Academic literature on the topic 'Layer Two Tunneling Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Layer Two Tunneling Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Layer Two Tunneling Protocol"
Silvia Anggraeni, Nico Setyo Triwibowo, Muhammad Fahrurizqi Ilham, Irfan Rizki Arip, and Rubio Azza Arafah. "Perbandingan Quality of Service antara VPN Point-to-Point Tunneling Protocol Dan Layer Two Tunneling Protocol Di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta." JE-Unisla 9, no. 2 (2024): 195–204. https://doi.org/10.30736/je-unisla.v9i2.1320.
Full textGunawan, Muhammad Alvin, and Sukma Wardhana. "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)." RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) 6, no. 1 (2023): 69. http://dx.doi.org/10.24853/resistor.6.1.69-78.
Full textMirdan, Syahid Mulya Sudrajat, Perdana Doan, and Muldina Negara Ridha. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. https://doi.org/10.11591/eei.v6i3.622.
Full textLukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.
Full textMulya Sudrajat, Mirdan Syahid, Doan Perdana, and Ridha Muldina Negara. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. http://dx.doi.org/10.11591/eei.v6i3.622.
Full textRosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.
Full textGustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Full textAli, Twana. "Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity." Sulaimani Journal for Engineering Sciences 11, no. 1 (2024): 111–19. https://doi.org/10.17656/sjes.10183.
Full textWa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.
Full textFathsyah, Muhammad Munaza, Irawan Hadi, and Irma Salamah. "Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya." Jurnal Teknik Komputer 7, no. 2 (2021): 222–28. http://dx.doi.org/10.31294/jtk.v7i2.11077.
Full textDissertations / Theses on the topic "Layer Two Tunneling Protocol"
Rupprecht, David Johannes Helmut [Verfasser], Christina [Gutachter] Pöpper, Thorsten [Gutachter] Holz, and Aurélien [Gutachter] Francillon. "Enhancing the security of 4G and 5G mobile networks on protocol layer two / David Johannes Helmut Rupprecht ; Gutachter: Christina Pöpper, Thorsten Holz, Aurélien Francillon ; Fakultät für Elektrotechnik und Informationstechnik." Bochum : Ruhr-Universität Bochum, 2021. http://d-nb.info/1233484036/34.
Full textRutagemwa, Humphrey. "Performance Modeling, Design and Analysis of Transport Mechanisms in Integrated Heterogeneous Wireless Networks." Thesis, 2007. http://hdl.handle.net/10012/2770.
Full textBook chapters on the topic "Layer Two Tunneling Protocol"
Xu, Feng, Qian Ni, and PanFei Liu. "An Energy-efficient Routing Protocol Based on Two-Layer Clustering in WSNs." In Web and Big Data. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25158-0_15.
Full textWen, Fulin, Lei Yang, Wei Cai, and Pan Zhou. "DP-Hybrid: A Two-Layer Consensus Protocol for High Scalability in Permissioned Blockchain." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9213-3_5.
Full textYang, Zhile, Minrui Fei, Weiyan Hou, and Bingchen Wang. "The Design and Simulation of a Two-Layer Network Protocol for Industrial Wireless Monitoring and Control System." In AsiaSim 2012. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34384-1_48.
Full textJamali, Abdellah, Najib Naja, and Driss El Ouadghiri. "Utilization of an Improvement Manuel Configuration for Multimedia in 6to4 Tunneling." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch009.
Full textKhan, Bilal Muhammad, and Rabia Bilal. "Cross-Layer Cooperative Protocol for Industrial Wireless Sensor Network." In Handbook of Research on Recent Developments in Intelligent Communication Application. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1785-6.ch008.
Full textKhan, Bilal Muhammad, and Rabia Bilal. "Cross-Layer Cooperative Protocol for Industrial Wireless Sensor Network." In Sensor Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch026.
Full textUpadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch013.
Full text"Two-Dimensional Quantization Effect on Indirect Tunneling in SOI Lubistors with a Thin Silicon Layer." In Soi Lubistors. John Wiley & Sons Singapore Pte. Ltd., 2013. http://dx.doi.org/10.1002/9781118487914.ch11.
Full textMishra, Alekha Kumar. "Security Threats in Wireless Sensor Networks." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0486-3.ch012.
Full textvan Oosterhout E.M.W., Talmon J.L., De Clercq P.A., Schouten H.C., Jansen M.P.F., and Hasman A. "The PropeR way to support medical doctors in daily practice. Developing the Protocol Based DSS." In Studies in Health Technology and Informatics. IOS Press, 2003. https://doi.org/10.3233/978-1-60750-939-4-340.
Full textConference papers on the topic "Layer Two Tunneling Protocol"
Chang, Benjamin T. A., and Ali N. Moosavi. "Critical Pre-Qualification Test Protocol for External High Temperature Pipeline Coatings." In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-3804.
Full textMarchiori, Alan, Brian Bouquillon, Sanjay Bajekal, Mark Davis, Nicholas Soldner, and Cagatay Tokgoz. "Rotor Wireless Load and Motion Monitoring Sensor Network." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9652.
Full textEfird, K. D. "Oil Characteristics, Water/Oil Wetting and Flow Influence on the Metal Loss Corrosion – Part II: Chemistry, Wetability and Experimental Evaluation." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06114.
Full textHu, Mingming, Qin Zhao, Minoru Kuramoto, Fumihiro Cho, and Lunyong Zhang. "Research and implementation of Layer Two Tunneling Protocol (L2TP) on carrier network." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155900.
Full textMori, Nobuya, Futo Hashimoto, Takaya Mishima, and Hajime Tanaka. "Analytical Models for Inter-Layer Tunneling in Two-Dimensional Materials." In 2021 International Conference on Solid State Devices and Materials. The Japan Society of Applied Physics, 2021. http://dx.doi.org/10.7567/ssdm.2021.h-5-03.
Full textBischoff, Mathias. "A smart layer two protocol for IP over WDM." In Optical Fiber Communication Conference. OSA, 2001. http://dx.doi.org/10.1364/ofc.2001.mn3.
Full textRen, Z., and J. S. Meditch. "A two-layer congestion control protocol for broadband ISDN." In [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications. IEEE, 1992. http://dx.doi.org/10.1109/infcom.1992.263510.
Full textZeng, Taofang. "Multi-Layer Thermionic-Tunneling Structures for Power Generation." In ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems collocated with the ASME 2005 Heat Transfer Summer Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/ipack2005-73448.
Full textCapasso, F., S. Sen, A. Y. Cho, and A. L. Hutchinson. "Resonant Tunneling Electron Spectroscopy." In Picosecond Electronics and Optoelectronics. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/peo.1987.thc4.
Full textSomeswar, G. Manoj, and B. V. V. S. Prasad. "USVGM protocol with two layer architecture for efficient network management in MANET'S." In 2017 2nd International Conference on Communication and Electronics Systems (ICCES). IEEE, 2017. http://dx.doi.org/10.1109/cesys.2017.8321179.
Full textReports on the topic "Layer Two Tunneling Protocol"
Townsley, W., A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. Layer Two Tunneling Protocol "L2TP". RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2661.
Full textLau, J., M. Townsley, and I. Goyret, eds. Layer Two Tunneling Protocol - Version 3 (L2TPv3). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3931.
Full textRawat, V., R. Tio, S. Nanji, and R. Verma. Layer Two Tunneling Protocol (L2TP) over Frame Relay. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3070.
Full textCalhoun, P., W. Luo, D. McPherson, and K. Peirce. Layer Two Tunneling Protocol (L2TP) Differentiated Services Extension. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3308.
Full textCaves, E., P. Calhoun, and R. Wheeler. Layer Two Tunneling Protocol "L2TP" Management Information Base. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3371.
Full textPalter, W., and W. Townsley. Layer-Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3437.
Full textTownsley, W. Layer Two Tunneling Protocol (L2TP) Internet Assigned Numbers Authority (IANA) Considerations Update. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3438.
Full textVainshtein, A., and S. Galtzur. Layer Two Tunneling Protocol version 3 - Setup of Time-Division Multiplexing (TDM) Pseudowires. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5611.
Full textStorer, B., M. Dos Santos, L. Toutain, and J. Tremblay. Softwire Hub and Spoke Deployment Framework with Layer Two Tunneling Protocol Version 2 (L2TPv2). Edited by C. Pignataro and B. Stevant. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5571.
Full textSingh, A., R. Turner, R. Tio, and S. Nanji. Layer Two Tunnelling Protocol (L2TP) Over ATM Adaptation Layer 5 (AAL5). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3355.
Full text