Journal articles on the topic 'Network layer (OSI)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network layer (OSI).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (January 16, 2024): 29. http://dx.doi.org/10.3390/fi16010029.
Full textTsuchiya, P. F. "An architecture for network-layer routing in OSI." ACM SIGCOMM Computer Communication Review 17, no. 5 (October 1987): 185–90. http://dx.doi.org/10.1145/55483.55501.
Full textSusilawati Susilawati, Marcel Ade Satria, Khaila Mardina, Juniwan Juniwan, and Didik Aribowo. "Implementasi Teknologi Komunikasi Data Menggunakan Open System Interconnection (OSI) Untuk Berkirim Pesan Antar Perangkat." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (May 17, 2024): 124–29. http://dx.doi.org/10.61132/venus.v2i3.307.
Full textSudaryanto, Sudaryanto. "THE EFFECT OF MULTI LAYER SWITCHING FOR DATA TRANSFER SPEEDS ON COMPUTER NETWORK." Compiler 7, no. 2 (October 29, 2018): 85. http://dx.doi.org/10.28989/compiler.v7i2.372.
Full textAgrawal, Nitin Kumar, Shaamshad Alam, and Harshit Raghav. "Osi Model: The Basics Structure of Network Communication." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 66–69. http://dx.doi.org/10.35940/ijrte.d4991.019521.
Full textKarbowski, Andrzej. "Distributed asynchronous algorithms in the Internet – new routing and traffic control methods." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2005): 29–36. http://dx.doi.org/10.26636/jtit.2005.3.328.
Full textMohammed Abdul, Azeem, and Syed Umar. "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 181. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp181-186.
Full textJiang, Jian Feng, Jian Feng Jiang, Xian Zhang, and Jin Xia Sun. "Complementary QoS Strategy Research and Application in Large-Scale Switched Networks." Advanced Materials Research 712-715 (June 2013): 2664–70. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2664.
Full textKanaris, Loizos, Charalampos Sergiou, Akis Kokkinis, Aris Pafitis, Nikos Antoniou, and Stavros Stavrou. "On the Realistic Radio and Network Planning of IoT Sensor Networks." Sensors 19, no. 15 (July 24, 2019): 3264. http://dx.doi.org/10.3390/s19153264.
Full textChandnani, Manali, Mukesh Kumar Khandelwal, and Meeta Sharma. "A Survey on Synchronization Approach in MAC Layer Protocols." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.
Full textPhijik, Battula, and Chakunta Venkata Guru Rao. "Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks." Ingénierie des systèmes d information 26, no. 6 (December 27, 2021): 559–67. http://dx.doi.org/10.18280/isi.260606.
Full textMoreira Santos, María Genoveva, and Pedro Antonio Alcívar Marcillo. "Security in the data link layer of the OSI model on LANs wired Cisco." Journal of Science and Research: Revista Ciencia e Investigación 3, CITT2017 (February 23, 2018): 106–12. http://dx.doi.org/10.26910/issn.2528-8083vol3isscitt2017.2018pp106-112.
Full textAl Hayajneh, Abdullah, Md Zakirul Alam Bhuiyan, and Ian McAndrew. "A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication." Computers 9, no. 1 (January 20, 2020): 4. http://dx.doi.org/10.3390/computers9010004.
Full textDe Cleyn, P., and C. Blondia. "Impact of Cross-Layer Adaptations of Mobile IP on IEEE 802.11 Networks on Video Streaming." International Journal of Adaptive, Resilient and Autonomic Systems 1, no. 3 (July 2010): 59–80. http://dx.doi.org/10.4018/jaras.2010070104.
Full textT, Varsha, Shrihari, and Dr Nagaraja G. S. "IoT based a Smart Home Automation System Using Packet Tracer." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 183–87. http://dx.doi.org/10.22214/ijraset.2023.48514.
Full textOktavianus, Yoppi Lisyadi, Ikhwana Elfitri, and Onno Widodo Purbo. "Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel." INOVTEK Polbeng - Seri Informatika 8, no. 1 (June 17, 2023): 88. http://dx.doi.org/10.35314/isi.v8i1.3213.
Full textChupaev, A. V., R. S. Zaripova, R. R. Galyamov, and A. Y. Sharifullina. "The use of industrial wireless networks based on standard ISA-100.11a and protocol WirelessHART in process control." E3S Web of Conferences 124 (2019): 03013. http://dx.doi.org/10.1051/e3sconf/201912403013.
Full textJafri, Syed Talib Abbas, Irfan Ahmed, Sundus Ali, Jamaiah Yahaya, Faizan Qamar, and Zuriani Hayati Abdullah. "Split Hop Penalty for Transmission Quality Metrics in a Better Approach to Mobile Ad Hoc Networking (BATMAN) for IoT-Based MANET." Symmetry 15, no. 5 (April 24, 2023): 969. http://dx.doi.org/10.3390/sym15050969.
Full textR, Gautam, Suyog P, and G. S. Nagaraja. "Analysis of SNMP Based Protocols in IoT and Real- World Scenarios." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1867–71. http://dx.doi.org/10.22214/ijraset.2022.47293.
Full textBiradar, Shilpa, J. Shiny Duela, P. Ramya, Flory Francis, Tarun Singhal, Ankur Singhal, Ranjan Mishra, R. Govindaraj, and Amare Kebede Asfaw. "Improved Channel Capacity in 5G Ultradense Network." Wireless Communications and Mobile Computing 2022 (June 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/7948395.
Full textReddy, K. Shyam Sunder, Vempati Krishna, M. Prabhakar, Punna Srilatha, K. Gurnadha Gupta, and Ravula Arun Kumar. "Machine Learning Based Classification Model for Network Traffic Anomaly Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 563–76. http://dx.doi.org/10.17762/ijritcc.v11i7s.7048.
Full textAbilov, A. V., A. V. Chunaev, A. I. Nistyuk, and I. A. Kaisina. "Data Transmission Model with Lost Fragments Recovery Based on Application Layer ARQ." Vestnik IzhGTU imeni M.T. Kalashnikova 24, no. 3 (2021): 104–11. http://dx.doi.org/10.22213/2413-1172-2021-3-104-111.
Full textBiradar, Prabhavati, and Purushottama T L. "DESIGN OF TRAFFIC ENGINEERED MULTI-PROTOCOL LABEL SWITCHING-TRANSPORT PROFILE (MPLS-TP) FOR THE ENHANCEMENT OF QUALITY OF SERVICE." International Journal of Research -GRANTHAALAYAH 5, no. 4RACEEE (April 30, 2017): 58–67. http://dx.doi.org/10.29121/granthaalayah.v5.i4raceee.2017.3323.
Full textO. Hasan, Ammar. "Application Based performance monitoring heavy data transmission of Local Area Network." Kufa Journal of Engineering 13, no. 3 (July 31, 2022): 14–40. http://dx.doi.org/10.30572/2018/kje/130302.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textTennakoon, Chaminda, and Subha Fernando. "Deep learning model for distributed denial of service (DDoS) detection." International Journal of ADVANCED AND APPLIED SCIENCES 9, no. 2 (February 2022): 109–18. http://dx.doi.org/10.21833/ijaas.2022.02.012.
Full textZhou, Wei, Xing Jiang, Qingsong Luo, Shanguo Huang, Bingli Guo, Xiang Sun, Shaobo Li, Xiaochuan Tan, Mingyi Ma, and Tianwen Fu. "Design and Implementation of Semi-Physical Platform for Label Based Frame Switching in Integrated Satellite Terrestrial Networks." Applied Sciences 12, no. 13 (July 1, 2022): 6674. http://dx.doi.org/10.3390/app12136674.
Full textIkuesan, Adeyemi R., Mazleena Salleh, Hein S. Venter, Shukor Abd Razak, and Steven M. Furnell. "A heuristics for HTTP traffic identification in measuring user dissimilarity." Human-Intelligent Systems Integration 2, no. 1-4 (June 2, 2020): 17–28. http://dx.doi.org/10.1007/s42454-020-00010-2.
Full textSatria, Andy, and Fanny Ramadhani. "Analisis Keamanan Jaringan Komputer dengan Menggunakan Switch Port Security di Cisco Packet Tracer." sudo Jurnal Teknik Informatika 2, no. 2 (May 21, 2023): 52–60. http://dx.doi.org/10.56211/sudo.v2i2.260.
Full textIltaf, Walid. "Efficient Data Forwarding Mechanism in Backbone Networks by Employing MPLS Technology." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 13 (November 30, 2016): 7347–54. http://dx.doi.org/10.24297/ijct.v15i13.4802.
Full textRajesh Shyamala Devi, B., A. George, and Aby K. Thomas. "Performance investigation of low power radio duty cycling MAC for resource constrained WSN." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 93. http://dx.doi.org/10.14419/ijet.v7i1.9.9741.
Full textPestin, Maxim S., and Alexander S. Novikov. "Simulation model of wireless ad-hoc network to study algorithms of traffic routing." Journal Of Applied Informatics 17, no. 4 (August 31, 2022): 75–86. http://dx.doi.org/10.37791/2687-0649-2022-17-4-75-86.
Full textGu, Yong Hong, Wei Huang, and Qiao Li Yang. "Design and Implementation of a Multi-Channel HDLC Protocol Controller Based on FPGA." Advanced Materials Research 383-390 (November 2011): 6840–45. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.6840.
Full textMiswar, Nur, Herman Herman, and Imam Riadi. "COMPARING THE PERFORMANCE OF OSPF AND OSPF-MPLS ROUTING PROTOCOL IN FORWARDING TCP AND UDP PACKET." Jurnal Teknik Informatika (Jutif) 4, no. 5 (November 12, 2023): 1237–47. http://dx.doi.org/10.52436/1.jutif.2023.4.5.1456.
Full textRao, Gottapu Sankara, and P. Krishna Subbarao. "A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (October 27, 2023): 244–53. http://dx.doi.org/10.17762/ijritcc.v11i9.8340.
Full textZakharov, Konstantin V., Maksim A. Khodorchenko, Igor D. Karpov, Igor A. Ognev, and Sergei A. Zyryanov. "Development of a system for monitoring network traffic with filtering elements at the L2." Digital technology security, no. 2 (June 30, 2022): 34–47. http://dx.doi.org/10.17212/2782-2230-2022-2-34-47.
Full textKocher, Idrees Sarhan. "AN EXPERIMENTAL SIMULATION OF ADDRESSING AUTO-CONFIGURATION ISSUES FOR WIRELESS SENSOR NETWORKS." Academic Journal of Nawroz University 10, no. 4 (November 25, 2021): 1–13. http://dx.doi.org/10.25007/ajnu.v10n4a957.
Full textSambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (December 25, 2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Full textSundararajan, Aditya, Aniket Chavan, Danish Saleem, and Arif Sarwat. "A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security." Energies 11, no. 9 (September 6, 2018): 2360. http://dx.doi.org/10.3390/en11092360.
Full textGalushka, V. V., D. V. Fatkhi, and E. R. Gazizov. "A method for generating a local network graph based on the analysis of address sets." Advanced Engineering Research 21, no. 3 (October 18, 2021): 284–89. http://dx.doi.org/10.23947/2687-1653-2021-21-3-284-289.
Full textHuening, Felix, Holger Heuermann, Franz-Josef Wache, and Rami Audisho Jajo. "A new wireless sensor interface using dual-mode radio." Journal of Sensors and Sensor Systems 7, no. 2 (September 21, 2018): 507–15. http://dx.doi.org/10.5194/jsss-7-507-2018.
Full textShibanov, R. E., I. A. Kaysina, A. V. Abilov, and K. E. Korepanov. "Transmission quality evaluation of multistreaming video data from the UAV to the ground station in network simulator 3 simulation environment using WI-FI standards." Vestnik IzhGTU imeni M.T. Kalashnikova 26, no. 1 (April 8, 2023): 91–99. http://dx.doi.org/10.22213/2413-1172-2023-1-91-99.
Full textGadasin, Denis V., and Andrey V. Schvedov. "APPLICATION OF A TRANSPORT TASK FOR LOAD BALANCING IN CONDITIONS OF SOURCE DATA FUZZINESS." T-Comm 18, no. 1 (January 17, 2024): 13–20. http://dx.doi.org/10.36724/2072-8735-2024-18-1-13-20.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textSnellen, David. "DECnet/OSI (part 2)." International Journal of Network Management 2, no. 1 (March 1992): 18–27. http://dx.doi.org/10.1002/nem.4560020106.
Full textFong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 21–57. http://dx.doi.org/10.1145/74674.74676.
Full textDudnik, Andriy, Ivan Bakhov, Oleksandr Makhovych, Yulia Ryabokin, and Oleksandr Usachenko. "Models and Methods for Improving Performance of Wireless Computer Networks Based on the Decomposition of Lower Layers of the OSI Reference Model." International Journal of Emerging Technology and Advanced Engineering 12, no. 1 (January 16, 2022): 152–62. http://dx.doi.org/10.46338/ijetae0122_15.
Full textSnellen, David. "Decnet/osi protocols: The physical, data link and network layers." International Journal of Network Management 1, no. 2 (December 1991): 82–95. http://dx.doi.org/10.1002/nem.4560010205.
Full textYuliia, KOSTIUK, and SHESTAK Yaroslav. "THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COMPUTER NETWORKS." INTERNATIONAL SCIENTIFIC-PRACTICAL JOURNAL "COMMODITIES AND MARKETS" 40, no. 4 (December 22, 2021): 49–58. http://dx.doi.org/10.31617/tr.knute.2021(40)05.
Full textTardo, J. "Standardizing cryptographic services at OSI higher layers." IEEE Communications Magazine 23, no. 7 (July 1985): 25–29. http://dx.doi.org/10.1109/mcom.1985.1092610.
Full text