Results 21 to 30 of about 15,889 (249)

Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

open access: yesJurnal Elkomika, 2014
ABSTRAK OSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer.
DWI ARYANTA, BAYU AGUNG PRANATA
doaj   +1 more source

Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh

open access: yesJurnal Elkomika, 2014
ABSTRAK EIGRP (Enhanced Interior Gateway Routing Protocol) dan OSPF (Open Shortest Path Fisrt) adalah routing protokol yang banyak digunakan pada suatu jaringan komputer.
DWI ARYANTA   +2 more
doaj   +1 more source

RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2020
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached.
Nuur Wachid Abdul Majid, Syifaul Fuada
doaj   +1 more source

OSPF u mrežama preklopnika

open access: yesPolytechnic and design, 2015
Routing protocols are used by routers or higherlevel switch interconnection. The most used protocols are the following: Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), Intermediate System to Intermediate System (IS-IS), and Border Gateway Protocol (BGP).
Jambrek, Stjepan, Žigman, Dubravko
openaire   +5 more sources

Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP

open access: yesAvances, 2019
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas   +2 more
doaj   +1 more source

Yeast functional genomic screens lead to identification of a role for a bacterial effector in innate immunity regulation. [PDF]

open access: yesPLoS Pathogens, 2007
Numerous bacterial pathogens manipulate host cell processes to promote infection and ultimately cause disease through the action of proteins that they directly inject into host cells.
Roger W Kramer   +7 more
doaj   +1 more source

Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)

open access: yesIJID (International Journal on Informatics for Development), 2019
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication ...
Muhammad Nur Alfani, Bambang Sugiantoro
doaj   +1 more source

Toward designing a quantum key distribution network simulation model [PDF]

open access: yes, 2016
As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical ...
Chromý, Erik   +3 more
core   +2 more sources

Comparison and Analysis of Routing Protocols Using Riverbed Modeler

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2019
In recent years several routing protocols have beenproposed to be used on different types of networks. Some comparative studieswere carried out to analyze and compare the performance of several routingprotocols over Local Area Network (LAN). In this work,
Mahdi Ali Warsame, Abdullah Sevin
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Home - About - Disclaimer - Privacy