Search results for: computer networks
-
Industrial computer networks and functional safety
PublicationW rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.
-
Journal of Computer Networks and Communications
Journals -
Computer Networks
Journals -
International Journal of Computer Networks and Applications
Journals -
Computer Networks-laboratories - 2023
e-Learning CoursesAcquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.
-
Computer Networks laboratories 2024
e-Learning CoursesAcquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.
-
Computer Networks EN 2022
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
Computer Networks EN 2023
e-Learning CoursesThe student becomes familiar with the network layered logical architectures, classifies the basic problems of network communication and identifies and analyzes selected protocols and mechanisms of LAN and WAN (IP) networks.
-
International Journal of Computer Networks & Communications (IJCNC)
Journals -
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Knowledge management in the IPv6 migration process
PublicationThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most obvious. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed an application that supports the migration process. Its main purpose is to help less experienced network administrators to facilitate the migration process with a particular target...
-
IEEE Conference on Local Computer Networks
Conferences -
Conference on Software in Telecommunications and Computer Networks
Conferences -
International Science Conference on Computer Networks
Conferences -
International Conference on Computer Communication and Networks [IC3N]
Conferences -
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publication -
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublicationRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...