Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Computer architecture. Operating systems --- Cisco --- routers --- computernetwerken --- Routers (Computer networks) --- Routing protocols (Computer network protocols) --- CCNA --- Computernetwerken --- Computer network protocols --- Network routers --- Routing (Computer network management) --- Equipment and supplies
Choose an application
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method
Ad hoc networks (Computer networks) --- Routing protocols (Computer network protocols) --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer network protocols --- MANETs (Computer networks) --- Mobile ad hoc networks --- Wireless ad hoc networks --- Wireless communication systems
Choose an application
Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols.
Routing protocols (Computer network protocols) --- Computer network protocols --- Computer security. --- Data encryption (Computer science) --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Protection --- Security measures
Choose an application
Honey bee colonies demonstrate robust adaptive efficient agent-based communications and task allocations without centralized controls – desirable features in network design. This book introduces a multipath routing algorithm for packet-switched telecommunication networks based on techniques observed in bee colonies. The algorithm, BeeHive, is dynamic, simple, efficient, robust and flexible, and it represents an important step towards intelligent networks that optimally manage resources. The author guides the reader in a survey of nature-inspired routing protocols and communication techniques observed in insect colonies. He then offers the design of a scalable framework for nature-inspired routing algorithms, and he examines a practical application using real networks of Linux routers. He also utilizes formal techniques to analytically model the performance of nature-inspired routing algorithms. In the last chapters of the book, he introduces an immune-inspired security framework for nature-inspired algorithms, and uses the wisdom of the hive for routing in ad hoc and sensor networks. Finally, the author provides a comprehensive bibliography to serve as a reference for nature-inspired solutions to networking problems. This book bridges the gap between natural computing and computer networking. What sets this book apart from other texts on this subject is its natural engineering approach in which the challenges and objectives of a real-world system are identified before its solution, nature-inspired or otherwise, is discussed. This balanced exposition of the book makes it equally suitable for telecommunication network designers and theorists, and computer science researchers engaged with artificial intelligence, agents, and nature-inspired techniques.
Information Technology --- Artificial Intelligence --- Artificial intelligence. --- Computer Communication Networks. --- Computer simulation. --- Telecommunication. --- Computer networks --- Computer network protocols --- Computer algorithms --- Routing protocols (Computer network protocols) --- Mechanical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Mechanical Engineering - General --- Telecommunications --- Computer network protocols. --- Software engineering. --- Computer software engineering --- Protocols, Computer network --- Computer science. --- Computer communication systems. --- Electrical engineering. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Communications Engineering, Networks. --- Simulation and Modeling. --- Electric engineering --- Engineering --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- BeeHive. --- Linux. --- Slackware Linux --- SUSE Linux --- Computer networks. --- Computer Modelling.
Listing 1 - 8 of 8 |
Sort by
|