Results 1 to 10 of about 17,189 (293)

RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2020
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached.
Nuur Wachid Abdul Majid, Syifaul Fuada
doaj   +4 more sources

Optimizing OSPF/IS-IS weights in a changing world [PDF]

open access: greenIEEE Journal on Selected Areas in Communications, 2002
International ...
Bernard Fortz, Mikkel Thorup
openalex   +5 more sources

Analisis Pengembangan Jaringan Komputer UIN Sunan Kalijaga Yogyakarta Menggunakan Perbandingan Protokol Routing Statik dan Routing Dinamis OSPF

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2021
Penelitian ini menjelaskan tentang perbandingan routing sebagai salah satu manajemen jaringan komputer. Tujuan penelitian ini adalah melakukan analisis terhadap protokol routing statik dengan routing dinamis OSPF pada jaringan komputer di lingkungan ...
Rahmadhan Gatra, Bambang Sugiantoro
doaj   +2 more sources

Fast emergency paths schema to overcome transient link failures in ospf routing [PDF]

open access: yesInternational Journal of Computer Networks & Communications (IJCNC) Vol.4, No.2, March 2012 17-34, 2012
A reliable network infrastructure must be able to sustain traffic flows, even when a failure occurs and changes the network topology. During the occurrence of a failure, routing protocols, like OSPF, take from hundreds of milliseconds to various seconds in order to converge. During this convergence period, packets might traverse a longer path or even a
Barreto, Fernando   +2 more
arxiv   +3 more sources

Kombinasi Protokol Routing OSPF dan BGP dengan VRRP, HSRP, dan GLBP

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2021
Sekolah Menengah Kejuruan sebagai sekolah menengah berbasis vokasi mendapatkan manfaat sebagai pengembangan teaching factory. Teaching factory adalah konsep pembelajaran yang berorientasi pada produksi dan bisnis untuk menjawab tantangan perkembangan ...
Debbi Irfan Mudhoep   +2 more
doaj   +2 more sources

One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF [PDF]

open access: yesarXiv, 2010
Traffic Engineering (TE) leverages information of network traffic to generate a routing scheme optimizing the traffic distribution so as to advance network performance. However, optimize the link weights for OSPF to the offered traffic is an known NP-hard problem.
Liu, Hongying   +3 more
arxiv   +3 more sources

Analisis Quality of Service Routing MPLS OSPF Terhadap Gangguan Link Failure

open access: yesTechno.Com, 2021
Penerapan metode routing dalam kegiatan yang menggunakan jaringan komputer dalam lingkup besar diperlukan oleh administrator jaringan, agar dapat melakukan pengoptimalan lauyanan jaringan.
Arief Budiman   +2 more
doaj   +2 more sources

Proposal of Load Aware Routing for OSPF Routing Protocol [PDF]

open access: hybridCommunications, 2013
This paper deals with route cost assignment using one of the most commonly used routing protocols - Open Shortest Path First (OSPF). The limitation of this protocol is that the algorithm does not take actual link load into consideration.
Tomas Macha, Radko Krkos, Vit Novotny
doaj   +2 more sources

ANALISIS PERBANDINGAN PROTOKOL ROUTING OSPF DAN STATIC UNTUK OPTIMALISASI JARINGAN KOMPUTER SMA XYZ

open access: hybridTransformasi, 2023
Implementasi jaringan pada SMA XYZ dengan menerapkan protokol routing statis. Routing statis memiliki kelebihan yaitu kemudahan dalam inplementasi dibandingkan dengan routing dinamis.
Haries Anom Susetyo Aji Nugroho   +2 more
openalex   +3 more sources

Analiza bezbednosnih mehanizama OSPF protokola [PDF]

open access: greenarXiv, 2017
The security of the service and the system depends on the security of each of them components of this system. An attack on the routing protocol may be inaccurate functioning of the computer network. In some cases this is possible The attacker comes to data or artificial information for which he is not entitled.
Petar D. Bojović, K. Savic
arxiv   +3 more sources

Home - About - Disclaimer - Privacy