high-speed network analysis

Top PDF high-speed network analysis:

Design and analysis of a high speed metropolitan area network

Design and analysis of a high speed metropolitan area network

The probability that a coming slot is used implies that the coming super packet still carries at least one small packet for the down stream nodes. In steady state, q is identical to all [r]

51 Read more

Literature Survey on Congestion control for high-speed wired network

Literature Survey on Congestion control for high-speed wired network

the development of new congestion control approaches. Labrad or and Banerjee (1999) have given a comprehensive survey of selective packet dropping policies for the best-effort service of ATM and IP networks. They discussed three router based congestion control schemes for IP networks, namely RED, RED In/ Out (RIO) and Flow RED (FRED). They compared RED and RIO in terms of fairness. Ryuetal. (2003) have presented a review of AQM algorithms for congestion control. They also had done a survey of control-theoretic analysis and design of end-to-end congestion control with a router based scheme. As alternatives to AQM algorithms, they also surveyed architectural approaches such as modification of source or network algorithms, and economic approaches including pricing or optimization of allocated resources. Chatranonetal.(2004) have discussed the state-of-the- art in router-based mechanisms to address the TCP-friendliness problem and present a description of the most important algorithms, design issues, advantages and disadvantages in their survey. They have done a qualitative comparison of all the existing AQM schemes and a quantitative performance evaluation is performed to show the advantages and disadvantages of only those schemes that do not require full per-flow state information since they are more likely to be implemented in practice.
Show more

8 Read more

Channel Modeling Network Analysis In Sea Water Medium For High Speed Using EM Waves

Channel Modeling Network Analysis In Sea Water Medium For High Speed Using EM Waves

2.1 Design and Development of Speed Channel Model through characteristics impedance of EM waves As it is known that the waves can be expressed as cyclic energy variations in form of information, eg. EM waves, Microwaves, light rays, TV signals etc . The main benefits of using electromagnetic waves instead of acoustic waves reducing the latency due to faster propagation and achieving a high data rate due to use of high frequency of the wave [15].EM waves consist of electric and magnetic field which are perpendicular to each another during its journey in any medium. In this work, speed channel model in water medium using EM waves will be designed and developed through mathematical tools such as exponential theory, vector theory and EM wave’s characteristics etc. In Fig. (1), a sinusoidal waveform of electrical field of EM waves is considered whose mathematical expression can be written below in form of eq. (1). [21, 26]. The waveform travels in y-axis direction.
Show more

10 Read more

Performance Analysis of HSPA Technology for Networked Control System Application

Performance Analysis of HSPA Technology for Networked Control System Application

A number of papers have shown the results of performance analysis on 3G and 3.5G cellular networks through simulation [7], [8]. To have an accurate model of cellular networks delay and dropout for NCS applications, it is necessary to analyze and improve the model using empirical data [9]. A number of papers have completed the analysis by experimental. Reference [10] discussed a performance analysis of data with UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) through HSPA (High Speed Packet Access) network. The performance has been evaluated using the parameters of goodput, delay and jitter that occurred on the network without discussing the presence of dropout or packet loss. While reference [11] and [12] have conducted the experiment on 3G and 3.5G cellular technologies with different ground speed scenarios. They analyzed the effects on the parameters of throughput, jitter and loss rate. Reference [13] included the operator's network traffic data into simulation to calculate the effect of number of users to throughput. The parameters those have been analyzed are jitter, throughput, and packet loss on average. Some of them provide information solely on RTT (Round Trip Time) delay on average. The one-way delay experimentation was conducted by Soto et al. [12]. Experiment was done with duration of 10 seconds for every test. The obtained data was averaged in 10 second for 40 tests for every test scenario. But, in the experiment of Solo, no mention the size of data to be sent and the time interval of each test.
Show more

11 Read more

Stateful Intrusion Detection for High-Speed Networks

Stateful Intrusion Detection for High-Speed Networks

Even though both of the advocated approaches above have good points, analysis of network traffic on high-speed links still represents a fundamental need in many practical network installations. The commercial world attempted to respond to this need and a number of vendors now claim to have sensors that can operate on high-speed ATM or Gigabit Ethernet links. For example, ISS [4] offers Net- ICE Gigabit Sentry, a system that is designed to monitor traffic on high-speed links. The company advertises the system as being capable of performing protocol reassem- bly and analysis for several application-level protocols (e.g. HTTP, SMTP, POP) to identify malicious activities. The tool claims to be the “first network-IDS that can handle full Gigabit speeds.” However, the authors of the tool also state that “GigaSentry handles a full Gigabit in lab conditions, but real-world performance will likely be less. [. . . ] Cus- tomers should expect at least 300 Mbps real-world perfor- mance, and probably more depending up the nature of their traffic. [. . . ] GigaSentry can only capture slightly more than 500,000-packets/second.” These comments show the actual difficulties of performing network-based intrusion detection on high-speed links. Other IDS vendors (like Cisco [1]) offer comparable products with similar features. Unfortu- nately, no experimental data gathered on real networks is presented. TopLayer Networks [11] presents a switch that keeps track of application-level sessions. The network traf- fic is split with regard to these sessions and forwarded to several intrusion detection sensors. Packets that belong to the same session are sent through the same link. This allows sensors to detect multiple steps of an attack within a single session. Unfortunately, the correlation of information be- tween different sessions is not supported. This could result in missed attacks when attacks are performed against mul- tiple hosts (e.g., ping sweeps), or across multiple sessions.
Show more

9 Read more

Spectral Coding System for High Speed Optical Communication Network

Spectral Coding System for High Speed Optical Communication Network

Abstract: This paper shows the development of new code for OCDMA system. The characteristics of code based on the unit cross correlation. The code is such that it follows the minimum cross correlation. The direct detection method is used to recover the information at the receiving end. The result and analysis shows that system has better performance compare to existing method such as MDW, RD Method. Simulation is performed at high data rates from 10Gbits/s to 20 Gbits/s.

6 Read more

High-Speed Network Impact on DDBMS

High-Speed Network Impact on DDBMS

DBMS as an I/O-intensive software has been focused on how to efficiently make use of cache, main memory, and disk storage based on the observation of their bandwidths in the memory hierarchy. In the past decade, Distributed Database Management Systems (DDBMS) has introduced computer network as another kind of data I/O media. Traditionally, computer networks were put on a lower layer than disk storage in the hierarchy. With the advent of broadband high- speed network and lightweight (low overhead) protocols, computer networks could have higher bandwidth than hard disk. How to reflect this fundamental change on the DDBMS or even traditional centralized DBMS architecture remains open. In this report, I shall survey the current status of high-speed networks especially gigabit/gigabyte networks, and the low overhead protocols and architecture. Introductions to Fibre Channel and Infiniband hardware architectures are included as the two major parts. Different approaches for incorporating high-speed network infrastructure to operating systems and high level network protocols are also introduced. At last, we give an analysis how we can incorporation application level protocols to DDBMS.
Show more

28 Read more

High speed Railway External Power Supply Reliability Evaluation of Bayesian Network

High speed Railway External Power Supply Reliability Evaluation of Bayesian Network

Reliability evaluation is important in high speed railway external power supply design, based on probability reasoning bayesian network applied in high-speed railway external power supply reliability evaluation, establish the minimum cut and the minimum path of bayesian network model, quantitative calculation external power supply system in each ele- ment posterior probability, and the example analysis verified the feasibility and correctness of the above method. Using bayesian network bidirection reasoning technology, quantitative calculation the posterior probability of each element in external power supply system, realized the identification of weak link in external power supply. The research methods and the results of the study can be used in the scheme optimization design of high speed railway external power supply. Keywords: Bayesian Networks; The Minimal Path; The Minimal Cut; External Power Source; Reliability Evaluation
Show more

5 Read more

Performance Analysis of High Speed Adders

Performance Analysis of High Speed Adders

The most important feature of modern day electronics is to build low power high speed devices both due to increase in integration of components and reduction in size. Over the decades the battery life has only improved by a factor of 2 or 4 whereas the power of digital IC’s has increased with over four orders of magnitude.A low power design needs to be adopted for future advancements or else the devices will suffer from a short battery life or very heavy battery packs. It is also important to avoid local areas of high power dissipation which may cause hotspots, and also to reduce the need for a low power impedance and ground distribution network which may interfere with signal interconnections. All complex adder architectures are constructed from its basic building blocks such as Half Adder (HA) and Full Adder (FA). In this paper, the performance parameters of various adders are compared
Show more

5 Read more

Establishing a valuable method of packet capture and packet analyzer tools in firewall

Establishing a valuable method of packet capture and packet analyzer tools in firewall

Packet capture is the act of capture the data packets across a computer network. Packet captures is used by the network administrators and security engineers for the purposes of Monitor network traffic, analyzes traffic patterns, Identify and troubleshoot network problems. Problem statement: The Conventional firewall is performed the packet capture followed by allowing or disallowing the packet as per user specified policy. Approach: our approach is to implement the Deep packet capture (DPC), Deep packet Inspection (DPI) and also analyze the packet in effective manner. This approach is helpful for monitor the all activates in the public or private network. Deep packet capture (DPC) is the act of capturing, at full network speed, complete network packets payload, crossing a network with a high traffic rate. Deep packet inspection (DPI) to review network packet data, perform forensics analysis to uncover the root cause of network problems, identify security threats, and ensure data communications and network usage complies with outlined policy. Some DPCs can be coupled with DPI and can result as, inspect, and analyze all networks traffic in real-time.
Show more

10 Read more

Analysis of High Speed Energy-Efficient Carry Skip Adder High-Speed Skips Logic at Different Levels

Analysis of High Speed Energy-Efficient Carry Skip Adder High-Speed Skips Logic at Different Levels

A Multiplexer is a device that allows one of several analog or digital input signals which are to be selected and transmits the input that is selected into a single medium. Multiplexer is also known as Data Selector. A multiplexer of 2n inputs has n select lines that will be used to select input line to send to the output. Multiplexer is abbreviated as Mux. MUX sends digital or analog signals at higher speed on a single line in one shared device. It recovers the separate signals at the receiving end. The Multiplexer boosts or amplifies the information that later transferred over network within a particular bandwidth and time. This article gives an overview of what is multiplexer and types of multiplexer.
Show more

8 Read more

Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network

Implementation and Result Analysis of Secure Strategy for High Speed Transmission and Efficient Collection of Data in Wireless Sensor Network

In this work, the main focus is to provide Security in WSN (wireless sensor networks) as well as to provide the strategy to collect the high speed data in an efficient manner. Sensor networks are usually deployed in hostile and unattended environment where an adversary can read and modify the content of the data packet. In such situation the most popular type of attack is the external attack and replay attack. The node needs to be authenticated before data transmission takes place. In external attack the node does not belong to the network try to read and modify the packet. For that we also need to authenticate the node before data transmission. To overcome this problem we are using the concept of public and private key (Modified RSA Digital Signature Scheme). So this work tries to develop an algorithm which will form a network structure in wireless sensor network through which data can be transmitted faster to the base station without affecting life time of network and it also provide the security during communication. The cluster head in a cluster is generally involved in long distance transmission that‟s why its energy level decreases faster than other cluster members in a cluster. To overcome this problem we used the concept of re- clustering to rotate the responsibility of cluster head among the cluster members in a cluster so that energy can be properly distributed among the nodes.
Show more

9 Read more

Railway network reliability analysis based on key station identification using complex network theory : a real world case study of high speed rail network

Railway network reliability analysis based on key station identification using complex network theory : a real world case study of high speed rail network

network (Yin et al, 2006, Koseoglu, 2016), electricity system(Chassin et al, 2005) and traffic network (An et al, 2014, Meng et al, 2015). Furthermore, based on the complex network theory, a lot of empirical studies show that some transportation system infrastructure topologies have exponential degree distributions, such as Chinese bus-transport systems (Xu et al, 2007), Indian railway system (Sen et al, 2003), urban street networks (Porta et al, 2006, Wang et al, 2017), Indian airline network (Bagler, 2008) and USA airline network (Dall’Asta et al, 2006), They all have the small-world network or scale-free network characteristic. In addition, complex network theory has also been applied to the research of the safety and reliability of some complex systems (Zio and Sansavini, 2011, Dey, 2016). Furthermore, their research established various network models and studied the structural characters by the system indicators, which includes nodes degree, average path length, clustering coefficient etc. Some researchers described the complex system vulnerability by cascading failures theory under random or selective node failure modes (Buldyrev et al, 2010, Ren et al, 2016, Yan, 2014, Wilkinson, 2017). While some researchers developed reliability analysing methods for the transportation systems.
Show more

17 Read more

Real Time Predictive Speed Analysis for High Speed Rail Collision Test

Real Time Predictive Speed Analysis for High Speed Rail Collision Test

In Figure 3.3, the Facility Control System (FCS) is the core which is installed in a database server located at top left of the figure. All the activities are controlled by FCS. Data interface is designed and used by FCS to collect real-time data from sensors, PLCs and VFD (Vary Frequency Device). Command interface is designed and used by FCS to send control command to PLCs, VFD and sensors. All the equipment, such as DB server, main control monitors, administrative work stations, VFD, PLC controllers and many different sensors, are connected in a high speed Ethernet network. Most of the sensors are connected into Ethernet through PLCs. Some special sensors are connected through Ethernet converters, such as radar speed sensor and laser distance sensor. 𝑅𝑇𝑃𝑆𝐴 is part of FCS and used to collect the performance data in a real-time manner from sensors during propulsion phase and provide input to FCS to actually control the force release.
Show more

85 Read more

Performance analysis of error recovery schemes in high speed network - part II

Performance analysis of error recovery schemes in high speed network - part II

A link level virtual circuit model of the link-by-link error recovery scheme is shown in. Fig(6)[r]

27 Read more

Performance analysis of error recovery schemes in high speed network - part I

Performance analysis of error recovery schemes in high speed network - part I

The result shows that under a particular condition, if we keep the number of hops between the source and the destination node below a certain number, the frame relay scheme can have shor[r]

31 Read more

5-inch High-definition Network Speed Dome

5-inch High-definition Network Speed Dome

Note: The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes after rebooting the speed dome. To solve the inconvenience of the dynamic IP, you need to get a domain name from the DDNS provider (E.g. DynDns.com). Please follow below steps for normal domain name resolution and private domain name resolution to solve the problem.

100 Read more

Scale and Protect DNS Infrastructure and Optimize Global App Delivery

Scale and Protect DNS Infrastructure and Optimize Global App Delivery

In most networks, DNS resolvers offload DNSSEC record requests and crypto calculations to validate that the DNS response being received is correctly signed. DNSSEC responses coming into the network requires high CPU loads on DNS resolving servers. With BIG‑IP GTM DNSSEC validation, administrators can easily offload and validate DNSSEC on the client side using BIG‑IP GTM for resolving. This results in superior DNS performance and a dramatic increase in the site response to end users.

14 Read more

Video Streaming Service Trial over ADSL-Based Telephone Networks

Video Streaming Service Trial over ADSL-Based Telephone Networks

This paper presents the Multimedia-On-Demand (MOD) trial which is expected to create a diversity of high speed entertainment video streaming services and applications into the most widespread twisted-pair local loops in Taiwan. MOD trial is a massive system integration work since there is no sufficient reference information can be referred. The major system of MOD includes proprietary ATM switch as well as DSLAM, internal LAN, service management system, video streaming server and STB. Except high speed Internet access, all the streaming services are presented by STB. The MOD subscriber number is over 400. These subscribers are equally distributed within 7 End-Office service areas. The major object of the trial is to verify the transmission reliability and stability of ADSL network under high speed streaming environment, in addition to seek out the potential multimedia entertainment system architecture solutions for commercial services across the 21 Century.
Show more

7 Read more

Optimization in Piston Design for High Speed Engine

Optimization in Piston Design for High Speed Engine

In both compression ignition automobile engines and spark ignition automobile engines, the piston located in the combustion chamber experiences a large exposure to high pressure and high temperatures. The connecting rod which connects the piston to the crankshaft of the engine and the pins and rings that connect the connecting rod to the piston and connecting the rod to crankshaft will also experience the effects of combustion of fuel in the combustion chamber.

5 Read more

Show all 10000 documents...