Results 51 to 60 of about 215 (173)

Comparative Analysis of PCC and ECMP Methods in Load Balancing Using GNS3 Simulator

open access: yesSistemasi: Jurnal Sistem Informasi
Judging from daily activities, human beings heavily rely on the internet for communication purposes. and exchange information using either social media applications or browsers, vonsistently fast internet speeds are incredibly beneficial for performing ...
M. Iqbal Rachmad Anwar, Diah Priyawati
doaj   +1 more source

Application of electronic learning tools for training of specialists in the field of information technologies for enterprises of mineral resources sector

open access: yesЗаписки Горного института, 2017
The article shows the advantages of using modern electronic learning tools in the training of specialists for the mineral and raw materials complex and considers the basic principles of organizing training using these tools.
E. V. Katuntsov   +2 more
doaj   +1 more source

Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)

open access: yesIET Networks, Volume 13, Issue 5-6, Page 486-512, September-November 2024.
The authors propose the Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM), a novel multicast routing protocol that keeps the design principles of PIM‐SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees.
Ana Catarina Grilo   +2 more
wiley   +1 more source

Intrusion Detection System (IDS) : Investigating Snort Performance in Windows and Ubuntu due to Flooding Attack

open access: yesJournal of Computing Research and Innovation, 2018
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj  

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies

open access: yesIET Networks, Volume 13, Issue 3, Page 241-248, May 2024.
Open Shortest Path First (OSPF) currently supports multiarea networking with two severe limitations: the multiarea topology is restricted to a two‐level hierarchy, and globally optimal routing may not be achieved. An OSPF extension that overcomes these limitations is proposed by introducing a routing overlay for the dissemination of multiarea routing ...
Xavier Gomes, João Fonseca, Rui Valadas
wiley   +1 more source

Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 1, 10 January 2024.
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal   +5 more
wiley   +1 more source

RIP and OSPF protocols Analysis through GNS-3 and OPNET UMTS Model Suite

open access: yesMATEC Web of Conferences, 2016
Directing concerning astuteness packages proceed with one concerning Great key systems in amazing web. A coordination tradition démontrâtes Great procédure for correspondance among switches used as a section concerning noteworthy undirected toward ...
Savita Rashmi, Goyal Samta Jain
doaj   +1 more source

Security in the data link layer of the OSI model on LANs wired Cisco

open access: yesJournal of Science and Research, 2018
There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments.
María Genoveva Moreira Santos   +1 more
doaj   +1 more source

Analisis Perancangan dan Implementasi FHRP di Protokol Routing RIPv2 dan OSPF

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown.
Ramdhani Syahputra   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy