wide-area computer-communication networks

Top PDF wide-area computer-communication networks:

Computer Cell (Information & Communication Technology) Research Center

Computer Cell (Information & Communication Technology) Research Center

Required Technical Knowledge Knowledge of design, Commissioning and maintenance of Local and Wide Area Networks (LAN/WAN/WLAN).. Required Computer / IT Knowledge.[r]

7 Read more

Packet Switched Networks Wired Local, Metropolitan, and Wide Area Networks

Packet Switched Networks Wired Local, Metropolitan, and Wide Area Networks

Railway communication systems for applications within the signals and control systems, telecommunications, electrical, and rolling stock disciplines are increasingly based on ethernet and internet protocol (IP) enabled computer systems. Local, metropolitan, and wide area wired networks shall align with national and international standards to create open industry involvement, increased competition, and optimal asset stewardship outcomes.

29 Read more

CHAPTER 9 WIDE AREA NETWORKS

CHAPTER 9 WIDE AREA NETWORKS

A common carrier is a private company that sells or leases communication services and facilities to the public. Common carriers are profit-oriented, and their primary products are services for voice and data transmissions, both over traditional wired circuits as well as cellular services. Common carriers often supply a broad range of computer-based services, such as the manufacturing and marketing of specialized communication hardware and software. Common carriers that provide local telephone services are commonly called local exchange carriers (LEC), while carriers that provide long distance services (e.g., Sprint) are commonly called interexchange carriers (IXC). As the LECs move into the long distance market and IXCs move into the local telephone market, this distinction may disappear.
Show more

16 Read more

lec-10 (Bandwidth,datarare latency)

lec-10 (Bandwidth,datarare latency)

Propagation Delay: This is simply the time it takes for a packet to travel between one place and another. Transmission Delay: The medium itself introduces some delay The size of the pa[r]

16 Read more

Exploration of computer networks

Exploration of computer networks

Impelled by the progress in Internet technology only a minimum of required corporate applications could be maintained on the PC and the other applications could credibly be retrieved from a central computer, the server. Advances in software and data portability, such as HTML documents on the Web and the platform-independent Java language, permit the Network Computer users to simply download necessary programs and files from a central repository, instead of storing them locally on each computer. These Network Computers are nothing but the end point systems in the large network of systems. Topology refers to the physical layout of the network, architecture refers to the broad design of the rules computers must follow in order to communicate. The specific rules to be followed are called protocols; thus architectures are collections of protocols and may also include more standards (specifications) for both hardware and software. Architectures may be either centralized or decentralized. The former design class is used when many users need the same information resulting in lower maintenance to update and maintain the network. However, distributed processing via decentralized networks is the upcoming standard. It allows work to be disseminated among participating systems. In the process exploiting capabilities of powerful systems connected in the network.
Show more

6 Read more

Performance Analysis of Cluster Based Protocols in Sensor Networks and their Vulnerabilities

Performance Analysis of Cluster Based Protocols in Sensor Networks and their Vulnerabilities

3.5. CIAWSNs protocol for Secure Information Transmission [31]: A light weight key without distribution techniques is proposed in our previous work [31] called as CIAWSNs, focused on providing a simple low complex secure mechanism for resource constrained WSNs. Using this on the basic security requirements of the WSNs is achieved with an optimal resource usage. This protocol also has some security level assumptions. It assumes that during initial deployment there will be no malicious nodes in the network. Some numbers of malicious nodes are used for create attacks in the networks. These malicious nodes are functioned only to send the false information, packet sniffing and to make hello attack. This protocol operates only on some set of firewall rules, device identification and key compression at the cluster head for maintaining data confidentiality.
Show more

7 Read more

Evolution of Network Society and Technological Innovation

Evolution of Network Society and Technological Innovation

As the trend toward higher-speed and larger-capacity network infrastructure becomes widespread, the increase in the amount of power consumed by devices has been focused on as a significant social problem that has a major effect on the global environment. Continuous technological attempts have also been made through analytical approaches in entire networks from core to LAN/access networks to reduce power dissipation by architecturally integrating devices and functions and developing new elements capable of reducing the power consumption of the sources themselves. Functional integration by means of a multi-layer convergence platform that integrates optical and IP layers is one such attempt.
Show more

8 Read more

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

Reza Fotohi received his B.Sc. degree in computer software technology engineering from University of Applied Science and Technology, Shabestar Branch and M.Sc. degree in computer software engineering from Islamic Azad University, Shabestar Branch, under the supervision of Dr. Shahram Jamali Associate Professor University of Mohaghegh Ardabili, From 2013. From 2012 until now, he is a lecturer in the Department of Computer Engineering, Payame Noor University - PNU, Iran. From 2015, M.Sc. Fotohi is a member of reviewer the Wireless Personal Communications Journal, KSII transactions on Internet and Information Systems (ISI) and advances in Science, Technology and Engineering Systems Journal. His research interests include computer networks: mobile and wireless Ad-hoc networks, wireless communications, communication networks and internet protocols, transport layer protocols, routing and mac layer protocols, internet of things (IoT) and internet of vehicles (IoV); metaheuristic optimization: fuzzy logic systems, artificial immune system (AIS), genetic algorithm (GA); simulation: NS-2. Currently, he is a student member of the Institute of Electrical and Electronics Engineers (IEEE). He is the author and coauthor of more than 10 journal and international conferences papers. His papers have more than 90 citations with 6 h-index.
Show more

16 Read more

Post Graduate Diploma In Computer Science (One Year Semester Scheme)

Post Graduate Diploma In Computer Science (One Year Semester Scheme)

Computer  Networks  and  Communication  :  Network  types,  Network  topologies,  Network  communication devices, Physical communication media, TCP/IP.  Internet and its Applications : E[r]

12 Read more

AutoVFlow: Autonomous Virtualization for Wide-area OpenFlow Networks

AutoVFlow: Autonomous Virtualization for Wide-area OpenFlow Networks

delay in end-to-end data packet transmission in wide-area networks.. Conclusion and Future Work[r]

21 Read more

THIRD-GENERATION (3G) wide-area wireless networks

THIRD-GENERATION (3G) wide-area wireless networks

We generated 10 random networks, each with 100 nodes (res- ident subscribers). These nodes are randomly placed in a 800 800 rectangular region. Each node has an 802.11b interface and has a maximum transmission radius of 115 units. Each item has a radius of interest , i.e., only nodes within that radius of interest benefit from caching the item. We vary this radius from 200 to 700. In our simulation, the effect of the transit sub- scribers is captured by the query rate. We assume a query can originate from anywhere in the network within the item’s radius of interest. We assume that we have 1000 items whose popu- larity follows a Zipf distribution. We vary the parameter of the Zipf distribution. The items’ size is 1 unit for the uniform market sharing game and for the nonuniform market sharing game it follows a lognormal distribution with mean 7.5 and stan- dard deviation 1.5. Each resident subscriber can cache at most 5 items in the uniform case, 20 units for the nonuniform case. We focus our study on issues related to the impact of selfish be- havior on network performance, and therefore, do not perform packet level simulations. All our results are averaged over ten random networks.
Show more

14 Read more

A Wide Area Tracking System for Vision Sensor Networks

A Wide Area Tracking System for Vision Sensor Networks

flow statistics from the input of simple, common traffic cameras commonly used for Web sites (3). In 2001 Trivedi, Mikic, and Kogut presented an architecture allowing for an arbitrary number of cameras to be connected via standard Internet to a network of standard computers (4). This system uses only open standards for image and network transfer, and is platform independent in both sensor and computer hardware. This is a flexible, expandable research platform capable of supporting a wide range or research. This system forms the basis for the architecture used in this paper.
Show more

12 Read more

A Straightforward Method for Wide-Area Fault Location on Transmission Networks

A Straightforward Method for Wide-Area Fault Location on Transmission Networks

Abstract—Local practices in fault location require mea- surements from one or more terminals of the faulted line to be available. On the other hand, the nonlinearity of circuit equations associated with wide-area fault location makes their solving process iterative and computationally demanding. This paper proposes a non-iterative method for wide-area fault location by taking advantage of the substitution theorem. Accordingly, a system of equations is constructed which can be easily solved using the linear least-squares method. The distributed-parameter line model is considered to provide a highly accurate estimation. Besides, due to inherent errors of current transformers, the current data is not taken into account to preserve the accuracy. In order to avoid uncertainties in relation with construction of zero-sequence network, just positive- and negative-sequence networks are exploited. Nonetheless, the method still is capable of pinpointing all types of short-circuit faults by using a restricted number of synchronized pre- and post-fault voltage phasors. Numerous simulation studies conducted on the WSCC 9-bus and New England 39-bus test systems verify the effectiveness and applicability of the proposed fault location method, even with limited coverage of synchronized measurements.
Show more

10 Read more

Do LoRa low power wide area networks scale?

Do LoRa low power wide area networks scale?

For the purpose of this study we developed the simulation tool LoRaSim. The LoRaSim 2 is a custom-build discrete- event simulator implement with SimPy [14]. LoRaSim al- lows us to place N LoRa nodes in a 2-dimensional space (grid layout or random distribution). M LoRa sinks (the data collection points) can also be placed within the space. Each LoRa node has a specific communication character- istic defined by the transmission parameters TP, CF, SF, BW and CR. For an experiment, each node’s transmis- sion behaviour is described by the average packet transmis- sion rate λ and packet payload B. We assume a pream- ble length of 8 symbols, so packet airtime for a packet is given by B, SF, BW and CR. The behaviour of a node n during a simulation run is therefore described by the set SN n = {T P, CF, SF, BW, CR, λ, B}.
Show more

9 Read more

Insensitive Load Balancing

Insensitive Load Balancing

We first consider N parallel servers fed by a single stream of customers, as illustrated in Figure 3. Such a system may represent a supercomputer center, for instance, or any other distributed server system. For communication networks, it might correspond to a logical link split over several physical links. In this case, we consider data traffic only as, for telephone traffic, any policy which blocks a call only when all circuits are occupied is obviously optimal.

11 Read more

Survey on Implementation of Wireless Control Network Using Zigbee

Survey on Implementation of Wireless Control Network Using Zigbee

WSN system design is done on ZigBee protocol IEEE802.15.4. ARM 7 microcontroller and three different sensors are used for the same. The peer to peer communication between the node and the computer is implemented. The data display on the LCD module & same data also send on the remote station using the Zigbee module. This system can be used in error free long distance communication, process industries, mining, chemical, bio-medical application.

5 Read more

VIRTUAL ORGANIZATIONS: INFORMATION TECHNOLOGY Reza Nazari 1, Masoud Gholami2 , Jafar Vaghari Ghorbai 3, Rahim Salehi4 ,Ali Sharifi 5

VIRTUAL ORGANIZATIONS: INFORMATION TECHNOLOGY Reza Nazari 1, Masoud Gholami2 , Jafar Vaghari Ghorbai 3, Rahim Salehi4 ,Ali Sharifi 5

his organization announced from new integration between departments and distributed units that with the help of communication network linked together and have created a new organization, Virtual organizations, are examples of a future organization which complexity, scope and volume of operations in such a way that they can’t manage it no longer as a single and a centralized organization, to continue their work with need to other agencies(Gilani nia,2012)

7 Read more

The Affiliation Between Markov Models and Wide Area Networks with BOSS

The Affiliation Between Markov Models and Wide Area Networks with BOSS

In this paper ,we make four main contribu tions. We confirm that architecture and the producer-consumer problem can connect to sur- mount this obstacle. Continuing with this rationale,we probe how wide-area networks can be applied to he improvement of semaphores. Next,we understand how spreadsheets can be applied to the evaluation of super pages.Such a claim at first glance seems perverse but fellin line with our expectations. In the end,we use homogeneous

5 Read more

Low Power Wide Area Networks for Sustainable IoT

Low Power Wide Area Networks for Sustainable IoT

Due to the increasing market for LPWA networks, intense competition among network operators and new LPWA network offerings has created more cost-effective technologies. Table I compares different characteristics of the aforementioned LPWA technologies. Note that they can achieve different data rates and coverage ranges, which makes them ideal for different application scenarios. As supported by dif- ferent standard organizations and alliances, each LPWA technology shows different practical deployment potential. For example, LTE-M and NB-IoT maybe favoured by cellular network operators due to their high compatibility with existing cellular networks. While LoRa and BLE are supported by IoT operators with specific applications due to their good network scalability. So far, much of Europe and many parts of the Asia Pacific region are covered by LoRa networks with LPWA services. While in the U.S.A., LoRa will have the largest private unlicensed industrial LPWA network growth and LTE-M will do the same for the licensed public networks.
Show more

13 Read more

New Security Techniques for Encrypting IP Address and Data Transfer over Wide Area Network through Three Levels

New Security Techniques for Encrypting IP Address and Data Transfer over Wide Area Network through Three Levels

Internet is the primary computer miracles among computer users because of viruses separation in all communication devices, and some of these viruses will lead to creating some problems in computer hardware and software. Thus, hackers will have lots of opportunities to hack user's tools. This research is provided a new approach to securing clients IP address at the time they connected to the internet. This operation will be done by using new encryption techniques in three stages. Similarly, the same procedures of encryption will be established for data that will be transferred over the network between clients. Thus, intruders’ and hackers may get obstacles to get the real data and IP address that are the central point for hacking.
Show more

8 Read more

Show all 10000 documents...