Networking Technologies for Business Continuity

Author(s):  
Nijaz Bajgoric

Continuous computing technologies explored in previous chapters, in many cases, are located on different locations. However, they depend on each other and are bound to data communication and networking technologies that are used in order to ensure data transfers. Therefore, the data communications technologies are crucial in ensuring continuous computing each time when computing devices and users are located in different locations. Chapter XII provides some explanations on them and their role in business continuity.

Author(s):  
Michael Fitzmaurice

This paper will survey and describe the various data communication subsystems (DCSs) used on many communications based train control (CBTC) system projects planned and in service throughout North America, Europe and Asia. The paper will focus on the RF characteristics of the DCS so as to highlight the similarities and common challenges that all DCSs face with a view to presenting best practice and innovative design.


Author(s):  
Nijaz Bajgoric

Continuous computing technologies are employed in order to achieve business continuity from the business operations perspective. In the same time, these technologies are the main prerequisite for business agility as agility relies on available information and “always-on” information system that generates it. Business Agility and relations with business continuity technologies are briefly explained in Chapter XIV


2018 ◽  
Vol 154 ◽  
pp. 03001
Author(s):  
Barlian Henryranu Prasetio ◽  
Dahnial Syauqy ◽  
Rizal Maulana ◽  
Gembong Edhi Setyawan

In this paper, we implement a voice data communications between sender and receiver through Wi-Fi. The system was designed and implemented using network stream protocol which was developed by National Instruments on Lab-VIEW between two devices. The device which acts as the sender was My-RIO board and the receiver device was Personal Computer. The voice data communication system was tested by observing the effect of various buffer sizes on the throughput, latency and CPU usage. The result showed that the larger the buffer size being used, the throughput values were also getting bigger. However, particular buffer size made the throughput became saturated. The change on the buffer size also directly affects CPU usage. It seemed that the buffer size did not affect latency significantly. It showed that the latency was stable with an average of 13 milliseconds on voice data transmission.


2021 ◽  
Author(s):  
Pradeep Suthanthiramani ◽  
Muthurajkumar Sannasy ◽  
Sannasi Ganapathy ◽  
Arputharaj Kannan

Abstract Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Network (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of enormous volume of users including malicious users communicating with latest technologies and also based their own requirements. In such a scenario, fuzzy rules and cryptographic techniques can play a major role in providing security to the data which are either communicated through the network or stored in network based databases including distributed databases and cloud databases with cloud networks. Therefore, new and efficient mechanisms for generation and exchange of keys are necessary since they are the most important component of cryptographic methods. Since most of the existing key generation techniques are focusing on 3G and 4G networks, new key generation methods that can be generalized to n-th order polynomials are necessary to suit the security requirements of 5G networks which is smart by using rules from Artificial Intelligence. This paper proposes a new key generation and encryption/decryption mechanism which is based on both symmetric key cryptography and polynomial operations for providing effective security on data communication in 5G networks. In this work, we introduce the usage of fuzzy rules and Binomial Theorem (Pascal triangle) technique for performing the data encryption process more efficiently since it is not used in any of the existing cryptographic algorithms. Moreover, two different polynomial equations, one of degree three and another of degree two are used in the proposed work for effective key generation. Here, we have applied differential calculus for finding the second-degree polynomial. In the decryption part of the proposed mechanism, nth root operation is applied which is able to reduce the number of steps used in a single mode operation. The experimental results of the proposed work proved that the proposed security model with fuzzy rule-based approach is better than other related systems that are available in the literature in terms of reduction in computational complexity and increase in security.


2012 ◽  
pp. 36-45
Author(s):  
Trey Conner ◽  
Morgan Gresham ◽  
Jill McCracken

Drawing on experiences of creating a partnership between the University of South Florida St. Petersburg and a social service organization, Mt. Zion Human Services, Inc., the authors of this chapter moved from a plan for installing and directing a program of networking technologies—refurbished computers scavenged by professors, servers built from components by students, operating systems and software coded by the open-source programming community, and communications technologies that enable an open-source “bazaar” or ecology of writing in the client-based classrooms—to a plan for participating in and responding to the dynamics of the social and cultural networks that emerge vis-à-vis technology. This chapter describes the change in metaphor from building a network, which suggests control over this entity and its role in a public space, to participating in evolving networks, where the environment in which these networks may grow is cultivated, participation in that growth occurs as it develops with other participants, advocates, and organizations it is observed. Finally, the authors continued to participate in the engendering of new projects and networks that are grounded in the programmatic and core values.


Author(s):  
Gurkan Tuna ◽  
Resul Daş ◽  
Vehbi Cagri Gungor

Smart grid is a modern power grid infrastructure for improved efficiency, reliability, and safety, with smooth integration of renewable and alternative energy sources, through automated control and modern communications technologies. The smart grid offers several advantages over traditional power grids such as reduced operational costs and opening new markets to utility providers, direct communication with customer premises through advanced metering infrastructure, self-healing in case of power drops or outage, providing security against several types of attacks, and preserving power quality by increasing link quality. Typically, a heterogeneous set of networking technologies is found in the smart grid. In this chapter, smart grid communications technologies along with their advantages and disadvantages are explained. Moreover, research challenges and open research issues are provided.


Author(s):  
István Mezgar

Based on the results of the information and communications technologies (ICTs), a new “digital” economy is arising. This new economy needs a new set of rules and values, which determine the behavior of its actors. Participants in the digital market realize that traditional attitudes and perspectives in doing business need to be redefined. In this dynamic and turbulent environment that requires flexible and fast responses to changing business needs organizations have to respond by adopting decentralized, team-based, and distributed structures variously described in the literature as virtual, networked, cluster, and resilient virtual organizations. One main aspect of this approach is that organizations in this environment are networked, that is, interlinked on various levels through the use of different networking technologies. Today, besides the Internet, new solutions are offered: wireless networks. Collaboration and cooperation are main characteristics of virtual organizations, so the contacts among the users, the human beings, have outstanding importance. A very important element of this human contact is trust. In a networked organization, trust is the atmosphere, the medium in which actors are moving (Castelfranchi & Tan, 2001). Trust is the basis of cooperation, the normal behavior of the human being in the society. The ability of enterprises to form networked systems depends on the existing level of trust in the society and on the capital of society (Fukuyama, 1995). As the rate of cooperation is increasing in all fields of life, the importance of trust is evolving even faster. In this new organizational environment new methods and techniques of trust building have to be developed, as the conventional rules cannot be applied. According to different experiments, the level of trust between cooperating virtual teams is highly influenced by the type of communication and the duration of contacts.


2018 ◽  
Vol 5 (1) ◽  
pp. 13
Author(s):  
Tri Febriana Handayani ◽  
Pande Ketut Sudiarta ◽  
I Made Oka Widyantara

VoIP is a technology used to communicate voice remotely and directly using data communication lines with TCP / IP protocol. But basically, VoIP communication does not guarantee data security when doing communication. A very important security system is added in VoIP communications to maintain the confidentiality of communication, so that communication can not be recorded and played back. To build a security when communicating VoIP, then in this study added an SRTP-TLS security system. The study was conducted on wireless networks by comparing the security of data communications when using the SRTP-TLS security system and without using a security system.Keywords: Wireless, Security System, VoIP


Heritage ◽  
2019 ◽  
Vol 2 (1) ◽  
pp. 587-598
Author(s):  
Emilia Västi

In 2015, the Museum of Technology received a donation of ninety data communication devices from the 1960s to 2010s, collected and arranged by employees of the Nokia Data Communications department. The museum has been organizing (2018–2019) documentation workshops to collect information and connect individual objects with larger concepts such as company history, innovations, and technologies. The idea is to gain comprehensive contextual information about the collection by bringing together expertise and experiences of (former) Nokia employees, and documentation and interpretation skills of museum professionals. The method of the documentation workshops is a conversational interview inspired by the objects. Subsequently, workshop discussions were planned to be digested and used in cataloguing individual objects and object groups by museum professionals. Eventually significance assessment was chosen as a tool for summarizing the documentation project. The paper discusses the planning and organizing of the outcomes of the documentation workshops and asks the following questions: What is the optimal relationship between cataloguing information in the collections management system and documentation of workshop discussions preserved in the museum’s collection archive? How should the workshop be documented to trace the provenance of the information? What information should and can be collected on the workshop participants?


Sign in / Sign up

Export Citation Format

Share Document