To see the other types of publications on this topic, follow the link: Layer Two Tunneling Protocol.

Journal articles on the topic 'Layer Two Tunneling Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Layer Two Tunneling Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Silvia Anggraeni, Nico Setyo Triwibowo, Muhammad Fahrurizqi Ilham, Irfan Rizki Arip, and Rubio Azza Arafah. "Perbandingan Quality of Service antara VPN Point-to-Point Tunneling Protocol Dan Layer Two Tunneling Protocol Di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta." JE-Unisla 9, no. 2 (2024): 195–204. https://doi.org/10.30736/je-unisla.v9i2.1320.

Full text
Abstract:
Penelitian ini membandingkan kualitas layanan quality of service (QoS) antara virtual private network (VPN) point-to-point tunneling protocol (PPTP) dan layer two tunneling protocol (L2TP) di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta (FT UPNVJ). Parameter QoS yang diuji meliputi latency, throughput, jitter, dan packet loss menggunakan perangkat lunak Wireshark. Hasil pengukuran menunjukkan bahwa PPTP lebih baik dalam hal jitter dan delay, sedangkan L2TP unggul dalam throughput dan packet loss. Temuan ini memberikan panduan bagi pengelola jaringan dalam memilih protokol VPN yang sesuai dengan kebutuhan komunikasi data di lingkungan FT UPNVJ.
APA, Harvard, Vancouver, ISO, and other styles
2

Gunawan, Muhammad Alvin, and Sukma Wardhana. "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)." RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) 6, no. 1 (2023): 69. http://dx.doi.org/10.24853/resistor.6.1.69-78.

Full text
Abstract:
VPN merupakan teknologi yang dapat membuat jaringan privat dengan memanfaatkan jaringan publik untuk mengamankan proses pertukaran data. Teknologi VPN biasanya digunakan untuk menghubungkan unit dan kantor cabang, yaitu dengan membangun terowongan antara dua lokasi. Penelitian ini memiliki tujuan utama untuk mengimplementasikan jaringan VPN antara cabang dan kantor cabang dengan penambahan jaringan keamanan untuk melindungi data agar tidak terkomunikasikan. Hal ini juga yang peneliti lakukan dalam makalah ini dengan membandingkan protokol VPN PPTP (Point-To-Point Tunneling Protocol) dan L2TP/IPsec (Layer Two Tunneling Protocol) menggunakan algoritma MPEE dan kunci enkripsi RSA RC4 128 untuk PPTP dan SHA -1 algoritma dengan AES 128 CBC, AES 128 CTR, enkripsi AES 128 GCM untuk protokol L2TP/IPsec. Setiap pengujian diberi beban lalu lintas unggah dan unduh sebesar 10MB, 20MB, dan 30MB. Hasil QoS (Quality of Service) yang meliputi throughput, packet loss, delay, dan jitter semuanya disajikan secara deskriptif dalam hasil penelitian ini. Kemudian dilakukan pengujian keamanan jaringan menggunakan Sniffing tanpa VPN, Sniffing PPTP, dan Sniffing L2TP. Pengujian keamanan jaringan menunjukkan bahwa data telah berhasil dienkripsi karena dalam pengujian keamanan ini Anda juga melihat aspek kerahasiaan apakah sudah terpenuhi atau belum. Kata Kunci: VPN; PPTP; L2TP/IPsec; Quality of Service; SecurityABSTRACTVPN is a technology that can create a private network by utilizing public network so that the data exchange process becomes secure. VPN technology is typically used to connect the unit and Branch offices, namely by constructing a tunnel between the two locations. This research has the main objective of implementing a VPN network between Branches and Branch offices with the addition of a security network to protect the data to be communicated. This is also what the researchers did in this paper by comparing the VPN protocols PPTP (Point-To-Point Tunnelling Protocol) and L2TP/IPsec (Layer Two Tunnelling Protocol) using the MPEE Algorithm and RSA RC4 encryption key 128 for PPTP and the SHA-1 Algorithm with AES 128 CBC, AES 128 CTR, AES 128 GCM encryption for L2TP/IPsec protocol. Each test is assigned upload and download traffic loads of 10MB, 20MB and 30MB. The QoS (Quality of Service) results including throughput, packet loss, delay, jitter all presented descriptively in the results of this study. Then the network security test is performed using Sniffing without VPN, PPTP Sniffing and L2TP Sniffing. The network security test shows that the data has been successfully encrypted because in this security test you also see the confidentiality aspect whether it has been met or not.
APA, Harvard, Vancouver, ISO, and other styles
3

Mirdan, Syahid Mulya Sudrajat, Perdana Doan, and Muldina Negara Ridha. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. https://doi.org/10.11591/eei.v6i3.622.

Full text
Abstract:
Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtualize environment and aims to determine the perfomances of throughput, delay, jitter, and vCPU Usage using variable packet size in range of 128-1514 byte. From the the result, can be conclude that both of tunneling protocol can isolate the traffic between tenant. For the performance result, NVGRE has the highest value of throughput, 771,02 Mbps and the VXLAN got 753,62 Mbps. For the delay NVGRE got 2.24 ms and VXLAN got 2.29 ms. For the jitter, NVGRE has better rate value of 0.361 ms, than VXLAN value of 0.348 ms, and the vCPU usage performance, NVGRE has the highest performance too that value is 60.57%. So on overall performance NVGRE has the better performance than VXLAN.
APA, Harvard, Vancouver, ISO, and other styles
4

Lukman, Lukman, and Aiman Mukhlishah. "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (Ipsec) Menggunakan Metode Quality Of Service (Qos)." Respati 15, no. 2 (2020): 16. http://dx.doi.org/10.35842/jtir.v15i2.344.

Full text
Abstract:
INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec. SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service
APA, Harvard, Vancouver, ISO, and other styles
5

Mulya Sudrajat, Mirdan Syahid, Doan Perdana, and Ridha Muldina Negara. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. http://dx.doi.org/10.11591/eei.v6i3.622.

Full text
Abstract:
Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtualize environment and aims to determine the perfomances of throughput, delay, jitter, and vCPU Usage using variable packet size in range of 128-1514 byte. From the the result, can be conclude that both of tunneling protocol can isolate the traffic between tenant. For the performance result, NVGRE has the highest value of throughput, 771,02 Mbps and the VXLAN got 753,62 Mbps. For the delay NVGRE got 2.24 ms and VXLAN got 2.29 ms. For the jitter, NVGRE has better rate value of 0.361 ms, than VXLAN value of 0.348 ms, and the vCPU usage performance, NVGRE has the highest performance too that value is 60.57%. So on overall performance NVGRE has the better performance than VXLAN.
APA, Harvard, Vancouver, ISO, and other styles
6

Rosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.

Full text
Abstract:
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
APA, Harvard, Vancouver, ISO, and other styles
7

Gustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.

Full text
Abstract:
Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access point untuk mengetahui kondisi jaringan, dan hanya dapat dilakukan teknisi ketika sedang berada dalam jaringan lokal. Masalahnya ketika teknisi sedang berada pada jaringan publik, maka tidak dapat mengakses mikrotik dan access point tersebut. Penelitian menggunakan metode NDLC dengan penggabungan sistem protokol VPN L2TP dan port forward yang ada di mikrotik. VPN L2TP yang dapat membantu menghubungkan dua mikrotik yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Teknisi mendapatkan IP Public kantor sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Keamanan data dan ketertutupan transmisi data dari akses yang tidak berhak dalam transmisinya pada internet menjadi standar utama dalam VPN, sehingga dalam VPN selalu disertakan akan fitur utama yaitu enkripsi dan tunneling.Kata Kunci : VPN, L2TP, Mikrotik, Remote, Port Forward Abstract - Dishub Bandung is an office within the Bandung City Government, this office has a computer that still has a user who is physically separated from the Lan network and technicians every monitoring data communication by accessing mikrotik and access points to find out network conditions, and can only be done by technicians when they are in the local network. The problem is that when the technician is on the public network, it cannot access the proxy and access point. The study used the NDLC method by combining the L2TP VPN protocol system and the forward port in mikrotik. L2TP VPN that can help connect two different mikrotik in one secure private network and securely stop encrypted data. Technicians get a public IP of the office so that it can be ported forward to open access to devices on the local network so that they can be accessed through the public network through a VPN remote address. Data security and the ability to transmit data from unauthorized access to the internet are the main standards in VPNs, so in VPNs there are always included the main features of encryption and tunneling.Keywords : VPN, L2TP, Mikrotik, Remote, Port Forward
APA, Harvard, Vancouver, ISO, and other styles
8

Ali, Twana. "Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity." Sulaimani Journal for Engineering Sciences 11, no. 1 (2024): 111–19. https://doi.org/10.17656/sjes.10183.

Full text
Abstract:
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances the security features of the network layer, allowing several segments of a private network to function as a single segment. This research analyzes the overheads associated with IPsec. The results of this review paper demonstrate that IPsec remains within appropriate operating ranges even when additional packets are inserted. IPsec consists of two protocols, AH and ESP, which safeguard IP packets. As a result of the analysis, a novel IPsec service has been implemented. This new scheme reduces the workload for on-the-spot devices and ensures compatibility with existing structured solutions. Additionally, the reduced overhead of the packet leads to fewer cryptographic calculations.
APA, Harvard, Vancouver, ISO, and other styles
9

Wa, Ode Zamalia, Fid Aksara L.M., and Yamin Muh. "ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK." semanTIK 4, no. 2 (2018): 29–36. https://doi.org/10.5281/zenodo.1444898.

Full text
Abstract:
<strong><em>Abstract</em></strong><em>Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service</em> (QoS)<em> parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.</em>
APA, Harvard, Vancouver, ISO, and other styles
10

Fathsyah, Muhammad Munaza, Irawan Hadi, and Irma Salamah. "Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya." Jurnal Teknik Komputer 7, no. 2 (2021): 222–28. http://dx.doi.org/10.31294/jtk.v7i2.11077.

Full text
Abstract:
Pertumbuhan, perkembangan, dan kebutuhan akan informasi terus-menerus menjadi sebuah kebutuhan primer bagi setiap masyarakat umum, organisasi, perusahaan, dan lembaga pendidikan. Salah satu contoh lembaga pendidikan yang memiliki kebutuhan akan informasi yaitu Politeknik Negeri Sriwijaya (Polsri), dimana dosen dan mahasiswa memerlukan koneksi melalui sebuah media kabel ataupun nirkabel untuk terhubung ke jaringan internet (global) maupun jaringan intranet (lokal). Sistem Akademik dan Learning Management System (LMS) adalah salah satu jaringan lokal Polsri yang paling sering diakses untuk memenuhi kegiatan akademik. Dosen ataupun mahasiswa sebagai client akan terus dapat mengakses jaringan lokal tersebut selama jalur komunikasi atau media transmisi antar router client dan router server tetap terhubung. Apabila jalur komunikasi utama antar router client dan router server terputus oleh faktor tertentu, maka client tidak dapat mengakses jaringan lokal sehingga proses kegiatan akademik menjadi terhambat. Untuk menghindari kejadian tersebut, maka diperlukan sebuah jalur komunikasi cadangan (backup link) dan suatu penerapan teknik failover pada sisi router client. Teknik failover adalah teknik yang memiliki kemampuan untuk mengalihkan jalur komunikasi utama ke jalur komunikasi cadangan sehingga komunikasi dapat terus berjalan meskipun jalur komunikasi utama terputus. Jalur komunikasi cadangan pada implementasi ini didukung oleh teknologi telepon seluler generasi keempat atau teknologi yang lebih dikenal dengan istilah 4G LTE (Fourth Generation Long Term Evolution). Selain itu, terdapat penerapan Virtual Private Network (VPN) tipe Layer Two Tunneling Protocol (L2TP) pada jalur komunikasi cadangan untuk menjaga keamanan komunikasi. Protokol routing yang akan digunakan untuk melakukan proses pertukaran informasi routing pada implementasi ini adalah Border Gateway Protocol (BGP).
APA, Harvard, Vancouver, ISO, and other styles
11

Hadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.

Full text
Abstract:
Abstract: This paper focuses on the implementation of a site-to-site IPsec tunnel to establish a secure connected link over a public network between two sites. To do so, an IP addressing plan was created and a topology was drawn to replicate a local area network between different sites, i.e., LIBYA and TUNIS. After this, an IP tunnel was set up, secure communication was established in the replicating LAN, and all packets were transferred over an encrypted form between the two different sites correctly. The area of this study lies in the domains of network security and VPN. When discussing the technicalities, for this research, we will establish an IP tunneling over an encryption layer. For this task, we will implement the Internet Protocol Security (IPsec) suite to authenticate and encrypt the traffic before encapsulating the actual payloads for the connected link on the OSI model Layer 3. After setting the required authentication and encryption methods over the connections, a secure link can be established to share the data neighborly in a public environment. A secure VPN site-to-site link will provide high-quality dedicated bandwidth WAN links to the users, which are considered significant for the network architecture of internetworking. As a result, secure communication features utilizing VPN site-to-site IPsec encryption play a vital role in disaster recovery between the different sites or the replication of services and data for business operations and communications. This paper recommends that it is essential for a growing organization to make their respective communication secure and implement alternative ways to manage, maintain, and control the secure communication environments.
APA, Harvard, Vancouver, ISO, and other styles
12

Krallev, Vassil, and Nayden Nenkov. "Designing, building and protecting a computer network to satisfy the needs of a medium-sized company." Proceedings. College Dobrich XII (October 5, 2023): 88–107. https://doi.org/10.5281/zenodo.8410254.

Full text
Abstract:
The purpose of this article is to show a specific approach in the design, construction and protection of a computer network for a medium-sized company. When designing the network, the specifics of the building and the location of the individual nodes of the network (user computers and servers) are taken into account. To meet the requirements of users and the maximum protection of their devices, an adequate architecture and topology of network components have been selected and implemented. Particular attention is paid to the expected threats and appropriate means and methods for their prevention are provided.
APA, Harvard, Vancouver, ISO, and other styles
13

Leng, Kai. "(Invited) Atomic Imaging and Device Characterization of Molecularly Thin 2D Hybrid Perovskites." ECS Meeting Abstracts MA2023-02, no. 34 (2023): 1636. http://dx.doi.org/10.1149/ma2023-02341636mtgabs.

Full text
Abstract:
2D Organic-Inorganic Hybrid perovskites (OIHPs) possess alternating layers of organic molecules and inorganic quantum wells. By tuning the interaction between organic and inorganic layers, very interesting properties can be introduced. The successful isolation of hybrid perovskite monolayers with clean and flat surfaces are particularly suitable for atomic structure characterization and optoelectronic device fabrication. In this talk, I will present recent results on the excitonic properties and atomic structure of molecularly thin OIHPs1,2. We found that a reversible shift in excitonic energies can be induced upon laser irradiation in large-sized 2D hybrid perovskite monolayers which is attributed to the reversible structural reorientation of the surface BA cations in the easily deformable lattice3. The photodetection performance of monolayer, bilayer and thicker OIHPs were compared. The internal quantum efficiency was measured to be 34% for a monolayer (BA)2(MA)3Pb4I13 and 19% for the bulk crystal. In addition, 2D heterostructures of molecularly thin OIHPs/graphene were constructed which exhibited a lower barrier than gold for carrier injection, enabling applications in field effect transistors (FETs)4. Electron tunneling occurs across the interface of organic molecular layers on 2D perovskite and graphene, while photoinduced charge transfer occurs at femtosecond timescale (~50 fs). Resolving the atomic structure of 2D hybrid perovskite is a challenging task because it is easily damaged by electron beam. Here we use scanning tunneling microscopy (STM) &amp; Qplus AFM to directly visualize surface octahedral tilt in freshly exfoliated 2D Ruddlesden-Popper perovskites (RPPs)5. The experimentally determined octahedral tilts from n = 1 to n = 4 RPPs from STM images are found to agree very well with out-of-plane surface octahedral tilts predicted by density functional theory calculations. The surface-enhanced octahedral tilt is correlated to excitonic redshift observed in photoluminescence (PL) and promotes Rashba spin splitting for n &gt; 1. Our studies demonstrate a protocol to investigate structure-property correlations in low dimensional 2D OIHPs, which will pave the way to better material design and device performance. References Leng, W. Fu, Y. Liu, M. Chhowalla &amp; KP Loh* “From Bulk to Molecularly Thin Hybrid Perovskites” Nature Reviews Materials , 5, 482-500 (2020). Zhao, KP Loh, K. Leng* “Organic-inorganic hybrid perovskites and their heterostructures” Matter , 5, 4153-4169 (2022). Leng, I. Abdelwaha, I. Verzhbitskiy, M. Telychko, L. Chu, W. Fu, X. Chi, N. Guo, Z. Chen, Z. Chen, C. Zhang, Q. Xu, J. Lu, M. Chhowalla, G. Eda, KP Loh* “Molecularly thin two-dimensional hybrid perovskites with tunable optoelectronic properties due to reversible surface relaxation” Nature Materials , 17, 908-914 (2018). Leng, L. Wang, Y. Shao, I. Abdelwahab, G. Grinblat, I. Verzhbitskiy, Y. Cai, X. Chi, W. Fu, P. Song, G. Eda, S. A. Maier &amp; KP Loh* “Electron Tunneling at the Molecularly Thin 2D Perovskite and Graphene Van der Waals Interface” Nature Communications , 11, 5483 (2020). Y Shao, W. Gao, H. Yan, R. Li, I. Abdelwahab, L. Zhuang, W. Fu, SP Lau, SF YU, Y. Cai, KP Loh, K. Leng* “Unlocking Surface Octahedral Tilt in Two-dimensional Ruddlesden-Popper Perovskites” Nature Communications , 13, 138 (2022). Acknowledgement K.L. would like to acknowledge the Research Grants Council of the Hong Kong Special Administrative Region, China (Project No. PolyU15305221 for GRF project funded in 2021/22 Exercise and Project No. PolyU25305222 for ECS project funded in 2022/23 Exercise).
APA, Harvard, Vancouver, ISO, and other styles
14

Vassil, Krallev, and Nenkov Nayden. "Designing, building and protecting a computer network to satisfy the needs of a medium-sized company." Proceedings College Dobrich XII (March 25, 2022): 88–107. https://doi.org/10.5281/zenodo.6385282.

Full text
Abstract:
The purpose of this article is to show a specific approach in the design, construction and protection of a computer network for a medium-sized company. When designing the network, the specifics of the building and the location of the individual nodes of the network (user computers and servers) are taken into account. To meet the requirements of users and the maximum protection of their devices, an adequate architecture and topology of network components have been selected and implemented. Particular attention is paid to the expected threats and appropriate means and methods for their prevention are provided
APA, Harvard, Vancouver, ISO, and other styles
15

Jamali, Abdellah, Najib Naja, and Driss El Ouadghiri. "Utilization of an Improvement Manual Configuration for Multimedia in 6to4 Tunneling." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (2010): 1–14. http://dx.doi.org/10.4018/ijmcmc.2010070101.

Full text
Abstract:
IPv6 is a next-generation Internet layer protocol designed by the IETF (Internet Engineering Task Force) to solve the problem of IP address depletion under the current Internet layer protocol. It has been developed to replace the current Internet Protocol version 4 (IPv4). Various operating systems support IPv6 protocol stacks and network infrastructures are currently being deployed to support the functions of IPv6. During the course of the deployment of IPv6 protocol, the authors found several critical implementation and operational issues which distract user and possibly prevent wide deployment of IPv6. Among the problems identified are the stateless IP auto-configuration, which provides for each node connected to the network an IP address. The authors have previously examined the problem in Fedora Core operating system, and in this work, they make a slight modification on the same method using Red Hat operating system. The proposed method is independent of rebooting NIC. This method ensures the establishment of addresses if problems occur.
APA, Harvard, Vancouver, ISO, and other styles
16

Mori, Nobuya, Futo Hashimoto, Takaya Mishima, and Hajime Tanaka. "Analytical models for inter-layer tunneling in two-dimensional materials." Japanese Journal of Applied Physics 61, SC (2022): SC1022. http://dx.doi.org/10.35848/1347-4065/ac3f70.

Full text
Abstract:
Abstract The analytical formula of the transmission function of the inter-layer intra-band tunneling is derived for coupled narrow two-dimensional materials. Analytical models of the intra-band tunneling conductance G, the transmission function of the inter-layer band-to-band tunneling, and the maximum band-to-band tunneling current I max, are also obtained. G and I max are shown to exhibit different characteristics depending on the channel length.
APA, Harvard, Vancouver, ISO, and other styles
17

Iwazaki, Aiichi. "Josephson Effects in Double-Layer Quantum Hall States." Modern Physics Letters B 12, no. 09 (1998): 327–33. http://dx.doi.org/10.1142/s021798499800041x.

Full text
Abstract:
Under quite plausible assumptions on double-layer quantum Hall states with strong interlayer correlation, we show in general framework that coherent tunneling of a single electron between two layers is possible. It yields Josephson effects with unit charge tunneling. The origin is that Halperin states in the quantum Hall states are highly degenerate in electron number difference between two layers in the absence of electrons tunneling.
APA, Harvard, Vancouver, ISO, and other styles
18

Supriyadi, Muhammada Edy, Dina Agusten, Meta Meysawati, Fauziah Fauziah, Mariza Wijayanti, and Yuli Fitriyani. "Penerapan Mikrotik Layer 2 Tunneling Protocol Sebagai Remote Akses Pengindraan Jarak Jauh." Digital Transformation Technology 4, no. 1 (2024): 52–59. http://dx.doi.org/10.47709/digitech.v4i1.3667.

Full text
Abstract:
Era digital di Indonesia berkembang pesat, akses jarak jauh dan akses ke server media menjadi semakin penting. Perkembangan penggunaan internet sangat dibutuhkan dalam menbuat konten media seperti video dan audio, akses ke server media. Pembangunan jaringan dapat mengimplementasikan MikroTik L2TP menjadikan suatu solusi dalam meremote akses jarak jauh dan akses media server, sehingga dapat memungkinkan pengguna untuk mengakses jaringan dan server media dari lokasi yang berbeda secara aman dan mudah. Dengan menggunakan protokol L2TP (Layer 2 Tunneling Protocol) yang didukung oleh MikroTik, pengguna dapat terhubung ke jaringan internal melalui koneksi internet publik dengan enkripsi yang kuat. Selain itu, solusi ini juga memungkinkan pengguna untuk mengakses server media yang terhubung ke jaringan internal, sehingga memungkinkan mereka untuk streaming konten multimedia dengan lancar dan tanpa hambatan. Dengan implementasi MikroTik L2TP, organisasi dapat meningkatkan fleksibilitas dan produktivitas pengguna dengan memberikan akses yang aman dan mudah ke jaringan dan server media dari jarak jauh.
APA, Harvard, Vancouver, ISO, and other styles
19

Arifwidodo, Bongga. "PERFORMANSI EOIP-PPTP DENGAN EOIP-L2TP PADA ROUTER MIKROTIK." Journal of Telecommunication, Electronics, and Control Engineering (JTECE) 2, no. 1 (2020): 01–07. http://dx.doi.org/10.20895/jtece.v2i1.104.

Full text
Abstract:
Router berfungsi melewatkan paket Internet Protocol (IP) dari suatu jaringan yang berbeda, dengan metode pengalamatan serta protokol tertentu agar bisa melewatkan suatu paket data. Suatu topologi jaringan untuk mengirimkan sebuah data digunakan berbagai protocol seperti PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), dan EoIP (Ethernet over Internet Protocol). Dimana Protokol ini digunakan sebagai keamanan data yang akan di kirim maupun diterima. Metode tunneling adalah suatu teknologi yang ditugaskan untuk menangani hingga menyediakan koneksi point to point dari sumber tujuannya. Tunnel ini menggunakan EoIP Tunnel antara PPTP maupun L2TP dalam jaringan untuk memproses pengiriman data, maka dari itu penelitian ini akan membandingkan kinerja PPTP dengan L2TP pada router mikrotik. Pada penelitian ini dilakukan uji coba untuk mengetahui seberapa baik layanan file sharing dengan jaringan PPTP dan L2TP dengan Tunnel EoIP, kemudian dianalisa parameter QoS. Pengujian menggunakan 3 skenario pada layanan file sharing sebesar 5MB, 10MB, dan 15MB. Hasil layanan file sharing PPTP dan L2TP yang termasuk kategori sangat bagus menurut standarisasi TIPHON adalah L2TP. Untuk nilai packet loss yang digunakan pada layanan file sharing L2TP lebih baik dari PPTP. Terlihat nilai packet loss yang didapat pada variasi 15 Mbps sekitar 0 - 1% dibandingkan PPTP dengan packet loss sekitar 17%.
APA, Harvard, Vancouver, ISO, and other styles
20

Vdovin, E. E., Yu N. Khanin, S. V. Morozov, M. A. Kashchenko, A. A. Sokolik, and K. S. Novoselov. "Manifestation of Layer-by-Layer Localization of van Hove Singularities in Tunneling between Bilayer Graphene Sheets." JETP Letters 120, no. 11 (2024): 854–59. https://doi.org/10.1134/s0021364024604019.

Full text
Abstract:
Tunneling between two sheets of bilayer graphene, the crystal lattices of which are rotated relative to each other by a small angle, has been studied. An anomalous behavior of the tunneling conductivity caused by van Hove singularities at the edges of the conduction and valence bands spatially localized in different sheets of bilayer graphene has been found.
APA, Harvard, Vancouver, ISO, and other styles
21

Reza, Md Masum, and Jairo Gutierrez. "An Enhanced Lightweight Security Gateway Protocol for the Edge Layer." Technologies 11, no. 5 (2023): 140. http://dx.doi.org/10.3390/technologies11050140.

Full text
Abstract:
With the rapid expansion of the Internet of Things (IoT), the necessity for lightweight communication is also increasing due to the constrained capabilities of IoT devices. This paper presents the design of a novel lightweight protocol called the Enhanced Lightweight Security Gateway Protocol (ELSGP) based on a distributed computation model of the IoT layer. This model introduces a new type of node called a sub-server to assist edge layer servers and IoT devices with computational tasks and act as a primary gateway for dependent IoT nodes. This paper then introduces six features of ELSGP with developed algorithms that include access token distribution and validation, authentication and dynamic interoperability, attribute-based access control, traffic filtering, secure tunneling, and dynamic load distribution and balancing. Considering the variability of system requirements, ELSGP also outlines how to adopt a system-defined policy framework. For fault resiliency, this paper also presents fault mitigation mechanisms, especially Trust and Priority Impact Relation for Byzantine, Cascading, and Transient faults. A simulation study was carried out to validate the protocol’s performance. Based on the findings from the performance evaluation, further analysis of the protocol and future research directions are outlined.
APA, Harvard, Vancouver, ISO, and other styles
22

Luo, Zhen Jun, Ying Jiang Zhang, and Juan Qin. "Based on VPN Tunnel Technology of Wireless Local Area Network." Advanced Materials Research 546-547 (July 2012): 1188–93. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1188.

Full text
Abstract:
This paper analyzes the wireless local area network existing safety and efficiency problem. It put forward the VPN tunnel technology to solve these problems. Theory explains that it is very the advantages of layer second tunneling protocol in a wireless local area network. This technology is proved to be reliable by Network Simulate 2 tool. It is proved that the technique is the advantage of high efficiency and safety.
APA, Harvard, Vancouver, ISO, and other styles
23

Wolak, E., B. G. Park, K. L. Lear, and J. S. Harris. "Variation of the spacer layer between two resonant tunneling diodes." Applied Physics Letters 55, no. 18 (1989): 1871–73. http://dx.doi.org/10.1063/1.102157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Pu, Yayun, Xiong Xie, Liang Wang, and Jun Shen. "Layer dependent direct tunneling behaviors through two dimensional titania nanosheets." Computational Materials Science 173 (February 2020): 109398. http://dx.doi.org/10.1016/j.commatsci.2019.109398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Fachrur Rozi, Nurwan Reza, Ade Nurhayati, and Seandy Arandiant Rozano. "Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG)." International Journal of Engineering Continuity 3, no. 1 (2023): 1–11. http://dx.doi.org/10.58291/ijec.v3i1.141.

Full text
Abstract:
Advances in computer network technology and increased use of Internet information have reduced IPv4 offerings. This requires a computer network protocol that can replace the role of IPv4 which is currently limited/loose. Also known as Internet Protocol Verses 6 (IPv6), it aims to improve on IPv4 and does not represent a fundamental change from IPv4. Features that are available in IPv4 are also available in IPv6, but features that do not work in IPv4 are available in IPv4. IPv6 is no longer used. A transition mechanism is required to forward IPv6 packets to an existing IPv4 network and vice versa. One of the available mechanisms is automatic tunneling (abbreviated as Tunneling). The EVE-NG simulator is used to implement and study the routing protocol (OSPFv3) on IPv6 networks. To check the results, use the traceroute, ping command. The Juniper platform is implemented in this small virtual network to test the OSPFv3 protocol on an IPv6 network. This research explains how to assign IPv6 addresses on Juniper routers and end devices as well as their configuration. The Internet protocol layer is responsible for receiving and sending data packets within the network. In the virtual environment simulation mode, Juniper packets are analyzed and packet forwarding via IPv6 on OSPFv3 is used to make decisions for protocols in the IPv6 environment that are faster, and more secure.
APA, Harvard, Vancouver, ISO, and other styles
26

Wulf, Ulrich, Amanda Teodora Preda, and George Alexandru Nemnes. "Transport in a Two-Channel Nanotransistor Device with Lateral Resonant Tunneling." Micromachines 15, no. 10 (2024): 1270. http://dx.doi.org/10.3390/mi15101270.

Full text
Abstract:
We study field effect nanotransistor devices in the Si/SiO2 material system which are based on lateral resonant tunneling between two parallel conduction channels. After introducing a simple piecewise linear potential model, we calculate the quantum transport properties in the R-matrix approach. In the transfer characteristics, we find a narrow resonant tunneling peak around zero control voltage. Such a narrow resonant tunneling peak allows one to switch the drain current with small control voltages, thus opening the way to low-energy applications. In contrast to similar double electron layer tunneling transistors that have been studied previously in III-V material systems with much larger channel lengths, the resonant tunneling peak in the drain current is found to persist at room temperature. We employ the R-matrix method in an effective approximation for planar systems and compare the analytical results with full numerical calculations. This provides a basic understanding of the inner processes pertaining to lateral tunneling transport.
APA, Harvard, Vancouver, ISO, and other styles
27

Hirzan, Alauddin Maulana, Nazrulazhar Bahaman, and Whisnumurti Adhiwibowo. "Voice Over Internet Protocol Performance Evaluation in 6to4 Tunneling Network." Jurnal Transformatika 18, no. 1 (2020): 108. http://dx.doi.org/10.26623/transformatika.v18i1.2356.

Full text
Abstract:
&lt;span lang="EN-US"&gt;Registry reported that their regional already in exhausted state. The IPv6 was proposed to substitute IPv4 network, but the implementation of this version cased many problems such as hardware compatibility. As temporary solution to this problem, 6to4 tunneling transition mechanism is introduced as one of many solutions. This mechanism used IPv4 network as communication media between two IPv6 networks. Thus, this kind of mechanism will affect the performance of Voice over Internet Protocol. VoIP demanded real-time communication by using UDP protocol between nodes. Unlike normal communication mode, real-time mode required data to be sent immediately ignoring the quality of data. This research evaluated the performance of 6to4 tunneling mechanism for Voice over Internet Protocol’s communication between two nodes in native IPv6 networks. &lt;/span&gt;
APA, Harvard, Vancouver, ISO, and other styles
28

Christanto, Febrian Wahyu, and Danang Setya Aji. "Analisa dan Perbandingan QoS Jaringan Internet dengan Metode PPPoE, PPTP, dan L2TP pada Implementasi Hotspot RT/RW Net." MULTINETICS 9, no. 2 (2024): 144–52. http://dx.doi.org/10.32722/multinetics.v9i2.6261.

Full text
Abstract:
Penelitian ini dilakukan untuk menganalisis dan membandingkan kualitas layanan QoS (Quality of Service) dari jaringan internet yang menggunakan metode PPPoE, PPTP, dan L2TP pada implementasi hotspot RT/RW Net. Tujuan lainnya adalah untuk mengidentifikasi kelebihan dan kekurangan masing-masing metode serta membandingkan performa service dalam konteks hotspot RT/RW Net karena metode PPPoE (Point-to-Point Protocol over Ethernet), PPTP (Point-to- Point Tunneling Protocol), dan L2TP (Layer 2 Tunneling Protocol) adalah tiga metode yang umum digunakan untuk mengelola akses internet pada jaringan hotspot. Analisis dilakukan dengan membandingkan parameter QoS dan didapatkan Paket Loss dengan metode L2TP dan PPTP dengan nilai indeks QoS yaitu 0% dengan kategori sangat baik. Delay rata – rata sebesar 4 ms dengan kategori sangat baik, untuk nilai Jitter metode L2TP nilai 4 ms bernilai baik, sedangkan untuk nilai Trounghput dari keempat metode tersebut didapatkan nilai terbaik pada L2TP Server dengan rata – rata nilai sebesar 4285 Kbps dengan kategori baik. L2TP adalah protokol yang memiliki tingkat keamanan dan transfer data yang baik dari hasil pengujian yang telah dilakukan. Hasil dari penelitian ini diharapkan dapat memberikan pemahaman yang lebih baik dan membantu pengambilan keputusan dalam memilih kinerja metode PPPoE, PPTP, dan L2TP dalam konteks implementasi hotspot RT/RW Net.
APA, Harvard, Vancouver, ISO, and other styles
29

Афанасьев, С. А., Д. И. Семенцов та К. В. Шарипова. "Туннелирование СВЧ излучения через трехслойные структуры, содержащие ферритовый слой". Журнал технической физики 89, № 1 (2019): 76. http://dx.doi.org/10.21883/jtf.2019.01.46966.61-18.

Full text
Abstract:
AbstractTunneling of microwave radiation through a symmetric three-layer structure in which the central ferrite layer is interfaced with two layers of a material with negative permittivity is considered. Conditions for perfect tunneling (i.e., transmission with zero reflection) are analyzed for normal incidence. It is shown that the transmittance of the structure can be controlled using external magnetic field that provides magnetization of the ferrite layer. A broad transmission band with a width of several gigahertzes in which almost perfect tunneling is implemented can exist in the frequency range corresponding to the negative effective permeability of the ferrite material.
APA, Harvard, Vancouver, ISO, and other styles
30

Bezuglyj, A. I. "Tunneling in two-layer systems with electron-hole coupling (Review article)." Low Temperature Physics 46, no. 5 (2020): 448–58. http://dx.doi.org/10.1063/10.0001047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Parkinson, Bruce. "Layer-by-layer nanometer scale etching of two-dimensional substrates using the scanning tunneling microscope." Journal of the American Chemical Society 112, no. 21 (1990): 7498–502. http://dx.doi.org/10.1021/ja00177a007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.5673.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected to coexist for a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6 transition tools available are the hybrid stack mechanism and tunneling. Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can be sent over an IPv4 infrastructure. This project was initiated to set up an experimental IPv6 testbed, in order to study the performance as well as transition and migration issues of IPv6 networks under controlled conditions. This paper looks at how tunneling can be performed over existing internetwork infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
APA, Harvard, Vancouver, ISO, and other styles
33

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.9337.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected to coexist for a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6 transition tools available are the hybrid stack mechanism and tunneling. Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can be sent over an IPv4 infrastructure. This project was initiated to set up an experimental IPv6 testbed, in order to study the performance as well as transition and migration issues of IPv6 networks under controlled conditions. This paper looks at how tunneling can be performed over existing internetwork infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
APA, Harvard, Vancouver, ISO, and other styles
34

Nurhayati, Ade. "Tunneling Pipe Mode Pada Jaringan Multi Protocol Label Switching." Journal of Informatics and Communication Technology (JICT) 2, no. 2 (2021): 49–56. http://dx.doi.org/10.52661/j_ict.v2i2.59.

Full text
Abstract:
Along with the developing and the increasing of data communication users, service providers are required to always improve the quality of their services. QoS plays an important role since it is a parameter of the quality level of a service. Pipe Tunneling technique is one of the Qos methods that will guarantee a service will have its own priority level. With the help of the MPLS-VPN protocol, addressing of the IP will be much more flexible. In this thesis the simulation was done using GNS3 software while the results of the analysis were carried out using the WireShark software. There are two scenarios done by the author. For MPLS-VPN the author simulates 2 customers between companies 1 and 2 where both companies have centers in Jakarta and branches in Surabaya. And for Tunneling, both companies want their services to be given the highest priority among other services. From this scenario it can be obtained that with the presence of VRF on the network if there is the same network usage there will be no overlaps of IP. A service will have its own priority level according to the needs and requests. The results of the analysis are more focused on QoS, especially delay and throughput. From the results it shows that MPLS-VPN with Tunneling Pipe Mode integration is able to keep good QoS value. This can be seen from the average of the delay and throughput yield for Tunneling Pipe Mode that is equal to 84,51 ms and 67,858 Bytes / s.
APA, Harvard, Vancouver, ISO, and other styles
35

Alzahrani, Ali, Adel Alruqi, Bhupendra Karki, Milinda Kalutara Koralalage, Jacek Jasinski, and Gamini Sumanasekera. "Direct fabrication and characterization of vertically stacked Graphene/h-BN/Graphene tunnel junctions." Nano Express 2, no. 4 (2021): 040010. http://dx.doi.org/10.1088/2632-959x/ac2e9e.

Full text
Abstract:
Abstract We have used a lithography free technique for the direct fabrication of vertically stacked two-dimensional (2D) material-based tunnel junctions and characterized by Raman, AFM, XPS. We fabricated Graphene/h-BN/Graphene devices by direct deposition of graphene (bottom layer), h-BN (insulating barrier) and graphene (top layer) sequentially using a plasma enhanced chemical vapor deposition on Si/SiO2 substrates. The thickness of the h-BN insulating layer was varied by tuning the plasma power and the deposition time. Samples were characterized by Raman, AFM, and XPS. The I-V data follows the barrier thickness dependent quantum tunneling behavior for equally doped graphene layers. The resonant tunneling behavior was observed at room temperature for oppositely doped graphene layers where hydrazine and ammonia were used for n-doping of one of the graphene layers. The resonance with negative differential conductance occurs when the band structures of the two electrodes are aligned. The doping effect of the resonant peak is observed for varying doping levels. The results are explained according to the Bardeen tunneling model.
APA, Harvard, Vancouver, ISO, and other styles
36

Gonchigsuren, Munkhsaikhan, Otgonbayar Dugerjav, Odontuya Bayarsaikhan, Buyanjargal Ragchaa, and Naranchimeg Dagviikhorol. "Scanning Tunneling Microscopy Observation of WSe2 Surface." Solid State Phenomena 323 (August 30, 2021): 140–45. http://dx.doi.org/10.4028/www.scientific.net/ssp.323.140.

Full text
Abstract:
The surface structure of the WSe2 were studied using scanning tunneling microscopy. Exfoliation method in an ultra-high-vacuum chamber method is used to obtain a clean surface of WSe2 samples with atomically smooth terraces and multi-layer steps. Atomic-resolution images revealed two types of atomic defects of surface or near surface. These defects have been identified as the defects in the tungsten atom layer just below the topmost selenium layer.
APA, Harvard, Vancouver, ISO, and other styles
37

Tian, Guanfeng, Jing Wu, and Xinmeng Yu. "Analysis of instantaneous surface settlement of tunnel construction in composite stratum based on semi-analytical method." Advances in Engineering Technology Research 5, no. 1 (2023): 466. http://dx.doi.org/10.56028/aetr.5.1.466.2023.

Full text
Abstract:
It is important for shield tunneling safety to predict and control the instantaneous surface settlement. Particularly, the complex geological condition can make accurate prediction more difficult. To adapt to the stratum distribution, a semi-analytical method is established by introducing the finite layer method into tunnel mechanical analysis. Firstly, based on the elastic solution of the finite layer method, the horizontal flexibility coefficient of tunneling and the surface settlement are obtained by applying effective thrust to the excavation face. Secondly, two influencing factors are analyzed, including the penetration of shield tunneling and the Poisson ratio of geotechnical parameter. The relationship formula between the measured value and the theoretical value of the maximum settlement is derived through data fitting. Finally, the settlement prediction method of tunneling is proved to be practical, which provide a new ideal for the mechanical analysis of tunnels in composite strata.
APA, Harvard, Vancouver, ISO, and other styles
38

Banerjee, Aishwaryadev, Shakir-Ul Haque Khan, Samuel Broadbent та ін. "Batch-Fabricated α-Si Assisted Nanogap Tunneling Junctions". Nanomaterials 9, № 5 (2019): 727. http://dx.doi.org/10.3390/nano9050727.

Full text
Abstract:
This paper details the design, fabrication, and characterization of highly uniform batch-fabricated sidewall etched vertical nanogap tunneling junctions for bio-sensing applications. The device consists of two vertically stacked gold electrodes separated by a partially etched sacrificial spacer layer of sputtered α-Si and Atomic Layer Deposited (ALD) SiO2. A ~10 nm wide air-gap is formed along the sidewall by a controlled dry etch of the spacer. The thickness of the spacer layer can be tuned by adjusting the number of ALD cycles. The rigorous statistical characterization of the ultra-thin spacer films has also been performed. We fabricated nanogap electrodes under two design layouts with different overlap areas and spacer gaps, from ~4.0 nm to ~9.0 nm. Optical measurements reported an average non-uniformity of 0.46 nm (~8%) and 0.56 nm (~30%) in SiO2 and α-Si film thickness respectively. Direct tunneling and Fowler–Nordheim tunneling measurements were done and the barrier potential of the spacer stack was determined to be ~3.5 eV. I–V measurements showed a maximum resistance of 46 × 103 GΩ and the average dielectric breakdown field of the spacer stack was experimentally determined to be ~11 MV/cm.
APA, Harvard, Vancouver, ISO, and other styles
39

Богацкая, А. В., П. М. Никифорова та А. М. Попов. "Резонансное туннелирование электромагнитных сигналов в присутствии статического магнитного поля в задаче преодоления радиоблокировки летательных аппаратов". Оптика и спектроскопия 131, № 2 (2023): 238. http://dx.doi.org/10.21883/os.2023.02.55013.2-23.

Full text
Abstract:
The effect of the resonant tunneling of signals through an overcritical plasma layer in the presence of an external static magnetic field is considered. The aim of the study is to demonstrate the effectiveness of the combined usage of two methods for overcoming radio blackout for aircrafts moving in dense layers of the atmosphere at supersonic velocities: the method of resonant tunneling of the signal in the presence of a dielectric layer and the magnetic windows method. The features of dielectric resonator filling with an electromagnetic wave field are studied for various parameters. The values of the magnetic field induction providing the best signal propagation results through the plasma layer are estimated
APA, Harvard, Vancouver, ISO, and other styles
40

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
APA, Harvard, Vancouver, ISO, and other styles
41

Hayashi, Masahito, and Angeles Vazquez-Castro. "Two-Way Physical Layer Security Protocol for Gaussian Channels." IEEE Transactions on Communications 68, no. 5 (2020): 3068–78. http://dx.doi.org/10.1109/tcomm.2020.2973618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ghanbari, M., J. Azari, and P. Sarantopoulos. "A protocol for carrying two-layer coded moving images." IEEE Transactions on Communications 43, no. 5 (1995): 1881–83. http://dx.doi.org/10.1109/26.387417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Naves, Raphaël, Gentian Jakllari, Hicham Khalifé, Vania Conan, and André-Luc Beylot. "COLiDeR: A cross-layer protocol for two-path relaying." Computer Communications 162 (October 2020): 59–68. http://dx.doi.org/10.1016/j.comcom.2020.07.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ren, Zhixing, and James S. Meditch. "A two-layer congestion control protocol for broadband ISDN." Performance Evaluation 16, no. 1-3 (1992): 85–106. http://dx.doi.org/10.1016/0166-5316(92)90069-s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vu, Minh-Ngan, Minh-Ngoc Vu, Duc-Tho Pham, Tuan Nguyen-Sy, Quoc-Bao Nguyen, and Viet-Duc Dang. "A Multi-Layer Blowout Model for the Tunneling Face Stability Analysis." Buildings 13, no. 6 (2023): 1362. http://dx.doi.org/10.3390/buildings13061362.

Full text
Abstract:
The stability of the tunnel face during tunneling is one of the major criteria for the design and construction of the tunnel. Collapse and blowout are two modes of tunnel face failure during the excavation. The cover-to-diameter ratio is one of the main parameters controlling these failure modes. Several analytical solutions have been proposed to estimate the range of support pressure applied on the tunnel face to avoid both the collapse and the blowout. However, most of those models deal with homogeneous soils. This paper aims at proposing an analytical model to predict the blowout of the tunneling face of a tunnel in multi-layered soils. The derivation is based on a limit equilibrium analysis, which considers the water tCiable. The proposed model is validated against the real blowout data reported from the tunneling in the Second Heinenoord Tunnel project in the Netherlands. Then, the maximum support pressure exerted on the tunneling face is predicted as a function of the cover-to-diameter ratio, the tunnel diameter, and the water table level for five representative soils. Finally, the model is applied to an underground segment of the Hanoi Metro Line 3 project (in Vietnam) to show the role of the multi-layer aspect.
APA, Harvard, Vancouver, ISO, and other styles
46

Satryawati, Eka, Dwi Agung Pangestu, and Ade Surya Budiman. "IMPLEMENTASI VIRTUAL PRIVATE NETWOR MENGGUNAKAN POINT-TO-POINT TUNNELING PROTOCOL." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 2, no. 1 (2022): 36–42. http://dx.doi.org/10.56486/jeis.vol2no1.160.

Full text
Abstract:
Today's technological development is very rapid, especially in the field of network security. The field of network security is a matter that will be a very important part because the network security system is used to guarantee the confidentiality, theft, or burglary of data on a company. In its implementation, a VPN network (Virtual Private Network) uses a site-to-site Point to Point Tunel Protocol (PPTP) method to connect between two places that are located far apart. The main facility of using PPTP is being able to use a public-switched telephone network (PSTN) to build a VPN. At PT Indosis Integrasi Jakarta, the place where the author conducts research there are several problems that the author found, namely, when sending data between the head office and branch offices in Bandung, there is no security that ensures that the data is safe. With the current state of the network, uninterested parties will easily access or steal confidential company data.
APA, Harvard, Vancouver, ISO, and other styles
47

Ko, Eunjung, and Jung-Hae Choi. "Comparison of interfaces, band alignments, and tunneling currents between crystalline and amorphous silica in Si/SiO2/Si structures." Materials Research Express 9, no. 4 (2022): 045005. http://dx.doi.org/10.1088/2053-1591/ac639f.

Full text
Abstract:
Abstract Recently, to improve the performance of an integrated metal-oxide-semiconductor (MOS) device, an attempt has been made in the industry to replace the amorphous oxide with a crystalline oxide. However, various characteristics caused by the difference between amorphous and crystalline oxide in the MOS structure have not been systematically investigated. Therefore, we demonstrate the difference in atomic interface structures, electronic structures, and tunneling properties concerning varied oxide phases in a representative system, Si/SiO2/Si structures, with sub-3 nm-thick silica from first-principles. We investigate two oxide phases of amorphous (a-) and crystalline (c-) SiO2 with and without H passivation at the interface. Si/a-SiO2 exhibits a smooth interface layer, whereas Si/c-SiO2 exhibits an abrupt interface layer, resulting in the thicker interface layer of Si/a-SiO2 than Si/c-SiO2. Thus for a given total silica thickness, the adequate tunneling-blocking thickness, where all the Si atoms form four Si–O bonds, is thinner in a-SiO2 than c-SiO2, originating more tunneling current through a-SiO2 than c-SiO2. However, the effects of dangling bonds at Si/c-SiO2 rather than Si/a-SiO2 on tunneling currents are crucial, particularly in valence bands. Furthermore, when the dangling bonds are excluded by H atoms at Si/c-SiO2, the tunneling current dramatically reduces, whereas the H-passivation effect on the tunneling blocking at Si/a-SiO2 is insignificant. Our study contributes systematic knowledge regarding oxide phases and interfaces to promote for high performance of MOS devices.
APA, Harvard, Vancouver, ISO, and other styles
48

Banerjee, Sneha, and Peng Zhang. "Review of recent studies on nanoscale electrical junctions and contacts: Quantum tunneling, current crowding, and interface engineering." Journal of Vacuum Science & Technology A 40, no. 3 (2022): 030802. http://dx.doi.org/10.1116/6.0001724.

Full text
Abstract:
The study of charge carrier transport at nanoscale electrical contacts is crucial for the development of next-generation electronics. This paper reviews recent modeling efforts on quantum tunneling, current crowding, and contact resistance across electrical interfaces with nanometer scale dimensions. A generalized self-consistent model for quantum tunneling induced electron transport in metal–insulator–metal (MIM) junctions is summarized. Rectification of a dissimilar MIM junction is reviewed. A modified two-dimensional (2D) transmission line model is used to investigate the effects of spatially varying specific contact resistivity along the contact length. The model is applied to various types of electrical contacts, including ohmic contacts, MIM junction based tunneling contacts, and 2D-material-based Schottky contacts. Roughness engineering is recently proposed to offer a possible paradigm for reducing the contact resistance of 2D-material-based electrical contacts. Contact interface engineering, which can mitigate current crowding near electrical contacts by spatially designing the interface layer thickness or properties, without requiring an additional material or component, is briefly reviewed. Tunneling engineering is suggested to eliminate severe current crowding in highly conductive ohmic contacts by introducing a thin tunneling layer or gap between the contact members. Unsolved problems and challenges are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
49

Hasan, Md Nazmul, Chenxi Li, Junyu Lai, and Jung-Hun Seo. "Theoretical Prediction of Heterogeneous Integration of Dissimilar Semiconductor with Various Ultra-Thin Oxides and 2D Materials." Electronic Materials 2, no. 4 (2021): 495–503. http://dx.doi.org/10.3390/electronicmat2040034.

Full text
Abstract:
In this paper, we build a numerical p-n Si/GaAs heterojunction model using quantum-mechanical tunneling theory with various quantum tunneling interfacial materials including two-dimensional (2D) materials such as hexagonal boron nitride (h-BN) and graphene, and ALD-enabled oxide materials such as HfO2, Al2O3, and SiO2. Their tunneling efficiencies and tunneling currents with different thicknesses were systematically calculated and compared. Multiphysics modeling was used with the aforementioned tunneling interfacial materials to analyze changes in the strain under different temperature conditions. Considering the transport properties and thermal-induced strain analysis, Al2O3, among three oxide materials, and graphene in 2D materials are favorable material choices that offer the highest heterojunction quality. Overall, our results offer a viable route in guiding the selection of quantum tunneling materials for a myriad of possible combinations of new heterostructures that can be obtained with an ultra-thin tunneling intermediate layer.
APA, Harvard, Vancouver, ISO, and other styles
50

Estevez, J. O., J. Arriaga, E. Reyes-Ayona, and V. Agarwal. "Photonic Bloch Oscillations and Zener Tunneling in Dual-Periodical Multilayers Made of Porous Silicon: Effect of Angle of Incidence." Journal of Nano Research 28 (June 2014): 83–90. http://dx.doi.org/10.4028/www.scientific.net/jnanor.28.83.

Full text
Abstract:
Experimental evidence of photon Bloch Oscillations (PBOs) and Zener tunneling (ZT) in dual-periodical (DP) superlattices made of porous silicon (PSi), is presented. An introduction of linear gradient in physical layer thicknesses in DP structure, composed by stacking two different periodic substructures N times, where (N-1) resonances appear, i.e, WSLs resonances and Zener tunneling of the nearest resonances of two consecutive minibands can be observed depending on the values of applied gradient. Theoretical time-resolved reflection and scattering state maps show photonic Bloch oscillations (BOs) and Zener tunneling for a range of incidence angles. Measured reflection reveals the presence of Wannier-Stark ladders (WSLs) and ZT in the near infrared region.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography