Science topic
Network Administration - Science topic
Explore the latest questions and answers in Network Administration, and find Network Administration experts.
Questions related to Network Administration
Can someone explain me what are the common layer 3 problems that happen in a network? specially in SOHO environment if possible.
If you can provide references if possible, that will be a great help.
I am trying to extract precip and temp data for an area located in Asia from CORDEX RCM data set in R programming language. The netcdf files are in the rotated-pole coordinate system (0 deg E, 0 deg N) and I need to transform this RP to WGS 84 , so how can I do this in R? I have gone through the manual and different scripts posted in stack-overflow, but have not found a script that actually transform the projection.
If anyone knows how to do this, please consider providing the scripts. Your help will be highly revered.
Dear Experts
I have a university project to build a soft load balancer in SDN/OpenFlow (Linux) environment. I'm thinking to use mininet as OpenFlow network simulation. Can you help me to find if and how we can accomplish the below requirements with mininet or should I consider some other simulator?
1. Customized topology with "4 servers and 48 client nodes" "The interface shall contain classification of client nodes having different requirements of bandwidth at different times. This shall be 4 periods with different bandwidth distribution."
2. Which OpenFlow controller can fulfill these requirements? "Measure Performance and Utilization Statistics" a. Throughput b. Delay c. Utilization d. Load Distribution e. Response time
This project requires designing a network load balancer with OpenFlow that will provide GUI based interface to the network administrators. The data from the GUI will be fed to the load balancing controller that will coordinate with network nodes to manage the routes to the server.
Please answer whichever part of the question you can guide me for.
Thanks in advance.
Suppose Info-Tech is a company having large scale computer network consisting of more than 100 routers in operation. The company has hired you as a network administrator to maintain and troubleshoot its network. In this network, adding and removing hosts is normal and number of hosts is expected to grow in future. In view of this, the network needs fast convergence with the help of suitable dynamic routing protocol.
As a network administrator, in your opinion, which dynamic routing protocol from the following will be most appropriate for this organization’s network? Justify with any two solid reasons.
1. Distance Vector Routing Protocol?
2. Link State Routing Protocol
Any papers on the role of Intranets in managing satellite/remote campuses?
I am trying to implement bitcloud zigbee stack form my avr-atmega256rfr2 custom board.I downloaded the stack from http://www.atmel.com/tools/BITCLOUD-ZIGBEEPRO.aspx .After reading the documentations of bitcloud provided with SDK,I changed the configuartion file of WSNdemo application with necessary parameters.Then I programmed one coordinator and one router.Each one having different CS_UID.Then I used WSN monitor to view the nodes.At this time I can see only the coordinator no routers.Any help on this particular area will be appreciated.
I am a student and I am following a course on Productivity and efficiency analysis, we are now focus on Network DEA, but I can't make an extimation on how many Netwrok DEA Models exist, and which are them.
i need some protocols used in other technologies and that can be used on ioT to guarantee user privacy.
I need a reliable and referable ranking (for example, a ranking published by Gartner research center) of Network Management Systems. Can any body help please?
I am trying to model a hybrid network. I have finished literature review and for now know how exactly I want to do network management. But I am new with NS3 and need some help with it. So I need simulations or codes of already published thesis related to C_RAN and SDN, so that I can re-do them and have an idea. All suggestions would be helpful
Recently, I am using the Forcite module implemented in Materials Studio, but every time I run with the remote server, it fails immediately.
The remote server is CentOS7.0 with Intel E5 v3 2697. I have installed MS in the server, and I run from the Windows in my workstation.
But if I run that by using the worksstation, it goes well and succeeds.
Once run in parallel in remote linux server, the job fails.
I have checked the file 'std.err', it said this:
"sh: error while loading shared libraries: libdl.so.2: cannot open shared object file: No such file or directory"
So I locate the libdl.so.2 in CentOS7, it exist in /usr/lib:
/usr/lib/libdl.so.2
/usr/lib64/libdl.so.2
and
lrwxrwxrwx. 1 root root 13 May 8 2015 libdl.so.2 -> libdl-2.17.so
I have googled this error, still don‘t know how to fix this bug.
I hope someone can give me a hand here.
Different solutions have been employed but packet loss ratio is very high. The best up till now has been wire-shark. Kindly guide as to how we can increase the capture ratio and what software are commonly used in the community for this purpose.
Thanks in advance for your help.
Hi Dear all,
I am trying to implement the Bound Handling techniques for a particle velocity and position. I am using Deterministic Back and Nearest technique for velocity and position respectively. I have implemented these two techniques in two different methods (in the program). I am getting slightly different results from these methods. I am not sure which one is the right method. Please let me comment. If both of the following methods are incorrect then please let me suggest the correct way of implementation.
Method-1
for (i = 1 to SWARM_SIZE)
{
for (j=1 to PROBLEM_SIZE)
{
Compute V(t+1) using standard PSO velocity equation
If (V(t+1) < V_min || V(t+1) > V_max)
V(t+1) = - 0.5 * V(t+1) // this deterministic back technique
Compute X(t+1) using standard PSO position equation
If (X(t+1) < X_min)
X(t+1) = X_min
Else if (X(t+1) > X_max)
X(t+1) = X_max
}
}
Method-2
for (i = 1 to SWARM_SIZE)
{
for (j=1 to PROBLEM_SIZE)
{
Compute V(t+1) using standard PSO velocity equation
Compute X(t+1) using standard PSO position equation
If (X(t+1) < X_min)
{
X(t+1) = X_min
V(t+1) = - 0.5 * V(t+1) // this deterministic back technique
}
Else if (X(t+1) > X_max
{
X(t+1) = X_max
V(t+1) = - 0.5 * V(t+1) // this deterministic back technique
}
}
}
Many thanks
Best regards,
M Khan
Experts in network security and networks
Does MTML allow understanding on effect of variable (e.g influence, power etc) towards network formation (antecedent) or effect of network (e.g structure, density,centrality etc) towards variable (e.g image, loyalty etc). thanks
I am looking for opinions to include in my studies...
I am looking for algorithms that can automatically estimate the bandwidth of a signal (or even multiple signal) without knowing the modulation and signal type.
Please tell the reference related to method if possible.
I want study on communication complexity of interconnection network. so please share the published paper or materials about this.
Suppose we have a set of API hosted on a local server. I only want legal remote programs to invoke those APIs. If the remote program is, let's say the original program that I uploaded to the remote machine, then I allow the invoke. If the remote program is a version tampered by the attacker, then I disallow it. How can I bind the program's identity to the function invocation to determine whether the remote program is not tampered?
Hi all
How to forward packets received form neighbor motes ?,
consider scenario
1-----------2------------3
mote 1 and 3 are not in their transmission range,
whenever mote 1 send packet, mote 2 captures it and the stores for few time, and later sends to mote 3 , i.e. mote 3 feels that the packets are coming directly from mote 1
------------------------------------------------------
I am working on wormhole attack on RPL IoT,
guidance regarding for coding above (mote 2) will helpful
where should i focus either on contikimac or cc2420 radio chip for coding above mote ?
Any one has experience on creation of wormhole attack on any simulator ? then please guide regarding the same
Thanks in Advance
Is this possible with Libvirt or there exists some other means?
NOTE: This can be done within the Guests themselves but the interest here is to get the stat externally at the host. I have seen an approach for KVM but haven't seen anything for XEN servers.
What types of testing should be used when we need to test cloud and its services.
I am referring to testing cloud not "CLOUD TESTING"
I am planing to do some experiments in a cloud environment to see how specific methods defend against cloud DDOS attacks. To build a cloud environment, I need to know which cloud simulator would be suitable for such work.
Penetration testing is a very difficult and complex task in network security testing. How can we automate this process? Which tools or demo and test versions are available?