Journal articles on the topic 'IP (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IP (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.
Full textKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Full textAlfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.
Full textRafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia, and Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, no. 2 (May 11, 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.
Full textYIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.
Full textBein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Full textUpadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Full textHu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.
Full textHammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator." Tikrit Journal of Engineering Sciences 18, no. 2 (June 30, 2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.
Full textStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Full textPratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol." Bulletin of Computer Science and Electrical Engineering 2, no. 2 (December 30, 2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.
Full textWu Boqiao, Liu Xuefei, Tan Aiping, and Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.
Full textAl-Fedaghi, Sabah S., and Ghadeer Aldamkhi. "Conceptual Modeling of an IP Phone Communication System." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 3 (July 2021): 83–94. http://dx.doi.org/10.4018/ijitn.2021070106.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textŻal, Mariusz, Marek Michalski, and Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism." Electronics 13, no. 5 (February 28, 2024): 918. http://dx.doi.org/10.3390/electronics13050918.
Full textHansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.
Full textLiu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue, and Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane." Electronics 11, no. 15 (July 30, 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.
Full textAmin, Muhammad, Dian Kurnia, and Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface." Journal of Applied Engineering and Technological Science (JAETS) 3, no. 2 (June 24, 2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.
Full textZhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Full textBen Jemaa, Maher, Nahla Abid, Maryline Laurent-Maknavicius, and Hakima Chaouchi. "Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks." Journal of Computer Systems, Networks, and Communications 2009 (2009): 1–6. http://dx.doi.org/10.1155/2009/383517.
Full textAnderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.
Full textHamarsheh, Ala, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, and Someah Alangari. "Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols." International Journal of Cloud Applications and Computing 13, no. 1 (October 25, 2023): 1–26. http://dx.doi.org/10.4018/ijcac.332765.
Full textKlincewicz, John G., and David F. Lynch. "Designing an IP Link Topology for a Metro Area Backbone Network." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 1 (January 2013): 26–42. http://dx.doi.org/10.4018/jitn.2013010103.
Full textAshraf, Tabinda, Steven S. W. Lee, Muhammad Iqbal, and Jen-Yi Pan. "Routing Path Assignment for Joint Load Balancing and Fast Failure Recovery in IP Network." Applied Sciences 11, no. 21 (November 8, 2021): 10504. http://dx.doi.org/10.3390/app112110504.
Full textAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Full textHosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.
Full textPenhoat, J., K. Guillouard, N. Omnès, J. Zhang, T. Lemlouma, and M. Salaun. "Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode." International Journal of Mobile Computing and Multimedia Communications 5, no. 4 (October 2013): 49–81. http://dx.doi.org/10.4018/ijmcmc.2013100104.
Full textDevi, A. Indira, and N. Arthi. "Alternate Path Selection in IP Networks using Bandwidth Optimization." International Journal of Advance Research and Innovation 3, no. 1 (2015): 43–47. http://dx.doi.org/10.51976/ijari.311507.
Full textLabinsky, Alexander. "FEATURES OF CRYPTOGRAPHIC PROTOCOLS." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 1 (April 17, 2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.
Full textMohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.
Full textBerkman, L., S. Otrokh, V. Ruzhynskyi, and K. Olienieva. "The optimization of computer equipment during the modernization of the unified system of centralized control and measurements of the SKS-7 network using the resources of the data processing center." Information and communication technologies, electronic engineering 3, no. 2 (September 2023): 88–94. http://dx.doi.org/10.23939/ictee2023.02.088.
Full textJin, Xing, Kan-Leung Cheng, and S. H. Gary Chan. "Scalable Island Multicast for Peer-to-Peer Streaming." Advances in Multimedia 2007 (2007): 1–9. http://dx.doi.org/10.1155/2007/78913.
Full textHoller, Holger, and Stefan Voß. "Software tools for a multilayer network design." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2005): 57–63. http://dx.doi.org/10.26636/jtit.2005.3.325.
Full textBaigorria, Luis A., José F. Postigo, Vicente A. Mut, and Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol." Robotica 21, no. 3 (May 13, 2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.
Full textMacedonia, Michael R., Michael J. Zyda, David R. Pratt, Paul T. Barham, and Steven Zeswitz. "NPSNET:A Network Software Architecture for LargeScale Virtual Environments." Presence: Teleoperators and Virtual Environments 3, no. 4 (January 1994): 265–87. http://dx.doi.org/10.1162/pres.1994.3.4.265.
Full textYakubova, Mubarak, Olga Manankova, Assel Mukasheva, Alimzhan Baikenov, and Tansaule Serikov. "The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX)." Applied Sciences 13, no. 19 (September 26, 2023): 10712. http://dx.doi.org/10.3390/app131910712.
Full textESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON, and KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS." International Journal of Information Technology & Decision Making 02, no. 04 (December 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.
Full textCui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software." Applied Mechanics and Materials 686 (October 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.
Full textAbood, Amany Mohammad, Maysam Sameer Hussein, Zainab G. Faisal, and Zainab H. Tawfiq. "Design and simulation of video monitoring structure over TCP/IP system using MATLAB." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 3 (December 1, 2021): 1840. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1840-1845.
Full textThuneibat, Saed, and Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.
Full textLee Chee Hang, Lee Chee Hang, Yu-Beng Leau Lee Chee Hang, Yong Jin Park Yu-Beng Leau, Zhiwei Yan Yong Jin Park, and Supriyanto Praptodiyono Zhiwei Yan. "Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking." 網際網路技術學刊 23, no. 3 (May 2022): 459–66. http://dx.doi.org/10.53106/160792642022052303004.
Full textSarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin, and Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework." Feb-Mar 2024, no. 42 (March 4, 2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.
Full textOmumbo, Nicholas J., Titus M. Muhambe, and Cyprian M. Ratemo. "Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture." International Journal of Computer Network and Information Security 13, no. 4 (August 8, 2021): 45–61. http://dx.doi.org/10.5815/ijcnis.2021.04.05.
Full textFanani, Galih, and Imam Riadi. "Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based." Buletin Ilmiah Sarjana Teknik Elektro 2, no. 2 (July 21, 2020): 70. http://dx.doi.org/10.12928/biste.v2i2.1065.
Full textChen, Xinhua, and Ya-ni Sun. "Computer Network Simulation Modeling Based on Object Oriented Petri Net." International Journal of Online Engineering (iJOE) 12, no. 02 (February 29, 2016): 25. http://dx.doi.org/10.3991/ijoe.v12i02.5039.
Full textO Holubnychyi, Dmitro, and Vasily Kotsyuba. "Applying technologies of monitoring and condition analysis of IP-networks based on the use of the SNMP protocol." Bulletin of Kharkov National Automobile and Highway University, no. 96 (May 24, 2022): 14. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.14.
Full textAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Full textShiranzaei, Atena, and Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.
Full textDorogyy, Yaroslaw, and Vadym Kolisnichenko. "Developing a method for the detection and identification of rootstock blockchain network nodes." Eastern-European Journal of Enterprise Technologies 1, no. 2 (127) (February 28, 2024): 6–15. http://dx.doi.org/10.15587/1729-4061.2024.297903.
Full textЖебель, В. А., and А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions." Успехи кибернетики / Russian Journal of Cybernetics, no. 2(14) (June 30, 2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.
Full text