Science topics: Computer Networking
Science topic

Computer Networking - Science topic

Explore the latest questions and answers in Computer Networking, and find Computer Networking experts.
Questions related to Computer Networking
  • asked a question related to Computer Networking
Question
1 answer
Transform your AI models into seamless microservices! Our research and implementation showcases how you can operationalizing diverse AI models (any language, any framework) as microservices using open-source toolset so that the deployment is fast, efficient, and scalable.
Link to ResearchGate Paper Draft:
Relevant answer
Answer
That is so innovative and will like to key as I'm an advocate for transformation from traditional farming to adoption of the precision agricultural system .
  • asked a question related to Computer Networking
Question
1 answer
2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS 2024) will be held on September 27-29, 2024 in Yanji, China.
Conference Website: https://ais.cn/u/7n6Vva
---Call for papers---
The topics of interest for submission include, but are not limited to:
◕ Electronic Information Engineering
· Signal processing
· Wireless network
· Information system
· Next generation mobile communication technology
· Internet of things
......
◕ Computer Science
· Computer system
· Artificial intelligence
· Machine learning and deep learning
· Pattern recognition
· Computer vision and graphics
......
---Publication---
All accepted full papers will be published in the conference proceedings and will be submitted to EI Compendex / Scopus for indexing.
---Important Dates---
Registration Deadline: August 30, 2024
Final Paper Submission Date: August 30, 2024
Conference Dates: September 27-29, 2024
--- Paper Submission---
Please send the full paper(word+pdf) to Submission System:
Relevant answer
Answer
I am interrested
  • asked a question related to Computer Networking
Question
8 answers
I asked a question in Research Gate, which is related to NFV. Then, when I added the tags to the question, I did not find NFV as research topic neither the management and orchestration.
Is there a reasonable reason? If not, How to add NFV to research topics?
Relevant answer
Answer
Research Gate, like many academic and research platforms, has a vast array of topics, but they might not cover every specific niche or emerging field at any given time. Network Function Virtualization (NFV) is a relatively newer area in the grand scheme of networking technologies, so there are a few reasons why it might not be listed as a separate research topic:
Emerging Field: NFV, while increasingly important, is still evolving and might not yet be recognized as a distinct research category on some platforms.
Subsumed Under Broader Topics: NFV could be considered a part of larger, more established topics like Network Management, Cloud Computing, or Telecommunications.
Community-Driven Taxonomies: On platforms like Research Gate, the categorization of topics might be driven by user contributions and popular demand. If not many people are discussing NFV explicitly, it might not yet have its own tag.
To add NFV as a research topic on Research Gate, you can:
Reach Out to Research Gate: Contact their support or community team to suggest adding NFV as a topic.
Use Related Tags: In the meantime, use broader or related tags like 'Virtualization', 'Network Management', or 'SDN (Software-Defined Networking)' to reach the relevant audience.
Community Engagement: Actively participate in discussions related to NFV and similar topics to increase its visibility and the likelihood of it being recognized as a standalone topic.
Remember, academic and research communities often evolve based on the interests and activities of their members, so your contributions could help shape these categories!
  • asked a question related to Computer Networking
Question
3 answers
Please provide references if possible.
Relevant answer
Answer
Issues at the Data Link layer (Layer 2 of the OSI model) can indeed lead to the termination of a network connection. Here are a few key problems that could cause this:
Collision and Collision Domains: In networks like Ethernet, data packets can collide when multiple devices try to send data simultaneously. If collisions are too frequent, it might lead to connection termination.
MAC Address Issues: Every device on a network has a unique MAC (Media Access Control) address. Problems like duplicate MAC addresses can disrupt communication.
Frame Loss or Corruption: If frames (the data unit at Layer 2) are lost or become corrupted (due to interference, poor cabling, etc.), it can result in connection drops.
Switching Loops: These occur when there are multiple paths between switches but no mechanism like Spanning Tree Protocol (STP) to prevent loops. It can lead to network floods and eventually connection termination.
Buffer Overflow: If network devices' buffers are overloaded and can't process all incoming frames, it can result in dropped frames and connection issues.
For more in-depth information and references, you might want to check out resources like "Computer Networking: A Top-Down Approach" by Kurose and Ross or Cisco's networking documentation. They provide comprehensive insights into network layer issues and their impacts.
  • asked a question related to Computer Networking
Question
7 answers
can someone help me on this?
Relevant answer
Answer
Sure, let's talk about networking right at your desktop! It's actually quite interesting.
Runts, Late Collisions, CRC Errors: These are common network issues. Runts are packets that are smaller than the minimum allowed size. Late collisions happen when devices try to send data at the same time but collide. CRC (Cyclic Redundancy Check) errors occur when data gets corrupted during transmission.
Desktop NICs (Network Interface Cards): Most desktop NICs can detect these errors. They're pretty smart! They often have built-in mechanisms to identify such issues and usually provide some form of error reporting.
Building a Program: Creating a program to monitor these errors is definitely possible. You’d typically use network monitoring tools or software that can interface with your NIC. The program would access the NIC's statistics and error counters to report these issues.
How to Do It: You'd need to dive into network programming. Using APIs or libraries that allow access to low-level network device information is key. Languages like C or Python, along with libraries suitable for network programming, would be your tools of choice.
In short, yes, you can totally create a program to monitor runts, late collisions, CRC errors, and the like, right from your desktop. It’s a neat way to keep an eye on your network health!
  • asked a question related to Computer Networking
Question
4 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
Manula Manjitha Restarting a router, also known as the good old "turn it off and on again" method, is a surprisingly effective fix for several common network issues. Here's when you might want to give it a try:
Slow Internet Speeds: If your internet feels like it's moving at a snail's pace, a quick router restart can often kick things back into high gear.
Intermittent Connectivity: If you're losing connection every now and then, a restart can help reset the connection and might solve the issue.
Device Connectivity Problems: Sometimes specific devices struggle to connect to the network. Restarting the router can help clear any minor glitches causing this.
After a Network Change: Made any changes to your network settings? A restart helps ensure all changes are correctly applied.
Overheating: Routers can get tired too, especially if they're on 24/7. Restarting can give it a little breather and cool things down.
To identify these issues, keep an eye on your internet speed, check if your device keeps losing the Wi-Fi signal, or if a particular device can't connect. Also, if your router feels hot to the touch, it might need a quick break.
Remember, restarting your router is like giving it a mini-vacation; it often comes back refreshed and ready to go!
  • asked a question related to Computer Networking
Question
2 answers
Provide references if possible.
Relevant answer
Answer
IP header damage, or corruption, can happen due to various reasons, not just limited to physical layer issues. Let's break it down:
Physical Layer Issues: Sure, things like signal degradation, interference, or hardware malfunctions at the physical layer can corrupt packets, including their IP headers.
Transmission Errors: During data transmission over networks, especially in wireless or long-distance communications, data can get corrupted due to noise, signal loss, or even due to issues like packet collision.
Faulty Networking Hardware or Software: Sometimes, routers, switches, or even bugs in networking software can cause packet corruption.
Buffer Overflows: If a network device is overwhelmed with too much data, it might result in buffer overflows, leading to corruption.
As for identifying damaged IP headers, here's how it's typically done:
Checksums: IP headers include a checksum field. When a packet arrives, the receiving device recalculates the checksum and compares it with the one in the header. If they don't match, it indicates corruption.
Error-detecting Code: Some network protocols have built-in error detection mechanisms. For instance, Ethernet frames have a frame check sequence (FCS) to detect errors.
Network Tools and Diagnostics: Tools like Wireshark can help analyze network traffic and identify corrupted packets.
Anomalies in Network Performance: Sometimes, signs like increased packet loss rates or unusual network slowdowns can indicate issues with packet corruption.
For references, you might want to check out networking textbooks or authoritative resources like Cisco's networking guides, or academic papers on network reliability and data integrity. They can provide you with more in-depth information and case studies.
  • asked a question related to Computer Networking
Question
6 answers
Please elaborate latest Research topics in Networks for Masters level Computer Networks Student?
Relevant answer
Answer
Oh, diving into a Masters in Computer Networking? That's awesome! There are some really cool areas you could explore.
Here are a few hot topics:
5G and Beyond: It's all about super-fast internet speeds. Researching how 5G will change the way we connect and its future developments is pretty exciting.
Internet of Things (IoT): Imagine your fridge chatting with your phone! IoT is huge, and studying how to make these connections more secure and efficient is super relevant.
Network Security: With all the cyber threats out there, focusing on how to keep networks safe is like being a digital superhero.
Software-Defined Networking (SDN): This is like giving network administrators superpowers to manage networks with great flexibility and efficiency.
Quantum Networking: It's a bit like sci-fi, but it's real! Exploring how quantum principles can revolutionize data transfer is cutting-edge stuff.
Edge Computing: This is about processing data closer to where it's collected. It’s a big deal for things like self-driving cars.
Artificial Intelligence in Networking: AI can help networks self-repair and optimize. It's a bit like teaching the network to think for itself.
Cloud Networking: With everything moving to the cloud, figuring out how to make this more efficient and secure is a hot topic.
Blockchain in Networking: Beyond cryptocurrencies, blockchain can revolutionize how we secure and manage networks.
Wireless Sensor Networks: These networks are vital for collecting environmental data, and improving their efficiency and data processing can be a great research area.
Pick a topic that excites you the most. It's like choosing your own adventure in the tech world!
  • asked a question related to Computer Networking
Question
7 answers
Computer Networking
Relevant answer
Answer
Absolutely! When it comes to keeping large computer networks safe and running smoothly, think of it like a well-organized team. Each player has a role:
  1. Encryption: It's like a secret code. Only the intended receiver can understand the information sent over the network.
  2. Firewalls and Intrusion Detection: These are the vigilant goalkeepers, blocking unwanted or harmful traffic.
  3. Network Segmentation and Access Control: Imagine having VIP areas in a network. Only special passes (or permissions) allow access, making it easier to manage and protect.
  4. Regular Updates and Patching: This is like keeping the team’s playbook up-to-date. Fixing vulnerabilities before opponents can exploit them.
  5. Redundancy and Failover: It’s always good to have a backup plan. If one part fails, another takes over without missing a beat.
  6. Backups and Disaster Recovery: Think of it as a safety net. If something goes wrong, you can quickly get back on track.
  7. Monitoring and Analytics: It’s like having a coach who’s always watching the game, ready to spot and react to any unusual plays.
  8. User Education: Everyone on the team needs to know the basics of defense. Training users helps prevent avoidable mistakes.
  9. Physical Security: Don’t forget to lock the doors! Keeping the hardware secure is just as important.
  10. Following Standards and Best Practices: Playing by the rules and learning from the pros always helps the team stay ahead.
Combine all these, and you’ve got a network that’s not just strong in defense, but also reliable in performance. Just like a championship-winning team! 🏆💻
  • asked a question related to Computer Networking
Question
5 answers
Is there any resemblance in how "information flow" happens in humans (Molecular Biology/Neurology) and computers (Computer Networking)?
This question came to be after a note was made by a Computer Networking (CN) lecturer that no new methodologies for information flow in CN to be discovered.
I got interested to look for the answer in the Central Dogma of Molecular Biology, and still awaits further insights.
Relevant answer
Answer
Absolutely, there are some interesting parallels between how information flows in humans and in computers, although the mechanisms are quite different.
In humans, at the molecular biology level, information flow is governed by the Central Dogma, where DNA is transcribed into RNA, and then RNA is translated into proteins. These proteins are crucial for various cellular functions. In neurology, information flow involves neurons transmitting electrical and chemical signals across synapses, essentially how our brain communicates and processes information.
In computers, information flow happens through computer networking, where data is transferred using protocols over various types of physical and wireless networks. This is akin to a structured set of rules determining how data packets are sent, received, and interpreted.
The resemblance lies in the fundamental concept of transmitting information. In both humans and computers, information is encoded, transmitted, received, and then decoded. In humans, it's more about biochemical and electrical signals, while in computers, it's about digital data packets.
However, it's important to remember that the underlying processes and materials (biological vs. electronic) are fundamentally different. It's a fascinating area of study, with each field having its own complexities and advancements!
  • asked a question related to Computer Networking
Question
2 answers
If a person wants to start a career all over again to do research and phd from scratch in the area of wireless network, what are the basic skills and ideas needed for it
Relevant answer
Answer
To do research in wireless, computer networking, and the generation of mobile networks, you will need a strong foundation in the following skills:
  • Networking fundamentals: This includes a deep understanding of network protocols, architectures, and technologies.
  • Wireless communication theory: This includes knowledge of radio waves, propagation, and signal processing.
  • Programming: This includes skills in one or more programming languages, such as Python, C/C++, or Java.
  • Mathematical modeling and analysis: This includes the ability to develop and solve mathematical models to analyze and evaluate network performance.
  • Research methodology: This includes the ability to design, conduct, and analyze research experiments.
In addition to these core skills, it is also beneficial to have experience with the following:
  • Network simulation tools: This includes tools such as OPNET and NS-3, which can be used to simulate and evaluate network performance.
  • Cloud computing platforms: This includes platforms such as Amazon Web Services (AWS) and Google Cloud Platform (GCP), which can be used to deploy and manage large-scale networks.
  • Machine learning: This is a rapidly growing field that has the potential to revolutionize the design and operation of wireless and mobile networks.
Finally, it is important to be able to think critically and creatively, and to be able to communicate your ideas effectively to others.
Here are some specific examples of research topics in wireless, computer networking, and the generation of mobile networks:
  • Development of new wireless communication protocols and techniques
  • Design and analysis of network architectures for next-generation mobile networks
  • Optimization of network performance and resource utilization
  • Development of new applications and services for mobile networks
  • Security and privacy of wireless and mobile networks
  • Machine learning for network design, operation, and management
If you are interested in pursuing a career in research in wireless, computer networking, and the generation of mobile networks, I encourage you to develop the skills listed above and to explore the research topics that interest you most.
  • asked a question related to Computer Networking
Question
12 answers
Please elaborate latest Research topics in Networks for Masters level Computer Science Student?
Relevant answer
Answer
Dear Mubashir Iqbal,
During the SARS-CoV-2 (Covid-19) coronavirus pandemic, the scale of cybercriminal and hacking activities on the Internet increased. Therefore, I propose the following research topic for a thesis written in the field of computer networks: Improving security, procedures and techniques to protect sensitive information residing in internal and external computer networks connected to the Internet. Within the framework of this topic, the dominant trends of the said process of improving the cyber security of sensitive information in recent years through the application of new technologies typical of the current fourth technological revolution and technologies categorised as Industry 4.0 (such as artificial intelligence, machine learning, Blockchain, Big Data Analytics, etc.) can be examined.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Computer Networking
Question
43 answers
I have to simulate DCCP and UDP on NS2 , for my presentation and showing the differences in throughput, delay, and jitter. I want to know that NS 2.35 standalone supports DCCP simulation, do I have to write any code for this simulation?
I am new to NS2 n linux platform.
Help is appreciated.
Relevant answer
Answer
Fedora or Ubuntu both work well with NS
  • asked a question related to Computer Networking
Question
3 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
HTTPS://securityinstitute.com/netanalyst has retro free videos on Ethernet, Switches and Routing. The videos were part of NetAnalyst Network Forensic Certification I created and trained 50k and certified 3,500 professionals in 27 countries.
  • asked a question related to Computer Networking
Question
3 answers
What are the hot research topics in Network Security and Computer Networking?
Relevant answer
Answer
Dear Harith Ghanim Ayoub,
Look over the sources below:
Network Security
_____
Computer Network Security Problems and Solutions - Possible Threats
_____
  • asked a question related to Computer Networking
Question
4 answers
Please guide me about the difference between SINR threshold and Minimum discernable signal.
From my search I have come across the following.
1) A signal can be decoded if the SINR of the received signal is higher than the SINR threshold. Does it mean that we should not be concerned about the minimum required power, and that if the received signal satisfies the SINR threshold, it will be successfully decoded?
2) I also have come across the idea of minimum discernable level. For instance -70 db is considered acceptable for some types of communication.
Which of the two I should follow. As in the first case, I get very low transmit powers and still satisfy the SINR threshold, while the transmit powers in the 2nd case are way too high compared to the first case.
Relevant answer
Dear Gul Lakhta ,
There is something basic which you you would like to consider. From the point view of the signals, the interference signal acts in a similar way to noise. When it is added to the symbol signal it will cause that it may be falsely detected if its value is increases such that the combined signal will be located in the neighboring decision regions of the adjacent symbols in the constellation diagram. So the interference and noise have the same effect in the symbol error.
Therefore one speaks not only from S/N ratio but also from the S/(N+I).
The noise has Gaussian amplitude distribution while the interference may not have such distribution because of the nature of the interference.
The interference signal sources are normally known and then they can be subtracted from the composite signal. If after interference cancellation there will be residual interference it will be treated as a noise concerning its effect on the symbol error. In the sense that it will set the S/I +N minimum level to achieve specific bit error rate. You see if N=0 then S/I will set this minimum.
Hope I could answer satisfactorily you question.
Best wishes
  • asked a question related to Computer Networking
Question
13 answers
I'm a computer network undergraduate who is looking for an idea to do my final year project. Can anyone give your suggestions?
Relevant answer
Answer
You can explore intrusion detection in computer networks. Machine learning algorithms may assist you greatly in this.
  • asked a question related to Computer Networking
Question
4 answers
Please, l need help on how to research the topic
Relevant answer
Answer
Dear Vicky,
There exist many Research Areas Topics for Wireless Networking, such as:
1- For computer science as well as Communication Engineering researchers:
  • Wireless Networking: Interference Cancellation for Coexistence, and Machine Learning for Adaptation. ...
  • Wireless Security: Automatic Trust Establishment. ...
  • Security and Privacy in Dynamic Spectrum Sharing. ...
  • Security and Privacy Protection of Data Collection and Analysis.
2- For Communication Electronics (Physical layer) researchers:
  • physical layer technologies such as
  • Multiple Input Multiple Output (MIMO) systems (Antenna-oriented)
  • Multiple heterogeneous multi-hop networks
  • Interference cancellation (IC),
  • Novel Digital modulation techniques and Bandwidth efficiency
  • LiFi
  • asked a question related to Computer Networking
Question
12 answers
Digital Twin NEWS! -ISO-IEC-JTC1-SC41-IoT has launched its Digital Twin framework standardisation at its Nov. Plenary. -Edge Computing & Networking, from VLSI to AI and back, in real time when needed, is essential in this endeavour, with specifications from ETSI (ETSI-ISG-MEC: Multi-Access Edge Computing), 3GPP and One M2M supporting this goal. Cyberphysical systems benefit highly of Digital Twins for optimised fault-tolerant operation, verification and validation, simulation, in particular. -Combining functionalities tightly is a must: software, efficient/secure and sustainable data handling, computing and networking may have to be jointly managed, and possibly integrated at every node of a system using fully Digital Twins.
Speed and energy efficiency are available from VLSI chips integrating two functional layers as the IMX500 from Sony: -Data layer: interfacing to the real world (analogue to digital sampling, and digital to analogue rendering, "data I/O" layer)
-Processing layer ("logic" layer) e.g. with AI algorithms to build or prepare decisions from the data acquired, and conversely to manage and implement decisions into the physical world.
Use cases include smart city functionalities, cognitive design/manufacturing, autonomous systems/vehicles.
What is your view on Digital Twin, in what role is it best positioned? Design? Operation? Fault correction? Other?
Relevant answer
Answer
Good Q
  • asked a question related to Computer Networking
Question
7 answers
For quantum cryptography(QKD) simulation, which simulator is best one
  • asked a question related to Computer Networking
Question
11 answers
Thanks in advance for your replies.
  • asked a question related to Computer Networking
Question
3 answers
Due to the depletion of the global IPv4 address pool, some new Internet clients will not be able to get IPv4 adresses, but only IPv6 addresses. However the majority of the internet still uses IPv4 addresses. The IPv6 only clients should be able to communicate with the IPv4 only servers. For this problem, the combination of the DNS64 (RFC 6147) and NAT64 (RFC 6146) is a good solution.
We test different free software (also called open source) DNS64 and NAT implementations. As for DNS64, we tested BIND and TOTD.
(For our results, see: Gabor Lencse, Sandor Repas, "Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD," aina, pp.877-884, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013)
Besides these, we know also the PowerDNS and Unbound.
Can someone suggest other free software for DNS64 implementations?
Had anyone tested their performance and/or stability?
Relevant answer
Answer
Dear Colleagues:
Below is the up to date feasibility demonstration that you may like to have a look at.
Abe (2020-08-29 12:13 EDT)
  • asked a question related to Computer Networking
Question
5 answers
What are the methods used to assess the robustness of network with flow? How to model the flow (discrete entities with origin-destination routes) in a network.
Relevant answer
Answer
Can we say that robustness = size of the largest connected component/size of the network? Apparently we need to see the result of the robustness after several attacks.
  • asked a question related to Computer Networking
Question
6 answers
I was looking for any link or something where it shows basic to advance computer networking.
How everything thing works like ISP,router, DNS, Server, DHCP and more to make it easy to understand.
Thank you.
  • asked a question related to Computer Networking
Question
8 answers
https://www.amazon.com/Um-Cabo-Verdiano-Pelo-Mundo-Portuguese/dp/0955944023 Um Cabo-verdiano pelo Mundo é um apanhado de factos e sentimentos vividos pelo autor que, tendo nascido no Paul, Santo Antão, Cabo Verde, chegou à idade da reforma nos seus serviços e vivencias através dos tempos, nos Estados Unidos da América. Durante a sua vida ensinou em vários continentes contactando assim com vários povos e culturas procurando sempre dar o seu melhor não só através do ensino como também nas comunidades onde exercia as suas funções. Hoje revive com alegria e também com muita saudade tudo o que encontrou, tudo o que viu, tudo o que fez nunca esquecendo as pessoas que pelo caminho encontrou. 📷Mundo é um apanhado de factos e sentimentos vividos pelo autor que, tendo nascido no Paul, Santo Antão, Cabo Verde, chegou à idade da reforma nos seus serviços e vivencias através dos tempos, nos Estados Unidos da América. Durante a sua vida ensinou em vários continentes contactando assim com vários povos e culturas procurando sempre dar o seu melhor não só através do ensino como também nas comunidades onde exercia as suas funções. Hoje revive com alegria e também com muita saudade tudo o que encontrou, tudo o que viu, tudo o que fez nunca esquecendo as pessoas que pelo caminho encontrou.
Um Cabo-Verdiano Pelo Mundo (Portuguese Edition) (Portuguese) Paperback – April 30, 2009
by Salazar Ferro (Author)
Falecimento do Professor António St.Aubyn
22/04/2016 - 16:24No dia 18/04/2016, em Lisboa, aos 79 anos📷
Com profunda tristeza, a Divisão de Informática vê partir o Professor António St.Aubyn, Professor Emérito da Universidade Técnica de Lisboa, Instituto Superior de Agronomia, e o primeiro Presidente do Centro de Informática do ISA (CIISA), atualmente DI.
Nascido a 10 de março de 1937, na Ribeira Brava, São Nicolau, Cabo Verde, o Professor St.Aubyn licenciou-se e doutorou-se pela Universidade de Coimbra, tendo tido uma intensa atividade académica e científica nas áreas da matemática e da estatística, da qual resultaram diversas publicações científicas.
Tendo ingressado no Instituto Superior de Agronomia no ano letivo de 1974/1975, onde foi Professor Catedrático desde 1979, e durante muitos anos Presidente do Departamento de Matemática do ISA, onde teve um papel preponderante, não só na criação do próprio departamento, mas também no lançamento dos seus cursos de Mestrado e Doutoramento, o Prof. St.Aubyn foi também docente nas Faculdades de Ciências das Universidades de Coimbra e Lisboa, no Instituto Superior de Economia e Gestão, no Instituto Superior Técnico e na Universidade Lusíada.
Esteve ainda ativamente envolvido em diversas sociedades científicas, nomeadamente na Sociedade Portuguesa de Matemática, de que foi Presidente, na Sociedade Europeia de Matemática e na Sociedade Portuguesa de Estatística.
Figura muito estimada no seio da comunidade cabo-verdiana, esteve ativamente envolvido nos movimentos pela independência do país, e mais tarde no desenvolvimento do ensino da Matemática em Cabo Verde, a convite do seu Ministério da Educação. Foi ainda membro fundador da Academia das Ciências e Humanidades de Cabo Verde.
Intimamente ligado aos processos de informatização da antiga Universidade Técnica de Lisboa, integrou em 1981 a Comissão Informática da UTL, que tinha como objetivo a renovação das infraestruturas de cálculo das escolas da UTL.
Já no ISA, e após a sua criação em 1984, impulsionou o CIISA ao longo de mais de uma década, durante a qual se fez a transição da era dos mini-computadores e seus terminais de acesso, para a era da micro-informática, das redes de computadores, e da Internet.
Para sempre ligado à história do Centro de Informática, na memória ficará alguém cuja visão desempenhou um papel fundamental para que o ISA fosse, nomeadamente no contexto da UTL, de alguma forma pioneiro na adoção das chamadas Novas Tecnologias, que haveriam de se revelar determinantes, não apenas no apoio às atividades científicas e académicas, mas para todo o funcionamento da instituição.
📷
he Cape Verde International Days on Mathematics 2017ArticleFull-text available
  • February 2018
  • 📷Delfim F. M. Torres
  • 📷Ricardo Almeida
  • 📷Paulino Lima Fortes
  • 📷Dorota Mozyrska
DownloadRecommendFollowShareOs desafios do planeamento estratégico: o caso da􀂌􀂊􀂜􀂘 Universidade de Cabo VerdeArticle
  • January 2014
  • 📷Paulino Lima Fortes
  • Bio || Bio Paulino Lima Fortes é licenciado em Matemática (ensino) pela Universidade de Évora (1989). Fez estudos pós-graduados em Mathématiques Théoriques (Geometria, Topologia, Álgebra e Física Matemática) na Universidade de Dijon, França (1993-1995). É doutorado em Matemática área de Geometria, pela Universidade de Évora (2005). É professor auxiliar na Universidade de Cabo Verde, onde ingressou em 1989, onde desenvolve atividades de ensino e investigação nas áreas de Análise, Topologia, Geometria e Física-Matemática, tendo proferido conferências no âmbito da história do pensamento científico. Áreas de Interesse || Current Research
    1. Geometria e Topologia.
    2. Modelação Matemática.
    3. Pensamento Geométrico e espacial.
    4. Artigos
      1. O conceito de corte e a construção do contínuo: uma abordagem histórica, Revista de Ciência e Tecnologia, nº1,Edições Uni-CV, 2013.
      2. Livros
      3. Fundamentos de Geometria Não-Standard, Edições Uni-CV.
      4. Reuniões Científicas || Scientific Meetings Selecção de conferências/comunicações
      5. On some convex topologic concepts in topological vector spaces, XXI Oporto Meeting in Geometry, Topology and Physics, Instituto Superior Técnico, Lisboa, 2015.
      6. Em torno dos paradoxos de Zenão de Eleia: interpretações standard e não-standard, Jornadas Luso-Espanholas de Filosofia da Ciência, CFFCUL, Lisboa, 2014.
      7. Pistas e despistes no ensino da Geometria, Jornadas sobre o ensino da Matemática e da Língua Portuguesa, Universidade de Cabo Verde, 2013.
      8. A descoberta do bosão de Higgs, um triunfo do Modelo Standard, Reitoria da Universidade de Cabo Verde, Praia, 2012.
      9. A recuperação de informação geométria a partir de uma núvem de pontos, Departamento de Engenharias e Ciências do Mar, Universidade de Cabo Verde, 2011
      10. .http://cfcul.fc.ul.pt/equipa/docs/2014/Paulino%20Lima%20Fortes_cv.pdf
      11. https://www.researchgate.net/profile/Gastao_Frederico/research
      12. Gastao S. F. Frederico currently works at Federal University of Ceará, Brazil. Gastao does research in Calculus of Variations, Optimal Control, Fractional Calculus and EDP. Their most recent publication is 'Noether-type theorem for fractional variational problems depending on fractional derivatives of functions'.… Read moreLanguages
        • English
        • French
        • Portuguese
        • DisciplinesCosmologyApplied MathematicsMechanical EngineeringAerospace EngineeringControl Systems EngineeringSkills and expertise (38)MATLAB SimulationModeling and SimulationControl TheoryNumerical AnalysisEngineering, Applied and Computational MathematicsSystem ModelingMathematical AnalysisMathematical ModellingNonlinear AnalysisMechanical EngineeringView allStats overviewResearch Research overviewView all
        • 32Research items
        • 0Projects
        • 0Questions
        • 1Answer
        • Featured researchMost recommended in the last month📷Sourceψ-Hilfer pseudo-fractional operator: new results about fractional calculusArticleFull-text available
        • April 2020
        • 📷Jose Vanterler
        • 📷Gastao S. F. Frederico
        • 📷Edmundo Capelas de Oliveira
        • 74 Reads
        • 1 Recommendation
        • DownloadRecommendFollowShare📷SourceNoether-type theorem for fractional variational problems depending on fractional derivatives of functionsPreprintFile available
        • August 2019
        • 📷Matheus J. Lazo
        • 📷Gastao S. F. Frederico
        • 📷P. M. Carvalho-Neto
        • 25 Reads
        • DownloadRecommendFollowShare📷SourceNoether-type theorem for fractional variational problems depending on fractional derivatives of functionsArticleFull-text available
        • August 2019
        • Applicable Analysis
        • 📷Matheus J. Lazo
        • 📷Gastao S. F. Frederico
        • 📷P. M. Carvalho-Neto
        • 82 Reads
        • 2 Recommendations
        • DownloadRecommendFollowShare📷SourceNoether theorem for action-dependent Lagrangian functions: conservation laws for non-conservative systemsPreprintFile available
        • June 2019
        • 📷Matheus J. Lazo
        • 📷Juilson Paiva
        • 📷Gastao S. F. Frederico
        • 70 Reads
        • 1 Recommendation
        • DownloadRecommendFollowShare📷SourceNoether theorem for action-dependent Lagrangian functions: conservation laws for non-conservative systemsArticleFull-text available
        • June 2019
        • Nonlinear Dynamics
        • 📷Matheus J. Lazo
        • 📷Juilson Paiva
        • 📷Gastao S. F. Frederico
        • 38 Reads
        • 1 Citation
        • https://www.researchgate.net/profile/Telma_Silva DownloadRecommenatured research📷SourceExistence, uniqueness, stability and asymptotic behavior of solutions for a mathematical model of atherosclerosisArticleFull-text available
        • December 2015
        • Discrete and Continuous Dynamical Systems - Series S
        • 📷Jorge Tiago
        • 📷Rafael Santos
        • 📷Adélia Sequeira
        • 📷Telma Silva
        • 233 Reads
        • 5 Citations
        • 1 Recommendation
        • DownloadRecommendFollowShareRecently read📷SourceMathematical Modeling of Atherosclerotic Plaque Formation Coupled with a Non-Newtonian Model of Blood FlowConference PaperFull-text available
        • July 2013
        • The Cape Verde International Days on Mathematics 2013
        • 📷Jorge Tiago
        • 📷Telma Silva
        • 📷Adélia Sequeira
        • 📷Rafael F. Santos
        • 310 Reads
        • 10 Citations
        • 1 Recommendation
        • DownloadRecommendFollowShareMost recommended in the last monthModeling of the Early Stage of Atherosclerosis with Emphasis on the Regulation of the Endothelial PermeabilityArticle
        • April 2020
        • Journal of Theoretical Biology
        • 📷Telma Silva
        • 📷Willi Jäger
        • 📷Maria Neuss-Radu
        • 📷Adélia Sequeira
        • 15 Reads
        • 1 Recommendation
        • Full-text requestedRecommendedFollowingShareMathematical Analysis and Numerical Simulations for a Model of AtherosclerosisChapter
        • December 2016
        • 📷Telma Silva
        • 📷Jorge Tiago
        • 📷Adélia Sequeira
        • 88 Reads
        • 1 Citation
        • Request full-textRecommendFollowShareMost cited in the last monthMathematical modeling of atherosclerotic plaque formation coupled with a non-Newtonian model of blood flowArticle
        • January 2013
        • 📷Telma Silva
        • 📷Adélia Sequeira
        • 📷R.F. Santos
        • 📷Jorge Tiago
        • 21 Reads
        • 9 Citations
        • Request full-textRecommendFollowShareProjectsThe Cape Verde International Days on Mathematics 2020 https://www.researchgate.net/profile/Ivanilda_Cabralhttps://www.researchgate.net/publication/331991393_Astronomy_for_development_in_Portuguese-speaking_countries https://www.facebook.com/robert.sousa.161 https://www.researchgate.net/profile/Robert_De_Sousa Doutor em Matemática e Aplicações, Mestre em Estatística e Gestão de Informão
        • Antonio Afonso Delgado
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
10 answers
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
Relevant answer
Answer
Most trend work is the cybersecurity defence algorithm over 5G
  • asked a question related to Computer Networking
Question
3 answers
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
Relevant answer
Answer
C/N = 20 log 10 [Vc/ Vn]
  • asked a question related to Computer Networking
Question
4 answers
I am working with SDN to manage flows in a network. I wanted to experiment/know if there is a way I can simulate different radios(Bluetooth,Wifi,Zigbee) which work in the same ISM band to better manage the whole environment. Any help is appreciated. Also best wishes for the new year
Relevant answer
Dear Kaustubh,
I think the best way to manage the wireless communication in the ISM band is to use the techniques of the cognitive radio systems. So one has a radio which can sense communicate with control center and get a decision and a connection information from the center. There is the compressive sensing techniques to reduce the sensing signal load.
You can find many many papers when you make a literature survey.
Best wishes
  • asked a question related to Computer Networking
Question
10 answers
Hey everyone
i want to know what is simpler computer networking topic than other topic Or in other words
less complex than other
can anybody help me?
Relevant answer
Answer
Topology and OSI model
  • asked a question related to Computer Networking
Question
4 answers
Please suggest me some link that might help to write python code that can measure the delay of a specific path (the path that I am interested) using pox as a controller. Though I have found opennetmon in https://github.com/TUDelftNAS/SDN-OpenNetMon and tried with this one and its not working. So I need some alternative way that might help me.
Thank you
Relevant answer
Answer
Md. Billal Hossain can u find the code for measuring the Delay??? i am also working on the same area can u suggest me the pox code for measuring delay?
  • asked a question related to Computer Networking
Question
7 answers
If table is like can we draw venn diagram by this input?
variable          value r1               value r2
a                        20                         45
b                         10
c                          39                        1
d                                                      37
e                            98                     27
Relevant answer
Answer
you can use this online tool DiVenn which will generate a nice graph https://divenn.noble.org
  • asked a question related to Computer Networking
Question
4 answers
Greedings I am interested, as my scientific field for PhD or research, to be the privacy to the internet. I also want to do it on Japanese soil via some scholarship (eg. MEXT). So can you suggest me some Japanese univercities that do research on this topic either directly? (eg. via cyberceririty department or a common CS department that does lots of computer networking papers)
Relevant answer
Answer
I made the following master thesis:
And I want to continue the project into PhD as part of a whole plan to continue it for making a public-to-use system. Also I want to use it as a stepfoot in order for further PhD studies in Japan.
So I wanted to know which Univercities in Japan have related fields in order to continue the research.
  • asked a question related to Computer Networking
Question
43 answers
There are many vanet simulators available, I want to know specifically from GrooveNet and Nuctns simulator which one is best 
Relevant answer
Answer
Matlab
  • asked a question related to Computer Networking
Question
8 answers
i want guidance specific to computer networking point of view, mostly i find material related to physical layer which are mostly related to the electronics field.
so i requested to the experts that they guide me at what topic i start my research which are closely related to the computer networking. in 5G I want to doing my research on massive devices handling and energy efficient algorithms.
Relevant answer
yes , why no't you could contact me as well .
  • asked a question related to Computer Networking
Question
5 answers
What is meant by the "Physical Layer" in Satellite Communications?
As well as how it is different from the 7 layers OSI model of computer networking?
It would be a great help if you could give me some ideas.
Thank you in advance.
Relevant answer
Answer
In addition to what Radwa answered, in the 7-layer OSI model, the physical layer is layer 1. That's the layer which describes how the bits are transferred over the medium. In the case of satellite, it will typically be PSK or 16-QAM at most, single carrier, to achieve robustness with the least demands on transmit power.
The next layer up in the OSI model is the data link layer, which describes how the data frames are arranged. Such as MAC addresses, the type of frame being transmitted (meaning what the payload consists of), the size of the payload, payload size limits, and frame error checking.
So in principle, one can conceive of a satellite link only being different from other links, such as Ethernet let's say, at layer 1. And all the upper layers, from data link on up t application, being the same. Although frequently, satellite links use MPEG2-TS at layer 2, as opposed to Ethernet or other.
  • asked a question related to Computer Networking
Question
29 answers
Currently, I am MSC candidate in Computer Networking and I need hot research area, so who can help me? I am confusing with to find it and I need your support
Relevant answer
Answer
Dear Guyo Mamo,
see my list of Top 10 Networking Trends. I hope you find something interesting for you on this list.
Much success and best regards
Anatol Badach
  • asked a question related to Computer Networking
Question
7 answers
I am comparing the performance of AODV, DSDV & TORA. I used AWK following AWK script for measure the average throughput, end-to-end delay and packet delivery ratio. It works well for aodv and dsdv, but it can not work for TORA. What are the AWK scripts for TORA for measuring above parameters.
Relevant answer
Answer
Do you want the theoretical answer for M/M/1 ? Or do you want to measure it in a simulator?
  • asked a question related to Computer Networking
Question
1 answer
I want to simulate a model on cloudsim traffic latency and topology of data center and its proximity to customers .. can anybody guide me some tutorials or documentation about it
  • asked a question related to Computer Networking
Question
5 answers
can you guys give me advice
Relevant answer
Answer
yes, nice answer
  • asked a question related to Computer Networking
Question
3 answers
I was wondering if Facebook uni-cast or multicast an ongoing live video streaming to a group of users. For example, if a user joins a live stream, will he/she get a separate uni-cast or multicast stream.
Relevant answer
Answer
I believe that if you join a Facebook Live video after the live event has started, you will enter in the middle or the "current" location.
However, people watching the stream will not be perfectly synced. Different instances of the stream may be a few seconds before or after each other.
I would still call this multicasting.
  • asked a question related to Computer Networking
Question
38 answers
Currently working on my Master Thesis proposal, I want to figure out the trends and hot research topic in Network Security and computer networking which i can pursue in following years.
Relevant answer
Answer
Thank you Prof. Walter Baluja García
  • asked a question related to Computer Networking
Question
4 answers
I have been searching for some research article to find the benefits of both OTTs and ISPs to collaborate for QoE but I couldn't find some good article which has addressed it clearly. Any help in this regard is highly appreciated.
Arslan
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
10 answers
How can we differentiate message-oriented protocols and stream-oriented protocols?
Explanation with examples would be highly appreciated.
Relevant answer
Answer
TCP is a stream oriented protocol and UDP is a message-oriented protocol.
TCP receives the stream of bytes from application layer protocols and divide it in to segments and pass it to IP. But UDP receives already divided or grouped bytes of data from application protocols and add UDP headers which will become datagram and send it to IP, then application layers has the burden of dividing the streams of data in to messages when they run on top of UDP .
  • asked a question related to Computer Networking
Question
3 answers
I assign a semester project to groups of students in my networking classes. As part of that assignment, I have students evaluate the financial feasibility of that project. The approach I have been taking is to have students identify whether or not the network will serve as a supporting or primary function per Porter's Value Chain. If a primary function (such as say, Netflix), I argue that students should focus on more traditional financial metrics like ROI, NPV, etc. If however, the network acts as a support function, then measures such as Total Cost of Ownership or Network Cost of Ownership might be more appropriate. This is not a perfect approach but it has been a way to let theory drive the decision. But, I am curious as to other approaches used and the justification for using such approaches short of stating it as an assumption of the client.
Relevant answer
Answer
Make sure that the total cost of the proposed project you undertake are less than the total benefits resulting from the project. You could simply add up the costs, and then add up your expected revenue increases and cost savings over the next few years, and compare the two.
However, if you did that, you'd be ignoring the fact that many of the costs will be incurred at the beginning of the project, while many of the revenues or cost savings will occur later, over a period of months or, more likely, years.
We've reviewed a number of more formal ways to evaluate the costs or benefits that a major purchase or project will bring . The most commonly used include:
  • payback period analysis
  • accounting rate of return
  • net present value
  • internal rate of return
Each of these methods has its advantages and drawbacks, so generally more than one is used for any given project. And no financial formula, or combination of formulas, should be used to the exclusion of common sense.
A project may "fail" your tests under some or all of these methods, but you might decide to go forward with it anyway because of its value as part of your long-range business plan.
  • asked a question related to Computer Networking
Question
5 answers
Dear All,
I am wondering if there are some mathematical models to correlate amount of network traffic to operational network parameters such as throughput, delay and packet loss for a given link capacity. Consider that traffic is TCP based traffic.
Further details with reference to multimedia applications, I am considering two applications VoIP and HTTP Adaptive video streaming.
Any useful suggestion in this regard is highly appreciated.
Regards
Arslan
Relevant answer
Answer
Dear Nour,
the mathematical models, which measure the relationship between the traffic intensity and the operational parameters (throughput, delay and packet loss rate), I have created for the performance evaluation of Data Link Protocols in the years 1982-1984. I have assumed that the stochastic events on the data link have the Markov property. The effect of different acknowledgment strategies was investigated. My performance evaluation models for DataLink protocols can be found in the articles
( in German) listed here.
Such models could be created for the virtual connections on the transport layer to examine the performance of the flow control and the congestion control with TCP.
Data Flow Control with TCP
Good luck and best regards
Anatol Badach
Analytical Performance Evaluation of a Class of Communication Protocols for Computer Networks.
Analytical Performance Evaluation for Communication Protocols with Single Acknowledgments.
Look here: Fig. 1 and Fig. 2: Markov graph model
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part I. A stochastic model of the behavior of investigated class of
communication protocols
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil I. Ein stochastisches Modell des Verhaltens untersuchter Klasse von
Kommunikationsprotokollen
Look here: Fig. 1, Fig. 2 and Fig. 3: Markov graph models
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil II. Leistungskenngrößen von Kommunikationsprotokollen und ihre Analyse
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part II. Performance characteristics of communication protocols and
their analysis
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
  • asked a question related to Computer Networking
Question
3 answers
I am trying to find the optimal sampling rate of the passive probe for QoE monitoring of a video streaming application where I am considering the network load as an objective function which should be minimized. I wonder if there are some concrete work in literature related to it. Any useful information will be highly appreciated. Thanks 
Relevant answer
  • asked a question related to Computer Networking
Question
5 answers
i've noticed that majority of engineers are focusing on the technical side of development of telecom equipment either in mobile communication or any other sub-field , compared to computer networking ,engineers do their best to develop new security solutions ! 
i don't understand why there's always this  lack of interest in security field in telecom  !! 
Relevant answer
Answer
I think maybe we are just talking about different protocol layers? It's a bit like asking why IEEE 802.3, the Ethernet standard, doesn't address security. Security is built on top of Ethernet. At least, that's the typical way of implementing security.
The other point is that a telecom does need to implement security measures, but this is primarily to protect itself. For example, their system management messaging, routing tables and routing protocols, have to be secure, to prevent a hacker from disrupting the system. But it doesn't do much good for the telecom to secure user traffic, if ultimately, at the edges, the traffic has to be sent in the clear. If a user of the telecom wants security, that user must install a solution that protects traffic end to end, from inside his PC or smartphone, all the way to inside the PC or smartphone at the other end. Or in the case of an enterprise network, security could be implemented until the link is inside that enterprise's "secure enclave," perhaps not all the way to the end system. So for example, the enterprise may deploy secure tunnels, through a telecom network, where the end points of those secure tunnels are inside secure enclaves.
Otherwise, anyone along that path would be able to monitor the communications. And there is no reason for a user to trust the telecom itself, ultimately, if that user needs security.
Security can and is implemented at any protocol layer. From the standpoint of a user, though, any security measure that is not end to end would be of questionable value. That's why people use Transport Layer Security so often, when dealing with communications across telecom or other network services. It's security built over the telecom link, carried transparently by the telecom or by the digital network.
  • asked a question related to Computer Networking
Question
29 answers
Kindly guide me about choosing best simulator for dynamic routing in Adhoc networks.
Can we use Opnet simulation for high level work?
Thanks
Relevant answer
Answer
NS2 is no longer used and active development stopped 7 years ago. So its best you use NS3 or NetSim or OPNET. And like you say you need to have lots of time and be very good at programming (in multiple languages) for Ns3.
  • asked a question related to Computer Networking
Question
12 answers
Which tool will best suit DTN simulation?
2.NS2
3.QUALNET
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
7 answers
How to simulate CSMA-CA algorithm in MATLAB? There are several nodes in the network with its own state. For example, some node may be sending the data at the start of the simulation, some other nodes may be waiting to send the data, some nodes may be idle, some nodes may be waiting for ACK, etc. When some node is sending the data, at the same time the other nodes may be changing the state. Computer programs run sequentially. How it is possible to update the states of other nodes or back-off counters etc. at the same time when the transmission of data of a node is going on?
Of course, this is easy in NS2. But I am not at all familiar with NS2.
Relevant answer
Answer
I think this document may really helps: 
  • asked a question related to Computer Networking
Question
3 answers
Dear all, 
Does the 802.11n technology have a mechanism to keep track of the number of devices connected to it? Information regarding what it is called or what to specifically search for to read up more about this mechanism would be welcomed.
Thank you
Relevant answer
Answer
Yes of course. On a Linux based Access Point you can use tools like IW to get information about connected devices like number of transmitted/received bytes, signal strength, etc. See below an example output of my AP (wlan0 interface). Here you see the statistics for each associated client station (identified by their MAC address).
1/ Call: iw dev wlan0 station dump
Station 70:d4:f2:90:40:6e (on wlan0)
inactive time: 1530 ms
rx bytes: 2272
rx packets: 27
tx bytes: 2280
tx packets: 17
tx retries: 0
tx failed: 0
signal: -47 [-75, -47] dBm
signal avg: -48 [-77, -48] dBm
tx bitrate: 21.7 MBit/s MCS 2 short GI
rx bitrate: 2.0 MBit/s
authorized: yes
authenticated: yes
preamble: short
WMM/WME: yes
MFP: no
TDLS peer: no
Station 90:18:7c:dd:68:bf (on wlan0)
inactive time: 120 ms
rx bytes: 12583
rx packets: 239
tx bytes: 8702
tx packets: 64
tx retries: 0
tx failed: 0
signal: -46 [-65, -46] dBm
signal avg: -44 [-62, -44] dBm
tx bitrate: 57.8 MBit/s MCS 5 short GI
rx bitrate: 72.2 MBit/s MCS 7 short GI
authorized: yes
authenticated: yes
preamble: short
WMM/WME: yes
MFP: no
TDLS peer: no
On client side you can also get important information like the quality of the WiFi link, AP ESSID/BSSID, ...
2/ Call: iwinfo wlan0 info
wlan0 ESSID: "tplink18"
Access Point: 64:66:B3:CE:21:DB
Mode: Master Channel: 6 (2.437 GHz)
Tx-Power: 20 dBm Link Quality: 64/70
Signal: -46 dBm Noise: -95 dBm
Bit Rate: 39.7 MBit/s
Encryption: none
Type: nl80211 HW Mode(s): 802.11bgn
Hardware: unknown [Generic MAC80211]
TX power offset: unknown
Frequency offset: unknown
Supports VAPs: yes
Best,
Tolja
  • asked a question related to Computer Networking
Question
1 answer
In a service chain, the data rate between two successive VNFs changes based on the type of VNFs. This is referred to as compression factors in the paper linked below. In such paper they do not provide any reference nor numbers for this. Is anyone aware of real data about compression factors?
  • asked a question related to Computer Networking
Question
3 answers
A new concept about the way to connect to VPNs, without pre-defined VPN tunnel or servers, no topology and data transfer through the cloud?
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
3 answers
Hi, I need the code in ns2 for the implementation of ATCP made by Jian Liu and Suresh Singh referred to in paper ATCP: TCP for Mobile Ad Hoc Networks. Could someone help me to know how or where to get it?
Greetings
Relevant answer
Answer
please send to me too.
  • asked a question related to Computer Networking
Question
5 answers
cybercrime in organisations
effects of cybercrime
Relevant answer
Answer
A world that runs (increasingly) on data flows is also one that is (increasingly) vulnerable to cyber-attacks. Weak cyber-security can result in significant costs to business and also pose privacy, public safety, and national security risks. Globally, there are several million cyber-attacks every day, most of them automated. Cyber-attacks can jeopardize ICT infrastructure such as data centers and networks but also infrastructure that is managed by ICT such as airports, harbors, hospitals, power plants, smart cities, and smart grids. McAfee has estimated that cyber-crime costs the global economy about $400 billion in annual losses, this from consumer data breaches, financial crimes, market manipulation, and theft of intellectual property. See McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime.
  • asked a question related to Computer Networking
Question
5 answers
Anyone please can suggest me the best technique for reducing interference for M2M communication in heterogeneous networks? or software also in which I can implement my project
Relevant answer
Answer
If you refer to reducing intereferences at the PHY/MAC layer, it depends on the technology you are using. As an example, IEEE 802.15.4e introduced the Time synchronized Channel Hopping (TSCH) technique, that provides better reliability by changing the frequency used for the transmission/reception operations.
For more details on this technique, you can refer to the attached publication.
  • asked a question related to Computer Networking
Question
3 answers
Hello. I have a mobile network with randomly placed base stations and users as illustrated in the figure. How do I perform disjoint clustering (dividing area into disjoint squares) to measure SINR?
  • asked a question related to Computer Networking
Question
3 answers
I am trying to complie my application for TOSSIM. Even though, it compiles for the hardware, it throws run time errors when executing 'make micaz sim'. I was wondering if it because I am using 802.15.4 MAC. Does Tossim support tkn154? (The given examples do not compile).
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
24 answers
Best areas for m. tech thesis
Relevant answer
Answer
In my humble opinion, delving into the reliable detection and defense of DDoS attacks is still an appealing area of research.
  • asked a question related to Computer Networking
Question
8 answers
Hi!
I have a network created with WiFi modules and I want to connect routers to that network so they can forward the messages to the corresponding module.
If someone could give me some information of how to start to configure the routers, it will be very helpful.
Relevant answer
Answer
The following steps for this connection:
1)  Determine the IP address and the Subnet Mask of our MASTER router.
2) Open your web browser and type the router’s IP address into the address bar. If you are using IE, you might want to add http:// to the address else IE may throw an error.
3) Once you are inside the router settings, switch to Wireless Settings and make a note of the Wireless mode, the SSID and the channel.
4) configure SLAVE, our second router. First reset the router to factory defaults by hard-pressing the reset button with a pin for about 10 seconds.
5) Open the browser again and type 192.168.1.1 which is likely the the default internet IP address of your SLAVE router. If you are not using a Linksys router, try 192.168.0.1 which is the default IP for Netgear and D-Link routers.
6) change the IP address of the SLAVE router to any free address in your LAN. For instance, if the IP address of MASTER router is 192.168.30.1, you can safely assign a fixed IP address of 192.168.30.2 to SLAVE. Also make sure that the Subnet mask is the same as determined in Step 1. Save the settings of the SLAVE router and close the browser window.
  • asked a question related to Computer Networking
Question
4 answers
how to apply pre-fetching code into our system/application
Relevant answer
Answer
A Prefetch Algorithm
Dear, check this link:
  • asked a question related to Computer Networking
Question
3 answers
CS375 
Relevant answer
Answer
may be can use same resault to os
There are basically three methods to avoid deadlocks:
Serial access. This is obviously not practical, but if you ensure that only one transaction at a time can access the database, there can be no chance of deadlock.
Atomic/pessimistic locking. Make sure any lock request locks all the resources needed during a transaction, or none at all. Most databases use optimistic locking, which involves gaps between requests for different resources. That creates an opportunity for another transaction to interleave their requests with yours and therefore possible deadlock.
Autocommit. A variation on the Atomic Locking strategy includes the practice of using autocommit transactions, so that each transaction can only lock one resource immediately as it uses it, then finishes its transaction and releases its lock before requesting any other resource. However, this doesn't quite work in some database implementations that can perform non-atomic locking against multiple indexes even for a single-statement transaction (cf. MySQL and UNIQUE KEY insert intention locks).
Ordered updates. If transactions always request resources in the same order (e.g. numerically ascending by the index value of the row being locked) then they won't deadlock. A detailed explanation of why this works can be found here: LCK07-J. Avoid deadlock by requesting and releasing locks in the same order"
  • asked a question related to Computer Networking
Question
16 answers
Hello!
I am trying to do a VANET simulation in VEINS (OMNET++ and SUMO) and I would like to know how to start.
Thanks in advance.
Relevant answer
Answer
I would recommend using Veins and the steps to follow are very well pointed out above by Karim Emara: start with the OMNeT++ Tic Toc tutorial (https://omnetpp.org/doc/omnetpp/tictoc-tutorial/) and follow the Veins tutorial (http://veins.car2x.org/tutorial/) that will also help you installing the necessary software and tools. Most of the questions that you will have are most likely already answered in Veins FAQ (http://veins.car2x.org/documentation/faq/) or on Stackoverflow (http://stackoverflow.com/questions/tagged/veins).
  • asked a question related to Computer Networking
Question
4 answers
how could i measure snmp overhead. i have a monitoring platform which will poll the device but i now wish to monitor the overhead of doing so.
Relevant answer
Answer
i am using sar which is a performance tool in linux but now i need to generate load on my network. any ideas to generate load?
  • asked a question related to Computer Networking
Question
7 answers
How to train neural network with  the genetic algorithm in Java?
Relevant answer
Answer
Hi
You can use GA for weighting Neural Network
  • asked a question related to Computer Networking
Question
3 answers
I am searching for a research direction in network. I decide to focus on CDN. Any good suggestions?
Relevant answer
Answer
Hello Jinkun Geng
the CDI Interconnection ist one hot topic in CDN. Attached have you some papers as bases of CDN and CDNI - sorry: only in German
Many success and all the best
Anatol Badach
  • asked a question related to Computer Networking
Question
5 answers
I am working on developing a patch for DHCP server software. Please let me know from where I can get source code for an open source dhcp server.
Relevant answer
Answer
You may consider open source DHCP Server from Internet Systems Consortium available at https://www.isc.org/downloads/
  • asked a question related to Computer Networking
Question
3 answers
I simulated a model with 5 clients requesting with 1000 bytes from 1 server. Server responses with 100000 bytes of data. Tests for 128ms, 64ms,32ms,1,1000000ms frequency dwell time and results show that on FHSS, dwell time affects utilization.
Can anyone approve?
Relevant answer
Answer
Albert is of course correct. I think the only thing I can add is that the key here is "affects network utilization". In a wide sense utilization can be thought of as the fraction of allocated spectrum necessary to transfer a certain amount of information within a fixed time.
Network utilization in practice can be extremely varied due to the traffic loading (information to be carried). Consequently although the dwell time will of course reduce the potentially available capacity (and therefore increase utilization) you may find that this is not particularly significant compared with the uncertainty in the traffic load itself that is necessary to carry the information. So you should also consider whether any gains that can be made in squeezing the dwell time through better electronics to increase capacity are significant enough to be worth the effort in the context of practical traffic engineering. This does not only include capacity sizing and prioritization but also the use of compression (from header compression to video compression). For example a 10% gain in capacity is fairly trivial compared with the gains that can be made in the higher layers to reduce (or better prioritise) traffic loads.
So I guess proper consideration of your question depends on how wide a view you are taking of the problem. If you are providing a command and control system you may consider things differently compared with a radio manufacturer or a mobile phone operator.
  • asked a question related to Computer Networking
Question
3 answers
hello everyone
Can you guide me that how we can configure any node in NS-2.34 as a WimAX node and how v can configure any node as a cellular tower?
Relevant answer
Answer
  • asked a question related to Computer Networking
Question
4 answers
I have a BN model in which there are four nodes. They are Job Arrival Rate, CPU Usage, Memory Usage and Resource Utilization. CPU usage and memory usage are dependent on Job Arrival Rate. Memory usage is also dependent on CPU Usage. Resource Utilization is dependent of CPU Usage and Memory usage. I have marginal probabilities of all the nodes. I want to calculate conditional probability table of the last node i. e., Resource Utilization which is dependent on both CPU Usage and Memory Usage. Please help me out.
Relevant answer
Answer
Hi, it is very easy. Use GeNIe software which is free. Create your network with the nodes that you just mentioned. Define the relationship between nodes using the Arc (from parent to child node). Then in each node's properties define the probabilities. Then GeNIe will calculate the conditional probabilities automatically. It is a very convenient software for any types of BN modeling. If you need more details on how conditional probabilities are calculated in BN or how to use GeNIe, read my paper "A Bayesian network model for evacuation time analysis during a ship fire". I am sure it is very useful. 
Regards,
Parvaneh
  • asked a question related to Computer Networking
Question
12 answers
Which is the best mobile network simulator QualNet/GloMoSim/OMNeT++/OPNET ?
Relevant answer
Answer
NS3 
  • asked a question related to Computer Networking
Question
3 answers
Hi All,
ETX is calculated based on the packet delivery ratio of forward (denoted df) and reverse direction (denoted dr) of a link, i.e. ETX = 1/(df x dr). df, dr are determined by counting dedicated probe packets successfully received.
my question is: in cooja , where or in which file Dr and Dr are calculated ?
Relevant answer