Results 91 to 100 of about 3,896 (237)

Simulasi Voip pada Jaringan Mpls dengan Simulator Gns3 0.7.4 [PDF]

open access: yes, 2016
Perkembangan internet yang sangat cepat dan juga berkembangnya aplikasi-aplikasi multimedia membutuhkan persyaratan Quality of Services (QoS) tertentu.
Nurhayati, A. (Ade)
core   +1 more source

Diseño de itinerarios de aprendizaje sobre Moodle para asignaturas de redes de computadores basados en virtualización mediante software libre [PDF]

open access: yes, 2015
El diseño de recursos educacionales y materiales didácticos vía on-line permite mejorar el aprendizaje autónomo y a distancia (o no presencial). El proceso de convergencia Europea del Espacio de Educación Superior determina que el empleo de este tipo de ...
Alacid Soto, Beatriz   +6 more
core   +1 more source

Security in the data link layer of the OSI model on LANs wired Cisco

open access: yesJournal of Science and Research, 2018
There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments.
María Genoveva Moreira Santos   +1 more
doaj   +1 more source

Analisis Perancangan dan Implementasi FHRP di Protokol Routing RIPv2 dan OSPF

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown.
Ramdhani Syahputra   +2 more
doaj   +1 more source

Magnetoconductance of the Corbino disk in graphene: Chiral tunneling and quantum interference in the bilayer case

open access: yes, 2014
Quantum transport through an impurity-free Corbino disk in bilayer graphene is investigated analytically, by the mode-matching method for effective Dirac equation, in the presence of uniform magnetic fields. Similarly as in the monolayer case (see Refs. [
Rut, Grzegorz, Rycerz, Adam
core   +1 more source

A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills [PDF]

open access: yes, 2018
In the practical study of cybersecurity, students benefit greatly from having full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks.
Brockway, Michael   +2 more
core   +2 more sources

Modelling of Computer Network Using GNS3 Tool [PDF]

open access: yes, 2014
Import 05/08/2014Cílem této práce je analyzovat vlastnosti nástroje GNS3 a vytvořit simulaci komplexní architektury počítačové sítě. Na základě této simulace vytvořit 2 zadání pro laboratorní cvičení z odborného předmětu.
Czakan, Lukáš
core  

Quality of Service (Qos) Layanan Video Conference Pada Jaringan High Speed Packet Access (HSPA) Menggunakan Emulator Graphical Network Simulator (GNS) 3. [PDF]

open access: yes, 2014
Video conference adalah layanan yang meliputi Pelayanan data, voice, multimedia dan internet. Video conference membutuhkan kecepatan data yang relative tinggi dan bandwidth relative lebar.
Dwi Fadila Kurniawan, ST., MT., Reno Muktiaji Herdhiansyah., Ir. Wahyu Adi Priyono, MS
core  

INTERIOR GATEWAY PROTOCOL ROUTING PERFORMANCE COMPARISON OF THE VIRTUAL PRIVATE NETWORK BASED ON MULTI PROTOCOL LABEL SWITCHING AND DIRECT-LINK BACKUPSED ON MPLS AND DIRECT-LINK BACKUP

open access: yesJurnal Ilmiah SINERGI, 2019
The stability and convergence time become an essential factor in network availability performance. Multiprotocol Label Switching (MPLS) is one of the Virtual Private Network (VPN) technologies that can support the quality of communication media on the ...
Ida Nurhaida   +3 more
doaj   +1 more source

Simulacija sigurne mreže korištenjem GNS3 programskog alata [PDF]

open access: yes, 2022
The paper describes the security trends on the networks that will be presented using the simulation. With the development of information and communication technologies, there is a need for a new way of protection and its configuration. The number of companies and organizations is growing every day, resulting in exponential growth and the search for ...
openaire   +1 more source

Home - About - Disclaimer - Privacy