64   Artículos

 
en línea
Mengchi Xing, Haojiang Deng and Rui Han    
The 5G core network adopts a Control and User Plane Separation (CUPS) architecture to meet the challenges of low-latency business requirements. In this architecture, a balance between management costs and User Experience (UE) is achieved by moving User P... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Morteza Biabani, Nasser Yazdani and Hossein Fotouhi    
Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability and ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry    
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jabeom Gu, Miryong Park, Seungsik Lee, Hoyong Kang and Bugi Kim    
IoT networks on large ships are known to face challenges, such as severe signal attenuation due to the complex steel bulkhead structure inside the ship. However, reliable connectivity is still required to monitor critical facilities such as engine rooms.... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Zhenyu Tian, Jiali You and Linlin Hu    
Network layer multicast is a powerful method for transmitting data from sources to multiple group members. When joining a multicast group, a group member first sends a request to a designated router (DR). Then, the DR selects a node in the existing multi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Andi Nugroho,Sahril Dian Ashapi     Pág. 94 - 101
The availability of a network becomes the main thing to keep in mind, techniques, exchange of information quickly and accurately takes a good stability of the network connection. Therefore, created a variety of methods to find out the best path towards a... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Pekka Pääkkönen, Jere Backman, Daniel Pakkala, Jori Paananen, Kari Seppänen and Kimmo Ahola    
System and method for continuously improving or adapting multi-access router path selection of autonomous moving vehicles in changing environments.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M     Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Yingjie Duan, Hong Ni, Xiaoyong Zhu and Xu Wang    
Information-centric networking (ICN) is expected to be a candidate for future internet architecture, and it supports features such as multicast that improves bandwidth utilization and transmission efficiency. However, multicast itself does not provide co... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »