Zobrazeno 1 - 10
of 5 976
pro vyhledávání: '"PRIVATE NETWORK"'
Autor:
LI Chenxin
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 7, Pp 79-88 (2024)
Based on the current research results and practical experience of 5G in coal mines, this paper analyzes the research status and development direction of key technologies for 5G in coal mines from three aspects:5G private network architecture, coverag
Externí odkaz:
https://doaj.org/article/f61d31dd97324ee6ae7a98b90f31c5ca
Publikováno v:
Guangtongxin yanjiu, Pp 22007101-22007106 (2024)
【Objective】In response to the needs of Ultra High Voltage (UHV) site infrastructure control and intelligent transportation and inspection, 5th Generation Mobile Communication Technology (5G) is applied to the construction phase of UHV converter s
Externí odkaz:
https://doaj.org/article/1f3883fffb9344379c80fcf7692847c7
Autor:
Weijun LIU
Publikováno v:
Chengshi guidao jiaotong yanjiu, Vol 27, Iss 4, Pp 206-210 (2024)
Objective The urban rail transit 5G public-private network (PPN) is a vertical application of 5G public network in urban rail transit industry, which differs significantly from the wireless coverage scheme of the 5G public network when only catering
Externí odkaz:
https://doaj.org/article/2007fe5d19f742198018570cf4e344f0
Autor:
Pawel Skokowski, Krzysztof Malon, Michal Kryk, Krzysztof Maslanka, Jan M. Kelner, Piotr Rajchowski, Jaroslaw Magiera
Publikováno v:
IEEE Access, Vol 12, Pp 51523-51535 (2024)
Fourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analyt
Externí odkaz:
https://doaj.org/article/98e09f4cc81d4b41a95568e5b0cff15d
Autor:
Berk Akgun, Deepak Singh Mahendar Singh, Samatha Kotla, Vikas Jain, Sakshi Namdeo, Rupesh Acharya, Muruganandam Jayabalan, Abhishek Kumar, Vinay Chande, Arumugam Kannan, Jalaj Swami, Yitao Chen, John Boyd, Xiaoxia Zhang
Publikováno v:
IEEE Access, Vol 12, Pp 7987-8003 (2024)
Private Fifth Generation (5G) Networks can quickly scale coverage and capacity for diverse industry verticals by using the standardized 3rd Generation Partnership Project (3GPP) and Open Radio Access Network (O-RAN) interfaces that enable disaggregat
Externí odkaz:
https://doaj.org/article/aea42a4347ef4762b7daa6e910549086
Autor:
Syed Muhammad Zohaib, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb, Zia Muhammad
Publikováno v:
Information, Vol 15, Iss 11, p 734 (2024)
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employee
Externí odkaz:
https://doaj.org/article/010ac02a41724e538835a68afbdd77e9
Publikováno v:
Journal of Information Systems and Informatics, Vol 5, Iss 3, Pp 1194-1203 (2023)
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the last four years. Despite this progress, inter-agency
Externí odkaz:
https://doaj.org/article/e913f56f80d84c79affaa84ecd3ad873
Publikováno v:
Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, Vol 21, Iss 4, Pp 93-100 (2023)
The purpose of the article is to develop a mathematical model of VPN in communication networks of special purpose, which allows to determine the margin of throughput, for scheduled VPN-tunnels. In contrast to the well-known approaches to estimating t
Externí odkaz:
https://doaj.org/article/2da9fa96fd55415fa4d3ed39a076bcc9
Autor:
Saad Said Alqahtany, Toqeer Ali Syed
Publikováno v:
Applied Sciences, Vol 14, Iss 11, p 4421 (2024)
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an i
Externí odkaz:
https://doaj.org/article/355fc16dc0154047b1572f9286703cbd
Publikováno v:
IET Information Security, Vol 17, Iss 2, Pp 294-308 (2023)
Abstract The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. An intelligent system is essential to analyse and identify network traffic accurately. Network manag
Externí odkaz:
https://doaj.org/article/cca7b45a5d404f00bf2887f1411d7161