Results 81 to 90 of about 15,889 (249)

Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning

open access: yesIET Communications, Volume 18, Issue 13, Page 759-777, August 2024.
Software‐defined networking is utilized with the OpenFlow protocol and Ryu control to optimize broadband and enhance attack detection using neural networks. The proposed system was evaluated using a 5G dataset, and the results demonstrated an accuracy of 99%, surpassing the results of four previous articles.
Mohammed Salah Abood   +10 more
wiley   +1 more source

Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]

open access: yes, 2012
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core  

Intelligent Optimization of OSPF Path Selection Using Machine Learning Models for Adaptive Network Routing

open access: yesKurdistan Journal of Applied Research
At the core of enterprise networks lies routing protocols that make forwarding decisions based on a set of rules and metrics. One of the most popular and widely used routing protocols is the Open Shortest Path First (OSPF).
Rebeen Rebwar Hama Amin
doaj   +1 more source

Engineering wired network performance enhancement in a route redistributed simulation based systems [PDF]

open access: yesBig Data and Computing Visions
As organizations keep expanding every day, there is a rapidly increasing need for communication networks to share routing information amongst the different routing protocols reliably.
Aniekan Ikpe, Imoh Ekanem
doaj   +1 more source

Targeting of chromatin readers: a novel strategy used by the Shigella flexneri virulence effector OspF to reprogram transcription

open access: yesMicrobial Cell, 2014
Shigella flexneri, a gram-negative bacterium responsible of bacillary dysentery, uses multiple strategies to overcome host immune defense. We have decrypted how this bacterium manipulates host-cell chromatin binders to take control of immune gene ...
Habiba Harouz   +4 more
doaj   +1 more source

Design and implementation of OSPF vulnerability analysis and detection system

open access: yesTongxin xuebao, 2013
A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model ...
Zun-ying QIN   +3 more
doaj   +2 more sources

OSPF Cheatsheet

open access: yes
This document provides a clear and complete OSPF cheatsheet designed for CCNA learners.It summarizes key OSPF concepts including area types, router and network types, neighbor adjacency states, LSDB components, and route-type distinctions.The sheet also covers configuration commands, network statements, default routes, and summarization methods useful ...
openaire   +1 more source

Open shortest path first (OSPF) routing protocol simulation [PDF]

open access: bronze, 1993
Deepinder P. Sidhu   +4 more
openalex   +1 more source

دراسة وتطوير نموذج شبكة هجينة مُعرَّفة برمجياً لتحسين أداء الشَّبكة التَّقليديَّة

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2022
تُساعِد الشَّبكات الهجينة المُعرَّفة برمجياً على الانتقال من الشَّبكات التَّقليديَّة إلى الشَّبكات المُعرَّفة برمجياً إذ تُعتبَر مرحلة انتقاليَّة ضروريَّة وحتميَّة. وذلك بهدف الوصول إلى شبكات مُعرَّفة برمجيَّاً لما تُقدِمَه من خدمات مثل قابليَّة البرمجة
م. محمد الشَّمري   +2 more
doaj  

Home - About - Disclaimer - Privacy