Academic literature on the topic 'Layer Two Tunneling Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Layer Two Tunneling Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Layer Two Tunneling Protocol"

1

Silvia Anggraeni, Nico Setyo Triwibowo, Muhammad Fahrurizqi Ilham, Irfan Rizki Arip, and Rubio Azza Arafah. "Perbandingan Quality of Service antara VPN Point-to-Point Tunneling Protocol Dan Layer Two Tunneling Protocol Di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta." JE-Unisla 9, no. 2 (2024): 195–204. https://doi.org/10.30736/je-unisla.v9i2.1320.

Full text
Abstract:
Penelitian ini membandingkan kualitas layanan quality of service (QoS) antara virtual private network (VPN) point-to-point tunneling protocol (PPTP) dan layer two tunneling protocol (L2TP) di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta (FT UPNVJ). Parameter QoS yang diuji meliputi latency, throughput, jitter, dan packet loss menggunakan perangkat lunak Wireshark. Hasil pengukuran menunjukkan bahwa PPTP lebih baik dalam hal jitter dan delay, sedangkan L2TP unggul dalam throughput dan packet loss. Temuan ini memberikan panduan bagi pengelola jaringan dalam memilih protokol VPN yang sesuai dengan kebutuhan komunikasi data di lingkungan FT UPNVJ.
APA, Harvard, Vancouver, ISO, and other styles
2

Gunawan, Muhammad Alvin, and Sukma Wardhana. "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)." RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) 6, no. 1 (2023): 69. http://dx.doi.org/10.24853/resistor.6.1.69-78.

Full text
Abstract:
VPN merupakan teknologi yang dapat membuat jaringan privat dengan memanfaatkan jaringan publik untuk mengamankan proses pertukaran data. Teknologi VPN biasanya digunakan untuk menghubungkan unit dan kantor cabang, yaitu dengan membangun terowongan antara dua lokasi. Penelitian ini memiliki tujuan utama untuk mengimplementasikan jaringan VPN antara cabang dan kantor cabang dengan penambahan jaringan keamanan untuk melindungi data agar tidak terkomunikasikan. Hal ini juga yang peneliti lakukan dalam makalah ini dengan membandingkan protokol VPN PPTP (Point-To-Point Tunneling Protocol) dan L2TP/IPsec (Layer Two Tunneling Protocol) menggunakan algoritma MPEE dan kunci enkripsi RSA RC4 128 untuk PPTP dan SHA -1 algoritma dengan AES 128 CBC, AES 128 CTR, enkripsi AES 128 GCM untuk protokol L2TP/IPsec. Setiap pengujian diberi beban lalu lintas unggah dan unduh sebesar 10MB, 20MB, dan 30MB. Hasil QoS (Quality of Service) yang meliputi throughput, packet loss, delay, dan jitter semuanya disajikan secara deskriptif dalam hasil penelitian ini. Kemudian dilakukan pengujian keamanan jaringan menggunakan Sniffing tanpa VPN, Sniffing PPTP, dan Sniffing L2TP. Pengujian keamanan jaringan menunjukkan bahwa data telah berhasil dienkripsi karena dalam pengujian keamanan ini Anda juga melihat aspek kerahasiaan apakah sudah terpenuhi atau belum. Kata Kunci: VPN; PPTP; L2TP/IPsec; Quality of Service; SecurityABSTRACTVPN is a technology that can create a private network by utilizing public network so that the data exchange process becomes secure. VPN technology is typically used to connect the unit and Branch offices, namely by constructing a tunnel between the two locations. This research has the main objective of implementing a VPN network between Branches and Branch offices with the addition of a security network to protect the data to be communicated. This is also what the researchers did in this paper by comparing the VPN protocols PPTP (Point-To-Point Tunnelling Protocol) and L2TP/IPsec (Layer Two Tunnelling Protocol) using the MPEE Algorithm and RSA RC4 encryption key 128 for PPTP and the SHA-1 Algorithm with AES 128 CBC, AES 128 CTR, AES 128 GCM encryption for L2TP/IPsec protocol. Each test is assigned upload and download traffic loads of 10MB, 20MB and 30MB. The QoS (Quality of Service) results including throughput, packet loss, delay, jitter all presented descriptively in the results of this study. Then the network security test is performed using Sniffing without VPN, PPTP Sniffing and L2TP Sniffing. The network security test shows that the data has been successfully encrypted because in this security test you also see the confidentiality aspect whether it has been met or not.
APA, Harvard, Vancouver, ISO, and other styles
3

Mirdan, Syahid Mulya Sudrajat, Perdana Doan, and Muldina Negara Ridha. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. https://doi.org/10.11591/eei.v6i3.622.

Full text
Abstract:
Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtualize environment and aims to determine the perfomances of throughput, delay, jitter, and vCPU Usage using variable packet size in range of 128-1514 byte. From the the result, can be conclude that both of tunneling protocol can isolate the traffic between tenant. For the performance result, NVGRE has the highest value of throughput, 771,02 Mbps and the VXLAN got 753,62 Mbps. For the delay NVGRE got 2.24 ms and VXLAN got 2.29 ms. For the jitter, NVGRE has better rate value of 0.361 ms, than VXLAN value of 0.348 ms, and the vCPU usage performance, NVGRE has the highest performance too that value is 60.57%. So on overall performance NVGRE has the better performance than VXLAN.
APA, Harvard, Vancouver, ISO, and other styles
4

Lukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.

Full text
Abstract:
INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec. SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service
APA, Harvard, Vancouver, ISO, and other styles
5

Mulya Sudrajat, Mirdan Syahid, Doan Perdana, and Ridha Muldina Negara. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. http://dx.doi.org/10.11591/eei.v6i3.622.

Full text
Abstract:
Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtualize environment and aims to determine the perfomances of throughput, delay, jitter, and vCPU Usage using variable packet size in range of 128-1514 byte. From the the result, can be conclude that both of tunneling protocol can isolate the traffic between tenant. For the performance result, NVGRE has the highest value of throughput, 771,02 Mbps and the VXLAN got 753,62 Mbps. For the delay NVGRE got 2.24 ms and VXLAN got 2.29 ms. For the jitter, NVGRE has better rate value of 0.361 ms, than VXLAN value of 0.348 ms, and the vCPU usage performance, NVGRE has the highest performance too that value is 60.57%. So on overall performance NVGRE has the better performance than VXLAN.
APA, Harvard, Vancouver, ISO, and other styles
6

Rosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.

Full text
Abstract:
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
APA, Harvard, Vancouver, ISO, and other styles
7

Gustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.

Full text
Abstract:
Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access point untuk mengetahui kondisi jaringan, dan hanya dapat dilakukan teknisi ketika sedang berada dalam jaringan lokal. Masalahnya ketika teknisi sedang berada pada jaringan publik, maka tidak dapat mengakses mikrotik dan access point tersebut. Penelitian menggunakan metode NDLC dengan penggabungan sistem protokol VPN L2TP dan port forward yang ada di mikrotik. VPN L2TP yang dapat membantu menghubungkan dua mikrotik yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Teknisi mendapatkan IP Public kantor sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Keamanan data dan ketertutupan transmisi data dari akses yang tidak berhak dalam transmisinya pada internet menjadi standar utama dalam VPN, sehingga dalam VPN selalu disertakan akan fitur utama yaitu enkripsi dan tunneling.Kata Kunci : VPN, L2TP, Mikrotik, Remote, Port Forward Abstract - Dishub Bandung is an office within the Bandung City Government, this office has a computer that still has a user who is physically separated from the Lan network and technicians every monitoring data communication by accessing mikrotik and access points to find out network conditions, and can only be done by technicians when they are in the local network. The problem is that when the technician is on the public network, it cannot access the proxy and access point. The study used the NDLC method by combining the L2TP VPN protocol system and the forward port in mikrotik. L2TP VPN that can help connect two different mikrotik in one secure private network and securely stop encrypted data. Technicians get a public IP of the office so that it can be ported forward to open access to devices on the local network so that they can be accessed through the public network through a VPN remote address. Data security and the ability to transmit data from unauthorized access to the internet are the main standards in VPNs, so in VPNs there are always included the main features of encryption and tunneling.Keywords : VPN, L2TP, Mikrotik, Remote, Port Forward
APA, Harvard, Vancouver, ISO, and other styles
8

Ali, Twana. "Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity." Sulaimani Journal for Engineering Sciences 11, no. 1 (2024): 111–19. https://doi.org/10.17656/sjes.10183.

Full text
Abstract:
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances the security features of the network layer, allowing several segments of a private network to function as a single segment. This research analyzes the overheads associated with IPsec. The results of this review paper demonstrate that IPsec remains within appropriate operating ranges even when additional packets are inserted. IPsec consists of two protocols, AH and ESP, which safeguard IP packets. As a result of the analysis, a novel IPsec service has been implemented. This new scheme reduces the workload for on-the-spot devices and ensures compatibility with existing structured solutions. Additionally, the reduced overhead of the packet leads to fewer cryptographic calculations.
APA, Harvard, Vancouver, ISO, and other styles
9

Wa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.

Full text
Abstract:
<strong><em>Abstract</em></strong><em>Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service</em> (QoS)<em> parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.</em>
APA, Harvard, Vancouver, ISO, and other styles
10

Fathsyah, Muhammad Munaza, Irawan Hadi, and Irma Salamah. "Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya." Jurnal Teknik Komputer 7, no. 2 (2021): 222–28. http://dx.doi.org/10.31294/jtk.v7i2.11077.

Full text
Abstract:
Pertumbuhan, perkembangan, dan kebutuhan akan informasi terus-menerus menjadi sebuah kebutuhan primer bagi setiap masyarakat umum, organisasi, perusahaan, dan lembaga pendidikan. Salah satu contoh lembaga pendidikan yang memiliki kebutuhan akan informasi yaitu Politeknik Negeri Sriwijaya (Polsri), dimana dosen dan mahasiswa memerlukan koneksi melalui sebuah media kabel ataupun nirkabel untuk terhubung ke jaringan internet (global) maupun jaringan intranet (lokal). Sistem Akademik dan Learning Management System (LMS) adalah salah satu jaringan lokal Polsri yang paling sering diakses untuk memenuhi kegiatan akademik. Dosen ataupun mahasiswa sebagai client akan terus dapat mengakses jaringan lokal tersebut selama jalur komunikasi atau media transmisi antar router client dan router server tetap terhubung. Apabila jalur komunikasi utama antar router client dan router server terputus oleh faktor tertentu, maka client tidak dapat mengakses jaringan lokal sehingga proses kegiatan akademik menjadi terhambat. Untuk menghindari kejadian tersebut, maka diperlukan sebuah jalur komunikasi cadangan (backup link) dan suatu penerapan teknik failover pada sisi router client. Teknik failover adalah teknik yang memiliki kemampuan untuk mengalihkan jalur komunikasi utama ke jalur komunikasi cadangan sehingga komunikasi dapat terus berjalan meskipun jalur komunikasi utama terputus. Jalur komunikasi cadangan pada implementasi ini didukung oleh teknologi telepon seluler generasi keempat atau teknologi yang lebih dikenal dengan istilah 4G LTE (Fourth Generation Long Term Evolution). Selain itu, terdapat penerapan Virtual Private Network (VPN) tipe Layer Two Tunneling Protocol (L2TP) pada jalur komunikasi cadangan untuk menjaga keamanan komunikasi. Protokol routing yang akan digunakan untuk melakukan proses pertukaran informasi routing pada implementasi ini adalah Border Gateway Protocol (BGP).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Layer Two Tunneling Protocol"

1

Rupprecht, David Johannes Helmut [Verfasser], Christina [Gutachter] Pöpper, Thorsten [Gutachter] Holz, and Aurélien [Gutachter] Francillon. "Enhancing the security of 4G and 5G mobile networks on protocol layer two / David Johannes Helmut Rupprecht ; Gutachter: Christina Pöpper, Thorsten Holz, Aurélien Francillon ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2021. http://d-nb.info/1233484036/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rutagemwa, Humphrey. "Performance Modeling, Design and Analysis of Transport Mechanisms in Integrated Heterogeneous Wireless Networks." Thesis, 2007. http://hdl.handle.net/10012/2770.

Full text
Abstract:
Recently, wireless access to Internet applications and services has attracted a lot of attention. However, there is no single wireless network that can meet all mobile users’ requirements. Con-sequently, integrated heterogeneous wireless networks are introduced to meet diverse wireless Internet applications and services requirements. On the other hand, integrated heterogeneous wireless networks pose new challenges to the design and development of reliable transport mechanisms. Wireless Application Protocol version 2 (WAP 2.0) is one of the promising trans-port mechanisms. It uses wireless profiled TCP (WP-TCP), which is fully compatible with TCP, as one of the reliable transport protocols to cope with the wireless link impairments. For WAP 2.0 to continue providing reliable and efficient transport services in the future, one of the key is-sues is to thoroughly study, understand, and improve its performance in integrated heterogeneous wireless networks. In this thesis, we develop analytical frameworks and propose a solution to respectively study and improve the performance of WP-TCP in integrated heterogeneous wireless networks. Spe-cifically, we consider WP-TCP short- and long-lived flows over integrated wireless local area network (WLAN) and wireless wide area network (WWAN), where WLAN can be static or mo-bile. In order to facilitate the analysis of WP-TCP performance in integrated WLAN and WWAN, we first construct a novel WLAN link model, which captures the impact of both uncor-related and correlated transmission errors, and derive mathematical expressions that describe packet loss probability and packet loss burst length over WWAN-WLAN link. Then, we develop analytical frameworks for studying the performance of WP-TCP short- and long-lived flows. Differently from those reported in the literature, our analytical framework for WP-TCP short-lived flows takes into account both correlated and uncorrelated packet losses. Furthermore, our analytical framework for long-lived flow can be used to study the short-term (during vertical handover) and long-term performances of WP-TCP and it captures the effects of vertical handover, such as excessive packet losses and sudden change in network characteristics, which are commonly experienced in integrated static WLAN and WWAN. By using the devel-oped analytical frameworks, we extensively analyze the performance of WP-TCP flows and in-vestigate the optimal protocol design parameters over a wide range of network conditions. Finally, based on our analytical studies, we propose a receiver-centric loosely coupled cross-layer design along with two proactive schemes, which significantly improve the vertical hand-over performance. The proposed solution is easy to implement and deploy, compatible with tra-ditional TCP, and robust in the absence of cross-layer information. Extensive simulations have been conducted to confirm the effectiveness and practicability of our schemes.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Layer Two Tunneling Protocol"

1

Xu, Feng, Qian Ni, and PanFei Liu. "An Energy-efficient Routing Protocol Based on Two-Layer Clustering in WSNs." In Web and Big Data. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25158-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wen, Fulin, Lei Yang, Wei Cai, and Pan Zhou. "DP-Hybrid: A Two-Layer Consensus Protocol for High Scalability in Permissioned Blockchain." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9213-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Zhile, Minrui Fei, Weiyan Hou, and Bingchen Wang. "The Design and Simulation of a Two-Layer Network Protocol for Industrial Wireless Monitoring and Control System." In AsiaSim 2012. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34384-1_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jamali, Abdellah, Najib Naja, and Driss El Ouadghiri. "Utilization of an Improvement Manuel Configuration for Multimedia in 6to4 Tunneling." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch009.

Full text
Abstract:
IPv6 is a next-generation Internet layer protocol designed by the IETF (Internet Engineering Task Force) to solve the problem of IP address depletion under the current Internet layer protocol. It has been developed to replace the current Internet Protocol version 4 (IPv4). Various operating systems support IPv6 protocol stacks and network infrastructures are currently being deployed to support the functions of IPv6. During the course of the deployment of IPv6 protocol, the authors found several critical implementation and operational issues which distract user and possibly prevent wide deployment of IPv6. Among the problems identified are the stateless IP auto-configuration, which provides for each node connected to the network an IP address. The authors have previously examined the problem in Fedora Core operating system, and in this work, they make a slight modification on the same method using Red Hat operating system. The proposed method is independent of rebooting NIC. This method ensures the establishment of addresses if problems occur.
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Bilal Muhammad, and Rabia Bilal. "Cross-Layer Cooperative Protocol for Industrial Wireless Sensor Network." In Handbook of Research on Recent Developments in Intelligent Communication Application. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1785-6.ch008.

Full text
Abstract:
Robustness and reliability are two essential network parameters to be given priority in Industrial Wireless Sensor Network. But at the same time it is difficult to achieve gain in these performance metrics. Since in industries these networks are used for monitoring, control and automation processes, therefore, it also requires robust communication with minimum delay. Considering the need of high QoS in Industrial WSN, protocols and standards were developed to fulfil the requirement of reliable data communication in harsh environment. In year 2007, HART community designed a Wireless HART standard for efficient industrial communication. This standard gain high reputation soon after its implementation and still being used as a universal solution for industries. In 2009, another standard ISA100.11a was developed, it also gives promised results but fails to eliminate WHART. Both these standards are still competing in industry and the results of these standards are more reliable in comparison to other wireless industrial protocols that exists.
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Bilal Muhammad, and Rabia Bilal. "Cross-Layer Cooperative Protocol for Industrial Wireless Sensor Network." In Sensor Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch026.

Full text
Abstract:
Robustness and reliability are two essential network parameters to be given priority in Industrial Wireless Sensor Network. But at the same time it is difficult to achieve gain in these performance metrics. Since in industries these networks are used for monitoring, control and automation processes, therefore, it also requires robust communication with minimum delay. Considering the need of high QoS in Industrial WSN, protocols and standards were developed to fulfil the requirement of reliable data communication in harsh environment. In year 2007, HART community designed a Wireless HART standard for efficient industrial communication. This standard gain high reputation soon after its implementation and still being used as a universal solution for industries. In 2009, another standard ISA100.11a was developed, it also gives promised results but fails to eliminate WHART. Both these standards are still competing in industry and the results of these standards are more reliable in comparison to other wireless industrial protocols that exists.
APA, Harvard, Vancouver, ISO, and other styles
7

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch013.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
8

"Two-Dimensional Quantization Effect on Indirect Tunneling in SOI Lubistors with a Thin Silicon Layer." In Soi Lubistors. John Wiley & Sons Singapore Pte. Ltd., 2013. http://dx.doi.org/10.1002/9781118487914.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mishra, Alekha Kumar. "Security Threats in Wireless Sensor Networks." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0486-3.ch012.

Full text
Abstract:
Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.
APA, Harvard, Vancouver, ISO, and other styles
10

van Oosterhout E.M.W., Talmon J.L., De Clercq P.A., Schouten H.C., Jansen M.P.F., and Hasman A. "The PropeR way to support medical doctors in daily practice. Developing the Protocol Based DSS." In Studies in Health Technology and Informatics. IOS Press, 2003. https://doi.org/10.3233/978-1-60750-939-4-340.

Full text
Abstract:
This paper describes the first phase of the development of a Protocol based Decision Support System (PDSS) that will be linked to an Electronic Patient Record system (EPR system). The protocol system will be pro-active: the physician will be automatically prompted from the EPR of a particular patient if the protocol that applies for that patient defines it necessary. The PropeR project studies the impact of a PDSS that is linked to an EPR on daily care processes. There are two areas of research: hospital and home care. This paper describes the application in the hospital. The protocol that is being computerized is a treatment protocol for Acute Myelogenous Leukaemia (AML) that also studies treatment alternatives (conventional versus experimental treatment). This paper based AML protocol has been translated into a formal representation. The KA-tool Gaston is used to make this representation. Twenty-eight subprotocols have been organized in a hierarchical structure with three levels. One of the aims of the project is to make a representation of the AML protocol that can be used in other organizations as well. The main problem we encountered is that the representation not only contains the content of the protocol, but also aspects of application of that protocol in daily care of the hospital and aspects of support. The solution to this problem is the creation of two layers of representation: the first layer is an exact copy of the protocol and thus sharable and the second layer focuses on the support of the protocol in the daily working processes and is mainly domain specific: for the University Hospital Maastricht. At the moment, this division into two layers is being discussed
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Layer Two Tunneling Protocol"

1

Chang, Benjamin T. A., and Ali N. Moosavi. "Critical Pre-Qualification Test Protocol for External High Temperature Pipeline Coatings." In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-3804.

Full text
Abstract:
Abstract In the past, the service temperature for the large diameter external pipeline coatings has tended to be below 65 °C. Both FBE (fusion bonded epoxy) and 3LPE (3 layer polyethylene) have performed reasonably well at these temperatures. In recent years however, higher service temperature pipeline coatings have been requested by end users worldwide. In response to this demand, coating manufacturers have fabricated several new FBE coatings of high glass transition temperatures and phenolic epoxy coatings for this market. However, as yet there is no publicly accepted test protocol to qualify these newly developed high temperature coatings. In addition to FBE and phenolic epoxy, 3 layer polypropylene (3LPP) is also a candidate coating system for high service temperatures. PP coating manufacturers specify service temperatures in the range of 110 °C to 140 °C. However, 3LPP cracking and disbondment and PP girthweld joint coating cracking at lower service temperatures have been reported in the literature. The purpose of this work is to develop a new test protocol to prequalify candidate high temperature mainline and field joint coatings. The test protocol focuses on two critical coating properties: material stability and coating-steel interfacial adhesion durability in the hygrothermal and thermo-oxidative environments. This test protocol has already been used to qualify the high service temperature pipeline coatings for major oil and gas operators, including gas transfer lines with a design temperature of 110°C.
APA, Harvard, Vancouver, ISO, and other styles
2

Marchiori, Alan, Brian Bouquillon, Sanjay Bajekal, Mark Davis, Nicholas Soldner, and Cagatay Tokgoz. "Rotor Wireless Load and Motion Monitoring Sensor Network." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9652.

Full text
Abstract:
The Sikorsky Aircraft Corporation (SAC) and the U.S. Army Aviation Development Directorate - Aviation Applied Technology Directorate (ADD-AATD) are jointly sponsoring the Capability-Based Operations and Sustainment Technology-Aviation (COST-A) program. The objective of COST-A is to demonstrate an integrated set of high-value diagnostics, prognostics, and system health management technologies that reduce the maintenance burden, without sacrificing safety. A key technology for the COST-A project was the development of a rotor local wireless sensor network (RLWSN) for purposes of data acquisition from self-powered, wireless rotor sensors. Two key requirements were identified: deterministic quality of service for wireless communications and a scalable architecture that supports growth in the number of sensors for future applications. This paper presents a model-based approach to design and implementation of a RLWSN gateway that addresses these requirements. The approach, which included simulation and validation of models, has resulted in an architecture for an antenna array that ensures the desired quality of service at the physical layer of wireless transmissions without the need for protocol based recovery methods, thereby improving bandwidth efficiency and utilization raising the upper bound on scalability of the sensor network.
APA, Harvard, Vancouver, ISO, and other styles
3

Efird, K. D. "Oil Characteristics, Water/Oil Wetting and Flow Influence on the Metal Loss Corrosion – Part II: Chemistry, Wetability and Experimental Evaluation." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06114.

Full text
Abstract:
Abstract The chemical components of a crude oil in crude oil/water production environments have a significant effect on steel corrosion. This effect is twofold. First, the crude oil alters the brine chemistry, affecting the corrosion rate and protectiveness of the corrosion product layer formed on the steel in much the same manner as synthetic corrosion inhibitors. This effect is predominant whenever a separated water phase is in contact with the steel, such as stratified pipe flow and the bottom of production separators, or when the crude oil and produced water are in a water external mixture. Second, the crude oil affects the tendency of either water or crude oil to wet the surface, influencing steel corrosion. This is termed “wettability preference.” This effect is predominant when the crude oil and produced water are mixed as in turbulent pipe flow and in production tubulars and is particularly significant for corrosion at low water contents. The experimental evaluation of the effect of a crude oil on steel corrosion must account for both of these effects. That is, the experimental protocol must evaluate corrosion in simulated produced water chemically equilibrated with the crude oil, as well as experimentally measure the effect of the crude oil on wettability preference and steel corrosion in the crude oil/water mixture. Wettability preference and brine chemistry alteration are two separate issues, and both must be evaluated to get a complete picture of the crude oil effect on steel corrosion. This allows a much more complete picture of the effect of crude oil on steel corrosion behavior in a production environment. While there has been progress in understanding the effect of crude oil on steel corrosion, the details of the influence of crude oil chemistry are only partially understood. This is the area where future research is needed.
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Mingming, Qin Zhao, Minoru Kuramoto, Fumihiro Cho, and Lunyong Zhang. "Research and implementation of Layer Two Tunneling Protocol (L2TP) on carrier network." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mori, Nobuya, Futo Hashimoto, Takaya Mishima, and Hajime Tanaka. "Analytical Models for Inter-Layer Tunneling in Two-Dimensional Materials." In 2021 International Conference on Solid State Devices and Materials. The Japan Society of Applied Physics, 2021. http://dx.doi.org/10.7567/ssdm.2021.h-5-03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bischoff, Mathias. "A smart layer two protocol for IP over WDM." In Optical Fiber Communication Conference. OSA, 2001. http://dx.doi.org/10.1364/ofc.2001.mn3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ren, Z., and J. S. Meditch. "A two-layer congestion control protocol for broadband ISDN." In [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications. IEEE, 1992. http://dx.doi.org/10.1109/infcom.1992.263510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zeng, Taofang. "Multi-Layer Thermionic-Tunneling Structures for Power Generation." In ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems collocated with the ASME 2005 Heat Transfer Summer Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/ipack2005-73448.

Full text
Abstract:
A new method for power generation based on nano-engineered interface design with partially filled gap is proposed. The device combines electron thermionic emission and tunneling to enhance electron transport. Thermal radiation and tunneling contribute to heat transfer in the device, which can be minimized using selected materials. The largely reduced heat transfer coupled with use of multi-layer structures enable a substantial temperature difference between heat source and heat sink or two electrodes, thereby maximizing heat source utilization. Detailed analyses are provided for the solid device operating either as a power generator or as a cooler.
APA, Harvard, Vancouver, ISO, and other styles
9

Capasso, F., S. Sen, A. Y. Cho, and A. L. Hutchinson. "Resonant Tunneling Electron Spectroscopy." In Picosecond Electronics and Optoelectronics. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/peo.1987.thc4.

Full text
Abstract:
In this paper we demonstrate a new electron spectroscopy technique based on resonant tunneling. The key difference compared to conventional hot electron spectroscopy1 is the use of a resonant tunneling double barrier in the collector of the structure (Fig. 1). The advantage of this new feature is that it allows one to obtain information on the electron momentum distribution n(p⊥) (or energy distribution n(E⊥)) perpendicular to the layers directly from the measured resonant tunneling collector current, without requiring the use of derivative techniques. Figure 1 illustrates the band diagrams of two structures for resonant tunneling electron spectroscopy. The first one (Fig. 1a), realized by us in the present experiment, consists of a reverse biased pn heterojunction and can be used to investigate hot minority carrier transport. Incident light is strongly absorbed in the wide-gap p+ layer. Photo-generated minority carrier electrons diffuse to an adjacent low-gap layer. Upon entering this region electrons are ballistically accelerated by the abrupt potential step and gain a kinetic energy ≅ ΔEc. Collisions in the low gap layer tend to randomize the injected, nearly mono-energetic distribution, making it "hot".
APA, Harvard, Vancouver, ISO, and other styles
10

Someswar, G. Manoj, and B. V. V. S. Prasad. "USVGM protocol with two layer architecture for efficient network management in MANET'S." In 2017 2nd International Conference on Communication and Electronics Systems (ICCES). IEEE, 2017. http://dx.doi.org/10.1109/cesys.2017.8321179.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Layer Two Tunneling Protocol"

1

Townsley, W., A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. Layer Two Tunneling Protocol "L2TP". RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lau, J., M. Townsley, and I. Goyret, eds. Layer Two Tunneling Protocol - Version 3 (L2TPv3). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rawat, V., R. Tio, S. Nanji, and R. Verma. Layer Two Tunneling Protocol (L2TP) over Frame Relay. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Calhoun, P., W. Luo, D. McPherson, and K. Peirce. Layer Two Tunneling Protocol (L2TP) Differentiated Services Extension. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Caves, E., P. Calhoun, and R. Wheeler. Layer Two Tunneling Protocol "L2TP" Management Information Base. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Palter, W., and W. Townsley. Layer-Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Townsley, W. Layer Two Tunneling Protocol (L2TP) Internet Assigned Numbers Authority (IANA) Considerations Update. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vainshtein, A., and S. Galtzur. Layer Two Tunneling Protocol version 3 - Setup of Time-Division Multiplexing (TDM) Pseudowires. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Storer, B., M. Dos Santos, L. Toutain, and J. Tremblay. Softwire Hub and Spoke Deployment Framework with Layer Two Tunneling Protocol Version 2 (L2TPv2). Edited by C. Pignataro and B. Stevant. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, A., R. Turner, R. Tio, and S. Nanji. Layer Two Tunnelling Protocol (L2TP) Over ATM Adaptation Layer 5 (AAL5). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography