Results 71 to 80 of about 6,200 (248)

Design Analysis of OSPF (Open Shortest Path First) Routing by Calculating Packet Loss Of Network WAN (Wide Area Network)

open access: yesJournal of Physics: Conference Series, 2019
In companies both large and small, they must always communicate and exchange data to other divisions at a considerable distance. In carrying out the process of data exchange, it is not uncommon for the data to suffer damage and some do not even reach the
T. M. Diansyah   +5 more
semanticscholar   +1 more source

Low Latency 5G IP Transmission Backhaul Network Architecture: A Techno‐Economic Analysis

open access: yesWireless Communications and Mobile Computing, Volume 2024, Issue 1, 2024.
The steeply rising demand for mobile data drives the investigation of the transmission backhaul network architecture and cost for the fifth generation (5G) of mobile technologies. The proposed backhaul architecture will facilitate high throughput, low latency, scalability, low cost of ownership, and high capacity backhaul for 5G mobile technologies ...
Ibrahim Alhassan Gedel   +2 more
wiley   +1 more source

Optimizing IIoT Performance: Intelligent Selection of SDN Controllers through AHP Analysis

open access: yesInternational Journal of Intelligent Systems, Volume 2024, Issue 1, 2024.
This article deals with the use of software‐defined networking (SDN) in the Industrial Internet of Things (IIoT). The use of SDN in IIoT can solve the limitations presented by traditional networks in order to guarantee quality of service (QoS) for new applications.
Claudio Urrea   +2 more
wiley   +1 more source

Analisis Perbandingan Routing Protocol Open Shortest Path First dan Enhanced Interior Gateway Routing Protocol pada IPV6 menggunakan Graphical Network Simulator 3

open access: yesMajalah Ilmiah Teknologi Elektro, 2019
Along with technological developments, implementing network computers can use network simulators. The use of network simulators that are often used, one of which is the Graphical User Interface (GUI) and the operating system provided by the user because ...
Made Dinda Pradnya Pramita, Lie Jasa
doaj   +1 more source

Performance Comparison based on Open Shortest Path First (OSPF) Routing Algorithm for IP Internet Networks

open access: yesCommunications on Applied Electronics, 2019
Due to the rapid development of technology, the higher demands of internet network users who want a form of network that can provide maximum results are increasing.
Ida Nurhaida, Desi Ramayanti, Imay Nur
semanticscholar   +1 more source

Analisis Perancangan dan Implementasi FHRP di Protokol Routing RIPv2 dan OSPF

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown.
Ramdhani Syahputra   +2 more
doaj   +1 more source

Engineering wired network performance enhancement in a route redistributed simulation based systems [PDF]

open access: yesBig Data and Computing Visions
As organizations keep expanding every day, there is a rapidly increasing need for communication networks to share routing information amongst the different routing protocols reliably.
Aniekan Ikpe, Imoh Ekanem
doaj   +1 more source

Analisis Perbandingan Kinerja Routing OSPF Dan EIGRP

open access: yesIT Journal Research and Development, 2018
Dunia teknologi saat ini mengalami perkembangan yang cepat, terlebih pada teknologi internet. Teknlogi internet merupakan sebuah teknologi yang saat ini banyak digunakan oleh manusia untuk berkomunikasi dan mengirim berbagai data dalam jarak yang saling ...
Yoldi Novendra   +2 more
doaj   +1 more source

Design and implementation of OSPF vulnerability analysis and detection system

open access: yesTongxin xuebao, 2013
A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model ...
Zun-ying QIN   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy