Добірка наукової літератури з теми "Software - configured networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software - configured networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software - configured networks"
Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (December 2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.
Повний текст джерелаSaleh, Zahraa, and Qahhar Qadir. "The Downside of Software-Defined Networking in Wireless Network." UKH Journal of Science and Engineering 4, no. 2 (December 31, 2020): 147–56. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp147-156.
Повний текст джерелаThirunavukkarasu, V., A. Senthil Kumar, P. Prakasam, and G. Suresh. "Lifetime Maximization for 5G Mobile Networks Using Secured and Finest Optimal Routing Protocol." Journal of Nanoelectronics and Optoelectronics 16, no. 11 (November 1, 2021): 1791–96. http://dx.doi.org/10.1166/jno.2021.3139.
Повний текст джерелаEvglevskaya, N. V., A. I. Paramonov, P. I. Smirnov, and R. V. Shamilova. "Software Defined Network architecture model and cognitive control method for organizing multiple access in the Internet of Things." Radio industry 28, no. 4 (November 27, 2018): 68–75. http://dx.doi.org/10.21778/2413-9599-2018-28-4-68-75.
Повний текст джерелаSuresh Babu, Kolluru, and Srikanth Vemuru. "A Low-Cost Software Defined Radio Based Cognitive Radio Test-Bed for LTE Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 51. http://dx.doi.org/10.14419/ijet.v7i3.1.16797.
Повний текст джерелаZhao, Yongli, Jie Zhang, Dahai Han, Lei Wang, Wanyi Gu, and Yuefeng Ji. "Routing on pre-configured topology for dynamic optical networks." Photonic Network Communications 17, no. 3 (August 27, 2008): 299–310. http://dx.doi.org/10.1007/s11107-008-0164-8.
Повний текст джерелаRoka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.
Повний текст джерелаLI, DAWEI, JIE WU, DAJIN WANG, and JIAYIN WANG. "Software-Defined Networking Switches for Fast Single-Link Failure Recovery." Journal of Interconnection Networks 18, no. 04 (December 2018): 1850014. http://dx.doi.org/10.1142/s0219265918500147.
Повний текст джерелаGarrison, Philip, Esther Han Beol Jang, Michael A. Lithgow, and Nicolás Andrés Pace. ""The Network Is an Excuse": Hardware Maintenance Supporting Community." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–20. http://dx.doi.org/10.1145/3479608.
Повний текст джерелаBakouri, Mohsen, Mohammed Alsehaimi, Husham Farouk Ismail, Khaled Alshareef, Ali Ganoun, Abdulrahman Alqahtani, and Yousef Alharbi. "Steering a Robotic Wheelchair Based on Voice Recognition System Using Convolutional Neural Networks." Electronics 11, no. 1 (January 5, 2022): 168. http://dx.doi.org/10.3390/electronics11010168.
Повний текст джерелаДисертації з теми "Software - configured networks"
Волосянко, Кирило Сергійович. "Аналіз процедур забезпечення якості у мобільних мережах 5G". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39365.
Повний текст джерелаPurpose: to improve the quality of services to end users of 5G mobile networks through a combination of available controls. In any case, you can use 5G technology, working, requiring other users to follow. We will also define with SDN technology, its architecture and principles of work. Analytical technologies of SDN and 5G are carried out, shortcomings of SDN, and also 5G are described and necessary for its work.
Марчук, Олександр Олегович. "Метод управління безпекою інформаційних потоків мережі IoT за допомогою SDN". Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39304.
Повний текст джерелаRelevance: Improving the quality of communication networks by improving reliability is a complex scientific, technical and economic problem. This is due to the fact that networks with new technologies, such as software-configured networks (SDN) currently have high requirements for reliability (fault tolerance), including the characteristics of network recovery after failure. When developing measures to increase reliability, it is advisable to set the task of maximizing the quality of network operation with a minimum connection recovery time. The high level of fault tolerance of the network is provided due to fast detection of damages and elimination of their consequences in a short time. Existing methods of ensuring reliability in SDN networks can be divided into two separate classes: protective switching (redundancy) and recovery (rerouting). It follows that for a systematic approach to the study of methods to ensure the reliability of SDN, it is advisable to use mathematical modeling. The study of the mechanisms of ensuring the reliability of SDN is considered in a number of works, both domestic and foreign. However, these works do not provide a comparative analysis of the use of mechanisms to ensure fault tolerance, as well as a combination of these mechanisms. Similarly, a number of works do not take into account the economic indicators of the use of these mechanisms. Purpose: to develop a method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will provide a reliable network, without taking into account the increase in time to detect failure of rapid recovery methods. Research objectives: 1. to propose a model of security management of information flows of the IoT network; 2. provide an algorithm for managing the security of information flows of the IoT network using SDN; 3. to reveal the methodology for determining the effectiveness of security management of information flows of the IoT network using SDN; 4. to develop an improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Object of research: devices and technologies of communication organization in the Internet of Things. Subject of research: data transmission models and methods of ensuring the functioning of the Internet of Things in the face of hazards. Research methods: The research is based on probability theory, mathematical statistics, modeling methods and field experiments. The simulation of a fragment of the IP network was performed on the basis of a simulation package. Scientific novelty: An improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy has been proposed, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Practical novelty: The obtained results can be implemented in a real enterprise in order to improve the quality of security management of information flows of the IoT network using SDN.
Одарченко, Роман Сергійович, Roman Odarchenko та Одарченко Роман Сергеевич. "Методологія підвищення ефективності функціонування стільникових мереж зв'язку". Thesis, Національний авіаційний університет, 2019. http://er.nau.edu.ua/handle/NAU/38385.
Повний текст джерелаДиссертация посвящена вопросам разработки методологии повышения эфективности сотовых сетей связи. В работе был проведен анализ качества обслуживания абонентов сотовых сетей в Украине с целью определения их эффективности. Было установлено, что заявленные требования к сетям четвертого поколения не достигаются ни в одной из реализованных сетей, а фактическое качество обслуживания абонентов находится на достаточно низком уровне, что свидетельствует о низкой эффективности существующих методов планирования радиосетей, транспортных подсистем и методов управления. В работе были предложены альтернативные стратегии развития операторов сотовой связи в Украине. В работе впервые разработана методология повышения эффективности сотовых сетей связи, заключающаяся в использовании усовершенствованного метода планирования сети LTE для развертывания сотовых сетей нового поколения, метода оценки ключевых показателей функционирования сети сотового оператора с целью непрерывного оп-тимизации сети оператора путем использования метода оптимизации подсистемы базо вых станций развернутой сети сотового оператора, усовершенствованного метода рас-погрузки радио интерфейса сети сотового оператора с использованием подмел-режиме Wi-Fi, метода оптимизации многоуровневого транспортного сегмента сотовой сетей, метода резервирования ресурсов и балансировки нагрузки транспортной ме-режи сотового оператора и метода оценки эффективности программно-конфигурируемых сети. С помощью разработанной методологии операторам сотовой связи удается повысить эффективность своих сетей за счет увеличения радиус зон обслуживания абонентов сотовых сетей, минимизации необходимого количества базовых станций для построения сети, увеличение вдвое количества активных абонентов, обслугвуються в базовой и обеспечения балансировки нагрузки в радиопидмережи, повышение економинои эффективности транспортной сети, повышение уровня надежности сети, оптимизацией утилизации транспортных каналов, проведение более гибкого и оперативного расширения сети, внедрение новых сервисов, повышения оперативности доставки данных для иерархической структуры уровня управления.
The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. Chief among them is the tremendous growth in multimedia applications on mobile devices – streaming music and video, two-way video conferencing and social networking to name a few. The telecoms industry is undergoing a major transformation towards 5G networks in order to fulfil the needs of existing and emerging use cases. The 5G architecture should seamlessly support both fixed and mobile access technologies under a fully converged end-to-end system in order to deliver future service requirements for some of the deployment scenarios that could be supported. This technologies in nearest future have come to Ukraine too. That’s why in this dissertation an analysis of the quality of service of subscribers of cellular networks in Ukraine was conducted in order to determine the efficiency of their operation and security. An analysis of the quality of customer service in the implemented projects of LTE networks in the world and 4G networks in Ukraine has established that the claimed requirements for fourth generation networks are not achieved in any of the implemented networks, and the actual quality of customer service (target efficiency) is at a rather low level which indicates the low efficiency of existing radio network planning methods, transport subsystems, control and cybersecurity management methods. This made it possible to determine the directions by which it is necessary to increase the efficiency of the operation of cellular networks. In this dissertation were developed several methods to improve network efficiency. The method of planning of the network of the cellular operator enables cellular operators to more accurately assess the coverage of radio coverage areas, choose key indicators of service quality, more efficient frequency planning and capital cost calculation, which in turn allows us to assess the feasibility of constructing a cellular network option. On the basis of this advanced method, a training software (web-application) was developed to evaluate radio coverage zones of LTE network base stations. The method for evaluating key indicators of service quality, the level of information security and the efficiency of cellular networks makes it possible to assess the most important indicators of the quality of functioning and security of the cellular network network in order to continuously monitor and optimize them when introducing new services during customer service. The method for optimizing the subsystem of base stations allows to increase the radius of subscriber service areas of cellular networks, which allows minimizing the number of base stations for network construction, and therefore reduce the cost of the cellular operator to build the subsystem of the base stations, that is, increase the economic efficiency of the network. Improved method of the radio interface off-loading using a non-3GPP standard subnet allow to reduce the load on the radio interface of the network of the cellular network to an acceptable level, double the number of active subscribers, which are served in the cell, and provide load balancing and increase the efficiency of the radio subnetwork. The method of optimization of a multi-level transport segment of a cellular network has been developed, which allows to improve the structure of the transport network during the transition to new generations networks, providing the necessary capacity and increasing and improving the efficiency of the transport network. The method of routing with resource reservation and balancing of the traffic of a cellular operator with the consideration of information security requirements allows to increase the efficiency of the transport channels usage. The method for evaluating the effectiveness of a software-configured network allows for a more flexible and operational expansion of the network, the introduction of new services, increasing the efficiency of data delivery for the hierarchical structure. The method of network-centric monitoring and response to cyber incidents in the network of the cellular network allows real-time monitoring of the state of cyber security, its level and, consequently, the efficiency of the cellular network. On the base of these methods in this dissertation was developed cellular networks efficiency improving methodology, which is using the improved method of LTE network planning, the key method for assessing performance of the cellular operator for the purpose of continuous operator network optimizing using the method of base station subsystem optimization, improved method of radio interface of the cellular operator offloading using Wi-Fi, the method of optimization of multi-vehicle segment of the cellular network, the method of roating with resource reservation and load balancing of mobile operator and method of SDN network effectiveness evaluation. Using the developed methodology mobile operators can improve the efficiency of their networks by increasing the radius of the service areas, minimizing the required number of base stations for the construction of the network, doubling the number of active subscribers in the cell and provide load balancing in transport and radio network, increase transport network efficiency, enhance network reliability, optimize utilization of transport channels for a more flexible and rapid network expansion, introduction of new services and improved data delivery in the hierarchical structure of SDN. It is advisable to use the obtained scientific results when planning LTE and 5G wireless networks, developing equipment and software for data transmission systems, as well as in the learning process.
Книги з теми "Software - configured networks"
Miletić, Darko. Moodle security: Learn how to install and configure Moodle in the most secure way possible. Birmingham, U.K: Packt Pub., 2011.
Знайти повний текст джерелаInc, ebrary, ed. ADempiere 3.4 ERP solutions: Design configure, and implement a robust enterprise resource planning system in your organization by using ADempiere. Birmingham, U.K: Packt Pub., 2009.
Знайти повний текст джерелаInc, ebrary, ed. pfSense 2 cookbook: A practical, example-driven guide to configure even the most advanced features of pfSense 2. Birmingham, U.K: Packt Open Source, 2011.
Знайти повний текст джерелаЧастини книг з теми "Software - configured networks"
Sanvito, Davide. "Traffic Management in Networks with Programmable Data Planes." In Special Topics in Information Technology, 13–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_2.
Повний текст джерелаGupta, Govind P. "Software-Defined Networking Paradigm in Wireless Sensor Networks." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 254–67. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3640-6.ch012.
Повний текст джерелаMbale, Jameson, and Manish Wadhwa. "Securing Enterprises from Malicious Attacks on their Networks." In Advances in Business Information Systems and Analytics, 118–42. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6473-9.ch006.
Повний текст джерелаMani, Santosh, and Manisha J. Nene. "Distributed Denial of Service Attacks Detection and Mitigation in Software Defined Mesh Networks." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210218.
Повний текст джерелаRamadan, Rabie A., and Fatma H. Elfouly. "Multi-Object Tracking in Wireless Sensor Networks Using Swarm Intelligence." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 293–313. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5788-4.ch012.
Повний текст джерелаRóka, Rastislav. "Broadband NG-PON Networks and Their Designing Using the HPON Network Configurator." In Convergence of Broadband, Broadcast, and Cellular Network Technologies, 277–97. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5978-0.ch012.
Повний текст джерелаNayak, Seema, Manoj Nayak, and Pankaj Pathak. "A Review on FPGA-Based Digital Filters for De-Noising ECG Signal." In Sensor Network Methodologies for Smart Applications, 1–24. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-4381-8.ch001.
Повний текст джерелаLin, Wei-Wen, Jih-Sheng Shen, and Pao-Ann Hsiung. "An Efficient Hardware/Software Communication Mechanism for Reconfigurable NoC." In Dynamic Reconfigurable Network-on-Chip Design, 84–109. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-807-4.ch004.
Повний текст джерелаGodoy, Pablo Daniel, Osvaldo Lucio Marianetti, and Carlos Gabriel García Garino. "Experiences With Computer Architecture Remote Laboratories." In Handbook of Research on Software Quality Innovation in Interactive Systems, 133–53. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7010-4.ch005.
Повний текст джерелаТези доповідей конференцій з теми "Software - configured networks"
Bellio, Philip R. "Digital Controls and Modern Fuel Systems for Marine Prime Movers." In ASME Turbo Expo 2000: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/2000-gt-0324.
Повний текст джерелаVaz, Gabriel Marvel, Tiago Antonio Rizzetti, and Walter Priesnitz Filho. "Um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões com a ferramenta Suricata." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17358.
Повний текст джерелаVaz, Gabriel Marvel, Tiago Antonio Rizzetti, and Walter Priesnitz Filho. "Um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões com a ferramenta Suricata." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17358.
Повний текст джерелаSilva, Thiago Bueno da, José A. T. Gavazza, Fábio L. Verdi, José A. Suruagy, Juliano Coelho, Flávio Silva, and Antônio M. Alberti. "Plano de Controle da Arquitetura NovaGenesis para um Ponto de Interconexão de Tráfego Multi-Arquitetura." In Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wpeif.2021.17197.
Повний текст джерелаCerqueira de Santana, Jose´ Paulo, and Ose´ias Boettcher Fonseca. "Pilot Project for Acquisition System of Chromatograph Signals and Custody Measurements Via Web." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0169.
Повний текст джерелаRamerth, D. L., A. V. MirzaMoghadam, A. Kiratsingh, and G. Banda. "A Probabilistic Secondary Flow System Design Process for Gas Turbine Engines." In ASME Turbo Expo 2010: Power for Land, Sea, and Air. ASMEDC, 2010. http://dx.doi.org/10.1115/gt2010-22071.
Повний текст джерелаLi, Wei, W. Ed Red, C. Greg Jensen, and Tyler Davis. "Dynamic Reconfigurable Machine Tool Controller." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-61317.
Повний текст джерела