wired networks
Recently Published Documents


TOTAL DOCUMENTS

270
(FIVE YEARS 58)

H-INDEX

12
(FIVE YEARS 3)

Author(s):  
Mohammed Hussein ◽  
Wisam Alabbasi ◽  
Ahmad Alsadeh

Energy saving has become a critical issue and a great challenge in the past few decades, and a great effort as well is being made to reduce consumed energy. The Internet forms a major source for energy consumption. Therefore, in this work we propose an algorithm for energy saving in distributed backbone networks, the reduced energy consumption (RedCon) algorithm. In this paper, we introduce a new version for saving energy on the Internet by switching off underutilized links and switching on idle links when the network is overloaded in a distributed manner over the network nodes based on LSA messages and without any knowledge of the traffic matrix. Our algorithm is more accurate and outperforms other algorithms with its time checks and advanced learning algorithm.


2021 ◽  
Vol 10 (6) ◽  
pp. 3127-3136
Author(s):  
Feng Wang ◽  
Eduard Babulak ◽  
Yongning Tang

As internet of things (IoT) devices play an integral role in our everyday life, it is critical to monitor the health of the IoT devices. However, fault detection in IoT is much more challenging compared with that in traditional wired networks. Traditional observing and polling are not appropriate for detecting faults in resource-constrained IoT devices. Because of the dynamic feature of IoT devices, these detection methods are inadequate for IoT fault detection. In this paper, we propose two methods that can monitor the health status of IoT devices through monitoring the network traffic of these devices. Based on the collected traffic or flow entropy, these methods can determine the health status of IoT devices by comparing captured traffic behavior with normal traffic patterns. Our measurements show that the two methods can effectively detect and identify malfunctioned or defective IoT devices.


2021 ◽  
Vol 2 (2) ◽  
pp. 87-96
Author(s):  
Alvin Riady ◽  
Aan Restu Mukthi

Bukit Energi Servis Terpadu (BEST) is a company engaged in Operation & Maintenance (O&M) services which are members of the PT group. Bukit Asam Tbk. PT. Bukit Energi Servis Terpadu (BEST) already has a computer network in the form of adequate wired and wireless networks and has been connected to the internet. The bandwidth used for the scope of the office uses a bandwidth of 30 Mbps, but the problem of internet speed is not maximized where there is download activity and video streaming which causes the internet bandwidth in the office to be slow, thus affecting the activities of employees who are accessing the internet in the office either through wired networks and wireless internet hotspots. The results of the measurement of packet loss parameters (%) after Bandwidth Management with HTB is better, namely 0.12 % while before Bandwidth Management with HTB is carried out with a value of 0.52 %. The results of measuring the throughput parameters before using Bandwidth Management with HTB where the use of throughput after using Management Bandwidth with HTB obtained results of 624.9 kbps while the throughput before Bandwidth Management was carried out was 624.4 kbps. By limiting bandwidth using the Hierarchical Token Bucket (HTB) facility, bandwidth can be divided into certain sections or prioritized for those who need higher internet speeds, while those that do not require an internet connection are provided with a small speed.


2021 ◽  
Author(s):  
Rahil Gandotra ◽  
Levi Perigo

Energy consumption by the network infrastructure is growing expeditiously with the rise of the Internet. Critical research efforts have been pursued by academia, industry and governments to make networks, such as the Internet, operate more energy efficiently and reduce their power consumption. This work presents an in-depth survey of the approaches to reduce energy consumption in wired networks by first categorizing existing research into broad categories and then presenting the specific techniques, research challenges, and important conclusions. At abroad level, we present five categories of approaches for energy efficiency in wired networks – (i) sleeping of network elements, (ii) link rate adaptation, (iii) proxying, (iv) store and forward, and (v) network traffic aggregation. Additionally, this survey reviews work in energy modeling and measurement, energy-related standards and metrics, and enumerates discussion points for future work and motivations.


2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


2021 ◽  
Vol 4 (2) ◽  
pp. 345-355
Author(s):  
Muhammad Nuzuluddin ◽  

At Present, many schools have used wireless networks that are used to support wired networks. Cable network is used as an amplifier of access point to make internet access for users. The problems of networking using these cables can be a major constraint to inaccessible places that can reduce the flexibility of usage. The solution for this problem is to develop and implement Wireless Distribution System (WDS) on the access point. WDS is a system to develop wireless internet network without having to use cable as backbone for access point but to take advantage of wireless network path from access point. The parameters used in the WDS system are the parameters of jitter, througput, delay and packet loss. WDS performance can be analyzed so that will be known comparison of access point performance results with cable backbone


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4951
Author(s):  
P. Arun Mozhi Devan ◽  
Fawnizu Azmadi Hussin ◽  
Rosdiazli Ibrahim ◽  
Kishore Bingi ◽  
Farooq Ahmad Khanday

Industrialization has led to a huge demand for a network control system to monitor and control multi-loop processes with high effectiveness. Due to these advancements, new industrial wireless sensor network (IWSN) standards such as ZigBee, WirelessHART, ISA 100.11a wireless, and Wireless network for Industrial Automation-Process Automation (WIA-PA) have begun to emerge based on their wired conventional structure with additional developments. This advancement improved flexibility, scalability, needed fewer cables, reduced the network installation and commissioning time, increased productivity, and reduced maintenance costs compared to wired networks. On the other hand, using IWSNs for process control comes with the critical challenge of handling stochastic network delays, packet drop, and external noises which are capable of degrading the controller performance. Thus, this paper presents a detailed study focusing only on the adoption of WirelessHART in simulations and real-time applications for industrial process monitoring and control with its crucial challenges and design requirements.


Author(s):  
Ahmed A. Alabdel Abass ◽  
Navya Prarthana Divvala

The broadcast nature of wireless networks makes them susceptible to attacks by eavesdroppers than wired networks. Any untrusted node can eavesdrop on the medium, listen to transmissions and obtain sensitive information within the wireless network. In this paper, we propose a new mechanism which combines the advantages of two techniques namely iJam and OFDM phase encryption. Our modified mechanism makes iJam more bandwidth efficient by using Alamouti scheme to take advantage of the repetition inherent in its implementation. The adversary model is extended to the active adversary case, which has not been done in the original work of iJam and OFDM phase encryption. We propose, through a max min optimization model, a framework that maximizes the secrecy rate by means of a friendly jammer. We formulate a Zero-Sum game that captures the strategic decision making between the transmitter receiver pair and the adversary. We apply the fictitious play (FP) algorithm to reach the Nash equilibria (NE) of the game. Our simulation results show a significant improvement in terms of the ability of the eavesdropper to benefit from the received information over the traditional schemes, i.e. iJam or OFDM phase encryption.


2021 ◽  
Vol 13 (11) ◽  
pp. 6187
Author(s):  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
Mangal Sain ◽  
Hoonjae Lee

An ad hoc network is a wireless mobile communication network composed of a group of mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is established temporarily. The mobile nodes of the network use their own wireless transceivers to exchange information; when the information is not within the communication range, other intermediate nodes can be used to relay to achieve communication. They can be widely used in environments that cannot be supported by wired networks or which require communication temporarily, such as military applications, sensor networks, rescue and disaster relief, and emergency response. In MANET, each node acts as a host and as a router, and the nodes are linked through wireless channels in the network. One of the scenarios of MANET is VANET; VANET is supported by several types of fixed infrastructure. Due to its limitations, this infrastructure can support some VANET services and provide fixed network access. FANET is a subset of VANET. SANET is one of the common types of ad hoc networks. This paper could serve as a guide and reference so that readers have a comprehensive and general understanding of wireless ad hoc networks and their routing protocols at a macro level with a lot of good, related papers for reference. However, this is the first paper that discusses the popular types of ad hoc networks along with comparisons and simulation tools for Ad Hoc Networks.


Sign in / Sign up

Export Citation Format

Share Document