computer networks
Recently Published Documents





Oleksandr Stasiuk ◽  
Valeriy Kuznetsov ◽  
Vitalii Zubok ◽  
Lidiya Goncharova ◽  
Antonina Muntian

The paper is devoted to analysis of modern directions of innovation-investment formation of intelligent computer networks that control the fast-moving technological processes of electricity supply. It is based on the conclusion that the problem of increasing the productivity of information exchange between information resources and consumers is dominant. A method for increasing the efficiency of information exchange is proposed as a search for the rational location of a new node and the organization of such a set of its connections among the whole set of nodes of the computer network, which provides a minimum average topological distance. Mathematical models of effective topological organization of connections in computer network of power consumption control at the level of traction substations, electric power distances and the railway in general are proposed.

Andriy Dudnik ◽  
Ivan Bakhov ◽  
Oleksandr Makhovych ◽  
Yulia Ryabokin ◽  

The paper discusses models and methods for improving the performance of wireless computer networks built based on the decomposition of the lower levels of the OSI reference model. A method to improve the performance of networks is suggested, which functionally combines the physical and network layers, which improves its efficiency in marginal reception areas almost twice. A model of the block diagram of a device for improving data transmission quality in marginal reception areas or those with insufficient noise immunity is developed based on the so-called communication quality status monitoring, as well as a model of the block diagram of a wireless adaptive capacity reallocation router based on dynamic channels capacity reallocation, which allows adequately reallocating IS resources depending on traffic and user priority. Keywords— Bluetooth, FIFO discipline, IEEE 802.11, OSI/ISO reference model, wireless computer networks.

2022 ◽  
Vol 1 (13) ◽  
pp. 71-79
Hoàng Thái Hổ ◽  
Nguyễn Thế Hùng ◽  
Nguyễn Tuấn Minh

Tóm tắt—Bài báo trình bày một giải pháp sử dụng năng lực của mạng máy tính phân tán cho thám mã khối. Hệ thống có cấu trúc dựa trên 3 phần mềm. Phần mềm quản trị sử dụng cho nhập dữ liệu đầu vào, phân tích và chia khoảng không gian khóa và phân tích kết quả. Phần mềm thám mã trên CPU và GPU được cài đặt tương ứng cho các máy tính trong mạng phân tán có nhiệm vụ thám mã đối với dữ liệu phần mềm quản trị cung cấp. Kết quả được gửi về phần mềm quản trị để phân tích và giải mã. Quá trình thám mã được thực hiện cùng lúc trên toàn bộ máy tính trong mạng vào thời gian máy tính nhàn rỗi, không ảnh hưởng tới hoạt động hàng ngày của người dùng. Hệ thống bao gồm cả các máy tính có sử card GPU giúp tăng hiệu suất thám mã lên gấp 11 lần. Giải pháp đã được ứng dụng trong thám mật khẩu Windows qua mã băm LAN Manager. Abstract—This paper presents a method to use the capabilities of distributed computer networks in cryptanalysis of block ciphers. The system is structured based on 3 software. Management software for input data entry, analysis, and keyspace division. Cryptanalysis software on CPU and GPU is installed respectively for client computers in the distributed network is responsible for cryptanalysis of data provided by the management software. The results are sent to the administrative software for analysis and decoding. The encryption process is performed on all computers in the network at the same time in their spare time, without affecting the user's daily activities. The system includes GPU computers that increase the performance of the cryptanalysis by 11 times. This solution has been applied in Windows password detection via LAN Manager hash code. 

2022 ◽  
Vol 2146 (1) ◽  
pp. 011001
Tao Wang ◽  
Shuanghua Yang

2021 2ND International Conference on Artificial Intelligence, Computer Networks and Communications were successfully held online from 28th to 29th October 2021, Hefei, China. The conference was jointly organized and sponsored by Shaanxi Juxing Exhibition Co., Ltd and Juneng Electronic Technology Co., Ltd. Called by Dr. Tao Wang from School of Data Science and Computer, Sun Yat-Sen University and researcher Shuanghua Yang from the Engineering College, Southern University of Science and Technology, the conference invited scholars and experts in the fields of artificial intelligence, computer networks and communications from various universities to participate in the review and guidance of this conference. The conference focuses on the latest research fields such as “artificial intelligence”, “computer networks” and “Communications”, and aims to provide an international cooperation and exchange platform for experts, scholars and business managers in the fields of artificial intelligence, computer networks and communications application to share their research achievements, discuss the key challenges and research directions of the development of this field, and jointly promote the industrialization cooperation and continuous innovation of international academic achievements. This collection of Proceedings compiles oral and paper presentations submitted by the authors and scrutinized by the Special Committee. The conference was scheduled to be held on October 28-29, 2021 at The Westin Hefei Wanda Hotel, Hefei, Anhui, China. In view of travel restrictions and indoor activities related to COVID-19, we were forced to move the conference online. Attendees were notified one month in advance that the on-site conference was changed to an online conference, and the time and order of the conference were determined. The online conference was held on the video conferencing software Tencent Meeting. The video conference was held on the original date, but due to the large number of attendees, we extended the Meeting for 2 days. Due to the wide coverage of this conference and the large number of attendees, we divided the conference into main venue and sub-venue. The opening ceremony was held in the main venue and a speech was delivered by the invited speaker. After the main venue, we divided the invited 53 authors into 2 groups. Each author spoke for about 10-15 minutes on detailed material in the slides, with the same amount of time set aside for questions and discussion. The format of questioning and discussion was that after each author’s introduction, the conference chairman and committee members asked and answered questions. At least one attendee could ask questions that will be answered by the speaker. This conference has brought together many excellent works and the latest ideas and concepts. New ideas have been provided in the fields of information technology and mechanical engineering applications. For this, we have set up three awards, which were won by six authors. Due to the large number of attendees and the instability of the video conference software, we edited and retained part of the conference speech pictures and videos after the video conference. We put some screenshots of the conference on the official website for display. Although most attendees expressed regret that we had not been able to have the informal face-to-face discussions that usually take place between conferences, the virtual conferences had been surprisingly successful. The organizing and editorial committee of the AICNC 2021 hopes you enjoy the reading of this volume of the JPCS. Besides, we wish to thank all authors and participants for providing their valuable contributions for this proceeding as well as the reviewers for their constructive recommendations and criticism aiding to improve the presented articles. Likewise, we are confident that this issue will serve as a reference for experts, scholars and enterprise managers in the fields of the artificial intelligence, computer networks and communications. Organizing Committee, Scientific Committee, Editorial Committee, Invited Speakers, China, Organizing Institutions are available in the pdf.

2021 ◽  
Vol 4 (2) ◽  
pp. 240-247
Syuryadi Syuryadi ◽  
Nurkhalik Wahdanial Asbara ◽  
Nurani Nurani

This application aims to understand computer networks easily by using multimedia applications to unite motion, images, text, and sound with the result that visible more visually and more alive. With this method, it is hoped that students will quicly understand computer network science. The results of the research show that it has been designed and tested on students where this application has an evaluation within and listening to the material as guide, it is hoped that this application can make students easy to learn computer networks.

V.O Krestinin ◽  
E.A Danilov ◽  
V.V Kuzina ◽  

2021 ◽  
Diogo Mourão de Almeida Pereira ◽  
Joberto S. B. Martins

Computer networks support applications in virtually every area of application and knowledge, and as such, they have widely distributed structures and are susceptible to security attacks in general.Software-Defined Networks (SDN), in turn, are a technological solution that has several advantages by separating the control plane from the data plane in the structuring of computer networks. Given this technological difference, software-defined networks are a network implementation paradigm used to mitigate network security attacks. In summary, the use of SDN to mitigate network attacks provides greater flexibility in implementing the attack strategy. However, the separation of control and data planes creates new points of vulnerability for the security of the network operation.The denial of service attack (DoS) of the type Syn-Flooding is one of the most common possible attacks. It can cause, concerning the network, the commitment to perform services and, concerning the operation of the SDN, the commitment in the bandwidth of the communication channel between the control planes and the data plane, the saturation of the ow table in the switch, and the increasing of the processing load in the controller.In general, the investigation about new strategies aimed at safety with SDN becomes necessary to improve security strategies for network attacks and maximize the reliability of SDN operation, allowing use in different application scenarios. This work presents a defense strategy against attacks of DoS Syn-Flooding using the SDN facilities of an integrated controller with an intrusion detection system (IDS).The proposed strategy aims to mitigate Syn-Flooding DoS attacks and the vulnerability arising from the use of SDN to mitigate attacks.

Noor Kadhim Ayoob ◽  
Asraa Abdullah Hussein ◽  
Rusul Mohammed Neamah

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.

2021 ◽  
Vol XXVIII (4) ◽  
pp. 93-105
Ali Ameen ◽  

The soaring number of applications for autonomous systems in different aspects like air, sea, and space is creating the need for new methodologies and architectures’ technologies to consolidate the verification of system-level and system-of-systems level. The implementation of cybersecurity standards and software is critical to supporting infrastructure. This article discusses some security issues regarding autonomous systems' computer networks. It proposes the usage of Software-Defined Networks (SDN) technologies as a solution, after providing better security in SDN environment through the usage of the HYDRA framework and the usage of multiple controllers in specific topologies to ensure the security of SDN in precise and to ensure the security of the autonomous systems' computer networks in general as well. We propose a framework that contains 3 different types of controllers' topologies and each topology can use 4 algorithms, HYDRA, VPN, Double RSA, and least but not last comes blockchain technology which is the core of our security.

Sign in / Sign up

Export Citation Format

Share Document