نتایج جستجو برای: computer network
تعداد نتایج: 1172168 فیلتر نتایج به سال:
The protection of network infrastructure and services is one of the main issues network managers face today. This paper investigates this matter through the study of network resilience. A resilience factor (RF) is proposed to take into account topological aspects of the network and also the amount of traffic losses under stress conditions. The proposed factor is evaluated using a real network b...
ion Abstraction is a common approach to improving simulator performance. All simulators adopt some level of abstraction when choosing what to simulate. FlowSim was the first network simulator to make this trade-off explicit.7 Ns supports several levels of abstraction. Numerous simulation interfaces are possible, including programming in a high-level scripting language, a more traditional system...
J.P.M. Schalkwijk The author is with the Department of Electrical Engineering, Technological University of Eindhoven, Eindhoven, The Netherlands. In this paper we describe a coding strategy for memory less duplex channels that allows each station in turn to transmit at a rate approaching channel capacity, and with a performance corresponding to that of a R=! systematic (convolutional) code.
Interconnection network is a decisive component of parallel and distributed computer systems. With the merits of simplicity and eeciency, 2-dimensional (2-D) mesh has been a popular choice of large MIMD interconnection networks. Mesh, however, has its known weaknesses in scalability and connectivity. Packed Exponential Connections (PEC) is a newly proposed network which is designed to improve t...
This paper describes an application of FRL to the monitoring of a large computer network. The design utilizes frame models for the network domain and a general graphics system, and a method for coupling the two domains by analogy creation and maintenance. We also explore the use of heuristics to control the selection of viewable descriptions, at their various abstraction levels and sizes. An ul...
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities) while remaining realistic from the attacker’s point of view. The foundation for the simulator is a model of computer intrusions, based on the analysis of real world attacks. In particular we show how to interpret vul...
In the computer field, network security is a crucial integrant. It necessary to pay attention on application of virtual technology, so as raise standard new level [2]. view this, this paper will analyze technology in and propose some strategies for future reference.
Because of the growing number apps that use client servers, both desktop and WEB applications, each user must learn a large ids passwords, because application requires authentication in order to it for security reasons. Furthermore, development network media, wired wireless, is accelerating. In scenarios stated above, RADIUS (Remote Authentication Dial-In User Service) technology required since...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید