The Research of an Approach to Design Local Area Network Topology Based on Genetic Algorithm

Author(s):  
Fei Teng ◽  
Gang Zhou
1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


Author(s):  
Anton Andreev ◽  
Anton Shabaev

A lot of network management tasks require a description of the logical and physical computer network topology. Obtaining such a description in an automatic way is complicated due to the possibility of incompleteness and incorrectness of the initial data on the network structure. This article provides a study on the properties of incomplete initial data on network device connectivity on the link layer. Methods for generalized handling of the heterogeneous input data on the link layer are included. We describe models and methods for deriving a missing part of the data, as well as the condition in which it is possible to get a single correct network topology description. The article includes algorithms for building a link layer topology description from incomplete data when this data is possible to fulfill up to the required level. Also, we provide methods for detecting and resolving an ambiguity in the data and methods for improving incorrect initial data. Tests and evaluations provided in the article demonstrate the applicability and effectiveness of the build methods for discovering various heterogeneous real-life networks. Additionally, we show advantages of the provided methods over the previous analogs: our methods are able to derive up to 99\% data on link layer connectivity in polynomial time; able to provide a correct solution from an ambiguous data.


1986 ◽  
Vol 24 (8) ◽  
pp. 26-32 ◽  
Author(s):  
S. Suh ◽  
S. Granlund ◽  
S. Hegde

Author(s):  
Hamizan Suhaimi ◽  
Saiful Izwan Suliman ◽  
Afdallyna Fathiyah Harun ◽  
Roslina Mohamad ◽  
Yuslinda Wati Mohamad Yusof ◽  
...  

<span>Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   </span>


Author(s):  
Andrey Aleshkin ◽  
Stanislav Balakirev ◽  
Valery Nevzorov ◽  
Pavel Savochkin

A lot of network  management tasks require a description of the logical and physical computer network topology. Obtaining such a description in an automatic way is complicated due to the possibility of incompleteness and incorrectness of the initial data on the network structure. This article provides  a study on the properties of incomplete initial data on network device connectivity on the link layer. Methods for generalized handling of the heterogeneous input data on the link layer are included. We describe models and methods for deriving  a missing part of the data, as well as the condition in which it is possible to get a single correct network topology description. The article includes algorithms for building a link layer topology description from incomplete data when this data is possible to fulfill up to the required level. Also, we provide methods for detecting and resolving an ambiguity in the data and methods for improving incorrect initial data. The tests and evaluations provided in the article demonstrate the applicability and effectiveness of the build methods for discovering  various heterogeneous real-life networks. Additionally,  we show the advantages of the provided methods over the previous analogs: our methods are able to derive up to 99% data on link layer connectivity in polynomial time; able to provide a correct solution from an ambiguous data.


Author(s):  
Hendy Dwi Haryoyudhanto ◽  
Iskandar Fitri ◽  
Andri Aningsih

Local Area Network is currently often used to minimize a public work, different network segmentation in a building requires attention in designing a network that has dense traffic and often occurs down and vails over on a network flow, certainly requires performance optimal and efficient network, by way of network encapsulation with one channel and dividing each network segmentation by VLAN. The purpose of this paper is to apply a design by optimizing a network using the network redundancy method to create a more optimal network. This redundancy method is a method that moves a network path when downtime occurs on one of the routers that are automatically changed to an active router and a standby router. In the implementation of the design using GNS3 software to create network topology and design. With the results of tests that have been carried out using the simulator, packet loss from using the HSRP method is at VLAN10 0.11%, VLAN20 0.13%, VLAN30 0.30%, VLAN40 0.13%, VLAN50 0.22% AND VLAN60 0.16%. So the purpose of research makes a network more optimal and flexible


Sign in / Sign up

Export Citation Format

Share Document