To see the other types of publications on this topic, follow the link: Routers (Computer networks) Internet.

Journal articles on the topic 'Routers (Computer networks) Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Routers (Computer networks) Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Schwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.

Full text
Abstract:
TP-Link Technologies Co, Ltd. is a Chinese manufacturer of networking products and has a 42% share of the consumer WLAN market, making it the market leader. The company sells about 150 million devices per year. Many people worldwide use the Internet every day and are connected to the Internet with their computers. In the world of smart homes, even coffee machines, refrigerators, smart sockets, and light bulbs have found their way to the Internet, not to mention the many smartphones, which are, of course, also connected to the Internet. Since many different dangers come from a heater or printer
APA, Harvard, Vancouver, ISO, and other styles
2

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can
APA, Harvard, Vancouver, ISO, and other styles
3

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
APA, Harvard, Vancouver, ISO, and other styles
4

Deebalakshmi, R., and V. L. Jyothi. "Intelligent Packet Delivery in Router Using Structure Optimized Neural Network." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 545. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp545-553.

Full text
Abstract:
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carri
APA, Harvard, Vancouver, ISO, and other styles
5

Ganjali, Yashar, and Nick McKeown. "Update on buffer sizing in internet routers." ACM SIGCOMM Computer Communication Review 36, no. 5 (2006): 67–70. http://dx.doi.org/10.1145/1163593.1163605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DURRESI, ARJAN, VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, and S. S. IYENGAR. "EFFICIENT AND SECURE AUTONOMOUS SYSTEM BASED TRACEBACK." Journal of Interconnection Networks 05, no. 02 (2004): 151–64. http://dx.doi.org/10.1142/s0219265904001076.

Full text
Abstract:
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim results with an approximate location of the attacker. Reconstruction of the whole path is also very difficult due to the sheer size of the Internet. This paper presents lightwei
APA, Harvard, Vancouver, ISO, and other styles
7

Curran, Kevin, Derek Woods, Nadene McDermot, and Colleen Bradley. "The effects of badly behaved routers on Internet congestion." International Journal of Network Management 13, no. 1 (2003): 83–94. http://dx.doi.org/10.1002/nem.464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vural, Serdar, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. "Caching Transient Data in Internet Content Routers." IEEE/ACM Transactions on Networking 25, no. 2 (2017): 1048–61. http://dx.doi.org/10.1109/tnet.2016.2616359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suthaharan, Shan. "Reduction of queue oscillation in the next generation Internet routers." Computer Communications 30, no. 18 (2007): 3881–91. http://dx.doi.org/10.1016/j.comcom.2007.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aminah, Nina Siti, Muhamamad Reza Ramadhani Raharjo, and Maman Budiman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5119. http://dx.doi.org/10.11591/ijece.v11i6.pp5119-5126.

Full text
Abstract:
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication.
APA, Harvard, Vancouver, ISO, and other styles
11

FUKUDA, KENSUKE, HIDEKI TAKAYASU, and MISAKO TAKAYASU. "SPATIAL AND TEMPORAL BEHAVIOR OF CONGESTION IN INTERNET TRAFFIC." Fractals 07, no. 01 (1999): 23–31. http://dx.doi.org/10.1142/s0218348x99000049.

Full text
Abstract:
We have developed an approach which allows the determination of relative congestion levels on nodes of TCP/IP computer network by observing test packet round trip time sequences for a series of routers located along the same path. We have also demonstrated the existence of strong spatial correlation of congestion levels. Propagation of congestion between neighboring routers can be observed directly. With increasing network load, distribution of congestion duration times changes from exponential to a distribution falling off slower than power law, via power law distribution. We thus conclude th
APA, Harvard, Vancouver, ISO, and other styles
12

Lombardo, Alfio, Carla Panarello, and Giovanni Schembra. "Achieving energy savings and QoS in internet access routers." ACM SIGMETRICS Performance Evaluation Review 38, no. 3 (2011): 76–80. http://dx.doi.org/10.1145/1925019.1925035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Avrachenkov, K., U. Ayesta, J. Doncel, and P. Jacko. "Optimal congestion control of TCP flows for internet routers." ACM SIGMETRICS Performance Evaluation Review 40, no. 3 (2012): 62–64. http://dx.doi.org/10.1145/2425248.2425263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Alanezi, Mohammed A., Houssem R. E. H. Bouchekara, and Muhammad S. Javaid. "Optimizing Router Placement of Indoor Wireless Sensor Networks in Smart Buildings for IoT Applications." Sensors 20, no. 21 (2020): 6212. http://dx.doi.org/10.3390/s20216212.

Full text
Abstract:
Internet of Things (IoT) is characterized by a system of interconnected devices capable of communicating with each other to carry out specific useful tasks. The connection between these devices is ensured by routers distributed in a network. Optimizing the placement of these routers in a distributed wireless sensor network (WSN) in a smart building is a tedious task. Computer-Aided Design (CAD) programs and software can simplify this task since they provide a robust and efficient tool. At the same time, experienced engineers from different backgrounds must play a prominent role in the abovemen
APA, Harvard, Vancouver, ISO, and other styles
15

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha, and Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things." International Journal of Grid and High Performance Computing 11, no. 3 (2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Full text
Abstract:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy
APA, Harvard, Vancouver, ISO, and other styles
16

MAGONI, DAMIEN, and PASCAL LORENZ. "MULTICAST STATE DISTRIBUTION BY JOINS USING MULTIPLE SHORTEST PATHS." Journal of Interconnection Networks 06, no. 02 (2005): 115–29. http://dx.doi.org/10.1142/s0219265905001344.

Full text
Abstract:
The lack of resources in routers will become a crucial issue with the deployment of state storing protocols. In particular, single or any source multicast protocols will most probably take over large amounts of resources for maintaining multicast tree information. The aim of this paper is to study the possibility and benefit of using multiple shortest paths in order for a new member to reach a multicast tree. Such a mechanism would not reduce the overall amount of state information in the network but it would distribute this amount more evenly among all routers. The idea is to use alternate sh
APA, Harvard, Vancouver, ISO, and other styles
17

Gunawan, Heri. "ANCAMAN KEAMANAN JARINGAN PADA SERVER UNTUK MEMBATASI WEBSITE TERTENTU MENGGUNAKAN MIKROTIK." INOVA-TIF 2, no. 1 (2020): 22. http://dx.doi.org/10.32832/inova-tif.v1i2.2749.

Full text
Abstract:
<p><em>Mikrotik RouterOs ™ is an operating system and software that can be used to make a computer a reliable network router, designed to provide convenience for its users, the administration can be done through Windows application (Winbox), The server is a computer system that provides certain types of services (services) in a computer network, the server is supported by a processor that is scalable and a large ram is also equipped with a special operating system, called a (network operating system). The internet provides a lot of useful content if the user uses the internet well,
APA, Harvard, Vancouver, ISO, and other styles
18

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automati
APA, Harvard, Vancouver, ISO, and other styles
19

Musril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.

Full text
Abstract:
An autonomous system (AS) is the collection of networks having the same set of routing policies. Each AS has administrative control to its own inter-domain routing policy. Computer networks consisting of a bunch of AS's with different routing will not be able to interconnecttion one another. This is causes communication in the network to be inhibited. For that we need a protocol that can connect each different AS. Border Gateway Protocol (BGP) is an inter-domain routing protocol i.e. between different AS that is used to exchange routing information between them. In a typical inter-network (and
APA, Harvard, Vancouver, ISO, and other styles
20

Beshley, Mykola, Natalia Kryvinska, Halyna Beshley, Oleg Yaremko, and Julia Pyrih. "Virtual Router Design and Modeling for Future Networks with QoS Guarantees." Electronics 10, no. 10 (2021): 1139. http://dx.doi.org/10.3390/electronics10101139.

Full text
Abstract:
A virtual router model with a static and dynamic resource reconfiguration for future internet networking was developed. This technique allows us to create efficient virtual devices with optimal parameters (queue length, queue overflow management discipline, number of serving devices, mode of serving devices) to ensure the required level of quality of service (QoS). An analytical model of a network device with virtual routers is proposed. By means of the mentioned mathematical representation, it is possible to determine the main parameters of the virtual queue system, which are based on the fir
APA, Harvard, Vancouver, ISO, and other styles
21

Baskoro, Andri Nuki, Anton Anton, and Puji Astuti. "DESIGNING A ROUTER REDUCTION SYSTEM USING HOT STANDBY ROUTER PROTOCOL METHOD FOR BACKUP LINK IN DITJEN PPKL." Jurnal Techno Nusa Mandiri 17, no. 2 (2020): 117–22. http://dx.doi.org/10.33480/techno.v17i2.1643.

Full text
Abstract:
Computer networks play an important role in data communication at companies or government institutions to support them in terms of work. In this case, the authors conducted observational research and direct interviews with IT staff at the Ditjen PPKL Control about how the network operates in that place. Routers have a very important role in data communication and connecting different networks, so a router reduction system is needed as a solution to minimize failures on the network or these devices. The network topology in each office or government agency is different, which makes the problems
APA, Harvard, Vancouver, ISO, and other styles
22

Tantoni, Ahmad, Mohammad Taufan Asri Zaen, and Sofiansyah Fadli. "ANALISIS KOMPARASI PERFORMA JARINGAN KOMPUTER PADA IMPLEMENTASI IPv4 dan IPv6." Jurnal Informatika dan Rekayasa Elektronik 1, no. 2 (2018): 55. http://dx.doi.org/10.36595/jire.v1i2.60.

Full text
Abstract:
Routers have important functions in the network, especially the internet. Routers can connect several network segments so that they can communicate with other users even though they are separated by a great distance (Sofana, 2013). IPv4 was originally a 32-bit binary number that was used to identify hosts on the network, after successful use by internet users then a new problem arises where IPv4 cannot accommodate Internet users in the future because it runs out of IPv4 addresses. Then IPv6 was created with the aim to provide more addressing than IPv4 (Sugeng, 2015). The problem is seen from t
APA, Harvard, Vancouver, ISO, and other styles
23

Hambi, M., D. J. Blumenthal, H. J. Chao, E. Leonardi, Chunming Qiao, and K. Y. Yun. "Guest editorial high-performance electronic switches/routers for high-speed internet." IEEE Journal on Selected Areas in Communications 21, no. 4 (2003): 481–85. http://dx.doi.org/10.1109/jsac.2003.813142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hamdi, M., H. J. Chao, D. J. Blumental, et al. "Guest editorial high-performance optical switches/routers for high-speed internet." IEEE Journal on Selected Areas in Communications 21, no. 7 (2003): 1013–17. http://dx.doi.org/10.1109/jsac.2003.815677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Putra, Eka, and Rizky Aqmalsyah Bugis. "IMPLEMENTASI HOTSPOT DENGAN USER MANAGER UNTUK INTERNET WIRELESS MENGGUNAKAN MIKROTIK RB-951Ui DI SMK SWASTA AL-WASHLIYAH PASAR SENEN 2 MEDAN." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (2019): 58. http://dx.doi.org/10.36294/jurti.v3i1.689.

Full text
Abstract:
Abstract - The purpose of this study is to use Microtic Router technology to support hotspot networks at the AL-WASHLIYAH PASAR SENEN 2 PRIVATE VOCATIONAL SCHOOL, so that it can provide proxy-based hotspots, hotspots for users other than wired connections around the AL-WASHLIYAH PASAR SENEN PRIVATE VOCATIONAL SCHOOL 2 and of course that brings additional revenue beyond cable connections. The research method that is carried out is the analytical method that is by making an observation on the current method and literature study, the use of network topology which is choosing the Network device to
APA, Harvard, Vancouver, ISO, and other styles
26

Tsai, Pang-Wei, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, and Teck Chaw Ling. "SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange." Future Internet 13, no. 7 (2021): 171. http://dx.doi.org/10.3390/fi13070171.

Full text
Abstract:
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS),
APA, Harvard, Vancouver, ISO, and other styles
27

Anuntachai Machim, Murray John Lawn, and Ikuo Yamamoto. "Robotic Control by Teleoperation and Delay Time Issues Using the Internet." Proceedings of Engineering and Technology Innovation 14 (January 1, 2020): 01–08. http://dx.doi.org/10.46604/peti.2020.3931.

Full text
Abstract:
Internet usage has become an essential part of our daily lives, it has become universal. The aim of this research is to consider existing Internet-based networks with regard to their support for the remote operation of robotic technology, in particular, looking at transmission speed and delay time as it relates to teleoperation. Currently dedicated connections are typically used when a high Quality of Service (QoS) is required for mission critical services or safety-critical systems (SCS), however such connections are very expensive to set up and maintain. Therefore, this study focuses on modi
APA, Harvard, Vancouver, ISO, and other styles
28

Alassery, Fawaz, and Maha M. Althobaiti. "Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things." International journal of Computer Networks & Communications 13, no. 1 (2021): 107–27. http://dx.doi.org/10.5121/ijcnc.2021.13107.

Full text
Abstract:
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point t
APA, Harvard, Vancouver, ISO, and other styles
29

Hariyadi, I. Putu. "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP." Jurnal Matrik 16, no. 2 (2017): 86. http://dx.doi.org/10.30812/matrik.v16i2.8.

Full text
Abstract:
STMIK Bumigora is the first computer college in the province of West Nusa Tenggara (NTB). There are 11 hotspots spread across the campus to provide Internet services through a wireless connection for the academic community. The increasing number of hotspots that must be managed with locations scattered in various Mikrotik routers hence make the process of management and monitoring hotspots become complex, ineffective and efficient. Centralized campus hotspot management using a transparent bridge EoIP over SSTP can help solve the problems at hand. Ethernet over IP (EoIP) Tunneling is a Mikrotik
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Jia, Hongke Zhang, Huachun Zhou, and Hongbin Luo. "Optimizing content routers deployment in large-scale information centric core-edge separation Internet." International Journal of Communication Systems 27, no. 5 (2013): 794–810. http://dx.doi.org/10.1002/dac.2580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yun, Jung Mee, and Dae Hwan Kim. "A Study on the Convergence Adaptor Using Plug Computer." Advanced Materials Research 462 (February 2012): 348–52. http://dx.doi.org/10.4028/www.scientific.net/amr.462.348.

Full text
Abstract:
Recent studies have shown that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. Therefore, it is extremely important to look for energy-efficient Internet applications and protocols. For EPON, research on the development of protocols for higher energy efficiency at the PHY/MAC layers and the enactment of standards, and the improvement of energy efficiency of EPON devices is being conducted, while for networking equipment such as routers and switches and IDCs, research on saving the energy consumed by device
APA, Harvard, Vancouver, ISO, and other styles
32

Yi, Ping, Ting Zhu, Bo Jiang, Ruofan Jin, and Bing Wang. "Deploying Energy Routers in an Energy Internet Based on Electric Vehicles." IEEE Transactions on Vehicular Technology 65, no. 6 (2016): 4714–25. http://dx.doi.org/10.1109/tvt.2016.2549269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Armanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.

Full text
Abstract:
ABSTRACT
 The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experien
APA, Harvard, Vancouver, ISO, and other styles
34

Ohara, Seiji, Ermioni Qafzezi, Admir Barolli, Shinji Sakamoto, Yi Liu, and Leonard Barolli. "WMN-PSODGA - An Intelligent Hybrid Simulation System for WMNs Considering Load Balancing." International Journal of Distributed Systems and Technologies 11, no. 4 (2020): 39–52. http://dx.doi.org/10.4018/ijdst.2020100103.

Full text
Abstract:
Wireless mesh networks (WMNs) are becoming an important networking infrastructure because they have many advantages, such as low cost and increased high-speed wireless Internet connectivity. In the authors' previous work, they implemented a hybrid simulation system based on particle swarm optimization (PSO) and distributed genetic algorithm (DGA), called WMN-PSODGA. Moreover, they added to the fitness function a new parameter for mesh router load balancing a number of covered mesh clients per router (NCMCpR). In this article, the authors consider Exponential, Weibull, and Normal distributions
APA, Harvard, Vancouver, ISO, and other styles
35

Rathan, Karunya, and Susai Roslin. "Q-Learning and MADMM Optimization Algorithm Based Interference Aware Channel Assignment Strategy for Load Balancing in WMNS." International Journal of Intelligent Engineering and Systems 14, no. 1 (2021): 32–41. http://dx.doi.org/10.22266/ijies2021.0228.04.

Full text
Abstract:
Wireless Mesh Networks (WMNs) have been considered one of the main technologies for configuring wireless machines since they appeared. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts on the network and allow access to the internet through the gateway routers. These wireless routers are normally equipped with the multiple radios in the wireless mesh network that operate on multiple channels with the multiple interference, which is caused to reduce the network performance and end-to-end delay. In this paper, we proposed an efficient optimization algorithm to solv
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Shao-Jui, Jing-Ying Huang, Cheng-Ta Huang, and Wei-Jen Wang. "SAMEVED." International Journal of Grid and High Performance Computing 5, no. 2 (2013): 27–42. http://dx.doi.org/10.4018/jghpc.2013040102.

Full text
Abstract:
Cloud computing is an emerging computing paradigm that provides all kinds of services through the Internet. Existing elastic computing approaches are popular in cloud computing. They can fulfill the requirements of some cloud applications, but usually fail to provide an isolated computing environment consisting of connected virtual machines over a user-defined network topology. This paper presents a system architecture, namely SAMEVED, which exposes a cloud service that can allocate and manage a private, virtual elastic datacenter by integrating VPN and virtual routers into existing virtualiza
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Talib, S. A., B. M. Ali, S. Khatun, and S. Subramaniam. "Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast." Journal of Network and Computer Applications 30, no. 4 (2007): 1445–54. http://dx.doi.org/10.1016/j.jnca.2006.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Budijono, Santoso, and Robby Saleh. "Penggunaan Virtual Machine dalam Pembelajaran Jaringan." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (2014): 495. http://dx.doi.org/10.21512/comtech.v5i1.2643.

Full text
Abstract:
Computer Networks is an important course as a basis in computer science. This is because at this time all activities are associated with the use of network system or communication system. In the course of learning in Computer Networks, students are often difficult to understand network concepts, especially with many layman terms for students. The term IP, Subnet Mask, Gateway, and Router are the terms widely used in network. To better understand the use of the IP, Subnet Mask, Gateway, and Router, it should be given concrete examples of the application day-to-day. Such as setting the IP, Subne
APA, Harvard, Vancouver, ISO, and other styles
39

Leguay, Jérémie, Matthieu Latapy, Timur Friedman, and Kavé Salamatian. "Describing and simulating internet routes." Computer Networks 51, no. 8 (2007): 2067–85. http://dx.doi.org/10.1016/j.comnet.2006.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Khaleghnasab, Rogayye, Karamollah Bagherifard, Samad Nejatian, Hamid Parvin, and Bahman Ravaei. "A New Energy-Efficient Multipath Routing in Internet of Things Based on Gray Theory." International Journal of Information Technology & Decision Making 19, no. 06 (2020): 1581–617. http://dx.doi.org/10.1142/s0219622020500388.

Full text
Abstract:
Internet of Things (IoT) is a network of smart things. It indicates the ability that the mentioned physical things transfer information with each other. The characteristics of these networks, such as topology dynamicity and energy constraint, make the routing problem a challenging task in these networks. Traditional routing methods could not achieve the required performance in these networks. Therefore, developers of these networks have to consider specific routing methods in order to satisfy their requirements. One of the routing methods is utilization of the multipath protocols in which data
APA, Harvard, Vancouver, ISO, and other styles
41

Zheng, Bing, and Mohammed Atiquzzaman. "A framework to determine the optimal weight parameter of RED in next-generation Internet routers." International Journal of Communication Systems 21, no. 9 (2008): 987–1008. http://dx.doi.org/10.1002/dac.932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1347. http://dx.doi.org/10.11591/ijece.v7i3.pp1347-1354.

Full text
Abstract:
<p class="Abstract">To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet. To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite. Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. To get mor
APA, Harvard, Vancouver, ISO, and other styles
43

Walkowiak, Krzysztof. "Anycasting in connection-oriented computer networks: Models, algorithms and results." International Journal of Applied Mathematics and Computer Science 20, no. 1 (2010): 207–20. http://dx.doi.org/10.2478/v10006-010-0015-5.

Full text
Abstract:
Anycasting in connection-oriented computer networks: Models, algorithms and resultsOur discussion in this article centers around various issues related to the use of anycasting in connection-oriented computer networks. Anycast is defined as aone-to-one-of-manytransmission to deliver a packet to one of many hosts. Anycasting can be applied if the same content is replicated over many locations in the network. Examples of network techniques that apply anycasting are Content Delivery Networks (CDNs), Domain Name Service (DNS), Peer-to-Peer (P2P) systems. The role of anycasting is growing concurren
APA, Harvard, Vancouver, ISO, and other styles
44

Rusdan, Muchamad. "Design of Wireless Network System for Digital Village Using Wireless Distribution System." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 2 (2019): 51–59. http://dx.doi.org/10.20895/inista.v1i2.66.

Full text
Abstract:
The purpose of this research is to create a wireless network design in Cijambe Village using WDS so that Cijambe Village can enjoy internet services through wireless networks, which can be used to find information, communication, and market products owned by village communities. A wireless network is one of the best alternatives in building a computer network that is practical and flexible and has high mobility. Most organizations use wireless networks to support existing cable networks, but in reality, the wireless network still uses Unshielded Twisted Pair (UTP) cable media as the backbone o
APA, Harvard, Vancouver, ISO, and other styles
45

Gai, Xinnan, Yali Wang, Renliang Chen, and Liang Zou. "Research on Hybrid Microgrid Based on Simultaneous AC and DC Distribution Network and Its Power Router." Energies 12, no. 6 (2019): 1077. http://dx.doi.org/10.3390/en12061077.

Full text
Abstract:
Under the dual pressure of environmental pollution and energy crisis, the global energy consumption structure reform deepens unceasingly and the concept of energy internet has developed rapidly. The widespread volatility, randomness, and uncertainty of distributed new energy generation impose new requirements on distribution systems. The zigzag transformer is used as the coupling and isolating device for simultaneous AC–DC transmission. The basic principle and structure of simultaneous AC–DC power distribution network is analyzed. The topology structure of the simultaneous AC–DC hybrid microgr
APA, Harvard, Vancouver, ISO, and other styles
46

Sun, Rong Chun, Yan Piao, Yu Wang, and Han Wang. "Parking Guidance Control System Based on Internet of Things." Applied Mechanics and Materials 273 (January 2013): 641–45. http://dx.doi.org/10.4028/www.scientific.net/amm.273.641.

Full text
Abstract:
To help drivers to quickly find a spare parking, a parking guidance control system was proposed. The principle of ultrasonic ranging was used to detect the state of a parking space, and through the internet of things the parking detector transmits the real-time information to the control center. The control center mainly is an industrial computer and is responsible for dealing with the real-time information and sending the control command by internet of things. The guidance signs at each crossroad receive the wireless commands and execute them, by which the guidance function is performed. The
APA, Harvard, Vancouver, ISO, and other styles
47

Hua, Haochen, Yuchao Qin, Hanxuan Xu, Chuantong Hao, and Junwei Cao. "Robust Control Method for DC Microgrids and Energy Routers to Improve Voltage Stability in Energy Internet." Energies 12, no. 9 (2019): 1622. http://dx.doi.org/10.3390/en12091622.

Full text
Abstract:
The energy internet (EI) is a wide area power network that efficiently combines new energy technology and information technology, resulting in bidirectional on-demand power transmission and rational utilization of distributed energy resources (DERs). Since the stability of local network is a prerequisite for the normal operation of the entire EI, the direct current (DC) bus voltage stabilization for each individual DC microgrid (MG) is a core issue. In this paper, the dynamics of the EI system is modeled with a continuous stochastic system, which simultaneously considers related time-varying d
APA, Harvard, Vancouver, ISO, and other styles
48

Azhar, Raesul. "Analisa Perbandingan Penerapan PBR Dan Non PBR Pada Protocol OSPF Untuk Koneksi Internet." Jurnal Matrik 15, no. 1 (2017): 29. http://dx.doi.org/10.30812/matrik.v15i1.26.

Full text
Abstract:
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research w
APA, Harvard, Vancouver, ISO, and other styles
49

Kadhim, Hanan K., and Ahmed A. Oglah. "Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM." Engineering and Technology Journal 39, no. 2A (2021): 233–47. http://dx.doi.org/10.30684/etj.v39i2a.1799.

Full text
Abstract:
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs handling some problems including congestion. In this paper, the fuzzy-PID controller is used to control the nonlinear TCP / AQM model. This controller adjusts congestion of the computer network and commits controlled pressurized signaling features. Many experiments were carried out using different network parameter values, various queue sizes, and
APA, Harvard, Vancouver, ISO, and other styles
50

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.

Full text
Abstract:
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The conf
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!