Effect of Routing Protocols and Layer 2 Mediums on Bandwidth Utilization and Latency
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 2
Abstract
Computer networks (CNS) are progressing as emerging field in information and communication technology (ICT). Various computer networks related problems relies on performance of computer network specifically bandwidth utiliza-tion and network latency issues. CNS especially Routing protocols play a vital role for management of network resources as well as for managing the network performance but on the other hand these have adverse effect on performance of network. Network routing protocols, bandwidth and latency rate of any computer network are tightly bounded with each other with respect to network performance. This research is being conducted to analyze the relationship between performance of different protocols, their effect on bandwidth utilization, and network latency rate using layer 2 medium. After analysis of relationship of these parameters suggestions will be made for enhancement of network performance over layer 2 medium.
Authors and Affiliations
Ghulam Mujtaba, Babar Saeed, Furhan Ashraf, Fiaz Waheed
Resolution of Unsteady Navier-stokes Equations with the C a,b Boundary condition
In this work, we introduce the unsteady incompressible Navier-Stokes equations with a new boundary condition, generalizes the Dirichlet and the Neumann conditions. Then we derive an adequate variational formulation of ti...
Securing Locations of Mobile Nodes in Wireless Mesh Network’s
The current deployment of wireless mesh networks requires mobility management to track the current locations of mobile nodes around the network without service interruption. To do so, the Hierarchical Mobile IPv6 protoco...
A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
Nowadays, after the significant development in the Internet, communication and information exchange around the world has become easier and faster than before. One may send an e-mail or perform money transaction (using a...
The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework
The risk of sensitive information disclosure and modification through the use of online services has increased considerably and may result in significant damage. As the management and assessment of such risks is a well-k...
Application of the Tabu Search Algorithm to Cryptography
Tabu search is a powerful algorithm that has been applied with great success to many difficult combinatorial problems. In this paper, we have designed and implemented a symmetrical encryption algorithm whose internal str...