scholarly journals Structure for Synonymous Flow Label (SFL)

2021 ◽  
Vol 19 ◽  
pp. 305-309
Author(s):  
Sumit Kushwaha

Because of the very high loss rate in general activity, enhancements in connection and transmission innovations have made it more difficult to evaluate packet loss utilizing dynamic execution estimation techniques with plotted traffic. That, along with seriously requesting administration level necessities, implies that network administrators currently should have the option to quantify the loss of the actual user data traffic utilizing inactive execution estimation strategies. Multiprotocol Label Switching (MPLS) strategy portrays the prerequisite for presenting stream characters inside the MPLS architecture. This paper depicts a strategy for achieving this by utilizing a method called Synonymous Flow Label (SFL) in which names that imitate the conduct of different labels give the recognizable proof assistance. These identifiers can be utilized to trigger per stream procedure on the packet at the receiving label switching router.

2014 ◽  
Vol 74 (2) ◽  
pp. 338-348 ◽  
Author(s):  
GR. Winck ◽  
P. Almeida-Santos ◽  
CFD. Rocha

In this study we attempted to access further information on the geographical distribution of the endangered lizard Liolaemus lutzae, estimating its potential distribution through the maximum entropy algorithm. For this purpose, we related its points of occurrence with matrices of environmental variables. After examining the correlation between environmental matrices, we selected 10 for model construction. The main variables influencing the current geographic distribution of L. lutzae were the diurnal temperature range and altitude. The species endemism seemed to be a consequence of a reduction of the original distribution area. Alternatively, the resulting model may reflect the geographic distribution of an ancestral lineage, since the model selected areas of occurrence of the two other species of Liolaemus from Brazil (L. arambarensis and L. occipitalis), all living in sand dune habitats and having psamophilic habits. Due to the high loss rate of habitat occupied by the species, the conservation and recovery of the remaining areas affected by human actions is essential.


2021 ◽  
Author(s):  
Shiva Raj Pokhrel ◽  
Neeraj Kumar ◽  
Anwar Walid

Connected Autonomous Vehicles (CAVs) are Not-So-Futuristic. CAVs will be highly dynamic by intelligently exploiting multipath communication over several radio technologies, such as high-speed WiFi and 5G and beyond networks. Yet, the likelihood of data communication loss can be very high and/, or packets arrive at the destination not in correct working order due to erratic and mixed time-varying wireless links. Furthermore, the vehicular data traffic is susceptible to loss and delay variation,which recommends the need to investigate new multipath TCP(MPTCP) protocols for ultra-reliable low latency communication(URLLC) over such heterogeneous networks while reassuring CAVs’ needs. We undertake the challenge by jointly considering network coding and balanced linked adaptation for performing coupled congestion control across multiple wireless paths.Consequently, the proposed low delay MPTCP framework for connecting autonomous vehicles is efficient and intelligent by design. We conduct a rigorous convergence analysis of the MPTCP design framework. In summation, we provide a detailed mathematical study and demonstrate that the latency penalty for the URLLC-MPTCP developed over these networks becomes negligible when considering the possible benefits that multiple network convergence could offer. Our extensive emulation results demonstrate all these lucrative features of URLLC-MPTCP.


1970 ◽  
Vol 5 (1) ◽  
Author(s):  
W. F. Al-Khateeb, S. Al-Irhayim, and K. A. Al-Khateeb

The benchmark for the reliability quality of networks depends mainly on the accuracy and comprehensiveness of the reliability parameters. Downtime prediction of a communication system is crucial for the quality of service (QoS) offered to the end-user. Markov model enables analytical calculation of average single figure cumulative downtime over one year. The single average approach, generally, does not adequately describe the wide range of service performance that is likely to be experienced in communications systems due to the random nature of the failure. Therefore, it would be more appropriate to add downtime distribution obtained from network availability models to predict the expected cumulative downtime and other performance parameters among a large number of system populations. The distribution approach provides more comprehensive information about the behavior of the individual systems. Laplace-Stieltjes transform enables analytical solutions for simple network architectures, i.e. the simplex system and the parallel system. This paper uses simulations to determine reliability parameters for complex architecture such as the Multiprotocol Label Switching (MPLS) backbone planned for next-generation Internet. In addition to the single figure downtime, simulations provide other reliability parameters such as probability of zero downtime. The paper also considers the downtime distribution among a population of equally designed systems.Key Words: Reliability, availability, downtime, Multiprotocol label switching


KOMTEKINFO ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 159-170
Author(s):  
Heri Yanto ◽  
Febri Hadi

Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.


Author(s):  
J. Goh

Mobile user data mining is the process of extracting interesting knowledge from data collected from mobile users through various data mining methodologies. As technology progresses, and the current status of mobile phone adoption being very high in developed nations, along with improvements on mobile phones with new capabilities, it represents a strategic place for mobile user data mining. With such advanced mobile devices, locations that mobile users visit, time of communications, parties of communications, description of surrounding locations of mobile users can be gathered, stored and delivered by the mobile user to a central location, in which it have the great potential application in industries such as marketing, retail and banking. This chapter provides a general introduction on mobile user data mining followed by their potential application. As the life of mobile users are mined, general patterns and knowledge such as the sequence of locations they tend to visit, groups of people that they tends to meet, and timing where they generally active can be gathered. This supports marketing, retail and banking systems through the use of knowledge of behavior of mobile users. However, challenges such as privacy and security are still a main issue before mobile user data mining can be implemented.


Sign in / Sign up

Export Citation Format

Share Document