. We also sought out to highlight to state legislators the necessity to support gerontology education. Results of this networking engagement included educating state legislators on both the role of gerontology education to support the needs of older residents at the community-level and highlighting to both parties the impact of gerontology professionals on the state’s workforce. As a result, we engaged gerontology students and early career aging professionals in high-impact networking opportunities focused on service and policy efforts with state legislators and local AAAs (area-agencies-on-aging).
APA, Harvard, Vancouver, ISO, and other styles
24

Hüseyn oğlu Məmmədov, Famil. "Mathematical models of wireless local communication networks and methods of calculation of probability-time characteristics." SCIENTIFIC WORK 75, no. 2 (February 18, 2022): 148–54. http://dx.doi.org/10.36719/2663-4619/75/148-154.

Full text
Abstract:
802.11 standartı və CSMA/CA protokolu əsasında qurulmuş simsiz lokal rabitə şəbəkələrinə baxılır. Baxılan şəbəkələr üzrə verilənlərin ötürülməsi zam- anı yaranan fiziki və ehtimal prosesləri nəzərə almaqla z-çevirməsi əsasında, onların riyazi modeli işlənmışdir. Bu model əsasında bilavasitə birləşmə və gözləmə prinsipli həlledicili əks əlaqəli alqoritmılərdən istifadə etməklə baxılan şəbəkələrin riyazi modelləri və ehtimal-zaman xarakteristikalarının hesablanması metodları işlənmişdir. Açar sözlər: simsiz lokal rabitə şəbəkələr, 802.11 stanrartı, CSMA/CA protokolu, z-çevirməsi, riyazi modellər, ehtimal-zaman xarakteristikaları Famil Huseyn Mammadov Mathematical models of wireless local communication networks and methods of calculation of probability-time characteristics Summary Wireless LANs based on the 802.11 standard and the CSMA/CA protocol are considered. Based on the z-transformation of the data in the networks in question, their mathematical models were developed, taking into account the physical and probabilistic processes that occur during their transmission. On this model, mathematical models and methods for calculating the probability-time characteristics of the networks under consideration were developed using directly connected and expectant decision feedback algorithms. Key words: wireless local area networks, 802.11 standard, CSMA/CA protocol, z-conversion, mathematical models, probability-time characteristics.
APA, Harvard, Vancouver, ISO, and other styles
25

Abubakar Ibrahim, Adamu, and Mohamud Abdulkadir Ahmed. "Examining the Performance of Software Defined Virtual Local Area Network." International Journal of Innovative Computing 12, no. 2 (November 20, 2022): 25–30. http://dx.doi.org/10.11113/ijic.v12n2.373.

Full text
Abstract:
For more than three decades, the Virtual Local Area Network (VLAN) has been one of the most popular systems virtualization groups of users on both local and corporate networks. Because of the advantages that VLAN provides, network managers and operators have continued to use it in the creation of their networks and have even extended its use to include cloud computing networking. Previous research studies have established a lot of issues associated with VLAN architecture. Typically, it was revealed that it is difficult to set up a complex VLAN, and even it is successful, it leads to computational time-consuming, and prone to error to process majority of complex VLAN. Considering this, the current research examines the performance of “Software Defined- VLAN”. This is because Software-Defined Network (SDN) is a viable alternative network architecture that allows the separation of information and control functions on devices. It appears to be a promising optimized option VLAN administration. The SDN-enabled VLAN testbed was set out and implemented using OpenFlow. SDN-Enabled VLAN and a conventional VLAN. The finding revealed that SDN-enabled VLAN offers higher network performance, lower packet transfer delay, and a more efficient configuration.
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Hyerin, and Jungmin So. "Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information." Applied Sciences 11, no. 22 (November 22, 2021): 11074. http://dx.doi.org/10.3390/app112211074.

Full text
Abstract:
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA (Carrier-Sense Multiple Access)-based medium access control of current wireless network systems suffers from significantly degraded performance when the network becomes dense. Recent WLAN (Wireless Local Area Networks) standards include measures for increasing spatial reuse such as BSS (Basic Service Set) coloring, but the schemes based on BSS coloring such as OBSS/PD (Overlapping BSS/Preamble Detection) have limitations in improving spatial reuse. In this paper, we propose a spatial reuse method for uplink which can utilize BSS color and proximity information to improve the efficiency of carrier sensing and thus spatial reuse. Specifically, through the BSS color and the proximity information, a node receiving a preamble can figure out how far the receiver of the ongoing traffic is located. This information is used to determine whether the node should aggressively start transmitting or defer its transmission to protect the ongoing transmission. Simulation results show that the proposed method outperforms existing methods in terms of throughput and fairness.
APA, Harvard, Vancouver, ISO, and other styles
27

Caccia, M., R. Bono, G. Bruzzone, and G. Veruggio. "Unmanned Underwater Vehicles for Scientific Applications and Robotics Research: The ROMEO Project." Marine Technology Society Journal 34, no. 2 (January 1, 2000): 3–17. http://dx.doi.org/10.4031/mtsj.34.2.1.

Full text
Abstract:
The design, development and exploitation of Romeo, a last generation ROV capable of supporting robotics research on intelligent/autonomous vehicles and to execute scientific missions in very harsh environment, are presented. The system’s mechanical and communication design is discussed with respect to basic end-user requirements. A three Local Area Networks system architecture is proposed, and the main sub-systems connected to the surface (supervision), on-board and lab Ethernet LANs are described. The vehicle’s exploitation in scientific missions in harsh environment (Ross Sea in Antarctica), Internet-based mission control demonstrations and the integration with a multidisciplinary scientific and technological payload proved the capabilities of the proposed architecture in matching operational and research requirements.
APA, Harvard, Vancouver, ISO, and other styles
28

Nadarajah, Nishaanthan, and Ampalavanapillai Nirmalathas. "Upstream access and local area networking in passive optical networks with a single reflective semiconductor optical amplifier." Journal of Optical Networking 7, no. 5 (April 30, 2008): 513. http://dx.doi.org/10.1364/jon.7.000513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nadarajah, Nishaanthan, Ka Lun Lee, and Ampalavanapillai Nirmalathas. "Upstream Access and Local Area Networking in Passive Optical Networks Using Self-Seeded Reflective Semiconductor Optical Amplifier." IEEE Photonics Technology Letters 19, no. 19 (October 2007): 1559–61. http://dx.doi.org/10.1109/lpt.2007.903858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Tzu-Chi, and Kuo-Chih Chu. "Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network." Journal of Network and Computer Applications 34, no. 6 (November 2011): 2027–41. http://dx.doi.org/10.1016/j.jnca.2011.07.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Perryman, Carol. "Does a Social Network Based Model of Journal Metrics Improve Ranking?" Evidence Based Library and Information Practice 2, no. 2 (June 5, 2007): 81. http://dx.doi.org/10.18438/b87592.

Full text
Abstract:
A Review of: Bollen, J., Van de Sompel, H., Smith, J.A., & Luce, R. (2005). Toward alternative metrics of journal impact: A comparison of download and citation data. Information Processing and Management, 41:1419-1440. Abstract Objective – To test a new model for measuring journal impact by using principles of social networking. Research questions are as follows: 1. Can valid networks of journal relationships be derived from reader article download patterns registered in a digital library’s server logs? 2. Can social network metrics of journal impact validly be calculated from the structure of such networks? 3. If so, how do the resulting journal impact rankings relate to the ISI impact factor (IF)? Design – Bibliometric, social network centrality analysis Setting – Los Alamos National Laboratory (LANL), New Mexico Subjects – 40,847 full-text articles downloaded from a large digital library by 1,858 unique users over a 6 month period. Methods – Full-text article downloads from a large digital library for a six-month period were examined using social networking analysis methods. ISSNs for journals in which the retrieved articles were published were paired based upon the proximity of use by the same user, based on the supposition that proximal downloads are related in some way. Reader-Generated Networks (RGNs) were then tested for small-world characteristics. The resulting RGN data were then compared with Author-Generated Networks (AGNs) for the same journals indexed in the Institute of Scientific Information (ISI) annual impact factor (IF) rankings, in the Journal Citation Reports (JCR) database. Next, a sample of the AGN-derived pairings was examined by a team of 22 scientists, who were asked to rate the strength of relationships between journals on a five-point scale. Centrality ratings were calculated for the AGN and RGN sets of journals, as well as for the ISI IF. Main results – Closeness and centrality rankings for the ISI IF and the AGN metrics were low, but significant, suggesting that centrality metrics are an acceptable impact metric. Comparison between the RGN and ISI IF data found marked differences, with RGN mirroring local population needs to a much higher degree, and with a non-significant correlation between the ISI IF and RGN ranking, while AGN and RGN centrality rankings show significant centrality and closeness and betweenness correlations. RGN network ranking identified highly localized foci of interest for the LANL, as well as “interest-bridging” subject areas pointing to possible emerging interests among the scientists. Conclusion – The study results appear to successfully demonstrate an alternative to existing journal impact ranking that can more validly and accurately reflect the practices of a local community. The authors suggest that the social network-derived methodology for identification of impact rankings avoids biases intrinsic to ISI IF as a result of frequentist metrics collected from a global user group. Although the authors resist the idea of generalizability due to the local nature of their data, they suggest that the methodology can be successfully used in other settings, and for a more global community. Finally, the authors propose the automated creation of an open-source RGN whose data could be localized for smaller communities, with potentially large implications for the existing publishing industry.
APA, Harvard, Vancouver, ISO, and other styles
32

Molina, Elias, Eduardo Jacob, and Armando Astarloa. "Using OpenFlow to control redundant paths in wireless networks." Network Protocols and Algorithms 8, no. 1 (May 10, 2016): 90. http://dx.doi.org/10.5296/npa.v8i1.8730.

Full text
Abstract:
The deployment of wireless networks in critical industrial environments must ensure the availability of monitoring and control applications, for which it is essential to exploit redundancy techniques. In order to reduce to zero the failover time, in this paper, the Parallel Redundancy Protocol (PRP) is used in Wireless Local Area Networks (WLAN) which are implemented under the Software-Defined Networking (SDN) paradigm. It is discussed how the OpenFlow protocol allows an external controller to configure redundant paths between dual-homed devices. As a result, critical services can be protected in interference and mobility situations. The improvement in availability has been obtained by using both emulation and simulation.
APA, Harvard, Vancouver, ISO, and other styles
33

Zegeye, Wondimu, Richard Dean, Mulugeta Dugda, Farzad Moazzami, and Andargachew Bezabih. "Modeling Networked Telemetry." Computers 10, no. 4 (April 3, 2021): 45. http://dx.doi.org/10.3390/computers10040045.

Full text
Abstract:
This paper presents the modeling of the networks supporting today’s telemetry. The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems. The development of Integrated Network-Enhanced Telemetry protocols and the use of networked telemetry applications has introduced a host of potential cybersecurity risks inherent in modern networking. This paper will investigate how telemetry applications are uniquely structured with wide-, local-, and micro-area networks that represent modern telemetry solutions. The development of these models and the traffic on these networks will enable analysis into the unique threats and vulnerabilities of telemetry networks. The core of this paper is the notion that telemetry networks are unique, and modeling these networks is key to the current work. The core premise of this paper is also that telemetry networks look and function like Supervisory Command and Data Acquisition (SCADA) networks. By digging deeply into both of these structures, we have shown here that SCADA architectures can be adapted to telemetry networks. This approach opens the door to a wealth of analysis, strategies, and solutions for telemetry networks that are well developed in the SCADA realm.
APA, Harvard, Vancouver, ISO, and other styles
34

Abdourahamane, Ali. "ADVANTAGES OF OPTICAL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING IN COMMUNICATIONS SYSTEMS." EUREKA: Physics and Engineering 2 (March 31, 2016): 27–33. http://dx.doi.org/10.21303/2461-4262.2016.00058.

Full text
Abstract:
The role of the optical transmitter is to generate the optical signal, impose the information bearing signal, and launch the modulated signal into the optical fiber. The semiconductor light sources are commonly used in state-of-the-art optical communication systems. Optical communication systems has become one of the important systems after the advent of telephone, internet, radio networks in the second half of the 20th century. The development of optical communication was caused primarily by the rapidly rising demand for Internet connectivity. Orthogonal frequency-division multiplexing (OFDM) belongs to a wide class of multicarrier modulation. Orthogonal frequency-division multiplexing has succeeded in a wide range of applications in the wireless communication domain from video/audio digital broadcasting to wireless local area networks (LANs). Although their very low loss compared to that of the wireless counterpart, optical systems still need renovation for spans commonly less than150 Km. In this paper advantages of optical orthogonal frequency division multiplexing in communications systems will explained.
APA, Harvard, Vancouver, ISO, and other styles
35

Álvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (February 4, 2023): 1747. http://dx.doi.org/10.3390/s23041747.

Full text
Abstract:
The defence-in-depth (DiD) methodology is a defensive approach usually performed by network administrators to implement secure networks by layering and segmenting them. Typically, segmentation is implemented in the second layer using the standard virtual local area networks (VLANs) or private virtual local area networks (PVLANs). Although defence in depth is usually manageable in small networks, it is not easily scalable to larger environments. Software-defined networks (SDNs) are emerging technologies that can be very helpful when performing network segmentation in such environments. In this work, a corporate networking scenario using PVLANs is emulated in order to carry out a comparative performance analysis on defensive strategies regarding CPU and memory usage, communications delay, packet loss, and power consumption. To do so, a well-known PVLAN attack is executed using simulated attackers located within the corporate network. Then, two mitigation strategies are analysed and compared using the traditional approach involving access control lists (ACLs) and SDNs. The results show the operation of the two mitigation strategies under different network scenarios and demonstrate the better performance of the SDN approach in oversubscribed network designs.
APA, Harvard, Vancouver, ISO, and other styles
36

Gentile, Antonio Francesco, Peppino Fazio, and Giuseppe Miceli. "A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios." Telecom 2, no. 4 (November 5, 2021): 430–45. http://dx.doi.org/10.3390/telecom2040025.

Full text
Abstract:
Nowadays, the demand for connection between the remote offices of a company, or between research locations, and constantly increasing work mobility (partly due to the current pandemic emergency) have grown hand in hand with the quality and speed of broadband connections. The logical consequence of this scenario is the increasingly widespread use of Virtual Private Network (VPN) connections. They allow one to securely connect the two ends of a connection via a dedicated network, typically using the Internet and reducing the costs of Content Delivery Network (CDN) lines (dedicated connections). At the same time, Virtual Local Area Networks (VLANs) are able to decrease the impact of some scalability issues of large networks. Given the background above, this paper is focused on overviewing and surveying the main progresses related to VPNs and VLANs in wireless networks, by collecting the most important contributions in this area and describing how they can be implemented. We state that security issues in VLANs can be effectively mitigated through the combination of good network-management practices, effective network design and the application of advanced security products. However, obviously, the implementation of VPNs and VLANs poses specific issues regarding information and network security; thus some good solutions are also surveyed.
APA, Harvard, Vancouver, ISO, and other styles
37

Filho, José Quaresma, Nailson Cunha, Robertson Lima, Eudisley Anjos, and Fernando Matos. "A Software Defined Wireless Networking Approach for Managing Handoff in IEEE 802.11 Networks." Wireless Communications and Mobile Computing 2018 (November 21, 2018): 1–11. http://dx.doi.org/10.1155/2018/9246824.

Full text
Abstract:
In Wireless Local Area Networks (WLAN) with more than one access point (AP), the handoff process plays a crucial role to guarantee the user service continuity. Usually initiated by the client’s equipment, it occurs smoothly on the order of seconds. However, despite being functional and well-established, this process can be inadequate in scenarios where users are executing multimedia applications, such as real-time video streaming or VoIP. For these applications, those few seconds may cause loss of packets, resulting in loss of essential information. Because of that, this study proposes a Software Defined Wireless Networking (SDWN) approach, in which a controller decides when to initiate the handoff process and chooses the AP the client’s device must connect. This approach was implemented in a testbed scenario and the results have shown its efficiency by decreasing the handoff delay and providing more stability to the process.
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Jiawei, Zhichuan Guo, and Xiao Chen. "MAToC: A Novel Match-Action Table Architecture on Corundum for 8 × 25G Networking." Applied Sciences 12, no. 17 (August 31, 2022): 8734. http://dx.doi.org/10.3390/app12178734.

Full text
Abstract:
Packet processing offloads are increasingly needed by high-speed networks. This paper proposes a high throughput, low latency, scalable and reconfigurable Match-Action Table (MAT) architecture based on the open source FPGA-based NIC Corundum. The flexibility and capability of this scheme is demonstrated by an example implementation of IP layer forwarding offload. It makes the NIC work as a router that can forward packets for different subnet and virtual local area networks (VLAN). Experiments are performed on a Zynq MPSoC device with two QSFPs and the results show that it can work at line rate of 8 × 25 Gbps (200 Gbps), within a maximum latency of 76 nanoseconds. In addition, a high-performance MAT pipeline with full-featured, resource-efficient TCAM and a compact frame merging deparser are presented.
APA, Harvard, Vancouver, ISO, and other styles
39

von Friedrichs, Yvonne. "Collective Entrepreneurship. Networking as a strategy for business development." MERCATI & COMPETITIVITÀ, no. 1 (March 2010): 83–98. http://dx.doi.org/10.3280/mc2010-001007.

Full text
Abstract:
The paper addresses the emerging practice of collective entrepreneurship and demonstrate a model of network marketing management in SMEs. The use of cooperation and alliances between local actors has gained increasing attention in the contemporary economy and has been discussed as a strategy for coping with increasing global competition. One example of an area in which this focus has gained acceptance is among actors located in the experience industry and especially in tourist destinations. The focus of this paper is to elaborate on marketing models in a small and medium sized tourism enterprises setting. The problem is considered from the entrepreneurship, marketing and networking perspectives. The result is based on a case study of an horizontal hotel network in the context of a Swedish municipality. In-depth interviews with hotel owners or managers as well as with the local tourism authorities contributed with the main information in the case. The interviews resulted in a visualisation of a powerful web of connections between actors showing the impact of collective entrepreneurship to achieve positive business development. This paper suggests that theories of networks may contribute to a logic that provides a better understanding of contemporary tourist destination marketing practice.
APA, Harvard, Vancouver, ISO, and other styles
40

Haeruddin, Haeruddin. "Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS." JURNAL MEDIA INFORMATIKA BUDIDARMA 5, no. 3 (July 31, 2021): 848. http://dx.doi.org/10.30865/mib.v5i3.2979.

Full text
Abstract:
The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.
APA, Harvard, Vancouver, ISO, and other styles
41

Kim, Minho, Eun-Chan Park, and Chong-Ho Choi. "Adaptive Two-Level Frame Aggregation for Fairness and Efficiency in IEEE 802.11n Wireless LANs." Mobile Information Systems 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/548109.

Full text
Abstract:
This paper deals with the problem of performance degradation in wireless local area networks (WLANs) based on IEEE 802.11n. When a wireless channel is shared by heterogeneous stations that have different data rates and packet sizes, each station occupies a different amount of airtime because the basic channel access mechanism of WLAN was originally designed to provide fair chance of channel access, regardless of packet size and data rate. This leads to the degradation of overall network throughput and airtime fairness among stations, which is known as performance anomaly. To resolve this problem, we firstly formulate an optimization problem for a generalized two-level frame aggregation whose objective is to maximize the achievable throughput under the constraint of airtime fairness. Then, we propose a frame size adaptation scheme that controls the number of packets in an aggregated frame. The proposed scheme is fully compatible with the IEEE 802.11 standard and works in a distributed manner, which neither modifies the channel access mechanism nor resorts to a centralized scheduling algorithm. The extensive simulation results confirm that the proposed scheme tightly regulates the airtime usage of each station to be almost the same and significantly improves the overall network throughput compared to other existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
42

Septiarani, Bintang, and Wiwandari Handayani. "Community Group Networking on the Community-based Adaptation Measure in Tapak Village, Semarang Coastal Area." Indonesian Journal of Geography 52, no. 2 (September 2, 2020): 181. http://dx.doi.org/10.22146/ijg.39053.

Full text
Abstract:
The north coast of Central Java is one of the most vulnerable regions to climate change in Indonesia. Various activity in coastal area also leads to the growing of informal sector that closely related to the growing number of poor people in coastal area. Therefore, the loss of livelihood triggers the awareness of stakeholder to help people through Community-based Adaptation (CBA) in Semarang coastal area. This paper aims to elaborate on the importance of networking aspect in CBA that works in Semarang Coastal Area. Scope area of this research is Tapak Village which regarded as a pilot area of CBA implementation in Semarang. Stakeholders mapping and social network analysis was used to visualizing the community interaction in their adaptation measures. The purposive sample in interviewing CBA stakeholders is used to support the stakeholder analysis using Gephi 0.9 software. The finding shows that the existence of networks between the community and the relevant stakeholders such as NGO and local government also became one of the supporting factors for the sustainability of community-based adaptation approach in coastal areas of Semarang City.
APA, Harvard, Vancouver, ISO, and other styles
43

Yang, Kang, Minming Zhang, Deming Liu, Yinbo Qian, and Lei Deng. "A novel medium access control protocol for passive optical network supporting local area networking capabilities." Photonic Network Communications 21, no. 1 (August 10, 2010): 7–12. http://dx.doi.org/10.1007/s11107-010-0273-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Huang, Ying, Jing Ma, Alan L. Porter, Seokbeom Kwon, and Donghua Zhu. "Analyzing collaboration networks and developmental patterns of nano-enabled drug delivery (NEDD) for brain cancer." Beilstein Journal of Nanotechnology 6 (July 31, 2015): 1666–76. http://dx.doi.org/10.3762/bjnano.6.169.

Full text
Abstract:
The rapid development of new and emerging science & technologies (NESTs) brings unprecedented challenges, but also opportunities. In this paper, we use bibliometric and social network analyses, at country, institution, and individual levels, to explore the patterns of scientific networking for a key nano area – nano-enabled drug delivery (NEDD). NEDD has successfully been used clinically to modulate drug release and to target particular diseased tissues. The data for this research come from a global compilation of research publication information on NEDD directed at brain cancer. We derive a family of indicators that address multiple facets of research collaboration and knowledge transfer patterns. Results show that: (1) international cooperation is increasing, but networking characteristics change over time; (2) highly productive institutions also lead in influence, as measured by citation to their work, with American institutes leading; (3) research collaboration is dominated by local relationships, with interesting information available from authorship patterns that go well beyond journal impact factors. Results offer useful technical intelligence to help researchers identify potential collaborators and to help inform R&D management and science & innovation policy for such nanotechnologies.
APA, Harvard, Vancouver, ISO, and other styles
45

Oksiiuk, Oleksandr, and Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (March 3, 2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Full text
Abstract:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Hyeong-Jun, Min-Hee Choi, Mah-Ho Kim, and Suk Lee. "Development of an Ethernet-Based Heuristic Time-Sensitive Networking Scheduling Algorithm for Real-Time In-Vehicle Data Transmission." Electronics 10, no. 2 (January 13, 2021): 157. http://dx.doi.org/10.3390/electronics10020157.

Full text
Abstract:
The rapid development and adaptation of advanced driver assistance systems (ADAS) and autonomous driving increases the burden of in-vehicle networks. In-vehicle networks are now required to provide a fast data rate and bounded delay for real-time operation, while conventional protocols such as controller area networks, local interconnected networks, and FlexRay begin to show limitations. Ethernet-based time-sensitive network (TSN) technology has been proposed as an alternative. TSN is a set of Ethernet standards being developed by the IEEE TSN task group, which aims to satisfy requirements such as real-time operation, stability, and low and bounded latency, and it can be used in automotive, industrial, and aerospace applications. This study introduces several standards for Ethernet traffic scheduling based on TSN technology and proposes a heuristic-based scheduling algorithm for Ethernet scheduling. In addition, three network configurations are simulated using OMNeT++ to show the applicability. The heuristic TSN scheduling algorithm is a straightforward and systematic procedure for practical network designers.
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Feng-Wen, Long-Wang Fu, Kai Wang, Sang-Bing Tsai, and Ching-Hsia Su. "The Influence of Entrepreneurship and Social Networks on Economic Growth—From a Sustainable Innovation Perspective." Sustainability 10, no. 7 (July 18, 2018): 2510. http://dx.doi.org/10.3390/su10072510.

Full text
Abstract:
A large body of evidence demonstrates the key role played by entrepreneurship in promoting economic growth. However, the potential connections between entrepreneurship, social networking, and economic development still require in-depth exploration and discussion. This paper first establishes a theoretical framework combining entrepreneurship capital theory, resource dependence theory and transaction cost theory, then examines the possible associations between entrepreneurship, social networks, and economic growth based on the dynamic panel data model. To achieve the research objectives, the investigators collected data spanning the period between 2007 and 2016 from 31 provinces and cities in China. The authors adopted the enterprise employment rate as a measure of entrepreneurship and used the information sharing rate to assess social networks, which were then both introduced into the economic growth model. Additionally, by using the system of generalized method of moments (GMM) estimation, this article measures the influence of entrepreneurship and social networks on the economic growth of a local area. The empirical results reveal that both entrepreneurship and social networking significantly promote regional economic growth in China. Further, the effect of entrepreneurship is significantly enhanced after introducing the joint effects of entrepreneurship and social network. The findings also expound that entrepreneurship of the eastern zone and social networking of the central section exhibit the strongest potential for economic development of the respective areas. Conversely, entrepreneurship may actually hinder the economic advancement of the central areas of China. Corresponding to the findings, the researchers suggest that it is necessary to devise flexible policies for heterogeneous entrepreneurial environments and to appropriately utilize interpersonal networks to maximize the efficiency of the outputs of economic activity, which are likely to strengthen the role of entrepreneurship and social networks in contemporary economic and business milieu.
APA, Harvard, Vancouver, ISO, and other styles
48

Ko, Leong. "Teaching interpreting by distance mode." Interpreting. International Journal of Research and Practice in Interpreting 8, no. 1 (June 8, 2006): 67–96. http://dx.doi.org/10.1075/intp.8.1.05ko.

Full text
Abstract:
The development of telecommunication technologies has created a demand on educational institutions to offer interpreting programs by distance mode. This demand arises from educational needs, financial considerations, and market developments. Although several educational institutions and interpreting service providers have attempted to train interpreters by remote delivery, a commonly expressed concern is whether distance programs can be as effective as on-campus ones. This paper presents an analysis of fundamental features of interpreting and on-campus training, as well as issues associated with the distance mode of interpreter training programs. Three telecommunication technologies that could be used for teaching interpreting — teleconferencing by telephone, videoconferencing through local area networks (LANs) and videoconferencing through the Internet — are analyzed with regard to feasibility, reliability and affordability. The results show that each of these has its advantages and disadvantages. The challenge facing educators is to overcome the technical constraints, maximize the advantages and the potential of current technologies, and adapt pedagogies to best fit the new technologies so as to achieve results comparable to those of on-campus teaching.
APA, Harvard, Vancouver, ISO, and other styles
49

Coronado, Estefanía, Abin Thomas, and Roberto Riggio. "Adaptive ML-Based Frame Length Optimisation in Enterprise SD-WLANs." Journal of Network and Systems Management 28, no. 4 (March 17, 2020): 850–81. http://dx.doi.org/10.1007/s10922-020-09527-y.

Full text
Abstract:
Abstract Software-Defined Networking (SDN) is gaining a lot of traction in wireless systems with several practical implementations and numerous proposals being made. Despite instigating a shift from monolithic network architectures towards more modulated operations, automated network management requires the ability to extract, utilise and improve knowledge over time. Beyond simply scrutinizing data, Machine Learning (ML) is evolving from a simple tool applied in networking to an active component in what is known as Knowledge-Defined Networking (KDN). This work discusses the inclusion of ML techniques in the specific case of Software-Defined Wireless Local Area Networks (SD-WLANs), paying particular attention to the frame length optimization problem. With this in mind, we propose an adaptive ML-based approach for frame size selection on a per-user basis by taking into account both specific channel conditions and global performance indicators. By relying on standard frame aggregation mechanisms, the model can be seamlessly embedded into any Enterprise SD-WLAN by obtaining the data needed from the control plane, and then returning the output back to this in order to efficiently adapt the frame size to the needs of each user. Our approach has been gauged by analysing a multitude of scenarios, with the results showing an average improvement of 18.36% in goodput over standard aggregation mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
50

Rattanavipanon, Norrathep, Donlapark Ponnoprat, Hideya Ochiai, Kuljaree Tantayakul, Touchai Angchuan, and Sinchai Kamolphiwong. "Detecting Anomalous LAN Activities under Differential Privacy." Security and Communication Networks 2022 (April 12, 2022): 1–15. http://dx.doi.org/10.1155/2022/1403200.

Full text
Abstract:
Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, the anomaly detection analysis needs to be carried out by an external party, located outside the LAN. Thus, it is important for the LAN admin to release LAN data to this party in a private way in order to protect privacy of LAN users; at the same time, the released data must also preserve the utility of being able to detect anomalies. This paper investigates the possibility of privately releasing ARP data that can later be used to identify anomalies in LAN. We present four approaches, namely, naïve, histogram-based, naïve- δ , and histogram-based- δ and show that they satisfy different levels of differential privacy—a rigorous and provable notion for quantifying privacy loss in a system. Our real-world experimental results confirm practical feasibility of our approaches. With a proper privacy budget, all of our approaches preserve more than 75% utility of detecting anomalies in the released data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography