The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
Network on a chip(NOC) is a new kind of communication method on a chip, which is evolved from system on a chip(SOC), learning from computer network. It is an important component of the multi-core technology. The network on a chip provides a new way to communicate, and it performs better than the original system on a chip based on bus. As the size of system on a chip expanded, the number of nodes in...
The paper describes the technical characteristics of private cloud applying into the digital community. According to the current developing tendency of digital community around the world, it is necessary and practical of carrying out digital community based on private cloud. On the analysis of private cloud, there are many aspects applied in the digital community such as construction planning, property...
A typical network topological design problem is to determine link connections and their capacity to achieve high performance, low initial and operational costs, and high reliability under the given traffic and link length data between nodes. Because of the difficulties of this problem, approximate solutions such as probabilistic searches have long been studied. However, the real-world network topologies...
Robot soccer is one example of a real-time multi-robot system. The cooperation among them is one of the challenges like to be overcome. Distributed approaches for local state exchanging like Real-time Databases (RTDB) are CPU demanding and complex to write and maintain. Thus, this work presents a new communication approach based on a centralized middleware named High-Level Architecture (HLA), where...
In this paper based on the developed information technology, computer network traffic monitoring was implemented. The developed software for traffic monitoring was described. Traffic trend forecasting based on the Ateb-functions theory was realized. Based on the results of prediction of traffic and maximum permissible load of network node for providing of quality of service the redistribution of network...
Nowadays various companies are arousing in our surroundings for customer or owner need in an area. To compete with the modern computer based technology, every company installs the computer in their office. In first case, some company at first design the map of computer network from some observation like company area, what will be the best design practice of the network?, what will be the amount of...
It is well known that well learning the computer network topology and its development trend is keenly important in the research of next generation network It is necessary in a correct understanding of the current computer network development status and network system structure based on the meaning and expansion to meet the next generation network development needs of a new generation of network structure...
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step...
With the rapid development of computer network technology, the security of computer network becomes increasingly important. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Things leading to the safety of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network...
In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.
“Computer Network” is an important required major course for computer specialty, and also is a major course for part of electronics specialty. This thesis analyzed “computer network” three differentiae between computer and electronics, based on studying bilingual teaching inner and combining overseas bilingual education methods. In allusion to these differentiae, bilingual teaching manners which are...
This paper analyzed the present situation of network engineering major at home and abroad. Under the background of international trend of higher engineering education, combined with advanced educational concept of engineering and CDIO reform, this fostering professional talent of net-work engineering major plan proposed a program from orientation training of talent, training program designing and...
Network is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. Computers on a network are sometimes called nodes. Networks can be broadly classified as using graphs. In the most common sense of the term, a graph is an ordered pair G = (V, E)...
In today's world of computer based control systems, there are so many applications which require precise timing. In order to maintain a precise time in those time needing systems, the time synchronization idea has been developed. Today there are many Commercial Products doing this job. In this paper we are trying to build a simple and Low Cost GPS Based Computer Network Time Synchronization Board,...
Call admission and congestion control mechanisms are the integral parts of any Quality of Service (QoS) design for computer networks that support integrated traffic. In this paper, we propose an call admission control algorithm and a congestion control algorithm for cluster based networks, which are used in a various set of applications that require QoS guarantees. We mainly consider queue length...
We have been developing an advanced general-purpose computational mechanics system, named ADVENTURE, which is designed to be able to analyze a three dimensional finite element model of arbitrary shape over 100 million Degrees Of Freedom (DOF) mesh. The one of main process modules for solid analysis, named ADVENTURE Solid, is based on the hierarchical domain decomposition parallel algorithm and employs...
Secondary pressurization pump station is vital for almost all water supply systems. Every water treatment plant which uses it must ensure its normal operation. The modern management of water treatment plants require the latest technologies in the field of remote control tools, which is a fundamental tool for automation and the remote management of systems used for public services and for the acquisition...
Computer network is an important subject to students major in science and engineering. In this paper, we provide a Web-based Computer Network Learning Platform, which is built based on network technology, multimedia technology and virtual reality technology.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.