Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Access Control Lists (ACLs) represent a traditional way in filtering packets in routers. In modern complex enterprise networks that provide a vast array of services, there is an ever increasing need for verifying the integrity of ACLs to... more
    • by 
    •   2  
      Network SecurityComputer Networking
A determinação dos mecanismos básicos e dos critérios de implantação de um pacote de software de rede num sistema operacional específico é apresentada em detalhe. Em seguida, são analisadas alternativas de arquitetura de rede susceptíveis... more
    • by 
    •   13  
      Operating SystemsComputer NetworksNetwork Protocols and ArchitecturesOPERATING SYSTEM
Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio... more
    • by 
    •   34  
      Social NetworkingComputer Networks3GPP (UMTS)UMTS 3G SYSTEMS
    • by 
    •   13  
      Computer ScienceInformation TechnologySocial NetworkingMechanism Design
The drastic development of the World Wide Web in the recent times has made the concept of Web Crawling receive remarkable significance. The voluminous amounts of web documents swarming the web have posed huge challenges to the web search... more
    • by 
    •   3  
      Information RetrievalData MiningComputer Networking
Very Detailed Hardware and Networking PPT for Students
    • by 
    •   12  
      Computer HardwareComputer Hardware and NetworkingComputer NetworkingTroubleshooting Hardware
Size as well as complexity of communication networks (e.g. enterprise, backbone, data center) are increasing day-by- day. Software-Defined Networking (SDN) promises to enhance manageability of such networks by decoupling control plan of a... more
    • by  and +1
    •   13  
      Computer EngineeringNetwork SecurityComputer NetworksComputer Security
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could base... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyCloud ComputingComputer Networking
Basic config of Cisco 881 router
    • by 
    • Computer Networking
    • by 
    •   10  
      Computer ScienceComputer NetworksNext Generation NetworksComputer Networking and Telecommunication
    • by 
    •   2  
      Computer NetworksComputer Networking
In this paper, we explain the most important phase of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture is executed with or without the... more
    • by  and +2
    •   17  
      SecurityAuthenticityComputer Hardware and NetworkingComputer Networking
This paper considers a computation method for accepting data about the present status of a motor, and then controlling it to move in a specific direction, up to a specific limit using the CANopen communication protocol. The investigation... more
    • by 
    •   15  
      Computer NetworksEmbedded SystemsMotor ControlQt
— This review paper explains Software Defined Networking (SDN), wherein control and forwarding planes are detached, shifting all the network intelligence to a server (SDN controller) to make a logically centralized network infrastructure.... more
    • by  and +1
    •   2  
      Computer NetworkingWireless Communications and Networking
Rrugezimi dhe Protokollet
    • by 
    •   11  
      Computer ScienceComputer EngineeringComputer NetworksNetworking
    • by 
    •   2  
      Computer NetworksComputer Networking
The various convergent technologies nowadays in computer infrastructure, impose an additional burden on existing networks, the need to save technical and budgetary resources, lead companies and public agencies to verify the existence of... more
    • by  and +2
    •   7  
      Voice over IPVoipComputer NetworkingVoIP/SIP/IMS
ÖZET Eğitici Bilişim Teknolojileri Formatör Öğretmenleri başta olmak üzere, tüm öğretmenlerimize Bilişim Teknolojileri alanında ihtiyaç duyulan eğitimler verilmektedir. Cisco BTT ve CCNA Eğitimlerinin verilmesi için 2006 yılında... more
    • by  and +2
    •   6  
      EducationComputer NetworksComputer NetworkingMilli Eğitim Bakanlığı
    • by 
    • Computer Networking
UNIX memiliki tujuan dalam Computer Networking, maka kemampuan dari UNIX dalam memberikan jasa internet lebih berkembang dan lebih reliable. Banyak orang mengatakan bahwa bernetwork ria dengan UNIX lebih cepat dibandingkan dengan sistem... more
    • by 
    •   9  
      Computer ScienceOperating SystemsUNIX System ProgrammingNetworking
Since the introduction of Automated Teller Machines (ATMs) in Nigeria, cash handling has really reduced especially for those who live in the city and have easy access to ATM machines by means of their ATM cards. People no longer see the... more
    • by 
    •   2  
      Computer NetworkingElectronics and Telecommunication
    • by 
    •   11  
      Computer ScienceInformation TechnologyCloud ComputingComputer Networking
INDUSTRIAL TRAINING REPORTS
    • by 
    •   7  
      Computer SciencePhysicsComputer EngineeringComputer Networks
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it... more
    • by 
    •   4  
      Information TechnologyCloud ComputingComputer NetworkingNetwork Infrastructure
This paper treats the problem of authentication through the multi-hop communication, authorization to services access, and efficient collaboration between ad hoc nodes in order to assure efficient packet relaying during services access,... more
    • by 
    • Computer Networking
This network design assignment is of great help to the organization in their endeavor for designing and execution of a comprehensive and advanced network design system.
    • by 
    •   8  
      Computer ScienceComputer NetworksWireless Networks (Computer Science)Computer and Network Security
    • by 
    •   4  
      Computer EngineeringWireless CommunicationsComputer NetworksComputer Networking
Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency... more
    • by 
    •   24  
      Wireless CommunicationsStandardsWireless networksWireless Networks (Computer Science)
Documento referente a la teoría de flujos (Streams) en Java para lograr la comunicación entre procesos. El principal objetivo de este paper es explicar el uso, funcionamiento el implementación de los flujos de entrada y salida en Java,... more
    • by 
    •   14  
      Object Oriented ProgrammingComputer NetworksNetworkingNetworking (Engineering)
This article help you to learn about basic networking devices, IP administration, IP V4, IP v6, routing, and about Internet of Things.
    • by 
    • Computer Networking
All types of network fundamentals.
    • by 
    •   4  
      Computer ScienceComputer HackingComputer NetworkingIT-Networking
International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html New Issue: January 2020, Volume 12, Number 1 --- Table... more
    • by 
    •   20  
      Wireless CommunicationsSocial NetworkingNetwork SecurityComputer Networks
    • by 
    • Computer Networking
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more
    • by 
    •   20  
      Business NetworksMobile Ad Hoc NetworksSocial NetworkingNetwork Security
International Journal of VLSI design & Communication Systems (VLSICS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of VLSI Design & Communications. The goal of this... more
    • by 
    •   20  
      Image ProcessingNatural Language ProcessingMachine LearningNetwork Security
    • by 
    •   5  
      Information TechnologyLinuxNetworkingComputer Networking
—Datacenters provide cost-effective and flexible access to scalable compute and storage resources necessary for today's cloud computing needs. A typical datacenter is made up of thousands of servers connected with a large network and... more
    • by 
    •   15  
      Computer NetworksTopologyTraffic controlCloud Computing
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more
    • by 
    •   17  
      Wireless CommunicationsVehicular Ad Hoc NetworksWireless Sensor NetworksAdHoc Networks
1.Pendahuluan 2. Definisi Internet 3. Sekilas tentang jaringan komputer 4. Sejarah Internet 5. Keuntungan dan Kerugian penggunaan internet 6. Mode Pengalamatan Internet 7. URL dan Domain 8. Konektivitas ke Internet 9. Aplikasi Layanan... more
    • by 
    • Computer Networking
Content found picture recovery (CBIR) proposed a productive approach to investigate the pictures from bigger database. The preprocessing, highlight extraction and separation comparative measurements are the key parameters for recovery... more
    • by 
    •   2  
      AntennasComputer Networking
Bagaimana melakukan konfigurasi Peruteaan RIP versi 2 yang classless routing?. VLSM diterapkan untuk melakukan efisiensi terhadap pemakaian IP address.
    • by 
    •   3  
      Computer NetworksComputer NetworkingInternetworking
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
    • by 
    •   16  
      Computer ScienceSocial NetworksComputer EngineeringComputer Networks
In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking... more
    • by 
    •   7  
      Computer ScienceInformation SecurityComputer NetworksComputer Networking and Telecommunication
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those... more
    • by 
    • Computer Networking
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement... more
    • by 
    •   14  
      Computer EngineeringNetwork SecurityComputer NetworksComputer Security
With the tremendous growth of network-based services and users of the Internet, it is important to keep the data and transactions in the internet more secure. Since the volume of sensitive and valuable information passing over the... more
    • by  and +1
    • Computer Networking
    • by 
    •   2  
      Computer ScienceComputer Networking
    • by 
    • Computer Networking