Sunrays Microcomputer FDDI Optical Fiber Computer Network Security System Design

Author(s):  
Tao Xiang

Background: In order to solve the potential safety hazard of computer network security, a special congestion control strategy is adopted. Methods: This strategy used to discuss the design and implementation technology of network adapter, bridge, concentrator, device driver, Netware interface software, and a complete set of FDDI optical fiber computer network. All source address tracking, frame forwarding, frame format conversion, spanning tree protocol, and other functions are achieved. Results: The research shows that the Sunrays micro-computer follows the SNMP simple network management protocol, which can support multiple Ethernet protocols and multiple ports, and the number of ports is scalable. Conclusion: The proposed method is useful for the multiple input and output ports in computer network with security enabled congestion control for data traffic.

2020 ◽  
Vol 3 (2) ◽  
pp. 216-223
Author(s):  
Ainul Hizriadi ◽  
Radea Shiddiq ◽  
Ivan Jaya ◽  
Santi Prayudani

Network infrastructure monitoring is an important part of an institute to maintain the stability of computer network devices. One of the functions of computer network monitoring is to find out the data traffic generated in network application. Simple Network Management Protocol is one of protocols for monitoring the data traffic in network device. However, network device administrators still have problems when they want to monitor their network infrastructure, such as device location and data traffic information of network device that is only temporarily stored in the monitoring system, and physical location of network device is not contained in the monitoring system. In order to make it easier for them how to monitor network devices, the Researcher intends to combine Geographic Information Systems (GIS) and SNMP into a web-based monitoring application. Geographic Information System application can display the physical location of network devices, whilethe SNMP application using for monitoring the data traffic in network device,finding out the data traffic that can be generated in real time, and displaying data traffic of network device that has been monitored in to graphical form based on the time and network device used.


2000 ◽  
Author(s):  
James D. Johannes ◽  
Andrew Fanning ◽  
Kyle Hoover ◽  
Tim Lewis ◽  
Marsha Robinson

2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document