Results 111 to 120 of about 3,896 (237)
Using the redistribution between routing protocols to find best route
Routers can forward packets through an internetwork by maintaining routing information in a database called a routing table. The routing table typically contains the address of all known networks and routing information about that network such as ...
Aqeel Hamad
doaj
The purpose of this study is to evaluate and compare how well different routing protocols perform in terms of load sharing, link failover, and overall network performance.
Kamal Shahid +2 more
doaj +1 more source
System For Backup of Network Devices Configuration [PDF]
Import 05/08/2014Cílem této práce je navrhnout a realizovat systém, který bude automaticky stahovat a udržovat zálohy konfigurací aktivních síťových prvků od výrobce Cisco s operačním systémem Cisco IOS.
Topiarz, Lukáš
core
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez +2 more
doaj
Recursos de programari per l’itinerari curricular d’ESO [PDF]
Amb aquest treball fi de màster, fem un recorregut per diferents recursos de programari per l’àrea de tecnologia i afitem la cerca, de forma que ens quedi el programari que requereix d’una instal·lació tradicional a l’ordinador i que sigui gratuït.
Montedeoca Giménez, Juan
core +1 more source
Actualmente, las redes IP necesitan de QoS para aplicaciones en tiempo real, donde el principal problema está en que las redes IP no tienen un mecanismo para proporcionarlo.
Pamela Buñay +3 more
doaj
Implementasi Load Balancing Dengan Algoritma Equal Cost Multi Path (Ecmp) [PDF]
The rapid development of the Internet requires a counterweight in maintaining connectivity and network stability. connectivity becomes one of the aspects that take priority in a network, and therefore the Internet connection on demand to always be stable
Jurnal, R. T. (Redaksi)
core
Assessing the Impact of DoS Attacks on the Performance of Asterisk-Based VoIP Platforms
In this work, a hypothesis is studied as to whether different DoS attacks affect the parameters of voice and video streams, as well as performance, on three different VoIP platforms.
Ivan Nedyalkov, Georgi Georgiev
doaj +1 more source
Perancangan Ngn Berbasis Open Ims Core pada Jaringan Mpls Vpn [PDF]
Next Generation Network (NGN) merupakan pengiriman berbagai layanan (voice, video, dan data) melalui satu jaringan berdasarkan sistem Internet Protokol (IP).
Cahyadi, E. F. (Eko) +2 more
core
Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams
This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks ...
Ivan Nedyalkov
doaj +1 more source

