Results 11 to 20 of about 422 (167)
Badanie możliwości i ograniczeń zarządzania ruchem sieciowym z wykorzystaniem protokołu MPLS we współczesnych sieciach teleinformatycznych [PDF]
W artykule przedstawiono technologię MPLS (ang. MultiProtocol Label Switching), która reprezentuje nowy poziom w rozwoju standardów wykorzystywanych w połączeniach technologii przełączania warstwy drugiej modelu odniesienia ISO/OSI z technologią routingu
Dariusz Chaładyniak, Maciej Podsiadły
doaj +1 more source
DiffServ Aware MPLS Traffic Engineering for ISP Networks: State of the Art and New Trends
In the recent ten years, with the development of new applications through Internet such as multimedia or networked control applications, users need more and more quality of service (QoS).
Armand Toguyéni, Ouajd Korbaa
doaj +1 more source
QUALITY OF SERVICES IN MPLS NETWORKS [PDF]
As traffic networks have become increasingly complex, there has been a need to migrate from circuits to packet-based networks. MPLS is a promising solution for the growing number of applications that require different QoS treatments that share the same ...
ȚURCANU, Dinu
doaj +1 more source
Performance evaluation of software‐defined wide area network based on queueing theory
Abstract Software‐defined wide area network (SD‐WAN) is part of wider technologies of software‐defined networking (SDN). SDN is one of the pivotal network management approaches that abstracts the underlying network infrastructure away from its applications. SDN allows for the centralisation of network intelligence. That allows higher network automation,
Samaa Adel Ibrahim Hussein+2 more
wiley +1 more source
Mathematical model for forwarding packets in communication network
Abstract The software‐defined networking (SDN) represents the future backbone of the Internet. In general, to understand the performance and the limitation of SDN is a prerequisite for deploying these networks and making the most of their resources. For achieving that goal, this paper discusses the difference between traditional networks and SDN over ...
Samaa A. I. Hussein+2 more
wiley +1 more source
A Low‐Overhead and High‐Precision Attack Traceback Scheme with Combination Bloom Filters
Distributed denial of service attacks seriously threatens the availability of highly resilient software‐defined networking systems, such as data center networks. A traceback scheme is an effective means of mitigating attacks by identifying the location of the attacker and the attacking path.
Jie Ma+4 more
wiley +1 more source
Smart Speech Recognition System for Chinese Language Learning Enhancement
With the expansion of teaching scale and the rapid development of educational information, a smart classroom management system based on speech recognition has been proposed and developed to improve the information level of smart classroom management. This paper discusses the application of multimedia equipment control.
Lijun Hu, Jing Jia, Lianhui Li
wiley +1 more source
By combining virtual reality, the digital twin system has been deeply applied in many places. Especially with the upsurge of national sports and more attention to sports, people have also begun a more in‐depth study on the strategy of sports training. This paper aims to explore the application of the Brazilian jujitsu training strategy and interactive ...
Zheyu He, Xi He, Rahim Khan
wiley +1 more source
The Internet of Things (IoT) has impacted various aspects of life, but its profound effects on the health sector are particularly striking because of its cutting‐edge nature. Mobile computing characteristics enable IoT to play a more important role when used with mobile computing.
Eshrag Refaee+7 more
wiley +1 more source
[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System
In recent years, the risk of malicious attacks on power monitoring systems has increased, and there have been many attacks on power systems in the world. Aiming at the network interconnection security problem of the core control system, the concept of “security buffer” is introduced, and a network security buffer method forpower monitoring system is ...
Jifeng Wang+5 more
wiley +1 more source