Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "virtual network" wg kryterium: Temat


Tytuł:
Heuristic energy-saving virtual network embedding algorithm based on Katz centrality
Autorzy:
Zhu, Qiang
Wang, Qing-Jun
Zang, Mu-Jun
Wang, Zhen-Dong
Xiao, Chang
Powiązania:
https://bibliotekanauki.pl/articles/141679.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
energy-saving virtual network
integer linear programming
Katz centrality
network virtualization embedding
virtualization
Opis:
Current networks are designed for peak loads leading to low utilization of power resources. In order to solve this problem, a heuristic energy-saving virtual network embedding algorithm based on the Katz centrality (Katz-VNE) is proposed. For solving an energy-saving virtual network embedding problem, we introduce the Katz centrality to represent the node influence. In order to minimize the energy consumption of the substrate network, the energy-saving virtual network embedding problem is formulated as an integer linear program, and the Katz-VNE is used to solve this problem. The Katz-VNE tries to embed the virtual nodes onto the substrate nodes with high Katz centrality, which is effective, and uses the shortest paths offering the best factor of bandwidths to avoid the hot nodes. The simulation results demonstrate that the long-term average energy consumption of the substrate network is reduced significantly, and the long-term revenue/cost ratio, the acceptance rate of virtual network requests, and the hibernation rate of substrate nodes as well as links are improved significantly.
Źródło:
Archives of Electrical Engineering; 2020, 69, 3; 595-608
1427-4221
2300-2506
Pojawia się w:
Archives of Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The mechanism of the analysis of entering Internet traffic for the presence of threats
Mekhanizm analiza vkhodjashhego Internet trafika na naliche ugroz
Autorzy:
Petrov, A.
Velchenko, S.
Powiązania:
https://bibliotekanauki.pl/articles/792762.pdf
Data publikacji:
2012
Wydawca:
Komisja Motoryzacji i Energetyki Rolnictwa
Tematy:
external threat
information system
semantic neuron network
virtual network
automated informative system
Internet traffic
Źródło:
Teka Komisji Motoryzacji i Energetyki Rolnictwa; 2012, 12, 4
1641-7739
Pojawia się w:
Teka Komisji Motoryzacji i Energetyki Rolnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rapid prototyping of virtual production networks in SMEs
Autorzy:
Saniuk, S.
Saniuk, A.
Banaszak, Z.
Powiązania:
https://bibliotekanauki.pl/articles/118059.pdf
Data publikacji:
2009
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
virtual production network
virtual organization
production capacity exchange platform
Opis:
Nowadays many companies, especially small and medium-sized enterprises (SMEs), specialize in a limited field of production. It requires forming virtual production networks of cooperating enterprises to manufacture better, faster and cheaper. Apart from that, some production orders cannot be realized, because there may not be a company of sufficient production potential. In this case the virtual production networks of cooperating companies can realize these production orders. These networks have larger production capacity and many different resources. Therefore it can realize many more production orders than only one of them. Such organization allows for executing high quality product. The maintenance costs of production capacity and used resources are not so high. The productivity is higher in all production systems in the network. The average costs of these systems are smaller and companies are more competitive.
Źródło:
Applied Computer Science; 2009, 5, 2; 58-67
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Czy sieć zastąpi szkołę i rodziców w edukacji i wychowaniu?
Will the Internet replace schools and parents in education and upbringing?
Autorzy:
Śliwerski, Bogusław
Powiązania:
https://bibliotekanauki.pl/articles/1371348.pdf
Data publikacji:
2018-10-22
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
new media
Internet
virtual network
upbringing
pseudo-upbringing
family
school
globalisation
nihilism
Opis:
The core of the analysis is countering the myth that allegedly using new communications technologies by children and youths is toxic to their development. In the post-modern world, children enter into partner and educational relationships with their parents specifically thanks to their better abilities to use new media. Changes the science of upbringing and education management are also necessary.
Źródło:
Interdyscyplinarne Konteksty Pedagogiki Specjalnej; 2018, 20; 21-46
2300-391X
Pojawia się w:
Interdyscyplinarne Konteksty Pedagogiki Specjalnej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykorzystanie technologii VNC do uruchamiania programów w przeglądarce internetowej
Using VNC technology for running programs in www browsers
Autorzy:
Wlaź, P.
Powiązania:
https://bibliotekanauki.pl/articles/395603.pdf
Data publikacji:
2012
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
Virtual Network Computing
wieloplatformowość
serwery X11
cross-platform software
X11 servers
Opis:
Współczesna technologia komputerowa oferuje różnorodność systemów operacyjnych, środowisk programowania, bibliotek runtime itp. Nie zawsze jest możliwe (lub pożądane) instalowanie programu na komputerze klienckim. Stąd koncepcja uruchomienia takiej aplikacji w oknie przeglądarki WWW. Poza tworzeniem wersji demo (a w niektórych wypadkach nawet w pełni funkcjonalnej aplikacji) gotowej do użycia bez konieczności instalacji, zastosowaniem jest rozszerzenie gamy oprogramowania, które serwer może wykorzystywać na swoich stronach WWW do praktycznie każdego programu dającego się uruchomić na platformie serwera. Po stronie klienta WWW wystarczy przeglądarka obsługująca aplety Javy, po stronie serwera jedyny dodatkowy wymóg to zainstalowanie darmowego serwera VNC. Jest to rozwiązanie tanie, zarówno ze względu na koszty dodatkowego oprogramowania jak i niewielkie wymagania co do zasobów systemu komputerowego.
Nowadays computer technology offers variety of operating systems, programming environments, runtime libraries, etc. Sometimes it is not possible (or desired) to install given program on a client computer. Thus the concept of running given application in the window of WWW browser. Apart from making demo versions (or even fully functional applications in some cases) which is ready to use without the need for installation, we also broaden the spectrum of programs that can be used by a server on its WWW pages to virtually all programs that can be run of this server platform. On a client side it is enough to have a browser which is Java applet ready. On a server side the only additional demand is installation of free VNC server. The costs of this solution are very low, in respect to both additional software costs and demands for system resources.
Źródło:
Postępy Nauki i Techniki; 2012, 12; 169-180
2080-4075
Pojawia się w:
Postępy Nauki i Techniki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000v in a Private Cloud Environment
Autorzy:
Lota, S.
Markowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/108742.pdf
Data publikacji:
2015
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
virtual network
virtualization platforms
network performance
Cisco Cloud Service Router 1000v
Hyper-V
VMware ESXi
Opis:
Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by the virtual CSR1000v and virtual machines running Windows 8.1 on two different virtual private cloud platforms: VMware vSphere 5.5 and Microsoft Hyper-V Server 2012 R2. In such prepared testbed we study the response time (delay) and throughput of virtual network devices.
Źródło:
Journal of Applied Computer Science Methods; 2015, 7 No. 2; 117-132
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Matching-Based Virtual Network Function Embedding for SDN-Enabled Power Distribution IoT
Autorzy:
Li, Xiaoyue
Chen, Xiankai
Zhou, Chaoqun
Liang, Zilong
Liu, Shubo
Yu, Qiao
Powiązania:
https://bibliotekanauki.pl/articles/2055212.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
power distribution internet of things
software defined networking
virtual service orchestration
virtual network function embedding
priority-aware
matching theory
Opis:
The power distribution internet of things (PD-IoT) has the complex network architecture, various emerging services, and the enormous number of terminal devices, which poses rigid requirements on substrate network infrastructure. However, the traditional PD-IoT has the characteristics of single network function, management and maintenance difficulties, and poor service flexibility, which makes it hard to meet the differentiated quality of service (QoS) requirements of different services. In this paper, we propose the software-defined networking (SDN)- enabled PD-IoT framework to improve network compatibility and flexibility, and investigate the virtual network function (VNF) embedding problem of service orchestration in PD-IoT. To solve the preference conflicts among different VNFs towards the network function node (NFV) and provide differentiated service for services in various priorities, a matching-based priority-aware VNF embedding (MPVE) algorithm is proposed to reduce energy consumption while minimizing the total task processing delay. Simulation results demonstrate that MPVE significantly outperforms existing matching algorithm and random matching algorithm in terms of delay and energy consumption while ensuring the task processing requirements of high-priority services.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 4; 647--653
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo informacji w wirtualnej sieci TOR i kryptowaluta Bitcoin
Information security in the TOR virtual network and crypto currency Bitcoin
Autorzy:
Gruber, J.
Jóźwiak, I. J.
Łoziuk, Ł.
Powiązania:
https://bibliotekanauki.pl/articles/324104.pdf
Data publikacji:
2012
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
TOR
BitCoin
wirtualna sieć komputerowa
komunikacja społeczna
virtual computer network
social communication
Opis:
W artykule omówiono stan aktualny i zastosowania wirtualnej sieci komputerowej TOR (ang. The Onion Router). TOR jest wirtualną siecią komputerową z oprogramowaniem implementującym infrastrukturę sieciową implementującą mechanizmy trasowania zapobiegające analizie ruchu sieciowego. Przeanalizowano ideę i wirtualny rynek waluty Bitcoin, która przyczyniła się znacząco do rozwoju sieci TOR. Dokonano oceny znaczenia TOR dla wolności przepływu informacji i wolności komunikacji społecznej w Internecie.
In this article the current state and use of the TOR (The Onion Router) virtual network are discussed. TOR is a virtual computer network with software that implements a network infrastructure that implements the routing mechanisms to prevent traffic analysis. The paper presents the analysis of the idea and the virtual currency market Bitcoin, which contributed significantly to the development of the TOR network. An assessment of the importance of TOR for freedom of information and freedom of communication on the Internet.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2012, z. 63a; 363-370
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wirtualna Sieć Prywatna
Virtual Private Network
Autorzy:
Duzinkiewicz, K.
Powiązania:
https://bibliotekanauki.pl/articles/154230.pdf
Data publikacji:
2009
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
VPN
SSL
algorytm DH
CA
virtual private network
Secure Socket Layer
algorithm Diffiego-Hellmana
Certificate Authority
Opis:
W artykule przedstawiono technologie wirtualnych sieci prywatnych (VPN) na przykładzie oprogramowania OpenVPN. Opisano instalację, konfigurację serwera VPN zaimplementowanego na linuksowym routerze oraz klientów pod systemem operacyjnym Windows. Opisano aspekty związane z bezpieczeństwem przesyłania otwartym kanałem zaszyfrowanych informacji i zasady działania protokołu SSL.
The technologies of virtual private nets (VPN) enabling the safe access to supplies and corporate applications from home unprotected internet nets on the example of software OpenVPN that are based on the open (GPL) General Public License are presented in the paper. In Section 2 there are described both the principle of SSL protocol and the theoretical bases of coding the symmetrical and asymmetrical connection called the mixed coding. The Diffiego-Hellman's algorithm is also introduced. It is responsible for save distribution of private keys by an open channel. There is presented the mechanism called a reliable institution of the keys storage - certificate authenticity. Section 3 is concentrated on the practical use of the technology called VPN. It presents the installation of free software - OpenVPN. Further on, the way of generating keys and certificates is introduced as well as the server and clients' configuration. The VPN server role is functioned by Linksys WRT54GL router where the original firmware is replaced by an alternative firmware called dd-wrt.v24_vpn. However, the VPN client works under the control of the Windows system. Finally, the topology of VPN net (tunnels) based on real distracted net is described.
Źródło:
Pomiary Automatyka Kontrola; 2009, R. 55, nr 7, 7; 540-543
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wspomaganie podejmowania decyzji w dynamicznych sieciach wytwarzania
Support for decision-making in virtual manufacturing networks
Autorzy:
Olender, M.
Powiązania:
https://bibliotekanauki.pl/articles/340099.pdf
Data publikacji:
2016
Wydawca:
Polskie Towarzystwo Zarządzania Produkcją
Tematy:
wirtualna organizacja
wirtualna sieć wytwarzania
teoria gier
planowanie procesów produkcyjnych
strategie
virtual organization
virtual manufacturing network
theory game
production process planning
strategies
Opis:
Dynamics on the market makes, that search for more effective solutions in planning the production flow. Opportunities, which open the market for companies, as new basis of cooperation, have to go hand in hand with the flexibility and ability to adapt to the requirements of the environment. The problem of scheduling production flow is more complicated, because the virtual manufacturing network create a single organizations, geographically dispersed, functioning temporarily, as a one body, to realize the effect an order. In the whole production planning and choosing the route from alternative routes should be considered still a problem of transport between the participants in the virtual network. To planning the flow production and choice of route used formalisms derived from game theory. The article presents the record of the decision problem for the production model in which the role players perform the goal functions. This functions have specific strategies and endeavour to win. The choice of strategy depends on which player starts the first game. Further work will be associated with the analysis of the impact of different combinations of strategies on the results of the game, with certain restrictions, as well as attempts to implement formalism to choose strategies in mixed strategies.
Źródło:
Zarządzanie Przedsiębiorstwem; 2016, 19, 2; 8-13
1643-4773
Pojawia się w:
Zarządzanie Przedsiębiorstwem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Performance and Efficiency of Hardware and Software Firewalls
Autorzy:
Konikiewicz, W.
Markowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/108760.pdf
Data publikacji:
2017
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
firewall
virtual firewall
network security
network performance
DoS attacks
Opis:
Firewalls are key elements of network security infrastructure. They should guarantee the proper level of security and, at the same time, the satisfying performance in order to not increase the packet delay in the network. In the paper, we present the comparative study on performance and security of a few firewall technologies including hardware, software and virtual solutions. Three important criteria are considered: the maximal throughput of firewall, the introduced delay and the ability to resist Denial of Service attacks. We report results of experiments, present analysis and formulate a few practical conclusions.
Źródło:
Journal of Applied Computer Science Methods; 2017, 9 No. 1; 49-63
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Third Places in the Era of Virtual Communities
Autorzy:
Markiewicz, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/1391055.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Bankowa w Poznaniu
Tematy:
third place
virtual community
network society
Opis:
The purpose of the article is to analyse virtual communities in the context of Ray Oldenburg’s third place theory. The author argues that virtual third places are a response to the needs of virtual communities and their features are similar to Oldenburg’s third places. The first part of the article presents the basics of Oldenburg’s third place theory while the second one shows the characteristics of virtual communities: a review of definitions, their typology and features. The criteria of collectivity of virtual communities are also discussed in the context of Oldenburg’s third places features.
Źródło:
Studia Periegetica; 2019, 28(4); 9-21
1897-9262
2658-1736
Pojawia się w:
Studia Periegetica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimized Energy Aware Resource Allocation Algorithm Using Software Defined Network Technology
Autorzy:
Al-Musawi, Ranya
Al-Khatib, Obada
Powiązania:
https://bibliotekanauki.pl/articles/309122.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
computer network management
network servers
software defined networking
virtual machines
Opis:
The number of data centers (DCs) used for storing and processing data has evolved rapidly in recent years. However, the operations held by DCs may relate to a number of disadvantages, primarily presuming in excessive energy and power consumption due to the poor management standards applied. This may lead to a situation in which many devices within the DC operate at full capacity without any tasks assigned for actual execution. A Software Defined Network (SDN) is a network architecture where the control plane is an independent entity from the data plane, yielding to a higher controllability and flexibility over the network. Through the utilization of SDN architecture, a highly functional energy aware network may be established. In this paper, we propose a heuristic algorithm that monitors the current status of an SDN network (in addition to all ingoing and outgoing traffic), in order to dynamically and efficiently allocate network resources by ensuring that only the necessary network devices are active and by turning the idle ones off. The results show that the proposed algorithm reduces energy consumption of the network compared to existing solutions.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 83-91
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A manufacturing network for generating added value from a geographical distance for the next generation
Autorzy:
Yukawa, K.
Kawakami, T.
Powiązania:
https://bibliotekanauki.pl/articles/99988.pdf
Data publikacji:
2011
Wydawca:
Wrocławska Rada Federacji Stowarzyszeń Naukowo-Technicznych
Tematy:
virtual concentration
optimization problems
value-added network
Opis:
n this study, we suggested a manufacturing network for generating added value from a geographical distance in terms of value creation from various management resources. Until today, most researchers focused on the Real Concentration of Production Base, which provides certain manufacturing benefits in these domains. However, "the Virtual Concentration of Production Bases" is realized by overcoming large physical distances and time differences between production bases, and creates greater added value for products. We attempted the simulation of the manufacturing network of creating the added value after having shown the new framework of network analysis in the manufacturing system.
Źródło:
Journal of Machine Engineering; 2011, 11, 3; 44-57
1895-7595
2391-8071
Pojawia się w:
Journal of Machine Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Soft computing tools for virtual drug discovery
Autorzy:
Hagan, D.
Hagan, M.
Powiązania:
https://bibliotekanauki.pl/articles/91628.pdf
Data publikacji:
2018
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
drug discovery
virtual screening
multilayer network
SOM
Opis:
In this paper, we describe how several soft computing tools can be used to assist in high throughput screening of potential drug candidates. Individual small molecules (ligands) are assessed for their potential to bind to specific proteins (receptors). Committees of multilayer networks are used to classify protein-ligand complexes as good binders or bad binders, based on selected chemical descriptors. The novel aspects of this paper include the use of statistical analyses on the weights of single layer networks to select the appropriate descriptors, the use of Monte Carlo cross-validation to provide confidence measures of network performance (and also to identify problems in the data), the addition of new chemical descriptors to improve network accuracy, and the use of Self Organizing Maps to analyze the performance of the trained network and identify anomalies. We demonstrate the procedures on a large practical data set, and use them to discover a promising characteristic of the data. We also perform virtual screenings with the trained networks on a number of benchmark sets and analyze the results.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2018, 8, 3; 173-189
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies