Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Syslog play an increasingly important role as a technological means of security audit in the monitoring equipment and resources. From the actual needs,the project design and realize audit logging . Compare the differences between RFC5424 and RFC3164, and achieve the syslog protocol with rsyslog. The project use PHP programming to implement user management interface and support to query log with Combination...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
In order to improve the management efficiency and convenience of the access control system in intelligent building, according to the new demand, a network entrance guard management software has been in this paper developed based on original software for single computer system. Inquiring real-time network data, browsing real-time information and long-distance monitoring can be realized by use of the...
Remote monitoring system based on GPRS is a modern monitoring system which is compose of radio communication technology, signal collection and computer network technology. This article introduces a wireless coal mine monitoring system based on GPRS communications technology. This system proposed in this paper has achieved a good result in the test.
Video is one of the most popular services in Internet. How to support large scale of streaming media transfer over the Internet has been studied in both academic communities and industry fields. VQM (Video Quality Monitoring) at the end point or in the network is necessary to improve customer's Quality of Experience (QoE). This paper first analyzes the requirements of VQM over the Internet. Then,...
Wireless Sensor Networks (WSNs) have attracted significant research interest in recent years because of their suitability to a wide range of real world applications. The envisioned Internet Protocol (IP) support for WSNs requires interoperability with existing management solutions, like Simple Network Management Protocol (SNMP), in order to provide remote management functionality and assure the correct...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
Monitoring large chunks of unused IP address space yields interesting observations and useful results. However, the volume and diversity of the collected data makes the extraction of information a challenging task. Additionally, the maintenance of the monitoring infrastructure is another demanding and time-consuming effort. To overcome these problems, we present several visualization techniques that...
Internet Protocol (IP) telephone, a new way of communication, is growing rapidly in the telecommunication industry. A number of major phone carriers are competing to gain customers in home and business markets. However, there are very few schools at the university level that offer IP Telephone courses. It is rare to find documentation on curriculum and laboratory development, even though some schools...
In this paper, UDP transfer scheme is presented to address data uploading of a measurement system. Based on principal analysis, functional block of UDP transfer module is discussed. Then network interface circuits, UDP protocol stack and usage of limited random accessed memory is detailed. Experiments showed that applied UDP module met requirement of data transfer. Finally, combining with specific...
For the increasing demand on campus network, IPv6 (Internet protocol version 6) is going to replace the IPv4 protocol. IPv6 is playing an important role in many fields. Wireless sensor networks (WSNs) are undergoing rapid progress and attracted the attention of both the academic and the industrial research community in the last few years. This paper reports on the development of these protocols at...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
Enterprise business strategy and IT strategy is disjointed, which leads to the failure of many IT projects. The main reason of failure is lack of IT Enterprise architecture development at the initial stage of enterprise informatization. This paper discusses the content of IT planning, enterprise architecture and their relationship, and expounds the process of enterprise architecture development using...
IP prefix hijacking remains a major threat to the security of the Internet routing system due to a lack of authoritative prefix ownership information. Despite many efforts in designing IP prefix hijack detection schemes, no existing design can satisfy all the critical requirements of a truly effective system: real-time, accurate, lightweight, easily and incrementally deployable, as well as robust...
The wireless local area network (WLAN) technology has a rapid development because its advantages of fast and high-efficient, flexible and easy in net building. Wireless network brings users convenient network service, but it also hides many security problems that hinder WLAN's development. This paper combines the accountability of IP address with trust routing to a second mechanism applied in WLAN...
In this paper, we provide a brief survey about the recent standardization advances in the field of mobility management for DVB-H mobile TV systems. The mentioned topics include: DVB-H to DVB-H handover, and DVB-H service roaming. In addition, since the DVB-H standard itself specifies only the behavior below the IP layer, other service layer standards over the DVB-H, e.g. OMA BCAST or DVB-IPDC, are...
To solve the problems of congestion and fault tolerance for global communication management in network on chip (NoC), a novel dynamic routing scheme base on network monitor called DyRS-NM, is proposed for NoC application. DyRS-NM has the ability to locate dynamic congested or faulty links to detour them based on the overall network status values collected by network monitor, and also can balance the...
People are using P2P (peer to peer) network for sharing and transferring digital content containing video, audio, or any other data file over the Internet from different part of the globe. All general P2P file sharing protocols were designed to work optimally in the case that all the peers have an end node on the Internet i.e. they are connectible. But due to the huge number of computers behind NAT...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.