Artículos de revistas sobre el tema "IP (Computer network protocol)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IP (Computer network protocol)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Neeru Kumari y Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol". International Research Journal on Advanced Engineering and Management (IRJAEM) 2, n.º 06 (22 de junio de 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.
Texto completoKOVACIK, Cyril Filip y Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK". Acta Electrotechnica et Informatica 1335-8243, n.º 1338-3957 (9 de junio de 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Texto completoAlfaresa, Yuansa, Bongga Arifwidodo y Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library". Jurnal Online Informatika 8, n.º 2 (28 de diciembre de 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.
Texto completoRafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia y Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus". Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, n.º 2 (11 de mayo de 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.
Texto completoYIMING, ALIMUJIANG y TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS". Journal of Interconnection Networks 06, n.º 03 (septiembre de 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.
Texto completoBein, Adrian Sean y Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, n.º 2 (30 de abril de 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Texto completoUpadhyay, Paramesh C. y Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks". International Journal of Mobile Computing and Multimedia Communications 2, n.º 3 (julio de 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Texto completoHu, Yao, Ting Peng y Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.
Texto completoHammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator". Tikrit Journal of Engineering Sciences 18, n.º 2 (30 de junio de 2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.
Texto completoStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko y V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks". Programmnaya Ingeneria 13, n.º 5 (16 de mayo de 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Texto completoPratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol". Bulletin of Computer Science and Electrical Engineering 2, n.º 2 (30 de diciembre de 2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.
Texto completoWu Boqiao, Liu Xuefei, Tan Aiping y Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol". International Journal of Digital Content Technology and its Applications 7, n.º 6 (31 de marzo de 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.
Texto completoAl-Fedaghi, Sabah S. y Ghadeer Aldamkhi. "Conceptual Modeling of an IP Phone Communication System". International Journal of Interdisciplinary Telecommunications and Networking 13, n.º 3 (julio de 2021): 83–94. http://dx.doi.org/10.4018/ijitn.2021070106.
Texto completoPrabadevi, B. y N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks". Cybernetics and Information Technologies 17, n.º 4 (27 de noviembre de 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Texto completoŻal, Mariusz, Marek Michalski y Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism". Electronics 13, n.º 5 (28 de febrero de 2024): 918. http://dx.doi.org/10.3390/electronics13050918.
Texto completoHansson, Andreas, Kees Goossens y Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip". VLSI Design 2007 (30 de abril de 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.
Texto completoLiu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue y Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane". Electronics 11, n.º 15 (30 de julio de 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.
Texto completoAmin, Muhammad, Dian Kurnia y Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface". Journal of Applied Engineering and Technological Science (JAETS) 3, n.º 2 (24 de junio de 2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.
Texto completoZhuang, Dian Zheng y Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet". Applied Mechanics and Materials 441 (diciembre de 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Texto completoBen Jemaa, Maher, Nahla Abid, Maryline Laurent-Maknavicius y Hakima Chaouchi. "Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks". Journal of Computer Systems, Networks, and Communications 2009 (2009): 1–6. http://dx.doi.org/10.1155/2009/383517.
Texto completoAnderson, Daniel K. y W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge". Journal of Educational Computing Research 19, n.º 3 (octubre de 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.
Texto completoHamarsheh, Ala, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani y Someah Alangari. "Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols". International Journal of Cloud Applications and Computing 13, n.º 1 (25 de octubre de 2023): 1–26. http://dx.doi.org/10.4018/ijcac.332765.
Texto completoKlincewicz, John G. y David F. Lynch. "Designing an IP Link Topology for a Metro Area Backbone Network". International Journal of Interdisciplinary Telecommunications and Networking 5, n.º 1 (enero de 2013): 26–42. http://dx.doi.org/10.4018/jitn.2013010103.
Texto completoAshraf, Tabinda, Steven S. W. Lee, Muhammad Iqbal y Jen-Yi Pan. "Routing Path Assignment for Joint Load Balancing and Fast Failure Recovery in IP Network". Applied Sciences 11, n.º 21 (8 de noviembre de 2021): 10504. http://dx.doi.org/10.3390/app112110504.
Texto completoAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP". International Journal for Research in Applied Science and Engineering Technology 9, n.º VII (15 de julio de 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Texto completoHosseini, Mojtaba y Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments". Presence: Teleoperators and Virtual Environments 13, n.º 3 (junio de 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.
Texto completoPenhoat, J., K. Guillouard, N. Omnès, J. Zhang, T. Lemlouma y M. Salaun. "Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode". International Journal of Mobile Computing and Multimedia Communications 5, n.º 4 (octubre de 2013): 49–81. http://dx.doi.org/10.4018/ijmcmc.2013100104.
Texto completoDevi, A. Indira y N. Arthi. "Alternate Path Selection in IP Networks using Bandwidth Optimization". International Journal of Advance Research and Innovation 3, n.º 1 (2015): 43–47. http://dx.doi.org/10.51976/ijari.311507.
Texto completoLabinsky, Alexander. "FEATURES OF CRYPTOGRAPHIC PROTOCOLS". NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, n.º 1 (17 de abril de 2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.
Texto completoMohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim y Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network". Journal of Computing Research and Innovation 6, n.º 4 (20 de septiembre de 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.
Texto completoBerkman, L., S. Otrokh, V. Ruzhynskyi y K. Olienieva. "The optimization of computer equipment during the modernization of the unified system of centralized control and measurements of the SKS-7 network using the resources of the data processing center". Information and communication technologies, electronic engineering 3, n.º 2 (septiembre de 2023): 88–94. http://dx.doi.org/10.23939/ictee2023.02.088.
Texto completoJin, Xing, Kan-Leung Cheng y S. H. Gary Chan. "Scalable Island Multicast for Peer-to-Peer Streaming". Advances in Multimedia 2007 (2007): 1–9. http://dx.doi.org/10.1155/2007/78913.
Texto completoHoller, Holger y Stefan Voß. "Software tools for a multilayer network design". Journal of Telecommunications and Information Technology, n.º 3 (30 de septiembre de 2005): 57–63. http://dx.doi.org/10.26636/jtit.2005.3.325.
Texto completoBaigorria, Luis A., José F. Postigo, Vicente A. Mut y Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol". Robotica 21, n.º 3 (13 de mayo de 2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.
Texto completoMacedonia, Michael R., Michael J. Zyda, David R. Pratt, Paul T. Barham y Steven Zeswitz. "NPSNET:A Network Software Architecture for LargeScale Virtual Environments". Presence: Teleoperators and Virtual Environments 3, n.º 4 (enero de 1994): 265–87. http://dx.doi.org/10.1162/pres.1994.3.4.265.
Texto completoYakubova, Mubarak, Olga Manankova, Assel Mukasheva, Alimzhan Baikenov y Tansaule Serikov. "The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX)". Applied Sciences 13, n.º 19 (26 de septiembre de 2023): 10712. http://dx.doi.org/10.3390/app131910712.
Texto completoESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON y KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS". International Journal of Information Technology & Decision Making 02, n.º 04 (diciembre de 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.
Texto completoCui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software". Applied Mechanics and Materials 686 (octubre de 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.
Texto completoAbood, Amany Mohammad, Maysam Sameer Hussein, Zainab G. Faisal y Zainab H. Tawfiq. "Design and simulation of video monitoring structure over TCP/IP system using MATLAB". Indonesian Journal of Electrical Engineering and Computer Science 24, n.º 3 (1 de diciembre de 2021): 1840. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1840-1845.
Texto completoThuneibat, Saed y Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols". Indonesian Journal of Electrical Engineering and Computer Science 30, n.º 1 (1 de abril de 2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.
Texto completoLee Chee Hang, Lee Chee Hang, Yu-Beng Leau Lee Chee Hang, Yong Jin Park Yu-Beng Leau, Zhiwei Yan Yong Jin Park y Supriyanto Praptodiyono Zhiwei Yan. "Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking". 網際網路技術學刊 23, n.º 3 (mayo de 2022): 459–66. http://dx.doi.org/10.53106/160792642022052303004.
Texto completoSarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin y Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework". Feb-Mar 2024, n.º 42 (4 de marzo de 2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.
Texto completoOmumbo, Nicholas J., Titus M. Muhambe y Cyprian M. Ratemo. "Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture". International Journal of Computer Network and Information Security 13, n.º 4 (8 de agosto de 2021): 45–61. http://dx.doi.org/10.5815/ijcnis.2021.04.05.
Texto completoFanani, Galih y Imam Riadi. "Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based". Buletin Ilmiah Sarjana Teknik Elektro 2, n.º 2 (21 de julio de 2020): 70. http://dx.doi.org/10.12928/biste.v2i2.1065.
Texto completoChen, Xinhua y Ya-ni Sun. "Computer Network Simulation Modeling Based on Object Oriented Petri Net". International Journal of Online Engineering (iJOE) 12, n.º 02 (29 de febrero de 2016): 25. http://dx.doi.org/10.3991/ijoe.v12i02.5039.
Texto completoO Holubnychyi, Dmitro y Vasily Kotsyuba. "Applying technologies of monitoring and condition analysis of IP-networks based on the use of the SNMP protocol". Bulletin of Kharkov National Automobile and Highway University, n.º 96 (24 de mayo de 2022): 14. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.14.
Texto completoAyu tiara sunja, Sunja y Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, n.º 02 (1 de agosto de 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Texto completoShiranzaei, Atena y Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7s (13 de julio de 2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.
Texto completoDorogyy, Yaroslaw y Vadym Kolisnichenko. "Developing a method for the detection and identification of rootstock blockchain network nodes". Eastern-European Journal of Enterprise Technologies 1, n.º 2 (127) (28 de febrero de 2024): 6–15. http://dx.doi.org/10.15587/1729-4061.2024.297903.
Texto completoЖебель, В. А. y А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions". Успехи кибернетики / Russian Journal of Cybernetics, n.º 2(14) (30 de junio de 2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.
Texto completo