Journal articles on the topic 'GNS3'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'GNS3.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wijaya, Herry Derajad, Rahmat Rian Hidayat, and Teuku Ahmad Aliyansyah. "KEGIATAN PEMBELAJARAN JARINGAN KOMPUTER DENGAN STATIC ROUTING PROTOCOL MENGGUNAKAN GNS3 UNTUK SISWA SMK YMIK PADA WILAYAH JOGLO." Jurnal Abdi Masyarakat (JAM) 5, no. 2 (January 16, 2020): 10. http://dx.doi.org/10.22441/jam.2020.v5.i2.003.
Full textRamli, Ayyub, Sriyono Sriyono, and Harry Ramza. "Analisa Kecepatan Lalu Lintas Data Jaringan Local Area Network Menggunakan Graphical Network Simulator 3 (GNS-3)." Electrical Engineering Acta 1, no. 1 (May 14, 2021): 13–19. http://dx.doi.org/10.22236/ate.v1i1.6946.
Full textMajid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.
Full textSari, Liska Mey Ika, Puspanda Hatta, Endar Suprih Wihidayat, and FENG Xiao. "A Comparison between the Use of Cisco Packet Tracer and Graphical Network Simulator 3 as Learning Media on Students’ Achievement." Jurnal Pendidikan Teknologi dan Kejuruan 24, no. 1 (April 17, 2018): 132–36. http://dx.doi.org/10.21831/jptk.v24i1.16042.
Full textMahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (June 2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.
Full textAmarudin, Amarudin. "Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking." Jurnal Teknoinfo 12, no. 2 (July 16, 2018): 72. http://dx.doi.org/10.33365/jti.v12i2.121.
Full textBayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1, no. 2 (October 15, 2018): 55–60. http://dx.doi.org/10.24246/j.icm.2018.v1.i2.p55-60.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textFITRIYANTI, RAMADHINA, LINDAWATI LINDAWATI, and ARYANTI ARYANTI. "Analisis Perbandingan Mean Opinion Score Aplikasi VoIP Facebook Messenger dan Google Hangouts menggunakan Metode E-Model pada Jaringan LTE." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 3 (October 18, 2018): 379. http://dx.doi.org/10.26760/elkomika.v6i3.379.
Full textYasin, Alimuddin, and Salman Suleman. "Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3." Jurnal Teknologi Informasi Indonesia (JTII) 3, no. 1 (June 1, 2018): 15. http://dx.doi.org/10.30869/jtii.v3i1.182.
Full textElhanafi, Andi Marwan, Imran Lubis, Dedy Irwan, and Abdullah Muhazir. "Simulasi Implementasi Load Balancing PCC Menggunakan Simulator Gns3." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 2 (October 15, 2018): 12–18. http://dx.doi.org/10.34012/jutikomp.v1i2.236.
Full textN S, Apoorva, Namratha H, and Anil Umesh. "Implementation of OSPF on a Network Using GNS3 Tool." IJARCCE 8, no. 5 (May 30, 2019): 274–78. http://dx.doi.org/10.17148/ijarcce.2019.8550.
Full textGeng, Qiang, and Xueqin Huang. "VRRP Load Balance Technology Simulation Practice Based on GNS3." MATEC Web of Conferences 228 (2018): 03012. http://dx.doi.org/10.1051/matecconf/201822803012.
Full textMagalhães, David Fernandes, Polycarpo Sousa Neto, and Edson Silva Almeida. "Utilização do GNS- 3 como alternativa práticano estudo de redes MPLS." Revista Principia - Divulgação Científica e Tecnológica do IFPB 1, no. 34 (June 1, 2017): 101. http://dx.doi.org/10.18265/1517-03062015v1n34p101-108.
Full textKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Full textYang, Fan, and Li Zhen Zhao. "Network Case Establishment and Application Research under Portable Network Environment." Advanced Materials Research 998-999 (July 2014): 1157–60. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1157.
Full textSrivastava, Rishabh. "Route Redistribution between EIGRP and OSPF Routing Protocol Using GNS3 Sofware." International Journal for Research in Applied Science and Engineering Technology V, no. XI (November 20, 2017): 1232–37. http://dx.doi.org/10.22214/ijraset.2017.11180.
Full textAhmad Al-Hadidi, Moh\'d Rasoul, Mohammed Yousef Al-Gawagzeh, Nayel Al-Zubi, Bayan Al-Saaidah, and Mohammed Alweshah. "Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3." Research Journal of Applied Sciences, Engineering and Technology 8, no. 8 (August 25, 2014): 989–94. http://dx.doi.org/10.19026/rjaset.8.1060.
Full textSusueno, Hendra Bayu, Imam Tri Wibowo, Siti Ummi Masruroh, Dewi Khairani, and I’im Umamil Khoiri. "Analisis Routing Protocol Is-Is Dengan MPLS Traffic Engineering Menggunakan GNS3." Jurnal Ilmiah FIFO 13, no. 1 (December 20, 2021): 32. http://dx.doi.org/10.22441/fifo.2021.v13i1.004.
Full textJuliantara Putra, I. Gede, Pande Ketut Sudiarta, and I. Made Arsa Suyadnya. "ANALISIS PERBANDINGAN ROUTING OSPF PADA JARINGAN MPLS DAN TANPA MPLS MENGGUNAKAN GNS3." Jurnal SPEKTRUM 4, no. 1 (July 4, 2017): 1. http://dx.doi.org/10.24843/spektrum.2017.v04.i01.p01.
Full textMardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (December 1, 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.
Full textYosif Al-Gadi, Ghaida Yagoub Ahmed. "Evaluation and Comparisons of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator." IOSR Journal of Engineering 4, no. 8 (August 2014): 51–57. http://dx.doi.org/10.9790/3021-04845157.
Full textEly Kurniawan, Dwi, Hamdani Arif, N. Nelmiawati, Ahmad Hamim Tohari, and Maidel Fani. "Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator." Journal of Physics: Conference Series 1175 (March 2019): 012031. http://dx.doi.org/10.1088/1742-6596/1175/1/012031.
Full textNurdiansyah, Yanuar, Nail Pratama, Muhammad Ifantara Putra, and Muhammad Ali Sya’roni. "Analisis Perbandingan Metode Interior Gateway Protocol RIP Dengan OSPF Pada Jaringan MPLS-VPLS." INFORMAL: Informatics Journal 5, no. 2 (August 30, 2020): 49. http://dx.doi.org/10.19184/isj.v5i2.18668.
Full textZhao, Li Zhen, Fan Yang, and Yu Ming Zhao. "The Simulation Research of Campus Network Technology Based on IPv6." Advanced Materials Research 850-851 (December 2013): 405–9. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.405.
Full textShabalin, A. M., and E. A. Kaliberda. "DEVELOPMENT OF A SET OF PROCEDURES FOR PROVIDING REMOTE ACCESS TO A CORPORATE COMPUTER NETWORK BY MEANS OF THE SSH PROTOCOL (USING THE EXAMPLE OF THE CISCO IOS OPERATING SYSTEM)." Dynamics of Systems, Mechanisms and Machines 9, no. 3 (2021): 122–27. http://dx.doi.org/10.25206/2310-9793-9-3-122-127.
Full textShen, Zhe Jian, and Yun Sheng Ge. "Network Topology Discovery Algorithm Based on OSPF Link State Advertisement." Applied Mechanics and Materials 644-650 (September 2014): 3203–7. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3203.
Full textLópez, Danilo A., Cesar A. Hernández, and Octavio Salcedo Parra. "Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble." Revista Tecnura 16, no. 32 (June 18, 2012): 50. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.2.a04.
Full textSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Full textLi, Xiao Hua, Ren Long Zhang, Yu Jie Wang, Li Yang, Juan Nie, and Quan Yue Yang. "GNS-Based Simulation and Analysis of OSPFv2 Neighbor Authentication." Advanced Materials Research 989-994 (July 2014): 4603–7. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4603.
Full textLi, Xiao Hua, Xian Gang Zhao, Ren Long Zhang, Shu Yan Xu, and Li Yang. "Simulation and Analysis of OSPFv2 Neighbor Authentication Based on GNS." Advanced Engineering Forum 6-7 (September 2012): 876–81. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.876.
Full textAlzaid, Wael, and Biju Issac. "Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks." International Journal of Business Data Communications and Networking 12, no. 1 (January 2016): 36–62. http://dx.doi.org/10.4018/ijbdcn.2016010103.
Full textLahusen, Irwin Wijaya, Widyawan Widyawan, and Sri Suning Kusumawardani. "Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN)." IJID (International Journal on Informatics for Development) 8, no. 1 (June 22, 2019): 20. http://dx.doi.org/10.14421/ijid.2019.08104.
Full textNedyalkov, Ivan. "Performance comparison between virtual MPLS IP network and real IP network without MPLS." International journal of electrical and computer engineering systems 12, no. 2 (June 21, 2021): 83–90. http://dx.doi.org/10.32985/ijeces.12.2.3.
Full textHariadi, Muhamad, Wire Bagye, and Mohammad Taufan Asri Zaen. "MEMBANGUN SERVER HOTSPOT BERBASIS MIKROTIK DI SMAN 1 PRAYA TENGAH." Jurnal Informatika dan Rekayasa Elektronik 2, no. 1 (April 30, 2019): 70. http://dx.doi.org/10.36595/jire.v2i1.92.
Full textMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Full textAdmin, Admin. "A SIMULASI TUNNELING IPV6 OVER IPV4." Journal of Informatics and Communication Technology (JICT) 1, no. 1 (July 17, 2019): 49–58. http://dx.doi.org/10.52661/j_ict.v1i1.15.
Full textNurhayati, Ade, and Septi Ayu Putri. "SIMULASI TUNNELING IPV6 OVER IPV4." Journal of Informatics and Communication Technology (JICT) 1, no. 1 (July 23, 2019): 1–10. http://dx.doi.org/10.52661/j_ict.v1i1.19.
Full textYadav, Sumit Kumar, Kavita Sharma, and Arushi Arora. "Security Integration in DDoS Attack Mitigation Using Access Control Lists." International Journal of Information System Modeling and Design 9, no. 1 (January 2018): 56–76. http://dx.doi.org/10.4018/ijismd.2018010103.
Full textRamadhan, Hardiyan Kesuma, and Sukma Wardhana. "Computer Networks Optimization using Load Balancing Algorithms on the Citrix ADC Virtual Server." Jurnal Online Informatika 6, no. 1 (June 17, 2021): 103. http://dx.doi.org/10.15575/join.v6i1.672.
Full textZhabayev, Ye H. "USING NETEMUL TO MODEL AND SIMULATE COMPUTER NETWORKS." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (June 30, 2020): 216–22. http://dx.doi.org/10.51889/2020-2.1728-7901.34.
Full textNurhayati, Ade, Risnu Pradana Holiyastuta, and Ade Rahmat Iskandar. "Implementasi Virtual Private Network Pada Jaringan Multi Protocol Label Switching Traffic Engineering." Journal of Informatics and Communication Technology (JICT) 2, no. 1 (July 2, 2020): 11–18. http://dx.doi.org/10.52661/j_ict.v2i1.47.
Full textHayati, Isnaini, and Mochammad Teguh Kurniawan. "Perancangan Infrastruktur LAN Pada Yayasan Kesehatan (Yakes) Telkom Bandung Dengan Model Cisco Three Layer Hierarchical Menggunakan Metodologi Network Development Life Cycle (NDLC)." Jurnal Rekayasa Sistem & Industri (JRSI) 3, no. 04 (November 8, 2017): 100. http://dx.doi.org/10.25124/jrsi.v3i04.278.
Full textGelvez García, Nancy Yaneth, Danilo Alfonso López Sarmiento, and Edwin Rivas Trujillo. "PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4." Redes de Ingeniería 4 (September 26, 2013): 36. http://dx.doi.org/10.14483/2248762x.6366.
Full textHaryoyudhanto, Hendy Dwi, Iskandar Fitri, and Andri Aningsih. "Implementasi Encapsulation Jaringan Redudansi VLAN Menggunakan Metode Hot Standby Router Protocol (HSRP)." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 49. http://dx.doi.org/10.31328/jointecs.v5i1.1247.
Full textVerawardina, Unung. "Analisis Perbedaan Peformance dan Quality Of Service (Qos) Antara Eigrp dengan Ospf (Studi Kasus Menggunakan 6 Router Melalui GNS 3 dan Wireshark)." International Journal of Natural Science and Engineering 2, no. 1 (April 18, 2018): 10. http://dx.doi.org/10.23887/ijnse.v2i1.13908.
Full textHuang, Chien-Lin, Hsuan-Hua Wu, Yung-Ching Jeng, and Wei-Zhi Liang. "Electrospun Graphene Nanosheet-Filled Poly(Trimethylene Terephthalate) Composite Fibers: Effects of the Graphene Nanosheet Content on Morphologies, Electrical Conductivity, Crystallization Behavior, and Mechanical Properties." Polymers 11, no. 1 (January 17, 2019): 164. http://dx.doi.org/10.3390/polym11010164.
Full textSugai, Rie, Hisayo Shimizu, Ken-ichi Nishiyama, and Hajime Tokuda. "Overexpression of yccL (gnsA) andydfY (gnsB) Increases Levels of Unsaturated Fatty Acids and Suppresses both the Temperature-SensitivefabA6 Mutation and Cold-SensitivesecG Null Mutation of Escherichia coli." Journal of Bacteriology 183, no. 19 (October 1, 2001): 5523–28. http://dx.doi.org/10.1128/jb.183.19.5523-5528.2001.
Full textZhang, Dong Dong, Dong Lin Zhao, and Bin He. "Effect of Graphene Structure on Mechanical Properties of Graphene/Epoxy Nanocomposites." Advanced Materials Research 873 (December 2013): 496–502. http://dx.doi.org/10.4028/www.scientific.net/amr.873.496.
Full textMoreira Santos, María Genoveva, and Pedro Antonio Alcívar Marcillo. "Security in the data link layer of the OSI model on LANs wired Cisco." Journal of Science and Research: Revista Ciencia e Investigación 3, CITT2017 (February 23, 2018): 106–12. http://dx.doi.org/10.26910/issn.2528-8083vol3isscitt2017.2018pp106-112.
Full text