scholarly journals MULTIMEDIA-BASED COMPUTER NETWORK MEDIA APPLICATIONS

2021 ◽  
Vol 4 (2) ◽  
pp. 240-247
Author(s):  
Syuryadi Syuryadi ◽  
Nurkhalik Wahdanial Asbara ◽  
Nurani Nurani

This application aims to understand computer networks easily by using multimedia applications to unite motion, images, text, and sound with the result that visible more visually and more alive. With this method, it is hoped that students will quicly understand computer network science. The results of the research show that it has been designed and tested on students where this application has an evaluation within and listening to the material as guide, it is hoped that this application can make students easy to learn computer networks.

2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Author(s):  
Cyril Onwubiko

Operators need situational awareness (SA) of their organisation’s computer networks and Information Systems in order to identify threats, estimate impact of attacks, evaluate risks, understand situations, and make sound decisions swiftly and accurately on what to protect against, and how to address incidents that may impact valued assets. Enterprise computer networks are often huge and complex, spanning across several WANs and supporting a number of distributed services. Understanding situations in such dynamic and complex networks is time-consuming and challenging. Operators SA are enhanced through a number of ways, one of which is through the use of situation-aware systems and technology. Designing situation-aware systems for computer network defence (CND) is difficult without understanding basic situational awareness design requirements of network applications and systems. Thus, this chapter investigates pertinent features that are foundation, essential, and beneficial for designing situation-aware systems, software, and network applications for CND.


2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Yi-Kuei Lin ◽  
Louis Cheng-Lu Yeng

Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN). This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs). Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu) to one sink (New York) that goes through a submarine and land surface cable between Taiwan and the United States.


1994 ◽  
Vol 10 (2) ◽  
pp. 258-272 ◽  
Author(s):  
Patricia Flatley Brennan ◽  
Stefan Ripich

AbstractComputer networks serve as convenient, efficient, and enduring vehicles for delivering nursing services to patients at home. The ComputerLink, a specialized computer network, provided nurse-supervised information, decision support, and communication services to home-dwelling persons living with AIDS (PWAs). During a 26-week randomized field experiment, 26 PWAs accessed the ComputerLink on more than 8,664 occasions. The communications area was used most often; the public communication area functioned like a support group. Multiple behavioral measures of use provide a rich picture of how these PWAs, none of whom had had prior computer experience, adopted and adapted to this innovative nursing care delivery system. Meeting the needs of a rapidly growing and diverse population of home-care clients demands that nurses make effective use of existing technologies such as cable television and telephone triage systems. Computer networks combine the best features of cable television and telephone systems—broadcast distribution and interaction; therefore, computer networks represent an ideal technology for the delivery of certain nursing services to the home.


Kybernetes ◽  
2015 ◽  
Vol 44 (6/7) ◽  
pp. 1107-1121 ◽  
Author(s):  
Jerzy Jozefczyk ◽  
Dariusz Gasior

Purpose – The concept of utility was the first time applied in Economics. The purpose of this paper is to report its usefulness for the decision making in complex technological systems, in general and in computer networks, in particular. Three selected decision-making problems are considered, corresponding solution algorithms are explained and results of numerical experiments are presented for the selected real-world case study. Design/methodology/approach – Referring to similar decision-making problems in Economics, three problems of different time horizon are investigated: strategic investment planning, short-term network rate allocation and on-line network operating. Deterministic and uncertain versions are taken into account, and the latter one is handled more thoroughly. The formalism of uncertain variables is used to represent the parameter uncertainty which concerns users’ demands for services in computer networks as well as network links’ capacities. Corresponding optimization tasks are presented. Numerical experiments concerning a part of the computer network Pionier working in Poland confirmed the usefulness of the solution algorithms proposed. Findings – The carried out numerical experiments verified the importance and worth of the decision-making algorithms for the Pionier computer network. It particularly concerns the game theory-based algorithm solving the on-line network operating problem which enables calculating the rates for computer links distinctly, i.e., separately for every link. Research limitations/implications – More case studies should be considered to formulate more general corollaries. The application of utility concept for wireless sensor networks needs further studies on solution algorithms. Practical implications – The results can be directly applied to a class of modern computer networks, e.g., content delivery networks, self-managing networks, context aware networks, multilevel virtual networks. Originality/value – The paper presents the unified and systematic approach for individual results previously obtained, and it considers one case study.


Sign in / Sign up

Export Citation Format

Share Document