Science topics: Computer Networking
Science topic

Computer Networking - Science topic

Explore the latest questions and answers in Computer Networking, and find Computer Networking experts.
Questions related to Computer Networking
  • asked a question related to Computer Networking
Question
2 answers
If a person wants to start a career all over again to do research and phd from scratch in the area of wireless network, what are the basic skills and ideas needed for it
Relevant answer
Answer
To do research in wireless, computer networking, and the generation of mobile networks, you will need a strong foundation in the following skills:
  • Networking fundamentals: This includes a deep understanding of network protocols, architectures, and technologies.
  • Wireless communication theory: This includes knowledge of radio waves, propagation, and signal processing.
  • Programming: This includes skills in one or more programming languages, such as Python, C/C++, or Java.
  • Mathematical modeling and analysis: This includes the ability to develop and solve mathematical models to analyze and evaluate network performance.
  • Research methodology: This includes the ability to design, conduct, and analyze research experiments.
In addition to these core skills, it is also beneficial to have experience with the following:
  • Network simulation tools: This includes tools such as OPNET and NS-3, which can be used to simulate and evaluate network performance.
  • Cloud computing platforms: This includes platforms such as Amazon Web Services (AWS) and Google Cloud Platform (GCP), which can be used to deploy and manage large-scale networks.
  • Machine learning: This is a rapidly growing field that has the potential to revolutionize the design and operation of wireless and mobile networks.
Finally, it is important to be able to think critically and creatively, and to be able to communicate your ideas effectively to others.
Here are some specific examples of research topics in wireless, computer networking, and the generation of mobile networks:
  • Development of new wireless communication protocols and techniques
  • Design and analysis of network architectures for next-generation mobile networks
  • Optimization of network performance and resource utilization
  • Development of new applications and services for mobile networks
  • Security and privacy of wireless and mobile networks
  • Machine learning for network design, operation, and management
If you are interested in pursuing a career in research in wireless, computer networking, and the generation of mobile networks, I encourage you to develop the skills listed above and to explore the research topics that interest you most.
  • asked a question related to Computer Networking
Question
4 answers
Is there any resemblance in how "information flow" happens in humans (Molecular Biology/Neurology) and computers (Computer Networking)?
This question came to be after a note was made by a Computer Networking (CN) lecturer that no new methodologies for information flow in CN to be discovered.
I got interested to look for the answer in the Central Dogma of Molecular Biology, and still awaits further insights.
  • asked a question related to Computer Networking
Question
6 answers
Computer Networking
Relevant answer
Answer
There are several effective strategies for ensuring secure and reliable communication in large-scale computer networks. Some of them are:
1. Encryption: All data transmitted over the network should be encrypted using strong encryption protocols like TLS or SSL. This will prevent sensitive data from being intercepted and accessed by unauthorized entities.
2. Authentication: All users and devices accessing the network should be authenticated. This can be achieved using methods like passwords, biometrics, two-factor authentication, etc.
3. Firewalls: Firewalls can be deployed at the perimeter of the network to prevent unauthorized access to the internal network.
4. Intrusion Detection and Prevention Systems (IDPS): IDPS can be used to monitor network traffic for suspicious activity and prevent potential attacks.
5. Regular updates and patching: All devices and software on the network should be regularly updated and patched to address any security vulnerabilities.
6. Access control: Access to different parts of the network should be restricted based on user roles and privileges.
7. Network segmentation: The network can be divided into smaller segments to reduce the impact of any potential security breaches.
8. Regular security audits: Regular security audits should be conducted to identify and address any potential vulnerabilities or gaps in the network security posture.@
  • asked a question related to Computer Networking
Question
4 answers
Please elaborate latest Research topics in Networks for Masters level Computer Networks Student?
Relevant answer
Answer
You can refer to the following article that presents some trending challenges and open issues in IoT (Drone) environment.
  • asked a question related to Computer Networking
Question
12 answers
Please elaborate latest Research topics in Networks for Masters level Computer Science Student?
Relevant answer
Answer
Dear Mubashir Iqbal,
During the SARS-CoV-2 (Covid-19) coronavirus pandemic, the scale of cybercriminal and hacking activities on the Internet increased. Therefore, I propose the following research topic for a thesis written in the field of computer networks: Improving security, procedures and techniques to protect sensitive information residing in internal and external computer networks connected to the Internet. Within the framework of this topic, the dominant trends of the said process of improving the cyber security of sensitive information in recent years through the application of new technologies typical of the current fourth technological revolution and technologies categorised as Industry 4.0 (such as artificial intelligence, machine learning, Blockchain, Big Data Analytics, etc.) can be examined.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Computer Networking
Question
43 answers
I have to simulate DCCP and UDP on NS2 , for my presentation and showing the differences in throughput, delay, and jitter. I want to know that NS 2.35 standalone supports DCCP simulation, do I have to write any code for this simulation?
I am new to NS2 n linux platform.
Help is appreciated.
Relevant answer
Answer
Fedora or Ubuntu both work well with NS
  • asked a question related to Computer Networking
Question
1 answer
Provide references if possible.
Relevant answer
Answer
IP headers are protected by checksums, for this very reason. The causes of header corruption are many, even going back to the sending node itself. Noise bursts, viruses, bad connection, bad solder joint, many possible reasons.
This might give you ideas for checking out solutions:
  • asked a question related to Computer Networking
Question
3 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
HTTPS://securityinstitute.com/netanalyst has retro free videos on Ethernet, Switches and Routing. The videos were part of NetAnalyst Network Forensic Certification I created and trained 50k and certified 3,500 professionals in 27 countries.
  • asked a question related to Computer Networking
Question
3 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
Dear Manula Manjitha,
The data below provide a good overview of practical reasons requiring a router restart:
  • asked a question related to Computer Networking
Question
6 answers
can someone help me on this?
Relevant answer
Answer
Since you mentioned running on standard desktops using a desktop NIC, Jianye Tian suggested of a soft WRT is a good one. Looks like OpenWRT may fit the bill, see:
A look at OpenWRT discussion forums seems to indicate that it can detect things like CRC errors. Quick disclaimer: I have never tried this myself.
Another approach to find CRC errors is to get interface error stats from the nearest switch or router. That would get you more visibility to other network segments/VLANs than just the one collision domain that a single desktop would be connected to.
  • asked a question related to Computer Networking
Question
2 answers
Please provide references if possible.
Relevant answer
Answer
Arash Ahmadi Esfahani
Except for broadcast storms, others are not typical scenarios right?
  • asked a question related to Computer Networking
Question
3 answers
What are the hot research topics in Network Security and Computer Networking?
Relevant answer
Answer
Dear Harith Ghanim Ayoub,
Look over the sources below:
Network Security
_____
Computer Network Security Problems and Solutions - Possible Threats
_____
  • asked a question related to Computer Networking
Question
4 answers
Please guide me about the difference between SINR threshold and Minimum discernable signal.
From my search I have come across the following.
1) A signal can be decoded if the SINR of the received signal is higher than the SINR threshold. Does it mean that we should not be concerned about the minimum required power, and that if the received signal satisfies the SINR threshold, it will be successfully decoded?
2) I also have come across the idea of minimum discernable level. For instance -70 db is considered acceptable for some types of communication.
Which of the two I should follow. As in the first case, I get very low transmit powers and still satisfy the SINR threshold, while the transmit powers in the 2nd case are way too high compared to the first case.
Relevant answer
Dear Gul Lakhta ,
There is something basic which you you would like to consider. From the point view of the signals, the interference signal acts in a similar way to noise. When it is added to the symbol signal it will cause that it may be falsely detected if its value is increases such that the combined signal will be located in the neighboring decision regions of the adjacent symbols in the constellation diagram. So the interference and noise have the same effect in the symbol error.
Therefore one speaks not only from S/N ratio but also from the S/(N+I).
The noise has Gaussian amplitude distribution while the interference may not have such distribution because of the nature of the interference.
The interference signal sources are normally known and then they can be subtracted from the composite signal. If after interference cancellation there will be residual interference it will be treated as a noise concerning its effect on the symbol error. In the sense that it will set the S/I +N minimum level to achieve specific bit error rate. You see if N=0 then S/I will set this minimum.
Hope I could answer satisfactorily you question.
Best wishes
  • asked a question related to Computer Networking
Question
13 answers
I'm a computer network undergraduate who is looking for an idea to do my final year project. Can anyone give your suggestions?
Relevant answer
Answer
You can explore intrusion detection in computer networks. Machine learning algorithms may assist you greatly in this.
  • asked a question related to Computer Networking
Question
4 answers
Please, l need help on how to research the topic
Relevant answer
Answer
Dear Vicky,
There exist many Research Areas Topics for Wireless Networking, such as:
1- For computer science as well as Communication Engineering researchers:
  • Wireless Networking: Interference Cancellation for Coexistence, and Machine Learning for Adaptation. ...
  • Wireless Security: Automatic Trust Establishment. ...
  • Security and Privacy in Dynamic Spectrum Sharing. ...
  • Security and Privacy Protection of Data Collection and Analysis.
2- For Communication Electronics (Physical layer) researchers:
  • physical layer technologies such as
  • Multiple Input Multiple Output (MIMO) systems (Antenna-oriented)
  • Multiple heterogeneous multi-hop networks
  • Interference cancellation (IC),
  • Novel Digital modulation techniques and Bandwidth efficiency
  • LiFi
  • asked a question related to Computer Networking
Question
6 answers
Hi, my M.Sc. thesis is "Detecting Android Malware using TF-IDF and N-Gram Methods Leveraging Text Semantics of Network Flows”. In my M.Sc. thesis I have worked on malware detection to find a new solution for malware evasion problem in android environments.  I want to implement my idea with "Rapid Miner" thus I need a ".csv" data-set of malware and benign app network flows. I've downloaded many data-sets but none of the satisfied my needs. The most appropriate data-set among all of them for me is Android Malware data-set (InvesAndMal2019).
It's a great ".csv" labeled data-set but unfortunately all of data-set rows labeled as BENIGN. 
I really need a ".csv" labeled android malware data-set composed of MALWARE and BENIGN network flows.
Can anybody help me with this?!
Regards
Mikael
Relevant answer
Answer
You can try BLADE Android Malware Dataset available on Kaggle.
  • asked a question related to Computer Networking
Question
12 answers
Digital Twin NEWS! -ISO-IEC-JTC1-SC41-IoT has launched its Digital Twin framework standardisation at its Nov. Plenary. -Edge Computing & Networking, from VLSI to AI and back, in real time when needed, is essential in this endeavour, with specifications from ETSI (ETSI-ISG-MEC: Multi-Access Edge Computing), 3GPP and One M2M supporting this goal. Cyberphysical systems benefit highly of Digital Twins for optimised fault-tolerant operation, verification and validation, simulation, in particular. -Combining functionalities tightly is a must: software, efficient/secure and sustainable data handling, computing and networking may have to be jointly managed, and possibly integrated at every node of a system using fully Digital Twins.
Speed and energy efficiency are available from VLSI chips integrating two functional layers as the IMX500 from Sony: -Data layer: interfacing to the real world (analogue to digital sampling, and digital to analogue rendering, "data I/O" layer)
-Processing layer ("logic" layer) e.g. with AI algorithms to build or prepare decisions from the data acquired, and conversely to manage and implement decisions into the physical world.
Use cases include smart city functionalities, cognitive design/manufacturing, autonomous systems/vehicles.
What is your view on Digital Twin, in what role is it best positioned? Design? Operation? Fault correction? Other?
Relevant answer
Answer
Good Q
  • asked a question related to Computer Networking
Question
7 answers
For quantum cryptography(QKD) simulation, which simulator is best one
  • asked a question related to Computer Networking
Question
11 answers
Thanks in advance for your replies.
Relevant answer
Answer
Just see this complete and modern hot reference:
Article Cloud IoT as a Crucial Enabler: a Survey and Taxonomy
  • asked a question related to Computer Networking
Question
3 answers
Due to the depletion of the global IPv4 address pool, some new Internet clients will not be able to get IPv4 adresses, but only IPv6 addresses. However the majority of the internet still uses IPv4 addresses. The IPv6 only clients should be able to communicate with the IPv4 only servers. For this problem, the combination of the DNS64 (RFC 6147) and NAT64 (RFC 6146) is a good solution.
We test different free software (also called open source) DNS64 and NAT implementations. As for DNS64, we tested BIND and TOTD.
(For our results, see: Gabor Lencse, Sandor Repas, "Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD," aina, pp.877-884, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013)
Besides these, we know also the PowerDNS and Unbound.
Can someone suggest other free software for DNS64 implementations?
Had anyone tested their performance and/or stability?
Relevant answer
Answer
Dear Colleagues:
Below is the up to date feasibility demonstration that you may like to have a look at.
Abe (2020-08-29 12:13 EDT)
  • asked a question related to Computer Networking
Question
5 answers
What are the methods used to assess the robustness of network with flow? How to model the flow (discrete entities with origin-destination routes) in a network.
Relevant answer
Answer
Can we say that robustness = size of the largest connected component/size of the network? Apparently we need to see the result of the robustness after several attacks.
  • asked a question related to Computer Networking
Question
6 answers
I was looking for any link or something where it shows basic to advance computer networking.
How everything thing works like ISP,router, DNS, Server, DHCP and more to make it easy to understand.
Thank you.
  • asked a question related to Computer Networking
Question
8 answers
https://www.amazon.com/Um-Cabo-Verdiano-Pelo-Mundo-Portuguese/dp/0955944023 Um Cabo-verdiano pelo Mundo é um apanhado de factos e sentimentos vividos pelo autor que, tendo nascido no Paul, Santo Antão, Cabo Verde, chegou à idade da reforma nos seus serviços e vivencias através dos tempos, nos Estados Unidos da América. Durante a sua vida ensinou em vários continentes contactando assim com vários povos e culturas procurando sempre dar o seu melhor não só através do ensino como também nas comunidades onde exercia as suas funções. Hoje revive com alegria e também com muita saudade tudo o que encontrou, tudo o que viu, tudo o que fez nunca esquecendo as pessoas que pelo caminho encontrou. 📷Mundo é um apanhado de factos e sentimentos vividos pelo autor que, tendo nascido no Paul, Santo Antão, Cabo Verde, chegou à idade da reforma nos seus serviços e vivencias através dos tempos, nos Estados Unidos da América. Durante a sua vida ensinou em vários continentes contactando assim com vários povos e culturas procurando sempre dar o seu melhor não só através do ensino como também nas comunidades onde exercia as suas funções. Hoje revive com alegria e também com muita saudade tudo o que encontrou, tudo o que viu, tudo o que fez nunca esquecendo as pessoas que pelo caminho encontrou.
Um Cabo-Verdiano Pelo Mundo (Portuguese Edition) (Portuguese) Paperback – April 30, 2009
by Salazar Ferro (Author)
Falecimento do Professor António St.Aubyn
22/04/2016 - 16:24No dia 18/04/2016, em Lisboa, aos 79 anos📷
Com profunda tristeza, a Divisão de Informática vê partir o Professor António St.Aubyn, Professor Emérito da Universidade Técnica de Lisboa, Instituto Superior de Agronomia, e o primeiro Presidente do Centro de Informática do ISA (CIISA), atualmente DI.
Nascido a 10 de março de 1937, na Ribeira Brava, São Nicolau, Cabo Verde, o Professor St.Aubyn licenciou-se e doutorou-se pela Universidade de Coimbra, tendo tido uma intensa atividade académica e científica nas áreas da matemática e da estatística, da qual resultaram diversas publicações científicas.
Tendo ingressado no Instituto Superior de Agronomia no ano letivo de 1974/1975, onde foi Professor Catedrático desde 1979, e durante muitos anos Presidente do Departamento de Matemática do ISA, onde teve um papel preponderante, não só na criação do próprio departamento, mas também no lançamento dos seus cursos de Mestrado e Doutoramento, o Prof. St.Aubyn foi também docente nas Faculdades de Ciências das Universidades de Coimbra e Lisboa, no Instituto Superior de Economia e Gestão, no Instituto Superior Técnico e na Universidade Lusíada.
Esteve ainda ativamente envolvido em diversas sociedades científicas, nomeadamente na Sociedade Portuguesa de Matemática, de que foi Presidente, na Sociedade Europeia de Matemática e na Sociedade Portuguesa de Estatística.
Figura muito estimada no seio da comunidade cabo-verdiana, esteve ativamente envolvido nos movimentos pela independência do país, e mais tarde no desenvolvimento do ensino da Matemática em Cabo Verde, a convite do seu Ministério da Educação. Foi ainda membro fundador da Academia das Ciências e Humanidades de Cabo Verde.
Intimamente ligado aos processos de informatização da antiga Universidade Técnica de Lisboa, integrou em 1981 a Comissão Informática da UTL, que tinha como objetivo a renovação das infraestruturas de cálculo das escolas da UTL.
Já no ISA, e após a sua criação em 1984, impulsionou o CIISA ao longo de mais de uma década, durante a qual se fez a transição da era dos mini-computadores e seus terminais de acesso, para a era da micro-informática, das redes de computadores, e da Internet.
Para sempre ligado à história do Centro de Informática, na memória ficará alguém cuja visão desempenhou um papel fundamental para que o ISA fosse, nomeadamente no contexto da UTL, de alguma forma pioneiro na adoção das chamadas Novas Tecnologias, que haveriam de se revelar determinantes, não apenas no apoio às atividades científicas e académicas, mas para todo o funcionamento da instituição.
📷
he Cape Verde International Days on Mathematics 2017ArticleFull-text available
  • February 2018
  • 📷Delfim F. M. Torres
  • 📷Ricardo Almeida
  • 📷Paulino Lima Fortes
  • 📷Dorota Mozyrska
DownloadRecommendFollowShareOs desafios do planeamento estratégico: o caso da􀂌􀂊􀂜􀂘 Universidade de Cabo VerdeArticle
  • January 2014
  • 📷Paulino Lima Fortes
  • Bio || Bio Paulino Lima Fortes é licenciado em Matemática (ensino) pela Universidade de Évora (1989). Fez estudos pós-graduados em Mathématiques Théoriques (Geometria, Topologia, Álgebra e Física Matemática) na Universidade de Dijon, França (1993-1995). É doutorado em Matemática área de Geometria, pela Universidade de Évora (2005). É professor auxiliar na Universidade de Cabo Verde, onde ingressou em 1989, onde desenvolve atividades de ensino e investigação nas áreas de Análise, Topologia, Geometria e Física-Matemática, tendo proferido conferências no âmbito da história do pensamento científico. Áreas de Interesse || Current Research
    1. Geometria e Topologia.
    2. Modelação Matemática.
    3. Pensamento Geométrico e espacial.
    4. Artigos
      1. O conceito de corte e a construção do contínuo: uma abordagem histórica, Revista de Ciência e Tecnologia, nº1,Edições Uni-CV, 2013.
      2. Livros
      3. Fundamentos de Geometria Não-Standard, Edições Uni-CV.
      4. Reuniões Científicas || Scientific Meetings Selecção de conferências/comunicações
      5. On some convex topologic concepts in topological vector spaces, XXI Oporto Meeting in Geometry, Topology and Physics, Instituto Superior Técnico, Lisboa, 2015.
      6. Em torno dos paradoxos de Zenão de Eleia: interpretações standard e não-standard, Jornadas Luso-Espanholas de Filosofia da Ciência, CFFCUL, Lisboa, 2014.
      7. Pistas e despistes no ensino da Geometria, Jornadas sobre o ensino da Matemática e da Língua Portuguesa, Universidade de Cabo Verde, 2013.
      8. A descoberta do bosão de Higgs, um triunfo do Modelo Standard, Reitoria da Universidade de Cabo Verde, Praia, 2012.
      9. A recuperação de informação geométria a partir de uma núvem de pontos, Departamento de Engenharias e Ciências do Mar, Universidade de Cabo Verde, 2011
      10. .http://cfcul.fc.ul.pt/equipa/docs/2014/Paulino%20Lima%20Fortes_cv.pdf
      11. https://www.researchgate.net/profile/Gastao_Frederico/research
      12. Gastao S. F. Frederico currently works at Federal University of Ceará, Brazil. Gastao does research in Calculus of Variations, Optimal Control, Fractional Calculus and EDP. Their most recent publication is 'Noether-type theorem for fractional variational problems depending on fractional derivatives of functions'.… Read moreLanguages
        • English
        • French
        • Portuguese
        • DisciplinesCosmologyApplied MathematicsMechanical EngineeringAerospace EngineeringControl Systems EngineeringSkills and expertise (38)MATLAB SimulationModeling and SimulationControl TheoryNumerical AnalysisEngineering, Applied and Computational MathematicsSystem ModelingMathematical AnalysisMathematical ModellingNonlinear AnalysisMechanical EngineeringView allStats overviewResearch Research overviewView all
        • 32Research items
        • 0Projects
        • 0Questions
        • 1Answer
        • Featured researchMost recommended in the last month📷Sourceψ-Hilfer pseudo-fractional operator: new results about fractional calculusArticleFull-text available
        • April 2020
        • 📷Jose Vanterler
        • 📷Gastao S. F. Frederico
        • 📷Edmundo Capelas de Oliveira
        • 74 Reads
        • 1 Recommendation
        • DownloadRecommendFollowShare📷SourceNoether-type theorem for fractional variational problems depending on fractional derivatives of functionsPreprintFile available
        • August 2019
        • 📷Matheus J. Lazo
        • 📷Gastao S. F. Frederico
        • 📷P. M. Carvalho-Neto
        • 25 Reads
        • DownloadRecommendFollowShare📷SourceNoether-type theorem for fractional variational problems depending on fractional derivatives of functionsArticleFull-text available
        • August 2019
        • Applicable Analysis
        • 📷Matheus J. Lazo
        • 📷Gastao S. F. Frederico
        • 📷P. M. Carvalho-Neto
        • 82 Reads
        • 2 Recommendations
        • DownloadRecommendFollowShare📷SourceNoether theorem for action-dependent Lagrangian functions: conservation laws for non-conservative systemsPreprintFile available
        • June 2019
        • 📷Matheus J. Lazo
        • 📷Juilson Paiva
        • 📷Gastao S. F. Frederico
        • 70 Reads
        • 1 Recommendation
        • DownloadRecommendFollowShare📷SourceNoether theorem for action-dependent Lagrangian functions: conservation laws for non-conservative systemsArticleFull-text available
        • June 2019
        • Nonlinear Dynamics
        • 📷Matheus J. Lazo
        • 📷Juilson Paiva
        • 📷Gastao S. F. Frederico
        • 38 Reads
        • 1 Citation
        • https://www.researchgate.net/profile/Telma_Silva DownloadRecommenatured research📷SourceExistence, uniqueness, stability and asymptotic behavior of solutions for a mathematical model of atherosclerosisArticleFull-text available
        • December 2015
        • Discrete and Continuous Dynamical Systems - Series S
        • 📷Jorge Tiago
        • 📷Rafael Santos
        • 📷Adélia Sequeira
        • 📷Telma Silva
        • 233 Reads
        • 5 Citations
        • 1 Recommendation
        • DownloadRecommendFollowShareRecently read📷SourceMathematical Modeling of Atherosclerotic Plaque Formation Coupled with a Non-Newtonian Model of Blood FlowConference PaperFull-text available
        • July 2013
        • The Cape Verde International Days on Mathematics 2013
        • 📷Jorge Tiago
        • 📷Telma Silva
        • 📷Adélia Sequeira
        • 📷Rafael F. Santos
        • 310 Reads
        • 10 Citations
        • 1 Recommendation
        • DownloadRecommendFollowShareMost recommended in the last monthModeling of the Early Stage of Atherosclerosis with Emphasis on the Regulation of the Endothelial PermeabilityArticle
        • April 2020
        • Journal of Theoretical Biology
        • 📷Telma Silva
        • 📷Willi Jäger
        • 📷Maria Neuss-Radu
        • 📷Adélia Sequeira
        • 15 Reads
        • 1 Recommendation
        • Full-text requestedRecommendedFollowingShareMathematical Analysis and Numerical Simulations for a Model of AtherosclerosisChapter
        • December 2016
        • 📷Telma Silva
        • 📷Jorge Tiago
        • 📷Adélia Sequeira
        • 88 Reads
        • 1 Citation
        • Request full-textRecommendFollowShareMost cited in the last monthMathematical modeling of atherosclerotic plaque formation coupled with a non-Newtonian model of blood flowArticle
        • January 2013
        • 📷Telma Silva
        • 📷Adélia Sequeira
        • 📷R.F. Santos
        • 📷Jorge Tiago
        • 21 Reads
        • 9 Citations
        • Request full-textRecommendFollowShareProjectsThe Cape Verde International Days on Mathematics 2020 https://www.researchgate.net/profile/Ivanilda_Cabralhttps://www.researchgate.net/publication/331991393_Astronomy_for_development_in_Portuguese-speaking_countries https://www.facebook.com/robert.sousa.161 https://www.researchgate.net/profile/Robert_De_Sousa Doutor em Matemática e Aplicações, Mestre em Estatística e Gestão de Informão
        • Antonio Afonso Delgado
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
10 answers
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
Relevant answer
Answer
Most trend work is the cybersecurity defence algorithm over 5G
  • asked a question related to Computer Networking
Question
3 answers
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
Relevant answer
Answer
C/N = 20 log 10 [Vc/ Vn]
  • asked a question related to Computer Networking
Question
4 answers
I am working with SDN to manage flows in a network. I wanted to experiment/know if there is a way I can simulate different radios(Bluetooth,Wifi,Zigbee) which work in the same ISM band to better manage the whole environment. Any help is appreciated. Also best wishes for the new year
Relevant answer
Dear Kaustubh,
I think the best way to manage the wireless communication in the ISM band is to use the techniques of the cognitive radio systems. So one has a radio which can sense communicate with control center and get a decision and a connection information from the center. There is the compressive sensing techniques to reduce the sensing signal load.
You can find many many papers when you make a literature survey.
Best wishes
  • asked a question related to Computer Networking
Question
10 answers
Hey everyone
i want to know what is simpler computer networking topic than other topic Or in other words
less complex than other
can anybody help me?
Relevant answer
Answer
Topology and OSI model
  • asked a question related to Computer Networking
Question
4 answers
Please suggest me some link that might help to write python code that can measure the delay of a specific path (the path that I am interested) using pox as a controller. Though I have found opennetmon in https://github.com/TUDelftNAS/SDN-OpenNetMon and tried with this one and its not working. So I need some alternative way that might help me.
Thank you
Relevant answer
Answer
Md. Billal Hossain can u find the code for measuring the Delay??? i am also working on the same area can u suggest me the pox code for measuring delay?
  • asked a question related to Computer Networking
Question
7 answers
If table is like can we draw venn diagram by this input?
variable          value r1               value r2
a                        20                         45
b                         10
c                          39                        1
d                                                      37
e                            98                     27
Relevant answer
Answer
you can use this online tool DiVenn which will generate a nice graph https://divenn.noble.org
  • asked a question related to Computer Networking
Question
4 answers
Greedings I am interested, as my scientific field for PhD or research, to be the privacy to the internet. I also want to do it on Japanese soil via some scholarship (eg. MEXT). So can you suggest me some Japanese univercities that do research on this topic either directly? (eg. via cyberceririty department or a common CS department that does lots of computer networking papers)
Relevant answer
Answer
I made the following master thesis:
And I want to continue the project into PhD as part of a whole plan to continue it for making a public-to-use system. Also I want to use it as a stepfoot in order for further PhD studies in Japan.
So I wanted to know which Univercities in Japan have related fields in order to continue the research.
  • asked a question related to Computer Networking
Question
43 answers
There are many vanet simulators available, I want to know specifically from GrooveNet and Nuctns simulator which one is best 
Relevant answer
Answer
Matlab
  • asked a question related to Computer Networking
Question
7 answers
I asked a question in Research Gate, which is related to NFV. Then, when I added the tags to the question, I did not find NFV as research topic neither the management and orchestration.
Is there a reasonable reason? If not, How to add NFV to research topics?
Relevant answer
Answer
good question
  • asked a question related to Computer Networking
Question
8 answers
i want guidance specific to computer networking point of view, mostly i find material related to physical layer which are mostly related to the electronics field.
so i requested to the experts that they guide me at what topic i start my research which are closely related to the computer networking. in 5G I want to doing my research on massive devices handling and energy efficient algorithms.
Relevant answer
yes , why no't you could contact me as well .
  • asked a question related to Computer Networking
Question
5 answers
What is meant by the "Physical Layer" in Satellite Communications?
As well as how it is different from the 7 layers OSI model of computer networking?
It would be a great help if you could give me some ideas.
Thank you in advance.
Relevant answer
Answer
In addition to what Radwa answered, in the 7-layer OSI model, the physical layer is layer 1. That's the layer which describes how the bits are transferred over the medium. In the case of satellite, it will typically be PSK or 16-QAM at most, single carrier, to achieve robustness with the least demands on transmit power.
The next layer up in the OSI model is the data link layer, which describes how the data frames are arranged. Such as MAC addresses, the type of frame being transmitted (meaning what the payload consists of), the size of the payload, payload size limits, and frame error checking.
So in principle, one can conceive of a satellite link only being different from other links, such as Ethernet let's say, at layer 1. And all the upper layers, from data link on up t application, being the same. Although frequently, satellite links use MPEG2-TS at layer 2, as opposed to Ethernet or other.
  • asked a question related to Computer Networking
Question
27 answers
Currently, I am MSC candidate in Computer Networking and I need hot research area, so who can help me? I am confusing with to find it and I need your support
Relevant answer
Answer
Dear Guyo Mamo,
see my list of Top 10 Networking Trends. I hope you find something interesting for you on this list.
Much success and best regards
Anatol Badach
  • asked a question related to Computer Networking
Question
7 answers
I am comparing the performance of AODV, DSDV & TORA. I used AWK following AWK script for measure the average throughput, end-to-end delay and packet delivery ratio. It works well for aodv and dsdv, but it can not work for TORA. What are the AWK scripts for TORA for measuring above parameters.
Relevant answer
Answer
Do you want the theoretical answer for M/M/1 ? Or do you want to measure it in a simulator?
  • asked a question related to Computer Networking
Question
1 answer
I want to simulate a model on cloudsim traffic latency and topology of data center and its proximity to customers .. can anybody guide me some tutorials or documentation about it
  • asked a question related to Computer Networking
Question
5 answers
can you guys give me advice
Relevant answer
Answer
yes, nice answer
  • asked a question related to Computer Networking
Question
3 answers
I was wondering if Facebook uni-cast or multicast an ongoing live video streaming to a group of users. For example, if a user joins a live stream, will he/she get a separate uni-cast or multicast stream.
Relevant answer
Answer
I believe that if you join a Facebook Live video after the live event has started, you will enter in the middle or the "current" location.
However, people watching the stream will not be perfectly synced. Different instances of the stream may be a few seconds before or after each other.
I would still call this multicasting.
  • asked a question related to Computer Networking
Question
4 answers
What techniques can be used to speed up reliable multicasting? For example, say a sender is delivering an object reliably to 10 known and fixed receivers over WAN. What can be done to decrease average completion times?
Relevant answer
Answer
Mohammad, if you go through the IETF RFCs on the subject of multicast, you should find that the subject is very much discussed on fundamental principles. So for example, unicast routing protocols, whether link state or distance vector, optimize the path based on link speeds (costs). And multicast trees are built secondarily, on top of these unicast routing protocols. That's how use of optimal paths is taken into account.
There are multiple options discussed, frequently, and the best one may depend on circumstances. For instance, if there are very many members of multicast groups in a partcular network, it might make more sense to begin with an overabundance of branches in the multicast trees, and then pare these down when it is determined that some of the braches are not necessary. Conversely, if multicast members are few and far between, it might make more sense to begin with a very parsimonious set of branches, and then add on to these when the individual members remain in the group.
I don't think much of this is specific to any one protocol implementation.
  • asked a question related to Computer Networking
Question
3 answers
Does/can HDFS manage files across multiple geographically dispersed datacenters? What distributed file systems can be used for this purpose?
Relevant answer
  • asked a question related to Computer Networking
Question
38 answers
Currently working on my Master Thesis proposal, I want to figure out the trends and hot research topic in Network Security and computer networking which i can pursue in following years.
Relevant answer
Answer
Thank you Prof. Walter Baluja García
  • asked a question related to Computer Networking
Question
3 answers
User space packet processing has been attracting more attention lately. Can you name some open source Software Defined NIC frameworks based on user space packet processing?
  • asked a question related to Computer Networking
Question
4 answers
When a new flow arrives at the edge of a WAN, what cost metrics have been proposed for selection of a path? Please assume single path routing.
Also, given different scheduling policies (e.g. Fair Sharing, SRPT and FCFS), what path selection cost metric can improve average completion times of flows?
Thank you!
Relevant answer
Answer
A metric for dynamic routing based on variational principles
  • asked a question related to Computer Networking
Question
3 answers
Besides using Group Tables, what approaches can be used to program forwarding trees into network switches? Assume a scenario similar to SDN where a controller installs forwarding rules on switches.
Relevant answer
Assuming your concern is about OpenFlow, what about adding multiple outputs to the same flow rule? https://www.sdntesting.com/can-an-openflow-switch-replace-a-tap-aggregator/
  • asked a question related to Computer Networking
Question
6 answers
Could you point me to any paper, blog, website or presentation that focuses on datacenter or inter-datacenter traffic characteristics (with flow size, duration, inter arrival distributions)? I have not found but a few research papers that report datacenter traffic patterns.
Relevant answer
Answer
Thank you all for your answers. I read them all carefully and have written a summary of traffic properties in our latest paper (which is accepted to IEEE Communications Surveys and Tutorials):
Please also feel free to share your comments on the paper's page.
  • asked a question related to Computer Networking
Question
4 answers
I have been searching for some research article to find the benefits of both OTTs and ISPs to collaborate for QoE but I couldn't find some good article which has addressed it clearly. Any help in this regard is highly appreciated.
Arslan
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
10 answers
How can we differentiate message-oriented protocols and stream-oriented protocols?
Explanation with examples would be highly appreciated.
Relevant answer
Answer
TCP is a stream oriented protocol and UDP is a message-oriented protocol.
TCP receives the stream of bytes from application layer protocols and divide it in to segments and pass it to IP. But UDP receives already divided or grouped bytes of data from application protocols and add UDP headers which will become datagram and send it to IP, then application layers has the burden of dividing the streams of data in to messages when they run on top of UDP .
  • asked a question related to Computer Networking
Question
3 answers
I assign a semester project to groups of students in my networking classes. As part of that assignment, I have students evaluate the financial feasibility of that project. The approach I have been taking is to have students identify whether or not the network will serve as a supporting or primary function per Porter's Value Chain. If a primary function (such as say, Netflix), I argue that students should focus on more traditional financial metrics like ROI, NPV, etc. If however, the network acts as a support function, then measures such as Total Cost of Ownership or Network Cost of Ownership might be more appropriate. This is not a perfect approach but it has been a way to let theory drive the decision. But, I am curious as to other approaches used and the justification for using such approaches short of stating it as an assumption of the client.
Relevant answer
Answer
Make sure that the total cost of the proposed project you undertake are less than the total benefits resulting from the project. You could simply add up the costs, and then add up your expected revenue increases and cost savings over the next few years, and compare the two.
However, if you did that, you'd be ignoring the fact that many of the costs will be incurred at the beginning of the project, while many of the revenues or cost savings will occur later, over a period of months or, more likely, years.
We've reviewed a number of more formal ways to evaluate the costs or benefits that a major purchase or project will bring . The most commonly used include:
  • payback period analysis
  • accounting rate of return
  • net present value
  • internal rate of return
Each of these methods has its advantages and drawbacks, so generally more than one is used for any given project. And no financial formula, or combination of formulas, should be used to the exclusion of common sense.
A project may "fail" your tests under some or all of these methods, but you might decide to go forward with it anyway because of its value as part of your long-range business plan.
  • asked a question related to Computer Networking
Question
4 answers
Assuming we have an optical WAN backbone, how can it be detected if a link has failed? Is it high error rate? Smaller q-Factor? Please elaborate.
Relevant answer
Dear Mohammad,
Link failure is generally detected by optical receivers, not only for fiber cut but also for signal degradation (i.e., excessive BER). You may get more info in references like https://www.juniper.net/documentation/en_US/junos/topics/concept/otn-signal-degrade-monitoring-understanding.html or https://www.google.com/patents/US7826745.
Additionally, upon severe degradation or fiber cut a loss-of-light (LOL) alarm could be issued to NMS/OSS systems.
Best regards,
José Luis
  • asked a question related to Computer Networking
Question
4 answers
Across different applications that run on datacenters, can you name applications that push multicast updates to multiple servers? Please provide name of software package for specific applications.
Relevant answer
Answer
System imaging applications routinely use multicast. Several ( hundreds ) target systems are started for imaging work, the imaging server streams out the image data via multicast. Hundreds of workstations at a time can be prepped or imaged int his way. This can be an in-data center function for prepping blade servers, for example.
Some routing schemes I have seen will distribute updates via multicast - the routing tables are essentially a database.
I have seen memcached plumbed to recieve updated via multicast.
Video distribution is another application. Encoders and decoders will join a multicast groups forming a distributed N-way video switcher.
I would not see where multicast is really the most heavily used feature in terms of the bulk of traffic for general computing - however when it is used it is vital.
  • asked a question related to Computer Networking
Question
5 answers
Dear All,
I am wondering if there are some mathematical models to correlate amount of network traffic to operational network parameters such as throughput, delay and packet loss for a given link capacity. Consider that traffic is TCP based traffic.
Further details with reference to multimedia applications, I am considering two applications VoIP and HTTP Adaptive video streaming.
Any useful suggestion in this regard is highly appreciated.
Regards
Arslan
Relevant answer
Answer
Dear Nour,
the mathematical models, which measure the relationship between the traffic intensity and the operational parameters (throughput, delay and packet loss rate), I have created for the performance evaluation of Data Link Protocols in the years 1982-1984. I have assumed that the stochastic events on the data link have the Markov property. The effect of different acknowledgment strategies was investigated. My performance evaluation models for DataLink protocols can be found in the articles
( in German) listed here.
Such models could be created for the virtual connections on the transport layer to examine the performance of the flow control and the congestion control with TCP.
Data Flow Control with TCP
Good luck and best regards
Anatol Badach
Analytical Performance Evaluation of a Class of Communication Protocols for Computer Networks.
Analytical Performance Evaluation for Communication Protocols with Single Acknowledgments.
Look here: Fig. 1 and Fig. 2: Markov graph model
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part I. A stochastic model of the behavior of investigated class of
communication protocols
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil I. Ein stochastisches Modell des Verhaltens untersuchter Klasse von
Kommunikationsprotokollen
Look here: Fig. 1, Fig. 2 and Fig. 3: Markov graph models
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil II. Leistungskenngrößen von Kommunikationsprotokollen und ihre Analyse
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part II. Performance characteristics of communication protocols and
their analysis
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
  • asked a question related to Computer Networking
Question
3 answers
I am trying to find the optimal sampling rate of the passive probe for QoE monitoring of a video streaming application where I am considering the network load as an objective function which should be minimized. I wonder if there are some concrete work in literature related to it. Any useful information will be highly appreciated. Thanks 
Relevant answer
  • asked a question related to Computer Networking
Question
5 answers
i've noticed that majority of engineers are focusing on the technical side of development of telecom equipment either in mobile communication or any other sub-field , compared to computer networking ,engineers do their best to develop new security solutions ! 
i don't understand why there's always this  lack of interest in security field in telecom  !! 
Relevant answer
Answer
I think maybe we are just talking about different protocol layers? It's a bit like asking why IEEE 802.3, the Ethernet standard, doesn't address security. Security is built on top of Ethernet. At least, that's the typical way of implementing security.
The other point is that a telecom does need to implement security measures, but this is primarily to protect itself. For example, their system management messaging, routing tables and routing protocols, have to be secure, to prevent a hacker from disrupting the system. But it doesn't do much good for the telecom to secure user traffic, if ultimately, at the edges, the traffic has to be sent in the clear. If a user of the telecom wants security, that user must install a solution that protects traffic end to end, from inside his PC or smartphone, all the way to inside the PC or smartphone at the other end. Or in the case of an enterprise network, security could be implemented until the link is inside that enterprise's "secure enclave," perhaps not all the way to the end system. So for example, the enterprise may deploy secure tunnels, through a telecom network, where the end points of those secure tunnels are inside secure enclaves.
Otherwise, anyone along that path would be able to monitor the communications. And there is no reason for a user to trust the telecom itself, ultimately, if that user needs security.
Security can and is implemented at any protocol layer. From the standpoint of a user, though, any security measure that is not end to end would be of questionable value. That's why people use Transport Layer Security so often, when dealing with communications across telecom or other network services. It's security built over the telecom link, carried transparently by the telecom or by the digital network.
  • asked a question related to Computer Networking
Question
28 answers
Kindly guide me about choosing best simulator for dynamic routing in Adhoc networks.
Can we use Opnet simulation for high level work?
Thanks
Relevant answer
Answer
NS2 is no longer used and active development stopped 7 years ago. So its best you use NS3 or NetSim or OPNET. And like you say you need to have lots of time and be very good at programming (in multiple languages) for Ns3.
  • asked a question related to Computer Networking
Question
12 answers
Which tool will best suit DTN simulation?
2.NS2
3.QUALNET
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
7 answers
How to simulate CSMA-CA algorithm in MATLAB? There are several nodes in the network with its own state. For example, some node may be sending the data at the start of the simulation, some other nodes may be waiting to send the data, some nodes may be idle, some nodes may be waiting for ACK, etc. When some node is sending the data, at the same time the other nodes may be changing the state. Computer programs run sequentially. How it is possible to update the states of other nodes or back-off counters etc. at the same time when the transmission of data of a node is going on?
Of course, this is easy in NS2. But I am not at all familiar with NS2.
Relevant answer
Answer
I think this document may really helps: 
  • asked a question related to Computer Networking
Question
1 answer
Could you point me to a few research papers that use SDN Group Tables as forwarding means for multicasting?
Relevant answer
  • asked a question related to Computer Networking
Question
2 answers
There are many switches that allow class-based fair queuing to prevent starvation. I was wondering if there are switches that actually implement flow level fair sharing according to max-min fairness on a per-port basis?
  • asked a question related to Computer Networking
Question
3 answers
Dear all, 
Does the 802.11n technology have a mechanism to keep track of the number of devices connected to it? Information regarding what it is called or what to specifically search for to read up more about this mechanism would be welcomed.
Thank you
Relevant answer
Answer
Yes of course. On a Linux based Access Point you can use tools like IW to get information about connected devices like number of transmitted/received bytes, signal strength, etc. See below an example output of my AP (wlan0 interface). Here you see the statistics for each associated client station (identified by their MAC address).
1/ Call: iw dev wlan0 station dump
Station 70:d4:f2:90:40:6e (on wlan0)
inactive time: 1530 ms
rx bytes: 2272
rx packets: 27
tx bytes: 2280
tx packets: 17
tx retries: 0
tx failed: 0
signal: -47 [-75, -47] dBm
signal avg: -48 [-77, -48] dBm
tx bitrate: 21.7 MBit/s MCS 2 short GI
rx bitrate: 2.0 MBit/s
authorized: yes
authenticated: yes
preamble: short
WMM/WME: yes
MFP: no
TDLS peer: no
Station 90:18:7c:dd:68:bf (on wlan0)
inactive time: 120 ms
rx bytes: 12583
rx packets: 239
tx bytes: 8702
tx packets: 64
tx retries: 0
tx failed: 0
signal: -46 [-65, -46] dBm
signal avg: -44 [-62, -44] dBm
tx bitrate: 57.8 MBit/s MCS 5 short GI
rx bitrate: 72.2 MBit/s MCS 7 short GI
authorized: yes
authenticated: yes
preamble: short
WMM/WME: yes
MFP: no
TDLS peer: no
On client side you can also get important information like the quality of the WiFi link, AP ESSID/BSSID, ...
2/ Call: iwinfo wlan0 info
wlan0 ESSID: "tplink18"
Access Point: 64:66:B3:CE:21:DB
Mode: Master Channel: 6 (2.437 GHz)
Tx-Power: 20 dBm Link Quality: 64/70
Signal: -46 dBm Noise: -95 dBm
Bit Rate: 39.7 MBit/s
Encryption: none
Type: nl80211 HW Mode(s): 802.11bgn
Hardware: unknown [Generic MAC80211]
TX power offset: unknown
Frequency offset: unknown
Supports VAPs: yes
Best,
Tolja
  • asked a question related to Computer Networking
Question
1 answer
In a service chain, the data rate between two successive VNFs changes based on the type of VNFs. This is referred to as compression factors in the paper linked below. In such paper they do not provide any reference nor numbers for this. Is anyone aware of real data about compression factors?
  • asked a question related to Computer Networking
Question
3 answers
A new concept about the way to connect to VPNs, without pre-defined VPN tunnel or servers, no topology and data transfer through the cloud?
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
3 answers
Hi, I need the code in ns2 for the implementation of ATCP made by Jian Liu and Suresh Singh referred to in paper ATCP: TCP for Mobile Ad Hoc Networks. Could someone help me to know how or where to get it?
Greetings
Relevant answer
Answer
May be this URl help you to implement ATCP.
  • asked a question related to Computer Networking
Question
5 answers
cybercrime in organisations
effects of cybercrime
Relevant answer
Answer
A world that runs (increasingly) on data flows is also one that is (increasingly) vulnerable to cyber-attacks. Weak cyber-security can result in significant costs to business and also pose privacy, public safety, and national security risks. Globally, there are several million cyber-attacks every day, most of them automated. Cyber-attacks can jeopardize ICT infrastructure such as data centers and networks but also infrastructure that is managed by ICT such as airports, harbors, hospitals, power plants, smart cities, and smart grids. McAfee has estimated that cyber-crime costs the global economy about $400 billion in annual losses, this from consumer data breaches, financial crimes, market manipulation, and theft of intellectual property. See McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime.
  • asked a question related to Computer Networking
Question
5 answers
Anyone please can suggest me the best technique for reducing interference for M2M communication in heterogeneous networks? or software also in which I can implement my project
Relevant answer
Answer
If you refer to reducing intereferences at the PHY/MAC layer, it depends on the technology you are using. As an example, IEEE 802.15.4e introduced the Time synchronized Channel Hopping (TSCH) technique, that provides better reliability by changing the frequency used for the transmission/reception operations.
For more details on this technique, you can refer to the attached publication.
  • asked a question related to Computer Networking
Question
3 answers
I'm working on a system identification project.
How can I decide that the used input signal is suitable to identify an accurate mathematical model for the target plant?
for example, if I will use a PRBS signal, what is the suitable number of samples?
Relevant answer
Answer
Dear Islam Zead,
Please see Lecture Notes of Practical Issues of System Identification is linked :
CHOICE OF INPUT SIGNALS - eolss
 Here attached files for more information on the subject.
Best regards
  • asked a question related to Computer Networking
Question
3 answers
Hello. I have a mobile network with randomly placed base stations and users as illustrated in the figure. How do I perform disjoint clustering (dividing area into disjoint squares) to measure SINR?
  • asked a question related to Computer Networking
Question
3 answers
I am trying to complie my application for TOSSIM. Even though, it compiles for the hardware, it throws run time errors when executing 'make micaz sim'. I was wondering if it because I am using 802.15.4 MAC. Does Tossim support tkn154? (The given examples do not compile).
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
24 answers
Best areas for m. tech thesis
Relevant answer
Answer
In my humble opinion, delving into the reliable detection and defense of DDoS attacks is still an appealing area of research.
  • asked a question related to Computer Networking
Question
8 answers
Hi!
I have a network created with WiFi modules and I want to connect routers to that network so they can forward the messages to the corresponding module.
If someone could give me some information of how to start to configure the routers, it will be very helpful.
Relevant answer
Answer
The following steps for this connection:
1)  Determine the IP address and the Subnet Mask of our MASTER router.
2) Open your web browser and type the router’s IP address into the address bar. If you are using IE, you might want to add http:// to the address else IE may throw an error.
3) Once you are inside the router settings, switch to Wireless Settings and make a note of the Wireless mode, the SSID and the channel.
4) configure SLAVE, our second router. First reset the router to factory defaults by hard-pressing the reset button with a pin for about 10 seconds.
5) Open the browser again and type 192.168.1.1 which is likely the the default internet IP address of your SLAVE router. If you are not using a Linksys router, try 192.168.0.1 which is the default IP for Netgear and D-Link routers.
6) change the IP address of the SLAVE router to any free address in your LAN. For instance, if the IP address of MASTER router is 192.168.30.1, you can safely assign a fixed IP address of 192.168.30.2 to SLAVE. Also make sure that the Subnet mask is the same as determined in Step 1. Save the settings of the SLAVE router and close the browser window.
  • asked a question related to Computer Networking
Question
4 answers
how to apply pre-fetching code into our system/application
Relevant answer
Answer
A Prefetch Algorithm
Dear, check this link:
  • asked a question related to Computer Networking
Question
3 answers
CS375 
Relevant answer
Answer
may be can use same resault to os
There are basically three methods to avoid deadlocks:
Serial access. This is obviously not practical, but if you ensure that only one transaction at a time can access the database, there can be no chance of deadlock.
Atomic/pessimistic locking. Make sure any lock request locks all the resources needed during a transaction, or none at all. Most databases use optimistic locking, which involves gaps between requests for different resources. That creates an opportunity for another transaction to interleave their requests with yours and therefore possible deadlock.
Autocommit. A variation on the Atomic Locking strategy includes the practice of using autocommit transactions, so that each transaction can only lock one resource immediately as it uses it, then finishes its transaction and releases its lock before requesting any other resource. However, this doesn't quite work in some database implementations that can perform non-atomic locking against multiple indexes even for a single-statement transaction (cf. MySQL and UNIQUE KEY insert intention locks).
Ordered updates. If transactions always request resources in the same order (e.g. numerically ascending by the index value of the row being locked) then they won't deadlock. A detailed explanation of why this works can be found here: LCK07-J. Avoid deadlock by requesting and releasing locks in the same order"
  • asked a question related to Computer Networking