scholarly journals THE EFFECT OF MULTI LAYER SWITCHING FOR DATA TRANSFER SPEEDS ON COMPUTER NETWORK

Compiler ◽  
2018 ◽  
Vol 7 (2) ◽  
pp. 85
Author(s):  
Sudaryanto Sudaryanto

      The need for efficient, stable, fast and reliable network access is influenced by network quality, one of the factors influencing network quality is the management of network devices, while the network devices that are enforced are the Lancard, cable, Switch, Router, Wifi Access Point and Compuitary System . In this study researchers will focus on the influence of Multilayer Switch network devices for data transfer speeds on computer networks. Data transfer speed at layer 2 text data, image data,  video data faster 0,85 % than for speed tranfers on layer 3 text data, image data, video data.Keyword: Network, Switch Multilayer, Data Tranfer, Osi Layer

Author(s):  
Vishal Mahulkar ◽  
Douglas Adams ◽  
Alok Chaturvedi ◽  
Longbi Lin ◽  
Ness Shroff

The objective of the research is to develop an agent based methodology for modeling a naval ship environment as a system-of-systems. A ship environment consists of complex interconnected systems such as the infrastructure, crew, and the work flow, which poses a challenge to capability and systems planning. By studying the real-time interactions between these systems, one can help make decisions about new technology to be inserted on a ship. A simulation model based on an agent-based modeling methodology is constructed in MATLAB along with a graphical user interface to simulate workflow scenarios for maintenance, troubleshooting, and watch duties described in predefined XML files in a zone of the ship. The environment consists of crew agents modeled with limited intelligence and behavioural traits, machinery with sensors, equipment consuming power, mobile and stationary network nodes and models for data transfer over the network, crew mobility, power distribution and trimming. Results demonstrate the robustness of powering network nodes over Ethernet. One key result of the simulation model demonstrates the relative effectiveness of network access point locations; a counter intuitive decrease in workflow efficiency occurs due to a new technology inserted to enable wireless access.


2018 ◽  
Vol 7 (2.15) ◽  
pp. 58
Author(s):  
Mohamad Nur Haziq Mohd Safri ◽  
Wan Nor Shuhadah Wan Nik ◽  
Zarina Mohamad ◽  
Mumtazimah Mohamad

In the past five decades, computer network has kept up growing with the increases of its complexity. In such situation, the management, monitoring and maintenance of such computer network requires special attention to ensure optimal network access capability is achieved. Wireless network traffic analysis is a process of recording, studying and analyzing packets in wireless network for network performance analysis purposes. In some cases, the quality of network access performance can be very low without knowing the actual problem. Therefore, in this paper, the performance of wireless network traffic is proposed to be analyzed by using a Raspberry Pi which further able to send an alert to network admin to lessen the downtime. Raspberry Pi is a low cost, a small and portable size of a computer board that can be used to plug-in to monitor, keyboard, mouse, pen drive, etc. In this project, a MyTraceroute (MTR) program is installed on the Raspberry Pi to capture the IP of the Access Point (AP) and show packets loss percentage in the network. The results will be saved in the form of text file and sent to network admin by using email. The solution proposed in this paper is able to support solution to a problem on efficient monitoring, managing and maintaining wireless network traffics.    


Author(s):  
M.F. Schmid ◽  
R. Dargahi ◽  
M. W. Tam

Electron crystallography is an emerging field for structure determination as evidenced by a number of membrane proteins that have been solved to near-atomic resolution. Advances in specimen preparation and in data acquisition with a 400kV microscope by computer controlled spot scanning mean that our ability to record electron image data will outstrip our capacity to analyze it. The computed fourier transform of these images must be processed in order to provide a direct measurement of amplitudes and phases needed for 3-D reconstruction.In anticipation of this processing bottleneck, we have written a program that incorporates a menu-and mouse-driven procedure for auto-indexing and refining the reciprocal lattice parameters in the computed transform from an image of a crystal. It is linked to subsequent steps of image processing by a system of data bases and spawned child processes; data transfer between different program modules no longer requires manual data entry. The progress of the reciprocal lattice refinement is monitored visually and quantitatively. If desired, the processing is carried through the lattice distortion correction (unbending) steps automatically.


2020 ◽  
Vol 14 ◽  
Author(s):  
Khoirom Motilal Singh ◽  
Laiphrakpam Dolendro Singh ◽  
Themrichon Tuithung

Background: Data which are in the form of text, audio, image and video are used everywhere in our modern scientific world. These data are stored in physical storage, cloud storage and other storage devices. Some of it are very sensitive and requires efficient security while storing as well as in transmitting from the sender to the receiver. Objective: With the increase in data transfer operation, enough space is also required to store these data. Many researchers have been working to develop different encryption schemes, yet there exist many limitations in their works. There is always a need for encryption schemes with smaller cipher data, faster execution time and low computation cost. Methods: A text encryption based on Huffman coding and ElGamal cryptosystem is proposed. Initially, the text data is converted to its corresponding binary bits using Huffman coding. Next, the binary bits are grouped and again converted into large integer values which will be used as the input for the ElGamal cryptosystem. Results: Encryption and Decryption are successfully performed where the data size is reduced using Huffman coding and advance security with the smaller key size is provided by the ElGamal cryptosystem. Conclusion: Simulation results and performance analysis specifies that our encryption algorithm is better than the existing algorithms under consideration.


2020 ◽  
pp. 1-10
Author(s):  
Bryce J. Dietrich

Abstract Although previous scholars have used image data to answer important political science questions, less attention has been paid to video-based measures. In this study, I use motion detection to understand the extent to which members of Congress (MCs) literally cross the aisle, but motion detection can be used to study a wide range of political phenomena, like protests, political speeches, campaign events, or oral arguments. I find not only are Democrats and Republicans less willing to literally cross the aisle, but this behavior is also predictive of future party voting, even when previous party voting is included as a control. However, this is one of the many ways motion detection can be used by social scientists. In this way, the present study is not the end, but the beginning of an important new line of research in which video data is more actively used in social science research.


Author(s):  
Lujie Tang ◽  
Bing Tang ◽  
Li Zhang ◽  
Feiyan Guo ◽  
Haiwu He

AbstractTaking the mobile edge computing paradigm as an effective supplement to the vehicular networks can enable vehicles to obtain network resources and computing capability nearby, and meet the current large-scale increase in vehicular service requirements. However, the congestion of wireless networks and insufficient computing resources of edge servers caused by the strong mobility of vehicles and the offloading of a large number of tasks make it difficult to provide users with good quality of service. In existing work, the influence of network access point selection on task execution latency was often not considered. In this paper, a pre-allocation algorithm for vehicle tasks is proposed to solve the problem of service interruption caused by vehicle movement and the limited edge coverage. Then, a system model is utilized to comprehensively consider the vehicle movement characteristics, access point resource utilization, and edge server workloads, so as to characterize the overall latency of vehicle task offloading execution. Furthermore, an adaptive task offloading strategy for automatic and efficient network selection, task offloading decisions in vehicular edge computing is implemented. Experimental results show that the proposed method significantly improves the overall task execution performance and reduces the time overhead of task offloading.


Author(s):  
В.Л. Мартынов ◽  
В.И. Дорошенко ◽  
Н.М. Божук ◽  
Ю.Г. Ксенофонтов

Решению вопросов, связанных с телекоммуникационным оборудованием, функционирующем в водной среде, в настоящее время уделяется особое внимание. На смену традиционным подводным системам обмена информацией в гидроакустических полях приходят открытые системы её оптической передачи и приёма, базирующиеся на лазерных технологиях. Это вызвано необходимостью трансляции с высокой разрешающей способностью видеоданных, среди которых, например, может быть либо визуальное отображение подводных систем в динамике, либо результаты мониторинга объектов подводной инфраструктуры в реальном масштабе времени, либо что-то другое с учётом требований Заказчика. Канал передачи такого большого объёма информации при условии ее считывания с задаваемым качеством должен иметь пропускную способность более 1 Мбит/с. Такую высокую скорость передачи невозможно реализовать в подводных гидроакустических системах, граница технических возможностей которых на превышает 10...50 кбит/с. В аналогичной ситуации при заданных параметрах канала связи частоты несущих оптического диапазона имеют порядок 1014 Гц, что обеспечивает динамический диапазон полосы пропускания в районе 1012…1013 Гц. С учётом условия квазимонохроматичности применение гидроакустических средств для передачи видеоданных становится проблематичным, так как техническая реализация такой задачи потребует слишком большого времени. С учётом сказанного, преимуществом подводных беспроводных оптических систем связи является их высокая широкополосность, которая обеспечит высокую скорость передачи данных. В статье обосновывается целесообразность использования открытых оптических системы связи для создания высокоскоростных подводных инфотелекоммуникаций, среди которых наиболее предпочтительными являются лазерные системы. Special attention is currently paid to the solution of issues related to telecommunication equipment operating in the aquatic environment. The traditional underwater systems for the exchange of information in hydroacoustic fields are being replaced by open systems for its optical transmission and reception, based on laser technologies.This is due to the need to broadcast high-resolution video data, among which, for example, there can be either a visual display of underwater systems in dynamics, or the results of monitoring objects of underwater infrastructure in real time, or something else, taking into account the requirements of the Customer. The transmission channel of such a large amount of information, provided it is read with a specified quality, must have a bandwidth of more than 1 Mbit / s. Such a high transmission rate cannot be realized in underwater sonar systems, the technical capabilities limit of which does not exceed 10 ... 50 kbit/s. In a similar situation, given the parameters of the communication channel, the carrier frequencies of the optical range are 1014 Hz, which provides a dynamic bandwidth range about 1012…1013Hz. Taking into account the condition of quasimonochromaticity, the use of hydroacoustic means for transmitting video data becomes problematic, since the technical implementation of such a task will take too long. In view of the above, the advantage of underwater wireless optical communication systems is their high broadband, which will provide a high data transfer rate. The article substantiates the expediency of using open optical communication systems for creating high-speed underwater information telecommunications, among which the most preferable are laser systems.


Author(s):  
Daniel Danso Essel ◽  
Ben-Bright Benuwa ◽  
Benjamin Ghansah

Sparse Representation (SR) and Dictionary Learning (DL) based Classifier have shown promising results in classification tasks, with impressive recognition rate on image data. In Video Semantic Analysis (VSA) however, the local structure of video data contains significant discriminative information required for classification. To the best of our knowledge, this has not been fully explored by recent DL-based approaches. Further, similar coding findings are not being realized from video features with the same video category. Based on the foregoing, a novel learning algorithm, Sparsity based Locality-Sensitive Discriminative Dictionary Learning (SLSDDL) for VSA is proposed in this paper. In the proposed algorithm, a discriminant loss function for the category based on sparse coding of the sparse coefficients is introduced into structure of Locality-Sensitive Dictionary Learning (LSDL) algorithm. Finally, the sparse coefficients for the testing video feature sample are solved by the optimized method of SLSDDL and the classification result for video semantic is obtained by minimizing the error between the original and reconstructed samples. The experimental results show that, the proposed SLSDDL significantly improves the performance of video semantic detection compared with state-of-the-art approaches. The proposed approach also shows robustness to diverse video environments, proving the universality of the novel approach.


Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.


Sign in / Sign up

Export Citation Format

Share Document