TCP/IP Protocol-Based Model for Increasing the Efficiency of Data Transfer in Computer Networks

Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.

Author(s):  
Cyril Onwubiko

Operators need situational awareness (SA) of their organisation’s computer networks and Information Systems in order to identify threats, estimate impact of attacks, evaluate risks, understand situations, and make sound decisions swiftly and accurately on what to protect against, and how to address incidents that may impact valued assets. Enterprise computer networks are often huge and complex, spanning across several WANs and supporting a number of distributed services. Understanding situations in such dynamic and complex networks is time-consuming and challenging. Operators SA are enhanced through a number of ways, one of which is through the use of situation-aware systems and technology. Designing situation-aware systems for computer network defence (CND) is difficult without understanding basic situational awareness design requirements of network applications and systems. Thus, this chapter investigates pertinent features that are foundation, essential, and beneficial for designing situation-aware systems, software, and network applications for CND.


Author(s):  
E V Chernova ◽  
P N Polezhaev ◽  
A E Shukhman ◽  
Yu A Ushakov ◽  
I P Bolodurina ◽  
...  

Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.


2018 ◽  
Vol 32 (28) ◽  
pp. 1850309 ◽  
Author(s):  
İlker Türker ◽  
Zafer Albayrak

In this study, we investigated data spreading in computer networks with scale-free topology under various levels of improved clustering. Starting from a pure Barabási–Albert (BA) network topology, we applied a Poisson-based rewiring procedure with increasing rewiring probability, which promotes local connections. We then performed wired computer network simulations in NS2 simulator for these topologies. We found that for pure BA network, data transfer (throughput) is maximum, where time required for establishing routing scheme, end-to-end delays in data transmission and number of nodes acting in data transfer are at their minimum levels. Improving clustering increases these parameters those are at their minima. A noteworthy finding of this study is that, for moderate levels of clustering, total throughput remains close to its maximum yielding stable transfer rates, although number of infected nodes and end-to-end delay increase. This indicates that clustering promotes spreading phenomena in networks, although it increases average separation. As a result, clustering property emerges as a catalyzer in data spreading with minimal effects on the total amount of transmission.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Author(s):  
A. Danladi ◽  
G. P. Vasira

Fractal dimension is mathematically defined as a ratio of statistical complexity of network traffic; its significant manifestation can affect the network performance. In this work, two models of corporate computer networks have been developed using optimized network engineering tool (OPNET) technology. Raw packet generator (RPG) traffic was imposed on the corporate networks and modeled using H = 0.7 and D = 1.3, under the influence of Pareto distribution. Autocorrelation function and power law were used to confirm the presence of fractal traffic on the networks. Average Hurst index (H) of 50 and 100 workstations were estimated using aggregate of variance, absolute moment, periodogram and R/S methods as 0.627, 0.608 and its corresponding fractal dimensions (D) were obtained as 1.371 and 1.391 respectively. These results obtained mean, there is a manifestation of fractal traffic and delay is minimised on the network.  


Author(s):  
G. Golovko ◽  
Ye. Chaika ◽  
M. Luchko

The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the enterprise Magnetic Corporation. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health.


Sign in / Sign up

Export Citation Format

Share Document