Security framework Communications of Asynchronous Transfer Mode
DOI:
https://doi.org/10.61841/z5y23j81Keywords:
ATM Networks,Security, Computer Communications.Abstract
There is growing enthusiasm for improving broadband communication administrations and networks for business use in both local area-wide networks. The main reasons are that demands for increased bandwidth for the interconnection of remote sites and “high speed data transmission” of mass data including photographs etc. must have to meet.The features of network traffic have also changed significantly.The form of the burst traffic is increasingly characterized by a constant requirement for multi-megabytes of bandwidth.The necessity for evolving and unclear data bandwidth transfer requirements has increased with the evolution of another era of networking technologies. The ATM system is used mainly for broadband networks communication under cellular ISDN banners. ATM provides high-speed interconnection in Mbit / s or Gbit / s across wide areas, which removes the bottleneck from networks to end frameworks.For addition, on demand, the client can access data transfer capabilities and the client is actually charged for the transmission power. As more information is transferred through ATM networks (audio, images and data), security issues get more critical. The rapidly growing usage of the Internet to transfer confidential and sensitive information only enhances the importance of security services.One could even argue that the success of ATM is not determined by its efficiency but by the degree of confidence in its performance, safety and availability. The purpose of this thesis is to address questions relating to the design of ATM network security services.
Downloads
References
1. Kai-Yeung Siu "Brief overview ATM: Layers of Protocols, LAN Emulation and Traffic Control " Computer Communication Review ACM SIGCOMM
2. Christoph L. Schuba "Traditional IP and ARP over ATM"
3. ArjanDurresi "Nonconcurrent Transfer Mode (ATM)"
4. Ibrahim Ali Ibrahim Diyeb "Casing Relay versus Asynchronous Transfer Mode: A Comparative Study and Simulation" I. J. PC Network and Information Security, 2017, 10, 33-40 Published Online October 2017 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2017.10.04
5. Jakub Svoboda "System Monitoring Approaches: An Overview" International Journal of Advances in Computer Networks and Its Security–IJCNS Volume 5: Issue 2 [ISSN: 2250-3757] Publication Date: 30 October, 2015
6. Robert H. Deng "Verifying Data Transfer in Asynchronous Transfer Mode Networks" 0-7803-2509-5/95 US$4.00 0 1995 IEEE
7. Yukari Tsuji "Future Network Technologies for the 5G/IoT Era" Feature Articles: Creating a Flexible and Smart Network as a New Social Infrastructure
8. Kiran R. Barapatre "A Performance Comparison of X.25, Frame Relay and ATM in High Speed arranges A Review" International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Website: www.ijircce.com Vol. 5, Issue 3,
March 2017
9. D. E. Bassey "Execution Evaluation of Asynchronous Transfer Mode (ATM) As A Vehicle For Wide Bandwidth Internet Carriage" International Journal of Engineering Research and General Science Volume 4, Issue 5, September-October, 2016 ISSN 2091-2730
10. M.Sreenivasulu "Upgraded ERICA Congestion Control Scheme for ATM Networks" IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.5, May 2011
11. Nisha.R "Usage of Class Based Priority Tunneling In Multi-Protocol Label Switching Networks" International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-7 May, 2019
12. Sumanpreet "An audit on Gigabit Passive Optical Network (GPON)" International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 3, March 2014
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.