Notice of Violation of IEEE Publication Principles: A Pascal Graph Property and Computer Network Topology

Author(s):  
Sanjay Kumar Pal ◽  
Samar Sen Sarma ◽  
Subhrendu Guha Neogi
Author(s):  
YI-KUEI LIN ◽  
CHENG-FU HUANG

Quality of the received data at the sink can be based on packet delay, packet errors, packet loss, etc. From the viewpoint of quality of service (QoS), the packet unreliability (PU) and transmission time are both of critical attributes to assess internet quality for supervisor and customers. A computer system is usually modeled as a network topology with arcs and vertices where each arc denotes a transmission medium and each vertex represents an Internet data center. Due to failure, partial failure, maintenance, etc., each component (arc or vertex) should be considered as stochastic. The network with imperfect vertices is more complex to evaluate the reliability issue because vertex failure results in the disablement of adjacent arcs. Such a network named a stochastic imperfect vertex computer network (SIVCN) is addressed in this paper. We study how the data can be delivered through multiple minimal paths simultaneously within both permitted PU and time constraint. A solution procedure comprising two efficient algorithms is proposed to assess transmission reliability accordingly.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


Author(s):  
Yuri Ariyanto ◽  
Budi Harijanto ◽  
Yan Watequlis S.

A virtual laboratory with a network emulator environment using NetKit is one of series of basic network laboratories on basic computer network competencies where students are given practical trial opportunities at low costs and little effort in their implementation. Teaching computer network subjects to be easily understood by students needs an instructional media as a tool in delivering material. This media uses computer virtualization technology, i.e. creating a virtual laboratory, as a means of students in conducting experiments from the material that has been obtained. In virtual laboratories it is possible to implement network topology designs based on actual network topologies. This implementation is used as a testing tool before the network topology is implemented on the actual network. Therefore, errors can be identified first without disturbing the system that is already running. For testing, the students are given training using a basic network design consisting of the implementation of routing tests, firewalls, ftp server implementation and web server. This paper is aimed at describing ways to develop a virtual laboratory with a network emulator environment using NetKit. Moreover, several exercises on network topology implementation that are applied directly to the real world with NetKit are introduced, such as describing laboratory settings, describing the main parts of the lab, illustrating lab instructions, and reporting lab feeds.


2014 ◽  
Vol 989-994 ◽  
pp. 4237-4240
Author(s):  
Zhi Kun Wang

If we apply the system internal elements as nodes, and the relationship between the elements as connection, then the system form a network. If we put emphasis on the structure of the system and analyze the function of the system from the angle of structure, we’ll find that real network topology properties differ from previous research network, and has numerous nodes, which is called complex networks. In the real word, many complex systems can be basically described by the network, while the reality is that complex systems can be called as “complex network”, such as social network, transportation network, power grids and internet etc. In recent years, many articles about the complex networks are released in the international first-class publications such as Nature, PRL, PNAS, which reflects that the complex networks has become a new research focus.


2011 ◽  
Vol 267 ◽  
pp. 594-598
Author(s):  
Su Jing Xue

Since the network was born, the network management has been the material effect factor which the computer network develops. Taking the reasonable network topology technology has already become the entire network management foundation,and for the isomerism, diverse and changeable network, the importance of network topology survey discovery is also enhancing. studying the highly effective network topology discovery method has the quite vital significance and the value to guarantee the network effective and safe operation.


Author(s):  
Anton Andreev ◽  
Anton Shabaev

A lot of network management tasks require a description of the logical and physical computer network topology. Obtaining such a description in an automatic way is complicated due to the possibility of incompleteness and incorrectness of the initial data on the network structure. This article provides a study on the properties of incomplete initial data on network device connectivity on the link layer. Methods for generalized handling of the heterogeneous input data on the link layer are included. We describe models and methods for deriving a missing part of the data, as well as the condition in which it is possible to get a single correct network topology description. The article includes algorithms for building a link layer topology description from incomplete data when this data is possible to fulfill up to the required level. Also, we provide methods for detecting and resolving an ambiguity in the data and methods for improving incorrect initial data. Tests and evaluations provided in the article demonstrate the applicability and effectiveness of the build methods for discovering various heterogeneous real-life networks. Additionally, we show advantages of the provided methods over the previous analogs: our methods are able to derive up to 99\% data on link layer connectivity in polynomial time; able to provide a correct solution from an ambiguous data.


Sign in / Sign up

Export Citation Format

Share Document