To see the other types of publications on this topic, follow the link: GNS3.

Journal articles on the topic 'GNS3'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'GNS3.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wijaya, Herry Derajad, Rahmat Rian Hidayat, and Teuku Ahmad Aliyansyah. "KEGIATAN PEMBELAJARAN JARINGAN KOMPUTER DENGAN STATIC ROUTING PROTOCOL MENGGUNAKAN GNS3 UNTUK SISWA SMK YMIK PADA WILAYAH JOGLO." Jurnal Abdi Masyarakat (JAM) 5, no. 2 (January 16, 2020): 10. http://dx.doi.org/10.22441/jam.2020.v5.i2.003.

Full text
Abstract:
Static routing merupakan pengaturan routing paling sederhana yang dapat dilakukan pada jaringan komputer, dikonfigurasi secara manual dan dapat digunakan pada jaringan yang cakupannya kecil (LAN). Salah satu programuntuk menstimulasi topologi jaringan yaitu GNS3 (Graphical Network Simulator 3). Program simulator GNS3 dapat berjalan di berbagai OS, seperti Windows,Linux, dan Mac OS X. Pelatihan GNS3 yang diselenggarakan oleh Dosen Universitas Mercu Buana di SMP YMIK Joglo yang merupakan bentuk pengabdian masyarakat terhadap Tridharma Perguruan Tinggi dilakukan atas dasar siswa dan guru SMP YMIK belum pernah mendapatkan pembelajaran instalasi Sistem Operasi dan Konfigurasi Komputer jaringan lokal. Adapun hasil dari program ini adalah respons positif dan antusiasme para peserta selama pelatihan berlangsung serta menambah keterampilan mereka dalam konfigurasi jaringan komputer dengan static routing protocol menggunakan GNS3.
APA, Harvard, Vancouver, ISO, and other styles
2

Ramli, Ayyub, Sriyono Sriyono, and Harry Ramza. "Analisa Kecepatan Lalu Lintas Data Jaringan Local Area Network Menggunakan Graphical Network Simulator 3 (GNS-3)." Electrical Engineering Acta 1, no. 1 (May 14, 2021): 13–19. http://dx.doi.org/10.22236/ate.v1i1.6946.

Full text
Abstract:
Perkembangan teknologi informasi tidak bisa dipisahkan dari perkembangan teknologi dan infrastruktur jaringan komputer. Pembuatan suatu jaringan diperlukan perancangan dan simulasi terlebih dahulu supaya hasilnya sesuai dengan keinginan atau mendapatkan sesuatu yang maksimal. Banyak sekali komponen yang dapat digunakan untuk perancangan seperti router. Router sendiri memiliki banyak system operasi contohnya router MikrotikOS. Jurnal ini untuk merancang dan mensimulasikan jaringan komputer. Perancangan dan simulasi jaringan komputer dapat menggunakan aplikasi Graphical Network Simulator 3(GNS3). GNS3 adalah software simulasi jaringan komputer berbasis GUI yang mirip dengan Cisco Packet Tracer. Namun pada GNS3 memungkinkan simulasi jaringan yang komplek, karena menggunakan operating system asli dari perangkat jaringan seperti cisco, mikrotik dan juniper. Sehingga kita berada kondisi lebih nyata dalam mengkonfigurasi router langsung daripada di Cisco Packet Tracer. Berbeda dengan Cisco Packet Tracer, pada GNS3 harus menginstal terlebih dahulu system operasi dari router itu sendiri yaitu router MikrotikOS maupun CiscoIOS. Di dalam penulisan ini akan dibahas mengenai bagaimana merancang dan mensimulasikan jaringan komputer menggunakan aplikasi GNS3 dengan konfigurasi yang baik dan benar sehingga dapat diterapkan dengan baik.
APA, Harvard, Vancouver, ISO, and other styles
3

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Sari, Liska Mey Ika, Puspanda Hatta, Endar Suprih Wihidayat, and FENG Xiao. "A Comparison between the Use of Cisco Packet Tracer and Graphical Network Simulator 3 as Learning Media on Students’ Achievement." Jurnal Pendidikan Teknologi dan Kejuruan 24, no. 1 (April 17, 2018): 132–36. http://dx.doi.org/10.21831/jptk.v24i1.16042.

Full text
Abstract:
Usually in studying the practice of computer networks, it is encountered several obstacles such as (1) limited computer networks design tools, (2) limited learning time to design computer networks and (3) technical difficulties for finding the solutions of errors. To overcome those barriers as proposed in this study, computer network simulators were used. Computer network simulators were expected to help students designing and simulating networks planned to be applied to computer network practices. This study used two simulators to compare its effectiveness in assisting the students to learn computer networks, which were Cisco Packet Tracer and Graphical Network Simulator 3 (GNS3). This study was aimed to determine the difference of the influence of network simulators to (1) learning achievement, and (2) learning achievement improvement. The quasi-experiment method was used and data were collected through conducting testing before and after the utilization of the simulators. Based on the testing results it was concluded that (1) different effect of using Cisco Packet Tracer and GNS3, the average grade achievement in the class using GNS3 and using Cisco packet tracer were 76.67 and 70 respectively, and (2) improved learning achievement using GNS3 for around 35%, higher than using Cisco Packet Tracer.
APA, Harvard, Vancouver, ISO, and other styles
5

Mahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (June 2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amarudin, Amarudin. "Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking." Jurnal Teknoinfo 12, no. 2 (July 16, 2018): 72. http://dx.doi.org/10.33365/jti.v12i2.121.

Full text
Abstract:
Keamanan jaringan merupakan salah satu hal terpenting dalam implementasi jaringan komputer.Tidak sedikit jaringan komputer yang mengalami masalah yang disebabkan oleh kelalaian pengelola jaringan dalam membangun sebuah jaringan komputer. Dikarenakan kelalaian tersebut sehingga dapat membuka peluang bagi para hacker untuk meretas dan merusak jaringan yang dibangun tersebut.Untuk meminimalisir terjadinya penyalahgunaan jaringan oleh para hecker, maka perlu adanya peningkatan keamanan jaringan yang akan dibangun. Dalam penelitian ini telah dilakukan penelitian untuk mengembangkan keamanan jaringan komputer dengan cara penggunakan metode Port Knocking. Adapun untuk mempermudah dalam mendesain dan menguji jaringan yang akan dibangun perlu adanya simulator yang digunakan. Dalam penelitian ini menggunakan simulator GNS3 untuk mendesain dan mensimulasikan topologi keamanan jaringan. Berdasarkan peneltian yang telah dilakukan bahwasanya simulator GNS3 dapat dengan mudah deterapkan dalam mendesain topologi jaringnan maupun dalam mensimulasikan pengujian keamanan jaringan khususnya pada metode keamanan Port Knocking. Berdasarkan hasil penelitian yang telah dilakukan juga didapatkan hasil bahwasanya Metode Port Knocking dapat diterapkan untuk mengamankan Router dari akses orang lain yang tidak berhak mengaksesnya.Kata kunci: Mikrotik Router OS, Topology, Simulator GNS3, Network Security, Port Knocking, Hacking
APA, Harvard, Vancouver, ISO, and other styles
7

Bayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1, no. 2 (October 15, 2018): 55–60. http://dx.doi.org/10.24246/j.icm.2018.v1.i2.p55-60.

Full text
Abstract:
Keamanan jaringan di era ini sangat dibutuhkan, dibalik kemudahan dalam mengakses informasi terdapat pula banyak ancaman. Dengan aplikasi GNS3 pengguna dapat membuat simulasi jaringan dengan perangkat yang dibutuhkan seperti aslinya serta dalam perangkat dapat dikonfigurasi langsung. Pada simulasi ini membuat Perancangan Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan penggunaan ACL solution serta trusted-servers yang menjadi salah satu cara agar menjadikan jaringan tersebut tetap aman dan stabil. Dari hasil penelitian yang dilakukan GNS3 mampu Merancangan Keamanan Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan memasukkan ACL solution serta fitur trusted-servers ke dalam switch ExtremeXOS.
APA, Harvard, Vancouver, ISO, and other styles
8

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
9

FITRIYANTI, RAMADHINA, LINDAWATI LINDAWATI, and ARYANTI ARYANTI. "Analisis Perbandingan Mean Opinion Score Aplikasi VoIP Facebook Messenger dan Google Hangouts menggunakan Metode E-Model pada Jaringan LTE." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 3 (October 18, 2018): 379. http://dx.doi.org/10.26760/elkomika.v6i3.379.

Full text
Abstract:
ABSTRAKPenelitian ini membahas mengenai perbandingan kualitas layanan dua aplikasi VoIP yaitu Facebook Messenger dan Google Hangouts pada jaringan LTE. Kualitas layanan dua aplikasi tersebut ditinjau menggunakan Mean Opinion Score dengan metode objektif yaitu, E-Model. Nilai MOS kedua aplikasi didapatkan dengan menjalankan simulasi menggunakan GNS3 yang berfungsi untuk mensimulasikan topologi jaringan dengan menggunakan router MikroTik. Setelah itu, dilakukan pengukuran parameter QoS yaitu, delay dan packet loss yang terjadi pada saat melakukan panggilan yang berlangsung selama satu jam. Dari hasil pengujian, diperoleh bahwa nilai MOS pada Google Hangouts lebih besar dibandingkan dengan Facebook Messenger, yaitu 4.0. Sedangkan pada Facebook Messenger hanya sebesar 3.6. Jika dikorelasikan ke tingkat kepuasan pengguna untuk mendapatkan nilai MOS, Google Hangouts dikategorikan "baik" dan Facebook Messenger dikategorikan "cukup baik".Kata kunci: MOS, LTE, VoIP, E-Model, GNS3 ABSTRACTThis study discusses the comparison of the quality of service of two VoIP applications, Facebook Messenger and Google Hangouts on LTE networks. The service quality of the two applications is reviewed using the Mean Opinion Score with an objective method namely, E-Model. MOS values from both applications are obtained by running simulations using GNS3 which can simulate network topology using a MikroTik router. After that, QoS parameters are measured, which are delay and packet loss during the call process which lasts one hour. From the test results, it was found that the MOS value on Google Hangouts was greater than Facebook Messenger, that is 4.0 while on Facebook Messenger only 3.6. If correlated with the level of user satisfaction to get MOS value, Google Hangouts is categorized as "good" and Facebook Messenger is categorized as "good enough".Keywords: MOS, LTE, VoIP, E-Model, GNS3
APA, Harvard, Vancouver, ISO, and other styles
10

Yasin, Alimuddin, and Salman Suleman. "Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3." Jurnal Teknologi Informasi Indonesia (JTII) 3, no. 1 (June 1, 2018): 15. http://dx.doi.org/10.30869/jtii.v3i1.182.

Full text
Abstract:
Abstract— Software Defined Network (SDN) adalah teknologi baru dalam jaringan komputer. Dimana dalam arsitektur ini control plane terpisah dengan data plane. Controller sebagai control plane dan switch sebagai data plane yang dihubungkan oleh protokol openflow. Teknologi ini masih dalam tahap pengembangan sehingga isu keamanan masih terbuka lebar untuk diteliti terlebih serangan dampak Distrubuted Denial of Service (DDoS) pada switch openflow. Untuk mensimulasikan serangan DDoS di jaringan SDN dipilih software simulator GNS3 untuk mensimulasikan arsitektur jaringan SDN untuk menguji dampak serangan DDoS terhadap kualitas jaringan saat serangan DDoS terjadi. Serangan DDoS dapat mempengaruhi kualitas jaringan di Arsitektur jaringan SDN di GNS3 sehingga mengakitbatkan switch openflow tidak dapat berfungsi sementara waktu
APA, Harvard, Vancouver, ISO, and other styles
11

Elhanafi, Andi Marwan, Imran Lubis, Dedy Irwan, and Abdullah Muhazir. "Simulasi Implementasi Load Balancing PCC Menggunakan Simulator Gns3." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 2 (October 15, 2018): 12–18. http://dx.doi.org/10.34012/jutikomp.v1i2.236.

Full text
Abstract:
Kebutuhan komunikasi saat ini sangat penting seiring dengan kemajuan dan perkembangan teknologi komunikasi data yang semakin canggih. Teknologi komunikasi data yang berkembang dari waktu ke waktu sangat pesat. Oleh sebab itu, diperlukan perancangan yang tepat dan handal dalam membangun kualitas jaringan yang baik supaya dapat meningkatkan kinerja dari jaringan tersebut.Dalam hal ini menyebabkan semakin meningkatnya permintaan akan kebutuhan informasi dalam internet, sehingga trafik dalam internet semakin padat oleh permintaan-permintaan akan informasi. Salah satu cara yang dapat digunakan untuk tetap menjaga kualitas koneksi internet adalah dengan menjaga trafik agar tetap berjalan seimbang dan menghemat bandwidth dengan membagi beban ke beberapa jalur atau link dengan menggunakan teknik load balancing dengan menggunakan metode Pcc (Per Connection Classifier). Berdasarkan penelitian yang telah dilakukan maka beban trafick yang diperoleh jadi lebih lancer tanpa ada penumpukan data.
APA, Harvard, Vancouver, ISO, and other styles
12

N S, Apoorva, Namratha H, and Anil Umesh. "Implementation of OSPF on a Network Using GNS3 Tool." IJARCCE 8, no. 5 (May 30, 2019): 274–78. http://dx.doi.org/10.17148/ijarcce.2019.8550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Geng, Qiang, and Xueqin Huang. "VRRP Load Balance Technology Simulation Practice Based on GNS3." MATEC Web of Conferences 228 (2018): 03012. http://dx.doi.org/10.1051/matecconf/201822803012.

Full text
Abstract:
This paper introduced the working principle of VRRP Load Balance Technology and technical detail. Through simulation software GNS3 it constructed the Load Balance network, and configured the VRRP technology, which causes the different local area network to data flow load balance through the VRRP technology, when a single point of failure occurs, the gateway can be migrated adaptively without affect the normal use of the network. It provides a flexible and effective solution to implement the load balance lab environment.
APA, Harvard, Vancouver, ISO, and other styles
14

Magalhães, David Fernandes, Polycarpo Sousa Neto, and Edson Silva Almeida. "Utilização do GNS- 3 como alternativa práticano estudo de redes MPLS." Revista Principia - Divulgação Científica e Tecnológica do IFPB 1, no. 34 (June 1, 2017): 101. http://dx.doi.org/10.18265/1517-03062015v1n34p101-108.

Full text
Abstract:
Este trabalho tem por objetivo mostrar o GNS3, como ferramenta educacional alternativa a falta de equipamentos, auxiliando no estudo de redes complexas, como as redes MPLS. A capacidade de emulação dos sistemas operacionais presentes nos roteadores Cisco (Cisco IOS), possibilidade de inclusão de maquinas virtuais nos cenários e de dispositivos que simulam equipamentos reais, o tornam uma poderosa ferramenta na simulação de redes e serviços de forma totalmente gratuita. O MPLS é um protocolo baseado em pacotes rotulados, onde cada rótulo representa um índice na tabela de roteamento do próximo roteador. Neste trabalho utilizaremos o software GNS3 para simular redes MPLS, mostrando os recursos do software e o aprendizado favorecido pelo seu uso, podendo ser adotado pelos professores das disciplinas de Redes de Computadores, contribuindo para um melhor entendimento dos conteúdos, tal qual é abordado na disciplina de Redes de Computadores 2, do curso de Engenharia de Telecomunicações, assim como na disciplina de Redes de Alta Velocidade do Tecnólogo em Telemática do Instituto Federal do Ceará (IFCE).
APA, Harvard, Vancouver, ISO, and other styles
15

Korniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.

Full text
Abstract:
This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the network, Third-party Applications for network packet analysis are supported. Depending on the hardware platform on which GNS3 will be used, it is possible to build complex projects consisting of routers Cisco, Cisco ASA, Juniper, as well as servers running network operating systems. Using modeling in the design of computing systems, you can: estimate the bandwidth of the network and its components; identify vulnerability in the structure of computing system; compare different organizations of a computing system; make a perspective development forecast for computer system; predict future requirements for network bandwidth; estimate the performance and the required number of servers in the network; compare various options for computing system upgrading; estimate the impact of software upgrades, workstations or servers power, network protocols changes on the computing system. Research computing system parameters with different characteristics of the individual components allows us to select the network and computing equipment, taking into account its performance, quality of service, reliability and cost. As the cost of a single port in active network equipment can vary depends on the manufacturer's equipment, technology used, reliability, manageability. The modeling can minimize the cost of equipment for the computing system. The modeling becomes effective when the number of workstations is 50-100, and when it more than 300, the total savings could reach 30-40% of project cost
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Fan, and Li Zhen Zhao. "Network Case Establishment and Application Research under Portable Network Environment." Advanced Materials Research 998-999 (July 2014): 1157–60. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1157.

Full text
Abstract:
by using network simulation software GNS3 and VirtualBox virtual machine to build a portable network operation platform, we have put forward network case establishment and built specific practical network cases that have been applied in teaching, which has changed “static image projection” of network cases’ theoretical classes to “dynamic demo” and provided a complete technical reference for students’ practical training.
APA, Harvard, Vancouver, ISO, and other styles
17

Srivastava, Rishabh. "Route Redistribution between EIGRP and OSPF Routing Protocol Using GNS3 Sofware." International Journal for Research in Applied Science and Engineering Technology V, no. XI (November 20, 2017): 1232–37. http://dx.doi.org/10.22214/ijraset.2017.11180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmad Al-Hadidi, Moh\'d Rasoul, Mohammed Yousef Al-Gawagzeh, Nayel Al-Zubi, Bayan Al-Saaidah, and Mohammed Alweshah. "Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3." Research Journal of Applied Sciences, Engineering and Technology 8, no. 8 (August 25, 2014): 989–94. http://dx.doi.org/10.19026/rjaset.8.1060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Susueno, Hendra Bayu, Imam Tri Wibowo, Siti Ummi Masruroh, Dewi Khairani, and I’im Umamil Khoiri. "Analisis Routing Protocol Is-Is Dengan MPLS Traffic Engineering Menggunakan GNS3." Jurnal Ilmiah FIFO 13, no. 1 (December 20, 2021): 32. http://dx.doi.org/10.22441/fifo.2021.v13i1.004.

Full text
Abstract:
In the digital era is , the internet becomes a necessity . the increasing number of internet usage by various parties encourages ISPs to improve their service quality . To overcome the problem the IETF has introduced a service Multiprotcol . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calculate the many routes efficiently through the network to the router tip of the tail of the LSP. TE consists of three steps principal that is the size , model, and control . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calculate the many routes efficiently through the network to the router tip of the tail of the LSP. ISIS is one of the routing protocol that was created for the OSI mode, using the method of link state as a method of collecting the route , ISIS also will perform the collection of information and the status of all the links that exist in the network . Analysis of the IS-IS routing protocol with the Multiprotocol label switch Traffic Engineering based on the parameters of quality of service (QoS), namely throughput and packet loss where the simulation uses the GNS3 network emulator. The test results prove that the values of throughput and packet loss are not much different.
APA, Harvard, Vancouver, ISO, and other styles
20

Juliantara Putra, I. Gede, Pande Ketut Sudiarta, and I. Made Arsa Suyadnya. "ANALISIS PERBANDINGAN ROUTING OSPF PADA JARINGAN MPLS DAN TANPA MPLS MENGGUNAKAN GNS3." Jurnal SPEKTRUM 4, no. 1 (July 4, 2017): 1. http://dx.doi.org/10.24843/spektrum.2017.v04.i01.p01.

Full text
Abstract:
Proses routing adalah proses pemilihan jalur paket data dari komputer sumber ke komputer tujuan. Suatu pengiriman paket data (routing) bekerja pada layer 3 OSI, akan tetapi terdapat suatu teknologi baru dalam pengiriman paket data pada layer 2,5 OSI yaitu MPLS. Oleh karena itu, dilakukan penelitian untuk mengetahui perbedaan routing paket data melalui jaringan MPLS dan tanpa MPLS. Metode yang digunakan dengan membangun simulasi jaringan menggunakan 12 router, 4 switch dan 4 vpcs pada emulator GNS3 dengan tiga perlakuan berbeda, yaitu: skema pengujian bitrate sejenis, bitrate tidak sejenis dan salah satu link pada interface terputus (disable) pada jaringan MPLS dan tanpa MPLS. Hasil pengujian tersebut menunjukkan bahwa tidak ada perbedaan rute paket data, hal ini dikarenakan penggunaan jaringan MPLS pada layer 2,5 OSI dalam proses pemilihan rute paket data akan mengikuti mekanisme routing OSPF pada layer 3 OSI.
APA, Harvard, Vancouver, ISO, and other styles
21

Mardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (December 1, 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Full text
Abstract:
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VPN and MPLS VPN network delay has a very good delay value. For throughput on VPN networks have medium quality and MPLS VPN networks have good quality. And for the packet loss value for both types of networks is 0%. This shows that MPLS VPN network throughput has better QoS while for delay and packet loss on VPN and MPLS VPN networks have the same quality value.
APA, Harvard, Vancouver, ISO, and other styles
22

Yosif Al-Gadi, Ghaida Yagoub Ahmed. "Evaluation and Comparisons of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator." IOSR Journal of Engineering 4, no. 8 (August 2014): 51–57. http://dx.doi.org/10.9790/3021-04845157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ely Kurniawan, Dwi, Hamdani Arif, N. Nelmiawati, Ahmad Hamim Tohari, and Maidel Fani. "Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator." Journal of Physics: Conference Series 1175 (March 2019): 012031. http://dx.doi.org/10.1088/1742-6596/1175/1/012031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nurdiansyah, Yanuar, Nail Pratama, Muhammad Ifantara Putra, and Muhammad Ali Sya’roni. "Analisis Perbandingan Metode Interior Gateway Protocol RIP Dengan OSPF Pada Jaringan MPLS-VPLS." INFORMAL: Informatics Journal 5, no. 2 (August 30, 2020): 49. http://dx.doi.org/10.19184/isj.v5i2.18668.

Full text
Abstract:
Routing is a process for forwarding network packets from one network such as static routing and dynamic routing. This research will evaluate and implement protocols in dynamic routing such as RIP (Routing Information Protocol) and OSPF (Open Short Path First). What will later be simulated with GNS3, from this study will be obtained results For traceroute, OSPF is about 7% faster than RIP time, while for ping, OSPF is 5.9% faster than RIP and for traceroute in the topology the average result of the average traceroute time is 2.58 for RIP and 2.23 for OSPF.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhao, Li Zhen, Fan Yang, and Yu Ming Zhao. "The Simulation Research of Campus Network Technology Based on IPv6." Advanced Materials Research 850-851 (December 2013): 405–9. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.405.

Full text
Abstract:
Aiming at the issues of smooth transition from IPv4 to IPv6 and interoperability in technical coexistence period about campus network, discussing the technical characteristics of IPv6 protocol, GNS3 and OPNET simulator, combined with the status of weakness of IPv6 technology, lack of IPv6 technology planning and financial support for network upgrade in the vast majority of colleges, adopted the simulation methods to build a network model of IPv4 and IPv6 to achieve the technologies study such as topology design, network configuration and testing, network performance design and evaluation of IPv6 campus network under the low-cost conditions.
APA, Harvard, Vancouver, ISO, and other styles
26

Shabalin, A. M., and E. A. Kaliberda. "DEVELOPMENT OF A SET OF PROCEDURES FOR PROVIDING REMOTE ACCESS TO A CORPORATE COMPUTER NETWORK BY MEANS OF THE SSH PROTOCOL (USING THE EXAMPLE OF THE CISCO IOS OPERATING SYSTEM)." Dynamics of Systems, Mechanisms and Machines 9, no. 3 (2021): 122–27. http://dx.doi.org/10.25206/2310-9793-9-3-122-127.

Full text
Abstract:
В статье предлагаются пути решения проблемы безопасного удаленного доступа к телекоммуникационному оборудованию. Целью исследования является разработка комплекса мер по обеспечению безопасного взаимодействия при удаленной работе с оборудованием Cisco средствами протокола SSH. Данный комплекс мер представляет собой полный перечень мероприятий по обеспечению безопасности удаленного подключения к корпоративной компьютерной сети с использованием современных методов криптографии и технологий сетевого администрирования. Он апробирован на программном эмуляторе GNS3 и телекоммуникационном оборудовании Cisco и позволяет обеспечить высокий уровень конфиденциальности и целостности удаленного подключения к корпоративной компьютерной сети. Кроме того, в ходе исследования выявляются уязвимости операционной системы IOS при работе службы SSH, определяются методики их устранения.
APA, Harvard, Vancouver, ISO, and other styles
27

Shen, Zhe Jian, and Yun Sheng Ge. "Network Topology Discovery Algorithm Based on OSPF Link State Advertisement." Applied Mechanics and Materials 644-650 (September 2014): 3203–7. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3203.

Full text
Abstract:
In large scale network, the problem that network in an area topology accurately be discovered should be solved. The traditional network discovery algorithms mainly use ICMP and SNMP. But these two algorithms allow routers or other devices to send request packets to other devices. It may cause the low utilization rate of network. However, OSPF routing protocol, when it exchange routing tables, it will send LSUs to other routers and receive them from the remote routers. According to analyzing the LSAs, which are encapsulated in LSUs, we can obtain the network topology. We use GNS3 to simulate OSPF environment. Experiment shows that this algorithm can obtain the network topology rapidly and accurately.
APA, Harvard, Vancouver, ISO, and other styles
28

López, Danilo A., Cesar A. Hernández, and Octavio Salcedo Parra. "Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble." Revista Tecnura 16, no. 32 (June 18, 2012): 50. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.2.a04.

Full text
Abstract:
Las técnicas de entunelamiento han sido ampliamente utilizadas para la interconexión de Islas IPv6 a través de infraestructuras de Core nativo MPLS IPv4. Sin embargo, debido a la limitación de escalabilidad, es usual adoptar otras estrategias de interconexión como 6PE o 6VPE, las cuales resultan mucho más complejas de efectuar. El presente artículo propone y implementa a nivel de simulación mediante GNS3+Dynamipsuna solución que hace uso de las técnicas de entunelamiento en los PE (ProviderEdge) (del tipo Doble Pila) de la red, reduciendo así los inconvenientes de escalabilidad propios del mallado de túneles en los enrutadores CE (CustomerEdge) y sin la mayor complejidad y requerimientos en cuanto a equipos propios de las soluciones 6PE y 6VPE.
APA, Harvard, Vancouver, ISO, and other styles
29

Syahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.

Full text
Abstract:
The high reliability of data access has become a problem faced by many companies, institutions, and universities. For this reason, a protocol required that can protect the network from a communication breakdown. One method used to maintain communication is by implementing a protocol redundancy system. One or more routers will act as the primary router for load balancing, and some routers are in standby mode if one main router is down. First hop redundancy protocols (FHRP) is a protocol that implements redundancy and load balancing systems. This protocol can transfer access data traffic if one of the routers on the network is down. FHRP divided into virtual router redundancy protocol (VRRP) and gateway load balancing Protocol (GLBP). This research analyzes the design and implementation to provide information about the quality of VRRP and GLBP services on the main router and the backup router, by using an application graphical network simulator (GNS) simulation 3. In the GNS3 application, a LAN network topology is designed with eight router devices in the form of a ring topology using RIPv2 and OSPF routing protocols, then implemented in protocols VRRP and GLBP. The analysis results show that GLBP can back up the network faster than VRRP when the primary router is down. If implemented into a LAN network with RIPv2 and OSPF routing protocols, VRRP has better service quality than GLBP.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Xiao Hua, Ren Long Zhang, Yu Jie Wang, Li Yang, Juan Nie, and Quan Yue Yang. "GNS-Based Simulation and Analysis of OSPFv2 Neighbor Authentication." Advanced Materials Research 989-994 (July 2014): 4603–7. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4603.

Full text
Abstract:
Routing information release is a kind of promise from the router for network reachability. Illegal routing information may have disastrous effects on the normal work of the network. Open Shortest Path First (OSPF) protocol provides authentication methods to protect the authenticity and integrity of the routing traffic. This paper describes two authentication types of OSPFv2, analyzes the realization mechanism and packet header format of each authentication respectively. Based on GNS3, a typical network topology was designed, and with the aid of it functional verification and security analysis are carried out. The simulation can provide a reference for building an OSPF network. Experimental results show that the configuration of OSPFv2 routing authentication can effectively prevent the router from receiving unauthorized or malicious routing updates, thereby improving network safety.
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Xiao Hua, Xian Gang Zhao, Ren Long Zhang, Shu Yan Xu, and Li Yang. "Simulation and Analysis of OSPFv2 Neighbor Authentication Based on GNS." Advanced Engineering Forum 6-7 (September 2012): 876–81. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.876.

Full text
Abstract:
Routing information release is a kind of promise from the router for network reachability. Illegal routing information may have disastrous effects on the normal work of the network. Open Shortest Path First (OSPF) protocol provides authentication methods to protect the authenticity and integrity of the routing traffic. This paper describes two authentication types of OSPFv2, analyzes the realization mechanism and packet header format of each authentication respectively. Based on GNS3, a typical network topology was designed, and with the aid of it we carried out functional verification and security analysis. The simulation can provide a reference for building an OSPF network. Experimental results show that the configuration of OSPFv2 routing authentication can effectively prevent the router from receiving unauthorized or malicious routing updates, thereby improving network safety.
APA, Harvard, Vancouver, ISO, and other styles
32

Alzaid, Wael, and Biju Issac. "Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks." International Journal of Business Data Communications and Networking 12, no. 1 (January 2016): 36–62. http://dx.doi.org/10.4018/ijbdcn.2016010103.

Full text
Abstract:
IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4 to IPv6 which includes dual stack networks, tunnels and translation technologies. Within all of this, network security is an essential element and therefore requires special attention. This paper analyses two transition technologies which are dual stack and tunnel. Both technologies are implemented using Cisco Packet Tracer and GNS3. This work will also analyse the security issues of IPv6 to outline the most common vulnerabilities and security issues during the transition. Finally, the authors will design and implement the dual stack, automatic and manual tunnelling transition mechanisms using Riverbed Modeler simulation tool to analyse the performance and compare with the native IPv4 and IPv6 networks.
APA, Harvard, Vancouver, ISO, and other styles
33

Lahusen, Irwin Wijaya, Widyawan Widyawan, and Sri Suning Kusumawardani. "Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN)." IJID (International Journal on Informatics for Development) 8, no. 1 (June 22, 2019): 20. http://dx.doi.org/10.14421/ijid.2019.08104.

Full text
Abstract:
Implementation of the BGP Confederation topology scenario, found a number of new facts that influence the final decision making for BGP network managers. In previous studies it has been mentioned a number of factors that influence QoS from a topology scheme, among others, the number of Sub AS and the number of routers that make up the iBGP topology. In this study, a number of scenarios were developed by giving variants to bandwidth parameters and adding measurement parameters to Lost Datagram in all scenarios. The results obtained are quite significant, affecting QoS and finding a number of new facts related to the effect of using traffic generators. This research was tested on the Indonesia Research and Education Network (IdREN) network using GNS3.
APA, Harvard, Vancouver, ISO, and other styles
34

Nedyalkov, Ivan. "Performance comparison between virtual MPLS IP network and real IP network without MPLS." International journal of electrical and computer engineering systems 12, no. 2 (June 21, 2021): 83–90. http://dx.doi.org/10.32985/ijeces.12.2.3.

Full text
Abstract:
In this paper an IP based network consisting of two separate IP networks - a virtual one, running MPLS and an experimental IP network, connected to the virtual one, have been studied. VoIP traffic is exchanged between the two networks. Both networks are connected to the Internet and exchange traffic with it. The virtual network is created by using GNS3. The purpose of this paper is to show a comparison in the performance between the two IP networks. In addition, mathematical distributions and approximations have been made to be used to further evaluate the performance of the two networks. The used methodology in the present work can be applied in the study of different IP networks through which different types of real-time traffic passes.
APA, Harvard, Vancouver, ISO, and other styles
35

Hariadi, Muhamad, Wire Bagye, and Mohammad Taufan Asri Zaen. "MEMBANGUN SERVER HOTSPOT BERBASIS MIKROTIK DI SMAN 1 PRAYA TENGAH." Jurnal Informatika dan Rekayasa Elektronik 2, no. 1 (April 30, 2019): 70. http://dx.doi.org/10.36595/jire.v2i1.92.

Full text
Abstract:
Sejalan dengan perkembangan teknologi informasi, peralatan pendukung jaringan komputer masih sangat diperlukan. Peralatan juga telah menjadi komponen penting dalam pengembangan jaringan komputer. Jaringan adalah perangkat keras dan perangkat lunak dalam suatu sistem yang memiliki aturan khusus yang mengatur semua kegiatan dan perilaku anggotanya dalam kelancaran kegiatan pembelajaran di SMAN 1 Praya Tengah ke jaringan internet yang membutuhkan pengelolaan aliran informasi yang tepat Penelitian ini mencakup bagaimana membangun mikrotik hotspot berbasis server di SMAN 1 Praya Tengah dengan metodologi NDLC, analisis dan tahap desain menggunakan metodologi analisis pemodelan PIECES dengan menggunakan Winbox, sedangkan desain pengembangan dan implementasi metode simulasi jaringan GNS3 Hasil tes koneksi jaringan internet yang dilakukan pengguna menunjukkan implementasi desain mikrotik di SMAN 1 Praya Tengah, berbagi bandwidth dengan mikrotik internet memberikan kemudahan dan kepraktisan dalam penggunaan internet
APA, Harvard, Vancouver, ISO, and other styles
36

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Full text
Abstract:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) has been considered in this work. Round-Trip-Time, Jitter and Administrative-distance are used as performance measure metrics. The experimental analysis indicates that EIGRP is the most suitable protocol among the aforementioned protocols for MPLS-VPN.
APA, Harvard, Vancouver, ISO, and other styles
37

Admin, Admin. "A SIMULASI TUNNELING IPV6 OVER IPV4." Journal of Informatics and Communication Technology (JICT) 1, no. 1 (July 17, 2019): 49–58. http://dx.doi.org/10.52661/j_ict.v1i1.15.

Full text
Abstract:
Pesatnya perkembangan jaringan internet tidak sebanding dengan ketersediaan alamat IPV4 yang terbatas. Kondisi ini mendorong penggunaan IPV6 perlu diterapkan dan perlu diuji integrasinya dengan IPV4. Melalui simulasi Tunneling IPV6 over IPV4 pada Routing Protokol RIPNG (Routing Information Protocol Next Generation) berdasarkan algoritma distance vector dan OSPF (Open Shortest Path First) menggunakan simulator GNS3 dapat diukur performansi integrasinya. Pada penelitian ini pengukuran parameter dapat dikatakan baik dalam hal Delay, Troughput, dan Packet Loss. Delay mendapatkan nilai 79 ms yaitu nilai kategori delay yang sangat baik (excellent) berdasarkan Sumber : ITU-T H.323 nilai delay < 150 ms. Troughput mendapatkan nilai 27,40 Bytes/s maka bisa dikatakan jaringan bekerja dengan baik, karena menurut standar TIPHON, kategori throughput yang baik berkualitas sedang yaitu nilai throughput yakni antara 25-50 Bytes/s
APA, Harvard, Vancouver, ISO, and other styles
38

Nurhayati, Ade, and Septi Ayu Putri. "SIMULASI TUNNELING IPV6 OVER IPV4." Journal of Informatics and Communication Technology (JICT) 1, no. 1 (July 23, 2019): 1–10. http://dx.doi.org/10.52661/j_ict.v1i1.19.

Full text
Abstract:
Pesatnya perkembangan jaringan internet tidak sebanding dengan ketersediaan alamat IPV4 yang terbatas. Kondisi ini mendorong penggunaan IPV6 perlu diterapkan dan perlu diuji integrasinya dengan IPV4. Melalui simulasi Tunneling IPV6 over IPV4 pada Routing Protokol RIPNG (Routing Information Protocol Next Generation) berdasarkan algoritma distance vector dan OSPF (Open Shortest Path First) menggunakan simulator GNS3 dapat diukur performansi integrasinya. Pada penelitian ini pengukuran parameter dapat dikatakan baik dalam hal Delay, Troughput, dan Packet Loss. Delay mendapatkan nilai 79 ms yaitu nilai kategori delay yang sangat baik (excellent) berdasarkan Sumber : ITU-T H.323 nilai delay < 150 ms. Troughput mendapatkan nilai 27,40 Bytes/s maka bisa dikatakan jaringan bekerja dengan baik, karena menurut standar TIPHON, kategori throughput yang baik berkualitas sedang yaitu nilai throughput yakni antara 25-50 Bytes/s.
APA, Harvard, Vancouver, ISO, and other styles
39

Yadav, Sumit Kumar, Kavita Sharma, and Arushi Arora. "Security Integration in DDoS Attack Mitigation Using Access Control Lists." International Journal of Information System Modeling and Design 9, no. 1 (January 2018): 56–76. http://dx.doi.org/10.4018/ijismd.2018010103.

Full text
Abstract:
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the willingness of ISPs in implementing the system. Once each ISP implements the system, most attacks can easily be stopped close to their point of origin. The main challenge is to implement such a system with the fixed amount of memory and available processing power with routers. A coordinated effort by participating ISPs filters out attacks close to their source, reducing the load on other routers. The suspicious traffic is first filtered out based on their source IP address. The authors also implemented the WRED algorithm for their case and conduct GNS3 experiments in a simulated environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Ramadhan, Hardiyan Kesuma, and Sukma Wardhana. "Computer Networks Optimization using Load Balancing Algorithms on the Citrix ADC Virtual Server." Jurnal Online Informatika 6, no. 1 (June 17, 2021): 103. http://dx.doi.org/10.15575/join.v6i1.672.

Full text
Abstract:
In the digital era and the outbreak of the COVID-19 pandemic, all activities are online. If the number of users accessing the server exceeds IT infrastructure, server down occurs. A load balancer device is required to share the traffic request load. This study compares four algorithms on Citrix ADC VPX load balancer: round-robin, least connection, least response time and least packet using GNS3. The results of testing response time and throughput parameters show that the least connection algorithm is superior. There were a 33% reduction in response time and a 53% increase in throughput. In the service hits parameter, the round-robin algorithm has the evenest traffic distribution. While least packet superior in CPU utilization with 76% reduction. So algorithm with the best response time and throughput is the least connection. The algorithm with the best service hits is round-robin. Large scale implementation is recommended using the least connection algorithm regarding response time and throughput. When emphasizing evenest distribution, use a round-robin algorithm.
APA, Harvard, Vancouver, ISO, and other styles
41

Zhabayev, Ye H. "USING NETEMUL TO MODEL AND SIMULATE COMPUTER NETWORKS." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (June 30, 2020): 216–22. http://dx.doi.org/10.51889/2020-2.1728-7901.34.

Full text
Abstract:
Қазіргі уақытта компьютерлік желілердің құрылымы мен жұмысын модельдейтін әртүрлі бағдарламалық орталар бар, мысалы, Cisco Packet Tracer, UNetLab, NET Simulator, NetEmul, GNS3 және т.б., олар бір-бірінен жылдам жұмыс істеуімен, интерфейсімен, компьютер жабдықтарына үйлесімділігімен ерекшеленеді. Мұндай бағдарламалық ортаны пайдалану желілік компоненттерді эмуляциялау арқылы әртүрлі желілер топологиясы мен құрылымын құруға және экранында визуализациялауға мүмкіндік береді: компоненттерді баптау және олардың өзара әрекеттесу процестері; әртүрлі желілік хаттамалардың жұмыс процестері; жергілікті желіні және ғаламдық Интернет желісін қосуды, сондай-ақ тұтастай компьютерлік желінің жұмыс істеуін баптау. Мақалада компьютерлік желілердің құрылымы мен жұмысын модельдеуге мүмкіндік беретін бағдарламалық орталарының бірі болып табылатын NetEmul ортасын қолдану қарастырылады. Компьютердің басқа процестеріне кедергісіз желілік модельдің жұмыс істеу процестерін қамтамасыз ететін бағдарламалық ортаның мүмкіндіктері сипатталған. Сондай-ақ, NetEmul бағдарламалық ортасында зертханалық жұмыстар ұсынылған, мұнда студенттер жергілікті желіні құруды, IP мекен-жайларын орнатуды және жергілікті желінің жұмысын тексеруді, жергілікті желінің жұмыс жасау процессін көру, және әр құрылғыларда болып жатқан оқиғаларды бақылау арқылы көрсетілген статистика мен қызметтерін егжей-тегжейлі қарастыруды үйренеді.
APA, Harvard, Vancouver, ISO, and other styles
42

Nurhayati, Ade, Risnu Pradana Holiyastuta, and Ade Rahmat Iskandar. "Implementasi Virtual Private Network Pada Jaringan Multi Protocol Label Switching Traffic Engineering." Journal of Informatics and Communication Technology (JICT) 2, no. 1 (July 2, 2020): 11–18. http://dx.doi.org/10.52661/j_ict.v2i1.47.

Full text
Abstract:
Along with the development of telecommunications technology, we need a network that provides traffic services to send data to distant places quickly but does not forget about security, some solutions are the Multi Protocol Label Switching method, Virtual Private Network, and Traffic Engineering. MPLS VPN TE is a combination of several methods that can be used for this problem. In this research, simulation is carried out using GNS3 software and the results of the analysis are carried out using a Wireshark software. This scenario uses the measurement load using FTP and HTTP. The measurement parameters of QoS are transfer time, throughput, delay, and packet loss ratio. The measurement results show that QoS value for transfer time of 25 MB file is 16.94s, and transfer time for HTTP is 4.2 s. The Throughput of 25 MB file is 1.606MB/s, and throughput for HTTP is 5.6 MB/s. The Delay of 25MB file is 1.22 ms, and delay HTTP is 105.37 ms
APA, Harvard, Vancouver, ISO, and other styles
43

Hayati, Isnaini, and Mochammad Teguh Kurniawan. "Perancangan Infrastruktur LAN Pada Yayasan Kesehatan (Yakes) Telkom Bandung Dengan Model Cisco Three Layer Hierarchical Menggunakan Metodologi Network Development Life Cycle (NDLC)." Jurnal Rekayasa Sistem & Industri (JRSI) 3, no. 04 (November 8, 2017): 100. http://dx.doi.org/10.25124/jrsi.v3i04.278.

Full text
Abstract:
Yayasan Kesehatan Telkom merupakan organisasi pengelola layanan kesehatan di bawah perusahaan Telekomunikasi Indonesia dan membutuhkan infrastruktur jaringan LAN yang memadai untuk memberikan pelayanan kesehatan. Cisco Three-Layer Hierarchical Model merupakan konsep yang dapat diterapkan dalam merancang infrastruktur jaringan LAN dengan membagi fungsi setiap perangkat jaringan berdasarkan lapisan core, distribution dan access. Network Development Life Cycle (NDLC) digunakan sebagai metode dalam perancangan infrastruktur jaringan LAN karena sifatnya yang berulang dan berkelanjutan untuk pengembangan infrastruktur jaringan suatu organisasi. Tahapan NDLC yang digunakan yaitu tahap Analysis, Design dan Simulation Prototyping. Perancangan infrastruktur jaringan tersebut akan disimulasikan dengan simulator GNS3. Hasil perancangan tersebut diuji dengan pengukuran Quality of Service (QoS) dengan parameter throughput, delay dan packet loss yang dianalisis dengan menggunakan wireshark. Penelitian ini menghasilkan rancangan infrastruktur jaringan LAN Yakes Telkom Bandung untuk memenuhi kebutuhan pengguna jaringan LAN dalam melakukan aktivitas proses bisnis dengan menerapkan redundant link dan QoS yang menghasilkan nilai delay, throughput dan packet loss yang baik sesuai standar ITU-T (The International Telecommunication Union-Telecommunication). Manajemen bandwidth diterapkan sesuai kebutuhan pengguna dan rancangan desain infrastruktur jaringan sesuai perkembangan teknologi informasi saat ini.
APA, Harvard, Vancouver, ISO, and other styles
44

Gelvez García, Nancy Yaneth, Danilo Alfonso López Sarmiento, and Edwin Rivas Trujillo. "PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4." Redes de Ingeniería 4 (September 26, 2013): 36. http://dx.doi.org/10.14483/2248762x.6366.

Full text
Abstract:
Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS) frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE) de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4) [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.
APA, Harvard, Vancouver, ISO, and other styles
45

Haryoyudhanto, Hendy Dwi, Iskandar Fitri, and Andri Aningsih. "Implementasi Encapsulation Jaringan Redudansi VLAN Menggunakan Metode Hot Standby Router Protocol (HSRP)." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 49. http://dx.doi.org/10.31328/jointecs.v5i1.1247.

Full text
Abstract:
Local Area Network is currently often used to minimize a public work, different network segmentation in a building requires attention in designing a network that has dense traffic and often occurs down and vails over on a network flow, certainly requires performance optimal and efficient network, by way of network encapsulation with one channel and dividing each network segmentation by VLAN. The purpose of this paper is to apply a design by optimizing a network using the network redundancy method to create a more optimal network. This redundancy method is a method that moves a network path when downtime occurs on one of the routers that are automatically changed to an active router and a standby router. In the implementation of the design using GNS3 software to create network topology and design. With the results of tests that have been carried out using the simulator, packet loss from using the HSRP method is at VLAN10 0.11%, VLAN20 0.13%, VLAN30 0.30%, VLAN40 0.13%, VLAN50 0.22% AND VLAN60 0.16%. So the purpose of research makes a network more optimal and flexible
APA, Harvard, Vancouver, ISO, and other styles
46

Verawardina, Unung. "Analisis Perbedaan Peformance dan Quality Of Service (Qos) Antara Eigrp dengan Ospf (Studi Kasus Menggunakan 6 Router Melalui GNS 3 dan Wireshark)." International Journal of Natural Science and Engineering 2, no. 1 (April 18, 2018): 10. http://dx.doi.org/10.23887/ijnse.v2i1.13908.

Full text
Abstract:
In a dynamic routing setting a routing protocol is required to perform the settings to find the shortest and best path. Routing protocols are of two types: vector distance and link state. Use of EIGRP routing that includes long-range vectors and link state OSPF Link link state coverage, peg well to be implemented in complex network because it can adapt well. In this research is the method used for routing and speed of time available EIGRP routing and OSPF routing through simulator GNS3 and wireshark application, then analyze the difference of peformance with speed of routing table and speed of time. While for Quality of Service (QoS) compare network service quality from EIGRP and OSPF routing which include delay, packet loss, and throughput. Based on the results of the research shows the EIGRP routing table is better in the selection path, EIGRP smaller time tansfer data then its data transfer faster than the OSPF. Overall Quality Of Service (Qos) delay, packetloss and throughput on EIGRP and OSPF are well balanced and good.
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Chien-Lin, Hsuan-Hua Wu, Yung-Ching Jeng, and Wei-Zhi Liang. "Electrospun Graphene Nanosheet-Filled Poly(Trimethylene Terephthalate) Composite Fibers: Effects of the Graphene Nanosheet Content on Morphologies, Electrical Conductivity, Crystallization Behavior, and Mechanical Properties." Polymers 11, no. 1 (January 17, 2019): 164. http://dx.doi.org/10.3390/polym11010164.

Full text
Abstract:
In this study the effects of increased graphene nanosheet (GNS) concentration on variations in the structure and properties of electrospun GNS-filled poly(trimethylene terephthalate) (PTT/GNS) composite fiber, such as its morphologies, crystallization behavior, mechanical properties, and electrical conductivity, were investigated. The effects of GNS addition on solution rheology and conductivity were also investigated. GNSs were embedded in the fibers and formed protrusions. The PTT cold crystallization rate of PTT/GNS composite fibers increased with the gradual addition of GNSs. A PTT mesomorphic phase was formed during electrospinning, and GNSs could induce the PTT mesomorphic phase significantly during PTT/GNS composite fiber electrospinning. The PTT/GNS composite fiber mats (CFMs) became ductile with the addition of GNSs. The elastic recoveries of the PTT/GNS CFMs with 170 °C annealing were better than those of the as-spun PTT/GNS CFMs. Percolation scaling laws were applied to the magnitude of conductivity to reveal the percolation network of electrospun PTT/GNS CFMs. The electrical conductivity mechanism of the PTT/GNS CFMs differed from that of the PTT/GNS composite films. Results showed that the porous structure of the PTT CFMs influenced the performance of the mats in terms of electrical conductivity.
APA, Harvard, Vancouver, ISO, and other styles
48

Sugai, Rie, Hisayo Shimizu, Ken-ichi Nishiyama, and Hajime Tokuda. "Overexpression of yccL (gnsA) andydfY (gnsB) Increases Levels of Unsaturated Fatty Acids and Suppresses both the Temperature-SensitivefabA6 Mutation and Cold-SensitivesecG Null Mutation of Escherichia coli." Journal of Bacteriology 183, no. 19 (October 1, 2001): 5523–28. http://dx.doi.org/10.1128/jb.183.19.5523-5528.2001.

Full text
Abstract:
ABSTRACT A multicopy suppressor of the cold-sensitive secGnull mutation was isolated. The suppressor containedsfa and yccL, the former of which has been reported to be a multicopy suppressor of the fabA6mutation carried by a temperature-sensitive unsaturated fatty acid auxotroph. Subcloning of the suppressor gene revealed thatyccL, renamed gnsA (secGnull mutant suppressor), was responsible for the suppression of both the secG null mutation and the fabA6mutation. In contrast, the sfa gene did not suppress thefabA6 mutation. The ydfY(gnsB) gene, encoding a protein which is highly similar to GnsA, also suppressed both the secG null mutation and the fabA6 mutation. Although both gnsAand gnsB are linked to cold shock genes, the levels of GnsA and GnsB did not exhibit a cold shock response. AgnsA-gnsB double null mutant grew normally under all conditions examined; thus, the in vivo functions of gnsAand gnsB remain unresolved. However, overexpression of gnsA and gnsBstimulated proOmpA translocation of the secG null mutant at low temperature and caused a significant increase in the unsaturated fatty acid content of phospholipids. Taken together, these results suggest that an increase in membrane fluidity due to the increase in unsaturated fatty acids compensates for the absence of the SecG function, especially at low temperature.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Dong Dong, Dong Lin Zhao, and Bin He. "Effect of Graphene Structure on Mechanical Properties of Graphene/Epoxy Nanocomposites." Advanced Materials Research 873 (December 2013): 496–502. http://dx.doi.org/10.4028/www.scientific.net/amr.873.496.

Full text
Abstract:
Graphene nanosheets (GNSs) were mass-produced from flake natural graphite by oxidation, rapid expansion and ultrasonic treatment. The effects of ultrasonic times on the morphology and structure of GNSs and mechanical properties of GNS/epoxy nanocomposites were systematically investigated. GNS/epoxy nanocomposites were fabricated by ultrasonication and cast molding method. The mechanical properties of GNS/epoxy nanocomposites were influenced by the specific surface area, layer stacking and oxygen-containing functional group contents of GNSs. GNSs had excellent exfoliation degree when the sonication time was 15 h and there were some slightly changes on surface functional group comparing with 0 h sonication graphene and 5 h sonication graphene. When the sonication time was 15 h, the tensile strength and flexural strength of GNS/epoxy nanocomposites reached the highest value of 60.9 MPa and 91.33 MPa, which were increased by 25.3% and 30.94%, respectively, compared with pristine epoxy. The stress-strain curves of tensile testing demonstrated that extending the sonication time of GNSs can increased the fracture toughness of GNS/epoxy nanocomposites.
APA, Harvard, Vancouver, ISO, and other styles
50

Moreira Santos, María Genoveva, and Pedro Antonio Alcívar Marcillo. "Security in the data link layer of the OSI model on LANs wired Cisco." Journal of Science and Research: Revista Ciencia e Investigación 3, CITT2017 (February 23, 2018): 106–12. http://dx.doi.org/10.26910/issn.2528-8083vol3isscitt2017.2018pp106-112.

Full text
Abstract:
There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments. On this occasion we will focus on the data link layer of the OSI model, which is where controls have begun to be implemented at level of protocols. The tools that are used in the research facilitate the implementation of a virtual laboratory, which consists of a base operating system (windows) in which virtualbox is installed to mount linux mint, which will generate attacks; while in VMware, we installed a virtual machine that allows you to add the image of a switch to our network simulation software (GNS3), which integrates all the components. The tests were able to identify the vulnerabilities in MAC, ARP, VLAN and STP, and then to proceed to patch these security aws. Keeping the setting by default or ignoring the characteristics of network equipment are usually the reasons why these vulnerabilities exist. Finally, it was proved how easy it can be to run an attack and at the same time to implement security measures on the layer 2 of the OSI.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography