Results 21 to 30 of about 4,913 (208)

Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

open access: yesJurnal Elkomika, 2014
ABSTRAK OSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer.
DWI ARYANTA, BAYU AGUNG PRANATA
doaj   +1 more source

Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh

open access: yesJurnal Elkomika, 2014
ABSTRAK EIGRP (Enhanced Interior Gateway Routing Protocol) dan OSPF (Open Shortest Path Fisrt) adalah routing protokol yang banyak digunakan pada suatu jaringan komputer.
DWI ARYANTA   +2 more
doaj   +1 more source

OSPF u mrežama preklopnika

open access: yesPolytechnic and design, 2015
Routing protocols are used by routers or higherlevel switch interconnection. The most used protocols are the following: Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), Intermediate System to Intermediate System (IS-IS), and Border Gateway Protocol (BGP).
Jambrek, Stjepan, Žigman, Dubravko
openaire   +5 more sources

Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP

open access: yesAvances, 2019
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas   +2 more
doaj   +1 more source

Yeast functional genomic screens lead to identification of a role for a bacterial effector in innate immunity regulation. [PDF]

open access: yesPLoS Pathogens, 2007
Numerous bacterial pathogens manipulate host cell processes to promote infection and ultimately cause disease through the action of proteins that they directly inject into host cells.
Roger W Kramer   +7 more
doaj   +1 more source

Proposal of Load Aware Routing for OSPF Routing Protocol

open access: yesCommunications, 2013
This paper deals with route cost assignment using one of the most commonly used routing protocols - Open Shortest Path First (OSPF). The limitation of this protocol is that the algorithm does not take actual link load into consideration.
Tomas Macha, Radko Krkos, Vit Novotny
doaj   +1 more source

Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)

open access: yesIJID (International Journal on Informatics for Development), 2019
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication ...
Muhammad Nur Alfani, Bambang Sugiantoro
doaj   +1 more source

ANALISIS PERBANDINGAN ROUTING PROTOKOL OPEN SHORTES PATH FIRST (OSPF) DENGAN ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP)

open access: yesIlkom Jurnal Ilmiah, 2018
Routing adalah proses pemilihan rute terbaik untuk suatu paket data agar dapat sampai ke tujuannya. Proses routing sangat dibutuhkan dalam proses pengiriman  data.
Nur Indah, Yulita Salim, Ramdan Satra
doaj   +1 more source

Analisis dan Perancangan Simulasi Perbandingan Kinerja Jaringan Komputer Menggunakan Metode Protokol Routing Statis, Open Shortest Path First (OSPF) dan Border Gateway Protocol (BGP) (Studi Kasus Tanri Abeng University)

open access: yes, 2021
Network is a communication between two devices to communicate with each other either using wire or wireless media. The LAN network topology used at Tanri Abeng Unversity still uses a static routing topology, where the routing process is still done ...
Sahril Amuda   +2 more
semanticscholar   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Home - About - Disclaimer - Privacy