The Research of the Component-Based Satellite Network Protocols

2013 ◽  
Vol 475-476 ◽  
pp. 817-823
Author(s):  
Chun Dong She

The traditional hierarchical network architecture has the defect of redundancy and no interaction between the layers. These defects have bad impact on QoS and network security. Hierarchical network protocols is difficult to be used to satellite network. Component-based network architecture is proposed for eliminating of hierarchical network design flaws. Network protocols will be divided according to the function for forming of low coupling functional components. It provides high quality services to the application using combined components.

2014 ◽  
Vol 22 (2) ◽  
pp. 173-185 ◽  
Author(s):  
Eli Dart ◽  
Lauren Rotman ◽  
Brian Tierney ◽  
Mary Hester ◽  
Jason Zurawski

The ever-increasing scale of scientific data has become a significant challenge for researchers that rely on networks to interact with remote computing systems and transfer results to collaborators worldwide. Despite the availability of high-capacity connections, scientists struggle with inadequate cyberinfrastructure that cripples data transfer performance, and impedes scientific progress. The ScienceDMZparadigm comprises a proven set of network design patterns that collectively address these problems for scientists. We explain the Science DMZ model, including network architecture, system configuration, cybersecurity, and performance tools, that creates an optimized network environment for science. We describe use cases from universities, supercomputing centers and research laboratories, highlighting the effectiveness of the Science DMZ model in diverse operational settings. In all, the Science DMZ model is a solid platform that supports any science workflow, and flexibly accommodates emerging network technologies. As a result, the Science DMZ vastly improves collaboration, accelerating scientific discovery.


Author(s):  
Minjing Dong ◽  
Hanting Chen ◽  
Yunhe Wang ◽  
Chang Xu

Network pruning is widely applied to deep CNN models due to their heavy computation costs and achieves high performance by keeping important weights while removing the redundancy. Pruning redundant weights directly may hurt global information flow, which suggests that an efficient sparse network should take graph properties into account. Thus, instead of paying more attention to preserving important weight, we focus on the pruned architecture itself. We propose to use graph entropy as the measurement, which shows useful properties to craft high-quality neural graphs and enables us to propose efficient algorithm to construct them as the initial network architecture. Our algorithm can be easily implemented and deployed to different popular CNN models and achieve better trade-offs.


2018 ◽  
Vol 4 (4) ◽  
pp. 334-340 ◽  
Author(s):  
Olga Sosnovska ◽  
Maksym Zhytar

In today’s economic realities, achieving the necessary level of financial security of enterprises is a prerequisite for ensuring their sustainable operation and the formation of competitive development parameters in the internal and external market environment. The effectiveness of this process depends on building a high-quality financial architecture as the basic structural element of the company’s financial security system. In this regard, the subject of the study is an analysis of existing theoretical approaches to the definition of financial architecture and its relationship with the financial security of the enterprise. The methodological basis of the research is the scientific development of domestic and foreign scientists, the fundamental theoretical positions of economic science in the field of financial architecture formation, financial risk management, and financial security of the enterprise. The purpose of the article is to study the essence of financial architecture in order to substantiate its determining influence on the financial security of the enterprise and ensure its sustainable functioning in an unstable development of economic processes. The article analyses the theoretical aspects of financial architecture and finds that the interpretation of this economic category is due to the existence of clear causal relationships between its constituent elements and their impact on the financial support. Proceeding from this, the definition of financial architecture is drawn as a set of interconnected structural elements such as capital structure, ownership structure and quality of corporate governance, which accumulate and mobilize financial resources, increase control over the activity of the enterprise, solve conflicts of interest between owners and other stakeholders. It is determined that the choice of principles and methods for constructing financial architecture depends on such financial interests of economic entities as forming a flexible financial potential, optimizing the structure of capital, increasing investment attractiveness, maximizing profits, and increasing the market value of the enterprise. It is proved that the result of building a flexible financial architecture is to provide the appropriate level of financial security of an enterprise by identifying, quantifying, neutralizing, minimizing, and monitoring its financial risks. It is proposed to systematize indicators of financial security level assessment on the most typical of its functional components, among which investment, credit, emission, innovation, and currency can be distinguished. It has been established that ensuring the appropriate level of financial security will contribute to achieving financial sustainability, forming qualitative financial potential, providing competitive advantages, harmonizing interests of economic entities, and creating an effective system of economic security of the enterprise. It is concluded that the construction of high-quality financial architecture is the basis of financial security of an enterprise, the level of which depends on the proper management of financial risks and ensuring an adequate level of safety of all its functional components. As a criterion for the effectiveness of the process of ensuring the financial security of the company, sustainable development of the enterprise was determined in the conditions of an unstable economic environment.


Author(s):  
Onder Onursal ◽  
Arif Sari

This chapter is a literature review of intermediate system to intermediate system (IS-IS) routing protocol to provide basic security mechanisms against cyber-attacks and enhance network security. IS-IS was originally developed by the International Organization for Standardization (ISO) as a link state routing protocol. It was first built with the ability to route CLNPs or connectionless network protocols according to the OSI standard equal to IP. IS-IS is also developed so that it can accommodate routing for any layer three-based protocol. Internet Engineering Task Force (IETF) in 1990 specified the support for IP and introduced IPv6 extensions in 2000. IS-IS protocol implementation was written as modules in order for it to be distributed freely and easily installed on the GNU routing software. SourceForge.net supported the project and gave access for developers to easily contribute to the project. The chapter elaborates the ISIS routing protocol for network security and proposes a critical survey on security routing protocols.


2004 ◽  
Vol 15 (03) ◽  
pp. 485-506 ◽  
Author(s):  
Mitali Singh ◽  
Viktor K. Prasanna

In-network collaborative computation is essential for implementation of a large number of sensor applications. We approach the problem of computation in sensor networks from a parallel and distributed system's perspective. We define COSMOS, the Cluster-based, heterOgeneouSMOdel for Sensor networks. The model abstracts the key features of the class of cluster-based sensor applications. It assumes a hierarchical network architecture comprising of a large number of low cost sensors with limited computation capability, and fewer number of powerful clusterheads, uniformly distributed in a two dimensional terrain. The sensors are organized into single hop clusters, each managed by a distinct clusterhead. The clusterheads are organized in a mesh-like topology. All sensors in a cluster are time synchronized, whereas the clusterheads communicate asynchronously. The sensors are assumed to have multiple power states and a wakeup mechanism to facilitate power management. To illustrate algorithm design using our model, we discuss implementation of algorithms for sorting and summing in sensor networks.


Sign in / Sign up

Export Citation Format

Share Document