THE MODEL OF DATA TRANSMISSION IN A DISTRIBUTED NETWORK

Author(s):  
G. V. Abramov ◽  
R. V. Danilov ◽  
L. de J. C. Paulo
Author(s):  
Dongmei Lin

For distributed network content audit system, its communication needs have two important aspects. One is how to let the audit rules sent fast to the entire network, the other is the Internet records data transmission of audit nodes among each other. The above two issues are related to the broadcasting of network news and the large-scale data transmission. This article mainly carries on the thorough research on large-scale data transmission and proposes the approach of large-scale data transmission, and puts forward its application method in the distributed network content audit system. For the large-scale data transmission, the main idea to realize it is by dividing the large-scale data into blocks and combining with various transmission routes to transmit. In this paper, the main methods of the current large-scale data transmission are analyzed and the shortcomings are summarized. Based on the algorithm of task allocation in the reference of grid computing, the large-scale data transmission algorithm is put forward based on node performance. This transmission algorithm uses APDG broadcasting algorithm to find relay nodes, and by judging the performance of the relay nodes, segments different size data blocks to the relay nodes for forwarding. The experimental results show that the large-scale data transmission algorithm based on node performance, compared with the current large-scale data transmission algorithm, has better flexibility and transmission performance.


2021 ◽  
Vol 341 ◽  
pp. 00029
Author(s):  
Sergey Rodimtsev ◽  
Alexander Psaryov ◽  
Andrey Chuykin

Many modern transport processes require constant on-line monitoring and management. However, the main difficulty lies in the lack of a stable GSM connection. One of the possible solutions to this issue is the use of MESH networks. These represent the possibility of wireless communication between multiple entities, which are nodes on a distributed network. The article presents the results of the development of original local radio modules and a base station to ensure uninterrupted transmission of digital data from the monitoring object, in conditions of insufficient GSM coverage. The complex provides the following operating modes: simple interaction via a GSM channel, data transmission via a self-organizing network, as well as sensory interaction between objects. In the absence of GSM communication, the repeater provides on-line data transmission from the monitoring object, at a distance of up to 860 m, at a distance from the base station - at least 500 m. The use of the new complex makes it possible to promptly respond to changes in operating factors and prevent emergency situations during the operation of vehicles.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 579
Author(s):  
Na-Eun Park ◽  
So-Hyun Park ◽  
Ye-Sol Oh ◽  
Jung-Hyun Moon ◽  
Il-Gu Lee

Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.


2017 ◽  
Vol 25 (101) ◽  
pp. 324-331
Author(s):  
Andrey, Bryanskiy ◽  
Keyword(s):  

2014 ◽  
pp. 209-214
Author(s):  
P. Ilin ◽  
◽  
J. Sieck ◽  
V. Brovkov ◽  
M. Pashkovskyi

2011 ◽  
Vol E94-B (11) ◽  
pp. 3172-3174 ◽  
Author(s):  
Takashi MARUYAMA ◽  
Tatsuya SHIMIZU ◽  
Mamoru AKIMOTO ◽  
Kazuki MARUTA

Sign in / Sign up

Export Citation Format

Share Document