Artykuły w czasopismach na temat „Computer network”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Computer network.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Computer network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Pełny tekst źródła
Streszczenie:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Style APA, Harvard, Vancouver, ISO itp.
2

Kobayashi, Shin-ya. "‘Computer’ × n + ‘Network’ ⇒ ‘Computer & Network’ ≠ ‘Computer Netwok’". IEEJ Transactions on Electronics, Information and Systems 121, nr 1 (2001): 52. http://dx.doi.org/10.1541/ieejeiss1987.121.1_52.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Qin, Peng. "Analysis of a Model for Computer Virus Transmission". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Pełny tekst źródła
Streszczenie:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
Style APA, Harvard, Vancouver, ISO itp.
4

Ren, Xiaohui, Iftikhar Ahmed i Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs". Journal of Combinatorial Mathematics and Combinatorial Computing 117 (1.08.2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Pełny tekst źródła
Streszczenie:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
Style APA, Harvard, Vancouver, ISO itp.
5

Refaee, Eshrag A., i Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors". Complexity 2021 (26.04.2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Pełny tekst źródła
Streszczenie:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
Style APA, Harvard, Vancouver, ISO itp.
6

Ming, Xiaobo, Ying Chen i Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy". MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Pełny tekst źródła
Streszczenie:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
Style APA, Harvard, Vancouver, ISO itp.
7

Ayu tiara sunja, Sunja, i Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, nr 02 (1.08.2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Pełny tekst źródła
Streszczenie:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
Style APA, Harvard, Vancouver, ISO itp.
8

Yeh, Wei-Chang, Edward Lin i Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus". Complexity 2021 (10.07.2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Pełny tekst źródła
Streszczenie:
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
Style APA, Harvard, Vancouver, ISO itp.
9

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael i Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, nr 1 (22.05.2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Pełny tekst źródła
Streszczenie:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
Style APA, Harvard, Vancouver, ISO itp.
10

M, Priyanand. "Computer Network". International Journal for Research in Applied Science and Engineering Technology 9, nr 3 (31.03.2021): 1302–5. http://dx.doi.org/10.22214/ijraset.2021.33227.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Pierce, Jean W. "Computer Network". Educational Researcher 14, nr 8 (październik 1985): 19. http://dx.doi.org/10.2307/1174896.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Pierce, Jean. "Computer Network". Educational Researcher 16, nr 3 (kwiecień 1987): 24. http://dx.doi.org/10.2307/1175093.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Pierce, Jean W. "Computer Network". Educational Researcher 14, nr 10 (grudzień 1985): 21. http://dx.doi.org/10.2307/1175318.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Pierce, Jean. "Computer Network". Educational Researcher 15, nr 4 (kwiecień 1986): 15. http://dx.doi.org/10.2307/1175782.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Pierce, Jean W. "Computer Network". Educational Researcher 14, nr 8 (październik 1985): 19–20. http://dx.doi.org/10.3102/0013189x014008019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Pierce, Jean W. "Computer Network". Educational Researcher 14, nr 10 (grudzień 1985): 21–22. http://dx.doi.org/10.3102/0013189x014010021.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Pierce, Jean. "Computer Network". Educational Researcher 15, nr 4 (kwiecień 1986): 15–16. http://dx.doi.org/10.3102/0013189x015004015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Pierce, Jean. "Computer Network". Educational Researcher 15, nr 9 (listopad 1986): 26–28. http://dx.doi.org/10.3102/0013189x015009026.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Pierce, Jean. "Computer Network". Educational Researcher 16, nr 3 (kwiecień 1987): 24. http://dx.doi.org/10.3102/0013189x016003024.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Yuri Ariyanto, Atiqah Nurul Asri, Yoppy Yunhasnawa, Faiz Ushbah Mubarok i Mungki Astiningrum. "INSTALASI JARINGAN KOMPUTER SEBAGAI PENUNJANG LAYANAN ADMINISTRASI MASYARAKAT DESA KARANGDUREN KAB. MALANG". Jurnal Pengabdian Kepada Masyarakat 9, nr 2 (30.12.2022): 158–61. http://dx.doi.org/10.33795/jabdimas.v9i2.190.

Pełny tekst źródła
Streszczenie:
At the village level, administrative services are the main service and are directly related to the needs of the community. Administrative services can be in the form of issuing certificates, cover letters, letters of recommendation, legalization, and other letters. For administrative services in correspondence, the problems faced by the Karangduren village office regarding the installation of computer networks. Currently, computers that store data and applications for mailing repositories are not yet connected to other computers, resulting in queuing and slow document processing. With these problems, PPM (Pengabdian Pada Masyarakat) activities will be carried out in the form of "Implementation of Computer Network Installation to Support Mailing Repository Applications at the Karangduren Village Office, Kec. Pakisaji, Kab. Malang". Through PPM activities in Karangduren village, Kec. Pakisaji, Kab. Malang is done to help solve problems regarding the installation of computer networks. By installing a computer network at the village office, all computers in the village office can be connected. So with the installation of this computer network, it can improve the service and performance of the Karangduren Village Office in serving the community. The results of this PPM activity will produce a computer network installation design and a basic computer network manual.
Style APA, Harvard, Vancouver, ISO itp.
21

Bidaybekov, Ye Y., Y. K. Khenner, Sh T. Shekerbekova i Y. Н. Zhabayev. "ON THE ISSUE OF TRAINING FUTURE COMPUTER SCIENCE TEACHERS IN COMPUTER". BULLETIN Series of Physics & Mathematical Sciences 72, nr 4 (29.09.2020): 174–79. http://dx.doi.org/10.51889/2020-4.1728-7901.27.

Pełny tekst źródła
Streszczenie:
The article discusses of training future computer science teachers in computer networks based on network simulation. Analysis of scientific and pedagogical and educational literature has shown that in the training of computer science teachers, computer networks are studied in the aspect of information simulation of their structures, while simulation the processes of their functioning is not given due attention, despite the possibility of its use in the organization of training. Most educational institutions face organizational, technical and material difficulties when organizing training in computer networks on real equipment. The above-mentioned difficulties in training future computer science teachers in computer networks can be avoided by using network simulation. By network simulation, we mean reproducing a dynamic image of the main network components (network cables, switches, hubs, routers, etc.) and visualization the processes of their configuration and operation on the computer screen.
Style APA, Harvard, Vancouver, ISO itp.
22

Shkilniak, S. S., i Yu Yu Yurchenko. "Methods of ensuring the security of computer network". Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Pełny tekst źródła
Streszczenie:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
Style APA, Harvard, Vancouver, ISO itp.
23

Afrizal, Afrizal, i Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, nr 1 (9.09.2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Pełny tekst źródła
Streszczenie:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6
Style APA, Harvard, Vancouver, ISO itp.
24

Widodo, Tri, i Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)". JISKA (Jurnal Informatika Sunan Kalijaga) 7, nr 1 (25.01.2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Pełny tekst źródła
Streszczenie:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
Style APA, Harvard, Vancouver, ISO itp.
25

An, Bao Kun, i Yan Feng. "Complex Network Theory in the Application of Optimization Topology Network". Applied Mechanics and Materials 651-653 (wrzesień 2014): 1811–15. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1811.

Pełny tekst źródła
Streszczenie:
Complex network theory is a new theory, which is rising with the rapid development of the computer. At present, the network structure of computers more complex network models already existed, has been unable to meet its topological properties. So, emerge as the times require complex network theory, provides a new development ideas and platform at the same time, complex network theory to the study of computer network topology. This paper firstly introduces the complex network theory, and then about the application of complex network theory in computer topology behavior, research on computer network topology and the experiment and model specific about complex network theory. More reduction.
Style APA, Harvard, Vancouver, ISO itp.
26

Effendi, Rustam, i Yasin Efendi. "DESIGN AND IMPLEMENTATION OF VIRTUAL LOCAL AREA NETWORK NETWORK AT PT. EDS MANUFACTURING INDONESIA". Journal of Innovation And Future Technology (IFTECH) 2, nr 1 (24.02.2020): 55–66. http://dx.doi.org/10.47080/iftech.v2i1.809.

Pełny tekst źródła
Streszczenie:
The need for information and communication has become a fundamental thing in human life, marked by the increasing human activity that no longer sees the distance and time to communicate with and share information. In 1960, the US Department of Defense conducted research on computer networks. Research carried out is to build a computer network with a method that mimics the workings of the telephone network, where one computer can be connected to other computers, both in one location or area known as a Local Area Network (LAN), and even can be connected to a place or a different country known as a Wide Area Network (WAN). LAN limitations give birth to a VLAN technology that allows for the configuration of a virtualized computer network. The higher the level of demand and the increase in computer network users resulting in broadcasts and traffic on the network itself. The current condition of PT. EDS Manufacturing Indonesia does not yet have a computer network concept that is in line with company needs, computer network activities that occur every day require concepts that are appropriate to the company. Then it is necessary to design a VLAN concept that is expected to provide better results and make it easier for IP Address segmentation to manage broadcast and traffic on a computer network.
Style APA, Harvard, Vancouver, ISO itp.
27

Glăvan, Dragoș. "Sniffing attacks on computer networks". Scientific Bulletin of Naval Academy XXIII, nr 1 (15.07.2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.

Pełny tekst źródła
Streszczenie:
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
Style APA, Harvard, Vancouver, ISO itp.
28

Aisyah, Siti. "Computer Networking Company in Business Area". International Research Journal of Management, IT & Social Sciences 2, nr 7 (1.07.2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Pełny tekst źródła
Streszczenie:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
Style APA, Harvard, Vancouver, ISO itp.
29

S.I., Arubere, i Okardi B. "Fundamentals of Communication Technology and Networks". British Journal of Computer, Networking and Information Technology 4, nr 1 (2.06.2021): 1–12. http://dx.doi.org/10.52589/bjcnit-3vorvhit.

Pełny tekst źródła
Streszczenie:
This paper work generally examines the computer network, the basic classification and types of networks, network goals and the benefits a computer network offers to researchers, individuals and organizations. It also pinpoints the graphical arrangement of the computer network, as well as basic building blocks and general overview of data transmission. Data were collected from primary sources where personal interviews were conducted and were analyzed and presented for statistical decision. This research shows the importance of networks in our ever-growing environment. This paper tends to present an overview and an introduction of some of the fundamental components enabling efficient and effective data communication and transmission. For better network efficiency, we need the right Network components, the right network design, and also the right IT expertise in the design and implementation of any network system. Multiple numbers of computers forming a network tend to enhance computing power and increase the productivity of the network in general.
Style APA, Harvard, Vancouver, ISO itp.
30

TEL, GERARD. "Network Orientation". International Journal of Foundations of Computer Science 05, nr 01 (marzec 1994): 23–57. http://dx.doi.org/10.1142/s0129054194000037.

Pełny tekst źródła
Streszczenie:
This paper analyses how the symmetry of a processor network influences the existence of a solution for the network orientation problem. The orientation of hypercubes and tori is the problem of assigning labels to each link of each processor, in such a way that a sense of direction is given to the network. In this paper the problem of network orientation for these two topologies is studied under the assumption that the network contains a single leader, under the assumption that the processors possess unique identities, and under the assumption that the network is anonymous. The distinction between these three models is considered fundamental in distributed computing. It is shown that orientations can be computed by deterministic algorithms only when either a leader or unique identities are available. Orientations can be computed for anonymous networks by randomized algorithms, but only when the number of processors is known. When the number of processors is not known, even randomized algorithms cannot compute orientations for anonymous processor networks. Lower bounds on the message complexity of orientation and algorithms achieving these bounds are given.
Style APA, Harvard, Vancouver, ISO itp.
31

Mitekin, Y. A., i N. F. Bakhareva. "Computer network emulation". Infokommunikacionnye tehnologii 13, nr 2 (czerwiec 2015): 159–64. http://dx.doi.org/10.18469/ikt.2015.13.2.08.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Sankpal, Ms Mrunali Nagesh, Ms Pratiksha Vijay Chinchwade, Ms Rutuja Rajkumar Kognole i Ms K. N. Rode. "Computer Network Topologies". International Journal for Research in Applied Science and Engineering Technology 10, nr 4 (30.04.2022): 1508–11. http://dx.doi.org/10.22214/ijraset.2022.41553.

Pełny tekst źródła
Streszczenie:
Abstract: Network topologies is various components of network link nodes, link, peripherals are arranged. The way of connecting the computers is called as the topology.so depending on the manner of connecting the computers we can have different network topologies. Network topology is links and nodes of a network are arranged to related are arranged to each other. They describe the physical and logical arrangement of network nodes. The way in which different system and node are connect and communicate with each other is determined by topology of the network. Keywords: Star Topology, Bus Topology, Ring Topology, Hybrid Topology, Mesh Topology, Tree Topology
Style APA, Harvard, Vancouver, ISO itp.
33

Gresham-Lancaster, Scot. "Computer Music Network". Leonardo 47, nr 3 (czerwiec 2014): 266–67. http://dx.doi.org/10.1162/leon_a_00771.

Pełny tekst źródła
Streszczenie:
The social climate and cultural atmosphere of the San Francisco Bay Area in the late 70's early 80's plus the emergence of the nascent microcomputer industry made for a social network and approach that fostered the creation of a new type of collaborative electronic music ensemble with techniques that have come to be known as “Computer Music Network”. A transformation from initial heterogeneous to a more homogeneous underlying paradigm has brought with it aesthetic questions about the reason and evolution of this new genre.
Style APA, Harvard, Vancouver, ISO itp.
34

KIKUTA, Masahiro. "The network computer." Journal of Information Processing and Management 39, nr 11 (1997): 845–53. http://dx.doi.org/10.1241/johokanri.39.845.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Elenbogen, Bruce S. "Computer network management". ACM SIGCSE Bulletin 31, nr 1 (marzec 1999): 119–21. http://dx.doi.org/10.1145/384266.299713.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Rezazad, Hadi. "Computer network optimization". Wiley Interdisciplinary Reviews: Computational Statistics 3, nr 1 (2.11.2010): 34–46. http://dx.doi.org/10.1002/wics.135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Guo, Yang Yong. "Integration Development of Network Communication and Computer Technology". Applied Mechanics and Materials 539 (lipiec 2014): 234–38. http://dx.doi.org/10.4028/www.scientific.net/amm.539.234.

Pełny tekst źródła
Streszczenie:
Through the computer network we can communicate with each other, and the development of the mobile communication technology cannot do without the computer technology. The program-controlled exchange, management, billing and so on in the telecommunication network are completed using the computers. The core network of the mobile communication system depends on the support of computer technology, and many of its elements are the computers of specific functions. The mobile communication and the computer network communication are the science processing the information, with the same signal styles, and they have many of the same subject theories, and a lot of the same technologies are also used in practice.
Style APA, Harvard, Vancouver, ISO itp.
38

Hunter, P. "Network heal thyself [computer network management]". Engineering & Technology 4, nr 14 (8.08.2009): 58–60. http://dx.doi.org/10.1049/et.2009.1413.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Wang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network". Applied Mechanics and Materials 484-485 (styczeń 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.

Pełny tekst źródła
Streszczenie:
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum.
Style APA, Harvard, Vancouver, ISO itp.
40

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono i Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB". Infotech: Journal of Technology Information 8, nr 2 (30.11.2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Pełny tekst źródła
Streszczenie:
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networks using the web-based backward chaining method. With this expert system application, it can speed up and make it easier to detect damage to Local Area Network networks.
Style APA, Harvard, Vancouver, ISO itp.
41

Potuzak, Tomas. "Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters". Computer Science and Information Systems 10, nr 1 (2013): 321–48. http://dx.doi.org/10.2298/csis120601006p.

Pełny tekst źródła
Streszczenie:
The computer simulation of road traffic is an important tool for control and analysis of road traffic networks. Due to their requirements for computation time (especially for large road traffic networks), many simulators of the road traffic has been adapted for distributed computing environment where combined power of multiple interconnected computers (nodes) is utilized. In this case, the road traffic network is divided into required number of sub-networks, whose simulation is then performed on particular nodes of the distributed computer. The distributed computer can be a homogenous (with nodes of the same computational power) or a heterogeneous cluster (with nodes of various powers). In this paper, we present two methods for road traffic network division for heterogeneous clusters. These methods consider the different computational powers of the particular nodes determined using a benchmark during the road traffic network division.
Style APA, Harvard, Vancouver, ISO itp.
42

Jittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography". Indonesian Journal of Electrical Engineering and Computer Science 16, nr 3 (1.12.2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.

Pełny tekst źródła
Streszczenie:
<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>
Style APA, Harvard, Vancouver, ISO itp.
43

Ubaidillah, Achmad, Koko Joni, Mohammad Iqbal Bachtiar i S. Ida Kholida. "Enhancement of Computer Network Performance with VLAN". E3S Web of Conferences 328 (2021): 02004. http://dx.doi.org/10.1051/e3sconf/202132802004.

Pełny tekst źródła
Streszczenie:
The computer network service provider must provide a good network service. Service quality is the most important factor and must always be maintained properly. The quality of service can change depending on the number and characteristics of service users. This study optimizes the performance of existing computer networks, namely ordinary LAN networks with the application of VLANs. It is very important because the number of network users is increasing and will continue to increase, while the need for good service quality is very urgent. The results showed that VLANs can improve computer network performance from the system existing, namely LAN network.
Style APA, Harvard, Vancouver, ISO itp.
44

Isabelle Pope. "Social Network Dynamic Modeling via Mathematical Applicative Formulae". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 05–08. http://dx.doi.org/10.17762/msea.v70i1.7.

Pełny tekst źródła
Streszczenie:
For one or more files contained in databases, the computer forms a leading site for storage. In the majority of large firms, the databases tend to be in central systems, rather than on the individual employee computers. It is also worth noting that computer servers are contained in these respective firm central systems, offering services over networks. The implication is that the server hosts database files but, using different firm computers, an operator can access the files. An increase in database complexity translates into the formation of a social network. Therefore, a social network becomes a database collection working together. The role of social networks lies in their capacity to foster data integration from different databases, giving the information new insights. Given that the ultimate goal of business organizations stretches beyond data storage to support decision-making in relation to the resultant data, this paper has established that social networks play a critical role towards the achievement of this goal.
Style APA, Harvard, Vancouver, ISO itp.
45

Novokhrestov, Aleksey, Anton Konev i Alexander Shelupanov. "Model of Threats to Computer Network Software". Symmetry 11, nr 12 (11.12.2019): 1506. http://dx.doi.org/10.3390/sym11121506.

Pełny tekst źródła
Streszczenie:
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.
Style APA, Harvard, Vancouver, ISO itp.
46

Hamidha, Elda, i Jimmie. "Design of local area network at the laboratory of sma 2 pgri palembang". International Journal Cister 1, nr 02 (1.08.2022): 76–79. http://dx.doi.org/10.56481/cister.v1i02.139.

Pełny tekst źródła
Streszczenie:
Currently, the laboratory uses computers and LAN networks as school practical tools. During initial observations at SMA 2 PGRI Palembang, they found a problem, namely the large number of students and the lack of learning facilities to carry out activities in the computer room resulting in some students not being able to fully study in the room. computer due to the limited time for students to learn. In developing the system, the author will use the Network Development Life Cycle (NDLC) method for designing lan network infrastructure. Network Development Life Cycle (NDLC) is a method that relies on previous development processes such as business strategy planning, application development life cycle, and data distribution analysis. And can provide an overview of the design of computer network systems that in the future can be used as a reference for building a computer network that is good and efficient and easy to implement
Style APA, Harvard, Vancouver, ISO itp.
47

Levin, Ilya, Mark Korenblit i Vadim Talis. "STUDY OF SOCIAL NETWORKS’ DYNAMICS BY SIMULATION WITHIN THE NODEXL-EXCEL ENVIRONMENT". Problems of Education in the 21st Century 54, nr 1 (20.06.2013): 125–37. http://dx.doi.org/10.33225/pec/13.54.125.

Pełny tekst źródła
Streszczenie:
The present study is an analysis of the learning activity, which constitutes simulation of networks and studying their functioning and dynamics. The study is based on using network-like learning environments. Such environments allow building computer models of the network graphs. According to the suggested approach, the students construct dynamic computer models of the networks' graphs, thus implementing various algorithms of such networks’ dynamics. The suggested tool for building the models is the software environment comprising network analysis software NodeXL and a standard spreadsheet Excel. The proposed approach enables the students to visualize the network's dynamics. The paper presents specific examples of network models and various algorithms of the network's dynamics, which were developed based on the proposed approach. Key words: learning environments, modelling, social networks.
Style APA, Harvard, Vancouver, ISO itp.
48

Li, Hong Jin. "Computer Network Management Technology and its Application Glimpse". Advanced Materials Research 1079-1080 (grudzień 2014): 683–85. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.683.

Pełny tekst źródła
Streszczenie:
Computer network is a product of modern computer technology and communications technologies. Computer network management technology refers to the initialization operation and monitor operation of computer networks in the active state. Computer network management technology function is to collect the related information in the network system. This article will mainly focus on computer network management technology and its application to start on.
Style APA, Harvard, Vancouver, ISO itp.
49

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia i Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS". JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, nr 2 (18.02.2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Pełny tekst źródła
Streszczenie:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
Style APA, Harvard, Vancouver, ISO itp.
50

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro". Jurnal Pendidikan Madrasah 7, nr 2 (22.11.2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Pełny tekst źródła
Streszczenie:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer networks and the internet as a medium for data and information communication. However, the computer and internet network systems at SMA Negeri 2 Bojonegoro have not been managed properly. The solution to improve the effectiveness of using and managing internet bandwidth at SMA Negeri 2 Bojonegoro is to design and implement network management with Mikrotik Router to make it easier for administrators to manage the network. This research uses the Network Development Life Cycle (NDLC) method as a method of developing computer network management at SMA Negeri 2 Bojonegoro. The results showed that the use of a network system using a Mikrotik router in managing internet bandwidth efficiently facilitates and facilitates various activities related to internet use.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii