Journal articles on the topic 'Management Computer networks'

To see the other types of publications on this topic, follow the link: Management Computer networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Management Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Hong Jin. "Computer Network Management Technology and its Application Glimpse." Advanced Materials Research 1079-1080 (December 2014): 683–85. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.683.

Full text
Abstract:
Computer network is a product of modern computer technology and communications technologies. Computer network management technology refers to the initialization operation and monitor operation of computer networks in the active state. Computer network management technology function is to collect the related information in the network system. This article will mainly focus on computer network management technology and its application to start on.
APA, Harvard, Vancouver, ISO, and other styles
3

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, and Krzysztof Malinowski. "Energy-saving management in computer networks." Australian Journal of Electrical and Electronics Engineering 12, no. 3 (July 3, 2015): 242–52. http://dx.doi.org/10.1080/1448837x.2015.1093002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cherry, Steve. "Computer Networks Improve Student Achievement, School Management." NASSP Bulletin 75, no. 535 (May 1991): 78–83. http://dx.doi.org/10.1177/019263659107553514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saputra, I. Made Arya Budhi, Putu Dicky Indrajaya, Ricky Aurelius Nurtanto Diaz, I. Komang Agus Ady Aryanto, and Ni Luh Putri Srinadi. "ANALYSIS OF QUALITY OF SERVICE BANDWIDTH MANAGEMENT ON COMPUTER NETWORK USING MIKROTIK RB951Ui-2HnD." Jurnal Techno Nusa Mandiri 18, no. 1 (March 15, 2021): 8–16. http://dx.doi.org/10.33480/techno.v18i1.2164.

Full text
Abstract:
Computer networks are now part of every human activity. The use of computer networks is currently experiencing a significant increase due to the Covid-19 pandemic, however, there are still many problems with computer networks, such as what often happens is the slow pace of computer networks in transferring data caused by limited bandwidth or maximum limits. owned by the computer network. For that, we need a computer network bandwidth management method called the QoS (Quality of Service) method. In this method, a tool called the Mikrotik Router-board RB951Ui-2HnD is used to conduct this research. In implementing this system the steps are taken starting from data collection, requirements analysis, system design with flowcharts and system depiction using a star topology, then implementation and unit testing on the user or Client, and testing the computer network system on the Mikrotik Router-board. The results of this study will be explained using statistical tables obtained from testing using the Wireshark application
APA, Harvard, Vancouver, ISO, and other styles
6

Boulis, Athanassios, and Sanjay Jha. "Network management in new realms: wireless sensor networks." International Journal of Network Management 15, no. 4 (2005): 219–21. http://dx.doi.org/10.1002/nem.569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Warrier, U., P. Relan, O. Berry, and J. Bannister. "A network management language for OSI networks." ACM SIGCOMM Computer Communication Review 18, no. 4 (August 1988): 98–105. http://dx.doi.org/10.1145/52325.52335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Robles-Gómez, Antonio, Aurelio Bermúdez, and Rafael Casado. "Efficient network management applied to source routed networks." Parallel Computing 37, no. 3 (March 2011): 137–56. http://dx.doi.org/10.1016/j.parco.2011.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Ahmed. "Communication networks management." Computer Communications 10, no. 6 (December 1987): 313. http://dx.doi.org/10.1016/0140-3664(87)90250-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Glăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.

Full text
Abstract:
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
APA, Harvard, Vancouver, ISO, and other styles
11

Ougolnitsky, Gennady, and Olga Gorbaneva. "Sustainable Management in Active Networks." Mathematics 10, no. 16 (August 10, 2022): 2848. http://dx.doi.org/10.3390/math10162848.

Full text
Abstract:
This paper synthesizes two areas of research: control models in networks and sustainable development of active systems. The concept of an active network (an active system with a network structure) is proposed and formalized. Two common classes, hierarchical and non-hierarchical active networks, are identified and studied; some illustrative examples are given. The sustainable management problem of active networks is stated, and approaches to its solution are described. A model example of opinion control in an active network with sustainable development requirements is numerically simulated. For this purpose, the author’s method of qualitatively representative scenarios is used.
APA, Harvard, Vancouver, ISO, and other styles
12

Zang, Hua Dong. "Intelligent Sensor Networks Based Computer Lab Management System." Advanced Materials Research 838-841 (November 2013): 3256–59. http://dx.doi.org/10.4028/www.scientific.net/amr.838-841.3256.

Full text
Abstract:
Current emphasis on practical teaching, students creative thinking higher vocational schools teaching philosophy, the traditional manual management mode of the computer training room shows weak features, mainly for equipment maintenance cycle length and the contradiction between the teaching needs. From teaching management, equipment maintenance, environmental management, safety management, explore computer-based training room sensor network management model.
APA, Harvard, Vancouver, ISO, and other styles
13

Kosmopoulos, Ioannis, Emmanouil Skondras, Angelos Michalas, Emmanouel T. Michailidis, and Dimitrios D. Vergados. "Handover Management in 5G Vehicular Networks." Future Internet 14, no. 3 (March 13, 2022): 87. http://dx.doi.org/10.3390/fi14030087.

Full text
Abstract:
Fifth-Generation (5G) vehicular networks support novel services with increased Quality of Service (QoS) requirements. Vehicular users need to be continuously connected to networks that fulfil the constraints of their services. Thus, the implementation of optimal Handover (HO) mechanisms for 5G vehicular architectures is deemed necessary. This work describes a scheme for performing HOs in 5G vehicular networks using the functionalities of the Media-Independent Handover (MIH) and Fast Proxy Mobile IPv6 (FPMIP) standards. The scheme supports both predictive and reactive HO scenarios. A velocity and alternative network monitoring process prepares each vehicle for both HO cases. In the case of predictive HO, each time the satisfaction grade of the vehicular user drops below a predefined threshold, the HO is initiated. On the other hand, in the case of reactive HO, the vehicle loses the connectivity with its serving network and connects to the available network that has obtained the higher ranking from the network selection process. Furthermore, the HO implementation is based on an improved version of the FPMIPv6 protocol. For the evaluation of the described methodology, a 5G vehicular network architecture was simulated. In this architecture, multiple network access technologies coexist, while the experimental results showed that the proposed scheme outperformed existing HO methods.
APA, Harvard, Vancouver, ISO, and other styles
14

Kontoudis, Dimitris, and Panayotis Fouliras. "A Survey of Models for Computer Networks Management." International journal of Computer Networks & Communications 6, no. 3 (May 31, 2014): 157–76. http://dx.doi.org/10.5121/ijcnc.2014.6313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Oktara, Dhiemas Aditya, Rahmat Suhatman, and Ibnu Surya. "Implementation of User Management in a Laboratory with a Linux Primary Domain Controller." Journal of Applied Informatics and Computing 3, no. 2 (November 21, 2019): 73–79. http://dx.doi.org/10.30871/jaic.v3i2.1347.

Full text
Abstract:
The development of network technology now allows many applications that can be done with computer networks. This can be seen from the needs of educational institutions for computer networks. One of them is the Polytechnic Caltex Riau (PCR). The use of computers in the laboratory has not yet applied the concept of user management, so that the data stored on the computer can be accessed by more than one user which causes data to be reduced further. One way to overcome this problem is to implement a Primary Domain Controller (PDC), a server that can store and manage computer activities. Requires the client to have an account to log in to the computer and have their own storage media. From the test results obtained by the average received users log in, directory access and application by 96% and from the results of tests that have been done on average to CPU usage of 4% and memory usage by 37%. Can reduce from testing carried out to 30 users, using CPU and memory increases along with the number of clients who carry out activities and it takes a pause when logging in so that all users can access the server.
APA, Harvard, Vancouver, ISO, and other styles
16

van den Broek, Floris, and Maarten Looijen. "Management of international networks." International Journal of Network Management 7, no. 5 (September 1997): 242–50. http://dx.doi.org/10.1002/(sici)1099-1190(199709/10)7:5<242::aid-nem252>3.0.co;2-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Ping. "College Campus Network Management Information System Research and Implementation." Applied Mechanics and Materials 496-500 (January 2014): 2265–68. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2265.

Full text
Abstract:
In this paper, the actual situation of university management and the specific needs of colleges and universities to study and design a set of management information systems. Management information so that the original approach gradually to computers and computer networks as the carrier of the campus electronic information processing and transmission replaced, through the network, the use of multimedia and communication technologies for remote teaching, faculty achieve complementarity. Achieve scientific management, modernization; use of modern means to improve the quality of teaching and management level
APA, Harvard, Vancouver, ISO, and other styles
18

Leon-Garcia, A., and L. G. Mason. "Virtual network resource management for next-generation networks." IEEE Communications Magazine 41, no. 7 (July 2003): 102–9. http://dx.doi.org/10.1109/mcom.2003.1215646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Full text
Abstract:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase user mobility with computer network technology using cable media. Bandwidth management is a way to manage the internet network for even distribution of bandwidth usage even though many network users use it. Hierarchical token bucket (HTB) one method to do a bandwidth management in this HTB
APA, Harvard, Vancouver, ISO, and other styles
20

Boffey, T. B. "Location Problems Arising in Computer Networks." Journal of the Operational Research Society 40, no. 4 (April 1989): 347. http://dx.doi.org/10.2307/2583250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Boffey, T. B. "Location Problems Arising in Computer Networks." Journal of the Operational Research Society 40, no. 4 (April 1989): 347–54. http://dx.doi.org/10.1057/jors.1989.52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Gavish, Bezalel. "Configuring wide area computer networks." OR Spektrum 14, no. 3 (September 1992): 115–28. http://dx.doi.org/10.1007/bf01783514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Turchanyi, Piroska S. "Computer networks and simulation III." European Journal of Operational Research 31, no. 1 (July 1987): 154–55. http://dx.doi.org/10.1016/0377-2217(87)90159-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Stevenson, J. G. "Management of multivendor networks." IBM Systems Journal 31, no. 2 (1992): 189–205. http://dx.doi.org/10.1147/sj.312.0189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

KUKLINSKI, Slawomir, and Prosper CHEMOUIL. "Network Management Challenges in Software-Defined Networks." IEICE Transactions on Communications E97.B, no. 1 (2014): 2–9. http://dx.doi.org/10.1587/transcom.e97.b.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.

Full text
Abstract:
The university network is very popular, the use of computer networks for laboratory management has become a necessity. We proposed the construction of the building room memorandum ideas and some strategies that can be implemented, the better solution normative room management issues. According to the actual use of university computer room design possible combination of VLAN and VPN solutions. We used a more mature support for multiple operating systems and supports SNMP network devices Mrtg tools to help us achieve traffic monitoring, reducing the need for repeat open, traffic monitoring can be a good solution to the problem. Use of virtual LANs, the use of wireless network technology, the use of remote monitoring technology, the use of Web sites and remote access, have made these physical room on the formation of a relatively independent logical connections to facilitate the reunification of management and maintenance.
APA, Harvard, Vancouver, ISO, and other styles
27

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Full text
Abstract:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer networks and the internet as a medium for data and information communication. However, the computer and internet network systems at SMA Negeri 2 Bojonegoro have not been managed properly. The solution to improve the effectiveness of using and managing internet bandwidth at SMA Negeri 2 Bojonegoro is to design and implement network management with Mikrotik Router to make it easier for administrators to manage the network. This research uses the Network Development Life Cycle (NDLC) method as a method of developing computer network management at SMA Negeri 2 Bojonegoro. The results showed that the use of a network system using a Mikrotik router in managing internet bandwidth efficiently facilitates and facilitates various activities related to internet use.
APA, Harvard, Vancouver, ISO, and other styles
28

Abdullah, Khalid Murad, Bahaulddin Nabhan Adday, Refed Adnan Jaleel, Iman Mohammed Burhan, Mohanad Ahmed Salih, and Musaddak Maher Abdul Zahra. "Integrating of Promising Computer Network Technology with Intelligent Supervised Machine Learning for Better Performance." Webology 19, no. 1 (January 20, 2022): 3792–99. http://dx.doi.org/10.14704/web/v19i1/web19249.

Full text
Abstract:
The Software defined network (SDN) controller has such networks universal sight and allows for centralized management and control for the networks. The algorithms of Machine learning used alone or combined with the SDN controller's northbound applications in order to make intelligent SDN. SDN is such potential networking design that blends network's programmability with central administration. The control and the data planes are separated in SDN, and the network with central management point is called SDN controller, which may be programmed and utilized as a brain of the network. Lately, the community of researchers have shown a greater willingness to take advantage of current advances in artificial intelligence to give the SDN best decision making and learning skills. Our research found that combining SDN with Intelligent Supervised Machine Learning (ISML) is very important for performance improvement. ISML is the development of algorithms that can generate broad patterns and assumptions from external source instances in order to portend the predestination of future instances. The ISML algorithms of classification goal is to categorize data based on past information. In data science problems, classification is used rather frequently. To solve such problems, a number of successful approaches were already presented, including rule-based techniques, instance-based techniques, logic-based techniques, and stochastic techniques. This study examined the ISML algorithms' efficiency by checking the precision, accuracy, and with or without SDN recall.
APA, Harvard, Vancouver, ISO, and other styles
29

Herlina, Elvi. "Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (September 30, 2022): 21–25. http://dx.doi.org/10.35335/jmi.v10i2.4.

Full text
Abstract:
The need for internet in the learning process has a very significant role so that in its use it is necessary to regulate access and manage bandwidth well for the smooth internet access. This research was conducted to analyze the differences in bandwidth management design for computer network infrastructure in the old design and the new design at SMKN 1 ABDYA. This study aims to see how to analyze the difference in delay and throughput in the bandwidth management design of old and new computer networks. In this study using qualitative research methods where the data obtained by means of observation, interviews and documentation. This research uses the Wireshark version 2.6 application. 6 to see the use of delay and throughput on the bandwidth management design of old and new computer networks. Based on the results of the calculation of the use of delay and throughput using the Wireshark 2.6.6 application, there is a significant difference between the use of delay and throughput in the design of bandwidth management for the old computer network and the design of bandwidth management for the new computer network.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Ke Jun, and Wu Xu. "Virtual Instrument Measurement System Architecture Design Based on Database Management." Applied Mechanics and Materials 198-199 (September 2012): 989–94. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.989.

Full text
Abstract:
The purpose of virtual instrument measurement system architecture design based on database management is to expand stand-alone mode into the measurement mode of network. Through computer network, multiple virtual instrument measurement networks for data storage, communication and control the formation of network measurement applications are realized. This article discusses the formation of virtual instrument based on the database and computer network monitoring and control network programs, measures and achievement.
APA, Harvard, Vancouver, ISO, and other styles
31

Pentikousis, Kostas, Ramon Agüero, and Symeon Papavassiliou. "Mobility and Network Management in Heterogeneous Networks." Mobile Networks and Applications 16, no. 4 (June 8, 2011): 409–11. http://dx.doi.org/10.1007/s11036-011-0324-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gagalyuk, T., J. H. Hanf, and M. Hingley. "Firm and whole chain success: network management in the Ukrainian food industry." Journal on Chain and Network Science 13, no. 1 (January 1, 2013): 47–70. http://dx.doi.org/10.3920/jcns2013.x226.

Full text
Abstract:
This article develops the theoretical foundations of supply chain network management in order to investigate the constructs surrounding whole chain success rather than just success at firm level. It is argued that the ‘network success’ link has been under-studied, with most empirical studies focusing on the achievement of goals by an individual firm in a network context. A model of the whole network's success in the context of supply chain networks in food industry supply chain relationships is used. The results identify that network-level goals must be considered alongside firm-level goals in supply chain networks. Furthermore, network-level goals are subject to the impacts of chain management and have to be of particular interest for focal firms that are responsible for the development and implementation of collective strategies.
APA, Harvard, Vancouver, ISO, and other styles
33

Wong, Ken. "Effective Computer Security Management." EDPACS 14, no. 1 (July 1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rao, Jai R. "Reading up books: Computer communications networks: New technologies revolutionize computers." IEEE Potentials 4, no. 4 (December 1985): 33–36. http://dx.doi.org/10.1109/mp.1985.6500211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pirkul, H., and R. Gupta. "Topological Design of Centralized Computer Networks." International Transactions in Operational Research 4, no. 1 (January 1997): 75–83. http://dx.doi.org/10.1111/j.1475-3995.1997.tb00064.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Shikhaliyev, Ramiz. "A method for intelligent scheduling of computer networks monitoring." Problems of Information Technology 13, no. 1 (January 24, 2022): 38–42. http://dx.doi.org/10.25045/jpit.v13.i1.05.

Full text
Abstract:
To ensure the efficiency of management, the security of computer networks (CN), as well as to ensure the required level of quality of service for network applications, accurate and up-to-date information on the state of the CN is required. This information can be obtained through continuous active monitoring of the quantitative characteristics of the CN. Thus, active monitoring becomes an important tool for ensuring the efficiency of management and security of the CN. However, continuous active monitoring, especially of large networks, can lead to congestion of network channels, which can reduce the effectiveness of monitoring the CN. Consequently, with active monitoring of the CN, it is necessary to manage the use of resources (channel and computational) of the network and reduce the load on the network. To solve this problem, this paper proposes a method for intelligent planning of monitoring of the CN. Using machine learning algorithms, can be analyzed the state and performance of the CN and acquire knowledge that can be used to determine the most appropriate rules for monitoring the CN. Thus, it is necessary to find such monitoring rules that will ensure the effectiveness of monitoring the CN. The proposed method can reduce the impact of monitoring on network performance, and on the operation of network applications.
APA, Harvard, Vancouver, ISO, and other styles
37

Yende, Raphael Grevisse, Tshiela Marie Alice Nkuna, Kazadi Pamphile Mulumba, Ntumba Freddy Katayi, Kaseka Viviane Katadi, Musubao Patient Swambi, and Muamba Bernard Tshiasuma. "Signal performance optimization in the local area network trafic management in the DRC : Models for transmission networks." European Journal of Computer Science and Information Technology 10, no. 5 (May 15, 2022): 1–23. http://dx.doi.org/10.37745/ejcsit.2013/vol10n5123.

Full text
Abstract:
The high availability of computer networks is a prerequisite in large companies and service providers. Thus, computer network administrators are called upon to face the various growing challenges related to unscheduled downtime of services; lack of expertise; lack of tools; the complexity of technologies; market consolidation and competition to provide better quality services. It should be remembered that the organization of the networks of telecommunication aims at giving control of the phenomena which occur there, during the treatment of the communications, and more generally of the services which they offer. These phenomena are governed by the randomness of the appearance of the requests, and are studied independently of the choices of technology implemented. They are amenable to the formalism of the calculation of probabilities, and give birth to the notion of traffic, which will play a central role in their apprehension, given that they condition for a large part the effective structure of modern networks. This research specifically examines the problems of optimization of signal performance in traffic management of local area networks of companies in the Democratic Republic of Congo, by presenting the different elements of network traffic theory and quality. Thus demonstrating their impact on the architectures of networks and computer systems, and at the same time introducing the major problems faced by IT network administrators on a daily basis; The main objective of this research is to evaluate the development performance of computer and telecommunications networks according to their applications in the areas of network design, equipment dimensioning, and characterization and quality measurement. Service, and network planning techniques.
APA, Harvard, Vancouver, ISO, and other styles
38

Papavassiliou, Symeon. "Network and service management for wide-area electronic commerce networks." International Journal of Network Management 11, no. 2 (2001): 75–90. http://dx.doi.org/10.1002/nem.391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Upp, Michael. "Physical network management: An essential tool for managing growing networks." International Journal of Network Management 3, no. 1 (March 1993): 38–44. http://dx.doi.org/10.1002/nem.4560030107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mokhtar, Bassem, and Mohamed Eltoweissy. "Big data and semantics management system for computer networks." Ad Hoc Networks 57 (March 2017): 32–51. http://dx.doi.org/10.1016/j.adhoc.2016.06.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, S., S. H. Lee, K. C. Lee, J. W. Choi, and M. H. Lee. "Performance Management of Communication Networks for Computer Integrated Manufacturing." International Journal of Advanced Manufacturing Technology 18, no. 10 (November 1, 2001): 764–70. http://dx.doi.org/10.1007/s001700170020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Safrianti, Ery, Linna Oktaviana Sari, and Rian Arighi Mahan. "Optimization of Universitas Riau Data Network Management Using Software Defined Network (SDN)." International Journal of Electrical, Energy and Power System Engineering 2, no. 3 (October 9, 2019): 10–14. http://dx.doi.org/10.31258/ijeepse.2.3.10-14.

Full text
Abstract:
Computer networks are one of the main parts in the telecommunications system. To support reliable network technology, a centralized network is needed so that network traffic can be managed more easily. Software-Defined Network (SDN) technology is a centralized network that provides a separation between control planes and data planes in different systems. This study discusses the optimization of network management at the University of Riau (UNRI) using SDN. Optimization is done by designing a UNRI computer network in the form of SDN then simulated using the Mininet. Quality of Service (QoS) analysis is performed from the measurement results using Wireshark. The network simulation results give a delay value of 0.506 ms, 0% packet loss, the throughput of 590,392 Mb / s and jitter of 0.093 ms. The SDN network provides better delay and jitter performance compared to conventional UNRI networks with a delay value of 13,874 ms, 0% packet loss, 635.1 Mb/s throughput and 2.6 ms jitter. UNRI's SDN network design is worth considering because it has better QoS values, delay, and jitter below ITU standards and conventional networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Kocsis, F., E. Auer, N. Fujii, and L. Bernstein. "Management of Broadband Networks." IEEE Communications Magazine 35, no. 10 (October 1997): 36–38. http://dx.doi.org/10.1109/mcom.1997.623983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Xi, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, and Heli Zhang. "Blockchain-empowered Data-driven Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–38. http://dx.doi.org/10.1145/3446373.

Full text
Abstract:
The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management. Blockchain, which is a technology for building distributed ledgers that provide an immutable log of transactions recorded in a distributed network, has become prominent recently as the underlying technology of cryptocurrencies and is revolutionizing data storage and processing in computer network systems. For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy network control, and decentralized routing and resource managements. However, many important challenges and open issues remain to be addressed before blockchain can be deployed widely to enable future DDNs. In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks and identify challenges and potential solutions in the applications of blockchains in future DDNs. We identify application scenarios in which future blockchain-empowered DDNs could improve the efficiency and security, and generally the effectiveness of network services.
APA, Harvard, Vancouver, ISO, and other styles
45

Choi, Mi-Jung, James W. Hong, and Hong-Taek Ju. "XML-Based Network Management for IP Networks." ETRI Journal 25, no. 6 (December 3, 2003): 445–63. http://dx.doi.org/10.4218/etrij.03.0103.0062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chwastek, R. "Network management in wired and wireless networks [Book Review]." IEEE Communications Magazine 40, no. 5 (May 2002): 30–32. http://dx.doi.org/10.1109/mcom.2002.1000209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Saydam, Tuncay, and Thomas Magedanz. "From networks and network management into service and service management." Journal of Network and Systems Management 4, no. 4 (December 1996): 345–48. http://dx.doi.org/10.1007/bf02283158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Price, WL. "Computer security: a handbook for management." Computer Communications 10, no. 1 (February 1987): 39. http://dx.doi.org/10.1016/0140-3664(87)90313-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Aouedi, Ons, Kandaraj Piamrat, and Benoît Parrein. "Intelligent Traffic Management in Next-Generation Networks." Future Internet 14, no. 2 (January 28, 2022): 44. http://dx.doi.org/10.3390/fi14020044.

Full text
Abstract:
The recent development of smart devices has lead to an explosion in data generation and heterogeneity. Hence, current networks should evolve to become more intelligent, efficient, and most importantly, scalable in order to deal with the evolution of network traffic. In recent years, network softwarization has drawn significant attention from both industry and academia, as it is essential for the flexible control of networks. At the same time, machine learning (ML) and especially deep learning (DL) methods have also been deployed to solve complex problems without explicit programming. These methods can model and learn network traffic behavior using training data/environments. The research community has advocated the application of ML/DL in softwarized environments for network traffic management, including traffic classification, prediction, and anomaly detection. In this paper, we survey the state of the art on these topics. We start by presenting a comprehensive background beginning from conventional ML algorithms and DL and follow this with a focus on different dimensionality reduction techniques. Afterward, we present the study of ML/DL applications in sofwarized environments. Finally, we highlight the issues and challenges that should be considered.
APA, Harvard, Vancouver, ISO, and other styles
50

Błażwicz, Jacek, Jerzy Brzeziński, and Giorgio Gambosi. "Graph theoretical issues in computer networks." European Journal of Operational Research 71, no. 1 (November 1993): 1–16. http://dx.doi.org/10.1016/0377-2217(93)90256-m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography