Formation of the topological space of the Іnternet by the global routing system
It is known that the Internet is an interconnection of computer networks and the essence of this interconnection is in unified principles of general logical addressing and routing. The topology of the computer network stands for the method of organization or mutual position of its elements defined b...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Зубок, В. Ю., Мохор, В. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/235297 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013)
by: Zubok, V. Yu.
Published: (2013)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Lattices of topologies of algebraic systems
by: Arnautov, V. I., et al.
Published: (2018)
by: Arnautov, V. I., et al.
Published: (2018)
On the number of topologies on a finite set
by: Kizmaz, M. Yasir
Published: (2019)
by: Kizmaz, M. Yasir
Published: (2019)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
On the lattice of weak topologies on the bicyclic monoid with adjoined zero
by: Bardyla, S., et al.
Published: (2020)
by: Bardyla, S., et al.
Published: (2020)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
Maximum power point tracking improving of photovoltaic systems based on hybrid triangulation topology aggregation optimizer and incremental conductance algorithm
by: Jeridi, A., et al.
Published: (2025)
by: Jeridi, A., et al.
Published: (2025)
Algebra in superextensions of groups, II: cancelativity and centers
by: Banakh, Taras, et al.
Published: (2018)
by: Banakh, Taras, et al.
Published: (2018)
Exponent matrices and topological equivalence of maps
by: Fedorenko, Volodymyr, et al.
Published: (2018)
by: Fedorenko, Volodymyr, et al.
Published: (2018)
OPTIMAL TOPOLOGY OF ELECTRIC CIRCUITS IN PV-PANELS AND PV-PLANTS WITH USING CONTROLLED CONNECTIONS
by: Bondarenko, D.
Published: (2024)
by: Bondarenko, D.
Published: (2024)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Method of Semantic Identification for Knowledge Base Objects in Decision Support System
by: Andriichuk, O. V.
Published: (2014)
by: Andriichuk, O. V.
Published: (2014)
Algebra in superextensions of groups, I: zeros and commutativity
by: T. Banakh, T., et al.
Published: (2018)
by: T. Banakh, T., et al.
Published: (2018)
A random Bockstein operator
by: Zabka, Matthew John
Published: (2018)
by: Zabka, Matthew John
Published: (2018)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Topological semigroups of matrix units
by: Gutik, Oleg V., et al.
Published: (2018)
by: Gutik, Oleg V., et al.
Published: (2018)
Efficient method for transformer models implementation in distribution load flow matrix
by: Kadri, M., et al.
Published: (2023)
by: Kadri, M., et al.
Published: (2023)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
Distributed implementation of neuroevolution of augmenting topologies method
by: Achour, I.Z., et al.
Published: (2021)
by: Achour, I.Z., et al.
Published: (2021)
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experience
by: Hordiichuk, O.V., et al.
Published: (2015)
by: Hordiichuk, O.V., et al.
Published: (2015)
Dynamics of nonquasineutral current filaments on different space - time scales
by: Gordeev, A.V., et al.
Published: (2005)
by: Gordeev, A.V., et al.
Published: (2005)
On possible stationary equilivrium of dusty self-gravitating space plasmas
by: Yaroshenko, V., et al.
Published: (2002)
by: Yaroshenko, V., et al.
Published: (2002)
Nonliner mechanism of electromagnetic waves generations in space dust plasma
by: Voitsekhovskа, A.D., et al.
Published: (2007)
by: Voitsekhovskа, A.D., et al.
Published: (2007)
Application of coevolution strategy to solve the problem of autonomous navigation trough the maze
by: Omelianenko, Ia.V., et al.
Published: (2024)
by: Omelianenko, Ia.V., et al.
Published: (2024)
From global tectonics to global geodynamics
by: Aryasova, O., et al.
Published: (2018)
by: Aryasova, O., et al.
Published: (2018)
Balance and optimization model of interconnected energy carrier transmitting and distributing systems in the context of general energy balance
by: Novoseltsev A.V., et al.
Published: (2009)
by: Novoseltsev A.V., et al.
Published: (2009)
The method for assessing the connectivity of nodes of wireless episodic networks under the condition of using unmanned aeral vehicles
by: Valuiskyi, S.V., et al.
Published: (2023)
by: Valuiskyi, S.V., et al.
Published: (2023)
Review of the features and abilities of content-monitoring of national segment inside the Internet
by: Lande, D. V., et al.
Published: (2016)
by: Lande, D. V., et al.
Published: (2016)
About one dynamic model of conflictcontrol user interaction in open information environments
by: Ignatenko, O.P.
Published: (2015)
by: Ignatenko, O.P.
Published: (2015)
AN ANTHOLOGY OF THE DISTINGUISHED ACHIEVEMENTS IN SCIENCE AND TECHNIQUE. PART 53: NOBEL PRIZE LAUREATES IN PHYSICS FOR 2016-2019
by: Baranov, M. I.
Published: (2020)
by: Baranov, M. I.
Published: (2020)
Simulation of the autonomous maze navigation using the NEAT algorithm
by: Omelianenko, Ia.V.
Published: (2023)
by: Omelianenko, Ia.V.
Published: (2023)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
“Pipette” birth mechanism of galaxy cosmic rays and the problem of fractures in their spectrum
by: Trubnikov, B.A.
Published: (2005)
by: Trubnikov, B.A.
Published: (2005)
Radioemission of the modulated electron beam injected into ionosphere along the geomagnetic field
by: Anisimov, I.O., et al.
Published: (2005)
by: Anisimov, I.O., et al.
Published: (2005)
Similar Items
-
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)