Results 1 to 10 of about 17,189 (293)
RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?
Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2020The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached.
Nuur Wachid Abdul Majid, Syifaul Fuada
doaj +4 more sources
Optimizing OSPF/IS-IS weights in a changing world [PDF]
IEEE Journal on Selected Areas in Communications, 2002International ...
Bernard Fortz, Mikkel Thorup
openalex +5 more sources
Jurnal Teknologi Informasi dan Ilmu Komputer, 2021
Penelitian ini menjelaskan tentang perbandingan routing sebagai salah satu manajemen jaringan komputer. Tujuan penelitian ini adalah melakukan analisis terhadap protokol routing statik dengan routing dinamis OSPF pada jaringan komputer di lingkungan ...
Rahmadhan Gatra, Bambang Sugiantoro
doaj +2 more sources
Penelitian ini menjelaskan tentang perbandingan routing sebagai salah satu manajemen jaringan komputer. Tujuan penelitian ini adalah melakukan analisis terhadap protokol routing statik dengan routing dinamis OSPF pada jaringan komputer di lingkungan ...
Rahmadhan Gatra, Bambang Sugiantoro
doaj +2 more sources
Fast emergency paths schema to overcome transient link failures in ospf routing [PDF]
International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.2, March 2012 17-34, 2012A reliable network infrastructure must be able to sustain traffic flows, even when a failure occurs and changes the network topology. During the occurrence of a failure, routing protocols, like OSPF, take from hundreds of milliseconds to various seconds in order to converge. During this convergence period, packets might traverse a longer path or even a
Barreto, Fernando+2 more
arxiv +3 more sources
Kombinasi Protokol Routing OSPF dan BGP dengan VRRP, HSRP, dan GLBP
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, 2021Sekolah Menengah Kejuruan sebagai sekolah menengah berbasis vokasi mendapatkan manfaat sebagai pengembangan teaching factory. Teaching factory adalah konsep pembelajaran yang berorientasi pada produksi dan bisnis untuk menjawab tantangan perkembangan ...
Debbi Irfan Mudhoep+2 more
doaj +2 more sources
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF [PDF]
arXiv, 2010Traffic Engineering (TE) leverages information of network traffic to generate a routing scheme optimizing the traffic distribution so as to advance network performance. However, optimize the link weights for OSPF to the offered traffic is an known NP-hard problem.
Liu, Hongying+3 more
arxiv +3 more sources
Analisis Quality of Service Routing MPLS OSPF Terhadap Gangguan Link Failure
Techno.Com, 2021Penerapan metode routing dalam kegiatan yang menggunakan jaringan komputer dalam lingkup besar diperlukan oleh administrator jaringan, agar dapat melakukan pengoptimalan lauyanan jaringan.
Arief Budiman+2 more
doaj +2 more sources
Proposal of Load Aware Routing for OSPF Routing Protocol [PDF]
Communications, 2013This paper deals with route cost assignment using one of the most commonly used routing protocols - Open Shortest Path First (OSPF). The limitation of this protocol is that the algorithm does not take actual link load into consideration.
Tomas Macha, Radko Krkos, Vit Novotny
doaj +2 more sources
ANALISIS PERBANDINGAN PROTOKOL ROUTING OSPF DAN STATIC UNTUK OPTIMALISASI JARINGAN KOMPUTER SMA XYZ
Transformasi, 2023Implementasi jaringan pada SMA XYZ dengan menerapkan protokol routing statis. Routing statis memiliki kelebihan yaitu kemudahan dalam inplementasi dibandingkan dengan routing dinamis.
Haries Anom Susetyo Aji Nugroho+2 more
openalex +3 more sources
Analiza bezbednosnih mehanizama OSPF protokola [PDF]
arXiv, 2017The security of the service and the system depends on the security of each of them components of this system. An attack on the routing protocol may be inaccurate functioning of the computer network. In some cases this is possible The attacker comes to data or artificial information for which he is not entitled.
Petar D. Bojović, K. Savic
arxiv +3 more sources