Letteratura scientifica selezionata sul tema "Routing (Computer network management)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Routing (Computer network management)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Routing (Computer network management)"

1

Sarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin e Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework". Feb-Mar 2024, n. 42 (4 marzo 2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.

Testo completo
Abstract (sommario):
Campus handling of networks has become critical in the continuously changing world of higher education. This paper offers a thorough method for managing and safeguarding networks in a campus setting with multiple departments. Our approach focuses on four departments: the administrative, civil, computer science and engineering (CSE), and electrical and electronics engineering (EEE) departments. It combines multiple networking technologies to improve security and maximize speed. Network division using virtual LANs (VLANs), efficient IP address allocation using Variable Length Subnet Masks (VLSM), simplified network configuration using Dynamic Host Configuration Protocol (DHCP), dynamic routing using Routing Information Protocol version 2 (RIPv2), granular access control using Access Control Lists (ACLs), enhanced security using Network Address Translation (NAT), secure remote access using Secure Shell version 2 (SSHv2), and improved network resilience through Link Aggregation are the main components of our system.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management". Wireless Communications and Mobile Computing 2022 (29 maggio 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Testo completo
Abstract (sommario):
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simulated to verify the resistance of this model to relevant malicious attacks. For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining the characteristics of average simulation transmission, network life, and average routing update time. Experiments show that the model has better routing performance and has improved by an average of about 20%. We offer a new solution to solve the problem of wireless routing security.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Wang, Hezhe, Guangsheng Feng, Huiqiang Wang, Hongwu Lv e Renjie Zhou. "RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight". International Journal of Distributed Sensor Networks 14, n. 3 (marzo 2018): 155014771875787. http://dx.doi.org/10.1177/1550147718757874.

Testo completo
Abstract (sommario):
Delay/disruption tolerant network is a novel network architecture, which is mainly used to provide interoperability for many challenging networks such as wireless sensor network, ad hoc networks, and satellite networks. Delay/disruption tolerant network has extremely limited network resources, and there is typically no complete path between the source and destination. To increase the message delivery reliability, several multiple copy routing algorithms have been used. However, only a few can be applied efficiently when there is a resource constraint. In this article, a delay/disruption tolerant network routing and buffer management algorithm based on weight (RABP) is proposed. This algorithm estimates the message delay and hop count to the destination node in order to construct a weight function of the delay and hop count. A node with the least weight value will be selected as the relay node, and the algorithm implements buffer management based on the weight of the message carried by the node, for efficiently utilizing the limited network resources. Simulation results show that the RABP algorithm outperforms the Epidemic, Prophet, and Spray and wait routing algorithms in terms of the message delivery ratio, average delay, network overhead, and average hop count.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Nourildean, Shayma Wail, Yousra Abd Mohammed e Hussein Ali Attallah. "Virtual Local Area Network Performance Improvement Using Ad Hoc Routing Protocols in a Wireless Network". Computers 12, n. 2 (28 gennaio 2023): 28. http://dx.doi.org/10.3390/computers12020028.

Testo completo
Abstract (sommario):
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Zhou, Hui, Zhong Tian, Shebnam M. Sefat e Samih M. Mostafa. "An Optimal SDN-Based Wavelength Allocation and Routing Method for 5G Network". Mobile Information Systems 2022 (18 agosto 2022): 1–12. http://dx.doi.org/10.1155/2022/9448147.

Testo completo
Abstract (sommario):
Optical networks are changing as new advanced technologies emerge. With each passing year, their sizes and capabilities expand. The standard architecture for network control and management cannot handle all of these complexities. The proliferation of cloud services and the massive volume of traffic provided by content delivery networks are driving the present fast increase in Internet traffic. This obviously exacerbates congestion concerns in communication networks, with a focus on the core and backbone components in particular. Software-defined networking (SDN) is evolving into a consolidated network management system that comprises a variety of strategies aiming at network management that are based primarily on one basic principle: decoupling control plane decisions from data plane activities. An essential resource allocation strategy in an all-optical network is routing and wavelength assignment. A novel SDN-based approach is proposed to address the problem of old methods mixed with new architecture in optical networks. The network resources were optimized for optimal scheduling using a binary hybrid topology particle swarm optimization method. In terms of recovery time, blockage rate, and resource consumption, simulation results demonstrate that the suggested technique outperforms previous classical methods.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Fathurrahmad, Fathurrahmad, e Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, n. 1 (30 giugno 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Testo completo
Abstract (sommario):
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kumar, A. Vinodh, e S. Kaja Mohideen. "Security Aware Routing Protocol for Hybrid Wireless Network (SARP-HWNs) via Trust Enhanced Mechanism". International Journal of Business Data Communications and Networking 15, n. 1 (gennaio 2019): 34–57. http://dx.doi.org/10.4018/ijbdcn.2019010103.

Testo completo
Abstract (sommario):
A hybrid wireless network handles both ad hoc networks and infrastructure networks, these networks are affected by malicious attacks which affect the routing by packet drops, modifications and selective forwarding. These attacks lead to the link failure in a network. Link failures are the main reason for packet loss and network unreliability in these kinds of networks. Due to link failures, the life time of the network and the performance of routing path is affected. The previous security mechanisms for protecting wireless networks are not sufficient for hybrid networks. In this article, the authors propose a trust-based security model to enhance security factors in hybrid networks. The proposed routing protocols implemented in hybrid network platforms consist of different networks such as a fixed node for WLANs (wireless televisions, personal computers, printers, cellular, etc.) with zero mobility, a sensor node for WSNs with zero mobility, mobile nodes with movements considered MANETs, and nodes with high movements (vehicles) considered as VANETs. This article proposes routing protocols to avoid link failure in the current routing path and provide quick recovery, improve the throughput, reduce end to end delay, maximize the life time of routing path without affecting energy consumption and QoS/QoE while compared with other existing techniques.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Punia, Divya, e Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management". Transport and Telecommunication Journal 23, n. 1 (1 febbraio 2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Testo completo
Abstract (sommario):
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Das, Ayan Kumar, Rituparna Chaki e Kashi Nath Dey. "Secure energy efficient routing protocol for wireless sensor network". Foundations of Computing and Decision Sciences 41, n. 1 (1 marzo 2016): 3–27. http://dx.doi.org/10.1515/fcds-2016-0001.

Testo completo
Abstract (sommario):
AbstractThe ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Walunjkar, Gajanan Madhavrao, Anne Koteswara Rao e V. Srinivasa Rao. "Disaster Relief Management Using Reinforcement Learning-Based Routing". International Journal of Business Data Communications and Networking 17, n. 1 (gennaio 2021): 24–37. http://dx.doi.org/10.4018/ijbdcn.2021010102.

Testo completo
Abstract (sommario):
Effective disaster management is required for the peoples who are trapped in the disaster scenario but unfortunately when disaster situation occurs the infrastructure support is no longer available to the rescue team. Ad hoc networks which are infrastructure-less networks can easily deploy in such situation. In disaster area mobility model, disaster area is divided into different zones such as incident zone, casualty treatment zones, transport areas, hospital zones, etc. Also, in order to tackle high mobility of nodes and frequent failure of links in a network, there is a need of adaptive routing protocol. Reinforcement learning is used to design such adaptive routing protocol which shows good improvement in packet delivery ratio, delay and average energy consumed.
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Routing (Computer network management)"

1

Zhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks". Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.

Testo completo
Abstract (sommario):
Delay tolerant networks (DTNs) are a class of emerging networks that exhibit significantly different characteristics from today's Internet, such as intermittent connectivity, large delay, and high loss rates. DTNs have important applications in disaster relief, military, rural Internet access, environmental sensing and surveillance, interplanetary communication, underwater sensing, and vehicular communication. While not the common case for networking, DTNs represent some of the most critical cases, where the ability to communicate can make a huge difference for human lives. Supporting effective communication in DTNs, however, is challenging. First, with intermittent connectivity, DTNs are often extremely limited in capacity. Second, given resource limitations and uncertainty in DTNs, it is critical to deliver data efficiently and robustly. The situation is especially acute for multicast which sends data to multiple destinations. This thesis seeks to address these two issues. To enhance network capacity in DTNs, we propose a message ferrying scheme that exploits the use of special mobile nodes (called message ferries) and controlled device mobility to deliver data. Message ferries are utilized to transport data via mobility between sources and destinations. We develop a foundation for the control of the mobility of message ferries, and nodes if possible, to cooperatively deliver data under a variety of conditions. We also study another approach which deploys new nodes called throwboxes to enhance capacity. Throwboxes are small and inexpensive wireless devices. By relaying data between mobile nodes, throwboxes are able to create data transfer opportunities that otherwise would not exist. We systematically investigate the issues of deployment and routing, and develop algorithms for various deployment and routing approaches. Based on extensive evaluation, we obtain several findings to guide the design and operation of throwbox-augmented DTNs. To address the issue of efficient and robust data delivery, we focus on DTN multicasting. Given the unique characteristics of DTNs, traditional solutions such as IP multicast can not be simply ported to DTNs. We identify the limitations of IP multicast semantics in DTNs and define new semantic models for DTN multicast. Based on these semantic models, we develop and evaluate several multicast routing algorithms with different routing strategies.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Roughgarden, Tim. "Selfish routing". online access from Digital Dissertation Consortium access full-text, 2002. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3050436.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Yan, Wei. "Synchronization, buffer management, and multicast routing in multimedia networks". Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/13426.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Al-Mousa, Yamin Samir. "MAC/routing design for under water sensor networks /". Online version of thesis, 2007. http://hdl.handle.net/1850/4496.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Al-Amoudi, Ahmed. "Evaluation of virtual routing appliances as routers in a virtual environment /". Online version of thesis, 2008. http://hdl.handle.net/1850/7544.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Jain, Sushant. "Routing in delay tolerant networks /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6922.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kulkarni, Shrinivas Bhalachandra. "The simulation studies on a behaviour based trust routing protocol for ad hoc networks". Diss., Online access via UMI:, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Praveenkumar, Ramesh. "Investigation of routing protocols in a sensor network". Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/praveenkumar.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kim, Tae Hyun Sun Min-Te. "Bandwidth-aware routing tree (BART) for underwater 3-D geographic routing". Auburn, Ala, 2008. http://hdl.handle.net/10415/1548.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Zhao, Li. "Enhance communication security in wireless ad hoc networks through multipath routing". Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/L_Zhao_072407.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Routing (Computer network management)"

1

Caballero, Ricardo J. Partially optimal routing. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

(Firm), Nortel, a cura di. Nortel ethernet routing switch solution. Raleigh, NC: Nortel Press, 2008.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Implementing Cisco IP routing (ROUTE) foundation learning guide. Indianapolis, Ind: Cisco Press, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Routing in today's internetworks: The routing protocols of IP, DECnet, Netware, and AppleTalk. New York, N.Y: Van Nostrand Reinhold, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Wallace, Kevin. Routing: Video mentor. Indianapolis, Ind: Cisco Press, 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Woungang, Isaac. Routing in Opportunistic Networks. New York, NY: Springer New York, 2013.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Eric, Bouillet, a cura di. Path routing in mesh optical networks. Hoboken, NJ: J. Wiley, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Pardalos, P. M. (Panos M.), 1954- e SpringerLink (Online service), a cura di. Mathematical Aspects of Network Routing Optimization. New York, NY: Springer Science+Business Media, LLC, 2011.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ji hui wang luo: Gao xiao shu ju fen fa ji shu = JIHUI WANGLUO : GAOXIAO SHUJU FENFA JISHU. Chengdu: Dian zi ke ji da xue chu ban she, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Donohue, Denise. CCNP routing and switching quick reference. Indianapolis, Ind: Cisco Press, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Routing (Computer network management)"

1

Dubnicki, Cezary, Kai Li e Malena Mesarina. "Network interface support for user-level buffer management". In Parallel Computer Routing and Communication, 256–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58429-3_42.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Strassner, John, Sung-Su Kim e James Won-Ki Hong. "Semantic Routing for Improved Network Management in the Future Internet". In Communications in Computer and Information Science, 163–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14171-3_14.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

You, Peng, Yang Huixian e Man Sha. "An ACO and Energy Management Routing Algorithm for ZigBee Network". In Communications in Computer and Information Science, 185–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19853-3_27.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Das, Ayan Kumar, Rituparna Chaki e Atreyee Biswas. "Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network". In Computer Information Systems and Industrial Management, 289–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_27.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Das, Ayan Kumar, e Rituparna Chaki. "Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network". In Computer Information Systems and Industrial Management, 290–302. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59105-6_25.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Saha, Soumyabrata, e Rituparna Chaki. "Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks". In Computer Information Systems and Industrial Management, 361–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33260-9_31.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Karia, Deepak C., e Shravanee Shinde. "Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks". In Communications in Computer and Information Science, 79–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Chatterjee, Durba, Satrap Rathore e Sanghita Bhattacharjee. "Switching Policy Based Energy Aware Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks". In Computer Information Systems and Industrial Management, 327–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99954-8_28.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Tan, Haixia, Weilin Zeng e Lichun Bao. "PATM: Priority-Based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks". In Lecture Notes in Computer Science, 485–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11428848_64.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Fang, Weidong, Wuxiong Zhang, Wei Chen, Yang Liu e Chaogang Tang. "TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 155–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17513-9_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Routing (Computer network management)"

1

Milivojević, Milan, Milan Pavlović e Marija Zajeganović. "Linear Statistical Features for the Purposes of Computer Network Automation". In 7th International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2023. http://dx.doi.org/10.31410/itema.2023.11.

Testo completo
Abstract (sommario):
The development of artificial intelligence finds applications in vari­ous practical areas, such as computer networks. The primary goal of introduc­ing automated methods is the efficient optimization of computer network op­erations. As input data for each algorithm, parameters that best describe the computer network are defined. Therefore, it is essential to define which pa­rameters are relevant to ensure the significant use of automation methods. Parameters like Round-Trip Time delay resulting from ping commands can be used as the basis for defining input parameters for the automation system. This approach can help detect anomalies in network operation due to to­pology disruptions and increased load on specific links within the network. These anomalies can be mitigated by adjusting routing protocol parameters and activating redundant links. The authors describe basic features that can be extracted from time series data containing information about delay times. Special emphasis is placed on the characteristics that result from linear statis­tical analysis using the Python programming language.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Patel, Dhaval K., Milin P. Patel e Ketul S. Patel. "Scalability Analysis in Wireless Sensor Network with LEACH Routing Protocol". In 2011 International Conference on Computer and Management (CAMAN). IEEE, 2011. http://dx.doi.org/10.1109/caman.2011.5778808.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Shi, Henghua, Yujie Wang e Renlong Zhang. "Study on OSPF Routing Protocol of Computer Network Based on Packet Tracer". In 2015 International Conference on Management, Education, Information and Control. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/meici-15.2015.247.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Guo, Liang, Whay Lee, Anthony Metke e Deepak Bansal. "Intra-Domain Routing Topology Bandwidth Management Architecture". In 15th International Conference on Computer Communications and Networks. IEEE, 2006. http://dx.doi.org/10.1109/icccn.2006.286225.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Santos, Bruno Pereira, Luiz Filipe Menezes Vieira e Antonio Alfredo Ferreira Loureiro. "Routing and Mobility Management in the Internet of Things". In XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12415.

Testo completo
Abstract (sommario):
This Ph.D. Thesis proposes new techniques for routing and mobility management for Internet of Things (IoT). In the future IoT, everyday mobile objects will probably be connected to the Internet. Currently, static IoT's devices have already been connected, but handle mobile devices suitably still being an open issue in IoT context. Then, solutions for routing mobility detection, handover, and mobility management are proposed through an algorithm that integrates Machine Learning (ML) and mobility metrics to figure out devices' mobility events, which we named Dribble. Also, an IPv6 hierarchical routing protocol named Mobile Matrix to boost efficient (memory and fault tolerance) end-to-end connectivity over mobility scenarios. The Thesis contributions are supported by numerous peer-reviewed publications in national and international conferences and journals included in ISI-JCR. Also, the applicability of this Thesis is evident by showing that our results overcome state-of-the-art in static and mobile scenarios, as well as, the impact of the proposed solutions is a step forward in at least two new research areas so-called Internet of Mobile Things (IoMT) and Social IoT, where devices move around and do social ties respectively. Moreover, during the Ph.D. degree, the author has contributed to different computer network fields rather than routing by publishing in areas like social networks, smart cities, intelligent transportation systems, software-defined networks, and parallel computing.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hai, Mo, e Haifeng Li. "A Routing Algorithm of Blockchain Network Based on Reinforcement Learning". In ICCCM 2023: 2023 The 11th International Conference on Computer and Communications Management. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3617733.3617762.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Thai, Peter, e Jaudelice C. de Oliveira. "Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based Networks". In 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614121.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Moon, Soo Young, Hae Young Lee e Tae Ho Cho. "Key Management Scheme for Query Based Routing in Sensor Networks". In 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.139.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Bernardino de Araújo, Matheus, Matheus Monteiro Silveira e Rafael Lopes Gomes. "DINO: Roteamento Dinâmico para ITS Considerando Recursos da Rede". In Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p225-231.

Testo completo
Abstract (sommario):
Intelligent Transport Systems (ITS) arose as a modern solution to traffic jams and vehicle accidents in the urban environment. A key part of the ITS is Traffic Management (TM), which concerns the planning and route definition of the vehicle. Existing TM solution focuses specifically on urban traffic information, ignoring the issues related to the network infrastructure and the applications at the top of it. Within this context, this paper presents a vehicle routing and re-routing strategy, called DINO, that considers both travel time of vehicles on the roads and the active network flows in the network, aiming to dynamically bring a suitable balance between travel time and packet delivery through a heuristic. The experiments performed suggest that DINO improves the packet delivery of the applications while reduces the average travel time of vehicles.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Wang, Yi, Xue Bai e Zhenjie Cao. "Analysis of Security Routing Protocol for Wireless Sensor Networks". In International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015). Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/lemcs-15.2015.212.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Routing (Computer network management)"

1

Medard, Muriel, Steven Lumetta e Liuyang Li. A Network Management Architecture for Robust Packet Routing in Optical Access Networks. Fort Belvoir, VA: Defense Technical Information Center, marzo 2001. http://dx.doi.org/10.21236/ada491806.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev e Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], giugno 2019. http://dx.doi.org/10.31812/123456789/3178.

Testo completo
Abstract (sommario):
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Nechaev, V., Володимир Миколайович Соловйов e A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Testo completo
Abstract (sommario):
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Mercedes-Benz and some others companies have not been engaged in their traditional business for a long time. Their partner networks performs this function instead of them. The companies themselves perform the function of system integrators. The Tapscott’s idea finds its confirmation within the framework of a new powerful direction of the development of the modern interdisciplinary science – the theory of the complex networks (CN) [2]. CN-s are multifractal objects, the loss of multifractality being the indicator of the system transition from more complex state into more simple state. We tested the multifractal properties of the data using the wavelet transform modulus maxima approach in order to analyze scaling properties of our company. Comparative analysis of the singularity spectrumf(®), namely, the difference between maximum and minimum values of ® (∆ = ®max ¡ ®min) shows that IBM company is considerably more fractal in comparison with Apple Computer. Really, for it the value of ∆ is equal to 0.3, while for the vertically integrated company Apple it only makes 0.06 – 5 times less. The comparison of other companies shows that this dependence is of general character. Taking into consideration the fact that network organization of business has become dominant in the last 5-10 years, we carried out research for the selected companies in the earliest possible period of time which was determined by the availability of data in the Internet, or by historically later beginning of stock trade of computer companies. A singularity spectrum of the first group of companies turned out to be considerably narrower, or shifted toward the smaller values of ® in the pre-network period. The latter means that dynamic series were antipersistant. That is, these companies‘ management was rigidly controlled while the impact of market mechanisms was minimized. In the second group of companies if even the situation did changed it did not change for the better. In addition, we discuss applications to the construction of portfolios of stock that have a stable ratio of risk to return.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Testo completo
Abstract (sommario):
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia