To see the other types of publications on this topic, follow the link: Routers (Computer networks).

Journal articles on the topic 'Routers (Computer networks)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Routers (Computer networks).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Haeruddin, Haeruddin. "Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS." JURNAL MEDIA INFORMATIKA BUDIDARMA 5, no. 3 (July 31, 2021): 848. http://dx.doi.org/10.30865/mib.v5i3.2979.

Full text
Abstract:
The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is
APA, Harvard, Vancouver, ISO, and other styles
2

Du, Yi-Hong, and Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks." Security and Communication Networks 2018 (June 7, 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.

Full text
Abstract:
Wi-Fi networks almost cover all active areas around us and, especially in some densely populated regions, Wi-Fi signals are strongly overlapped. The broad and overlapped coverage brings much convenience at the cost of great security risks. Conventionally, a worm virus can infect a router and then attack other routers within its signal coverage. Nowadays, artificial intelligence enables us to solve problems efficiently from available data via computer algorithm. In this paper, we endow the virus with some abilities and present a dedicated worm virus which can pick susceptible routers with kerne
APA, Harvard, Vancouver, ISO, and other styles
3

Bessos, Mai Ben Adar, and Amir Herzberg. "Intercepting a Stealthy Network." ACM Transactions on Sensor Networks 17, no. 2 (June 2021): 1–39. http://dx.doi.org/10.1145/3431223.

Full text
Abstract:
We investigate an understudied threat: networks of stealthy routers (S-Routers) , relaying messages to a hidden destination . The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by triangulation. Mobile devices called Interceptors can detect communication by an S-Router, but only when the Interceptor is next to the transmitting S-Router. We examine algorithms for a set of mobile Interceptors to find the destination of the communication relayed by the S-Routers. The algorithms are compared according to the number of communicating
APA, Harvard, Vancouver, ISO, and other styles
4

Pakhomova, V. M., and A. O. Opriatnyi. "Software Model for Determining the Optimal Routes in a Computer Network Based on the Two-Colonial Ant Algorithm." Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport, no. 3(93) (June 15, 2021): 38–49. http://dx.doi.org/10.15802/stp2021/242046.

Full text
Abstract:
Purpose. At present, the computer networks of the information and telecommunication system (ITS) of railway transport use the OSPF protocol, which does not allow taking into account several metrics when determining the optimal route. Therefore, there is a need to study the possibility of organizing routing in computer networks of rail transport ITS using a two-colonial ant algorithm. Methodology. According to the Two-ACO software model, created in the Python language based on the two-colonial ant algorithm, the optimal route in a computer network was determined. Two-ACO model inputs: computer
APA, Harvard, Vancouver, ISO, and other styles
5

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can
APA, Harvard, Vancouver, ISO, and other styles
6

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
APA, Harvard, Vancouver, ISO, and other styles
7

Qureshi, Muhammad Aasim, Mohd Fadzil Hassan, Muhammad Khurram Ehsan, Muhammad Owais Khan, Md YeaKub Ali, and Shafiullah Khan. "A Robust Graph Theoretic Solution of Routing in Intelligent Networks." Wireless Communications and Mobile Computing 2022 (June 20, 2022): 1–7. http://dx.doi.org/10.1155/2022/9661411.

Full text
Abstract:
Implementation of robust routing is very critical in network communication. Connecting devices like routers maintain databases for the whole network topology in the routing table. Each router needs to keep these tables updated with the best possible routes so that an efficient communication can always take place in nondelay tolerant intelligent networks that include military and tactical systems, vehicular communication networks, underwater acoustic networks, and intelligent sensor networks. The fast construction of shortest-path tree (SPT) is important to devise an efficient routing in a nond
APA, Harvard, Vancouver, ISO, and other styles
8

Bidaybekov, Ye Y., Y. K. Khenner, Sh T. Shekerbekova, and Y. Н. Zhabayev. "ON THE ISSUE OF TRAINING FUTURE COMPUTER SCIENCE TEACHERS IN COMPUTER." BULLETIN Series of Physics & Mathematical Sciences 72, no. 4 (September 29, 2020): 174–79. http://dx.doi.org/10.51889/2020-4.1728-7901.27.

Full text
Abstract:
The article discusses of training future computer science teachers in computer networks based on network simulation. Analysis of scientific and pedagogical and educational literature has shown that in the training of computer science teachers, computer networks are studied in the aspect of information simulation of their structures, while simulation the processes of their functioning is not given due attention, despite the possibility of its use in the organization of training. Most educational institutions face organizational, technical and material difficulties when organizing training in co
APA, Harvard, Vancouver, ISO, and other styles
9

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Full text
Abstract:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the int
APA, Harvard, Vancouver, ISO, and other styles
10

MA, LIANG, and MIESO K. DENKO. "ENHANCED ROUTING METRIC FOR LOAD-BALANCING IN WIRELESS MESH NETWORKS." Journal of Interconnection Networks 08, no. 04 (December 2007): 407–26. http://dx.doi.org/10.1142/s0219265907002107.

Full text
Abstract:
Wireless mesh networks (WMNs) have been drawing significant attention in recent years due to their flexibility in providing extensive wireless backbone. WMNs typically consist of mesh routers and mesh clients with each node operating not only as a host but also as a router. Due to the traffic patterns in WMNs, load-balancing becomes an important issue and may degrade the performance of the entire network. This paper proposes a routing metric known as Weighted Cumulative Expected Transmission Time with Load-Balancing (WCETT-LB) for wireless mesh networks. WCETTT-LB enhances the basic Weighted C
APA, Harvard, Vancouver, ISO, and other styles
11

Goudreau, Mark W., and C. Lee Giles. "ROUTING IN RANDOM MULTISTAGE INTERCONNECTIONS NETWORKS: COMPARING EXHAUSTIVE SEARCH, GREEDY AND NEURAL NETWORK APPROACHES." International Journal of Neural Systems 03, no. 02 (January 1992): 125–42. http://dx.doi.org/10.1142/s0129065792000115.

Full text
Abstract:
The problem of establishing point-to-point communication routes in a random multistage interconnection network (RMIN) is addressed. A neural network routing scheme is presented. This routing scheme is compared to two more traditional routing techniques—namely, exhaustive search routing and greedy routing. The main criterion that is examined is the ability of each routing methodology to solve routing problems. Results are obtained through simulation of the routing methodologies for three different RMINs. The sample RMINs are relatively small since the neural network router in its present form w
APA, Harvard, Vancouver, ISO, and other styles
12

Schwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (June 18, 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.

Full text
Abstract:
TP-Link Technologies Co, Ltd. is a Chinese manufacturer of networking products and has a 42% share of the consumer WLAN market, making it the market leader. The company sells about 150 million devices per year. Many people worldwide use the Internet every day and are connected to the Internet with their computers. In the world of smart homes, even coffee machines, refrigerators, smart sockets, and light bulbs have found their way to the Internet, not to mention the many smartphones, which are, of course, also connected to the Internet. Since many different dangers come from a heater or printer
APA, Harvard, Vancouver, ISO, and other styles
13

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication proces
APA, Harvard, Vancouver, ISO, and other styles
14

Ryndych, Yevhen, Andrii Borovyk, and Oleksii Borovyk. "RESEARCH OF TUNNELING TECHNOLOGIES IN MODERN COMPUTER NETWORKS." Technical Sciences and Technologies, no. 4(26) (2021): 67–74. http://dx.doi.org/10.25140/2411-5363-2021-4(26)-67-74.

Full text
Abstract:
Modern corporate networks are a combination of internal and external communication channels. The issue of confiden-tiality in such networks is relevant. To reduce the risks associated with implementing new solutions in continuous cycle systems, it is necessary to analyze and evaluate their impact.For now, there is a large number of network protocols that can be used to create tunnels. Modern network equipment is a rather complex software and hardware system that supports many standards and protocols. Well-known network equipment manufacturer MikroTik has upgraded the RouterOS operating system
APA, Harvard, Vancouver, ISO, and other styles
15

Du, Jiang, and Yu Li. "A Solution for Anonymous Routers Discovery Based on Source-Routing Traceroute." Advanced Materials Research 765-767 (September 2013): 1050–54. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1050.

Full text
Abstract:
Discovery of computer networks topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we dont know its interface information, which makes it very difficult to find out their interconnections through common ways. This paper introduces a solution to deal with it, using source-routing traceroute command and nodes degree to merge ARs or find out their relation, and finally get the topology grap
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Ku-Hwan, Hoang-Linh To, Won-Joo Hwang, and Jung-Tae Lee. "Infinite Queue Management via Cascade Control for Industrial Routers in Smart Grid IP Networks." Scientific Programming 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/5796907.

Full text
Abstract:
Smart grid applications experience an extremely wide range of communication delay. Data flows of those applications are normally aggregated at industrial network routers in substations, form infinite (long) queues termed bufferbloat issue, and might damage the operation of transmission control protocol. The default queue management scheme, DropTail, in such routers just drops packets if queue is full while the others in literature are mostly based on one-loop feedback control where an optimal point of performance between queue length and drop rate is limited. In this paper, we study the proble
APA, Harvard, Vancouver, ISO, and other styles
17

JESSHOPE, CHRIS. "LATENCY REDUCTION IN VLSI ROUTERS." Parallel Processing Letters 03, no. 04 (December 1993): 485–94. http://dx.doi.org/10.1142/s0129626493000502.

Full text
Abstract:
This paper presents recent results on the MP1 router chip designed to implement scalable parallel computers. We survey design considerations used in order to reduce message delivery latency to a minimum. Results will be presented of simulations of the MP1 network which back up these considerations. It will be shown that there are many degrees of freedom in implementation and that implementation issues will often overwhelm other considerations, those on which simulation is focused, leading to anomalous predictions from those results. An example will be given on this. Even ultra-low latency netw
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Min, and Chiu-Sing Choy. "Low-Cost Allocator Implementations for Networks-on-Chip Routers." VLSI Design 2009 (March 15, 2009): 1–10. http://dx.doi.org/10.1155/2009/415646.

Full text
Abstract:
Cost-effective Networks-on-Chip (NoCs) routers are important for future SoCs and embedded devices. Implementation results show that the generic virtual channel allocator (VA) and the generic switch allocator (SA) of a router consume large amount of area and power. In this paper, after a careful study of the working principle of a VA and the utilization statistics of its arbiters, opportunities to simplify the generic VA are identified. Then, the deadlock problem for a combined switch and virtual channel allocator (SVA) is studied. Next, the impact of the VA simplification on the router critica
APA, Harvard, Vancouver, ISO, and other styles
19

Supraja, Dr P., Anas A. Salameh, Dr Varadaraju H R, Dr M. Anand, and Unggul Priyadi. "An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 3 (December 23, 2022): 36–46. http://dx.doi.org/10.17762/ijcnis.v14i3.5569.

Full text
Abstract:
Wireless networks, particularly Wireless Mesh Networks (WMNs), are undergoing a significant change as a result of wireless technology advancements and the Internet's rapid expansion. Mesh routers, which have limited mobility and serve as the foundation of WMN, are made up of mesh clients and form the core of WMNs. Mesh clients can with mesh routers to create a client mesh network. Mesh clients can be either stationary or mobile. To properly utilise the network resources of WMNs, a topology must be designed that provides the best client coverage and network connectivity. Finding the ideal answe
APA, Harvard, Vancouver, ISO, and other styles
20

Sakamoto, Shinji, Algenti Lala, Tetsuya Oda, Vladi Kolici, Leonard Barolli, and Fatos Xhafa. "Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks." International Journal of Mobile Computing and Multimedia Communications 6, no. 2 (April 2014): 13–21. http://dx.doi.org/10.4018/ijmcmc.2014040102.

Full text
Abstract:
One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost-efficient broadband connectivity. In WMNs, there are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, the authors consider the router node placement problem in WMNs. The objective is to find the optimal distribution of router nodes in order to provide the best network connectivity (the maximal number of connected routers) and coverage (maximal number of covered clients). The authors apply their proposed WMN-SA simulat
APA, Harvard, Vancouver, ISO, and other styles
21

Zhixun, Liang, Xu Chuanpei, Bi Lvqing, Shi Yunying, Yi Yunfei, and Hu Cong. "Modeling and Performance Analysis of a Fault-Tolerant 3D Photonic Network-on-Chip Based on Hybrid Photonics–Plasmonics." Computational Intelligence and Neuroscience 2022 (July 19, 2022): 1–24. http://dx.doi.org/10.1155/2022/9615610.

Full text
Abstract:
The performance of electro-optic modulators and optical routers and their routing algorithms are the key factors affecting the performance of networks on optical chips. This paper improves the mesh 3-dimensional photonic network-on-chip (3D-PNoC) topology. An SPP hybrid silicon-based electro-optic modulator and an improved fault-tolerant SPP router are used to improve the performance of the network on an optical chip. SPP switching and SPP MRR are combined to form a fault-tolerant SPP router. On this basis, an improved genetic optimization routing algorithm is implemented on the improved mesh
APA, Harvard, Vancouver, ISO, and other styles
22

MERKLE, DANIEL, MARTIN MIDDENDORF, and ALEXANDER SCHEIDLER. "DECENTRALIZED PACKET CLUSTERING IN ROUTER-BASED NETWORKS." International Journal of Foundations of Computer Science 16, no. 02 (April 2005): 321–41. http://dx.doi.org/10.1142/s0129054105003017.

Full text
Abstract:
Different types of decentralized clustering problems have been studied so far for networks and multi-agent systems. In this paper we introduce a new type of a decentralized clustering problem for networks. The so called Decentralized Packet Clustering (DPC) problem is to find for packets that are sent around in a network a clustering. This clustering has to be done by the routers using only few computational power and only a small amount of memory. No direct information transfer between the routers is allowed. We investigate the behavior of new a type of decentralized k-means algorithm — calle
APA, Harvard, Vancouver, ISO, and other styles
23

Zhuang, Hongbin, Jou-Ming Chang, Xiao-Yan Li, Fangying Song, and Qinying Lin. "All-to-All Broadcast Algorithm in Galaxyfly Networks." Mathematics 11, no. 11 (May 26, 2023): 2459. http://dx.doi.org/10.3390/math11112459.

Full text
Abstract:
The design of interconnection networks is a fundamental aspect of high-performance computing (HPC) systems. Among the available topologies, the Galaxyfly network stands out as a low-diameter and flexible-radix network for HPC applications. Given the paramount importance of collective communication in HPC performance, in this paper, we present two different all-to-all broadcast algorithms for the Galaxyfly network, which adhere to the supernode-first rule and the router-first rule, respectively. Our performance evaluation validates their effectiveness and shows that the first algorithm has a hi
APA, Harvard, Vancouver, ISO, and other styles
24

Turovsky, Oleksandr, Andrii Zakharzhevskyi, Anatoliy Makarenko, and Larysa Dakova. "Construction of a simulated dynamic model of data packet routing on a telecommunication network fragment." Eastern-European Journal of Enterprise Technologies 5, no. 9 (125) (October 31, 2023): 45–52. http://dx.doi.org/10.15587/1729-4061.2023.287677.

Full text
Abstract:
The object of the current research is the process of routing data packets in a telecommunications network. It was established that the state and parameters of data transmission channels and routers could have a negative impact and need to be taken into account in the process of modeling the routing of data packets in telecommunication networks. A model of simulated dynamic modeling of data packet routing in telecommunication networks has been devised and proposed. The suggested model makes it possible to establish quantitative values of the delay time of processing data packets during their ro
APA, Harvard, Vancouver, ISO, and other styles
25

Baumgartner, Florian, Torsten Braun, Eveline Kurt, and Attila Weyland. "Virtual routers." ACM SIGCOMM Computer Communication Review 33, no. 3 (July 2003): 127–35. http://dx.doi.org/10.1145/956993.957008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kulkarni, Raghavendra, and Kalpana Sharma. "A Routing Algorithm with Sdn Controller Using Policy-Based Routing (PBR)." ECS Transactions 107, no. 1 (April 24, 2022): 12661–70. http://dx.doi.org/10.1149/10701.12661ecst.

Full text
Abstract:
Software defined networking (SDN) is a modern computer network architecture in which the control plane is separated from the data plane and applied centrally. SDN use in businesses necessitates the replacement of legacy network infrastructure, which comes at a high cost to the business. The phased rollout of SDN in the form of hybrid networks is the solution to this issue. Legacy devices' control planes must communicate with the SDN controller in hybrid networks. This connectivity facilitates the use of SDN in hybrid networks. Policy-based routing (PBR) is a mechanism in legacy networks that m
APA, Harvard, Vancouver, ISO, and other styles
27

Louati, W., and D. Zeghlache. "Network-based virtual personal overlay networks using programmable virtual routers." IEEE Communications Magazine 43, no. 8 (August 2005): 86–94. http://dx.doi.org/10.1109/mcom.2005.1497558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Suvorova, Elena, Yuriy Sheynin, and Nadezhda Matveeva. "Quality of Service in Embedded Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 77–98. http://dx.doi.org/10.4018/ijertcs.2014100104.

Full text
Abstract:
Embedded systems are widely used in many fields, from space industry to medicine. In this paper we consider Quality of Service (QoS) in embedded networks. Different QoS are analyzed. The authors consider three structures and implementations of the network layer for providing QoS, compare their implementation characteristics and evaluate hardware costs. They consider QoS mechanisms support in modern space network protocols, possibility of using them in embedded networks. Hardware costs are one of the main constraints for embedded networks. Therefore hardware costs of basic routers with these Qo
APA, Harvard, Vancouver, ISO, and other styles
29

AL Khawaldah, Ibrahim Ismail Abdelhadi. "The task of managing flows in a communication network of the X.25 protocol." Journal of Advanced Sciences and Engineering Technologies 3, no. 2 (October 10, 2020): 20–36. http://dx.doi.org/10.32441/jaset.03.02.03.

Full text
Abstract:
One of the most established and well-known standards for packet switched networks are the international standard X.25, The X.25 Recommendation defines the interface requirements between the user equipment (such as a terminal, bridge, router, and computer) and a packet switching network for data exchange X.25 network provides an efficient way to transfer data within one region, the country and even all over the world. The synchronous data transfer with a speed of up to 64 Kbps. The X.25 standards provides automatic error detection and correction, which allows X.25 networks to work effectively e
APA, Harvard, Vancouver, ISO, and other styles
30

Decasper, Dan, Zubin Dittia, Guru Parulkar, and Bernhard Plattner. "Router plugins: a software architecture for next generation routers." ACM SIGCOMM Computer Communication Review 28, no. 4 (October 1998): 229–40. http://dx.doi.org/10.1145/285243.285285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rivera Torres, Pedro J., Carlos Gershenson García, and Samir Kanaan Izquierdo. "Fault Detection and Isolation in Smart-Grid Networks of Intelligent Power Routers Modeled as Probabilistic Boolean Networks." Complexity 2023 (December 14, 2023): 1–12. http://dx.doi.org/10.1155/2023/6690805.

Full text
Abstract:
A self-organizing complex-network modeling method, probabilistic Boolean networks, is presented as a model-based diagnostic system for detecting and isolating different types of faults, failures, and modes of operation in which a network of intelligent power routers is deployed over a standard power test case: the Western System Coordinating Council 9 Bus System. Such a system allows designers and engineering professionals to make educated decisions pertaining to the design of smart-grid systems endowed with intelligent power routers. There is a recurrent necessity to design reliable and fault
APA, Harvard, Vancouver, ISO, and other styles
32

Beshley, Mykola, Natalia Kryvinska, Halyna Beshley, Oleg Yaremko, and Julia Pyrih. "Virtual Router Design and Modeling for Future Networks with QoS Guarantees." Electronics 10, no. 10 (May 11, 2021): 1139. http://dx.doi.org/10.3390/electronics10101139.

Full text
Abstract:
A virtual router model with a static and dynamic resource reconfiguration for future internet networking was developed. This technique allows us to create efficient virtual devices with optimal parameters (queue length, queue overflow management discipline, number of serving devices, mode of serving devices) to ensure the required level of quality of service (QoS). An analytical model of a network device with virtual routers is proposed. By means of the mentioned mathematical representation, it is possible to determine the main parameters of the virtual queue system, which are based on the fir
APA, Harvard, Vancouver, ISO, and other styles
33

Lemeshko, Oleksandr, Oleksandra Yeremenko, and Olena Nevzorova. "Hierarchical Method of Inter-Area Fast Rerouting." Transport and Telecommunication Journal 18, no. 2 (June 1, 2017): 155–67. http://dx.doi.org/10.1515/ttj-2017-0015.

Full text
Abstract:
Abstract In this paper, in order to increase the scalability and fault-tolerance of routing solutions the hierarchical method of inter-area fast rerouting in communication networks was presented. The method is based on the decomposed representation of the flow-based routing model with the introduction of the area interaction conditions to ensure connectivity of the inter-area routes. The model includes conditions for border routers protection, adapted for both single path and multipath routing. During the research it was established that the efficiency of the proposed method in terms of the sp
APA, Harvard, Vancouver, ISO, and other styles
34

SHANKER, O., and TAD HOGG. "EPIDEMIOLOGY MODEL ON SHORTCUT AND SMALL WORLD NETWORKS." Modern Physics Letters B 23, no. 10 (April 20, 2009): 1249–62. http://dx.doi.org/10.1142/s0217984909019387.

Full text
Abstract:
We show that the behavior of an epidemiology model depends sensitively on the shortcut density in the shortcut network. This is consistent with an earlier work on other processes on the shortcut network. We analytically study the reason for the sensitivity. The shortcut network is similar to the small world network, and it has the advantage that the model dependence on the shortcut density can be analytically studied. The model would be relevant to the spread of diseases in human, animal, plant or other populations, to the spread of viruses in computer networks, or to the spread of social cont
APA, Harvard, Vancouver, ISO, and other styles
35

HU, WEI, TIANZHOU CHEN, QINGSONG SHI, and SHA LIU. "CRITICAL-PATH DRIVEN ROUTERS FOR ON-CHIP NETWORKS." Journal of Circuits, Systems and Computers 19, no. 07 (November 2010): 1543–57. http://dx.doi.org/10.1142/s021812661000689x.

Full text
Abstract:
Multithreaded programming has become the dominant paradigm in computer architecture, mainly in the form of multi-core processors. The performance bottleneck of a multithreaded program is its critical path, whose length is its total execution time. As the number of cores within a processor increases, Network-on-Chip (NoC) has been proposed as a promising approach for inter-core communication. In order to optimize the performance of a multithreaded program running on an NoC based multi-core platform, we design and implement the critical-path driven router, which prioritizes inter-thread communic
APA, Harvard, Vancouver, ISO, and other styles
36

Alanezi, Mohammed A., Houssem R. E. H. Bouchekara, and Muhammad S. Javaid. "Optimizing Router Placement of Indoor Wireless Sensor Networks in Smart Buildings for IoT Applications." Sensors 20, no. 21 (October 30, 2020): 6212. http://dx.doi.org/10.3390/s20216212.

Full text
Abstract:
Internet of Things (IoT) is characterized by a system of interconnected devices capable of communicating with each other to carry out specific useful tasks. The connection between these devices is ensured by routers distributed in a network. Optimizing the placement of these routers in a distributed wireless sensor network (WSN) in a smart building is a tedious task. Computer-Aided Design (CAD) programs and software can simplify this task since they provide a robust and efficient tool. At the same time, experienced engineers from different backgrounds must play a prominent role in the abovemen
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Qi, Yiming Ouyang, Zhengfeng Huang, and Huaguo Liang. "Workload-Aware WiNoC Design with Intelligent Reconfigurable Wireless Interface." Security and Communication Networks 2023 (May 9, 2023): 1–14. http://dx.doi.org/10.1155/2023/9519044.

Full text
Abstract:
By introducing wireless interfaces in conventional wired routers or hubs, wireless network-on-chip (WiNoC) is proposed to relieve congestion pressure from high volume inter-subnet data transmission. Generally, processing elements on chip receive input data and return feedback through network interface, and data transmission function in Network-on-Chip (NoC) is completed by routers. Hubs equipped with wireless interface are fixed to certain wired routers. While wireless channels may not be fully utilized due to unbalanced workload and constant hub-router connection, e.g., certain nodes processi
APA, Harvard, Vancouver, ISO, and other styles
38

Karbowski, Andrzej. "PARALLEL ALGORITHMS FOR MULTICORE ROUTERS IN LARGE COMPUTER NETWORKS – A REVIEW." IFAC Proceedings Volumes 40, no. 9 (2007): 298–303. http://dx.doi.org/10.3182/20070723-3-pl-2917.00048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Andara, Andi, Setyawan Widyarto, and Rusdah. "Development of Web-Based Network Automation Applications Using the Kano Method and Paramiko Library to Simplify the Configuration of Multivendor Network Devices at PT. Digital Vision Nusantara." International Journal of Science and Society 5, no. 5 (December 6, 2023): 976–92. http://dx.doi.org/10.54783/ijsoc.v5i5.965.

Full text
Abstract:
Computer network is never separated with configuration which is the main task which has to be done in order to make it work. As we know, to configure some devices either server, switch, or router has several methods if we understand how we communicate with the system. Configuration on routers and switches is currently still conventionally done, which means that to configure routers or switches one by one. This is very inefficient, because if the routers and switches that you want to configure are carried out in hundreds or many routers, then the time required by a network administrator is very
APA, Harvard, Vancouver, ISO, and other styles
40

LI, DAWEI, JIE WU, DAJIN WANG, and JIAYIN WANG. "Software-Defined Networking Switches for Fast Single-Link Failure Recovery." Journal of Interconnection Networks 18, no. 04 (December 2018): 1850014. http://dx.doi.org/10.1142/s0219265918500147.

Full text
Abstract:
In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through pre-configured IP tunnels), which will deliver the affected traffic to its destination without using the failed link. The goal of the approach is to achieve faster failure recovery than traditional routing protocols that employ reactive computing upon link failures. Software-Defined Networking (SDN) switches can se
APA, Harvard, Vancouver, ISO, and other styles
41

DURRESI, ARJAN, VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, and S. S. IYENGAR. "EFFICIENT AND SECURE AUTONOMOUS SYSTEM BASED TRACEBACK." Journal of Interconnection Networks 05, no. 02 (June 2004): 151–64. http://dx.doi.org/10.1142/s0219265904001076.

Full text
Abstract:
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim results with an approximate location of the attacker. Reconstruction of the whole path is also very difficult due to the sheer size of the Internet. This paper presents lightwei
APA, Harvard, Vancouver, ISO, and other styles
42

Suvorova, Elena, Yuriy Sheynin, and Nadezhda Matveeva. "Fault Mitigation in Reconfigurable NoC Routers with Thin Design Rules." International Journal of Embedded and Real-Time Communication Systems 6, no. 1 (January 2015): 28–46. http://dx.doi.org/10.4018/ijertcs.2015010102.

Full text
Abstract:
Modern networks-on-chip (NoC) for embedded systems are manufactured by thin design rules; they should be resistant to failures due to the specific aspects of the technology. In the paper we consider failure mitigation approaches, evaluate them for thin design rules. Most fault mitigation approaches are based on reconfiguration of NoC and its main components – routers. We suggest the methodology for development of reconfigurable routers with fault mitigation, estimate them using simulation that enables dynamic failure injection. The proposed method can be used for routers with different structu
APA, Harvard, Vancouver, ISO, and other styles
43

Ghani, Rana Fareed, and Laith Al-Jobouri. "Packet Loss Optimization in Router Forwarding Tasks Based on the Particle Swarm Algorithm." Electronics 12, no. 2 (January 16, 2023): 462. http://dx.doi.org/10.3390/electronics12020462.

Full text
Abstract:
Software-defined networks (SDNs) are computer networks where parameters and devices are configured by software. Recently, artificial intelligence aspects have been used for SDN programs for various applications, including packet classification and forwarding according to the quality of service (QoS) requirements. The main problem is that when packets from different applications pass through computer networks, they have different QoS criteria. To meet the requirements of packets, routers classify these packets, add them to multiple weighting queue systems, and forward them according to their pr
APA, Harvard, Vancouver, ISO, and other styles
44

Baskoro, Andri Nuki, Anton Anton, and Puji Astuti. "DESIGNING A ROUTER REDUCTION SYSTEM USING HOT STANDBY ROUTER PROTOCOL METHOD FOR BACKUP LINK IN DITJEN PPKL." Jurnal Techno Nusa Mandiri 17, no. 2 (September 15, 2020): 117–22. http://dx.doi.org/10.33480/techno.v17i2.1643.

Full text
Abstract:
Computer networks play an important role in data communication at companies or government institutions to support them in terms of work. In this case, the authors conducted observational research and direct interviews with IT staff at the Ditjen PPKL Control about how the network operates in that place. Routers have a very important role in data communication and connecting different networks, so a router reduction system is needed as a solution to minimize failures on the network or these devices. The network topology in each office or government agency is different, which makes the problems
APA, Harvard, Vancouver, ISO, and other styles
45

Ding, Shichang, Fan Zhao, and Xiangyang Luo. "A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers." Security and Communication Networks 2021 (January 11, 2021): 1–11. http://dx.doi.org/10.1155/2021/6658642.

Full text
Abstract:
The geographical locations of smart devices can help in providing authentication information between multimedia content providers and users in 5G networks. The IP geolocation methods can help in estimating the geographical location of these smart devices. The two key assumptions of existing IP geolocation methods are as follows: (1) the smallest relative delay comes from the nearest host; (2) the distance between hosts which share the closest common routers is smaller than others. However, the two assumptions are not always true in weakly connected networks, which may affect accuracy. We propo
APA, Harvard, Vancouver, ISO, and other styles
46

Riyadi, Slamet, and Ade Surya Budiman. "Perencanaan Pembangunan WAN Menggunakan EIGRP Dynamic Routing." Jurnal Sisfokom (Sistem Informasi dan Komputer) 9, no. 3 (August 25, 2020): 296. http://dx.doi.org/10.32736/sisfokom.v9i3.779.

Full text
Abstract:
The development of company's business area will have implications for the development of computer network infrastructure as a means of exchanging data and information between regions. As a company that continues to develop its business area, PT. Timur Raya Lestari requires a computer network infrastructure that is adaptive to the development of the number of branch offices. The company's computer network currently uses the Static Routing method in determining the interconnection path between Routers connecting the head office and branch offices. The development of a dynamic company must be acc
APA, Harvard, Vancouver, ISO, and other styles
47

Anand, Ashok, Archit Gupta, Aditya Akella, Srinivasan Seshan, and Scott Shenker. "Packet caches on routers." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 219–30. http://dx.doi.org/10.1145/1402946.1402984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Malone, David. "Counting 6to4 relay routers." ACM SIGCOMM Computer Communication Review 36, no. 1 (January 10, 2006): 79–82. http://dx.doi.org/10.1145/1111322.1111340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cheong, Se-Hang, Yain-Whar Si, and Leong-Hou U. "Saving lives: design and implementation of lifeline emergency ad hoc network." International Journal of Pervasive Computing and Communications 14, no. 2 (June 4, 2018): 90–110. http://dx.doi.org/10.1108/ijpcc-d-18-00001.

Full text
Abstract:
Purpose This paper aims to propose a system for automatically forming ad hoc networks using mobile phones and battery-powered wireless routers for emergency situations. The system also provides functions to send emergency messages and identify the location of victims based on the network topology information. Design/methodology/approach Optimized link state routing protocol is used to instantly form an ad hoc emergency network based on WiFi signals from mobile phones of the victims, backup battery-powered wireless routers preinstalled in buildings and mobile devices deployed by search and resc
APA, Harvard, Vancouver, ISO, and other styles
50

Alhisnawi, Mohammad, and Aladdin Abdulhassan. "Designing Cuckoo Based Pending Interest Table for CCN Networks." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 07 (April 9, 2021): 140. http://dx.doi.org/10.3991/ijim.v15i07.21149.

Full text
Abstract:
<p class="JESTECAbstract">Content Centric Networking (CCN) is a modern architecture that got wide attention in the current researches as a substitutional for the current IP-based architecture. Many studies have been investigated on this novel architecture but only little of them focused on Pending Interest Table (PIT) which is very important component in every CCN router. PIT has fundamental role in packet processing in both upstream process (Interest packets) and downstream process (Data packets). PIT must be fast enough in order to not become an obstruction in the packet processing and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!