Results 31 to 40 of about 3,896 (237)
RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached.
Nuur Wachid Abdul Majid, Syifaul Fuada
doaj +1 more source
Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology
This article is devoted to the problem of information security in complexes with unmanned aerial vehicles (UAV). Science knows a new promising method of information protection: moving target defense (MTD).
Vitaly Pikov +2 more
doaj +1 more source
Evaluation of Computer Network Simulation Applications to Support Online Learning
Computer network learning is learning that prioritizes practice compared to theory to be able to understand the material more clearly. Therefore, computer network learning requires real learning media to support learning effectiveness.
Ismoyo Putro +2 more
doaj +1 more source
The deployment of routing protocols in distributed control plane of SDN. [PDF]
Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability.
Jingjing Z +4 more
europepmc +2 more sources
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6‐DDoS attack detection mechanisms rely on self‐created datasets because very few suitable ICMPv6‐DDoS attack datasets are publicly available due to privacy and security ...
Selvakumar Manickam +7 more
wiley +1 more source
In network world, due to shortage of IP addresses in version 4, a new version of IP address, namely IPv6, has come into play, but due to non-exchange ability between IPv4 and IPv6, different routing protocol is come to play for IPv6 that is RIPng ...
Allah Bachayo Brohi +2 more
doaj +1 more source
Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review
Developing specialized cloud‐based and open‐source testbeds is a practical approach to investigate network slicing functionalities in the fifth‐generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost‐efficient and small‐scale testbeds that partially or fully deploy network slicing.
Ali Esmaeily +2 more
wiley +1 more source
Analysis of Different Types of Network Attacks on the GNS3 Platform
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj +1 more source
The Arabidopsis thaliana N-recognin E3 ligase PROTEOLYSIS1 influences the immune response. [PDF]
Abstract N‐degron pathways of ubiquitin‐mediated proteolysis (formerly known as the N‐end rule pathway) control the stability of substrate proteins dependent on the amino‐terminal (Nt) residue. Unlike yeast or mammalian N‐recognin E3 ligases, which each recognize several different classes of Nt residues, in Arabidopsis thaliana, N‐recognin functions of
Till CJ +9 more
europepmc +2 more sources
Usually in studying the practice of computer networks, it is encountered several obstacles such as (1) limited computer networks design tools, (2) limited learning time to design computer networks and (3) technical difficulties for finding the solutions ...
Liska Mey Ika Sari +3 more
doaj +1 more source

