Volume 5 , Issue 1 , PP: 49-53, 2021 | Cite this article as | XML | Html | PDF | Full Length Article
Yackelyn Dayanys Domínguez Izquierdo 1 *
Doi: https://doi.org/10.54216/JISIoT.050101
Interconnected devices have provided companies and individuals with the advantage that information travels from one place to another, making information processes more viable. The interconnection networks are responsible for providing everything necessary for the machine to have an adequate passage of messages and use of commutations. In this document a design of a LAN network is developed for the area of a library which needs to expand its communication network, thus forming a computer network to connect different types of computers sharing information links. These data links are established through means such as cable, optical cables, or wireless means such as WIFI.
interconnected network, LAN network
[1] M. Ilayaraja, "Particle Swarm Optimization based Multihop Routing Techniques in Mobile ADHOC Networks," International Journal of Wireless and Ad Hoc Communication,vol. 1, no. 1, 2020.
[2] BB Fonseca, OM Cornelio, and IP Pupo, "Linguistic summarization of data in decision-making on performance evaluation," 2020 XLVI Latin American Computing Conference (CLEI), pp. 268-274, 2020.
[3] MP Gómez, "DESIGN AND IMPLEMENTATION OF A LAN NETWORK FOR THE SOFTEL COMPANY," UNESUM-Sciences. Multidisciplinary Scientific Journal. ISSN 2602-8166,vol. 5, no. 4, pp. 123-142, 2021.
[4] AMS Ramírez, and OM Cornelio, "METHODOLOGICAL PROPOSAL AND IMPLEMENTATION OF A LAN NETWORK FOR THE INSTITUTE OF SPORTS MEDICINE," UNESUM-Sciences. Multidisciplinary Scientific Journal. ISSN 2602-8166,vol. 5, no. 4, pp. 169-184, 2021.
[5] IV Pustokhina, "Blockchain technology in the international supply chains," International Journal of Wireless and Ad Hoc Communication,vol. 1, no. 1, 2020.
[6] AH Mirza, and S. Cosan, "Computer network intrusion detection using sequential LSTM neural networks autoencoders." pp. 1-4.
[7] B. Mao, ZM Fadlullah, F. Tang, N. Kato, O. Akashi, T. Inoue, and K. Mizutani, “Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning, "IEEE Transactions on Computers,vol. 66, no. 11, pp. 1946-1960, 2017.
[8] B. Wellman, "Computer networks as social networks," Science,vol. 293, no. 5537, pp. 2031-2034, 2001.
[9] JS Quarterman, and JC Hoskins, "Notable computer networks," Communications of the ACM,vol. 29, no. 10, pp. 932-971, 1986.
[10] WK Ehab Rushdy, Nihal Salah "Managing a Secure Refresh Token Implementation with JSON Web Token in REST API" International Journal of Wireless and Ad Hoc Communication,vol. 2, no. 1, 2021.
[eleven] R. Sahay, W. Meng, and CD Jensen, "The application of Software Defined Networking on securing computer networks: A survey," Journal of Network and Computer Applications,vol. 131, pp. 89-108, 2019.
[12] G. Millán, and G. Lefranc, "A simplified multifractal model for self-similar traffic flows in high-speed computer networks revisited," arXiv preprint arXiv: 2103.05183, 2021.
[13] JUA Sariga "Type 2 Fuzzy Logic based Unequal Clustering algorithm for multi-hop wireless sensor networks" International Journal of Wireless and Ad Hoc Communication,vol. 1, no. 1, 2020.
[14] VP Koryachko, DA Perepelkin, and V. Byshov, "Development and research of improved model of multipath adaptive routing in computer networks with load balancing," Automatic Control and Computer Sciences,vol. 51, no. 1, pp. 63-73, 2017.