scholarly journals Computer Network Simulation of Firewall and VoIP Performance Monitoring

2018 ◽  
Vol 14 (09) ◽  
pp. 4
Author(s):  
Ammar O. Barznji ◽  
Tarik A. Rashid ◽  
Nawzad K. Al-Salihi

<p class="0abstract">Fast growing in communication technology has influenced global changes and challenges appear in the field of network security issues. Security solutions must be efficient and operate in a way to deal with threats, reject and stop the network intruders and Trojans. The simulated network of Salahaddin university new campus is planned to build on an area of (3000X3000) meter square. The network consists of many main and secondary devices. The network is mainly consisted of one core switch that provides a very high data transfer through connecting all the collected positions by a variety of cable medias to the entire network switches which are installed in each college location. The department of academic administration (presidency) of the university design is similar to the network designed in each college. The mentioned switch obtains the services from a router that isolates the network from the cloud which supports the services of internet to the network. The firewall is connected to the switch that connects the main server and cloud together. This paper focuses on undertaking a simulation to analyze and examine the performance of the whole network when two scenarios are implemented, the first is if firewall devices is used, the second is when firewall is not used, since the project of building Salahaddin University new campus is at the initial stage, therefore, the researchers think that, it is very important to figure out the drawbacks and deadlocks of using firewall upon each branch of the network and overall network performance before the submitting the final networks design that going to be implemented and installed, because this will indicate many differences on the construction, for example, the network panels ways, the cable collecting locations, network channels and many other device fixing things depending on the media types in addition of the demand of future expansion capabilities. The results show that the using or adding of firewall device to the university campus computer network, will improve the overall network performance though increasing the data stream on many network sections and sectors, also better results are obtained.</p>

Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2098
Author(s):  
Mumraiz Khan Kasi ◽  
Sarah Abu Ghazalah ◽  
Raja Naeem Akram ◽  
Damien Sauveron

Mobile edge computing is capable of providing high data processing capabilities while ensuring low latency constraints of low power wireless networks, such as the industrial internet of things. However, optimally placing edge servers (providing storage and computation services to user equipment) is still a challenge. To optimally place mobile edge servers in a wireless network, such that network latency is minimized and load balancing is performed on edge servers, we propose a multi-agent reinforcement learning (RL) solution to solve a formulated mobile edge server placement problem. The RL agents are designed to learn the dynamics of the environment and adapt a joint action policy resulting in the minimization of network latency and balancing the load on edge servers. To ensure that the action policy adapted by RL agents maximized the overall network performance indicators, we propose the sharing of information, such as the latency experienced from each server and the load of each server to other RL agents in the network. Experiment results are obtained to analyze the effectiveness of the proposed solution. Although the sharing of information makes the proposed solution obtain a network-wide maximation of overall network performance at the same time it makes it susceptible to different kinds of security attacks. To further investigate the security issues arising from the proposed solution, we provide a detailed analysis of the types of security attacks possible and their countermeasures.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Yassine Khlifi ◽  
Majid Alotaibi

AbstractOptical label switching is introduced for ensuring fast data transfer, quality of service (QoS) support, and better resource management. However, the important issue is how to optimize resource usage and satisfy traffic constraints for improving network performance and design. This paper proposes a dynamic approach that optimizes the resource in terms of link capacity and FDL (fiber delay line) buffering as well as a wavelength converter. The proposed approach decreases the resources usage and guarantees QoS support for various traffic demands. The optimization strategy consists of two stages: path building and traffic management. The path building assures logical topology making using the cumulative cost of available resource and traffic requirements including unicast and multicast. The traffic management solves the resource formulation problem during the traffic transfer by guaranteeing the required loss and blocking delay. Simulation work is conducted for validating the proposed approach and evaluating its performances and effectiveness. Simulation results show that our proposal minimizes effectively the use of link capacity of lightpath and light-tree. Moreover, our approach optimizes the use of buffering capacity and wavelength converter and guarantees QoS support according to traffic requirements.


2001 ◽  
Vol 674 ◽  
Author(s):  
Ralf Detemple ◽  
Inés Friedrich ◽  
Walter Njoroge ◽  
Ingo Thomas ◽  
Volker Weidenhof ◽  
...  

ABSTRACTVital requirements for the future success of phase change media are high data transfer rates, i.e. fast processes to read, write and erase bits of information. The understanding and optimization of fast transformations is a considerable challenge since the processes only occur on a submicrometer length scale in actual bits. Hence both high temporal and spatial resolution is needed to unravel the essential details of the phase transformation. We employ a combination of fast optical measurements with microscopic analyses using atomic force microscopy (AFM) and transmission electron microscopy (TEM). The AFM measurements exploit the fact that the phase transformation from amorphous to crystalline is accompanied by a 6% volume reduction. This enables a measurement of the vertical and lateral speed of the phase transformation. Several examples will be presented showing the information gained by this combination of techniques.


2002 ◽  
Vol 41 (Part 1, No. 3B) ◽  
pp. 1804-1807 ◽  
Author(s):  
Gakuji Hashimoto ◽  
Hiroki Shima ◽  
Kenji Yamamoto ◽  
Tsutomu Maruyama ◽  
Takashi Nakao ◽  
...  

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Kala Meah ◽  
Steven Fletcher ◽  
Yu Wan ◽  
Sadrul Ula

Many parts of the western US is rural in nature and consequently do not have electrical distribution lines in many parts of farms and ranches. Distribution line extension costs can run from $15,000 to $25,000 per mile, thereby making availability of electricity to small water pumping projects economically unattractive. Solar photo-voltaic (PV) powered water pumping is more cost effective in these small scale applications. Many western states including Wyoming are passing through fifth year of drought with the consequent shortages of water for many applications. Wyoming State Climatologist is predicting a possible 5–10 years of drought. Drought impacts the surface water right away, while it takes much longer to impact the underground aquifers. To mitigate the effect on the livestock and wildlife, Wyoming Governor Dave Freudenthal initiated a solar water pumping initiative in cooperation with the University of Wyoming, County Conservation Districts, Rural Electric Cooperatives, and ranching organizations. Solar water pumping has several advantages over traditional systems; for example, diesel or propane engines require not only expensive fuels, they also create noise and air pollution in many remote pristine areas. Solar systems are environment friendly, low maintenance and have no fuel cost. In this paper the design, installation and performance monitoring of the solar system for small scale remote water pumping will be presented.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Sign in / Sign up

Export Citation Format

Share Document