Fig 6 - uploaded by Deepa Balasubramaniam
Content may be subject to copyright.
LAN with STAR topology 

LAN with STAR topology 

Source publication
Article
Full-text available
Computer networks have become increasingly ubiquitous. In today " s world, a computer network is much more than a collection of interconnected devices. Computer networks are a system of interconnected computers for the purpose of sharing digital information. The computer network enables to analyze, organize and disseminate the information that is e...

Similar publications

Article
Full-text available
Computer networks have become increasingly ubiquitous. In today"s world, a computer network is much more than a collection of interconnected devices. Computer networks are a system of interconnected computers for the purpose of sharing digital information. The computer network enables to analyze, organize and disseminate the information that is ess...

Citations

... REVIEW OF LITERATURE (Balasubramaniam, 2015) Computer networks are becoming more and more commonplace. In today's world, a computer network is much more than just a collection of linked gadgets. ...
Article
A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
... This is one of the most important components of hardware in networking. It provides the platform for sending the data which the user has requested to be sent and then provides the user with the desired set of results [1]. Then we also need IP address for the systems to communicate. ...
... The collaboration of entities either in the form of computing devices or the people or be it any things through some specific form of connectivity and set of communication protocols forms a network [1]. Examples of networks may include computer networks [2], social networks [3], the network of things as the Internet of Things (IoT) [4]. The adoption of machine learning is a requirement to bring automation in the process of routing. ...
... The intuitively meaning is that the current state includes information of the past states. Whereas, the state transition probability (STP) is expressed as in (2). ...
... MP is a memoryless random process such that the sequence of the random states {S [1], S [2],…S[n]} with a Markov property, so the environment, E:{State(S), STPM}. ...
Article
Full-text available
The changes in network dynamics demands a routing algorithm that adapts intelligently with the changing requirements and parameters. In this regard, an efficient routing mechanism plays an essential role in supporting such requirements of dynamic and QoS-aware network services. This paper has introduced a self-learning intelligent approach to route selection in the network. A Q-Routing approach is designed based on a reinforcement learning algorithm to provide reliable and stable packet transmission for different network services with minimal delay and low routing overhead. The novelty of the proposed work is that a new customized environment for the network, namely Net-AI-Gym, has been integrated into Open-AI Gym. Besides, the proposed Q-routing with Net-AI-Gym offers optimization in exploring the path to support multi-QoS aware services in the different networking applications. The performance assessment of the NET-AI Gym is carried out with less, medium, and a high number of nodes. Also, the results of the proposed system are compared with the existing rule-based method. The study outcome shows the Net-AI-Gym’s potential that effectively supports the varied scale of nodes in the network. Apart from this, the proposed Q-routing approach outperforms the rule-based routing technique regarding episodes vs. Rewards and path length.
Article
Computer networking is an emerging and fascinating field of study. A computer network allows communication and exchange of information between two or more independent computers and other devices. Computer networking is based on the related discipline of electrical engineering, computer engineering, and computer science. Nodes and Links constitute the basic building blocks of the computer network. An equipment for data communication or equipment of data terminal that connects two or more computers such as modem, router etc. can be exemplified as a network node. Links include wires, cables or free spaces of wireless networks. Working of computer networks relies on a set of defined rules or protocols. The network structure can be composed of various patterns known as network topology. Various networking models are developed that relies on various networking layers made of different protocols. In modern times, the importance of computer networks is remarkable in almost every areas including education, entertainment, business, military, healthcare, insurance, transportation and others. With so much reliance on computer networking, it becomes important to ensure a safe and secure networking system and thus network security system was developed such includes firewall, VPNs, IDS and IPS, etc
Conference Paper
Full-text available
Information has become one of the 21st century's most important assets of an organization and efforts to keep information secure have correspondingly become increasingly important. There is no doubt that information assets are under attack. But what makes an information system unsecure? Understanding threats and their source, agent, intent and impact is the very first step to security. Information security is a science discipline, which has extended to include several research directions. The model followed at this thesis consists in addressing security levels at each layer of the Open System Interconnection (OSI) model. The main purpose of this paper is to identify and analyse the most frequent attacks that might happen in Data link, Network and Application layers and propose the right defence methods and techniques. To better fulfil this analysis there is also an implementation.