Computer Networking
22,624 Followers
Recent papers in Computer Networking
Access Control Lists (ACLs) represent a traditional way in filtering packets in routers. In modern complex enterprise networks that provide a vast array of services, there is an ever increasing need for verifying the integrity of ACLs to... more
A determinação dos mecanismos básicos e dos critérios de implantação de um pacote de software de rede num sistema operacional específico é apresentada em detalhe. Em seguida, são analisadas alternativas de arquitetura de rede susceptíveis... more
Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio... more
Social networking pages authenticate by blockchain technology, through authenticating personal information and profile pages in the form of block and then distributing them with Blockchain to become a trusted reference point. To... more
The drastic development of the World Wide Web in the recent times has made the concept of Web Crawling receive remarkable significance. The voluminous amounts of web documents swarming the web have posed huge challenges to the web search... more
Very Detailed Hardware and Networking PPT for Students
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could base... more
Basic config of Cisco 881 router
The OSI model, developed by ISO in 1984, attempts to summarize complicated network cases on layers. Moreover, network troubles are expressed by taking the model into account. However, there has been no standardization for network troubles... more
This paper considers a computation method for accepting data about the present status of a motor, and then controlling it to move in a specific direction, up to a specific limit using the CANopen communication protocol. The investigation... more
Rrugezimi dhe Protokollet
The development in technologies the mobile networks has been changed rapidly, especially Mobile Ad-hoc and Vehicular Ad-Hoc networks. Due to nature of the fields, the mobile sensor network replaced the fixed sensor network. In these... more
UNIX memiliki tujuan dalam Computer Networking, maka kemampuan dari UNIX dalam memberikan jasa internet lebih berkembang dan lebih reliable. Banyak orang mengatakan bahwa bernetwork ria dengan UNIX lebih cepat dibandingkan dengan sistem... more
Since the introduction of Automated Teller Machines (ATMs) in Nigeria, cash handling has really reduced especially for those who live in the city and have easy access to ATM machines by means of their ATM cards. People no longer see the... more
Cloud computing is a present and future of the Technology (IT), to enhance the capacity of Information dynamically without investing capital for new infrastructure, training new personnel or licensing new software. With extending the IT's... more
INDUSTRIAL TRAINING REPORTS
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it... more
This paper treats the problem of authentication through the multi-hop communication, authorization to services access, and efficient collaboration between ad hoc nodes in order to assure efficient packet relaying during services access,... more
This network design assignment is of great help to the organization in their endeavor for designing and execution of a comprehensive and advanced network design system.
This document applies to the MikroTik RouterOS V2.6
Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency... more
Documento referente a la teoría de flujos (Streams) en Java para lograr la comunicación entre procesos. El principal objetivo de este paper es explicar el uso, funcionamiento el implementación de los flujos de entrada y salida en Java,... more
This article help you to learn about basic networking devices, IP administration, IP V4, IP v6, routing, and about Internet of Things.
All types of network fundamentals.
International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html New Issue: January 2020, Volume 12, Number 1 --- Table... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more
International Journal of VLSI design & Communication Systems (VLSICS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of VLSI Design & Communications. The goal of this... more
Perhatikan perbedaan dalam menunjukkan lokasi sebuah file : D:\Folder\tempat menyimpan\file.txt >>di Windows /Folder/tempat menyimpan/file.txt >> di Linux
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more
1.Pendahuluan 2. Definisi Internet 3. Sekilas tentang jaringan komputer 4. Sejarah Internet 5. Keuntungan dan Kerugian penggunaan internet 6. Mode Pengalamatan Internet 7. URL dan Domain 8. Konektivitas ke Internet 9. Aplikasi Layanan... more
Content found picture recovery (CBIR) proposed a productive approach to investigate the pictures from bigger database. The preprocessing, highlight extraction and separation comparative measurements are the key parameters for recovery... more
Bagaimana melakukan konfigurasi Peruteaan RIP versi 2 yang classless routing?. VLSM diterapkan untuk melakukan efisiensi terhadap pemakaian IP address.
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more
In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking... more
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those... more
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement... more
This time, progress of computer network is rapid. Monitoring of computer network will be a difficult and complicated. Connection of computer network is a fundamental thing in a network. Because when the connection was a error then all... more