Results 31 to 40 of about 3,896 (237)

RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2020
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached.
Nuur Wachid Abdul Majid, Syifaul Fuada
doaj   +1 more source

Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology

open access: yesInventions, 2023
This article is devoted to the problem of information security in complexes with unmanned aerial vehicles (UAV). Science knows a new promising method of information protection: moving target defense (MTD).
Vitaly Pikov   +2 more
doaj   +1 more source

Evaluation of Computer Network Simulation Applications to Support Online Learning

open access: yesIJIE (Indonesian Journal of Informatics Education), 2022
Computer network learning is learning that prioritizes practice compared to theory to be able to understand the material more clearly. Therefore, computer network learning requires real learning media to support learning effectiveness.
Ismoyo Putro   +2 more
doaj   +1 more source

The deployment of routing protocols in distributed control plane of SDN. [PDF]

open access: yesScientificWorldJournal, 2014
Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability.
Jingjing Z   +4 more
europepmc   +2 more sources

Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6‐DDoS attack detection mechanisms rely on self‐created datasets because very few suitable ICMPv6‐DDoS attack datasets are publicly available due to privacy and security ...
Selvakumar Manickam   +7 more
wiley   +1 more source

Quality optimization of OSPFV3 and EIGRP for IPV4 in hierarchical network environment using GNS3 tool

open access: yesPakistan Journal of Engineering Technology & Science, 2022
In network world, due to shortage of IP addresses in version 4, a new version of IP address, namely IPv6, has come into play, but due to non-exchange ability between IPv4 and IPv6, different routing protocol is come to play for IPv6 that is RIPng ...
Allah Bachayo Brohi   +2 more
doaj   +1 more source

Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Developing specialized cloud‐based and open‐source testbeds is a practical approach to investigate network slicing functionalities in the fifth‐generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost‐efficient and small‐scale testbeds that partially or fully deploy network slicing.
Ali Esmaeily   +2 more
wiley   +1 more source

Analysis of Different Types of Network Attacks on the GNS3 Platform

open access: yesSakarya University Journal of Computer and Information Sciences, 2020
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj   +1 more source

The Arabidopsis thaliana N-recognin E3 ligase PROTEOLYSIS1 influences the immune response. [PDF]

open access: yesPlant Direct, 2019
Abstract N‐degron pathways of ubiquitin‐mediated proteolysis (formerly known as the N‐end rule pathway) control the stability of substrate proteins dependent on the amino‐terminal (Nt) residue. Unlike yeast or mammalian N‐recognin E3 ligases, which each recognize several different classes of Nt residues, in Arabidopsis thaliana, N‐recognin functions of
Till CJ   +9 more
europepmc   +2 more sources

A Comparison between the Use of Cisco Packet Tracer and Graphical Network Simulator 3 as Learning Media on Students’ Achievement

open access: yesJurnal Pendidikan Teknologi dan Kejuruan, 2018
Usually in studying the practice of computer networks, it is encountered several obstacles such as (1) limited computer networks design tools, (2) limited learning time to design computer networks and (3) technical difficulties for finding the solutions ...
Liska Mey Ika Sari   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy