Network Models and Design Modelling the Design of Computer Networks for Effective Management

Author(s):  
Adi ti
2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Yi-Kuei Lin ◽  
Louis Cheng-Lu Yeng

Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN). This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs). Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu) to one sink (New York) that goes through a submarine and land surface cable between Taiwan and the United States.


Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1506 ◽  
Author(s):  
Aleksey Novokhrestov ◽  
Anton Konev ◽  
Alexander Shelupanov

This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.


2019 ◽  
Vol 42 ◽  
Author(s):  
Hanna M. van Loo ◽  
Jan-Willem Romeijn

AbstractNetwork models block reductionism about psychiatric disorders only if models are interpreted in a realist manner – that is, taken to represent “what psychiatric disorders really are.” A flexible and more instrumentalist view of models is needed to improve our understanding of the heterogeneity and multifactorial character of psychiatric disorders.


2019 ◽  
Vol 42 ◽  
Author(s):  
Don Ross

AbstractUse of network models to identify causal structure typically blocks reduction across the sciences. Entanglement of mental processes with environmental and intentional relationships, as Borsboom et al. argue, makes reduction of psychology to neuroscience particularly implausible. However, in psychiatry, a mental disorder can involve no brain disorder at all, even when the former crucially depends on aspects of brain structure. Gambling addiction constitutes an example.


Author(s):  
S. R. Herd ◽  
P. Chaudhari

Electron diffraction and direct transmission have been used extensively to study the local atomic arrangement in amorphous solids and in particular Ge. Nearest neighbor distances had been calculated from E.D. profiles and the results have been interpreted in terms of the microcrystalline or the random network models. Direct transmission electron microscopy appears the most direct and accurate method to resolve this issue since the spacial resolution of the better instruments are of the order of 3Å. In particular the tilted beam interference method is used regularly to show fringes corresponding to 1.5 to 3Å lattice planes in crystals as resolution tests.


1995 ◽  
Author(s):  
Robert T. Trotter ◽  
Anne M. Bowen ◽  
James M. Potter

Sign in / Sign up

Export Citation Format

Share Document