Статті в журналах з теми "Client-server topology"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Client-server topology.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-28 статей у журналах для дослідження на тему "Client-server topology".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Pan, Sen, and Bin Hu. "Design and Implementation of EPON Network Management System Based on RIA." Applied Mechanics and Materials 268-270 (December 2012): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amm.268-270.1718.

Повний текст джерела
Анотація:
Based on analyzing EPON Network architectures and EPON Network Management functional requirements, this paper designed an EPON Network management System according to configuration management, performance management, fault management, topology management, security management and log management, and achieved a system based on RIA technology and B/S mode. The client was written based on Flex framework and the server was written by JAVA. A middleware technology was used between client and server for communicating. Through the B/S mode and SNMP, the system has achieved a series of management functions of EPON network.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

ZADOROZHNY, VLADIMIR, LOUIQA RASCHID, and AVIGDOR GAL. "SCALABLE CATALOG INFRASTRUCTURE FOR MANAGING ACCESS COSTS AND SOURCE SELECTION IN WIDE AREA NETWORKS." International Journal of Cooperative Information Systems 17, no. 01 (March 2008): 77–109. http://dx.doi.org/10.1142/s0218843008001786.

Повний текст джерела
Анотація:
A WAN environment, such as the Internet, connects a federation of hundreds of servers with tens of thousands of clients, which poses a substantial scalability challenge. Clients may choose among sources that vary in both their content and quality as well as in their access latencies. At the same time, Internet accessible data sources exhibit transient behavior; the unpredictable behavior of a dynamic WAN results in a wide variability in access cost (end-to-end latency). This motivates a need for a source selection strategy that requires maintaining access cost distributions (latency profiles) for each client/server pair. However, in the presence of hundreds of servers and thousands of clients, managing latency profiles cannot scale. We present a scalable methodology to manage latency profiles that use non-random associations between client/server pairs. Such non-random associations may be identified by topology-independent measures such as correlation and mutual information. We propose a Catalog infrastructure that implements our methodology and utilize non-randomly associated latency profiles to estimate access cost distribution for client/server pairs. We perform an extensive experimental study demonstrating feasibility and efficiency of our approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Syafrinal, Syafrinal. "Implementasi VoIP Sebagai Media Komunikasi pada Dinas Perhubungan Komunikasi Informasi dan Telematika Aceh." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 2 (October 13, 2019): 64. http://dx.doi.org/10.35870/jtik.v3i2.88.

Повний текст джерела
Анотація:
The purpose of this study is to design and build voice communication over IP networks using the Briker operating system. The use of VoIP Server to make calls from VoIP clients to fellow VoIP clients, and from people's VoIP numbers to one of the VoIP clients, and also looking for a comparison of public IP client and local IP voice delay at Dishubkomintel Aceh. The research method consisted of several stages namely; 1) System Design, 2) Network Topology, 3) Server-Side Design, 4) Client-Side Design, 5) Operating System and Application Installation, 6) Configuration, 7) VoIP Network Connectivity Testing, and 8) VoIP Work Observation. From the test results, several conclusions can be drawn namely; 1) VoIP Server Briker has a role in handling SIP calls from all registered clients into the Briker Server, 2) Between VoIP clients can communicate two ways with each other when registered into the Briker Server, 3) Calls to public VoIP are made by pressing '9' which used as Outbound routes then continued by pressing the destination number, and 4) Calls from VoIP of the people to VoIP are made by pressing the VoIP phone number of the people connected to the VoIP Server and then received by VRR (Voice Response Response) which will be directed to the extension number headed.Keywords:Voice Communication, IP Network, VoIP, Briker
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Xiao, Peng, Samuel Cheng, Vladimir Stankovic, and Dejan Vukobratovic. "Averaging Is Probably Not the Optimum Way of Aggregating Parameters in Federated Learning." Entropy 22, no. 3 (March 11, 2020): 314. http://dx.doi.org/10.3390/e22030314.

Повний текст джерела
Анотація:
Federated learning is a decentralized topology of deep learning, that trains a shared model through data distributed among each client (like mobile phones, wearable devices), in order to ensure data privacy by avoiding raw data exposed in data center (server). After each client computes a new model parameter by stochastic gradient descent (SGD) based on their own local data, these locally-computed parameters will be aggregated to generate an updated global model. Many current state-of-the-art studies aggregate different client-computed parameters by averaging them, but none theoretically explains why averaging parameters is a good approach. In this paper, we treat each client computed parameter as a random vector because of the stochastic properties of SGD, and estimate mutual information between two client computed parameters at different training phases using two methods in two learning tasks. The results confirm the correlation between different clients and show an increasing trend of mutual information with training iteration. However, when we further compute the distance between client computed parameters, we find that parameters are getting more correlated while not getting closer. This phenomenon suggests that averaging parameters may not be the optimum way of aggregating trained parameters.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Xiao, Mengbai, Hao Wang, Liang Geng, Rubao Lee, and Xiaodong Zhang. "An RDMA-enabled In-memory Computing Platform for R-tree on Clusters." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3503513.

Повний текст джерела
Анотація:
R-tree is a foundational data structure used in spatial databases and scientific databases. With the advancement of networks and computer architectures, in-memory data processing for R-tree in distributed systems has become a common platform. We have observed new performance challenges to process R-tree as the amount of multidimensional datasets become increasingly high. Specifically, an R-tree server can be heavily overloaded while the network and client CPU are lightly loaded, and vice versa. In this article, we present the design and implementation of Catfish, an RDMA-enabled R-tree for low latency and high throughput by adaptively utilizing the available network bandwidth and computing resources to balance the workloads between clients and servers. We design and implement two basic mechanisms of using RDMA for a client-server R-tree data processing system. First, in the fast messaging design, we use RDMA writes to send R-tree requests to the server and let server threads process R-tree requests to achieve low query latency. Second, in the RDMA offloading design, we use RDMA reads to offload tree traversal from the server to the client, which rescues the server as it is overloaded. We further develop an adaptive scheme to effectively switch an R-tree search between fast messaging and RDMA offloading, maximizing the overall performance. Our experiments show that the adaptive solution of Catfish on InfiniBand significantly outperforms R-tree that uses only fast messaging or only RDMA offloading in both latency and throughput. Catfish can also deliver up to one order of magnitude performance over the traditional schemes using TCP/IP on 1 and 40 Gbps Ethernet. We make a strong case to use RDMA to effectively balance workloads in distributed systems for low latency and high throughput.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mykyjchuk, Mykola, and Nataliya Zihanshyn. "MODELING A NETWORK OF UNMANNED AERIAL VEHICLES." Measuring Equipment and Metrology 82, no. 3 (2021): 42–48. http://dx.doi.org/10.23939/istcmtm2021.03.042.

Повний текст джерела
Анотація:
The research concerns the methods of UAV group control in networks with duplex communication between nodes built on the "client-server" architecture. Such systems belong to self-organized networks with variable topology. It is important to study the allowable parameters of deviation from the task in the management of a group of UAVs and analysis of the network topology for the group flighting. The network was optimized according to the Ant Colony algorithm ACO. The application of different types of algorithms prevents routing problems in networks, such as ANTMANET, AntNet, ACODV and others. Methods of coordination of group joint actions are considered. A method is proposed by which the optimal number of UAVs operated by one operator can be determined and the traffic intensity of the communication channel is calculated, as well as the bandwidth and packet transmission delay are estimated.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Akmal, Sulthan Kharisma, Aji Gautama Putrada, and Febri Dawani. "A NETWORK PERFORMANCE COMPARISON OF WEBRTC AND SIP AUDIO AND VIDEO COMMUNICA TIONS." Journal of Information Technology and Its Utilization 4, no. 1 (June 30, 2021): 8. http://dx.doi.org/10.30818/jitu.4.1.3939.

Повний текст джерела
Анотація:
Multimedia services are one of the internet needs with high data traffic network count since 2019. Two of the multimedia services, Web Real-Time Communications (WebRTC) and Session Initiation Protocol (SIP), have been widely used in applications for conducting video conferencing. The main objective of this research is to analyze network performance by an application with a client-server for audio and video communications developed with WebRTC and SIP protocols. The SIP system uses the FreePBX server, and the softphone application uses Bria. Whereas WebRTC uses JavaScript with servers on Ubuntu using Node.js. The analysis application uses a star topology and runs on a local network using Wi-Fi. After testing, the results show that the throughput, jitter, and packet loss of WebRTC are better than SIP. This result is caused by several factors including the type of codec, the type of platform, and the way of signaling and routing of each protocol.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hajaje, Hamid, Mouhcine Guennoun, and Zine El Abidine Guennoun. "Constraint-Based Privacy Preserving-Path Computation Element." International Journal of Smart Security Technologies 6, no. 2 (July 2019): 1–32. http://dx.doi.org/10.4018/ijsst.2019070101.

Повний текст джерела
Анотація:
Information privacy and protection is fundamental in the context of path computation. When a path computation client (PCC) requests the shortest path between two nodes from a path computation element (PCE), it desires to do so while protecting the sensitive information carried by the query as well as the overall topology of the network. The authors provide a novel framework to compute the shortest path, between a source and a destination, subject to a constraint, represented in the case by a required minimum bandwidth, while preserving the privacy of both client and server. By employing a secure homomorphic encryption scheme, the PCE can blindly compute the path while being oblivious to the content of the encrypted queries. The output of the PCE computation is an encrypted path that is only decipherable by its original secret key. The implementation using the homomorphic scheme over the integers from Van Dijk, Gentry, Halevi, and Vaikuntanathan (DGHV) shows promising results that the authors analyze in detail throughout this paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Afriansyah, Muhammad Faizal, Adian Fatchur Rochim, and Eko Didik Widianto. "Rancang Bangun Layanan Cloud Computing Berbasis IaaS Menggunakan Virtualbox." Jurnal Teknologi dan Sistem Komputer 3, no. 1 (January 30, 2015): 87–94. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.87-94.

Повний текст джерела
Анотація:
Today, the growth of technology is very fast and a lot of technology that can facilitate users in helping their activity is made. A technology need a server to store both systems and users data. More users needed more servers to store user data. The server room became full and needed the extra space so that it required high cost to build the server and the server space itself. The purpose of this research is to create an IaaS based server virtualization that is connected to a router, switch, virtual client and administrator with VirtualBox application. The purpose of this research can be achieved by designing an appropriate research’s methodology. There are 5 stages of implementation/methodology in building virtualization server at this research which are the system definition, requirements specification, system configuration, system testing, and system analysis. First, phase of the definition system is by describing a system of early identification, system requirements and network topology on the implemented system. The second phase is the specification requirements to determine specifications hardware and software. The hardware consists of a computer with resources 8GB RAM and AMD Phenom II X6 as a processor. The software consists of VirtualBox and operating systems. The third stage is the system configuration to declare the source code in application on each server, routers and switches to perform the function of each device. The final stage is system testing and system analysis by checking the system is ready to use and works the best. Results in this research show IaaS-based server virtualization can be connected to display a web page on all clients through virtual switches and routers on a computer.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tran, Duc Trong. "Spatial analysis in WebGIS." Science and Technology Development Journal 19, no. 2 (June 30, 2016): 75–81. http://dx.doi.org/10.32508/stdj.v19i2.671.

Повний текст джерела
Анотація:
In most of WebGIS applications, user interactions mainly concentrate on map data editing or data querying. Another aspect with paying less attention is to allow user doing spatial analysis. Spatial analysis can be implemented on server side, by using WPS (Web Processing Service), or on client side, by using JSTS (JavaScript Topology Suite). As an contribution to this aspect, this paper shows how to use to use WPS service of Geoserver and JSTS JavaScript library to carry on spatial analysis activities. A WebGIS system - based on the open source Geoserver and OpenLayers - has been developed and used to perform spatial analysis, searching for spatial features that have spatial relationships with other spatial features. Experiment result shows that the use of WPS and JSTS to perform spatial processing over the internet is practically doable.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Yahya, Widhi, Achmad Basuki, and Jehn Ruey Jiang. "The Extended Dijkstra’s-based Load Balancing for OpenFlow Network." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 2 (April 1, 2015): 289. http://dx.doi.org/10.11591/ijece.v5i2.pp289-296.

Повний текст джерела
Анотація:
<span lang="EN-US">This paper proposes load-balancing algorithm on the basis of the Extended Dijkstra’s shortest path algorithm for Software Defined Networking (SDN). The Extended Dijkstra’s algorithm considers not only the edge weights, but also the node weights to find the nearest server for a requesting client. The proposed algorithm also considers the link load in order to avoid congestion. We use Pyretic to implement the proposed algorithm and compare it with related ones under the Abilene network topology with the Mininet emulation tool. As shown by the comparisons, the proposed algorithm outperforms the others in term of the network end-to-end latency, throughput and response time at the expense of a little heavier computation load and more memory usage on the SDN controller.</span>
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Abrarov, R. R., and M. E. Burlakov. "ORGANIZATION OF A DECENTRALIZED AND ANONYMOUS MESH NETWORK." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 192 (June 2020): 42–47. http://dx.doi.org/10.14489/vkit.2020.06.pp.042-047.

Повний текст джерела
Анотація:
As part of this work, proposed the Mesh network architecture, which provides decentralization, security, anonymity and connection of devices without a dedicated router or Internet access. The nodes establish connections directly using Android P2P Wi-Fi technology, which complies with the Wi-Fi Direct standard. P2P Wi-Fi API organizes group communication and allows applications to connect to neighboring devices without the need for an Internet connection or access point. Despite the fact that in the Wi-Fi Direct standard there are no restrictions on connecting groups to each other, the Android Wi-Fi P2P API does not allow organize a connection between several groups. This is due to the fact that the IP addresses of owners of different groups in Wi-Fi Direct are always the same and unchanged. Communication between a P2P client and an inherited client that also owns another group is allowed in both directions. This provides connections between groups, where a P2P client acts as a proxy to access a neighboring group. Thus communication between nodes in a multigroup network is ensured through the use of transport layer tunnels installed in the logical topology and packet switching at the application level. When one or more nodes access the Internet, remote nodes outside the Wi-Fi coverage area communicate with the mesh through the application server. This architecture allows build a corporate, public or home network based on a wireless Mesh network, the nodes of which can be access points, computers and mobile devices of users.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Abrarov, R. R., and M. E. Burlakov. "ORGANIZATION OF A DECENTRALIZED AND ANONYMOUS MESH NETWORK." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 192 (June 2020): 42–47. http://dx.doi.org/10.14489/vkit.2020.06.pp.042-047.

Повний текст джерела
Анотація:
As part of this work, proposed the Mesh network architecture, which provides decentralization, security, anonymity and connection of devices without a dedicated router or Internet access. The nodes establish connections directly using Android P2P Wi-Fi technology, which complies with the Wi-Fi Direct standard. P2P Wi-Fi API organizes group communication and allows applications to connect to neighboring devices without the need for an Internet connection or access point. Despite the fact that in the Wi-Fi Direct standard there are no restrictions on connecting groups to each other, the Android Wi-Fi P2P API does not allow organize a connection between several groups. This is due to the fact that the IP addresses of owners of different groups in Wi-Fi Direct are always the same and unchanged. Communication between a P2P client and an inherited client that also owns another group is allowed in both directions. This provides connections between groups, where a P2P client acts as a proxy to access a neighboring group. Thus communication between nodes in a multigroup network is ensured through the use of transport layer tunnels installed in the logical topology and packet switching at the application level. When one or more nodes access the Internet, remote nodes outside the Wi-Fi coverage area communicate with the mesh through the application server. This architecture allows build a corporate, public or home network based on a wireless Mesh network, the nodes of which can be access points, computers and mobile devices of users.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Mpitziopoulos, Aristides, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. "CBID: A Scalable Method for Distributed Data Aggregation in WSNs." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 206517. http://dx.doi.org/10.1155/2010/206517.

Повний текст джерела
Анотація:
Mobile Agent (MA) technology has been recently proposed in Wireless Sensors Networks (WSNs) literature to answer the scalability problem of client/server model in data fusion applications. Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. CBID dispatches in parallel a number of MAs that sequentially visit sensor nodes arranged in tree structures and upon visiting an SN with two or more child SNs, the MAs (master MAs) clone of themselves with each clone (slave MA) visiting a tree branch. When all slave MAs return to that SN, they deliver their collected data to the master MA and are then disposed of. This results in a significant reduction of the overall energy expenditure and response time. Simulation results prove the high effectiveness of CBID in data fusion tasks compared to other alternative algorithms.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Bagchi, Susmit, Hafizur Rahaman, and Purnendu Das. "MDVM System Concept, Paging Latency and Round-2 Randomized Leader Election Algorithm in SG." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 5 (September 20, 2006): 752–60. http://dx.doi.org/10.20965/jaciii.2006.p0752.

Повний текст джерела
Анотація:
The future trend in the computing paradigm is marked by mobile computing based on mobile-client/server architecture connected by wireless communication network. However, the mobile computing systems have limitations because of the resource-thin mobile clients operating on battery power. The MDVM system allows the mobile clients to utilize memory and CPU resources of Server-Groups (SG) to overcome the resource limitations of clients in order to support the high-end mobile applications such as, m-commerce and virtual organization (VO). In this paper the concept of MDVM system and the architecture of cellular network containing the SG are discussed. A round-2 randomized distributed algorithm is proposed to elect a unique leader and co-leader of the SG. The algorithm is free from any assumption about network topology, buffer space limitations and is based on dynamically elected coordinators eliminating single point of failure. The algorithm is implemented in distributed system setup and the network-paging latency values of wired and wireless networks are measured experimentally. The experimental results demonstrate that in most cases the algorithm successfully terminates in first round and the possibility of second round execution decreases significantly with the increase in the size of SG (|<I>Na</I>|). The overall message complexity of the algorithm is O(|<I>Na</I>|). The comparative study of network-paging latencies indicates that 3G/4G mobile communication systems would support the realization of MDVM system.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Ioannakis, G., L. Bampis, and A. Koutsoudis. "ARTIFICIAL INTELLIGENCE AS A LOW-COST SOLUTION FOR MUSEUM VISIT DIGITAL CONTENT ENRICHMENT: THE CASE OF THE FOLKLORE MUSEUM OF XANTHI." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W15 (August 22, 2019): 585–90. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w15-585-2019.

Повний текст джерела
Анотація:
<p><strong>Abstract.</strong> The on-demand content enrichment of an exhibition center visit is an active applied research domain. This work focuses on the exploitation of mobile devices as an efficient medium to deliver information related to an exhibit or an area within the exhibition center by utilizing machine learning approaches. We present YPOPSEI, an integrated system that formulates the information retrieval task as an image recognition mechanism, enabling visitors to simply capture an entity of interest in order to acquire information similar to a tour-guidance experience via their personal mobile devices. This scheme not only minimizes the additional infrastructure requirements, but additionally enhances the versatility in cases of exhibits topology alterations while still providing high accuracy in terms of image content recognition. Two hybrid approaches are developed that set Convolutional Neural Networks (CNNs) and Bags of VisualWords (BOVWs) to operate in a synergistic and cooperative manner. They are evaluated under real-world conditions on a client-server Web architecture system that experimentally operates within the premises of the Folklore Museum of Xanthi, Greece.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Su, Zhiyong, Ming Xia, Weiqing Li, Tao He, and Weiqing Tang. "Feature-Based Simplification of Process Plant Models over Network." International Journal of Virtual Reality 8, no. 2 (January 1, 2009): 51–58. http://dx.doi.org/10.20870/ijvr.2009.8.2.2765.

Повний текст джерела
Анотація:
Visualization of 3D process plant models is an essential feature to support design review in distributed design environment. The preprocessing time, frame rate and visual fidelity play the same import role in improving the effectiveness and efficiency of the entire design review process. General model simplification algorithms, such as levels of detail (LODs) and hierarchical levels of detail (HLODs), always need unbearable time for preprocessing large-scale models and may distort design feature and make them unrecognizable to the reviewer. To efficiently transmit models, various compression technologies can be applied to shrink the data size. However, transmitting large-scale models over network is still a bottleneck of rendering performance. In this paper, we presented a new, faster feature-based model simplification algorithm to simplify process plant models over network. We first get the model's geometric parameters and topology information from the server before visualization. Then we compute LODs and HLODs according to the model�s geometric parameters and composing feature on the client. No triangles are transmitted during visualization. We demonstrate its performance on complex process plant models composed of tens of millions of triangles. Results show that our approach is able to shorten the preprocessing time greatly. And it can achieve considerable speedups in frame rate with little loss in image quality.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Netek, Rostislav, Jan Masopust, Frantisek Pavlicek, and Vilem Pechanec. "Performance Testing on Vector vs. Raster Map Tiles—Comparative Study on Load Metrics." ISPRS International Journal of Geo-Information 9, no. 2 (February 6, 2020): 101. http://dx.doi.org/10.3390/ijgi9020101.

Повний текст джерела
Анотація:
Recent developments in web map applications have widely affected how background maps are rendered. Raster tiles are currently considered as a regular solution, while the use of vector tiles is becoming more widespread. This article describes an experiment to test both raster and vector tile methods. The concept behind raster tiles is based on pre-generating an original dataset including a customized symbology and style. All tiles are generated according to a standardized scheme. This method has a few disadvantages: if any change in the dataset is required, the entire tile-generating process must be redone. Vector tiles manipulate vector objects. Only vector geometry is stored on the server, while symbology, rendering, and defining zoom levels run on the client-side. This method simplifies changing symbology or topology. Based on eight pilot studies, performance testing on loading time, data size, and the number of requests were performed. The observed results provide a comprehensive comparison according to specific interactions. More data, but only one or two tiles, were downloaded for vector tiles in zoom and move interactions, while 40 tiles were downloaded for raster tiles for the same interactions. Generally, the WebP format downloaded about three times fewer data than Portable Network Graphics (PNG).
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Barai, Dipankar, Rajib Chakrabarty, and Suvankar Barai. "Development of WARKS for Accessing Supply-Chain Management." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 1 (May 30, 2022): 28–34. http://dx.doi.org/10.35940/ijrte.a6908.0511122.

Повний текст джерела
Анотація:
In our modern society, the demand of wireless communications increases exponentially. All the indoor and outdoor everything converting from wire to wireless. Even the newly invented devices, cars, TV, refrigerator, washing machine all the advanced things uses wireless technology. Because of the reason, there are more fields to do research in this area. WiFi is one of the important technology in wireless communications. In this work, we have developed a device which will useful to build an wireless network. The device used to monitor and to control supply-chain management of any organization. We have used WiFi which works as two different modes; one is AP (Access Point) and another is STA (STAtion). In this paper, AP acts as a Server where STA act as a Client. We have developed a wireless network system using self organized sensor nodes (each node has one AP, one STA and one Controller) to communicated each other serially to exchange data and request task accordingly. Because of its serial distributed formation the WiFi range is also be increased with different topology. All the command and request can be done using computer or smartphone. This system (we named it WARKS) can be implemented in home, industrial, hospital, farms, forest, agriculture and many more. To verify the system capabilities and work performance, we do the experiment in indoor and outdoor using required hardware and software.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Bhattacharjee, Tanushree, Majid Jamil, Majed A. Alotaibi, Hasmat Malik, and Mohammed E. Nassar. "Hardware Development and Interoperability Testing of a Multivendor-IEC-61850-Based Digital Substation." Energies 15, no. 5 (February 28, 2022): 1785. http://dx.doi.org/10.3390/en15051785.

Повний текст джерела
Анотація:
Substations are becoming increasingly reliant on international electrotechnical commission (IEC)-61850-enabled devices. However, device compatibility with these standards does not guarantee interoperability when devices are taken from different manufacturers. If interoperability of multivendor devices can be achieved, then power utilities will be in a position to implement multivendor devices in substations. The study here presents the development and testing of a digital substation test platform that incorporates devices from different manufacturers. The process bus communication and protection operation of the intelligent electronic devices (IEDs) were tested to validate device interoperability. The testbed was tested for two IED process bus communications, generic object-oriented substation event (GOOSE) and sampled measured value (SMV). The GOOSE is travelling between IED to IED with an end-to-end (ETE) delay of 2 ms and the SMV read by the IEDs are the same as the injected real-time substation inputs 220 kV and 1 kA. Three IED protection studies (overcurrent, earth fault, and overvoltage) were performed, and IED response curves were obtained. In addition, data monitoring and client–server communications were studied using installed software tools. The testbed configuration in this study has faced some real-time challenges regarding differences in device edition, device firmware, and ethernet switch due to its multivendor approach. All the mentioned configuration issues were resolved in this study with successful testing and validation of the testbed. The study of this testbed will provide solutions to the problems associated with a multivendor system faced by substation engineers and will help them in opting for multivendor installations. This system can be extended in the future by installing more multivendor devices with complex network topology and a SCADA system.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Sharifullina, Albina Y., Roman R. Galyamov, and Rimma S. Zaripova. "TECHNICAL PRINCIPLES FOR CREATING A WIRELESS LOCAL NETWORK WI-FI." T-Comm 15, no. 7 (2021): 28–33. http://dx.doi.org/10.36724/2072-8735-2021-15-7-28-33.

Повний текст джерела
Анотація:
This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Praduana, Muhammad Rega, Ita Arfyanti, and Heny Pratiwi. "PERANCANGAN SISTEM INFORMASI PENGGAJIAN KARYAWAN PADA CV. GASSA BERBASIS CLIENT SERVER." Jurnal Informatika Wicida 8, no. 1 (January 1, 2019): 22–30. http://dx.doi.org/10.46984/inf-wcd.1222.

Повний текст джерела
Анотація:
Perancangan Sistem Informasi Kepegawaian Pada CV. GASSA. Penelitian, Program Studi Sistem Informasi. STMIK Widya Cipta Dharma. Pembimbing I : Ita Arfyanti S.Kom., MM.SI dan Pembimbing II : Dr. Heny Pratiwi, S.Kom., M.Pd., M.Ti. Penelitian dilakukan untuk dapat mengembangkan suatu sistem informasi kepegawaian pada CV. GASSA yang nantinya jika sistem ini berhasil dapat membantu tugas perusahaan pada saat melakukan penggajian Karyawan setiap periode. Penelitian dilakukan di CV. GASSA. Metode pengumpulan data dengan wawancara yang mengajukan pertanyaan yang berkaitan dengan sistem pegelolaan gaji karyawan. Dengan cara observasi, yaitu mengadakan Pengamatan secara langsung ke CV. GASSA. Dalam penelitian ini metode pengembangan sistem yang digunakan yaitu waterfall dengan perangkat lunak pendukung yang digunakan adalah PHP dan MySQL. Topologi jaringan yang digunakan adalah topologi star. Adapun hasil dari penelitian ini berupa suatu pengelolaan data gaji Karyawan berbasis client-server yang dapat meningkatkan pelayanan dan mempermudah pemberian gaji karyawan CV. GASSA.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Mosey, Handy Indra Regain. "Perancangan Sistem Node Jaringan Sensor Nirkabel (JSN) Topologi Point to Point Berbasis Mikrokontroler dan RF Transceiver." Jurnal MIPA 5, no. 1 (February 8, 2016): 49. http://dx.doi.org/10.35799/jm.5.1.2016.12286.

Повний текст джерела
Анотація:
Penelitian ini membahas tentang perancangan dan konstruksi node Jaringan Sensor Nirkabel (JSN) dengan topologi point to point berbasis mikrokontroler dan RF Transceiver. Penelitan dilakukan dengan metode eksperimen yakni membangun dua buah node sensor (client dan server) yang dapat berkomunikasi secara nirkabel. Pengiriman data sensor diatur melalui program yang ditanam pada mikrokontroler agar bereaksi sesuai dengan data bacaan sebuah sensor analog. Hasil eksperimen menunjukan bahwa node sensor yang dibangun dapat berkomunikasi dengan baik dan node sensor bereaksi sesuai kode program.This study discusses the design and construction of Wireless Sensor Networks (WSN) nodes based on microcontroller and RF Transceiver with point to point topologies. Research is carried out by an experimental method that is to build two sensor nodes (client and server) which can communicate wirelessly. Sensor reading data are set via a program embedded in the microcontroller to react according to the data reading from an analog sensor. The experimental results shows that the sensor nodes can communicate well and react according to the sensor node embedded code.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Gozali, Ferrianto, and Billion Lo. "Sistem Pengalokasian Dinamik VLAN Dalam Mendukung Proses Belajar Terdistribusi." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 1, no. 1 (March 8, 2012): 69. http://dx.doi.org/10.23887/janapati.v1i1.9781.

Повний текст джерела
Анотація:
Seiring perkembangan pendidikan, penggunaan ICT sangatlah besar dalam proses perkembangan tersebut. Dengan penggunaan ICT ini, memungkinkan distance learning diimplementasi dimana proses belajar mengajar tidak harus lagi berada dikelas seperti pada pendidikan yang konvensional. Dengan adanya distance learning dapat memecahkan masalah spasial baik dari ukuran ruangan terhadap jumlah murid dan keterbatasan untuk dapat hadir kedalam ruang perkuliahan. Karena itulah, Sistem Pengalokasian Virtual Local Area Network (VLAN) secara Dinamis dibutuhkan. Sistem ini merupakan sistem yang berbasis protokol Radius yang dapat membantu untuk mengotentikasi dan memindahkan client antar sub jaringan (VLAN) didalam jaringan internal suatu perkuliahan.Perancangan sistem digunakan aplikasi berbasis open source. Pada perancangan sistem Dinamik VLAN ini, penulis menggunakan sistem otentikasi berdasarkan MAC-Address dari client yang akan dimapping kedalam VLAN yang akan dituju. MAC-Address dan VLAN yang akan dituju disimpan didalam database. Untuk skema jaringannya, server dan client akan terhubung menggunakan manageable switch.Mekanisme kerja dari sistem pengalokasian VLAN secara dinamis ini terdiri dari 3 (tiga) tahap yaitu: tahap penerimaan request dari Network Access Server (NAS), pengecekan MAC-Address terhadap VLAN yang dituju dan persetujuan otentikasi dan otorisasi. Untuk mendukung proses pembelajaran jarak jauh, digunakan Web Conference dan aplikasi seperti file sharing pada jaringan VLAN tersebut. Untuk pengujian sistem tersebut, kita menggunakan applikasi Web Conference dengan cara membandingkan performa jaringan pada saat dengan dan tanpa sistem tersebut.Dalam mengimplementasikan sistem ini, terbilang murah karena suatu perusahaan hanya membutuhkan sebuah server dengan Sistem Operasi yang gratis dan aplikasi yang gratis dan dapat diimplementasikan langsung ke dalam jaringan perusahaan tanpa perubahan topologi jaringan yang menyeluruh.Namun dalam sistem ini masih terdapat kekurangan, dimana sistem ini hanya dapat diaplikasikan dengan menggunakan Manageable Switch dan belum dapat digunakan untuk Wi-fi dan Unmanageable Switch.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Fajri, Misbahul. "Studi Network Congestion Dengan TCP Tahoe." Jurnal Ilmiah FIFO 13, no. 2 (November 1, 2021): 153. http://dx.doi.org/10.22441/fifo.2021.v13i2.005.

Повний текст джерела
Анотація:
Perkembangan penggunaan komputer dan jaringan serta layanannya cepat berkembang dari masa ke masa, ini membuat kepadatan trafik data pada jaringan internet maupun intranet. Kemacetan jaringan internet pertama kali dialami pada akhir tahun 80-an dimana menurun drastis sehingga terjadi kolaps, kemudian pada tahun 1988 Jacobson mengusulkan teorinya yaitu Congestion Avoidance and Control. Congestion adalah pengumpulan paket melebihi kapasitas bandwidth yang tersedia pada link, congestion akan mengakibatkan penurun kinerja jaringan diantaranya; multiple packet losses, utilitas link yang rendah (low throughput), delay antrian yang tinggi, dan kemacetan yang parah (congestion collapse), ini menjadikan riset yang menantang untuk dipelajari dan dikembangkan, termaksud dalam penelitian ini. TCP Congestion Control adalah protokol TCP yang diterapkan pada end device yaitu di server dan client, protokol slow-start dan congestion avoidance serta Fast Retransmit merupakan awal dalam penelitian sebelumnya, topologi jaringan bottlenect yang dimana dimplementasikan mekanisme tersebut pada Transport Layer dengan trafik layanan FTP. Pada penelitian ini dilakukan studi lanjut dan analisa TCP Tahoe algortima, dimana mengimplementasikan keempat skenario standar sesuai mekanisme TCP. Simulasi penelitian ini menggunakan simulator OPNET dengan jaringan dumbbell dan paket discarding
Стилі APA, Harvard, Vancouver, ISO та ін.
26

- AMIK BSI Purwokerto, Afit Muhammad Lukman, and Yusuf Bachtiar - AMIK BSI Purwokerto. "Analisis Sistem Pengelolaan, Pemeliharaan dan Keamanan Jaringan Internet Pada IT Telkom Purwokerto." Evolusi : Jurnal Sains dan Manajemen 6, no. 2 (September 15, 2018). http://dx.doi.org/10.31294/evolusi.v6i2.4427.

Повний текст джерела
Анотація:
Abstract –In building a computer network it takes precision in choosing a network scheme so that it can be used effectively and efficiently. Such as the selection of network topology, the type of network and network devices to be used. The security system is also an important part of a computer network that has inernet access to existing local networks to stay safe from outside threats. Here the authors do research in IT Telkom Purwokerto with the result that is, the topology used is the star and the type of client-server network. The server used is linux debian. The security system in IT Telkom purwokerto when analyzed is using authentication server system and using Virtual Private Network (VPN).Authentication server problems when there is no power, here the authors propose the procurement of Uninterruptible Power Supply (UPS) for more stable electricity. As for the security system itself is more effective if added a firewall that is demiliterized zone (DMZ) so that there is a wall separation between public network and local network so that the security system will be more effective. Keywords: Network security system, Virtual Private Network (VPN), Authentication, Demilitarized Zone(DMZ) Abstrak-Dalam membangun sebuah jaringan komputer dibutuhkan ketepatan dalam memilih skema jaringan sehingga dapat digunakan secara efektif dan efisien. Seperti pemilihan topologi jaringan, jenis jaringan dan perangkat jaringan yang akan dipakai. Sistem keamanan juga bagian penting dari sebuah jaringan komputer yang memiliki akses inernet agar jaringan lokal yang ada tetap aman dari ancaman bahaya dari luar. Disini penulis melakukan riset di IT Telkom Purwokerto dengan hasil yaitu, topologi yang digunakan adalah star dan tipe jaringan client-server.Server yang digunakan adalah linux debian. Sistem keamanan yang ada di IT Telkom purwokerto saat dianalisis adalah menggunakan sistem server autentifikasi dan menggunakan Virtual Private Network (VPN). Permasalahan server autentifikasi ketika tidak ada daya listrik, disini penulis mengusulkan pengadaan Uninterruptible Power Supply (UPS) agar listrik lebih stabil. Sedangkan untuk sistem keamanan sendiri lebih efektif jika ditambahkan suatu firewall yaitu demiliterized zone (DMZ) agar ada tembok pemisah antara jaringan publik dan jaringan lokal sehingga sistem keamanan akan lebih effektif. Kata Kunci: Sistem keamanan Jaringan, Virtual Privat Network (VPN), Autentifikasi, Demiliterized Zone (DMZ)
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Anbu Malar, M. B. Benjula, and Prabhu J. "Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack." International Journal of Pervasive Computing and Communications ahead-of-print, ahead-of-print (September 17, 2020). http://dx.doi.org/10.1108/ijpcc-03-2020-0009.

Повний текст джерела
Анотація:
Purpose This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated. Design/methodology/approach The methodology designed in this paper is discussed in this section. The existing models are designed in such a way that the client ID first asked to send an authorization request to the Authentication Server. The server looks up the user in its database and then sends back a ticket generated by it to the client to obtain services for the Service center. Numerous models have some additional features to these systems where the theme of KDC was introduced. The Key Distribution Centre (KDC), which is a set of nodes in a network where the data could be distributed and stored, such that any kind of attack on a single KDC will not impact other KDC and the data stored in it. The nodes other than the KDC in the network are termed as the slave nodes. The slave nodes communicate with each other within the network depending on the topology of the entire network. In this paper, the authors have used the Kerberos protocol for adding more security functions in the entire network. The system developed consists of a client, server and a set of nodes connected to each other in a ring fashion. Findings The proposed model provides security to the information being used by making use of the Kerberos protocol. Additional features and algorithms such as the use of the ticket-granting approach have been added at the protocol to make it more secure than the existing models. The ticket generation is done at the server-side that makes the user have proper authentication to make use of the services available from the server-side. The model is designed in such a way that it could remain operational even during the time of denial of service. As future work, use of machine learning and deep learning could be used to predict the attack on the network well before it is being misused. Originality/value The paper discusses the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

"A Path-Server Traffic Scheduling Algorithm for Wireless Network Load based on SDN." International Journal of Circuits, Systems and Signal Processing 14 (November 24, 2020). http://dx.doi.org/10.46300/9106.2020.14.111.

Повний текст джерела
Анотація:
At present, the research on flow scheduling optimization around SDN has become the focus of international attention. Based on the current traffic control algorithm, especially the shortcomings of traffic scheduling optimization, Path-Server Traffic Scheduling (PSTS) algorithm is proposed in this paper to solve problems. Based on the real-time monitoring of network on Ryu controller, network topology, network load and server load information were obtained to choose the optimal routing scheme, thus achieving the goal of improving the overall network performance. Through the interaction between the components, the work flow of the Ryu controller is designed, and the channel quality information among users is maintained by the link state management module. When the small base station receives the data packet sent by the SDN exchange price, it will temporarily store it in the data cache module. Then, according to the amount of cached data and the channel quality of each user, the optimal time slot of the wireless network resource allocation scheme is comprehensively determined, and the data packet is sent to the corresponding client. In the view of proposed design, the Mininet simulation platform is used to simulate the SDN network in this paper. Based on the simulation platform, the performance of the algorithm is analyzed and compared. Besides, bandwidth utilization, average transmission delay, system utility and terminal usage change, interrupt rate and terminal usage change of different algorithms in SDN wireless network are analyzed and compared through data. All experiments have proved that the research content proposed in this paper has an obvious effect on network load control, which shows network performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії