Spreading in scale-free computer networks with improved clustering

2018 ◽  
Vol 32 (28) ◽  
pp. 1850309 ◽  
Author(s):  
İlker Türker ◽  
Zafer Albayrak

In this study, we investigated data spreading in computer networks with scale-free topology under various levels of improved clustering. Starting from a pure Barabási–Albert (BA) network topology, we applied a Poisson-based rewiring procedure with increasing rewiring probability, which promotes local connections. We then performed wired computer network simulations in NS2 simulator for these topologies. We found that for pure BA network, data transfer (throughput) is maximum, where time required for establishing routing scheme, end-to-end delays in data transmission and number of nodes acting in data transfer are at their minimum levels. Improving clustering increases these parameters those are at their minima. A noteworthy finding of this study is that, for moderate levels of clustering, total throughput remains close to its maximum yielding stable transfer rates, although number of infected nodes and end-to-end delay increase. This indicates that clustering promotes spreading phenomena in networks, although it increases average separation. As a result, clustering property emerges as a catalyzer in data spreading with minimal effects on the total amount of transmission.

Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.


2014 ◽  
Vol 556-562 ◽  
pp. 5822-5824
Author(s):  
Xiong Zhou

Guided by the thought of system integrity, complex behavior of computer network is thoroughly study based on complexity theory. Based on chaos theory complex behavior property of computer networks traffic with different time-scale is deeply researched, the result indicates the universe of the chaos and scale-free behavior in real computer networks. The network behavior evolvement model that correctly describes function mechanism of general real networks is presented, and formal description of the evolvement rules is implemented, the fluctuations formula of input traffic is also deducted. Based on the mean field model of network traffic, the dynamical properties of network traffic system is analyzed, and the condition of chaotic dynamical behavior is achieved under mean field hypothesis.


2020 ◽  
Vol 11 (1) ◽  
pp. 249-256
Author(s):  
Nuur Wachid Abdul Majid ◽  
Syifaul Fuada

The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2001 ◽  
Vol 674 ◽  
Author(s):  
Ralf Detemple ◽  
Inés Friedrich ◽  
Walter Njoroge ◽  
Ingo Thomas ◽  
Volker Weidenhof ◽  
...  

ABSTRACTVital requirements for the future success of phase change media are high data transfer rates, i.e. fast processes to read, write and erase bits of information. The understanding and optimization of fast transformations is a considerable challenge since the processes only occur on a submicrometer length scale in actual bits. Hence both high temporal and spatial resolution is needed to unravel the essential details of the phase transformation. We employ a combination of fast optical measurements with microscopic analyses using atomic force microscopy (AFM) and transmission electron microscopy (TEM). The AFM measurements exploit the fact that the phase transformation from amorphous to crystalline is accompanied by a 6% volume reduction. This enables a measurement of the vertical and lateral speed of the phase transformation. Several examples will be presented showing the information gained by this combination of techniques.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


COVID ◽  
2021 ◽  
Vol 1 (4) ◽  
pp. 717-727
Author(s):  
Parastoo Kheiroddin ◽  
Magdalena Gründl ◽  
Michael Althammer ◽  
Patricia Schöberl ◽  
Linda Plail ◽  
...  

(1) Background: With vaccination and new variants of SARS-CoV-2 on the horizon, efficient testing in schools may enable prevention of mass infection outbreaks, keeping schools safe places and buying time until decisions on feasibility and the necessity of vaccination in children and youth are made. We established, in the course of the WICOVIR (Where Is the COrona VIRus) study, that gargle-based pool-PCR testing offers a feasible, efficient, and safe testing system for schools in Germany when applied by central university laboratories. (2) Objectives: We evaluated whether this approach can be implemented in different rural and urban settings. (3) Methods: We assessed the arrangements required for successful implementation of the WICOVIR approach in a variety of settings in terms of transport logistics, data transfer and pre-existing laboratory set-up, as well as the time required to establish the set-up. (4) Results: We found that once regulatory issues have been overcome, all challenges pertaining to logistics, data transfer, and laboratory testing on different platforms can be solved within one month. Pooling and depooling of samples down to the individual test result were achievable within one working day in all settings. Local involvement of the community and decentralized set-ups were keys for success. (5) Conclusion: The WICOVIR gargle-based pool-PCR system is so robust and simple that it can be implemented within one month in all settings now or in future pandemics.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Vol 1 (132) ◽  
pp. 136-144
Author(s):  
Volodymyr Khandetskyi ◽  
Dmutro Sivtsov ◽  
Kostjantun Panin

Analysis of new technologies IEEE 802.11ac/ax of wireless networks showed that increasing their noise immunity is an actual task. The article studies the efficiency of fragmented data frames transmission. Comparison of the efficiencies in the case of retransmission of the corrupted original frame and in the case of its fragmentation in a wide range of the physical data transfer rates is carried out.


Sign in / Sign up

Export Citation Format

Share Document