The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Networking is an important concept in the field of computing in the contemporary world. While networking equipment are readily available on the market, people in need of computer networks however often turn to other trained and qualified networking personnel to set up their required local area network. The fact that a network can physically and logically be represented and configured in different...
The more complex route experiment can be accomplished under the ordinary laboratory condition, which base on Routing and Remote Access Service, the computer with two or more Network Interface Cards and using the Sniffer Pro to analyze experimental results. How to prepare, operate, consummate and develop the experiment are discussed.
Multicast routing with quality-of-service constraints is one of the most important problems in computer networks as constrained Steiner tree problem. It is a well-known NP-complete problem, which has various real-time multimedia applications in high-speed networks. In this paper, we propose algorithms to solve the bandwidth-delay-constrained least-cost multicast routing problem based on Tabu search...
This article offers the original method and algorithms of packages routing from one source to many addressees by files transfer of greater sizes. The method is named systolic routing which provides extremely high speed for transfer of data packages in switching packages networks.
Because DDoS attacks destination servers from computers distributed all over network, it is very hard to locate attacking sources and resist DDoS. In this paper, a new defending mechanism based on registration and authentication against DDoS is proposed. By bidirectional warning messages, it can help locate attacking sources quickly and resist DDoS more exactly. According to the mechanism, all servers...
In this paper, it was proven that Torus T(5m,2n) might be embedded into Petersen-Torus PT(m,n) at dilation 5, congestion 5, and expansion 1. It was also proven that Torus might be embedded in PT at 3 or less of average dilation. The embedding algorithm could be available in both wormhole routing system and store-and-forward routing system by embedding the generally known Torus network in PT at 5 or...
The observing of real world is the abstracting of nature in different levels of granularity. This paper applies quotient space granular method to the computer network routing, puts forwards a method using the granular computing method of quotient space to improve OSPF routing algorithm , describes the thought of granular layering and topological routing, defines the hierarchical dynamic routing (NCR)...
Applies real-world observation, abstract, solution in different levels of granularity to the computer network routing problem solving; and applies quotient space to agent, puts forwards the concept of quotient space. Then studies and researches the way of using quotient space granularity to improve the traditional method OSPF routing algorithm. By defining cluster, area and group granularity agent...
In this work we investigate the effects of multiple access interference (MAI) and polarization mode dispersion (PMD) in optical code division multiplexing (OCDM) lightpaths. These paths are determined by the data encoding with non-coherent optical orthogonal codes (OOC), using a sequence inversion keying (SIK) optical correlator system. Our results show the impact of MAI effects and PMD constraint...
Multidestination message passing is attractive in multicast communication because it reduces software overheads at processor nodes effectively. Combining the best features of two existing approaches (tree-based multicasting and multidestination message passing), we propose a novel tree-based multidestination (TBM) multicast scheme, which employs a new efficient multidestination message format. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.