Performance evaluation of an Ethernet LAN with broadcast and point-to-point data traffic

1987 ◽  
Vol 10 (6) ◽  
pp. 283-290
Author(s):  
Liu Mai ◽  
JC Majithia
Geomatics ◽  
2021 ◽  
Vol 1 (4) ◽  
pp. 464-495
Author(s):  
Desi Suyamto ◽  
Lilik Prasetyo ◽  
Yudi Setiawan ◽  
Arief Wijaya ◽  
Kustiyo Kustiyo ◽  
...  

This article demonstrated an easily applicable method for measuring the similarity between a pair of point patterns, which applies to spatial or temporal data sets. Such a measurement was performed using similarity-based pattern analysis as an alternative to conventional approaches, which typically utilize straightforward point-to-point matching. Using our approach, in each point data set, two geometric features (i.e., the distance and angle from the centroid) were calculated and represented as probability density functions (PDFs). The PDF similarity of each geometric feature was measured using nine metrics, with values ranging from zero (very contrasting) to one (exactly the same). The overall similarity was defined as the average of the distance and angle similarities. In terms of sensibility, the method was shown to be capable of measuring, at a human visual sensing level, two pairs of hypothetical patterns, presenting reasonable results. Meanwhile, in terms of the method′s sensitivity to both spatial and temporal displacements from the hypothetical origin, the method is also capable of consistently measuring the similarity of spatial and temporal patterns. The application of the method to assess both spatial and temporal pattern similarities between two deforestation data sets with different resolutions was also discussed.


2012 ◽  
Vol 488-489 ◽  
pp. 1574-1581
Author(s):  
Wen Yong Weng ◽  
Jian Su ◽  
Xiao Jie Yang ◽  
Zhe Bing Wang

A confidentiality system generally needs to operate under a non-network environment. Hence, the adoption of an offline model is necessary to realize data sharing. An offline data-sharing model based on encrypted Extensible Markup Language (XML) files is designed. The combination of various techniques, such as XML mode, XML encryption, and XML signature, and the introduction of the Security Solution Support Center enable the proposed model to achieve a safe point-to-point data interactive mode and a security-based software module. The software system based on this model can ensure that data files generated from the data provider could only be identified and verified by the authorized data receiver.


2014 ◽  
Vol 556-562 ◽  
pp. 2886-2889
Author(s):  
Nuo Wang ◽  
Yan Li ◽  
Li Min Yuan

Different from the traditional single databases, there is a big difference between different layers’ data of multi-level database. The differentiation of categorical attributes is small. Traditional database intrusion detection process is simply to consider the point to point data detection between the layers, without considering the similarity between the layers and ignoring the optimization for detected properties of the applied classification between the levels, resulting in lower detection accuracy. In order to avoid the above-mentioned defects of the conventional algorithm, this paper propos an intrusion detection model of multi-layered network by introducing the coarse-to-fine concept. The intrusion feature of computer database is extracted to be used as the basis for intrusion detection of database. The particle swarm distinguish tree is established to make the hierarchical processing for nodes. Through the probability operation of database intrusion detection in different layers, intrusion detection of multi-layer, distributed and large differences database can be achieved. Experimental results show that the use of the intrusion detection algorithm for multi-layer, distributed and large differences database, can increase the security of the database, ensure the safe operation of the database.


Author(s):  
Fikri Iqromuddin ◽  
Novi Dian Nathasia ◽  
Iskandar Fitri

Virtual Private LAN Service is already very popular among the enterprise industry which is a point to point network or multipoint to multipoint l2VPN service, VPLS provides transparent bridge between customers connected to geographically dispersed locations delivered via MPLS backbone by utilizing features such as MPLS Fast reroute and traffic engineering. Redundant paths can be applied to the VPLS service on the access side and backbone to maintain link performance that aims to minimize down time during network fails on the VPLS service. In this research, the implementation of redundant path using RSTP to prevent forwarding loop switching network in VPLS service to protect end-to-end data traffic with VPLS mesh-pseudowire and spoke-pesudowire with RSTP is the most optimal result compared to STP and build reliable network System with high performance for use in modern industry.


Sign in / Sign up

Export Citation Format

Share Document