Gotowa bibliografia na temat „Routing (Computer network management)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Routing (Computer network management)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Routing (Computer network management)"

1

Sarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin i Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework". Feb-Mar 2024, nr 42 (4.03.2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.

Pełny tekst źródła
Streszczenie:
Campus handling of networks has become critical in the continuously changing world of higher education. This paper offers a thorough method for managing and safeguarding networks in a campus setting with multiple departments. Our approach focuses on four departments: the administrative, civil, computer science and engineering (CSE), and electrical and electronics engineering (EEE) departments. It combines multiple networking technologies to improve security and maximize speed. Network division using virtual LANs (VLANs), efficient IP address allocation using Variable Length Subnet Masks (VLSM), simplified network configuration using Dynamic Host Configuration Protocol (DHCP), dynamic routing using Routing Information Protocol version 2 (RIPv2), granular access control using Access Control Lists (ACLs), enhanced security using Network Address Translation (NAT), secure remote access using Secure Shell version 2 (SSHv2), and improved network resilience through Link Aggregation are the main components of our system.
Style APA, Harvard, Vancouver, ISO itp.
2

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management". Wireless Communications and Mobile Computing 2022 (29.05.2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Pełny tekst źródła
Streszczenie:
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simulated to verify the resistance of this model to relevant malicious attacks. For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining the characteristics of average simulation transmission, network life, and average routing update time. Experiments show that the model has better routing performance and has improved by an average of about 20%. We offer a new solution to solve the problem of wireless routing security.
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Hezhe, Guangsheng Feng, Huiqiang Wang, Hongwu Lv i Renjie Zhou. "RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight". International Journal of Distributed Sensor Networks 14, nr 3 (marzec 2018): 155014771875787. http://dx.doi.org/10.1177/1550147718757874.

Pełny tekst źródła
Streszczenie:
Delay/disruption tolerant network is a novel network architecture, which is mainly used to provide interoperability for many challenging networks such as wireless sensor network, ad hoc networks, and satellite networks. Delay/disruption tolerant network has extremely limited network resources, and there is typically no complete path between the source and destination. To increase the message delivery reliability, several multiple copy routing algorithms have been used. However, only a few can be applied efficiently when there is a resource constraint. In this article, a delay/disruption tolerant network routing and buffer management algorithm based on weight (RABP) is proposed. This algorithm estimates the message delay and hop count to the destination node in order to construct a weight function of the delay and hop count. A node with the least weight value will be selected as the relay node, and the algorithm implements buffer management based on the weight of the message carried by the node, for efficiently utilizing the limited network resources. Simulation results show that the RABP algorithm outperforms the Epidemic, Prophet, and Spray and wait routing algorithms in terms of the message delivery ratio, average delay, network overhead, and average hop count.
Style APA, Harvard, Vancouver, ISO itp.
4

Nourildean, Shayma Wail, Yousra Abd Mohammed i Hussein Ali Attallah. "Virtual Local Area Network Performance Improvement Using Ad Hoc Routing Protocols in a Wireless Network". Computers 12, nr 2 (28.01.2023): 28. http://dx.doi.org/10.3390/computers12020028.

Pełny tekst źródła
Streszczenie:
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhou, Hui, Zhong Tian, Shebnam M. Sefat i Samih M. Mostafa. "An Optimal SDN-Based Wavelength Allocation and Routing Method for 5G Network". Mobile Information Systems 2022 (18.08.2022): 1–12. http://dx.doi.org/10.1155/2022/9448147.

Pełny tekst źródła
Streszczenie:
Optical networks are changing as new advanced technologies emerge. With each passing year, their sizes and capabilities expand. The standard architecture for network control and management cannot handle all of these complexities. The proliferation of cloud services and the massive volume of traffic provided by content delivery networks are driving the present fast increase in Internet traffic. This obviously exacerbates congestion concerns in communication networks, with a focus on the core and backbone components in particular. Software-defined networking (SDN) is evolving into a consolidated network management system that comprises a variety of strategies aiming at network management that are based primarily on one basic principle: decoupling control plane decisions from data plane activities. An essential resource allocation strategy in an all-optical network is routing and wavelength assignment. A novel SDN-based approach is proposed to address the problem of old methods mixed with new architecture in optical networks. The network resources were optimized for optimal scheduling using a binary hybrid topology particle swarm optimization method. In terms of recovery time, blockage rate, and resource consumption, simulation results demonstrate that the suggested technique outperforms previous classical methods.
Style APA, Harvard, Vancouver, ISO itp.
6

Fathurrahmad, Fathurrahmad, i Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, nr 1 (30.06.2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Pełny tekst źródła
Streszczenie:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
Style APA, Harvard, Vancouver, ISO itp.
7

Kumar, A. Vinodh, i S. Kaja Mohideen. "Security Aware Routing Protocol for Hybrid Wireless Network (SARP-HWNs) via Trust Enhanced Mechanism". International Journal of Business Data Communications and Networking 15, nr 1 (styczeń 2019): 34–57. http://dx.doi.org/10.4018/ijbdcn.2019010103.

Pełny tekst źródła
Streszczenie:
A hybrid wireless network handles both ad hoc networks and infrastructure networks, these networks are affected by malicious attacks which affect the routing by packet drops, modifications and selective forwarding. These attacks lead to the link failure in a network. Link failures are the main reason for packet loss and network unreliability in these kinds of networks. Due to link failures, the life time of the network and the performance of routing path is affected. The previous security mechanisms for protecting wireless networks are not sufficient for hybrid networks. In this article, the authors propose a trust-based security model to enhance security factors in hybrid networks. The proposed routing protocols implemented in hybrid network platforms consist of different networks such as a fixed node for WLANs (wireless televisions, personal computers, printers, cellular, etc.) with zero mobility, a sensor node for WSNs with zero mobility, mobile nodes with movements considered MANETs, and nodes with high movements (vehicles) considered as VANETs. This article proposes routing protocols to avoid link failure in the current routing path and provide quick recovery, improve the throughput, reduce end to end delay, maximize the life time of routing path without affecting energy consumption and QoS/QoE while compared with other existing techniques.
Style APA, Harvard, Vancouver, ISO itp.
8

Punia, Divya, i Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management". Transport and Telecommunication Journal 23, nr 1 (1.02.2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Pełny tekst źródła
Streszczenie:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
Style APA, Harvard, Vancouver, ISO itp.
9

Das, Ayan Kumar, Rituparna Chaki i Kashi Nath Dey. "Secure energy efficient routing protocol for wireless sensor network". Foundations of Computing and Decision Sciences 41, nr 1 (1.03.2016): 3–27. http://dx.doi.org/10.1515/fcds-2016-0001.

Pełny tekst źródła
Streszczenie:
AbstractThe ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.
Style APA, Harvard, Vancouver, ISO itp.
10

Walunjkar, Gajanan Madhavrao, Anne Koteswara Rao i V. Srinivasa Rao. "Disaster Relief Management Using Reinforcement Learning-Based Routing". International Journal of Business Data Communications and Networking 17, nr 1 (styczeń 2021): 24–37. http://dx.doi.org/10.4018/ijbdcn.2021010102.

Pełny tekst źródła
Streszczenie:
Effective disaster management is required for the peoples who are trapped in the disaster scenario but unfortunately when disaster situation occurs the infrastructure support is no longer available to the rescue team. Ad hoc networks which are infrastructure-less networks can easily deploy in such situation. In disaster area mobility model, disaster area is divided into different zones such as incident zone, casualty treatment zones, transport areas, hospital zones, etc. Also, in order to tackle high mobility of nodes and frequent failure of links in a network, there is a need of adaptive routing protocol. Reinforcement learning is used to design such adaptive routing protocol which shows good improvement in packet delivery ratio, delay and average energy consumed.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Routing (Computer network management)"

1

Zhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks". Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.

Pełny tekst źródła
Streszczenie:
Delay tolerant networks (DTNs) are a class of emerging networks that exhibit significantly different characteristics from today's Internet, such as intermittent connectivity, large delay, and high loss rates. DTNs have important applications in disaster relief, military, rural Internet access, environmental sensing and surveillance, interplanetary communication, underwater sensing, and vehicular communication. While not the common case for networking, DTNs represent some of the most critical cases, where the ability to communicate can make a huge difference for human lives. Supporting effective communication in DTNs, however, is challenging. First, with intermittent connectivity, DTNs are often extremely limited in capacity. Second, given resource limitations and uncertainty in DTNs, it is critical to deliver data efficiently and robustly. The situation is especially acute for multicast which sends data to multiple destinations. This thesis seeks to address these two issues. To enhance network capacity in DTNs, we propose a message ferrying scheme that exploits the use of special mobile nodes (called message ferries) and controlled device mobility to deliver data. Message ferries are utilized to transport data via mobility between sources and destinations. We develop a foundation for the control of the mobility of message ferries, and nodes if possible, to cooperatively deliver data under a variety of conditions. We also study another approach which deploys new nodes called throwboxes to enhance capacity. Throwboxes are small and inexpensive wireless devices. By relaying data between mobile nodes, throwboxes are able to create data transfer opportunities that otherwise would not exist. We systematically investigate the issues of deployment and routing, and develop algorithms for various deployment and routing approaches. Based on extensive evaluation, we obtain several findings to guide the design and operation of throwbox-augmented DTNs. To address the issue of efficient and robust data delivery, we focus on DTN multicasting. Given the unique characteristics of DTNs, traditional solutions such as IP multicast can not be simply ported to DTNs. We identify the limitations of IP multicast semantics in DTNs and define new semantic models for DTN multicast. Based on these semantic models, we develop and evaluate several multicast routing algorithms with different routing strategies.
Style APA, Harvard, Vancouver, ISO itp.
2

Roughgarden, Tim. "Selfish routing". online access from Digital Dissertation Consortium access full-text, 2002. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3050436.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yan, Wei. "Synchronization, buffer management, and multicast routing in multimedia networks". Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/13426.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Mousa, Yamin Samir. "MAC/routing design for under water sensor networks /". Online version of thesis, 2007. http://hdl.handle.net/1850/4496.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Al-Amoudi, Ahmed. "Evaluation of virtual routing appliances as routers in a virtual environment /". Online version of thesis, 2008. http://hdl.handle.net/1850/7544.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jain, Sushant. "Routing in delay tolerant networks /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6922.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kulkarni, Shrinivas Bhalachandra. "The simulation studies on a behaviour based trust routing protocol for ad hoc networks". Diss., Online access via UMI:, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Praveenkumar, Ramesh. "Investigation of routing protocols in a sensor network". Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/praveenkumar.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, Tae Hyun Sun Min-Te. "Bandwidth-aware routing tree (BART) for underwater 3-D geographic routing". Auburn, Ala, 2008. http://hdl.handle.net/10415/1548.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zhao, Li. "Enhance communication security in wireless ad hoc networks through multipath routing". Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/L_Zhao_072407.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Routing (Computer network management)"

1

Caballero, Ricardo J. Partially optimal routing. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

(Firm), Nortel, red. Nortel ethernet routing switch solution. Raleigh, NC: Nortel Press, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Implementing Cisco IP routing (ROUTE) foundation learning guide. Indianapolis, Ind: Cisco Press, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Routing in today's internetworks: The routing protocols of IP, DECnet, Netware, and AppleTalk. New York, N.Y: Van Nostrand Reinhold, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wallace, Kevin. Routing: Video mentor. Indianapolis, Ind: Cisco Press, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Woungang, Isaac. Routing in Opportunistic Networks. New York, NY: Springer New York, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Eric, Bouillet, red. Path routing in mesh optical networks. Hoboken, NJ: J. Wiley, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pardalos, P. M. (Panos M.), 1954- i SpringerLink (Online service), red. Mathematical Aspects of Network Routing Optimization. New York, NY: Springer Science+Business Media, LLC, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ji hui wang luo: Gao xiao shu ju fen fa ji shu = JIHUI WANGLUO : GAOXIAO SHUJU FENFA JISHU. Chengdu: Dian zi ke ji da xue chu ban she, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Donohue, Denise. CCNP routing and switching quick reference. Indianapolis, Ind: Cisco Press, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Routing (Computer network management)"

1

Dubnicki, Cezary, Kai Li i Malena Mesarina. "Network interface support for user-level buffer management". W Parallel Computer Routing and Communication, 256–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58429-3_42.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Strassner, John, Sung-Su Kim i James Won-Ki Hong. "Semantic Routing for Improved Network Management in the Future Internet". W Communications in Computer and Information Science, 163–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14171-3_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

You, Peng, Yang Huixian i Man Sha. "An ACO and Energy Management Routing Algorithm for ZigBee Network". W Communications in Computer and Information Science, 185–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19853-3_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Das, Ayan Kumar, Rituparna Chaki i Atreyee Biswas. "Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network". W Computer Information Systems and Industrial Management, 289–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Das, Ayan Kumar, i Rituparna Chaki. "Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network". W Computer Information Systems and Industrial Management, 290–302. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59105-6_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Saha, Soumyabrata, i Rituparna Chaki. "Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks". W Computer Information Systems and Industrial Management, 361–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33260-9_31.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Karia, Deepak C., i Shravanee Shinde. "Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks". W Communications in Computer and Information Science, 79–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chatterjee, Durba, Satrap Rathore i Sanghita Bhattacharjee. "Switching Policy Based Energy Aware Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks". W Computer Information Systems and Industrial Management, 327–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99954-8_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Tan, Haixia, Weilin Zeng i Lichun Bao. "PATM: Priority-Based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks". W Lecture Notes in Computer Science, 485–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11428848_64.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Fang, Weidong, Wuxiong Zhang, Wei Chen, Yang Liu i Chaogang Tang. "TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 155–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17513-9_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Routing (Computer network management)"

1

Milivojević, Milan, Milan Pavlović i Marija Zajeganović. "Linear Statistical Features for the Purposes of Computer Network Automation". W 7th International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2023. http://dx.doi.org/10.31410/itema.2023.11.

Pełny tekst źródła
Streszczenie:
The development of artificial intelligence finds applications in vari­ous practical areas, such as computer networks. The primary goal of introduc­ing automated methods is the efficient optimization of computer network op­erations. As input data for each algorithm, parameters that best describe the computer network are defined. Therefore, it is essential to define which pa­rameters are relevant to ensure the significant use of automation methods. Parameters like Round-Trip Time delay resulting from ping commands can be used as the basis for defining input parameters for the automation system. This approach can help detect anomalies in network operation due to to­pology disruptions and increased load on specific links within the network. These anomalies can be mitigated by adjusting routing protocol parameters and activating redundant links. The authors describe basic features that can be extracted from time series data containing information about delay times. Special emphasis is placed on the characteristics that result from linear statis­tical analysis using the Python programming language.
Style APA, Harvard, Vancouver, ISO itp.
2

Patel, Dhaval K., Milin P. Patel i Ketul S. Patel. "Scalability Analysis in Wireless Sensor Network with LEACH Routing Protocol". W 2011 International Conference on Computer and Management (CAMAN). IEEE, 2011. http://dx.doi.org/10.1109/caman.2011.5778808.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Shi, Henghua, Yujie Wang i Renlong Zhang. "Study on OSPF Routing Protocol of Computer Network Based on Packet Tracer". W 2015 International Conference on Management, Education, Information and Control. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/meici-15.2015.247.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Guo, Liang, Whay Lee, Anthony Metke i Deepak Bansal. "Intra-Domain Routing Topology Bandwidth Management Architecture". W 15th International Conference on Computer Communications and Networks. IEEE, 2006. http://dx.doi.org/10.1109/icccn.2006.286225.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Santos, Bruno Pereira, Luiz Filipe Menezes Vieira i Antonio Alfredo Ferreira Loureiro. "Routing and Mobility Management in the Internet of Things". W XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12415.

Pełny tekst źródła
Streszczenie:
This Ph.D. Thesis proposes new techniques for routing and mobility management for Internet of Things (IoT). In the future IoT, everyday mobile objects will probably be connected to the Internet. Currently, static IoT's devices have already been connected, but handle mobile devices suitably still being an open issue in IoT context. Then, solutions for routing mobility detection, handover, and mobility management are proposed through an algorithm that integrates Machine Learning (ML) and mobility metrics to figure out devices' mobility events, which we named Dribble. Also, an IPv6 hierarchical routing protocol named Mobile Matrix to boost efficient (memory and fault tolerance) end-to-end connectivity over mobility scenarios. The Thesis contributions are supported by numerous peer-reviewed publications in national and international conferences and journals included in ISI-JCR. Also, the applicability of this Thesis is evident by showing that our results overcome state-of-the-art in static and mobile scenarios, as well as, the impact of the proposed solutions is a step forward in at least two new research areas so-called Internet of Mobile Things (IoMT) and Social IoT, where devices move around and do social ties respectively. Moreover, during the Ph.D. degree, the author has contributed to different computer network fields rather than routing by publishing in areas like social networks, smart cities, intelligent transportation systems, software-defined networks, and parallel computing.
Style APA, Harvard, Vancouver, ISO itp.
6

Hai, Mo, i Haifeng Li. "A Routing Algorithm of Blockchain Network Based on Reinforcement Learning". W ICCCM 2023: 2023 The 11th International Conference on Computer and Communications Management. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3617733.3617762.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Thai, Peter, i Jaudelice C. de Oliveira. "Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based Networks". W 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Moon, Soo Young, Hae Young Lee i Tae Ho Cho. "Key Management Scheme for Query Based Routing in Sensor Networks". W 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.139.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bernardino de Araújo, Matheus, Matheus Monteiro Silveira i Rafael Lopes Gomes. "DINO: Roteamento Dinâmico para ITS Considerando Recursos da Rede". W Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p225-231.

Pełny tekst źródła
Streszczenie:
Intelligent Transport Systems (ITS) arose as a modern solution to traffic jams and vehicle accidents in the urban environment. A key part of the ITS is Traffic Management (TM), which concerns the planning and route definition of the vehicle. Existing TM solution focuses specifically on urban traffic information, ignoring the issues related to the network infrastructure and the applications at the top of it. Within this context, this paper presents a vehicle routing and re-routing strategy, called DINO, that considers both travel time of vehicles on the roads and the active network flows in the network, aiming to dynamically bring a suitable balance between travel time and packet delivery through a heuristic. The experiments performed suggest that DINO improves the packet delivery of the applications while reduces the average travel time of vehicles.
Style APA, Harvard, Vancouver, ISO itp.
10

Wang, Yi, Xue Bai i Zhenjie Cao. "Analysis of Security Routing Protocol for Wireless Sensor Networks". W International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015). Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/lemcs-15.2015.212.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Routing (Computer network management)"

1

Medard, Muriel, Steven Lumetta i Liuyang Li. A Network Management Architecture for Robust Packet Routing in Optical Access Networks. Fort Belvoir, VA: Defense Technical Information Center, marzec 2001. http://dx.doi.org/10.21236/ada491806.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev i Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], czerwiec 2019. http://dx.doi.org/10.31812/123456789/3178.

Pełny tekst źródła
Streszczenie:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
Style APA, Harvard, Vancouver, ISO itp.
3

Nechaev, V., Володимир Миколайович Соловйов i A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Pełny tekst źródła
Streszczenie:
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Mercedes-Benz and some others companies have not been engaged in their traditional business for a long time. Their partner networks performs this function instead of them. The companies themselves perform the function of system integrators. The Tapscott’s idea finds its confirmation within the framework of a new powerful direction of the development of the modern interdisciplinary science – the theory of the complex networks (CN) [2]. CN-s are multifractal objects, the loss of multifractality being the indicator of the system transition from more complex state into more simple state. We tested the multifractal properties of the data using the wavelet transform modulus maxima approach in order to analyze scaling properties of our company. Comparative analysis of the singularity spectrumf(®), namely, the difference between maximum and minimum values of ® (∆ = ®max ¡ ®min) shows that IBM company is considerably more fractal in comparison with Apple Computer. Really, for it the value of ∆ is equal to 0.3, while for the vertically integrated company Apple it only makes 0.06 – 5 times less. The comparison of other companies shows that this dependence is of general character. Taking into consideration the fact that network organization of business has become dominant in the last 5-10 years, we carried out research for the selected companies in the earliest possible period of time which was determined by the availability of data in the Internet, or by historically later beginning of stock trade of computer companies. A singularity spectrum of the first group of companies turned out to be considerably narrower, or shifted toward the smaller values of ® in the pre-network period. The latter means that dynamic series were antipersistant. That is, these companies‘ management was rigidly controlled while the impact of market mechanisms was minimized. In the second group of companies if even the situation did changed it did not change for the better. In addition, we discuss applications to the construction of portfolios of stock that have a stable ratio of risk to return.
Style APA, Harvard, Vancouver, ISO itp.
4

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Pełny tekst źródła
Streszczenie:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii