To see the other types of publications on this topic, follow the link: GNS3.

Journal articles on the topic 'GNS3'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'GNS3.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wijaya, Herry Derajad, Rahmat Rian Hidayat, and Teuku Ahmad Aliyansyah. "KEGIATAN PEMBELAJARAN JARINGAN KOMPUTER DENGAN STATIC ROUTING PROTOCOL MENGGUNAKAN GNS3 UNTUK SISWA SMK YMIK PADA WILAYAH JOGLO." Jurnal Abdi Masyarakat (JAM) 5, no. 2 (2020): 10. http://dx.doi.org/10.22441/jam.2020.v5.i2.003.

Full text
Abstract:
Static routing merupakan pengaturan routing paling sederhana yang dapat dilakukan pada jaringan komputer, dikonfigurasi secara manual dan dapat digunakan pada jaringan yang cakupannya kecil (LAN). Salah satu programuntuk menstimulasi topologi jaringan yaitu GNS3 (Graphical Network Simulator 3). Program simulator GNS3 dapat berjalan di berbagai OS, seperti Windows,Linux, dan Mac OS X. Pelatihan GNS3 yang diselenggarakan oleh Dosen Universitas Mercu Buana di SMP YMIK Joglo yang merupakan bentuk pengabdian masyarakat terhadap Tridharma Perguruan Tinggi dilakukan atas dasar siswa dan guru SMP YMIK
APA, Harvard, Vancouver, ISO, and other styles
2

Ramli, Ayyub, Sriyono Sriyono, and Harry Ramza. "Analisa Kecepatan Lalu Lintas Data Jaringan Local Area Network Menggunakan Graphical Network Simulator 3 (GNS-3)." Electrical Engineering Acta 1, no. 1 (2021): 13–19. http://dx.doi.org/10.22236/ate.v1i1.6946.

Full text
Abstract:
Perkembangan teknologi informasi tidak bisa dipisahkan dari perkembangan teknologi dan infrastruktur jaringan komputer. Pembuatan suatu jaringan diperlukan perancangan dan simulasi terlebih dahulu supaya hasilnya sesuai dengan keinginan atau mendapatkan sesuatu yang maksimal. Banyak sekali komponen yang dapat digunakan untuk perancangan seperti router. Router sendiri memiliki banyak system operasi contohnya router MikrotikOS. Jurnal ini untuk merancang dan mensimulasikan jaringan komputer. Perancangan dan simulasi jaringan komputer dapat menggunakan aplikasi Graphical Network Simulator 3(GNS3)
APA, Harvard, Vancouver, ISO, and other styles
3

Sari, Liska Mey Ika, Puspanda Hatta, Endar Suprih Wihidayat, and FENG Xiao. "A Comparison between the Use of Cisco Packet Tracer and Graphical Network Simulator 3 as Learning Media on Students’ Achievement." Jurnal Pendidikan Teknologi dan Kejuruan 24, no. 1 (2018): 132–36. http://dx.doi.org/10.21831/jptk.v24i1.16042.

Full text
Abstract:
Usually in studying the practice of computer networks, it is encountered several obstacles such as (1) limited computer networks design tools, (2) limited learning time to design computer networks and (3) technical difficulties for finding the solutions of errors. To overcome those barriers as proposed in this study, computer network simulators were used. Computer network simulators were expected to help students designing and simulating networks planned to be applied to computer network practices. This study used two simulators to compare its effectiveness in assisting the students to learn c
APA, Harvard, Vancouver, ISO, and other styles
4

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
APA, Harvard, Vancouver, ISO, and other styles
5

x, Akshay, and Pooja Ahlawat. "Implementation of MPLS L3VPN using GNS3." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 50–54. https://doi.org/10.70729/ijser1573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sholeha, Eka Wahyu, Dery Yuswanto Jaya, Arif Supriyanto, and Hendrik Setyo Utomo. "Komparasi Fungsionalitas EVE-NG dan GNS3: Simulasi Protokol Jaringan." Algoritma: Jurnal Ilmu Komputer dan Informatika 9, no. 1 (2025): 1. https://doi.org/10.30829/algoritma.v9i1.23864.

Full text
Abstract:
<p><em>The development of network technology drives the need for efficient, flexible, and economical simulation tools for learning and testing network architectures. This research compares two popular platforms, GNS3 (Graphical Network Simulator-3) and EVE-NG (Emulated Virtual Environment - Next Generation), in terms of functionality, network performance, and resource consumption. Testing was carried out through network protocol simulations with identical topologies, and parameters such as throughput, delay, jitter, packet loss, convergence time, and CPU, RAM, and disk I/O usage we
APA, Harvard, Vancouver, ISO, and other styles
7

Nedyalkov, Ivan. "Benefits of Using Network Modeling Platforms When Studying IP Networks and Traffic Characterization." Computers 12, no. 2 (2023): 41. http://dx.doi.org/10.3390/computers12020041.

Full text
Abstract:
This article addresses the benefits of using IP network modeling platforms to study IP networks. For the purposes of this study, several models of IP networks were created, through which various hypotheses were studied. Additionally, different operational variants of the modeled IP networks were created. The use of the GNS3 platform was proposed, as well as several tools for monitoring the processes in IP networks. The application of IP network modeling platforms to study power electronic devices was also addressed. IP network modeling platforms greatly facilitate both the process of studying
APA, Harvard, Vancouver, ISO, and other styles
8

Mahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amarudin, Amarudin. "Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking." Jurnal Teknoinfo 12, no. 2 (2018): 72. http://dx.doi.org/10.33365/jti.v12i2.121.

Full text
Abstract:
Keamanan jaringan merupakan salah satu hal terpenting dalam implementasi jaringan komputer.Tidak sedikit jaringan komputer yang mengalami masalah yang disebabkan oleh kelalaian pengelola jaringan dalam membangun sebuah jaringan komputer. Dikarenakan kelalaian tersebut sehingga dapat membuka peluang bagi para hacker untuk meretas dan merusak jaringan yang dibangun tersebut.Untuk meminimalisir terjadinya penyalahgunaan jaringan oleh para hecker, maka perlu adanya peningkatan keamanan jaringan yang akan dibangun. Dalam penelitian ini telah dilakukan penelitian untuk mengembangkan keamanan jaringa
APA, Harvard, Vancouver, ISO, and other styles
10

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
11

Bayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1, no. 2 (2018): 55–60. http://dx.doi.org/10.24246/j.icm.2018.v1.i2.p55-60.

Full text
Abstract:
Keamanan jaringan di era ini sangat dibutuhkan, dibalik kemudahan dalam mengakses informasi terdapat pula banyak ancaman. Dengan aplikasi GNS3 pengguna dapat membuat simulasi jaringan dengan perangkat yang dibutuhkan seperti aslinya serta dalam perangkat dapat dikonfigurasi langsung. Pada simulasi ini membuat Perancangan Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan penggunaan ACL solution serta trusted-servers yang menjadi salah satu cara agar menjadikan jaringan tersebut tetap aman dan stabil. Dari hasil penelitian yang dilakukan GNS3 mampu Merancangan Kea
APA, Harvard, Vancouver, ISO, and other styles
12

Okhrimchuk, V. V., and I. A. Okhrimchuk. "ANALYSIS OF NETWORK MODELLING TOOLS FOR THE POSSIBILITY OF THEIR USE FOR PRACTICAL TRAINING OF CYBERSECURITY SPECIALISTS." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 27 (I) (December 27, 2024): 56–68. https://doi.org/10.46972/2076-1546.2024.27.05.

Full text
Abstract:
Despite the existing information security systems, the key aspect of effective cyber defense remains the level of training of personnel responsible for cyber security. Today, the training of a cybersecurity specialist should be based on a comprehensive study of modern information technologies, mechanisms and patterns of cyberattacks, ways to counter them, and include both theoretical and practical components. It has been established that the most common practice in the leading educational and scientific institutions of the world and Ukraine in terms of practical training of cybersecurity speci
APA, Harvard, Vancouver, ISO, and other styles
13

FITRIYANTI, RAMADHINA, LINDAWATI LINDAWATI, and ARYANTI ARYANTI. "Analisis Perbandingan Mean Opinion Score Aplikasi VoIP Facebook Messenger dan Google Hangouts menggunakan Metode E-Model pada Jaringan LTE." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 3 (2018): 379. http://dx.doi.org/10.26760/elkomika.v6i3.379.

Full text
Abstract:
ABSTRAKPenelitian ini membahas mengenai perbandingan kualitas layanan dua aplikasi VoIP yaitu Facebook Messenger dan Google Hangouts pada jaringan LTE. Kualitas layanan dua aplikasi tersebut ditinjau menggunakan Mean Opinion Score dengan metode objektif yaitu, E-Model. Nilai MOS kedua aplikasi didapatkan dengan menjalankan simulasi menggunakan GNS3 yang berfungsi untuk mensimulasikan topologi jaringan dengan menggunakan router MikroTik. Setelah itu, dilakukan pengukuran parameter QoS yaitu, delay dan packet loss yang terjadi pada saat melakukan panggilan yang berlangsung selama satu jam. Dari
APA, Harvard, Vancouver, ISO, and other styles
14

Nedyalkov, Ivan. "Application of GNS3 to Study the Security of Data Exchange between Power Electronic Devices and Control Center." Computers 12, no. 5 (2023): 101. http://dx.doi.org/10.3390/computers12050101.

Full text
Abstract:
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power distribution unit (PDU) and a UPS (Uninterruptable Power Supply) that are used by internet service providers are studied. Capsa Free network analyzer and Wireshark network protocol analyzer were used as supporting tools. A working model of an IP network in GNS3 has been created through which this research has been carried out. In addition to ch
APA, Harvard, Vancouver, ISO, and other styles
15

Yasin, Alimuddin, and Salman Suleman. "Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3." Jurnal Teknologi Informasi Indonesia (JTII) 3, no. 1 (2018): 15. http://dx.doi.org/10.30869/jtii.v3i1.182.

Full text
Abstract:
Abstract— Software Defined Network (SDN) adalah teknologi baru dalam jaringan komputer. Dimana dalam arsitektur ini control plane terpisah dengan data plane. Controller sebagai control plane dan switch sebagai data plane yang dihubungkan oleh protokol openflow. Teknologi ini masih dalam tahap pengembangan sehingga isu keamanan masih terbuka lebar untuk diteliti terlebih serangan dampak Distrubuted Denial of Service (DDoS) pada switch openflow. Untuk mensimulasikan serangan DDoS di jaringan SDN dipilih software simulator GNS3 untuk mensimulasikan arsitektur jaringan SDN untuk menguji dampak s
APA, Harvard, Vancouver, ISO, and other styles
16

Santoso, Andi, and Sri Dianing Asri. "PERANCANGAN JARINGAN INTERNET DENGAN SIMULASI MENGGUNAKAN GNS3." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 4 (2024): 8040–48. http://dx.doi.org/10.36040/jati.v8i4.10625.

Full text
Abstract:
SMK Strada Jakarta adalah sebuah sekolah menengah kejuruan yang terletak di Jalan Rajawali Selatan II No. 1, Jakarta, yang berkomitmen untuk memberikan pendidikan berkualitas dengan menyediakan koneksi internet yang dapat diakses oleh murid dan guru. Namun, jaringan internet sering kali tidak stabil akibat kurangnya manajemen jaringan, yang mengganggu proses belajar mengajar. Oleh karena itu, tujuan dari penelitian ini adalah untuk meningkatkan stabilitas jaringan dan mengurangi gangguan dalam proses belajar mengajar. Metode yang digunakan adalah Network Development Life Cycle (NDLC), yang men
APA, Harvard, Vancouver, ISO, and other styles
17

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
18

Aeni, Dinda Noorfaidah, Akhmad Fauzi Ikhsan, and Helfy Susilawati. "Analisis Trafik Jaringan Wifi dan Simulasi GNS3." Fuse-teknik Elektro 1, no. 2 (2021): 92. http://dx.doi.org/10.52434/jft.v1i2.1507.

Full text
Abstract:
AbstrakPerkembangan teknologi komunikasi Wireless untuk saat ini mengarah kepada teknologi berbasis jaringan IP (Internet Protocol). Sedangkan Access Point merupakan suatu perangkat dari Wireless Router. Access point itu sendiri membentuk hostspot, sedangkan Wireless Router berfungsi untuk mengatur lalu lintas data. Parameter yang diukur pada penelitian ini yaitu mengukur parameter-parameter jaringan atau sering disebut dengan Quality of Service (QoS), antara lain pengukuran jitter, delay, throughput dan packet loss yang dihasilkan dalam layanan paket data pada wifi, penelitian yang dilakukan
APA, Harvard, Vancouver, ISO, and other styles
19

Anugrah Br. Ginting, Putri, G. A. K. Diafari, Ngurah Indra ER, and Dewa Made Wiharta. "ANALISIS PERBANDINGAN TOLERANSI KESALAHAN (FAULT TOLERANCE) ROUTING STATIC DAN OSPF PADA JARINGAN HYBRID UNUD." Jurnal SPEKTRUM 11, no. 1 (2024): 32. http://dx.doi.org/10.24843/spektrum.2024.v11.i01.p4.

Full text
Abstract:
A reliable and failure-resistant computer network is an important prerequisite in the modern interconnected environment. This research aims to examine and compare the effectiveness of fault tolerance between two commonly used routing protocols, namely static routing and OSPF (Open Shortest Path First), in the context of hybrid networks at Udayana University (UNUD). This research uses GNS3 to simulate the UNUD network environment. The research method is carried out by implementing static and OSPF routing separately in the GNS3 simulation. After the routing implementation is carried out, the net
APA, Harvard, Vancouver, ISO, and other styles
20

Elhanafi, Andi Marwan, Imran Lubis, Dedy Irwan, and Abdullah Muhazir. "Simulasi Implementasi Load Balancing PCC Menggunakan Simulator Gns3." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 2 (2018): 12–18. http://dx.doi.org/10.34012/jutikomp.v1i2.236.

Full text
Abstract:
Kebutuhan komunikasi saat ini sangat penting seiring dengan kemajuan dan perkembangan teknologi komunikasi data yang semakin canggih. Teknologi komunikasi data yang berkembang dari waktu ke waktu sangat pesat. Oleh sebab itu, diperlukan perancangan yang tepat dan handal dalam membangun kualitas jaringan yang baik supaya dapat meningkatkan kinerja dari jaringan tersebut.Dalam hal ini menyebabkan semakin meningkatnya permintaan akan kebutuhan informasi dalam internet, sehingga trafik dalam internet semakin padat oleh permintaan-permintaan akan informasi. Salah satu cara yang dapat digunakan untu
APA, Harvard, Vancouver, ISO, and other styles
21

Gondhalekar, Bharati, Himadri Manna, Shreyash Kothi, and Dipak Balu Borsae. "Network Automation With Multithreading Using GNS3 and Netmiko." Indian Journal of Computer Science 9, no. 2 (2024): 18. http://dx.doi.org/10.17010/ijcs/2024/v9/i2/173860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Magalhães, David Fernandes, Polycarpo Sousa Neto, and Edson Silva Almeida. "Utilização do GNS- 3 como alternativa práticano estudo de redes MPLS." Revista Principia - Divulgação Científica e Tecnológica do IFPB 1, no. 34 (2017): 101. http://dx.doi.org/10.18265/1517-03062015v1n34p101-108.

Full text
Abstract:
Este trabalho tem por objetivo mostrar o GNS3, como ferramenta educacional alternativa a falta de equipamentos, auxiliando no estudo de redes complexas, como as redes MPLS. A capacidade de emulação dos sistemas operacionais presentes nos roteadores Cisco (Cisco IOS), possibilidade de inclusão de maquinas virtuais nos cenários e de dispositivos que simulam equipamentos reais, o tornam uma poderosa ferramenta na simulação de redes e serviços de forma totalmente gratuita. O MPLS é um protocolo baseado em pacotes rotulados, onde cada rótulo representa um índice na tabela de roteamento do próximo r
APA, Harvard, Vancouver, ISO, and other styles
23

Pacheco Armijos, Ximena del Carmen, Joffre Jeorwin Cartuche Calva, and Nancy Magaly Loja Mora. "Herramientas de Software para Simulación y Emulación de Redes de Computadoras: Implementación en Entornos de Laboratorio." Ciencia Latina Revista Científica Multidisciplinar 8, no. 3 (2024): 11271–85. http://dx.doi.org/10.37811/cl_rcm.v8i3.12276.

Full text
Abstract:
Este estudio compara el simulador Cisco Packet Tracer y el emulador GNS3 en la implementación de la topología HSRP para prácticas de redes de computadoras en entornos de laboratorio. El objetivo es determinar cuál herramienta es más adecuada para estudiantes universitarios. El estudio se estructura en cinco fases: búsqueda de información, selección de herramientas, configuración de la topología, implementación en simulador y emulador, y evaluación según parámetros clave. Los resultados indican que ambos sistemas son eficaces en la configuración y el envío de paquetes, pero difieren significati
APA, Harvard, Vancouver, ISO, and other styles
24

N S, Apoorva, Namratha H, and Anil Umesh. "Implementation of OSPF on a Network Using GNS3 Tool." IJARCCE 8, no. 5 (2019): 274–78. http://dx.doi.org/10.17148/ijarcce.2019.8550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Geng, Qiang, and Xueqin Huang. "VRRP Load Balance Technology Simulation Practice Based on GNS3." MATEC Web of Conferences 228 (2018): 03012. http://dx.doi.org/10.1051/matecconf/201822803012.

Full text
Abstract:
This paper introduced the working principle of VRRP Load Balance Technology and technical detail. Through simulation software GNS3 it constructed the Load Balance network, and configured the VRRP technology, which causes the different local area network to data flow load balance through the VRRP technology, when a single point of failure occurs, the gateway can be migrated adaptively without affect the normal use of the network. It provides a flexible and effective solution to implement the load balance lab environment.
APA, Harvard, Vancouver, ISO, and other styles
26

Apsari, Ratih, Mia Rosmiati, and Tafta Zani. "Building MPLS Network Simulation Using GNS3 at PT. Telkom." International Journal of Engineering & Technology 8, no. 1.9 (2019): 246–49. http://dx.doi.org/10.14419/ijet.v8i1.9.26408.

Full text
Abstract:
The Backbone Network of PT Telkom Indonesia ( PT.Telkom) has architecture from core layer to access layer. In the core layer network PT Telkom has two stage, there are Main pop and Primary pop. This paper proposed MPLS ( Multiprotocol Label Switching) for core layer to optimize the network. The principle of MPLS ( Multiprotocol Label Switching ) Network is labelling MPLS to 2nd header layer and 3rd layer for easier checking the network. By using Graphical Network Simulator (GNS3), PT Telkom can simulate its Network using MPLS and calculate the Quality of Service (QoS). From Wireshark’s sum
APA, Harvard, Vancouver, ISO, and other styles
27

Amantha Olan Sahat Manik, Lukas, Theresia Ghozali, and Veronica Windha Mahyastuty. "Perancangan Jaringan Internet Menggunakan GNS3, Qemu, dan Virtual Box." Jurnal Elektro 15, no. 1 (2024): 11–20. http://dx.doi.org/10.25170/jurnalelektro.v15i1.5119.

Full text
Abstract:
In the modern era, information technology continues to develop in line with human needs who want efficiency, ease, speed and accuracy in obtaining information and sending information. Moreover, in an office building, facilities for accessing information require a fast and efficient internet network as facilities and infrastructure to support office activities. In general, Mikrotik routers are widely used in office buildings as a means of distributing the internet. With the use of a mikrotik router that requires a lot of design and simulation first to get good internet performance GNS3 can desi
APA, Harvard, Vancouver, ISO, and other styles
28

Korniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.

Full text
Abstract:
This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the network, Third-party Applications for network packet analysis are supported. Depending on
APA, Harvard, Vancouver, ISO, and other styles
29

Yang, Fan, and Li Zhen Zhao. "Network Case Establishment and Application Research under Portable Network Environment." Advanced Materials Research 998-999 (July 2014): 1157–60. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1157.

Full text
Abstract:
by using network simulation software GNS3 and VirtualBox virtual machine to build a portable network operation platform, we have put forward network case establishment and built specific practical network cases that have been applied in teaching, which has changed “static image projection” of network cases’ theoretical classes to “dynamic demo” and provided a complete technical reference for students’ practical training.
APA, Harvard, Vancouver, ISO, and other styles
30

Altamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.

Full text
Abstract:
Abstract: This paper will be introducing a comparative study on the choices between two best classical software firewalls one is Context Based Access Control (CBAC) and Zone Based firewall (ZBF). Both of them may deliver a stateful inspection of TCP, UDP and/or ICMP control packets. Through this study, two type of networks were designed one used the CBAC firewall and the other works with a zone based firewall. The result obtained showed that ZBF has several feature which are not available in CBAC. Furthermore, ZBF deals with the security zones the traffic will be dynamically inspected as it pa
APA, Harvard, Vancouver, ISO, and other styles
31

Tivvany Aijen, Loudry, and Rina dewi Indahsari. "Pemanfaatan Ansible dalam Sistem Otomatisasi Dan Monitoring Jaringan Komputer." JURNAL SISTEM KOMPUTER ASIA 1, no. 01 (2023): 11–23. http://dx.doi.org/10.32815/jiskomsia.v1i01.22.

Full text
Abstract:
Perangkat jaringan yang telah terpasang terkadang perlu dikonfigurasi ulang agar dapat terus beroperasi dengan baik. Di suatu perusahaan dalam melakukan konfigurasi perangakat jaringan masih menggunakan cara konfigurasi manual. Melakukan konfigurasi manual membutuhkan waktu yang lebih lama jika perangkat yang digunakan dalam jumlah yang cukup banyak serta dapat menimbulkan kompleksitas yang tinggi dan potensi terjadinya human error. Metode yang lebih efisien untuk dapat mengkonfigurasi perangkat-perangkat tersebut secara otomatis yaitu dengan melakukan otomatisasi jaringan. Otomatisasi jaringa
APA, Harvard, Vancouver, ISO, and other styles
32

Pikov, Vitaly, Anatoly Ryapukhin, and Daniela Veas Iniesta. "Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology." Inventions 8, no. 1 (2023): 18. http://dx.doi.org/10.3390/inventions8010018.

Full text
Abstract:
This article is devoted to the problem of information security in complexes with unmanned aerial vehicles (UAV). Science knows a new promising method of information protection: moving target defense (MTD). The essence of this method is that due to periodic changes in the parameters of the infocommunication network the information about the information infrastructure collected by the attacker at the reconnaissance stage becomes irrelevant, and the attack becomes ineffective. This article also discusses the features and types of confidential information processed in complexes with UAV and provid
APA, Harvard, Vancouver, ISO, and other styles
33

Setiyadi, Wi'i, Rumani Mangkudjaja, and Sholekan Sholekan. "Analisis Perbandingan QOS Layanan Ethernet, Frame Relay, dan ATM Over MPLS pada Jaringan Backbone." Jurnal SIFO Mikroskil 14, no. 1 (2013): 21–30. http://dx.doi.org/10.55601/jsm.v14i1.88.

Full text
Abstract:
Kebutuhan perusahaan dalam membangun jaringan internal antara kantor pusat dengan kantor cabangnya dan antara kantor cabang lainnya membutuhkan infrastruktur yang sangat mahal, VPN memberikan solusi untuk permasalahan infrastruktur tersebut dengan melewati jaringan publik. VPN adalah layanan yang mungkinkan untuk mengakses jaringan internal kantor melalu jaringan yang bisa di akses dengan mudah seperti internet. Teknologi AToM saat ini sudah mulai digunakan oleh para penyedia layanan yang memiliki jaringan yang luas. Penelitian ini, mengimplementasikan teknologi AToM dalam jaringan yang kecil
APA, Harvard, Vancouver, ISO, and other styles
34

Srivastava, Rishabh. "Route Redistribution between EIGRP and OSPF Routing Protocol Using GNS3 Sofware." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 1232–37. http://dx.doi.org/10.22214/ijraset.2017.11180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Syah, Irjaman, Abdul Haris Muhammad, and Erwin Gunawan. "Simulasi Network Automation Menggunakan Ansible Di GNS3 (Studi Kasus Smile Project)." Jurnal Teknik Informatika (J-Tifa) 3, no. 2 (2020): 1–8. http://dx.doi.org/10.52046/j-tifa.v3i2.1065.

Full text
Abstract:
Management sebuah perangkat jaringan biasa dilakukan oleh paa administrator sesuai dengan kompleksitas jaringan. Konfigurasi tersebut biasa dilakukan menguunakan CLI (Command Line Interface) dengan menggunkan port konsol, telnet jika ingin berkomunikasi jarak jauh atau bisa juga menggunakan SSH agar dengan informasi yang telah dienkripsi. Ada juga perangkat jaringan yang telah mendukung tampilan antar muka (GUI). Metode yang baru dijelaskan diatas kurang efektif jika perangkat yang ingin di konfigurasi lebih dari 5 bahkan sampai 100 perangkat karena akan memakan waktu lama dan melelahkan jika
APA, Harvard, Vancouver, ISO, and other styles
36

Budiman, Andrew Ishak, Imam Santoso, and Aghus Sofwan. "SIMULASI DAN ANALISIS JARINGAN UNDIPCONNECT FAKULTAS TEKNIK UNIVERSITAS DIPONEGORO MENGGUNAKAN GNS3." Transient: Jurnal Ilmiah Teknik Elektro 10, no. 1 (2021): 154–63. http://dx.doi.org/10.14710/transient.v10i1.154-163.

Full text
Abstract:
Fakultas Teknik merupakan salah satu fakultas di Universitas Diponegoro yang sudah tercakup dalam layanan fasilitas Wi-Fi UNDIPConnect. Manajemen jaringan diperlukan agar jaringan yang sudah terpasang dapat tetap mengakomodasi kebutuhan pengguna meskipun terjadi peningkatan trafik, salah satunya adalah pengalokasian bandwidth jaringan yang tersedia. Tugas akhir ini merancang pemodelan dan melakukan simulasi jaringan pada simulator GNS3. Simulasi dilakukan dengan menerapkan data trafik hasil peramalan pada tahun 2019-2025. Simulasi dilakukan dalam 2 kondisi yaitu tanpa dan dengan program pengal
APA, Harvard, Vancouver, ISO, and other styles
37

Ahmad Al-Hadidi, Moh\'d Rasoul, Mohammed Yousef Al-Gawagzeh, Nayel Al-Zubi, Bayan Al-Saaidah, and Mohammed Alweshah. "Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3." Research Journal of Applied Sciences, Engineering and Technology 8, no. 8 (2014): 989–94. http://dx.doi.org/10.19026/rjaset.8.1060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Susueno, Hendra Bayu, Imam Tri Wibowo, Siti Ummi Masruroh, Dewi Khairani, and I’im Umamil Khoiri. "Analisis Routing Protocol Is-Is Dengan MPLS Traffic Engineering Menggunakan GNS3." Jurnal Ilmiah FIFO 13, no. 1 (2021): 32. http://dx.doi.org/10.22441/fifo.2021.v13i1.004.

Full text
Abstract:
In the digital era is , the internet becomes a necessity . the increasing number of internet usage by various parties encourages ISPs to improve their service quality . To overcome the problem the IETF has introduced a service Multiprotcol . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calculate the many routes efficiently through the network to the router tip of the tail of the LSP. TE consists of three steps principal that is the size , model, and control . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calcu
APA, Harvard, Vancouver, ISO, and other styles
39

Hadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.

Full text
Abstract:
Abstract: This paper focuses on the implementation of a site-to-site IPsec tunnel to establish a secure connected link over a public network between two sites. To do so, an IP addressing plan was created and a topology was drawn to replicate a local area network between different sites, i.e., LIBYA and TUNIS. After this, an IP tunnel was set up, secure communication was established in the replicating LAN, and all packets were transferred over an encrypted form between the two different sites correctly. The area of this study lies in the domains of network security and VPN. When discussing the
APA, Harvard, Vancouver, ISO, and other styles
40

А.В., Баранов, Овсянников А.П., Огарышев В.Ф. та Федоров В.И. "Об одном методе конфигурирования сети научного суперкомпьютерного центра". Труды НИИСИ РАН 8, № 4 (2018): 127–35. http://dx.doi.org/10.25682/niisi.2018.4.0015.

Full text
Abstract:
В статье рассматривается подход к автоматизации решения одной из важных повседневных задач системного администратора суперкомпьютерного научного центра - реконфигурации оборудования сегментированной локальной вычислительной сети. Авторы предлагают использовать специальный язык разметки сети Network Markup Language (NML), на котором возможно составить описание сети с необходимой полнотой. С помощью разработанного авторами программного средства администратор может преобразовать NML-описание сети в набор конфигурационных файлов сетевых устройств. За счёт модульной архитектуры спектр поддерживаемы
APA, Harvard, Vancouver, ISO, and other styles
41

Rachmad Anwar, M. Iqbal, and Diah Priyawati. "Comparative Analysis of PCC and ECMP Methods in Load Balancing Using GNS3 Simulator." SISTEMASI 13, no. 2 (2024): 458. http://dx.doi.org/10.32520/stmsi.v13i2.3954.

Full text
Abstract:
Judging from daily activities, human beings heavily rely on the internet for communication purposes. and exchange information using either social media applications or browsers, vonsistently fast internet speeds are incredibly beneficial for performing tasks and activities, particularly for students and professionals. A sluggish internet connection can be frustrating and may lead to interruptions in online activities and tasks if it persists. Hence, this study examines a comparative evaluation of two approaches, Per Connection Classifier (PCC) and Equal Cost Multi-Path (ECMP) in Load Balancing
APA, Harvard, Vancouver, ISO, and other styles
42

Firmansyah, Iqbal. "Implementasi Network Automation Pada GNS3 Untuk Otomasi Konfigurasi Di PT. Semut Merah Squad." Buletin Ilmiah Informatika Teknologi 2, no. 2 (2024): 43–48. http://dx.doi.org/10.58369/biit.v2i2.45.

Full text
Abstract:
PT. Semut Merah Squad (J&T Express) is a goods delivery company founded in 2015. This company adopts technology as the main foundation in its operational system. One of the important components in the integrated IT system at J&T Express is network management which has a high level of complexity. Network management at J&T Express currently still relies on manual processes when configuring network devices. This results in time inefficiency in the process of configuring network devices. Based on the problems that occurred at J&T Express, implementing network automation is a soluti
APA, Harvard, Vancouver, ISO, and other styles
43

Brohi, Allah Bachayo, Riffat Saher, and Asad Ali Shaikh. "Quality optimization of OSPFV3 and EIGRP for IPV4 in hierarchical network environment using GNS3 tool." Pakistan Journal of Engineering, Technology & Science 10, no. 1 (2023): 34–56. http://dx.doi.org/10.22555/pjets.v10i1.845.

Full text
Abstract:
In network world, due to shortage of IP addresses in version 4, a new version of IP address, namely IPv6, has come into play, but due to non-exchange ability between IPv4 and IPv6, different routing protocol is come to play for IPv6 that is RIPng, OSPFv3 and EIGRP for IPv6 in the place of RIP, OSPFv2 and EIGRP in IPv4 environment. Transmission of data is based on the routing protocol which selects the best routes in network world. Two types of interior routing protocol which selects the best routes in network world that is distance vector and link state. In this research we compare two types o
APA, Harvard, Vancouver, ISO, and other styles
44

Nisar, Farhan, and Baseer Ali Rehman. "An efficient security framework, vulnerabilities, and defense mechanisms in LoraWAN." Computer and Telecommunication Engineering 3, no. 2 (2025): 3072. https://doi.org/10.54517/cte3072.

Full text
Abstract:
<p>The rapid expansion of cloud computing within business environments, along with the increasing complexity of organizational deployments, has led to a surge in cloud-based attacks on computer networks. These attacks exploit security vulnerabilities and systemic breaches. This study explores robust defense mechanisms by leveraging policy-based configurations and rule enforcement on edge network devices. These mechanisms were tested using GNS3 simulations to strengthen internal and external infrastructures against critical threats such as ICMP, CDP, and port security attacks.</p>
APA, Harvard, Vancouver, ISO, and other styles
45

Elezi, Armando, and Dimitrios A. Karras. "On Detailed Network Systems Configuration Management Automation using Python." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (March 17, 2023): 1–16. http://dx.doi.org/10.37394/23204.2023.22.1.

Full text
Abstract:
In nowadays, communications are expanding in very high rates. New technologies are being born and some of them are taking so much importance in people’s lives. In a situation where people’s needs are getting more complicated and everybody’s lifestyle is advancing to another level, bigger and better infrastructure is needed. Managing all this process can’t be anymore a step by step process. It is strictly needed to evolve in automated process. Network configuration and reconfiguration may be a repetitive process, time consuming, and error prone process. To address this problem this paper is goi
APA, Harvard, Vancouver, ISO, and other styles
46

Juliantara Putra, I. Gede, Pande Ketut Sudiarta, and I. Made Arsa Suyadnya. "ANALISIS PERBANDINGAN ROUTING OSPF PADA JARINGAN MPLS DAN TANPA MPLS MENGGUNAKAN GNS3." Jurnal SPEKTRUM 4, no. 1 (2017): 1. http://dx.doi.org/10.24843/spektrum.2017.v04.i01.p01.

Full text
Abstract:
Proses routing adalah proses pemilihan jalur paket data dari komputer sumber ke komputer tujuan. Suatu pengiriman paket data (routing) bekerja pada layer 3 OSI, akan tetapi terdapat suatu teknologi baru dalam pengiriman paket data pada layer 2,5 OSI yaitu MPLS. Oleh karena itu, dilakukan penelitian untuk mengetahui perbedaan routing paket data melalui jaringan MPLS dan tanpa MPLS. Metode yang digunakan dengan membangun simulasi jaringan menggunakan 12 router, 4 switch dan 4 vpcs pada emulator GNS3 dengan tiga perlakuan berbeda, yaitu: skema pengujian bitrate sejenis, bitrate tidak sejenis dan
APA, Harvard, Vancouver, ISO, and other styles
47

Golightly, Lewis, Paolo Modesti, and Victor Chang. "Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator." Journal of Cybersecurity and Privacy 3, no. 3 (2023): 464–92. http://dx.doi.org/10.3390/jcp3030024.

Full text
Abstract:
Network emulation offers a flexible solution for network deployment and operations, leveraging software to consolidate all nodes in a topology and utilizing the resources of a single host system server. This research paper investigated the state of cybersecurity in virtualized systems, covering vulnerabilities, exploitation techniques, remediation methods, and deployment strategies, based on an extensive review of the related literature. We conducted a comprehensive performance evaluation and comparison of two network-emulation platforms: Graphical Network Simulator-3 (GNS3), an established op
APA, Harvard, Vancouver, ISO, and other styles
48

Tiamiyu, Osuolale Abdramon, Samuel Olusayo Onidare, Hakeem Babalola Akande, Oluwaseun Tolani Ajayi, and Abdraheem Ojonugwa Ogbotobo. "IMPLEMENTATION AND COMPARISON OF SOFTWARE-DEFINED NETWORK CONTROLLERS IN VARIOUS SIMULATED NETWORK ENVIRONMENTS." FUDMA JOURNAL OF SCIENCES 9, no. 3 (2025): 154–63. https://doi.org/10.33003/fjs-2025-0903-3215.

Full text
Abstract:
In today's ever-evolving networking landscape, Software Defined Networking (SDN) has emerged as a paradigm-shifting technology that promises greater flexibility, agility, and control over network infrastructures. However, how easy are the configuration, extensibility, and programmability of these SDN controllers, considering the practical implications for network administrators and developers? Despite the growing adoption of SDN, there is limited research on the comparative performance of controllers across multiple simulation environments. This study aims to explore the practical implementati
APA, Harvard, Vancouver, ISO, and other styles
49

Zhao, Li Zhen, Fan Yang, and Yu Ming Zhao. "The Simulation Research of Campus Network Technology Based on IPv6." Advanced Materials Research 850-851 (December 2013): 405–9. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.405.

Full text
Abstract:
Aiming at the issues of smooth transition from IPv4 to IPv6 and interoperability in technical coexistence period about campus network, discussing the technical characteristics of IPv6 protocol, GNS3 and OPNET simulator, combined with the status of weakness of IPv6 technology, lack of IPv6 technology planning and financial support for network upgrade in the vast majority of colleges, adopted the simulation methods to build a network model of IPv4 and IPv6 to achieve the technologies study such as topology design, network configuration and testing, network performance design and evaluation of IP
APA, Harvard, Vancouver, ISO, and other styles
50

Nurdiansyah, Yanuar, Nail Pratama, Muhammad Ifantara Putra, and Muhammad Ali Sya’roni. "Analisis Perbandingan Metode Interior Gateway Protocol RIP Dengan OSPF Pada Jaringan MPLS-VPLS." INFORMAL: Informatics Journal 5, no. 2 (2020): 49. http://dx.doi.org/10.19184/isj.v5i2.18668.

Full text
Abstract:

 
 
 
 Routing is a process for forwarding network packets from one network such as static routing and dynamic routing. This research will evaluate and implement protocols in dynamic routing such as RIP (Routing Information Protocol) and OSPF (Open Short Path First). What will later be simulated with GNS3, from this study will be obtained results For traceroute, OSPF is about 7% faster than RIP time, while for ping, OSPF is 5.9% faster than RIP and for traceroute in the topology the average result of the average traceroute time is 2.58 for RIP and 2.23 for OSPF.
 &#x0
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!