To see the other types of publications on this topic, follow the link: Computer network architecture.

Journal articles on the topic 'Computer network architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Yan, and Jun Hui Zheng. "A Well Modularized Computer Network Architecture." Applied Mechanics and Materials 631-632 (September 2014): 902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.902.

Full text
Abstract:
By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web and standard IP telephone, which have been tested by the third-party. It could show the accuracy and easily implemented property of this architecture.
APA, Harvard, Vancouver, ISO, and other styles
2

Kaiser, Marcus. "Brain architecture: a design for natural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, no. 1861 (2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.

Full text
Abstract:
Fifty years ago, John von Neumann compared the architecture of the brain with that of the computers he invented and which are still in use today. In those days, the organization of computers was based on concepts of brain organization. Here, we give an update on current results on the global organization of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures. After all, the organization of the brain might again inspire computer architecture.
APA, Harvard, Vancouver, ISO, and other styles
3

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO, and other styles
4

Howlett, R. J., and S. D. Walters. "Multi-computer neural network architecture." Electronics Letters 35, no. 16 (1999): 1350. http://dx.doi.org/10.1049/el:19990962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duan, Qiang. "Intelligent and Autonomous Management in Cloud-Native Future Networks—A Survey on Related Standards from an Architectural Perspective." Future Internet 13, no. 2 (2021): 42. http://dx.doi.org/10.3390/fi13020042.

Full text
Abstract:
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service provisioning. Intelligent and autonomous management is one of the most challenging issues in cloud-native future networks, and a wide range of machine learning (ML)-based technologies have been proposed for addressing different aspects of the management challenge. It becomes critical that the various management technologies are applied on the foundation of a consistent architectural framework with a holistic vision. This calls for standardization of new management architecture that supports seamless the integration of diverse ML-based technologies in cloud-native future networks. The goal of this paper is to provide a big picture of the recent developments of architectural frameworks for intelligent and autonomous management for future networks. The paper surveys the latest progress in the standardization of network management architectures including works by 3GPP, ETSI, and ITU-Tand analyzes how cloud-native network design may facilitate the architecture development for addressing management challenges. Open issues related to intelligent and autonomous management in cloud-native future networks are also discussed in this paper to identify some possible directions for future research and development.
APA, Harvard, Vancouver, ISO, and other styles
6

Coffield, David. "Network system architecture." Computer Communications 14, no. 1 (1991): 58. http://dx.doi.org/10.1016/0140-3664(91)90085-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raghavan, SV. "Systems network architecture." Computer Communications 18, no. 1 (1995): 56. http://dx.doi.org/10.1016/0140-3664(95)90075-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shi, Jian, Shao Ping Wang, and Kang Wang. "The Integrated Performability Analysis Architecture of the Computer Networks." Advanced Materials Research 118-120 (June 2010): 907–11. http://dx.doi.org/10.4028/www.scientific.net/amr.118-120.907.

Full text
Abstract:
Aimed at the challenges existing in current network performability research, this paper proposes an analysis architecture for network performability research, in which FMEA of the network, the availability model of the equipment, the topology analysis, the performance evaluation and the design of performability verification platform are integrated into together. This architecture assures accuracy of the performability analysis. According to the performance evaluation criterions, Capability-based performability, delay-based performability and PLR-based performability measures to the computer networks are suggested.
APA, Harvard, Vancouver, ISO, and other styles
9

Zemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Routing Communication Inside Ad Hoc Drones Network." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 17 (2021): 192. http://dx.doi.org/10.3991/ijim.v15i17.19179.

Full text
Abstract:
The world knows a constant development of technology applied in different sectors of activities: health, factories, homes, transportation, and others, one of the big axes that take a lot of attention today is the drone’s field. To communicate information a fleet of drones can use different communication architectures: centralized communication architecture, satellite communication architecture, cellular network communication architecture and a specific AdHoc communication architecture called the UAANET drones architecture. In our work we focused specifically on the routing of information inside the UAANET where we analyze and compare the performances of the reactive protocol AODV and the proactive protocol OLSR, when the UAANET use an applications based on the HTTP protocol, the FTP protocol, the database queries, voice application, and video conferencing application.
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Hong Yun. "Analysis and Research of Financial Network Security Architecture." Advanced Materials Research 108-111 (May 2010): 168–71. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.168.

Full text
Abstract:
With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.
APA, Harvard, Vancouver, ISO, and other styles
11

Jiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.

Full text
Abstract:
Internet benefits societies by constantly connecting devices and transmitting data across the world. However, due to the lack of architectural built-in security, the pervasive network attacks faced by the entire information technology are considered to be unending and inevitable. As Internet evolves, security issues are regularly fixed according to a patch-like strategy. Nevertheless, the patch-like strategy generally results in arms races and passive situations, leaving an endless lag in both existing and emerging attacking surface. In this paper, we present NAIS (Network Architecture with Intrinsic Security)—a network architecture towards trustworthiness and security. By solving stubborn security issues like IP spoofing, MITM (man-in-the-middle) attacks, and DDoS (distributed denial of service) attacks at architectural level, NAIS is envisioned to provide the most secure end-to-end communication in the network layer. This paper first presents a comprehensive analysis of network security at Internet range. Then, the system design of NAIS is elaborated with particular design philosophies and four security techniques. Such philosophies and techniques intertwine internally and contribute to a communication environment with authenticity, privacy, accountability, confidentiality, integrity, and availability. Finally, we evaluate the security functionalities on the packet forwarding performance, demonstrating that NAIS can efficiently provide security and trustworthiness in Internet end-to-end communication.
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Chang Wen, and Yu Wang. "Chain-Type Wireless Sensor Network for Monitoring Long Range Infrastructures: Architecture and Protocols." International Journal of Distributed Sensor Networks 4, no. 4 (2008): 287–314. http://dx.doi.org/10.1080/15501320701260261.

Full text
Abstract:
We present in this paper an investigation of a special class of wireless sensor networks for monitoring critical infrastructures that may extend for hundreds of miles in distances. Such networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrowly elongated geographical areas and form a chain-type topology. Based on careful analysis of existing sensor network architectures, we first demonstrate the need to develop new architecture and networking protocols to match the unique topology of chain-type sensor networks. We then propose hierarchical network architecture that consists of clusters of sensor nodes to enable the chain-type sensor networks to be scalable to cover typically long range infrastructures with tolerable delay in network-wide data collection. To maintain energy efficient operations and maximize the lifetime for such a chain-type sensor network, we devise a smart strategy for the deployment of cluster heads. Protocols for network initialization and seamless operations of the chain-type sensor networks are also developed to match the proposed hierarchical architecture and cluster head deployment strategy. Simulations have been carried out to verify the performance of the hierarchical architecture, the smart node deployment strategy, and the corresponding network initialization and operation protocols.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Ke Jun, and Wu Xu. "Virtual Instrument Measurement System Architecture Design Based on Database Management." Applied Mechanics and Materials 198-199 (September 2012): 989–94. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.989.

Full text
Abstract:
The purpose of virtual instrument measurement system architecture design based on database management is to expand stand-alone mode into the measurement mode of network. Through computer network, multiple virtual instrument measurement networks for data storage, communication and control the formation of network measurement applications are realized. This article discusses the formation of virtual instrument based on the database and computer network monitoring and control network programs, measures and achievement.
APA, Harvard, Vancouver, ISO, and other styles
14

Zkik, Karim, Said EL Hajji, and Ghizlane Orhanou. "A centralized secure plan for detecting and mitigation incidents in hybrid SDN." MATEC Web of Conferences 189 (2018): 10015. http://dx.doi.org/10.1051/matecconf/201818910015.

Full text
Abstract:
The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.
APA, Harvard, Vancouver, ISO, and other styles
15

Gibson, Garth A., and Rodney Van Meter. "Network attached storage architecture." Communications of the ACM 43, no. 11 (2000): 37–45. http://dx.doi.org/10.1145/353360.353362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Budhiraja, N., M. Gopal, M. Gupta, E. A. Hervatic, S. J. Nadas, and P. A. Stirpe. "Multicast network connection architecture." IBM Systems Journal 34, no. 4 (1995): 590–603. http://dx.doi.org/10.1147/sj.344.0590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kryukov, Ya V., D. A. Pokamestov, E. V. Rogozhnikov, S. A. Novichkov, and D. V. Lakontsev. "Analysis of Computational Complexity and Processing Time Evaluation of the Protocol Stack in 5G New Radio." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 3 (2020): 31–37. http://dx.doi.org/10.21293/1818-0442-2020-23-3-31-37.

Full text
Abstract:
Currently, an active deployment of radio access networks for mobile communication systems 5G New Radio is being observed. The architecture of networks is developing rapidly, where significant part of the functions is performed in a virtual cloud space of a personal computer. The computing power of a personal computer must be sufficient to execute network protocols in real time. To reduce the cost of deploying 5G NR networks, the configuration of each remote computer must be optimally matched to the scale of a particular network. Therefore, an urgent direction of research is the assessment of the execution time of the 5G NR protocol stack on various configurations of computers and the development of a mathematical model for data analysis, approximation of dependencies and making recommendations. In this paper, the authors provide an overview of the main 5G NR network architectures, as well as a description of the methods and tools that can be used to estimate the computational complexity of the 5G NR protocol stack. The final section provides an analysis of the computational complexity of the protocol stack, obtained during the experiments by colleagues in partner institutions.
APA, Harvard, Vancouver, ISO, and other styles
18

Sesha Saiteja, Maddula N. V., K. Sai Sumanth Reddy, D. Radha, and Minal Moharir. "Multi-Core Architecture and Network on Chip: Applications and Challenges." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 239–45. http://dx.doi.org/10.1166/jctn.2020.8657.

Full text
Abstract:
Technology improves performance and reduces in size day by day. Reduction in size can increase the density and which in turn can improve the performance. These statements suit very well for the computer architecture improvement. The whole System on Chip (SoC) brought the concept of multiple cores on a single chip. The multi-core or many-core architectures are the future of computing. Technology has improved in reducing the size and increasing the density, but improving the performance to an expectation of including more cores is a challenge of many-core technology. Utilization of all cores and improving the performance of execution by these cores are the challenges to be addressed in a many-core technology. This paper discusses the basics of many core architecture, comparison and applications. Further, it covers the basics of Network on Chip (NoC), architectural components, and various views of current Network on Chip research problems. Research problems include improving the performance of communication by avoiding congested path in routing.
APA, Harvard, Vancouver, ISO, and other styles
19

Pelc, Mariusz, and Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 05 (2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.

Full text
Abstract:
Nowadays, information/data security and availability are of utmost importance. However, due to the fact that security is a process rather than a state, there is an increasing demand for technologies or architectural solutions that would allow a computer system to adjust its level of security in response to changes in its environmental/network characteristics. In this paper, an architecture for a self-managing adaptive router/firewall has been proposed to facilitate an intelligent and real-time self-protection of a computer system. We also show how the proposed architecture might be used to control other system mechanisms or resources (for example, RAM).
APA, Harvard, Vancouver, ISO, and other styles
20

Odhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Full text
Abstract:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to develop a software-based computer architecture on which Agents execution could be explored. The combination of Intelligent Agents and HYDRA computer architecture gave rise to a new computer concept: the NET-Computer in which the comput­ing resources reside on the Internet. The Internet computers form the hardware and software resources, and the user is provided with a simple interface to access the Internet and run user tasks. The Agents autonomously roam the Internet (NET-Computer) executing the tasks. A growing segment of the Internet is E-Commerce for online shopping for products and services. The Internet computing resources provide a marketplace for product suppliers and consumers alike. Consumers are looking for suppliers selling products and services, while suppliers are looking for buyers. Searching the vast amount of information available on the Internet causes a great deal of problems for both consumers and suppliers. Intelligent Agents executing on the NET-Computer can surf through the Internet and select specific information of interest to the user. The simulation results show that Intelligent Agents executing HYDRA computer architecture could be applied in E-Commerce.
APA, Harvard, Vancouver, ISO, and other styles
21

Zinkin, S. A., Mustafa Sadeq Jaafar, and N. S. Karamysheva. "CONCEPTUAL REPRESENTATIONS AND MODIFICATIONS OF PETRI NETS FOR APPLICATIONS IN THE AREA OF SYNTHESIS OF A FUNCTIONAL ARCHITECTURE OF DISTRIBUTED COMPUTATIONAL SYSTEMS WITH VARIABLE STRUCTURE." Proceedings of the Southwest State University 22, no. 6 (2019): 143–67. http://dx.doi.org/10.21869/2223-1560-2018-22-6-143-167.

Full text
Abstract:
Background. The object of the research is the functional architecture of distributed computing systems with a variable (reconfigurable) structure characteristic of hybrid systems of cloud-network (grid) type. Despite the fact that Petri nets have long been studied both theoretically and practically, the methods of their interpretation continue to develop intensively. At present, the problem of embedding Petri nets in the architecture of distributed network applications used to implement global computing in modern mixed cloud, grid and cluster systems has not been sufficiently studied. It is shown that in modern studies, Petri nets are used mainly in the simulation of discrete systems and processes, and not as the basis for formalized specifications in the development of distributed applications. In this regard, the interpretation of Petri nets in applications to the functional architecture of distributed computing systems with a variable structure based on the network software of the intermediate class (middleware class) is relevant. The aim of the work was the integration of graphical representations of conceptual graphs, semantic networks, scenarios and Petri nets, which made it possible to create effective tools with graphical support for designing a functional architecture of distributed computing systems with a variable structure and, in particular, a cloudy architecture of the NCaaSoD type - Network Computing as a Service on Demand (network computing as a cloud service at the request of the user).Materials and methods. The conceptual models of distributed processes that are a graphical interpretation of the first-order predicate calculus are used. Conceptual graphs for distributed Petri nets of mixed type have been proposed, which allow describing computation processes in global computational networks with a view to their subsequent implementation. Results. Based on the integration of graphical representations of conceptual graphs, semantic networks, scenarios and Petri nets, conceptual representations of distributed reconfigurable Petri nets are proposed, allowing them to be directly integrated into the architecture of the computer network.Results. New conceptual-behavioral models based on conceptual graphs of distributed Petri nets have been proposed to determine the system and functional architectures of distributed computing systems with a variable structure provided to the user as a hybrid cloud-based network service; these models are distinguished by the possibility of operational reconfiguration and immediate execution.Conclusion. A method was proposed and formalized for embedding conceptual Petri nets into the architecture of cloud-networked computer systems such as NCaaSoD — network (cloud) computing as a service organized at the user's request. The rules for obtaining relations of connectivity between the positions and transitions of the Petri net, placed on the nodes of the physical computer network, are proposed.
APA, Harvard, Vancouver, ISO, and other styles
22

Elenbogen, Bruce S. "Computer network management." ACM SIGCSE Bulletin 31, no. 1 (1999): 119–21. http://dx.doi.org/10.1145/384266.299713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rowshanrad, Shiva, Mohamad Reza Parsaei, and Manijeh Keshtgari. "IMPLEMENTING NDN USING SDN: A REVIEW ON METHODS AND APPLICATIONS." IIUM Engineering Journal 17, no. 2 (2016): 11–20. http://dx.doi.org/10.31436/iiumej.v17i2.590.

Full text
Abstract:
In recent years many claims about the limitations of todays’ network architecture, its lack of flexibility and ability to response to ongoing changes and increasing users demands. In this regard, new network architectures are proposed. Software Defined Networking (SDN) is one of these new architectures which centralizes the control of network by separating control plane from data plane. This separation leads to intelligence, flexibility and easier control in computer networks. One of the advantages of this framework is the ability to implement and test new protocols and architectures in actual networks without any concern of interruption.Named Data Networking (NDN) is another paradigm for future network architecture. With NDN the network becomes aware of the content that is providing, rather than just transferring it among end-points. NDN attracts researchers’ attention and known as the potential future of networking and internet. Providing NDN functionalities over SDN is an important requirement to enable the innovation and optimization of network resources. In this paper first we describe about SDN and NDN, and then we introduce methods for implementing NDN using SDN. We also point out the advantages and applications of implementing NDN over SDN.
APA, Harvard, Vancouver, ISO, and other styles
24

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
25

Calvert, Ken. "Reflections on network architecture." ACM SIGCOMM Computer Communication Review 36, no. 2 (2006): 27–30. http://dx.doi.org/10.1145/1129582.1129590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Summers, Kenneth L., Thomas Preston Caudell, Kathryn Berkbigler, Brian Bush, Kei Davis, and Steve Smith. "Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers." Information Visualization 3, no. 3 (2004): 209–22. http://dx.doi.org/10.1057/palgrave.ivs.9500079.

Full text
Abstract:
We are exploring the development and application of information visualization techniques for the analysis of new massively parallel supercomputer architectures. Modern supercomputers typically comprise very large clusters of commodity SMPs interconnected by possibly dense and often non-standard networks. The scale, complexity, and inherent non-locality of the structure and dynamics of this hardware, and the operating systems and applications distributed over them, challenge traditional analysis methods. As part of the á la carte (A Los Alamos Computer Architecture Toolkit for Extreme-Scale Architecture Simulation) team at Los Alamos National Laboratory, who are simulating these new architectures, we are exploring advanced visualization techniques and creating tools to enhance analysis of these simulations with intuitive three-dimensional representations and interfaces. This work complements existing and emerging algorithmic analysis tools. In this paper, we give background on the problem domain, a description of a prototypical computer architecture of interest (on the order of 10,000 processors connected by a quaternary fat-tree communications network), and a presentation of three classes of visualizations that clearly display the switching fabric and the flow of information in the interconnecting network.
APA, Harvard, Vancouver, ISO, and other styles
27

Waheed, Mohammed Abbas, Azzad Bader Saeed, and Thanaa Hussein Abd. "Signalling load reduction in 5G network based on cloud radio access network architecture." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5127. http://dx.doi.org/10.11591/ijece.v11i6.pp5127-5136.

Full text
Abstract:
The rapid growth of both mobile users and application numbers has caused a huge load on the core network (CN). This is attributed to the large numbers of control messages circulating between CN entities for each communication or service request, however, making it imperative to develop innovative designs to handle this load. Consequently, a variety of proposed architectures, including a software defined network (SDN) paradigm focused on the separation of control and data plans, have been implemented to make networks more flexible. Cloud radio access network (C-RAN) architecture has been suggested for this purpose, which is based on separating base band units (BBU) from several base stations and assembling these in one place. In this work, a novel approach to realize this process is based on SDN and C-RAN, which also distributes the control elements of the CN and locates them alongside the BBU to obtain the lowest possible load. The performance of this proposed architecture was evaluated against traditional architecture using MATLAB simulation, and. the results of this assessment indicated a major reduction in signalling load as compared to that seen in the traditional architecture. Overall, the number of signalling messages exchanged between control entities was decreased by 53.19 percent as compared to that seen in the existing architecture.
APA, Harvard, Vancouver, ISO, and other styles
28

Paluzo-Hidalgo, Eduardo, Rocio Gonzalez-Diaz, Miguel A. Gutiérrez-Naranjo, and Jónathan Heras. "Optimizing the Simplicial-Map Neural Network Architecture." Journal of Imaging 7, no. 9 (2021): 173. http://dx.doi.org/10.3390/jimaging7090173.

Full text
Abstract:
Simplicial-map neural networks are a recent neural network architecture induced by simplicial maps defined between simplicial complexes. It has been proved that simplicial-map neural networks are universal approximators and that they can be refined to be robust to adversarial attacks. In this paper, the refinement toward robustness is optimized by reducing the number of simplices (i.e., nodes) needed. We have shown experimentally that such a refined neural network is equivalent to the original network as a classification tool but requires much less storage.
APA, Harvard, Vancouver, ISO, and other styles
29

Cepl, Miroslav, and Jiří Šťastný. "Progressive optimization methods for applied in computer network." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 57, no. 6 (2009): 45–50. http://dx.doi.org/10.11118/actaun200957060045.

Full text
Abstract:
Standard core of communications’ networks is represent by active elements, which carries out the processing of transmitted data units. Based on the results of the processing the data are transmitted from sender to recipient. The hardest challenge of the active elements present to determine what the data processing unit and what time of the system to match the processing priority assigned to individual data units. Based on the analysis of the architecture and function of active network components and algorithms, artificial neural networks can be assumed to be effectively useable to manage network elements. This article focuses on the design and use of the selected type of artificial neural network (Hopfield neural network) for the optimal management of network switch.
APA, Harvard, Vancouver, ISO, and other styles
30

Sherazi, Hafiz Husnain Raza, Zuhaib Ashfaq Khan, Razi Iqbal, Shahzad Rizwan, Muhammad Ali Imran, and Khalid Awan. "A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication." Mobile Information Systems 2019 (February 3, 2019): 1–12. http://dx.doi.org/10.1155/2019/3101276.

Full text
Abstract:
The Internet of vehicles (IoV) is a newly emerged wave that converges Internet of things (IoT) into vehicular networks to benefit from ubiquitous Internet connectivity. Despite various research efforts, vehicular networks are still striving to achieve higher data rate, seamless connectivity, scalability, security, and improved quality of service, which are the key enablers for IoV. It becomes even more critical to investigate novel design architectures to accomplish efficient and reliable data forwarding when it comes to handling the emergency communication infrastructure in the presence of natural epidemics. The article proposes a heterogeneous network architecture incorporating multiple wireless interfaces (e.g., wireless access in vehicular environment (WAVE), long-range wireless fidelity (WiFi), and fourth generation/long-term evolution (4G/LTE)) installed on the on-board units, exploiting the radio over fiber approach to establish a context-aware network connectivity. This heterogeneous network architecture attempts to meet the requirements of pervasive connectivity for vehicular ad hoc networks (VANETs) to make them scalable and adaptable for IoV supporting a range of emergency services. The architecture employs the Best Interface Selection (BIS) algorithm to always ensure reliable communication through the best available wireless interface to support seamless connectivity required for efficient data forwarding in vehicle to infrastructure (V2I) communication successfully avoiding the single point of failure. Moreover, the simulation results clearly argue about the suitability of the proposed architecture in IoV environment coping with different types of applications against individual wireless technologies.
APA, Harvard, Vancouver, ISO, and other styles
31

Chi, Kaikai, Xiaohong Jiang, Baoliu Ye, and Yanjun Li. "Flow-oriented network coding architecture for multihop wireless networks." Computer Networks 55, no. 10 (2011): 2425–42. http://dx.doi.org/10.1016/j.comnet.2011.04.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ladner, Roy, Elizabeth Warner, Udaykiran Katikaneni, Frank McCreedy, and Frederick E. Petry. "Active network architecture and management." International Journal of Intelligent Systems 22, no. 10 (2007): 1123–38. http://dx.doi.org/10.1002/int.20242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

NAKANO, KOJI. "A BIBLIOGRAPHY OF PUBLISHED PAPERS ON DYNAMICALLY RECONFIGURABLE ARCHITECTURES." Parallel Processing Letters 05, no. 01 (1995): 111–24. http://dx.doi.org/10.1142/s0129626495000102.

Full text
Abstract:
A dynamically reconfigurable architecture is a parallel computer architecture that supports a physical switching of communication patterns during a computation. Basically, the dynamically reconfigurable architecture consists of locally controllable switches, which enables flexible-connection patterns of the network. The bibliography attempts to classify published papers on dynamically reconfigurable architectures according to the problems that are dealt with.
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Yue. "Research on Computer Network Security Architecture of Universities in China." Advanced Materials Research 765-767 (September 2013): 1486–89. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1486.

Full text
Abstract:
With the development of network, the computer systems of universities in China gradually use network management and services. However, in network the system faces security threats like virus, malicious software and human attack, which may cause data damage, missing and stealing of confidential documents, or even lead to the breakdown of network system. Therefore, it is important to promote the security of computer network systems of universities. This paper gives the comprehensive analysis on the security system of computer network systems of universities in China, analyzes the factors easily leading to the security and provides suggestions and reference for network construction.
APA, Harvard, Vancouver, ISO, and other styles
35

Ahmad, Muhib, Farrukh Zeeshan Khan, Zeshan Iqbal, et al. "Designing of a Simulation Tool for the Performance Analysis of Hybrid Data Center Networks (DCNs)." Complexity 2021 (April 9, 2021): 1–13. http://dx.doi.org/10.1155/2021/5520324.

Full text
Abstract:
Data center (DC) technology changes the mode of computing. Traditional DCs consist of a single layer and only have Ethernet connections among switches. Those old-fashioned DCs cannot fulfill the high resource demand compared with today’s DCs. The architectural design of the DCs is getting substantial importance and acting as the backbone of the network because of its essential feature of supporting and maintaining the rapidly increasing Internet-based applications which include search engines (e.g., Google and Yandex) and social networking applications (e.g., YouTube, Twitter, and Facebook). Every application has its parameters, like latency and blocking in the DC network. Every data center network (DCN) has its specialized architecture. It has a specific arrangement of layers and switches, which increase or decrease the DC network’s efficiency. We develop a simulation tool that comprises two different DC architectures: basic tree architecture and c-Through architecture. Using this simulation, we analyze the traffic behavior and the performance of the simulated DCN. Our main purpose is to focus on mean waiting time, load, and blocking with respect to the traffic within the DCN.
APA, Harvard, Vancouver, ISO, and other styles
36

Buonacorsi, Brandon, Zhenyu Cai, Eduardo B. Ramirez, et al. "Network architecture for a topological quantum computer in silicon." Quantum Science and Technology 4, no. 2 (2019): 025003. http://dx.doi.org/10.1088/2058-9565/aaf3c4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Coffield, David. "Systems network architecture: A tutorial." Computer Communications 11, no. 3 (1988): 153. http://dx.doi.org/10.1016/0140-3664(88)90064-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Freeman, Donald T. "Computer Applications in Otolaryngology: Computer Recognition of Brain Stem Auditory Evoked Potential Wave V by a Neural Network." Annals of Otology, Rhinology & Laryngology 101, no. 9 (1992): 782–90. http://dx.doi.org/10.1177/000348949210100913.

Full text
Abstract:
A neural network simulator was used for the recognition of the presence and location of the peak of wave V of the brain stem auditory evoked potential (BAEP) test. Waveforms selected from BAEPs performed in the last 4 years at the University of Pittsburgh Presbyterian University Hospital were digitized and sampled, and the resulting amplitudes were normalized. A training set was composed of the waveforms resulting from the stimulation of 50 ears. The normalized amplitudes were used as the initial activation values for the networks. The desired outputs (the target locations for wave V) were represented in the output layer by setting the output element, which corresponded to the target location and its immediate neighbors, to high activation levels, and all the remaining output units to zero activity. Two network architectures, differing only in the hidden unit layer, with 40 and 16 hidden units, respectively, were trained by using standard back-propagation. Several trials from different starting points were performed for each architecture. The best network, found after 60 epochs (3,000 presentations), was able to correctly identify 17 of 20 cases (85%) from a set of test cases that were independent from the training set.
APA, Harvard, Vancouver, ISO, and other styles
39

Qian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.

Full text
Abstract:
In this paper, we present a novel DC-centric architecture of telecommunication networks for next generation Internet. Data flow become the major traffic in existing telecommunication networks. Traditional computer networks and telecom networks meet many challenges in high-quality service, innovation, evolution, and management. Based on analysis existing telecom networks’ challenges, a DC-centric telecom network architecture with splitting the data plane from the control plane is proposed. The DC-centric telecom network is a widely-distributed data center network (DCN), which is composed of thousands of public or private DCs. Each DC not only plays the role of storage and computing, but also is a network node of data aggregation, switching, and routing. We also design an optical switching, which is evaluated by experiment.
APA, Harvard, Vancouver, ISO, and other styles
40

Chan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Shirey, Robert W. "Defense data network security architecture." ACM SIGCOMM Computer Communication Review 20, no. 2 (1990): 66–72. http://dx.doi.org/10.1145/378570.378710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Tennenhouse, David L., and David J. Wetherall. "Towards an active network architecture." ACM SIGCOMM Computer Communication Review 37, no. 5 (2007): 81–94. http://dx.doi.org/10.1145/1290168.1290180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Tennenhouse, David L., and David J. Wetherall. "Towards an active network architecture." ACM SIGCOMM Computer Communication Review 26, no. 2 (1996): 5–17. http://dx.doi.org/10.1145/231699.231701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yang, Xiaowei, David Wetherall, and Thomas Anderson. "A DoS-limiting network architecture." ACM SIGCOMM Computer Communication Review 35, no. 4 (2005): 241–52. http://dx.doi.org/10.1145/1090191.1080120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bauer, Steven, and Xiaowei Yang. "Future directions in network architecture." ACM SIGCOMM Computer Communication Review 33, no. 5 (2003): 89–98. http://dx.doi.org/10.1145/963985.963996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Guesmi, Tawfik, Anwar Kalghoum, Badr M. Alshammari, Haitham Alsaif, and Ahmed Alzamil. "Leveraging Software-Defined Networking Approach for Future Information-Centric Networking Enhancement." Symmetry 13, no. 3 (2021): 441. http://dx.doi.org/10.3390/sym13030441.

Full text
Abstract:
Information-centric networking (ICN) has been developed as a potential candidate for future networks. In this model, users are provided with content rather than communication channels between the different hosts. The ICN network has several problems such as scalability issues and bandwidth consumption. However, software-defined networking (SDN) has been proposed to improve the networking architectures. The goal of our paper is to propose a new approach to named-data networking (NDN) based on the paradigm of SDN. Our work introduces various research studies carried out in the SDN and ICN contexts. We first present the SDN architecture. Then, we focus on work that combines ICN and SDN architectures. Finally, we show the effects of using the SDN architecture on the named-data network (NDN). Our experimental results show that the use of the SDN architecture has a positive effect on NDN network performance.
APA, Harvard, Vancouver, ISO, and other styles
47

GRAF, THORSTEN, and ALOIS KNOLL. "A MULTI-AGENT SYSTEM ARCHITECTURE FOR DISTRIBUTED COMPUTER VISION." International Journal on Artificial Intelligence Tools 09, no. 02 (2000): 305–19. http://dx.doi.org/10.1142/s0218213000000203.

Full text
Abstract:
We present a multi-agent system architecture dedicated to model computer vision systems, which provides the vision system with a great degree of flexibility. The basic idea of this architecture is to model a vision system as a society of autonomous agents, where each agent is responsible for specific vision tasks, the control strategy of a vision system is decentralized, and agents communicate using a flexible but easy understandable communication language. This directly leads to self-organizing vision systems, which accomplish vision tasks by goal-driven communication processes. We describe in detail the basic concepts of the proposed multi-agent system approach including the agent architectures, the communication language and network, as well as the interaction strategies. As a testbed for the proposed architecture we have modeled an object recognition system as an assembly of agents which organize themselves according to a given recognition task by employing communication.
APA, Harvard, Vancouver, ISO, and other styles
48

Michiels, Eddie. "The Dutch interbank computer network." Computer Standards & Interfaces 7, no. 1-2 (1988): 127–37. http://dx.doi.org/10.1016/0920-5489(88)90057-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Fariz, Ahmad, Syamsul El Yumin, Masbah RT Siregar, and Taswanda Taryo. "Arsitektur Jaringan Komputer Berbasis Framework Togaf-Adm Menggunakan Proses NDLC." JTIM : Jurnal Teknologi Informasi dan Multimedia 1, no. 2 (2019): 133–42. http://dx.doi.org/10.35746/jtim.v1i2.28.

Full text
Abstract:
One factor for the achievement of the objectives of the concept of learning in the management of modern education is to utilize information technology that is supported by a reliable computer network architecture. In this research, the method of designing a computer network architecture is based on the 4 stages of the TOGAF-ADM Framework, namely vision architecture, business architecture, information systems architecture (data architecture and application architecture) and technology architecture. Then the system implementation uses the Network Development Life Cycle (NDLC) process which consists of analysis, design, simulation prototyping, implementation, monitoring, management and ending with an evaluation of computer network development. From the trial results, it is obtained that by using load balance technology and microtic device support, sending and receiving data packets is now faster and more stable because the communication lines have been segmented and the data collision in the network is resolved. The new network implementation successfully stabilized upload and download data speeds, overcoming limited connections and 0% packet loss.
APA, Harvard, Vancouver, ISO, and other styles
50

Bush, Stephen F. "Toward in vivo nanoscale communication networks: utilizing an active network architecture." Frontiers of Computer Science in China 5, no. 3 (2011): 316–26. http://dx.doi.org/10.1007/s11704-011-0116-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!