The Network Packet Flow is analyzed and
defined by the network administers in the company to
assu... more The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability of the internet. So in My research I dully answered to identify and asses the network administrator can record the ingress and egress of the packet flow-in and flow-out in the routers respectively. Therefore the network environment is reliable, identified and assessed by using the network simulators called packet tracer and the protocol of NETFLOW protocol implementation in this research works.
The data flows between two machines that i.e. source and destination the data should be locked in... more The data flows between two machines that i.e. source and destination the data should be locked in the two keys that are called Private and public keys. The algorithm that used to make strong security in data flow inside the computer network; in this research work is RSA. The algorithmused to encrypt and decrypt the flow of data between the source (A) and Destination(B). If the source (A) sends data to Destination (B) then my experiment could automates first A encrypts the message or Plaintext by using sources (A) private key and Public keys of A.In general, RSA data encrypting method useful to secure and lock data in the computer network.
The rapid growth of network users and demands in Wolaita sodo university requires Quality of serv... more The rapid growth of network users and demands in Wolaita sodo university requires Quality of services. The Primary goals of Quality of service (QoS) includes dedicated bandwidth, controlled jitter, latency (required by some real-time and interactive traffic), and improved loss characteristics to provide satisfactory services for users. Shaping network optimization is crucial things for network administrators. To implement the Network QoS by optimizing current network by physical and logical architectures. The algorithms that depict the implementations of research work for logical architecture Weighted Random early detection (WRED), for physical and data link layers architecture minimum spanning tree methods. To assess the existing networks I have used both the qualitative and quantitative data. The qualitative data is browsed from different the network performances metrics called wireshark and the bandwidth monitor. For the quantitative data that we have used from the collected data by questionnaire, interview and site visiting in ICT.
The increasing numbers of the network users and services of the organization in network speed is ... more The increasing numbers of the network users and services of the organization in network speed is unbalanced. So the organization should have offer the quality of services in the network. The Primary goals of quality of service (QoS) includes dedicated bandwidth, controlled jitter, latency (required by some real-time and interactive traffic), improved data loss characteristics and provide efficient services for users. Shaping network optimization is crucial things for network administrators. To implement the Network QoS by optimizing current network by physical and logical architectures. The algorithms that depict the implementations of research work for logical architecture Weighted Random early detection (WRED), for physical and data link layers architecture minimum spanning tree methods. To assess the existing networks we have used both the qualitative and quantitative data. The qualitative data is browsed from different the network performances metrics called wireshark and the bandwidth monitor. For the quantitative data that we have used from the collected data by questionnaire, interview and site visiting in ICT.
The Network Packet Flow is analyzed and
defined by the network administers in the company to
assu... more The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability of the internet. So in My research I dully answered to identify and asses the network administrator can record the ingress and egress of the packet flow-in and flow-out in the routers respectively. Therefore the network environment is reliable, identified and assessed by using the network simulators called packet tracer and the protocol of NETFLOW protocol implementation in this research works.
The data flows between two machines that i.e. source and destination the data should be locked in... more The data flows between two machines that i.e. source and destination the data should be locked in the two keys that are called Private and public keys. The algorithm that used to make strong security in data flow inside the computer network; in this research work is RSA. The algorithmused to encrypt and decrypt the flow of data between the source (A) and Destination(B). If the source (A) sends data to Destination (B) then my experiment could automates first A encrypts the message or Plaintext by using sources (A) private key and Public keys of A.In general, RSA data encrypting method useful to secure and lock data in the computer network.
The rapid growth of network users and demands in Wolaita sodo university requires Quality of serv... more The rapid growth of network users and demands in Wolaita sodo university requires Quality of services. The Primary goals of Quality of service (QoS) includes dedicated bandwidth, controlled jitter, latency (required by some real-time and interactive traffic), and improved loss characteristics to provide satisfactory services for users. Shaping network optimization is crucial things for network administrators. To implement the Network QoS by optimizing current network by physical and logical architectures. The algorithms that depict the implementations of research work for logical architecture Weighted Random early detection (WRED), for physical and data link layers architecture minimum spanning tree methods. To assess the existing networks I have used both the qualitative and quantitative data. The qualitative data is browsed from different the network performances metrics called wireshark and the bandwidth monitor. For the quantitative data that we have used from the collected data by questionnaire, interview and site visiting in ICT.
The increasing numbers of the network users and services of the organization in network speed is ... more The increasing numbers of the network users and services of the organization in network speed is unbalanced. So the organization should have offer the quality of services in the network. The Primary goals of quality of service (QoS) includes dedicated bandwidth, controlled jitter, latency (required by some real-time and interactive traffic), improved data loss characteristics and provide efficient services for users. Shaping network optimization is crucial things for network administrators. To implement the Network QoS by optimizing current network by physical and logical architectures. The algorithms that depict the implementations of research work for logical architecture Weighted Random early detection (WRED), for physical and data link layers architecture minimum spanning tree methods. To assess the existing networks we have used both the qualitative and quantitative data. The qualitative data is browsed from different the network performances metrics called wireshark and the bandwidth monitor. For the quantitative data that we have used from the collected data by questionnaire, interview and site visiting in ICT.
Uploads
Papers by Desta Dana
defined by the network administers in the company to
assure the exact data flow in the networked systems.
Currently, in the world the data flow is unreliable in the
internet because of unreliability of the internet. So in My
research I dully answered to identify and asses the network
administrator can record the ingress and egress of the
packet flow-in and flow-out in the routers respectively.
Therefore the network environment is reliable, identified
and assessed by using the network simulators called packet
tracer and the protocol of NETFLOW protocol
implementation in this research works.
Drafts by Desta Dana
defined by the network administers in the company to
assure the exact data flow in the networked systems.
Currently, in the world the data flow is unreliable in the
internet because of unreliability of the internet. So in My
research I dully answered to identify and asses the network
administrator can record the ingress and egress of the
packet flow-in and flow-out in the routers respectively.
Therefore the network environment is reliable, identified
and assessed by using the network simulators called packet
tracer and the protocol of NETFLOW protocol
implementation in this research works.