![](images/graphics/blank.gif)
Network planes
-
Ebook "An introduction to Passive Radar" explains how passive radar works, how it differs from the active type, and demonstrates the benefits and drawbacks of this novel technology. Properties of illuminators, including ambiguity functions, digital vs. analog, digitally-coded waveforms, vertical-plane coverage, and satellite-borne and radar illuminators are explored. Readers find practical guidance on direct signal suppression, passive radar performance prediction, and detection and tracking.
110p
tieulangtran
28-09-2023
4
0
Download
-
Ebook Router security strategies: Securing IP network traffic planes – Part 1 includes contents: Chapter 1 Internet protocol operations fundamentals, Chapter 2 Threat models for IP networks, Chapter 3 IP network traffic plane security concepts, Chapter 4 IP data plane security, Chapter 5 IP control plane security, Chapter 6 IP management plane security, Chapter 7 IP services plane security.
425p
haojiubujain06
05-09-2023
6
3
Download
-
Ebook Router security strategies: Securing IP network traffic planes – Part 2 includes contents: Chapter 8 Enterprise network case studies, Chapter 9 Service provider network case studies, Appendix A: Answers to chapter review questions, Appendix B: IP protocol headers, Appendix C: Cisco IOS to IOS XR security transition, Appendix D: Security incident handling.
248p
haojiubujain06
05-09-2023
2
2
Download
-
Ebook Computer networking: A top down approach (7th, converted) - Part 1 presents the following content: Chapter 1 computer networks and the internet, chapter 2 application layer, chapter 3 transport layer, chapter 4 the network layer: data plane, chapter 5 the network layer: control plane.
492p
runthenight09
06-05-2023
11
6
Download
-
For early detection and response to network threats, a network intrusion detection system should be executed on a data plane. However, due to high model complexity, an intrusion detection model based on advanced machine learning techniques becomes unsuitable for limited-resource switches.
15p
viargus
20-02-2023
5
2
Download
-
(BQ) Ebook Dynamical systems with applications using Matlab (Second Edition): Part 1 includes the following content: Limit cycles; hamiltonian systems, lyapunov functions, and stability; bifurcation theory; three-dimensional autonomous systems and chaos; poincaré maps and nonautonomous systems in the plane; local and global bifurcations; the second part of hilbert’s sixteenth problem; neural networks; chaos control and synchronization; binary oscillator computing; simulink; examination-type questions; solutions to exercises.
285p
runordie6
10-08-2022
5
2
Download
-
It is found that a small subset of the investigated texture features is highly significant for all experiments. Using this feature subset in conjunction with multi-layer, nonlinear and low complexity feed-forward network architectures classification accuracies in the order of 99% are obtained.
14p
guernsey
28-12-2021
3
0
Download
-
Lecture Advanced Computer Networks - Chapter 7: Software Defined Networking. After studying this section will help you understand: software defined networking (SDN), use SDN to manage a complex network, impression about computer networking so far,...
54p
bachdangky
31-08-2021
11
2
Download
-
Lecture Advanced Computer Networks - Chapter 8: Programmable Data Plane. After studying this section will help you understand: need data plane programmability and how to achieve it; the new ideas can we explore with data plane programmability,...
49p
bachdangky
31-08-2021
11
2
Download
-
Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. Since SDN is regarded as a new research issue, the application of SDN in practice faces some barriers. Most network devices such as routers and switches that implement SDN functionalities are expensive. An alternative solution in SDN research and experiments is to use network emulators. By using Mininet, an open source network emulator, this study simulates SDN implementations in different environments.
13p
nguaconbaynhay10
19-02-2021
25
1
Download
-
OpenFlow, SDN, This paper presents a solution, referred to as SDNbased SYN Flood Guard (SSG), which takes advantages of the OpenFlow’s abilities to match TCP Flags fields and the RST Cookie technique to authenticate the three-way handshake process of TCP connections in a separated device from SDN/Openflow switches. Experiment results reveal that SSG solves the aforementioned problems and improves the SYN Flood attack tolerance compared to the existing solutions.
15p
nguaconbaynhay10
22-01-2021
15
1
Download
-
A Multiple Input Multiple Output (MIMO) antenna with high isolation is proposed in this paper. The proposed antenna includes two sets of four elements (2 × 2) and it is yielded at the central frequency of 5.5 GHz for Wireless Local Area Network (WLAN) applications. Based on RT5880 with height of 1.575 mm, the overall size of MIMO antenna is 140 × 76 × 1.575 mm3 . To get high isolation between antenna elements, a Defected Ground Structure (DGS) is integrated on ground plane. Besides, the MIMO antenna witnesses a large bandwidth of 9.1% and an efficiency of 90% while the pick gain is 8.5 dBi.
7p
trinhthamhodang9
10-12-2020
17
0
Download
-
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior.
14p
kethamoi1
17-11-2019
23
1
Download
-
This paper presents a ground-based navigation method for an indoor robot to reach a predetermined target. By mining depth maps effectively, a mobile robot could find right path and self-locate with a proposed algorithm named Always Move Straight to the Destination (AMDS).
7p
visasuke2711
25-04-2019
26
1
Download
-
In this paper a low cost, simple and small size ultrawideiband circular monopole antenna is designed. The notch band is created by multiple number of slots in the ground plane. The proposed antenna is designed on the FR-4 substrate of height 1.6 mm. The antenna is designed with ground plane of dimension 50 x 55 mm and is fed by 50 ohm microstrip line.
5p
byphasse043256
21-03-2019
22
0
Download
-
This chapter describes how to securely implement the management and reporting features of Cisco IOS devices. It discusses technologies surrounding network management, such as syslog, Network Time Protocol, Secure Shell, and Simple Network Management Protocol.
126p
kiepnaybinhyen_02
28-12-2015
50
5
Download
-
Topics covered in this chapter include the following: An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking; an introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability; a revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure;...
36p
kiepnaybinhyen_02
28-12-2015
66
5
Download
-
This chapter deals with Cisco IOS Network Foundation Protection (NFP) as a framework for infrastructure protection, all its components, and commonly used countermeasures asfound in Cisco IOS devices. More precisely, this chapter differentiates the security measures to be implemented on the three conceptual planes of Cisco IOS devices: the control plane, the data plane, and the management plane. This chapter also discusses using Cisco Configuration Professional (CCP) to implement security controls on Cisco IOS routers.
20p
kiepnaybinhyen_02
28-12-2015
44
4
Download
-
This chapter explains the need for IPv6 and presents its fundamental features, as well as enhancements when compared to IPv4. It covers IPv6 addressing scheme, components, and design principles and how routing functions. The chapter then presents potential threats and develops a strategy for IPv6 security.
28p
kiepnaybinhyen_02
28-12-2015
44
3
Download
-
Bài thuyết trình: Internet marketing planing giới thiệu mô hình hành vi tiêu dùng quyết định mua hàng trực tuyến mô hình hành vi tiêu dùng trực tuyến, sơ lược về Internet Marketing, phương thức Internet Marketing marketing một đối một, marketing lan truyền (Viral Marketing), marketing liên kết(Affiliate Marketing), mô hình marketing liên kết Social Network Marketing.
37p
nluu9184
10-05-2014
167
36
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)