• No results found

Network and Internet (Design, Management, and Administration)

Airborne Internet: Network in the Sky

Airborne Internet: Network in the Sky

... infrastructure for fleets of small aircraft. People won’t have to fly between large cities on jet airliners. Instead, they will be able to fly themselves right to where they want to go. This would speed up air travel. ...

5

Network Economies for the Internet Application Models

Network Economies for the Internet Application Models

... the Internet we observe a single quality of service (QoS): “best effort packet ...on network services (Shenker 9) Email and file transfer requires 100 percent accuracy, but can easily tolerate ...

10

PROACTIVE NETWORK SECUIRTY TO DETERMINE INTERNET ATTACKS

PROACTIVE NETWORK SECUIRTY TO DETERMINE INTERNET ATTACKS

... on internet. As it is very efficient to use internet for transferring ...and network we are using Antivirus ,Firewall,VPN and IDS Intrusion detection ...

8

Network approach to internet bandwidth distributions

Network approach to internet bandwidth distributions

... international Internet links, weighted by bandwidth capacity, each year over the 2002–2011 ...identify network communities at these different ...global Internet network closely resembles that ...

11

State Probability Analysis of Internet Traffic Sharing in Computer Network

State Probability Analysis of Internet Traffic Sharing in Computer Network

... Dr. Sanjay Thakur has completed M.C.A. and Ph.D. (CS) degree from H.S. Gour University, Sagar in 2002 and 2009 respectively. He is presently working as a Lecturer in the Department of Computer Science & Applications ...

6

13-2 Internet Acceptable Use Policy.pdf

13-2 Internet Acceptable Use Policy.pdf

... of Internet access, desktop computers, mobile computers or devices, videoconferencing capabilities, online collaboration capabilities, message boards, email, and ...MPS network, the MPS Internet ...

7

Internet Capacity, Network Traffic And Net Neutrality

Internet Capacity, Network Traffic And Net Neutrality

... the Internet as long as it ...to Internet scalability such as addressing, routing, multihoming and ...nutshell, Internet scalability is rapidly reaching limits due to some architectural issues ...

6

Network traffic measurement for the next generation internet

Network traffic measurement for the next generation internet

... the network layer, which can operate in parallel with the main forwarding mechanism, without negatively impacting its performance-critical ...the Internet layer and IPv6 provides the extension headers ...

279

A STUDY ON LOCAL NETWORK FOR DETECTION OF ATTACK USING HONEYNET

A STUDY ON LOCAL NETWORK FOR DETECTION OF ATTACK USING HONEYNET

... the network traffic collected on ...the internet and ...attractive network so that hackers will fully compromise our system not be suspicious that we are monitoring their every ...

9

Internet as a Growing and Dynamic Network: An Economic View

Internet as a Growing and Dynamic Network: An Economic View

... the Internet and the diffusion of signaling molecules in biological cells ...a network, it carries with itself an increase in connectivity that makes easier to cover seeming longer distances with relatively ...

7

MANAGING INTRUSION DETECTION AND DIAGNOSIS AS A SERVICE IN CLOUD COMPUTING

MANAGING INTRUSION DETECTION AND DIAGNOSIS AS A SERVICE IN CLOUD COMPUTING

... Cloud computing refers to the provision of computational resources on demand via a computer network. Users or clients can submit a task, such as word processing, to the service provider, such as Google, without ...

5

An intrusion detection system (IDS) for internet network

An intrusion detection system (IDS) for internet network

... The major problems in developing the IDS method is the evolving growth of the internet topology and the growth of the internets users which makes the modelling of the network with attack free data is ...

18

Internet connection method for mobile ad hoc wireless networks

Internet connection method for mobile ad hoc wireless networks

... First GenerationMobile Cellular Network SecondGenerationMobile Cellular Network Third GenerationMobile Cellular Network Associative BasedRouting AT&T Centre for Internet Researchat ICSI [r] ...

187

A reliable framework for communication in internet of smart devices 
		using IEEE 802 15 4

A reliable framework for communication in internet of smart devices using IEEE 802 15 4

... among internet of smart ...in internet of smart ...optimum network meeting our QoS ...among internet of smart devices ...the internet of smart ...

10

Vol 11, No 3 (2019)

Vol 11, No 3 (2019)

... and network devices, RJ-45 connectors are used as connectors at the end of the UTP network cable ( Unshielded Twisted-Pair) to connect the network device port to the PC, and the PC administrator used ...

8

A Review on Globalize Internet of Things (IoT) and Applications

A Review on Globalize Internet of Things (IoT) and Applications

... the Internet of Things considered in [3] can be grouped into three categories: i) technologies that enable “things” to acquire contextual information, ii) technologies that enable “things” to process contextual ...

7

Development of cloud computing system based on wireless sensor network protocol and routing

Development of cloud computing system based on wireless sensor network protocol and routing

... Strategy of cloud computing security is more users, each user is safe, because so giant user group, each corner to cover the Internet, as long as a web site was hung horse or a new Trojan virus, and you will ...

5

Towards an Optimized Internet Backbone Network.

Towards an Optimized Internet Backbone Network.

... energy-smart network design is thus formulated to mostly spread out traffic evenly among routers across the ...mitigating network bottleneck routers, rather than creating ones, leads to a greener ...

79

CREATING ANONYMITY ON THE INTERNET USING TOR NETWORK

CREATING ANONYMITY ON THE INTERNET USING TOR NETWORK

... "network" which leaves their mark. Yet we wonder whether the general anonymity is important, and what are the reasons that some people do want to be anonymous. It is important not to leave personal ...

10

INTERNET ACCESS VIA CABLE TV NETWORK

INTERNET ACCESS VIA CABLE TV NETWORK

... the Internet without affecting the speed of downloading or uploading ...current Internet applications tend to be asymmetric in ...part network interface card, part simple network management ...

7

Show all 10000 documents...

Related subjects