Science topic

Network Architecture - Science topic

Explore the latest questions and answers in Network Architecture, and find Network Architecture experts.
Questions related to Network Architecture
  • asked a question related to Network Architecture
Question
8 answers
centralized or decentralized? using service brokers or Kerberos? Blockchain? infrastructures? softwares/tools? recommended papers to read? please discuss...
Relevant answer
Answer
  • asked a question related to Network Architecture
Question
2 answers
I am running a survey regarding metro-area network architecture and have some analytics to share through this link: https://docs.google.com/forms/d/1kJnEjukNDGC4JARuhgBI0HUUrQ8UNA-G71Aa6heaK8U/viewanalytics
The link will be active today only, until 8 pm CET.
Cheers,
Etienne
Relevant answer
Answer
You're welcome, Akmal.
I only open it for short windows of time.
I am going to close the window tomorrow (Tuesday) at 1 pm CET.
  • asked a question related to Network Architecture
Question
7 answers
Most mature Neural Network architecture for Image Style Transfer.
  • asked a question related to Network Architecture
Question
3 answers
Can you help me find a nice solution to plot different CNN architectures automatically?
At the moment, I have a 3 head 1D-CNN, with 2 convolutional layers, 2 max-pooling layers, and 2 fully connected layers.
I used 3 heads to have different resolutions (kernel size) on the same signals.
  • asked a question related to Network Architecture
Question
4 answers
Hello, i am searching for some new innovation points in 6G about networking slice recently.
I want to know what updates will be made to network slicing in 6G, which cannot do well in 5G.
(Maybe about architectures, methodologies, algorithms, and combination with other 6G new technologies.)
Can you recommend me some good ideas, innovation points or papers( and white papers), thank you.
Relevant answer
Answer
Dear Zhenkang Zheng,
the future virtual 6G networks in the form of 6G slices will definitely be set up as "Software-Defined and Open Programmable 6G Slices". The idea of SRv6 Network Programming as the basic principles for the programmability of 6G slices is specified in the Internet Standard RFC 8986.
I have attached a short list of sources of information.
Best regards and good luck
Anatol Badach
European Vision for the 6G Network Ecosystem; DOI: 10.5281/zenodo.5007671
Petar D. Bojović, Teodor Malbasic, Goran Martić, Zivko Bojovic: „Toward 6G networks: Dynamic management for multi-slice QoS“
Wen Wu, Conghao Zhou, Mushu Li, Huaqing Wu, Haibo Zhou, Ning Zhang, Xuemin (Sherman) Shen, Weihua Zhuang: AI-Native Network Slicing for 6G Networks
Amin Shahraki, Mahmoud Abbasi, Md. Jalil Piran, Amir Taherkordi: „A Comprehensive Survey on 6G Networks: Applications, Core Services, Enabling Technologies, and Future Challenges“
European Vision for the 6G Network Ecosystem
Jie Dong: SRv6 based Network Slicing
Gaps, features and enablers for 5G/6G service management and orchestration
RFC 8986: Segment Routing over IPv6 (SRv6) Network Programming
SRv6 – IPv6 Segment Routing Figure 009239: Basic idea of SRv6 Network Programming
  • asked a question related to Network Architecture
Question
4 answers
Can spiking neural network takes the place of current neural network architecture?
What is the advantages and disadvantages of these two computation architecture?
Relevant answer
Answer
Spiking neural networks is not a new idea. There are software packages with which you can use spiking neural networks, although they are not so widely used compared to the some more well-known ANNs (MLP, CNN, RNN,...). Your question cannot be simply answered because spiking neural network algorithms and other ANNs can exist in many variants and they can be enhanced too. In addition we should not talk about two computation architectures, since there are many slightly different neural net algorithms. One algorithm can be better solving one problem and an other algorithm solving an other problem. There are experimental studies showing results where SNN performed better than e.g. MLP-NN. Spiking neural networks mimic biologic neural networks more closely compared to other ANNs. The various models of spiking neurons offer different level of similarity to the biological nerve cell.
  • asked a question related to Network Architecture
Question
3 answers
I have created a neural network architecture by considering the data for one study area. Have performed grid-search to tune almost all the hyperparameters of the model. I want to use the same network architecture (without any hyperparameter tuning) on the data of another geographical area for the same topic/ problem.
What I am intended to do is, take the same architecture and train the model with the data of the new area. Later I want to show that even without changing the model architecture the same can be applied to other geographical areas also.
Is this valid and understandable work?
I could not find any resource or paper online that has done a similar thing. All I could find is transfer learning. But I don't think this can be termed as transfer learning, or is it?
Relevant answer
Answer
Look the link, maybe useful.
Regards,
Shafagat
  • asked a question related to Network Architecture
Question
3 answers
A repository to aggregate a set of reproducible and reconfigurable codes and notebooks for testing various task placement policies for edge and fog server networks.
The simulation models are based on two of the most powerful python-based simulation modelling frameworks, namely salabim and simpy.
The systems that are modelled cover the basic types of task placement problems in edge computing servers. The models are useful for managing a network of edge computing servers.
There are animation and GUI options which are indispensable in simulation modelling.
The uploaded models are templates for building simulation models for a variety of edge network policies. Researchers who research task and server placement problems in edge computing would find the models useful.
Relevant answer
Answer
Just uploaded a model- load_balancing_with_mobllity_aware_task_placement.py -It models an edge network of three edge servers, with mobile and stationary user equipment. The task placement policy assigns computing requests to a) the nearest edge server and b) to the least utilized server. This implements a policy to reduce network bandwidth usage while ensuring load balancing within the edge network.
The model with other examples is on GitHub
  • asked a question related to Network Architecture
Question
2 answers
Hi,
What kind of network architecture is used if i have multiple X,Y,Z coorinates(for ex: 4 coordinates (x1,y,z1), (x2,y2,z2),(x3,y3,z3), (x4,y4,z4) ) & few other numeric features and the target is numeric.
The coordinates are related to spatial information(XYZ drone coordinates are related to multiple drone coordinates). Is there any specific network that preserves the spatial meaning or just a simple regression network is fine? I am using the PyTorch framework.
Thanks.
Relevant answer
Answer
What matters is the association to be learned, not the inputs. A single layer network can't represent associations that are not linearly separable, for instance.
  • asked a question related to Network Architecture
Question
4 answers
Dear fellow scientists,
if there are some among you who need help with small to medium-sized Deep Learning projects in some kind of medical field (e.g. setting up network architecture, defining proper loss functions, training and optimizing, etc.): Please feel free to get in touch with me.
I am a fourth-year medical student with experience in medical (physiological) research and substantial training and experience in designing and conducting small/medium Deep Learning projects in a medical context.
I am looking forward to hearing from you!
Tom
Relevant answer
Answer
Please have look on our(Eminent Biosciences (EMBS)) collaborations.. and let me know if interested to associate with us
Our recent publications In collaborations with industries and academia in India and world wide.
EMBS publication In association with Universidad Tecnológica Metropolitana, Santiago, Chile. Publication Link: https://pubmed.ncbi.nlm.nih.gov/33397265/
EMBS publication In association with Moscow State University , Russia. Publication Link: https://pubmed.ncbi.nlm.nih.gov/32967475/
EMBS publication In association with Icahn Institute of Genomics and Multiscale Biology,, Mount Sinai Health System, Manhattan, NY, USA. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/29199918
EMBS publication In association with University of Missouri, St. Louis, MO, USA. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30457050
EMBS publication In association with Virginia Commonwealth University, Richmond, Virginia, USA. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27852211
EMBS publication In association with ICMR- NIN(National Institute of Nutrition), Hyderabad Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/23030611
EMBS publication In association with University of Minnesota Duluth, Duluth MN 55811 USA. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27852211
EMBS publication In association with University of Yaounde I, PO Box 812, Yaoundé, Cameroon. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30950335
EMBS publication In association with Federal University of Paraíba, João Pessoa, PB, Brazil. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30693065
Eminent Biosciences(EMBS) and University of Yaoundé I, Yaoundé, Cameroon. Publication Link: https://pubmed.ncbi.nlm.nih.gov/31210847/
Eminent Biosciences(EMBS) and University of the Basque Country UPV/EHU, 48080, Leioa, Spain. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27852204
Eminent Biosciences(EMBS) and King Saud University, Riyadh, Saudi Arabia. Publication Link: http://www.eurekaselect.com/135585
Eminent Biosciences(EMBS) and NIPER , Hyderabad, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/29053759
Eminent Biosciences(EMBS) and Alagappa University, Tamil Nadu, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30950335
Eminent Biosciences(EMBS) and Jawaharlal Nehru Technological University, Hyderabad , India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/28472910
Eminent Biosciences(EMBS) and C.S.I.R – CRISAT, Karaikudi, Tamil Nadu, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30237676
Eminent Biosciences(EMBS) and Karpagam academy of higher education, Eachinary, Coimbatore , Tamil Nadu, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30237672
Eminent Biosciences(EMBS) and Ballets Olaeta Kalea, 4, 48014 Bilbao, Bizkaia, Spain. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/29199918
Eminent Biosciences(EMBS) and Hospital for Genetic Diseases, Osmania University, Hyderabad - 500 016, Telangana, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/28472910
Eminent Biosciences(EMBS) and School of Ocean Science and Technology, Kerala University of Fisheries and Ocean Studies, Panangad-682 506, Cochin, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27964704
Eminent Biosciences(EMBS) and CODEWEL Nireekshana-ACET, Hyderabad, Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/26770024
Eminent Biosciences(EMBS) and Bharathiyar University, Coimbatore-641046, Tamilnadu, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27919211
Eminent Biosciences(EMBS) and LPU University, Phagwara, Punjab, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/31030499
Eminent Biosciences(EMBS) and Department of Bioinformatics, Kerala University, Kerala. Publication Link: http://www.eurekaselect.com/135585
Eminent Biosciences(EMBS) and Gandhi Medical College and Osmania Medical College, Hyderabad 500 038, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27450915
Eminent Biosciences(EMBS) and National College (Affiliated to Bharathidasan University), Tiruchirapalli, 620 001 Tamil Nadu, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/27266485
Eminent Biosciences(EMBS) and University of Calicut - 673635, Kerala, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/23030611
Eminent Biosciences(EMBS) and NIPER, Hyderabad, India. ) Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/29053759
Eminent Biosciences(EMBS) and King George's Medical University, (Erstwhile C.S.M. Medical University), Lucknow-226 003, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/25579575
Eminent Biosciences(EMBS) and School of Chemical & Biotechnology, SASTRA University, Thanjavur, India Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/25579569
Eminent Biosciences(EMBS) and Safi center for scientific research, Malappuram, Kerala, India. Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/30237672
Eminent Biosciences(EMBS) and Dept of Genetics, Osmania University, Hyderabad Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/25248957
EMBS publication In association with Institute of Genetics and Hospital for Genetic Diseases, Osmania University, Hyderabad Publication Link: https://www.ncbi.nlm.nih.gov/pubmed/26229292
Sincerely,
Dr. Anuraj Nayarisseri
Principal Scientist & Director,
Eminent Biosciences.
Mob :+91 97522 95342
  • asked a question related to Network Architecture
Question
4 answers
Are there standard or common DNN architectures which takes a video as input and outputs captions for each frame in the video ?
Relevant answer
Answer
  • asked a question related to Network Architecture
Question
13 answers
I am trying to model a system which consists of a second order linear part (for example a set of mass spring damper with variable parameters for spring and damper) and a non-linear part which is a cascade of a derivative, a time delay, a static non-linearity (e.g. half-wave rectifier) and a low-pass system. I want to use neural networks for this purpose. I have tried time delay neural networks which were not successful. I am now trying to use RNNs (Recurrent Neural Networks). Since I am relatively new to this subject, I was wondering which network architecture are suitable for this purpose? (I have to use a limited number of parameters)
Relevant answer
Answer
The multi-layer perceptron, the radial basis function network and the functional-link network
For more information:
Neural networks for nonlinear dynamic system modelling and identification
S. CHEN &S. A. BILLINGS
  • asked a question related to Network Architecture
Question
2 answers
Dear peers,
I am working with extinction models in interaction networks using the bipartite R-package.
I can determine the order in which species will be removed based on abundance and degree or random.
For example:
#####
data(Safariland)
abundance <- second.extinct(Safariland, participant = "lower", method = "abundance", nrep = 10,
details = FALSE, ext.row=NULL, ext.col=NULL)
robustness(abundance)
slope.bipartite(abundance)
#####
However, I need and am not able to elaborate a vector to determine a different extinction sequence, using the ‘external’ method.
Thanks
Relevant answer
Answer
Dear, Steffen,
Many thanks for the answer!
I got it.
  • asked a question related to Network Architecture
Question
7 answers
i am planning to research in 5G antenna design at mmWave. But before that i want to learn about 5G network architecture. In simple words a brief introduction of 5G at different bands, how different bands will be utilized ?
Relevant answer
Answer
Usman,
welcome,
The frequency bands in 5G are divided into two bands:
The lower frequency band under 6 GHz, and the higher frequency band at
mm wave band with frequencies staring from about about 24 GHz.
Specifically: The frequency bands for 5G networks come in two sets. Frequency range 1 (FR1) is from 450 MHz to 6 GHz, which includes the LTE frequency range. Frequency range 2 (FR2) is from 24.25 GHz to 52.6 GHz. The sub-6 GHz range is the name for FR1 and the millimeter wave (mmWave) spectrum is the name for FR2 .
As for the utilization the FR1 will be used in low traffic density areas where the longer wavelength carriers can cover larger distance with the same transmission power.
The mm-wave will be used for high density traffic areas with small cell radius because the mm-waves suffer from high attenuation in the air.
Also the mm-wave are more feasible for massive MIMO building in the base stations because the smaller size of the antennas.
Best wishes
  • asked a question related to Network Architecture
Question
4 answers
Nowadays there are different types of available access networks which are used by end users to connect to the internet. Thus, the users must be provided with seamless network connectivity to stay connected while moving around from one place to another. This seamless network connectivity is achieved by connecting different types of networks which is called heterogeneous internetworking. By integrating different network technologies into one common heterogeneous network architecture, they can coexist and interoperate with each other and improve network performance in term of Quality of Service (QoS).
Relevant answer
Answer
Dear Fawaz,
One method to access the available wireless networks are supplying the mobile devices with the capability to detect the different networks and display them for the users and the user can choose one from them. Most advanced mobile user equipment and laptops are supplied with this property. They detect the Wlans and they detect the the mobile service if it contains a valid simcard.
As a user you can choose among them.
As for the mobile devices there is a need for the hand off control between the wide area network and the wlan. This type of handover is called vertical handover and there are some protocols developed for it in the so called heterogeneous network.
Best wishes
  • asked a question related to Network Architecture
Question
8 answers
is it possible to use deep learning with a small size of samples ?
and what is the state-of-the-art neural network architecture when using it with microarray dataset?
Relevant answer
Answer
it is possible, but the result will not be reliable, unless all the possible patterns are represented with the small set of samples.
  • asked a question related to Network Architecture
Question
3 answers
Our team is developing a keyword spotting(kws) model used in detecting keywords spoken by humans. Our main approaches include some state-of-the-art neural network architectures such as CNN, Depthwise CNN and ResNet. In our experiments, these models achieve >98% accuracies in detecting specific keywords in both training and testing dataset(randomly selected). However, when we place a mircophone to collect sounds under office environment to evaluate real-time performance of the models, all of them show high mistriggered rate, i.e., the models believe a target keyword is spoken while it is not. How do we optimize the models to reduce the mistriggered rate in kws? Any papers/documents/tutorials are definitely welcomed to share!
Relevant answer
Answer
Steven,
I would try a bandpass filter at the range of 70 Hz to 300Hz . I would the use the spectrogram to visualize the range to see how much noise is in the formants at the fundamental frequency. Low background noise like the humming of air conditioner can be at the 60Hz frequency(unless it is an old AC!). Nonetheless as chatter increases so will the low frequency range.
I would also try spectrogram readings at points where spurious noise such as keyboards are happening. I imagine this would tend towards higher frequencies that can be filtered by a high pass (and maybe adjust the range I gave at the beginning of the post).
If these suspicions are correct you will have to adjust the training samples to the appropriate frequency range
  • asked a question related to Network Architecture
Question
3 answers
I need to build elearning system and network should be SDN based network architecture.
Relevant answer
Answer
Check my book chapter that I have written for Smart Learning Environment in a Private cloud.
The SDN approach is different here as the hypervisors, cloud activators, orchestrators need to support your backend systems...
Almost we could not call our servers as SDN, but most of the learning softwares runs under Private cloud follows 20% of SDN methodology....
  • asked a question related to Network Architecture
Question
1 answer
Hi,
I am using HNOCS omnet++. I made basic connection changes in topology and I am getting this error
<!> Error in module (cCompoundModule) Mesh (id=1) during network setup: No submodule `router[16]' to be connected, at G:\software\hnoc\hnocs.release\hnocs.01_02_13\src\ topologies\Mesh.ned:93.
Can anyone explain what does this error mean and how to remove it?
Thanks in advance
Relevant answer
Answer
Following...
  • asked a question related to Network Architecture
Question
12 answers
I came across a neural network architecture which can train the dataset on two different CNN's of varying input shapes and layers and finally merging them together. The architecture looks similar to the attached image. Any useful links or codes could be helpful .
Relevant answer
Answer
Hi,
If you want to recreate the model shown in the picture, you can build two CNNs (with different input resolutions), then concatenate the last layers using keras.layers.concatenate (example here : https://www.programcreek.com/python/example/89660/keras.layers.concatenate) .
You can also find some examples in the "Multi-input and multi-output models" section of the Keras documentation (https://keras.io/getting-started/functional-api-guide/#multi-input-and-multi-output-models).
There is an interesting example on github using multi-shape/resolution inputs here but the concatenation process is done at the level of the hidden layers not the inputs (models/CNN.py) :
  • asked a question related to Network Architecture
Question
6 answers
ICN architecture related with IOT.
ICN ==>CCN,NDN based architecture
Relevant answer
Answer
Dear Hussain Ahmad,
the Internet is still a host centric network today. We use URLs and need DNS to resolve each URL to the IP address of the host where the desired web object is located to access the object.
It should also be possible to enter in a browser only the name of the desired object to access it. On which host the object is, we are not interested. That means, we think according to the principle "Information Centric". The first known step in the direction of "Information/Name Centric Networking" is already realized with the help of DOIs (Digital Object Identifier). To get an article, we only need its DOI. From which server (host) we finally download the article, this is meaningless for us. The DOI of the desired article must be resolved to the location of the server with this article. Of great importance here is "DOI Resolver".
How a resolver works, I would like to show an example. At the end of the 90s, when VoIP "came", a special resolver was needed to use classic telephone numbers (as addresses of telephones) on the Internet. For this
purpose, the concept ENUM (E.164 NUmber Mapping or tElephone NUmber Mapping) was introduced and already specified in 2000 in RFC 2916. With ENUM Resolvers the telephone numbers can be resolved to the location (IP addresses) of telephones. The telephone numbers can be regarded as identifiers of the telephones.
The idea of the ENUM resolver can be applied in the IoT. In the IoT, the objects (devices, sensors, ...) are assigned the unique identifiers or the user-friendly names. The names can also be structured. The identifiers / names of objects can be resolved to their location in the IoT using resolvers. The idea for these resolvers can be derived from the ENUM Reselver shown here.
A resolver is based on a virtual tree structure. The leaves of such a virtual tree in the IoT can contain:
the IPv6 addresses of objects and possibly their attributes (e.g., priority) if the objects are stationary (not mobile).
The IP addresses of special proxies with current addresses of objects when the objects are mobile.
My other two figures are just examples of how the names can be structured. The structuring of identifiers/names is very important in the IoT: for example, to design smart city citizen services.
Further help can be found in the literature that I have added. These sources only refer to the use of the ICN idea in the IoT. The entire ICN theme is very extensive and a variety of articles have already been dedicated to this topic. The ICN-related ideas are already protected in over 50 patents.
A big ICN topic in IoT is the Vehicular Named Data Networking (VNDN). On this topic VNDN you can find some articles. For the realization of the VNDN some ideas can be taken over from the LoST (Location-to-Service Translation).
Best regards
Anatol badach
Named data networking for IoT: An architectural Perspective
Named data networking-based smart home
A Distributed Web-based Naming System for Smart Buildings
Design Considerations for Applying ICN to IoT
Information Centric Services in Smart Cities
Observing IoT Resources over ICN
Deploying an Information Centric Smart Lighting System in the Wild
LoST – Location-to-Service Translation
See the figures: 006675 (The idea of location based services with LoST), 006677 (Emergency service with LoST)
  • asked a question related to Network Architecture
Question
5 answers
I'm looking to train a neural network to map between two different vector spaces. I have a set of mappings between vectors in both spaces so this would be a supervised training problem. The output layer would be d nodes where d is the dimensionality of the output vector space. But I'm not sure if there are certain architectures I need to use to perform this regression task.
Relevant answer
Answer
  • asked a question related to Network Architecture
Question
6 answers
Hi everyone, hope you are doing well. Please guide me, I want to set my network like this: that sink node on receiving a packet start sending packets back on the same route but when it receives a packet from other route then sink node starts stop its prior transmission and start transmission again on new route.
Relevant answer
Answer
Yes you can just fix MAXTTL limit in omnet.
  • asked a question related to Network Architecture
Question
5 answers
I built algorithm to set covering for the network , now I want to remove flooding broadcasting in AODV protocol and used new Algorithm 
any suggest ? 
Relevant answer
Answer
I think the question is more related to optimizing the flooding storm. There are already well established papers proposing solutions on optimizing the overhead of flooding while reaching allover the network. As some examples, you can see:
  • asked a question related to Network Architecture
Question
13 answers
As far as I've seen, MANN architectures employ external memories in formats other than neural networks. Some of the advantages in these architectures stem exactly from this hybridization, compensating for NN drawbacks (eg. 'catastrophic forgeting'). On the other hand, multi-NNs models (eg. Generative Adversarial Networks, GANs) also appear very promising. I am curious whether there are models out there which use NNs, not only for processing, but for memory too?
Relevant answer
Answer
Check out some older work by Robert French 
Dynamically constraining connectionist networks to produce distributed, orthogonal representations to reduce catastrophic interference
AND
Interactive tandem networks and the sequential learning problem
  • asked a question related to Network Architecture
Question
2 answers
I have collected flows on a machine connected in parallel to a switch by mirroring the port of the switch. All the incoming and outgoing traffic of the enterprise passes through this switch. Flows are collected using Softflowd and NfDump tools and Nfcapd files are created where each file captures flows of five minutes duration. When i checked the flows for DNS flows, i found no record with source port 53 or some dns server ip as server ip. However there are number of flows with destination port 53 and some dns server ip as destination ip. Does it mean that NfDump is collecting only outgoing traffic? If yes, what can be the reason?
  • asked a question related to Network Architecture
Question
1 answer
In a service chain, the data rate between two successive VNFs changes based on the type of VNFs. This is referred to as compression factors in the paper linked below. In such paper they do not provide any reference nor numbers for this. Is anyone aware of real data about compression factors?
  • asked a question related to Network Architecture
Question
4 answers
while creating instance in openstack i am getting static IP problem. how avoid this?
Relevant answer
Answer
you have to verify your localrc file (or openstack network component: neutron)
  • asked a question related to Network Architecture
Question
4 answers
I am using CSIC 2010 dataset for Network Intrusion Detection. I find it difficult to preprocess the HTTP packet captured. Are there any ways I can easily preprocess data so that good accuracy is achieved?
Relevant answer
Answer
By preprocessing, if you mean data extraction, then the process is pretty simple.
  • Each line of a record is a property-value pair
  • You can easily split the property from its value by the colon ':' that separates them
  • If the property is real valued, treat the property as a feature
  • If the property is nominal, set a feature for each of its possible value and have a boolean value indicate its presence or absence
  • The end of a sample record is indicated by a two blank lines (or end-of-file for the last record).
When you already have the data, further preprocessing may involve feature selection and noise reduction.
  • asked a question related to Network Architecture
Question
11 answers
I am trying to run an ANN model using IBM SPSS. After every run I observe that architecture of the network and hence the synaptic weights change. May I know what is the probable reason for this or is it the nature of ANN?
Relevant answer
Answer
Random weights that is a reason. I met it when I've used Statistica, Excel (by Angshuman Saha). The same is with Matlab, but I was advised to use a function in a code (after setting the matrix size) that keeps initial weights stable.
here you are
setdemorandstream(491218392)
Regards
Hubert
  • asked a question related to Network Architecture
Question
5 answers
I would like to calculate total power consumption in a network architecture.
Is there any simulation tool we can use to find power consumption on these layers (Application, presentation, session, transport) of OSI model?
Also power consumption by middleware (e.g., RMI-Java, ICE, DDS).                        
Relevant answer
Answer
@Priyanka: if you have a new question completely unrelated to the original post, you should create a new thread.
@OP: I assume you are looking for a practical method to actually measure energy consumption of some device you actually have at hand, as independent measurement or verification.  (If you are looking for stock claims, then you should browse the websites of devices and products - e.g. Ajay has provided some such relevant text from SolarWinds.)
If you are looking for independent verification, about all you are guaranteed to be able to do is put an energy measurement device (many such are available, such as from Belkin, Kill-a-watt, etc.) between the electric supply and the device itself.  For device internal, you have to depend on whatever is reported by the device itself, e.g. what Ajay spoke about.  In some limited cases, you can switch off (or physically pull out) power consuming elements of a device, such as individual chassis, or individual NICs, and then see how much less power the device consumes, but this is not very precise, since the device might be intelligent to operate differently when it is operated with different configurations (e.g. load the remaining chassis more, or operate parts of the backplane at more or less speed).
  • asked a question related to Network Architecture
Question
7 answers
my project is 5G mobile network  and I have  some problems in find ta way to solve the small cells interference, therefore, I found  that CACP is the solution I needed the mathematical equation of this aspect in any paper or reference 
Relevant answer
Answer
thank you very match
  • asked a question related to Network Architecture
Question
2 answers
Hi there , 
I wish to get prominent inputs from respective scholars in software and networking , how your school of thought on architecture , components , diagrams and etc. Is it possible all of that in one layout and how to ensure it is understandable to the layman reader / assessor.
Relevant answer
Answer
Hi Ahmed,
I do not recommend to put everything in a single layout. It will be difficult to absorb.  I would recommend that you develop your readers along your text in order to give the required knowledge slowly so that they can understand it.  Do your best to make your diagram as simple as possible.  The diagram should target a certain perspective. 
My recommendation for the best modeling approach is to
1. Build your high level architecture including (baseline, guidelines, design decisions, and dictionary).
2. Detail your architecture by building the software components model.
3. Build your hardware and network model separately.
4. Build a deployment model that merges the components and the network models.
I hope my feedback is useful to your work.
regards
Osama Mabrouk
  • asked a question related to Network Architecture
Question
5 answers
Importing a network or graph is very common which can be visualized and analyzed using various software like Gephi etc but to design a family of networks or graphs that have say a desired set of network properties e.g. 5-8 links per node with node density dependent on space variables or something like that? If it is also done, please mention some reference or web-links. Thanks in advance!
Relevant answer
Answer
I think the spiking neural network can be used  for this purpose, this network can be to optimize the predefined network properties. You can see :
  • asked a question related to Network Architecture
Question
5 answers
DNS is in Layer 7 protocol right? Why not 3/4? its job is nothing but name to ip conversion.? what about DHCP where its job to distribute ip.?
waiting 4 ur response??
Relevant answer
Answer
Why is DNS not just a layer 3 for a layer 4 protocol? Because it does more than what is required at layer 3 or at layer 4. Let me try to be clearer right at the start. Your examples, DNS and DHCP, provide information that is ultimately required by layer 3, yes. But in order to compute and then transfer that information, DNS and DHCP require the services of all 7 ISO layers (assuming you are organizing your thoughts that way, which is a good way in my opinion)..
A layer 3 protocol simply routes packets, based mostly on the destination address, but potentially based also on other layer 3 header content (such as the TOS byte, or additional routing options, or even, potentially, the source address and the protocol being carried in the datagram). So, a datagram arrives at one port of the router, and it gets switched over and sent on another port. That's the job of layer 3.
So, any algorithm used to translate a name to a numerical IP address, and then return the answer to the requesting host, is clearly outside the scope of layer 3.
Layer 4's job is to deliver packets end to end, for individual sessions. A host may have multiple session open at the same time. Layer 4 keeps all these conversations organized, separate. Layer 4 may also be called upon to correct errors and to keep bytes in the intended order of sequence (e.g. TCP). But here again, any thoughts of reading names and looking up IP addresses, and formulating and then transmitting answers for the requesting host, are outside the scope of layer 4.
DHCP is a similar example. It accepts requests for IP address from un-configured hosts. Then, based on any number of variables, including such things as (optionally) the name of the client requesting the address, or even based on a possible suggestion of an address by the client, it returns the IP address for that host. That too goes beyond the job of a layer 3 or a layer 4 protocol.
You have to rigorously interpret the tasks assigned to each of the ISO layers. Each one does its job.
There are odd exceptions to this rule, more or less "cheating," where for example a router, at layer 3, might inspect the headers of higher layer protocols in the datagram, to get some better ideas for routing decisions. But these odd exceptions have to be understood to be exceptions.
  • asked a question related to Network Architecture
Question
4 answers
Architecture styles are
Data-centered architectures
Data flow architectures
Call and return architectures
Object-oriented architectures
Layered architectures
Relevant answer
Answer
hi,
for me there is no absolute answer to that question. The architecture shall be choosen depending on you project. What you want to do, what size, what team organization, what skills, etc.
Anyway your question was about cost effectiveness.
The main cost driver usually is (late) rework, so for me, reducing developpemnt costs has more to do with  process than architecture.
 anyway, the one major criteria for a cost effective architecture is to allow easy and localized  late fixes/changes
  • asked a question related to Network Architecture
Question
4 answers
I need find out if there was research of the subject matter from 2011 to date
Relevant answer
Answer
Mr. Abdullahi you can get the thesis on the above subject like Load flow solution for meshed distribution networks, Simulation of Runoff and Flood Inundation in Kosi River Basin using Hydrological models, ANN, Remote Sensing and GIS etc and many more you, can contact me at ram.perumal16@gmail.com. I wish you success in your work.
  • asked a question related to Network Architecture
Question
1 answer
I have a network of static nodes but now I want to add a mobile node which will move from a node to other according to a certain condition. Please help me
Relevant answer
Answer
Hello,
You have to add a node and apply mobility plugin to that node. Apply position.dat file of  mobility model to that node. You can go through mobility framework for omnet++.
May be this link will be helpful to you: Chapter - 8
Still you have any doubt then feel free to ask me.
  • asked a question related to Network Architecture
Question
3 answers
Hello,
 As I use Agent-based approach to simulate a multi-Layer Network, could someone of you please help me about this topic by giving me an example of datasets which can be useful to validate our architecture?
Thank you in advance,
Relevant answer
Answer
Hello,
Although probably you have already looked for it, there is an example on how to test a layered architecture with some data sets in this link: https://arkcore.wordpress.com/2009/12/07/performing-validation-on-datasets/. Source code is available there as well. Literature related to that topic can also be found at http://www.cob.calpoly.edu/~eli/AIS-JJAW-PACIS2014/72.pdf and http://researcharchive.vuw.ac.nz/xmlui/handle/10063/3054. I hope it helps to an extent.
  • asked a question related to Network Architecture
Question
2 answers
Hi...
Have a Nice day..
For a FPGA (PROASIC3, Libero IDE v9.1) based digital design, I want to increase fan-out count of a net without changing the original functionality. So i instantiated a combination of AND and XOR gates with enable input with that particular net (say net1) as mentioned below.
Gate1: AND2 port map (A=> net1, B=> enable, Y => net2);
Gate2: XOR2 port map (A=> net1, B=>net2, c=>net_next_circuit);
So, whenever enable=0, net1 value is resumed. i instantiated the same logic thrice to make fan-out count of net1 as 4 (along with already existing instantiation) but these modules are optimized in synthesis. How to resume these modules in the design?
I used syn_keep or syn_preserve attributes, even then tool does optimization. 
Please give me any solution.
Thank you in advance.
Relevant answer
Answer
    Insert some LUT after the wire,  the remain inputs  of LUT as input of the function,  using LUT to enlarge  the fan-out.    
  • asked a question related to Network Architecture
Question
10 answers
I want to upgrade a network infrastructure to include 1000Mb switches and 10/100/1000 auto sensing network interface cards in each desktop. Recommend the cabling type that you would use in this network. Also, I have 100BaseTX cabling, and I need to provide access to a machine that is located 400 meters from the switch. What strategy could be used to accomplish this task?
Relevant answer
Answer
Brian, I will make some assumptions here; so please excuse me for that! Let us say that the upgraded switches uses Gigabit fiber SFP's, as the switch can support either copper of fiber. VDSL seems a bit dramatic, you could simply use a fiber to copper media converter. This method means the media converts a copper connection with auto-negotiation to a fiber interface where duplex and speed is fixed by the connection set by the fiber SFP on the switch. On the other hand you could still have a copper switch converted to fiber and then back to copper at the end client device. Media converters are generally a low cost and a reasonable option when a scenario such as this arises.
  • asked a question related to Network Architecture
Question
9 answers
Different solutions have been employed but packet loss ratio is very high. The best up till now has been wire-shark. Kindly guide as to how we can increase the capture ratio and what software are commonly used in the community for this purpose.
Thanks in advance for your help.
Relevant answer
Answer
Packet losses can happen due to your physical medium channel (copper cable, radio link, optical fiber), network equipments malfunction/configuration, network topology or QOS, or be related with one or both of your network endpoints (which includes network stack, protocols, etc). And these packets are really losses, which means that the packet information get lost at some point and the receiver never receives it.
But you may be experiencing another type of "packet loss" which can be caused by wireshark (or other capturing tool) itself and it is usually called "dropped packets". This type of loss is shown in the wireshark status bar, alongside with the number of packets captured, displayed and marked statistics. PLEASE NOTE that this information is only displayed if Wireshark was unable to capture all packets [refer to https://www.wireshark.org/docs/wsug_html_chunked/ChUseStatusbarSection.html ], which allows you to immediately infer if this is your situation. Please note also that this metric IS NOT SAVED in your pcapng files; you can see it - if it occurs - while capturing or even after you stop the capture process but still displaying the capture in the wireshark; even if you save that capture, once you close it, you will not see this metric again.
This type of packet loss relates with the performance of the capturing system, usually due to your hard drive read/write rate and overall system load. What happens in this situation is that wireshark was able to detect one or more packets in the capture network interface, but due to the low performance, it could not save the related packet information, so the capture algorithm chooses to drop that packet(s). There are some tricks you can follow to minimize (not avoid!) the low performance impact, which are explained in the "optimized Wireshark settings" section, https://wiki.wireshark.org/Performance . Note also, that the operating system has an important role in the performance; some time ago, while facing some problems related to this, I discover that the number of packets dropped by wireshark on Linux was (much!) less while capturing with Wireshark on Windows - what was not really a surprise for me. Notice that the performance issue can also happen with other software tools. I will assume that you are not generating network traffic in the same capture system, because this negatively influences the performance too.
If you are dealing with optical fiber links, I advise you to - if possible - forget wireshark or similar software tools and use instead a dedicated network performance measure equipment. These kind of equipments usually have dedicated high performance hardware, like FPGAs, that will allow you to generate all kind of network traffic and get almost all measures and statistics you may desire or need.
From my personal experience, considering a I7 Quad Processor, with 16GB RAM but a mechanical 5400rpm or 7200rpm HDD, when considering a large number of packets, from time to time - say 1 in 10/15 times - I was facing dropped packets even on a 1Gbps ethernet link. The problem was more notorious as the number of packets increases (typically for < 1 million packets it were dropped less than 1k packets but for 9 M, the number of dropped packets increases to 3M easily!). Although I successfully reduced the number of packets dropped, I could not avoid the problem because from time to time, I still get some dropped packets, which do not allow me to have 100% confidence in my measures.
Since at the beginning I have no access to a dedicated Network Performance measure hardware, I developed a simple measure system based on FPGA that allow me to despite this problem and prove the correct system function.
I hope that this information can help you.
  • asked a question related to Network Architecture
Question
4 answers
Do I need any special software for grid computing or is my optimizing software (for example Cplex) is enough?
I'm going to prepare 5 computers for this aim, what other kinds of requirements I need? Does it work with ordinary computer sharing network? Give me your suggestions please.
Relevant answer
Answer
Seems like you want a Beowulf cluster. As the answers state before, the Application needs be aware of the cluster and should use libraries which can utilize multiple nodes (not just processors). If the target program is based on OpenMPI, MPICH and PVM based(although there exist more implementations and parallel processing libraries which are made for parallel clusters). This should solve your query (as an example) regarding cplex: http://www-01.ibm.com/support/docview.wss?uid=swg21399972
Surely you can take GPU route, you need a software designed for it. While searching for it, I found this : https://groups.google.com/forum/?fromgroups#!searchin/gurobi/gpu/gurobi/KTP6zDvodII/oPPQT4-mofMJ which explains perfectly why companies are still not using GPGPU programming and paradigms for optimization related applications.
  • asked a question related to Network Architecture
Question
5 answers
I have read the documents available on google and also gone through the Wikipedia's definition and formula about calculating the modularity for a particular network. I am using r studio for implementation.For example if my network is like following.Then the value of modularity being calculated in r studio as an output for this network is 0.08. How the answer 0.08 is being achieved that i am not getting.Can any one explain the mathematical formulation of modularity for networks.How the formula that is given in Wikipedia is being applied in this case that i am not getting. I hope my question make sense. Thanks in advance.
--R Script--
library(igraph)
g <- graph_from_literal( 1--2, 4--5, 3--1, 5--2, 4--3 )
g
membership <- c(1,2,1,2,1)
modularity(g, membership)
Relevant answer
While the above address your first question (explaining the mathematical formulation of modularity), I don't think any sufficiently address the second (how the formula is being applied in this case), so I will work through your example below:
> g <- graph_from_literal( 1--2, 4--5, 3--1, 5--2, 4--3 )
This produces an igraph object which can be visualized through a matrix by running:
> as_adj(g)# 5 x 5 sparse Matrix of class "dgCMatrix"
# 1 2 4 5 3
# 1 . 1 . . 1
# 2 1 . . 1 .
# 4 . . . 1 1
# 5 . 1 1 . .
# 3 1 . 1 . .
What is important to note here is that igraph does not sort the matrix by row-name (even though you have named your nodes with integers).  Thus, when you assign the membership:
> membership <- c(1,2,1,2,1)
You are stating that nodes 1, 4, and 3 are in module 1 and nodes 2 and 5 are in module 2.
> modularity(g, membership)
Calculates Q as defined by Newman (2006) (and referenced by both Christopher and Daniel above):
Q = 1 / 2m * sum( (Aij - ki*kj / (2m) ) delta(ci,cj), i, j)
m is the number of links = 5
Aij is the element (i, j) of the adjacency matrix depicted above
ki, kj are the degrees of nodes i, j (always 2 in your example, note that all row/column sums of the adjacency matrix are 2)
and delta(ci,cj) is the Kronecker delta, which is 1 if nodes i and j are in the same module and 0 otherwise. In this way, Q only cares about links that fall within modules and ignores those which link separate modules to each other (except as a normalizing factor).
To calculate Q, just go through each element of the adjacency matrix. Note that if it is not within a module (that is, the nodes defined by the row and the column have different membership values), then that element of the sum will be multiplied by 0, so you can save some time by only considering links within the modules. For example, the first row of the adjacency matrix yields:
Q = 1 / (2 * 5) ( (0 - 2 * 2 / (2 * 5) ) * 1 +     # node 1 to 1 -> absent, same membership
                           (1 - 2 * 2 / (2 * 5) ) * 0 +     # node 1 to 2 -> present, different membership
                           (0 - 2 * 2 / (2 * 5) ) * 1 +     # node 1 to 4 -> absent, same membership
                           (0 - 2 * 2 / (2 * 5) ) * 0 +     # node 1 to 5 -> present, different membership
                           (1 - 2 * 2 / (2 * 5) ) * 1 +     # node 1 to 3 -> present, same membership
                           ...
Continuing for the rest of the matrix eventually simplifies to:
Q = 1 / 10 ( 7 * (0 - 2 / 5) + 6 * (1 - 2 / 5) ) = 4 / 50 = 0.08
  • asked a question related to Network Architecture
Question
2 answers
I have found references to Webgraph, WebGraph++, and PowerGrASP as well as others research papers that describe work directed by S. Vigna.  Are there any other tools that take in a graph (edgelist, gml, or any other format) and compress the graph into some compact data-structure and can be reconstructed to its original state that you can recommend?
Relevant answer
Answer
Prof. Gonzalo Navarro has several works on compressed indices. You can check some of those:
Cecilia Hernández and Gonzalo Navarro.
Compressed Representations for Web and Social Graphs.
Knowledge and Information Systems 40(2):279-313, 2014
Nieves Brisaboa, Susana Ladra, and Gonzalo Navarro.
Compact Representation of Web Graphs with Extended Functionality.
Information Systems 39(1):152-174, 2014
Francisco Claude and Gonzalo Navarro.
Extended Compact Web Graph Representations.
In Tapio Elomaa, Heikki Mannila, and Pekka Orponen (editors) Algorithms and Applications (Ukkonen Festschrift). Pages 77-91, 2010.
Springer, LNCS 6060
Francisco Claude and Gonzalo Navarro.
Fast and Compact Web Graph Representations.
ACM Transactions on the Web
there are other works in Gonzalo's publication page: http://www.dcc.uchile.cl/~gnavarro/publ.html
best regards,
rapa
  • asked a question related to Network Architecture
Question
2 answers
To throw some light on Following areas specifically,
KPI’s for NPO;
DTH vs. IPTV
ADSL vs. HSPA
VDSL/FTT x vs. LTE
Macro rollout vs. Femto deployment
Regards,
Sunil
Relevant answer
Answer
Not anymore Abdul,
During the past few years we proved that technology can be used to minimize human/architectural improvement efforts, since SDN is an emerging area and the artefacts I've mentioned related to the questionnaire are related to Wired vs Wireless techniques; Moreover there are challenges in Handover front (Especially Fast Handovers) yet to research. These challenges I've identified based on book reading, but from Public knowledge front more answers are prominent, we must discuss to arrive at lateral conclusions,
Br,
Sunil
  • asked a question related to Network Architecture
Question
6 answers
I am looking for opinions to include in my studies...
Relevant answer
Answer
Based on my experience as a network research-based student, configuring the network layer quite difficult particularly for the beginners that are practicing "trial and error" practices. If the configuration success, it is a luck for them. However, if it is not success, they will search for another methods or commands (mostly ask for Google's help).
  • asked a question related to Network Architecture
Question
4 answers
This question related to SDN and it is based on the fact the I wanna control the flux of my network using a  Ryu controller, but to do so I have to know what are the nodes in the network. I know something about link layer discovery protocol, but it is not clear. I really appreciate your help.Thanks 
Relevant answer
Answer
If I got your question correctly, you are looking for topology discovery. If that's the case, I think you may have a look of these links. It might give u some ideas
There is a paper called Efficient Topology Discovery in SDN as attached. 
  • asked a question related to Network Architecture
Question
14 answers
By theory ,
It can be stated that UDP will faster as its connection less doesn’t required receiver side bothering,
but by my recent experiment I find TCP is some what giving 50% more throughput .
Theory which I formulated is, Overhead of TCP is one time. After that TCP get a connected way to pass data ,whereas UDP need to find it every time.
Also by Nagle effect which can make TCP packet immediate departure have same effect as UDP.
If so are ,then Why UDP is still in use in which condition UDP will be more useful then TCP.
Relevant answer
Answer
UDP and TCP are used in different situations for different applications. Applications requiring high reliability such as a 1GB file transfer are done by ftp using TCP. As now if  some packets are lost the whole 1GB transfer will be useless as it will end up in a corrupt file. UDP is unreliable and connection less which suits real time applications such as VOIP and streaming. Packet loss upto certain limit in these applications are not as critical as in a file transfer. Because even if a few packets are lost  you will fee glitches in your streaming or VOIP but still you will be able to run your video or voice.  Secondly TCP has many variants depending upon how they react to packet loss by controling its window size. You also need to consider that behavior when evaluating it. 
  • asked a question related to Network Architecture
Question
3 answers
Is there any available works on cloud resource discovery that use an hybrid architecture, specially master-slave or super-peer architectures?
I mean, is this a feasible idea since the network performance and resource
availability can be the tightest bottleneck for any cloud.
In fact I need some references on this subject.
Relevant answer
Answer
As I understand the concept of super-peer architecture, it is completely feasible. I did work with resource assignment in cloud-computing and the concept I manage to complete this idea was using routing tables. Instead of having routes you can add resources to your tables and keep them updated.
  • asked a question related to Network Architecture
Question
3 answers
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
Relevant answer
Answer
TCP itself does not authenticate the receiver in any way. If the attacker replies on your TCP SYN-SENT faster than the intended socket for connection, the connection will be established with the attacker instead. That is basically the way some sort of Man-In-The-Middle attacks work. If you remember the Yahoo-highjacking by NSA last year - this worked alike (in that case according to the press even with full TSL Auth.: looking for request to Yahoo, changing some DNS servers to impose to be the receiver (the fake server was physically nearer to the sender and thus faster responding), issue a flasificated TLS Cert making sure the false Cert was verified faster than an original one (as above), and highjacking the connecting therefore.)
From wikipedia:
TCP-Handshake
1. SYN-SENT → <SEQ=100><CTL=SYN> → SYN-RECEIVED
2. SYN/ACK-RECEIVED ← <SEQ=300><ACK=101><CTL=SYN,ACK> ← SYN/ACK-SENT
3. ACK-SENT → <SEQ=101><ACK=301><CTL=ACK> → ESTABLISHED
  • asked a question related to Network Architecture
Question
2 answers
I mean in  the Network Function Virtualization concept especially in IP Core network.
Relevant answer
Answer
For simulation:
With related network simulators like NS2 / NS3 / Omnet++, you are able to simulate the entire protocol stack of a network adapter. The traffic load on these network interfaces has to be maped to a feasible prediction model.
Network virtualisation:
E.g. cisco systems (UCS - Unified computing system) are able to provide virtual network adapters. This includes the entire stack down to MAC layer. In a virtual environment the PHY is not necessary. Accordingly, the analogue behaviour of the filter components inside the phyisical layer is not virtualised.
Kind regards,
Matthias
  • asked a question related to Network Architecture
Question
4 answers
I am going through the literature survey for DHCP attacks. I would be thankful if someone provide me some reference for the same.
Relevant answer
Answer
As already mentioned: Properly configured "Port security"  is a countermeasure against DHCP starvation.
Cisco switches  allow for so called "DHCP snooping": It is possible to specify trusted and untrusted ports. The trusted port should be the port where the DHCP server is connected to. The switch does not allow any DHCP responses (offer, ack)  on untrusted ports. For an introduction seee here: http://packetpushers.net/ccnp-studies-configuring-dhcp-snooping/
I only know Cisco networking devices; but I assume other manufacturers have similar technologies…
  • asked a question related to Network Architecture
Question
8 answers
Determining the network architecture is one of the most important and difficult tasks in ANN model development, what is the best way to fined the the optimum number of layers and the number of nodes in each of these nodes?
Relevant answer
Answer
There re basically two different  approaches, control the layers and numbers of neurons. For recurrent single hidden layer, please see my Jordan network paper. For kernel method, the hidden layer has infinity dimension, the number of output layers can be sparcified, see my linear kernel papers. Both are uploaded at the research gate.   
  • asked a question related to Network Architecture
Question
3 answers
I've recently looked into VLSI implementations of neural network architectures in which threshold logic circuit technologies are used. I'd appreciate keywords for such applications or publication links.
Relevant answer
Answer
I think Spiking Neural Networks are suitable for your job. See Izhikevich's publications
  • asked a question related to Network Architecture
Question
4 answers
I need to extract f x,y,z signals, then combine them and re-extract them from the same signal without loss of data. 
Relevant answer
Answer
my suggestion, you extract, combine and re-extract again.
  • asked a question related to Network Architecture
Question
10 answers
I need all sensor nodes to send the same signal to one node with ID=1. How can we determine which node is of ID=1.Thanks
Relevant answer
Answer
Hi,
In order to be complitely network independant : ipv4 ipv6, I prefer to use the MAC  address. And  as a good thing the MAC address is part of the ipv6 address.
sincerely.
Pierre
  • asked a question related to Network Architecture
Question
11 answers
.
Relevant answer
Answer
Hi Rupam,
Unix severs become instable if you install by compilation some services which need new library, and new release of existing library. At home I have a server with an old release of the french distrib Mandriva 2010 it was boted last year in august..
In order to manage correctly my linux servers When I have a request for a new program a made a test on a virtual machine and if the compilation need to many other installations I sais no !
The main goal for me is to give access to computer power for every body in the unit not for solved one problem for one guy, the global quality is a mandatory.
cheers
Pierre Léonard
  • asked a question related to Network Architecture
Question
9 answers
is it possible to integrate optical & and wireless network with NS-3 or NS-2?
Relevant answer
Answer
ns-3 can work in real-time mode, it enable us to integrate with a testbed. Maybe we can do that with a optical network.
  • asked a question related to Network Architecture
Question
2 answers
Can anyone construct a network whose diameter is more than X times as large as its average distance, where X is an arbitrarily given integer?
Relevant answer
Answer
Thanks, Christian. I've rephrased the question.
  • asked a question related to Network Architecture
Question
3 answers
I am not getting the exact location(i.e. Class) in CloudSim for VM Migration policy
Relevant answer
Answer
VM migrations are triggered inside the data center, by an internal data center event. Therefore, triggering a migration means receiving and processing a VM_MIGRATION event:
send(this.getId(),delay,CloudSimTags.VM_MIGRATE,vm);
The delay field contains the estimated migration completion time. Therefore, when using it, the method that starts the migration process has to provide estimated completion time. After the delay, the event is received by the data center, which is interpreted as migration completed: therefore, from this time on the VM is available in the destination host.
  • asked a question related to Network Architecture
Question
7 answers
Is it possible to configure switches' forwarding logic, packet format, communication protocols etc. in cloudsim? Is it possible to simulate new/custom topologies, specifically recursive architectures like BCUBE? Does it support specifying communication protocols such as IP, TCP, and UDP with the simulation.
Relevant answer
Answer
GreenCloud (http://greencloud.gforge.uni.lu/) features full support of virtualization and VM migration starting from version 2.0 along with the simulation of multiple types of resources (e.g., CPU, memory, storage and network) for cloud computing data centers.
  • asked a question related to Network Architecture
Question
3 answers
Where can I find a trusty reference for this subject?
Relevant answer
Answer
Let we have two switches S1 and S2, where S1 is a 64-ports switch and S2 is a 32-ports switch, respectively. Now, I want to know the cost and energy consumption of these switches.
Is the cost and energy consumption of S1 twice the S2? In my opinion, it is much less than twice!
  • asked a question related to Network Architecture
Question
7 answers
Which network software design, for example network architecture, can incorporate agents, host databases?
Relevant answer
Answer
Thank you Eitan for your suggestion
  • asked a question related to Network Architecture
Question
6 answers
Wikipedia article about Peer-to-Peer computing says - "Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes."
While Wikipedia article for Multi-agent systems says- "A multi-agent system (M.A.S.) is a computerized system composed of multiple interacting intelligent agents within an environment. Multi-agent systems can be used to solve problems that are difficult or impossible for an individual agent or a monolithic system to solve. Intelligence may include some methodic, functional, procedural or algorithmic search, find and processing approach."
Although having difference in definition, both architectures involve cooperation between distributed entities.
How does one define the suitability of having a P2P system based architecture or a MAS architecture for a research problem?
Relevant answer
Answer
I agree witj Ingo Timm. P2P could be used as an environment infrastructure for MAS such as a lower level of communication and support life. The agents could be developed as peer entities in this environment and, with a reasonable use of clustering development, its possible to deliver some low levels agent tasks for P2P platform and focusing agents on more intelligent issues.
  • asked a question related to Network Architecture
Question
5 answers
Does interoperability between SDN and NAC co-exist in the network?
Relevant answer
Answer
"Normally NAC will send 802.1x messages to the switch to enable/disable the ports. By the introduction of SDN, these same messages must go toward the Controller as the intermediary before the switch port is enabled. I would like to see a message flow in a case like this."
One approach to this could be to incorporate the NAC as part of the SDN controller. Obviously there may be performance issues, depending on how you implement it.
As examples there are SNAC (http://www.openflow.org/wp/snac/), and Resonance
  • asked a question related to Network Architecture
Question
9 answers
Hundreds of research initiatives worldwide are redesigning the Internet. Many of them are adopting the software-defined networking (SDN). What does it means? How do you define it?
Relevant answer
Answer
SDN decouples the control and the data planes and centralizes the control plane operations. Currently, most work in this domain is concentrated on the layer-2 and layer-3 functionalities. Higher layers can benefit from the global network view provided by SDN.