Genetic algorithm based approach for designing computer network topology

Author(s):  
Anup Kumar ◽  
Rakesh M. Pathak ◽  
M. C. Gupta
2014 ◽  
Vol 662 ◽  
pp. 263-266
Author(s):  
Chun Ping Wang

In this paper, the charging mechanism and content distribution mechanisms of cloud storage for analysis, given reasonable network topology and cost models. Suggestions for improvement heuristic cloud storage static content distribution genetic algorithm is put forward. Full account of the current network bandwidth, edge cloud storage node performance and historical visit value, since the convergence of the proposed probabilistic matching content distribution cloud storage load balancing technology, effectively balancing the load, while reducing the edge server response time.


Author(s):  
YI-KUEI LIN ◽  
CHENG-FU HUANG

Quality of the received data at the sink can be based on packet delay, packet errors, packet loss, etc. From the viewpoint of quality of service (QoS), the packet unreliability (PU) and transmission time are both of critical attributes to assess internet quality for supervisor and customers. A computer system is usually modeled as a network topology with arcs and vertices where each arc denotes a transmission medium and each vertex represents an Internet data center. Due to failure, partial failure, maintenance, etc., each component (arc or vertex) should be considered as stochastic. The network with imperfect vertices is more complex to evaluate the reliability issue because vertex failure results in the disablement of adjacent arcs. Such a network named a stochastic imperfect vertex computer network (SIVCN) is addressed in this paper. We study how the data can be delivered through multiple minimal paths simultaneously within both permitted PU and time constraint. A solution procedure comprising two efficient algorithms is proposed to assess transmission reliability accordingly.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Maoqing Zhang ◽  
Lei Wang ◽  
Zhihua Cui ◽  
Jiangshan Liu ◽  
Dong Du ◽  
...  

Fast nondominated sorting genetic algorithm II (NSGA-II) is a classical method for multiobjective optimization problems and has exhibited outstanding performance in many practical engineering problems. However, the tournament selection strategy used for the reproduction in NSGA-II may generate a large amount of repetitive individuals, resulting in the decrease of population diversity. To alleviate this issue, Lévy distribution, which is famous for excellent search ability in the cuckoo search algorithm, is incorporated into NSGA-II. To verify the proposed algorithm, this paper employs three different test sets, including ZDT, DTLZ, and MaF test suits. Experimental results demonstrate that the proposed algorithm is more promising compared with the state-of-the-art algorithms. Parameter sensitivity analysis further confirms the robustness of the proposed algorithm. In addition, a two-objective network topology optimization model is then used to further verify the proposed algorithm. The practical comparison results demonstrate that the proposed algorithm is more effective in dealing with practical engineering optimization problems.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


Author(s):  
Yuri Ariyanto ◽  
Budi Harijanto ◽  
Yan Watequlis S.

A virtual laboratory with a network emulator environment using NetKit is one of series of basic network laboratories on basic computer network competencies where students are given practical trial opportunities at low costs and little effort in their implementation. Teaching computer network subjects to be easily understood by students needs an instructional media as a tool in delivering material. This media uses computer virtualization technology, i.e. creating a virtual laboratory, as a means of students in conducting experiments from the material that has been obtained. In virtual laboratories it is possible to implement network topology designs based on actual network topologies. This implementation is used as a testing tool before the network topology is implemented on the actual network. Therefore, errors can be identified first without disturbing the system that is already running. For testing, the students are given training using a basic network design consisting of the implementation of routing tests, firewalls, ftp server implementation and web server. This paper is aimed at describing ways to develop a virtual laboratory with a network emulator environment using NetKit. Moreover, several exercises on network topology implementation that are applied directly to the real world with NetKit are introduced, such as describing laboratory settings, describing the main parts of the lab, illustrating lab instructions, and reporting lab feeds.


2005 ◽  
Vol 13 (15) ◽  
pp. 1405-1415 ◽  
Author(s):  
Vasile Lavric ◽  
Petrica Iancu ◽  
Valentin Pleşu

Sign in / Sign up

Export Citation Format

Share Document