Science topic

Computer Networks - Science topic

Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing
Questions related to Computer Networks
  • asked a question related to Computer Networks
Question
4 answers
I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
Relevant answer
  • asked a question related to Computer Networks
Question
1 answer
Provide references if possible.
Relevant answer
Answer
IP headers are protected by checksums, for this very reason. The causes of header corruption are many, even going back to the sending node itself. Noise bursts, viruses, bad connection, bad solder joint, many possible reasons.
This might give you ideas for checking out solutions:
  • asked a question related to Computer Networks
Question
3 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
HTTPS://securityinstitute.com/netanalyst has retro free videos on Ethernet, Switches and Routing. The videos were part of NetAnalyst Network Forensic Certification I created and trained 50k and certified 3,500 professionals in 27 countries.
  • asked a question related to Computer Networks
Question
3 answers
It's great if you can explain how to identify those issues as well.
Relevant answer
Answer
Dear Manula Manjitha,
The data below provide a good overview of practical reasons requiring a router restart:
  • asked a question related to Computer Networks
Question
6 answers
can someone help me on this?
Relevant answer
Answer
Since you mentioned running on standard desktops using a desktop NIC, Jianye Tian suggested of a soft WRT is a good one. Looks like OpenWRT may fit the bill, see:
A look at OpenWRT discussion forums seems to indicate that it can detect things like CRC errors. Quick disclaimer: I have never tried this myself.
Another approach to find CRC errors is to get interface error stats from the nearest switch or router. That would get you more visibility to other network segments/VLANs than just the one collision domain that a single desktop would be connected to.
  • asked a question related to Computer Networks
Question
8 answers
I need a security dataset with challenges, I mean I want the accuracy to be low so that I can enhance it using ML techniques. I tried several datasets but they already have high accuracy without enhancement.
Relevant answer
Answer
Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning", IEEE Access, April 2022, DOI: 10.1109/ACCESS.2022.3165809
  • asked a question related to Computer Networks
Question
2 answers
Please provide references if possible.
Relevant answer
Answer
Arash Ahmadi Esfahani Except for broadcast storms, others are not typical scenarios right?
  • asked a question related to Computer Networks
Question
2 answers
If you can provide references if possible, that will be a great help.
Relevant answer
Answer
David Lide Yeah but what are the protocols used to read those data. For an example FLPs are used to do auto negotiation. Like wise how are the other things are read or managed by the NIC?
  • asked a question related to Computer Networks
Question
13 answers
I am a PhD student in computer science, and I want to apply reinforcement learning methods to computer network problems and get results in order to publish a research paper in international journals, but I am not very good in mathematics, so my question is: can I model a problem and apply reinforcement learning to problems without needing mathematics?
Relevant answer
Answer
Mathematics is like the backbone to Reinforcement Learning. Strong command on topics like Probability and Statistics with a proper understanding of some mathematical models can take you very far ahead in Reinforcement Learning. Some scheduling techniques in wireless packet delivery require deep knowledge of Markov chain, Deep Reinforcement Learning.
  • asked a question related to Computer Networks
Question
15 answers
Would you please suggest to me a Q1 or Q2 subscription journal (without any publishing fee) in various areas of computer networks and the Internet of Things with a fast-processing time and no limit to publishing the number of free pages (unlike IEEE IoT, IEEE Systems, IEEE Sensors, etc.)? Unfortunately, journals such as Computer Networks, Computer Communications, and FGCS have slowed down a lot in the last year or two, especially in the process of initial review by editors and assignment of reviewers.
Relevant answer
Answer
Ali Seyfollahi Check out ACM Transactions on Sensor Networks too (TOSN).
  • asked a question related to Computer Networks
Question
1 answer
Can anyone please guide me regarding this journal by suggesting some journals which were previously written so that i can study them and i will try to publish my own journal
Relevant answer
Answer
The easiest thing to to would be to get access to the IEEE and ACM databases and do an keyword search. If you don't know how to do this, or don't have access, assuming you are a student, I'd suggest askin the research librarian at your academic institution. If you are not a student, I'd suggest gaining membership in these affiliations; electronic access to their databases is part of membership.
  • asked a question related to Computer Networks
Question
1 answer
Mechanisms leading to the spastic movement disorder (SMD) as a positive symptom of the upper motor neuron syndrome are not yet fully understood. All, the underlying disease, the (spinal) lesion level, the lesion location within the brain, affected descending (parapyramidal) motor tracts, disrupted sensory input etc. seem to be more or less relevant for the emergence of a SMD.
Is there any research on computational network models of spinal/supraspinal spasticity on the base of current neuroanatomical and neurophysiological data known to be of relevance for the develoement of a spastic movement disorder?
Relevant answer
Answer
See Project:
"A Computational Model for Epidural Electrical Stimulation of Spinal Sensorimotor Circuits "
  • asked a question related to Computer Networks
Question
6 answers
Recently I am looking for SDN issues, but still no idea which issues should focus.
Relevant answer
Answer
Thank you so much for your suggestion and sharing
Jehad Ali
  • asked a question related to Computer Networks
Question
13 answers
I'm a computer network undergraduate who is looking for an idea to do my final year project. Can anyone give your suggestions?
Relevant answer
Answer
You can explore intrusion detection in computer networks. Machine learning algorithms may assist you greatly in this.
  • asked a question related to Computer Networks
Question
5 answers
Please help me with the following formulation.
I want to calculate transmit power that can satisfy a given SINR threshold on the receiver side.
My formulation is as follows:
SINR=Received_Power/(Interference+Noise) Eq. 1
If SINR Threshold (SINR_th) is known, we can get the Required_Received_Power and thus the "Required_Transmit_Power" power as follows:
SINR_th=Required_Received_Power/(Interference+Noise) Eq. 2
We know that
Received_Power=Transmit_Power/Pathloss; Eq. 3
OR
Required_Received_Power=Required_Transmit_Power/Pathloss; Eq. 4
Substituing "Required_Received_Power" in Eq.2 with the right hand side of Eq.4, we get
SINR_th=(Required_Transmit_Power/Pathloss)/(Interference+Noise) Eq. 5
OR
Required_Transmit_Power=SINR_th x (Interference+Noise) x Pathloss Eq. 6
Please advise whether this formulation is correct or not as I am getting wrong results.
Thank you!!!
Relevant answer
Answer
Muhammad Hamza El-Saba Thank you very much for your answer.
  • asked a question related to Computer Networks
Question
2 answers
I am looking for latest research topics in the field of LISP protocol. I am doing master's in computer networks and now want to research in LISP protocol. Please guide me regarding this.
Thank you
Relevant answer
Answer
Latest work on LISP till 2 years ago was related to blockchain support using LISP control plane. https://ieeexplore.ieee.org/abstract/document/8761995. you could contact the authors for further guidance. Basically, due to the separation of location and identity, LISP can we used for enhancing privacy.
  • asked a question related to Computer Networks
Question
10 answers
Hello and Happy new year , I am currently searching a topic for my thesis. I study Computer Science with netwotks specialization . I am looking for a topic which maintains a balance between theoretical and practical-experimental research . The stuff I would like to be included, are: C, Java , NS2 , Matlab, signal processing, Packet tracer, general network management and I would like to learn a modern skill which will be usefull in a future job. Thank you in advance.
Relevant answer
Answer
below few topics for master thesis in computer networks
•Investigate bandwidth measurement techniques that require low overhead, few probing messages, and good estimation results of bottleneck and available bandwidth.
•The research can be based on Modified Bprobe, Cprobe, Aprobe, pathchar, ping, traceroute tools.
•The techniques are critical in server/ISP selection, billing, network control, network monitoring, and real-time streaming applications.
  • asked a question related to Computer Networks
Question
4 answers
i am working on research about mobility aware service migration in fog computing network. i dont know how to use genetic algorithm? and how can i convert it into matlab code?
i need to know if there are other any available tools? how can i simulate genetic algorithm?
how can i relate between it and iFOGSIM environment?
Relevant answer
Answer
I'm also having similar issue. I want to Integrate an ACO algorithm developed in Matlab with iFogSim. Anyone with an idea of how this could be a achieved?
  • asked a question related to Computer Networks
Question
4 answers
I am using the abbrvnat style, but I want the label to appear next to each reference. For example, I want to have:
[Atzori et al., 2010] L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A Survey. Computer networks, 54(15):2787-2805, 2010.
Instead of :
L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A Survey. Computer networks, 54(15):2787-2805, 2010.
  • asked a question related to Computer Networks
Question
5 answers
I want to create wireless nodes and simulate a communication between them.
Relevant answer
Answer
Can see the demo in wireless communication by using a helper function
  • asked a question related to Computer Networks
Question
4 answers
Who did work in Complex computer network optimization problems?
Relevant answer
Answer
two main things:
- Links or nodes subject to failure
  • asked a question related to Computer Networks
Question
9 answers
internet of things
Relevant answer
Answer
It is base on the Internet.
Kindly, you can click the link below to find a complete, new, and full answer:
Or refer to this:
Nidhal Kamel Taha El-Omari, “Cloud IoT as a Crucial Enabler: a Survey and Taxonomy”, Modern Applied Science, The Canadian Center of Science and Education, published by Canadian Center of Science and Education, Canada, p-ISSN: 1913-1844, e-ISSN: 1913-1852, DOI:10.5539/mas.v13n8p86, 13(8):86-149, 2019.
  • asked a question related to Computer Networks
Question
25 answers
Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
Relevant answer
Answer
Dear Md Adil
Your question is like saying how necessary is air for humans?
Anyway, computer networks have organized to make the world a small village.
regatds
  • asked a question related to Computer Networks
Question
5 answers
I understand that CAN is a serial communication protocol where there is not source authentication. This itself brings a lot of troubles, but what else is missing?  
Relevant answer
Answer
  • asked a question related to Computer Networks
Question
3 answers
Due to the depletion of the global IPv4 address pool, some new Internet clients will not be able to get IPv4 adresses, but only IPv6 addresses. However the majority of the internet still uses IPv4 addresses. The IPv6 only clients should be able to communicate with the IPv4 only servers. For this problem, the combination of the DNS64 (RFC 6147) and NAT64 (RFC 6146) is a good solution.
We test different free software (also called open source) DNS64 and NAT implementations. As for DNS64, we tested BIND and TOTD.
(For our results, see: Gabor Lencse, Sandor Repas, "Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD," aina, pp.877-884, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013)
Besides these, we know also the PowerDNS and Unbound.
Can someone suggest other free software for DNS64 implementations?
Had anyone tested their performance and/or stability?
Relevant answer
Answer
Dear Colleagues:
Below is the up to date feasibility demonstration that you may like to have a look at.
Abe (2020-08-29 12:13 EDT)
  • asked a question related to Computer Networks
Question
3 answers
I want to simulate Bcube,porland topology with NS-3 simulator,but I don't know how can I start point and don't know if it's feasible. If someone did it,please tell me.Thanks a lot.
Relevant answer
Answer
Hi colleague
Nutshell as Simulation Toolkit for Modeling Data Center Networks and Cloud Computing...
Find the following URL may help you:
Regards....
  • asked a question related to Computer Networks
Question
6 answers
I want to undergo the traning programme on Simulation for Wireless Sensor Netowks.
Relevant answer
  • asked a question related to Computer Networks
Question
5 answers
I am using the omnet++ as simulators network for vanet by using veins so how do I implement a new routing protocol for veins where use 802.11p.
Relevant answer
Answer
Liang zhao did you figure out how to implement routing protocols in veins ?
  • asked a question related to Computer Networks
Question
7 answers
Dear Concern,
I need a kind help from u that is your guidance to publish a book by a good publisher.
i have prepared the complete Contents you can visit on www.nripesheschool.com
i want to publish two books
1. Fundamental of PHP and MYSQL
2. Fundamental of Computer Networks
Kindly guide me for the same.
Regards.
Relevant answer
Answer
Publish your book at respectful publishers like Springer, Elsevier, Sage, Emerald.
  • asked a question related to Computer Networks
Question
3 answers
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
Relevant answer
Answer
C/N = 20 log 10 [Vc/ Vn]
  • asked a question related to Computer Networks
Question
11 answers
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
Relevant answer
If you want to develop one you can do it using python. There are many tutorials on youtube that shows how to develop one from scratch.
ex - Udemy - Learn Python & Ethical Hacking From Scratch
  • asked a question related to Computer Networks
Question
9 answers
Any suggestions on how to parse such large pcap.gz files of telescope data from caida.
If I use tcpdump or tshark, it is taking too long to parse them.
Also, I have a big list of filter prefixes, tcpdump throws an error of too long filter file. How to take care of that?
Relevant answer
Answer
Follow
  • asked a question related to Computer Networks
Question
8 answers
There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. Researchers, What are the best deeper options to handle this security and management?
Relevant answer
Answer
Securing your network can be done in different ways, without going in details (you can look up the different terms yourself).
Hardening network (use firewalls / IPS), implement segmentation (subnetting), Update software, Monitoring (NIDS, HIDS, read logging).
Check list: - change standard passwords - remove unused users & guest - remove unneeded services (f.e.Wi-Fi, bluetooth) - block unneeded ports - update software (on network devices like routers, firewalls etc) - use smart firewall settings to enable the needed services and block unwanted traffic. Last but not least test your network by periodic pentesting.
  • asked a question related to Computer Networks
Question
3 answers
Topic: Viral marketing in social network, data mining, influence maximization, computer network, big data, network optimization, influence maximization
Relevant answer
Answer
Elsevier list, go to View More on Journal Insights, it shows the list of information like, Review Speed, impact factor. See the Review speed and submit article based on review speed.
Hope this would be helpful.
  • asked a question related to Computer Networks
Question
3 answers
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
Relevant answer
Answer
go through this link ...it will give you better idea
  • asked a question related to Computer Networks
Question
3 answers
I am looking for dataset related to network devices such as routers, switches, servers and access points In performing network prediction
Relevant answer
Answer
Hi,
A application concerns the problem of predicting the size of a flow and ... to improve routing, load balancing and scheduling in computer networks. ... process regression and online Bayesian Moment Matching on three datasets of real traffic.
  • asked a question related to Computer Networks
Question
3 answers
I am working on trust computation using machine learning techniques in matlab. Can someone provide me with the code on recommendation attacks to that I can apply machine learning techniques in detect the malicious activities in VANET
Thanks 
Elvin
Relevant answer
Answer
I am working on VANET Project and I am looking for Matal coding so please help me out
  • asked a question related to Computer Networks
Question
6 answers
I am working on a project to compare Software Defined network and conventional network using performance metrics such as throughput, delay, and latency; but I have not been able to use OPNET Modeller to simulate the OpenFlow SDN. I need help and if possible an instructor regarding this.
Relevant answer
Answer
How can make security settings for APS in opnet project
  • asked a question related to Computer Networks
Question
1 answer
Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN VHO decisions are taken based on parameters which characterize both the coverage and the traffic load of the WLANs. Both HHO and VHO processes consist of three steps: handover requirement estimation, target network selection and handover execution [8]. Networks such as LTE, WLAN and WiMAX provide multiple choices for network access. Moreover, roaming terminals are equipped with multiple radio interfaces for heterogeneous wireless network access. Handoff Decision is very crucial process because it will be helpful in determining when and where to perform handoff and to select the best network in the Heterogeneous environment without any degradation in the performance.
Papers:
Obayiuwana, E. and Falowo, O.E., 2017. Network selection in heterogeneous wireless networks using multicriteria decision-making algorithms: a review. Wireless Networks, 23(8), pp.2617-2649.
Ndashimye, E., Ray, S.K., Sarkar, N.I. and Gutiérrez, J.A., 2017. Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: a survey. Computer Networks, 112, pp.144-166.
Obayiuwana, E. and Falowo, O.E., 2017. Network selection in heterogeneous wireless networks using multicriteria decision-making algorithms: a review. Wireless Networks, 23(8), pp.2617-2649.
Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.
Baghla, S. and Bansal, S., 2014, November. Performance of VIKOR MADM method for Vertical Handoffs in Heterogeneous networks with various weighting methods. In 8th International Conference on Advanced Computing and Communication Technologies ICACCT 2014 (pp. 29-34).
Omheni, N., Zarai, F., Obaidat, M.S., Smaoui, I. and Kamoun, L., 2014. A MIH-based approach for best network selection in heterogeneous wireless networks. Journal of Systems and Software, 92, pp.143-156.
Bhosale, S. and Daruwala, R., 2014. Multi-criteria Vertical Handoff Decision Algorithm Using Hierarchy Modeling and Additive Weighting in an Integrated WLAN/WiMAX/UMTS Environment-A Case Study. KSII Transactions on Internet & Information Systems, 8(1).
Relevant answer
Answer
The most recent advances and standard performance assessment metrics for efficient vertical handoff in heterogeneous network by CEAM Protocol are
From an architecture perspective, the HetNet can be viewed as encompassing conventional macro radio access network (RAN) functions, RAN transport capability, small cells and Wi-Fi functionality, that are increasingly being virtualized and delivered in an operational environment where span of control includes data center resources associated with compute, networking and storage.
In this framework, self-optimizing network (SON) functionality is essential to enable order-of-magnitude network densification with small cells. Self-configuration or ‘plug and play’ reduces time and cost of deployment, while self-optimization then ensures the network auto-tunes itself for maximum efficiency as conditions change. Traffic demand, user movements and service mix will all evolve over time, and the network needs to adapt to keep pace. These enhanced SON capabilities will therefore need to take into account the evolving user needs, business goals and subscriber behaviours.
Importantly, functions associated with HetNet operations and management take earlier SON capability that may have only been targeted at a single domain and/or technology, and expand it to deliver automated service quality management across the entire HetNet.
Wireless
  • asked a question related to Computer Networks
Question
1 answer
computer networks
Relevant answer
Answer
yes, in the hubs.
  • asked a question related to Computer Networks
Question
7 answers
I am running the simulation for multi-hop network to observe the effect of the different number of hops on the CBR throughput. I ran the simulation for hops = 1, 2, 3, 4 and 5. After running the simulation, I have observed that CBR throughput remains almost same for the values 1, 2 and 3 but when I increased hops to 4, the CBR throughput decreased slightly. The most surprising aspect of the simulation results was that when I increased the hop count to 5, the CBR throughput jumped to 73 % from 67 %.
I fail to understand this upward trend as I thought that due to different aspect such as duty cycling, nodes synchronization, the throughput should decrease when increasing the hop count but the results for counts count 5 were surprising. Can someone explain me why is the reason for this behavior? 
Relevant answer
Answer
Any related work on Throughput utilization of WSN for worst case situations?
  • asked a question related to Computer Networks
Question
6 answers
There is a way to model computer networks (in terms of latency, bandwidth, packet size, etc.) through (stochastic?temporized?) automata? If I look for networked automata, I only find automata about "local" network of interacting components (e.g., cells)
Relevant answer
Answer
An interesting question. I am glad that interesting reflections, responses and conclusions have emerged that may be an inspiration to continue research in this area. Therefore, I am still reading the answers, following the interesting discussion. Best wishes
  • asked a question related to Computer Networks
Question
13 answers
As we know that, throughput is amount of transferred data for a specific time. I want to fix data size and make time variable. The definition will be "The amount of time required to transfer a specific amount of data". What is the term for this?
Thanks in advance.
Relevant answer
Answer
Dear Anik Islam Abhi,
this is "transfer / transmission time". I would use the following terms:
Transmission over a data link: transmission time; packet / data transmission time; (mean) packet / data transmission time
(mean => variable packet / data length)
When transmission over multiple data links (delays in nodes) I would use the terms: transfer time; packet/data transfer time; (mean) packet/data transfer time
Best regards
Anatol Badach
  • asked a question related to Computer Networks
Question
2 answers
Dears;
Pleas to provide a simple manner to decrease the network latency as soon as possible for quick paper printing response in the university computer lab.
Relevant answer
Answer
Thanks dear Robert Mahar ;
very good information...
  • asked a question related to Computer Networks
Question
12 answers
Which simulation tool is better for implementing a secure routing protocol in Wireless Sensor Networks Ns3 or Omnet++?
Relevant answer
Answer
i thind omnet++ is a better choice.
its flexible and support every thing you want.
  • asked a question related to Computer Networks
Question
4 answers
Hi,
I am looking for journals with good impact factor that cover the scope of modern technology impact (e.g. computers or computer networks) on saving the environment.
regards.
Relevant answer
Answer
Dear Salim,
these journals might be suitable:
IEEE Internet of Things Journal,
Sensors — Open Access Journal
Journal of Sensors,
IEEE Internet of Things Journal,
Journal of Sensor and Actuator Networks,
EURASIP Journal on Wireless Communications and Networking.
See also the list of journals A-Z:
Best regards
Anatol Badach
  • asked a question related to Computer Networks
Question
42 answers
I wanted to know which are the network simulators related to development of security protocols where the simulation codes can directly be implemented into hardware!! all suggestions are welcome.
Relevant answer
Answer
For me, I suggest to use Cisco Packet Tracer if you want to create a simulation much comparable to reality. But If you are looking forward to develop an algorithm, I suggest you follow another software.
  • asked a question related to Computer Networks
Question
9 answers
I know NS and GloMoSim for Ad-hoc networks. Is there a simulator used for home networks?
Relevant answer
Answer
Defiantly, Cisco Packet Tracer is very good solution for Home Networks
You can checkout the following tutorials:
  • asked a question related to Computer Networks
Question
11 answers
I need to prepare a presentation on a base paper (>2015) in Computer Networks for my class work. I also need to implement the paper. The problem is, I am kind of a beginner in CN. So, I am not able to select a topic which I can understand completely (especially the math). Can someone help me out with a topic which is relatively recent and also takes my personal contraints into consideration ?
Relevant answer
Answer
IPv6 for IoT
  • asked a question related to Computer Networks
Question
11 answers
the above problem will be experimented using simulation especially riverbed modeller.
Relevant answer
Answer
1. Video streaming over computer networks with high quality
2. QoS monitoring
  • asked a question related to Computer Networks
Question
3 answers
i want to work on game theory so i want to know the recent work on this topic
Relevant answer
Answer
Dear Saifullah Khan,
One of the most popular and entertaining topics in game theory is the
( Life and death game of John Conway) based on cellular automaton.
Best regards
  • asked a question related to Computer Networks
Question
7 answers
Hello researchers,
Related to your research/experience field, what are the technologies you simulate often and you can judge that this task is complicated, tedious, or time consuming ?
  • asked a question related to Computer Networks
Question
4 answers
"How do we can detect in advance, that the Mobile Node will detach from the first subnet to another subnet within the same domain ? i.e the mechanism?"
"In Distributed Mobility Architecture, for example in Distributed PMIPv6, how do we detect that the MN will detach from MAG1 to MAG2 in advance?"
  • asked a question related to Computer Networks
Question
5 answers
I want to implement various WSN attacks and then to analyze network performance. Is there any WSN attack simulator available. How can we implement WSN attacks 
  • asked a question related to Computer Networks
Question
16 answers
Sci journal
Relevant answer
Answer
Modern physic letter A -world scientific Visual computer Springer
  • asked a question related to Computer Networks
Question
8 answers
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
  • asked a question related to Computer Networks
Question
4 answers
What techniques can be used to speed up reliable multicasting? For example, say a sender is delivering an object reliably to 10 known and fixed receivers over WAN. What can be done to decrease average completion times?
Relevant answer
Answer
Mohammad, if you go through the IETF RFCs on the subject of multicast, you should find that the subject is very much discussed on fundamental principles. So for example, unicast routing protocols, whether link state or distance vector, optimize the path based on link speeds (costs). And multicast trees are built secondarily, on top of these unicast routing protocols. That's how use of optimal paths is taken into account.
There are multiple options discussed, frequently, and the best one may depend on circumstances. For instance, if there are very many members of multicast groups in a partcular network, it might make more sense to begin with an overabundance of branches in the multicast trees, and then pare these down when it is determined that some of the braches are not necessary. Conversely, if multicast members are few and far between, it might make more sense to begin with a very parsimonious set of branches, and then add on to these when the individual members remain in the group.
I don't think much of this is specific to any one protocol implementation.
  • asked a question related to Computer Networks
Question
4 answers
No idea till now
Relevant answer
Answer
Do Cloud security framework and also cloud advanced database using nodejs and Angularjs
  • asked a question related to Computer Networks
Question
6 answers
Vehicaular Adhoc Network Routing Simulation
Relevant answer
  • asked a question related to Computer Networks
Question
5 answers
For mastery in Computer Networks
what books would you recommend?
Relevant answer
Answer
If you need to write networking code, as opposed to just knowing how it all works, the best book, in my opinion, is
"Unix Network Programming" by Stevens, Fenner, Rudoff.
ISBN 0-13-141155-1
  • asked a question related to Computer Networks
Question
3 answers
Does/can HDFS manage files across multiple geographically dispersed datacenters? What distributed file systems can be used for this purpose?
Relevant answer
  • asked a question related to Computer Networks
Question
3 answers
What is relation between Machine Intelligence and Smart Networks?
Relevant answer
Answer
Artificial Intelligence has been around for a long time – the Greek myths contain stories of mechanical men designed to mimic our own behavior. Very early European computers were conceived as “logical machines” and by reproducing capabilities such as basic arithmetic and memory, engineers saw their job, fundamentally, as attempting to create mechanical brains.
As technology, and, importantly, our understanding of how our minds work, has progressed, our concept of what constitutes AI has changed. Rather than increasingly complex calculations, work in the field of AI concentrated on mimicking human decision making processes and carrying out tasks in ever more human ways.
Artificial Intelligences – devices designed to act intelligently – are often classified into one of two fundamental groups – applied or general. Applied AI is far more common – systems designed to intelligently trade stocks and shares, or manoeuvre an autonomous vehicle would fall into this category.
Neural Networks – Artificial Intelligence And Machine [+]
Generalized AIs – systems or devices which can in theory handle any task – are less common, but this is where some of the most exciting advancements are happening today. It is also the area that has led to the development of Machine Learning. Often referred to as a subset of AI, it’s really more accurate to think of it as the current state-of-the-art.
The Rise of Machine Learning
Two important breakthroughs led to the emergence of Machine Learning as the vehicle which is driving AI development forward with the speed it currently has.
One of these was the realization – credited to Arthur Samuel in 1959 – that rather than teaching computers everything they need to know about the world and how to carry out tasks, it might be possible to teach them to learn for themselves.
The second, more recently, was the emergence of the internet, and the huge increase in the amount of digital information being generated, stored, and made available for analysis.
Once these innovations were in place, engineers realized that rather than teaching computers and machines how to do everything, it would be far more efficient to code them to think like human beings, and then plug them into the internet to give them access to all of the information in the world.
Neural Networks
The development of neural networks has been key to teaching computers to think and understand the world in the way we do, while retaining the innate advantages they hold over us such as speed, accuracy and lack of bias.
A Neural Network is a computer system designed to work by classifying information in the same way a human brain does. It can be taught to recognize, for example, images, and classify them according to elements they contain.
Essentially it works on a system of probability – based on data fed to it, it is able to make statements, decisions or predictions with a degree of certainty. The addition of a feedback loop enables “learning” – by sensing or being told whether its decisions are right or wrong, it modifies the approach it takes in the future.
Machine Learning applications can read text and work out whether the person who wrote it is making a complaint or offering congratulations. They can also listen to a piece of music, decide whether it is likely to make someone happy or sad, and find other pieces of music to match the mood. In some cases, they can even compose their own music expressing the same themes, or which they know is likely to be appreciated by the admirers of the original piece.
These are all possibilities offered by systems based around ML and neural networks. Thanks in no small part to science fiction, the idea has also emerged that we should be able to communicate and interact with electronic devices and digital information, as naturally as we would with another human being. To this end, another field of AI – Natural Language Processing (NLP) – has become a source of hugely exciting innovation in recent years, and one which is heavily reliant on ML.
NLP applications attempt to understand natural human communication, either written or spoken, and communicate in return with us using similar, natural language. ML is used here to help machines understand the vast nuances in human language, and to learn to respond in a way that a particular audience is likely to comprehend.
A Case Of Branding?
Artificial Intelligence – and in particular today ML certainly has a lot to offer. With its promise of automating mundane tasks as well as offering creative insight, industries in every sector from banking to healthcare and manufacturing are reaping the benefits. So, it’s important to bear in mind that AI and ML are something else … they are products which are being sold – consistently, and lucratively.
Machine Learning has certainly been seized as an opportunity by marketers. After AI has been around for so long, it’s possible that it started to be seen as something that’s in some way “old hat” even before its potential has ever truly been achieved. There have been a few false starts along the road to the “AI revolution”, and the term Machine Learning certainly gives marketers something new, shiny and, importantly, firmly grounded in the here-and-now, to offer.
The fact that we will eventually develop human-like AI has often been treated as something of an inevitability by technologists. Certainly, today we are closer than ever and we are moving towards that goal with increasing speed. Much of the exciting progress that we have seen in recent years is thanks to the fundamental changes in how we envisage AI working, which have been brought about by ML. I hope this piece has helped a few people understand the distinction between AI and ML. In my next piece on this subject I go deeper – literally – as I explain the theories behind another trending buzzword – Deep Learning.
Bernard Marr is a best-selling author & keynote speaker on business, technology and bigdata. His new book is Data Strategy. Toread hisfuture posts simply join his network here.
  • asked a question related to Computer Networks
Question
4 answers
Could anyone provide me examples of research opportunities in Cloud Computing and Network Functions Virtualization (NFV) together?
How could I work or conduct experiments using both?
Articles are also welcome.
Relevant answer
Answer
Dear Emanuel Coutinho,
the two concepts of cloud computing (CC) and NFV complement each other ideally and have an important significance for the IoT. The integration of CC and NFV in the IoT allows to create a variety of interesting new IoT services. In IoT, virtualized network features (that is, NFV instances) can be provided as a kind of mini-clouds (or micro-clouds). Mini-clouds in the IoT enable the realization of widely distributed and time-critical IoT services. In this case we speak of fog computing. Mini-Clouds (as NFV instances) can also be located in WSNs, this means at the edge of the Internet (in so-called endge components). This means edge computing.
The NFV instances provide intelligence. This intelligence makes it possible to realize a new type of computing, so-called cognitive computing, both in mini-clouds (Fog Computing) and in edge components (Edge Computing). This is especially important in the IoRT (Internet of Robotic Things).
Of great importance is the integration of SDN (Software Defined Networking) and NFV for the IoT. An SDN controller can be realized in a cloud. If a hierarchical structure of SDN controllers is required, this structure can be set up as a cloud hierarchy. The SDN switches can be implemented as NFV instances and provided as clouds. Consequently, one type of integration CC and NFV is the integration of SDN and NFV.
For the future container networking, the integration of SDN and NFV (in fact the integration CC and NFV) is of great importance. With Container Networking, the NFV instances can be transported in containers. Multiple distributed NFV instances can be orchestrated using SDN controllers. New Internet of Vehicles (IoV) services can be provided through container networking and orchestration of NFV mobile instances in Cluods and / or Mini Clouds (Fog). In this way, various IoV services can be organized to support autonomous driving.
When integrating CC and NFV, the concept of SFC (Service Function Chaining) can play an important role.
The literature sources listed here show some of these ideas.
Good luck and best regards
Anatol Badach
SDN/NFV-based Internet-of-Things
Orchestration of IoT Services
SDN-based IoT Framework with NFV Implementation
A SDN-IoT Architecture with NFV Implementation
A Software-Defined Approach for End-to-end IoT Networking
Container Network Functions
For the basic ideas of SDN, NFV and SFC see:
For SDN the figures 005455, 5466 and 5458 in:
For NFV the figures 007012, 7013 and 7017 in:
For SFC the figures 007101, 7102, 7103, 7105 and 7107 in:
  • asked a question related to Computer Networks
Question
3 answers
User space packet processing has been attracting more attention lately. Can you name some open source Software Defined NIC frameworks based on user space packet processing?
  • asked a question related to Computer Networks
Question
4 answers
When a new flow arrives at the edge of a WAN, what cost metrics have been proposed for selection of a path? Please assume single path routing.
Also, given different scheduling policies (e.g. Fair Sharing, SRPT and FCFS), what path selection cost metric can improve average completion times of flows?
Thank you!
Relevant answer
Answer
A metric for dynamic routing based on variational principles
  • asked a question related to Computer Networks
Question
3 answers
Besides using Group Tables, what approaches can be used to program forwarding trees into network switches? Assume a scenario similar to SDN where a controller installs forwarding rules on switches.
Relevant answer
Assuming your concern is about OpenFlow, what about adding multiple outputs to the same flow rule? https://www.sdntesting.com/can-an-openflow-switch-replace-a-tap-aggregator/
  • asked a question related to Computer Networks
Question
1 answer
I want to run simulation for BGP. So, does NS3 support BGP?
Relevant answer
Answer
  • asked a question related to Computer Networks
Question
6 answers
Could you point me to any paper, blog, website or presentation that focuses on datacenter or inter-datacenter traffic characteristics (with flow size, duration, inter arrival distributions)? I have not found but a few research papers that report datacenter traffic patterns.
Relevant answer
Answer
Thank you all for your answers. I read them all carefully and have written a summary of traffic properties in our latest paper (which is accepted to IEEE Communications Surveys and Tutorials):
Please also feel free to share your comments on the paper's page.
  • asked a question related to Computer Networks
Question
6 answers
what is the latest GUI simulation you are using in the field of wireless sensor networks and computer networks
Relevant answer
Answer
I am using ATDI from ICS Telecom, check it online, If you like it I can send it to you,,, best wishes
  • asked a question related to Computer Networks
Question
4 answers
I have been searching for some research article to find the benefits of both OTTs and ISPs to collaborate for QoE but I couldn't find some good article which has addressed it clearly. Any help in this regard is highly appreciated.
Arslan
Relevant answer
Answer
  • asked a question related to Computer Networks
Question
4 answers
Given a nice tree decomposition of width w of graph with n vertices, HAMILTONIAN CYCLE can be solved in time w^O(w ).n. Could anyone send me the papers related to finding Hamiltonian Cycle on nice tree decomposition in time w^O(w ) · n ?
Relevant answer
Answer
Thanks, Mahdi.
  • asked a question related to Computer Networks
Question
4 answers
Assuming we have an optical WAN backbone, how can it be detected if a link has failed? Is it high error rate? Smaller q-Factor? Please elaborate.
Relevant answer
Dear Mohammad,
Link failure is generally detected by optical receivers, not only for fiber cut but also for signal degradation (i.e., excessive BER). You may get more info in references like https://www.juniper.net/documentation/en_US/junos/topics/concept/otn-signal-degrade-monitoring-understanding.html or https://www.google.com/patents/US7826745.
Additionally, upon severe degradation or fiber cut a loss-of-light (LOL) alarm could be issued to NMS/OSS systems.
Best regards,
José Luis
  • asked a question related to Computer Networks
Question
5 answers
Can someone describe the steps to follow to simulate an architecture of intrusion detection based in MAS with Madkit platform?
Relevant answer
  • asked a question related to Computer Networks
Question
4 answers
Across different applications that run on datacenters, can you name applications that push multicast updates to multiple servers? Please provide name of software package for specific applications.
Relevant answer
Answer
System imaging applications routinely use multicast. Several ( hundreds ) target systems are started for imaging work, the imaging server streams out the image data via multicast. Hundreds of workstations at a time can be prepped or imaged int his way. This can be an in-data center function for prepping blade servers, for example.
Some routing schemes I have seen will distribute updates via multicast - the routing tables are essentially a database.
I have seen memcached plumbed to recieve updated via multicast.
Video distribution is another application. Encoders and decoders will join a multicast groups forming a distributed N-way video switcher.
I would not see where multicast is really the most heavily used feature in terms of the bulk of traffic for general computing - however when it is used it is vital.
  • asked a question related to Computer Networks
Question
5 answers
Dear All,
I am wondering if there are some mathematical models to correlate amount of network traffic to operational network parameters such as throughput, delay and packet loss for a given link capacity. Consider that traffic is TCP based traffic.
Further details with reference to multimedia applications, I am considering two applications VoIP and HTTP Adaptive video streaming.
Any useful suggestion in this regard is highly appreciated.
Regards
Arslan
Relevant answer
Answer
Dear Nour,
the mathematical models, which measure the relationship between the traffic intensity and the operational parameters (throughput, delay and packet loss rate), I have created for the performance evaluation of Data Link Protocols in the years 1982-1984. I have assumed that the stochastic events on the data link have the Markov property. The effect of different acknowledgment strategies was investigated. My performance evaluation models for DataLink protocols can be found in the articles
( in German) listed here.
Such models could be created for the virtual connections on the transport layer to examine the performance of the flow control and the congestion control with TCP.
Data Flow Control with TCP
Good luck and best regards
Anatol Badach
Analytical Performance Evaluation of a Class of Communication Protocols for Computer Networks.
Analytical Performance Evaluation for Communication Protocols with Single Acknowledgments.
Look here: Fig. 1 and Fig. 2: Markov graph model
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part I. A stochastic model of the behavior of investigated class of
communication protocols
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil I. Ein stochastisches Modell des Verhaltens untersuchter Klasse von
Kommunikationsprotokollen
Look here: Fig. 1, Fig. 2 and Fig. 3: Markov graph models
Analytische Leistungsbewertungen für eine Klasse von Kommunikationsprotokollen mit negativen
Quittungen SREJ und REJ. Teil II. Leistungskenngrößen von Kommunikationsprotokollen und ihre Analyse
Analytical performance evaluations for a class of communication protocols with negative
acknowledgments SREJ and REJ. Part II. Performance characteristics of communication protocols and
their analysis
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
Implications of different acknowledgment strategies for the behavior of communication protocols.
Implikationen unterschiedlicher Quittungsstrategien für das Verhalten von Kommunikationsprotokollen.
  • asked a question related to Computer Networks
Question
3 answers
I am trying to find the optimal sampling rate of the passive probe for QoE monitoring of a video streaming application where I am considering the network load as an objective function which should be minimized. I wonder if there are some concrete work in literature related to it. Any useful information will be highly appreciated. Thanks 
Relevant answer