• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • International Journal Advanced Network Monitoring Controls



Global Internet Come into a New DNS Era

I. IMPORTANT LANDMARK EVENTS A. DNS “Execution Day” Knowledge of obsolescent, wrong, or inappropriate methods to conduct software work around is required when we need to go on DNS software updating or programming. Some workarounds pertain to DNS software have made it a deeper and refined situation for the US to control and inaugurate Domain Name System, unavoidably there are functional declination and an increase in unpredictable errors and safety risks. Consequently, reinforcement in Domain

Mou Chengjin

International Journal of Advanced Network, Monitoring and Controls , ISSUE 3, 32–46


A Method to Access a Decimal Network (IPV9) Resource

Decimal network is a complete independent intellectual property rights based overall decimal digital code, the establishment of 2256 times of cyberspace sovereignty. It includes 13 root domain name servers from the parent root, the primary root, and the zero-trust security mechanism for communication after verification. Compatible with current Internet systems, it has a future Internet architecture that overlaps geographical location and IP address space. Most Internet applications today are

Guangzhou Liu, Fuya Yu

International Journal of Advanced Network, Monitoring and Controls , ISSUE 3, 36–46


Research and Implementation of Future Network Router

address for computer). The official patent name is “the method of allocating addresses to computers using full digital coding”. The IPV9 protocol refers to the 0-9 Arabic digital network as the virtual IP address, and uses decimal as the text representation method, which is a convenient way to find online users[2]. In order to improve efficiency and facilitate end users, some of the addresses can be directly used for domain name. At the same time, it is also called “new generation security and

Sun Huai, Wang Zhongsheng

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 10–22


Research on the System Structure of IPV9 Based on TCP/IP/M

enterprises, research institutions and universities to develop the IPV9 protocol with independent intellectual property of the digital domain name and other technical standards. By June 2016, the Ministry of Industry and Information Technology announced the approval of the four standards of the IPV9 system. Through unremitting efforts in various aspects, the IPV9 system mother root server, the main root server, and 13 root name servers named after N-Z letter have been developed. II. THE DESIGN OF IPV9

Jianguo Wang, Zhongsheng Wang, Jianping Xie, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls , ISSUE 3, 1–13

No Record Found..
Page Actions