Do you want to publish a course? Click here

The Protocol Independent Multicast - Sparse Mode (PIM-SM) uses one center (referred here as the Rendezvous Point “RP”) for all sources in a multicast group. PIM-SM distributes the multicast traffic of a source through a so-called shared distribution tree, whose root is at a predefined core called Rendezvous Point (RP). It also builds source-specific trees to the sources whose data rates exceed a defined threshold. In the literature, several investigations are done to improve and provide an efficient mechanism for the dynamic relocation of the RP depending on the sources or the members of the multicast group. In this paper, we extend the investigation of three search algorithms used to find the optimal RP position. To evaluate the performance of these algorithms, Estimated Tree Cost (ETC) and our improvement Enhanced Estimated Tree Cost (EETC), are used. The reason behind our choice these two methods is a comparative investigation of the RP-selection methods proposed in the literature. From the comparison we can see that ETC finds the most optimal position of the rendezvous point. The Hill-Climbing algorithm and the standard PIM-SM protocol with static RP-selection are used as a reference for comparison. Our algorithms result in a lower network load compared to RP-selection algorithm. However, they need additional control messages.
The research handles the evaluation of the performance of teachers of secondary education in the city of Latakia according to the criteria of total quality management from the perspective of supervisors and school directors in the following areas: planning and design of educational situations, classroom management and the relationship with the students, mastery of educational material and follow-up, use of modern techniques, student assessment, and the relationship with the local community. To achieve the objectives of the research, a questionnaire was designed consisting of (37) items covering the fields of research, and distributed to a sample of (41) educational supervisors, and (23) High School directors in the city of Lattakia.
Multitiered ecommerce applications are distributed applications where application logic is divided into components according to function. These components are installed on different machines, depending on the tier to which the application component belongs , additionally, these applications provide ecommerce services like online shopping
The aim of the research was to evaluate the role of the head nurses in documenting, evaluating and reviewing the performance of nursing staff at Tishreen University Hospital from the point of view of nursing staff. Random sample was used , it consi sted of 50% of the nursing staff at Tishreen University Hospital during the application of the research there number (300 ) nurses. A developed tool for collecting information was used based on recent research literature, and data were collected and analyzed using SPSS version (20). The most important results were that the evaluation of the role of the head nurses was at moderate level in documenting and evaluating the performance of the nursing staff, while the evaluation of the research sample for the role of the head nurses in reviewing their performance was at a good level.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security prot ocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا