Results 81 to 90 of about 3,896 (237)

Comparative Analysis of PCC and ECMP Methods in Load Balancing Using GNS3 Simulator

open access: yesSistemasi: Jurnal Sistem Informasi
Judging from daily activities, human beings heavily rely on the internet for communication purposes. and exchange information using either social media applications or browsers, vonsistently fast internet speeds are incredibly beneficial for performing ...
M. Iqbal Rachmad Anwar, Diah Priyawati
doaj   +1 more source

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Analisa Proses Routing Ripv1, Ripv2, Ripng, antara Model Ipv4 dengan Ipv6 pada Jaringan Data PT. Pertamina Ru II Dumai [PDF]

open access: yes, 2016
The development of telecommunications today make the need for communication of data quickly and efficiently is also one of his company besar.IPv4 scale to support 32-bit addressing and developed IPv6 supports up to 128 -bit addressing and also developed ...
Adhil, I. F. (Irsan)   +2 more
core  

Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 1, 10 January 2024.
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal   +5 more
wiley   +1 more source

Development of an Open-Source Testbed Based on the Modbus Protocol for Cybersecurity Analysis of Nuclear Power Plants

open access: yesApplied Sciences, 2022
The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these ...
Israel Barbosa de Brito   +1 more
doaj   +1 more source

Intrusion Detection System (IDS) : Investigating Snort Performance in Windows and Ubuntu due to Flooding Attack

open access: yesJournal of Computing Research and Innovation, 2018
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj  

Application of electronic learning tools for training of specialists in the field of information technologies for enterprises of mineral resources sector

open access: yesЗаписки Горного института, 2017
The article shows the advantages of using modern electronic learning tools in the training of specialists for the mineral and raw materials complex and considers the basic principles of organizing training using these tools.
E. V. Katuntsov   +2 more
doaj   +1 more source

Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]

open access: yes, 2017
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq)   +1 more
core  

RIP and OSPF protocols Analysis through GNS-3 and OPNET UMTS Model Suite

open access: yesMATEC Web of Conferences, 2016
Directing concerning astuteness packages proceed with one concerning Great key systems in amazing web. A coordination tradition démontrâtes Great procédure for correspondance among switches used as a section concerning noteworthy undirected toward ...
Savita Rashmi, Goyal Samta Jain
doaj   +1 more source

Simulation of the IPTV systems multiservice data networks [PDF]

open access: yes, 2011
Рассмотрены возможности использования методов визуального программного моделирования систем ІРТ? мультисервисной сети передачи данных в учебном процессе.Describes the possibility of using software simulation systems IPTV multiservice data network in the ...
Karyakin, D. V.   +5 more
core  

Home - About - Disclaimer - Privacy