To see the other types of publications on this topic, follow the link: Router infrastructure.

Journal articles on the topic 'Router infrastructure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Router infrastructure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pranaya, Valen Brata, and Theophilus Wellem. "Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (2021): 1161–70. http://dx.doi.org/10.29207/resti.v5i6.3631.

Full text
Abstract:
The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.
APA, Harvard, Vancouver, ISO, and other styles
2

Sasono, Sindung Hadwi Widi, Hutama Arif Bramantyo, Aulia Muthia Dewi, and Sri Kusumastuti. "IMPLEMENTASI PROVISIONING ROUTER BERBASIS WEB." Orbith: Majalah Ilmiah Pengembangan Rekayasa dan Sosial 20, no. 2 (2024): 134–42. https://doi.org/10.32497/orbith.v20i2.5775.

Full text
Abstract:
Abstrak Provisioning merupakan suatu aktivitas dalam network management yang berfokus pada penambahan sumberdaya infrastruktur jaringan baru dengan cara menambahkan router serta melakukan implementasi konfigurasi pada perangkat router ataupun perangkat jaringan. Penyediaan konfigurasi provisioning router pada PT. Indonesia Comnets Plus SBU Regional Jawa Bagian Tengah saat ini masih menggunakan cara manual yaitu dengan melakukan SSH ataupun telnet ke router perangkat jaringan dan melakukan konfigurasi satu per satu. Tujuan dari penelitian ini yaitu membangun suatu infrastruktur untuk perangkat router dengan aplikasi web agar network administrator lebih mudah melakukan konfigurasi dan mengoptimalkan waktu konfigurasi router serta operasi terhadap perangkat-perangkat router dalam satu sistem kontroller yang berbasis web. Pada penelitian ini menggunakan metode Action Research. Metode penelitian Action Research meungkinkan untuk melakukan interpretasi, mendeskripsikan, serta menjelaskan suatu kondisi pada satu waktu dengan melakukan intervensi yang ditujukan untuk partisipasi serta perbaikan. Penelitian ini menggunakan bahasa pemrograman python dengan framework utamanya yaitu Django. Library yang digunakan yaitu Paramiko diterapkan pada suatu infrastruktur perangkat jaringan. Hasil dari penelitian adalah aplikasi kontroller web untuk melakukan provisioning pada perangkat router cisco dan mikrotik. Kata kunci : Provisioning Jaringan, Phython, Django, Paramiko Abstract Provisioning is an activity in network management that focuses on adding new network infrastructure resources by adding routers and implementing configurations on router devices or network devices. Provisioning router provisioning configuration at PT Indonesia Comnets Plus SBU Regional Jawa Bagian Tengah still uses a manual method, namely by doing SSH or telnet to the network device router and configuring it individually. This research aims to build an infrastructure for router devices with web applications so that network administrators can more easily configure and optimize router configuration time and operations on router devices in one web-based controller system. This research is the Action Research method. The Action Research research method makes it possible to interpret, describe, and explain a condition simultaneously by intervening aimed at participation and improvement. This research uses the Python programming language with the main framework, Django. The library used, Paramiko, is applied to a network device infrastructure. The result of the research is a web controller application for Provisioning on Cisco and Mikrotik router devices.
APA, Harvard, Vancouver, ISO, and other styles
3

Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Evaluating core router technology upgrades: Case studies from telecommunications and finance." Computer Science & IT Research Journal 4, no. 3 (2023): 416–35. http://dx.doi.org/10.51594/csitrj.v4i3.1497.

Full text
Abstract:
The evolving landscape of core router technology is pivotal in shaping the performance and resilience of modern network infrastructures. This paper provides a succinct evaluation of core router technology upgrades through a comparative analysis of case studies in the telecommunications and finance sectors. Core routers are integral to managing data traffic efficiently, and their upgrades are critical for enhancing network capacity, reducing latency, and ensuring security. In the telecommunications industry, core router upgrades are essential to meet the growing demand for higher bandwidth and improved service quality. The case study of a leading telecommunications provider highlights the implementation of next-generation core routers to support the expansion of 5G networks. This upgrade resulted in significant improvements in network performance and customer satisfaction, showcasing the benefits of advanced routing technologies in managing massive data volumes and complex network topologies. Similarly, in the finance sector, core router upgrades are crucial for maintaining the high availability and security of financial transactions. A case study of a major financial institution demonstrates how the adoption of high-capacity, low-latency core routers enhanced transaction processing speeds and minimized system downtimes. This technological advancement not only improved operational efficiency but also bolstered the institution’s resilience against cyber threats and network failures. Both case studies underscore the importance of investing in cutting-edge core router technology to address the demands of contemporary digital environments. They reveal that while the upfront costs of upgrading core routers can be substantial, the long-term benefits, including increased network reliability, improved data throughput, and enhanced security, far outweigh these costs. Furthermore, these upgrades facilitate the scalability of network infrastructure, supporting future growth and technological innovations. In conclusion, core router technology upgrades play a critical role in the performance and stability of networks across diverse sectors. The insights gained from these case studies provide valuable guidance for organizations considering similar technological advancements, emphasizing the strategic importance of investing in robust and scalable core router solutions. Keywords: Finance, Telecommunications, Evaluating, Core Router Technology, Upgrade.
APA, Harvard, Vancouver, ISO, and other styles
4

Oda, Tetsuya. "A Delaunay Edges and Simulated Annealing-Based Integrated Approach for Mesh Router Placement Optimization in Wireless Mesh Networks." Sensors 23, no. 3 (2023): 1050. http://dx.doi.org/10.3390/s23031050.

Full text
Abstract:
Wireless Mesh Networks (WMNs) can build a communications infrastructure using only routers (called mesh routers), making it possible to form networks over a wide area at low cost. The mesh routers cover clients (called mesh clients), allowing mesh clients to communicate with different nodes. Since the communication performance of WMNs is affected by the position of mesh routers, the communication performance can be improved by optimizing the mesh router placement. In this paper, we present a Coverage Construction Method (CCM) that optimizes mesh router placement. In addition, we propose an integrated optimization approach that combine Simulated Annealing (SA) and Delaunay Edges (DE) in CCM to improve the performance of mesh router placement optimization. The proposed approach can build and provide a communication infrastructure by WMNs in disaster environments. We consider a real scenario for the placement of mesh clients in an evacuation area of Kurashiki City, Japan. From the simulation results, we found that the proposed approach can optimize the placement of mesh routers in order to cover all mesh clients in the evacuation area. Additionally, the DECCM-based SA approach covers more mesh clients than the CCM-based SA approach on average and can improve network connectivity of WMNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Cui, Xin. "Research on Enterprise Network Router Security Strategy." Advanced Materials Research 433-440 (January 2012): 1783–86. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.1783.

Full text
Abstract:
Along with the enterprise economic powers strengthen continuously, for satisfying the applied demand of business, the enterprise has already built up gradually with each other the network infrastructure of the mutual communication of Internet. Security issues in open platform will explosive increase accompany with open requirements growing. Research and design security mechanism on router will be good for Internet security, as well as the developer to provide a powerful help. Router is a critical element in any security deployment. Routers are definite targets for network attackers. If an attacker can compromise and access a router, it can be a potential aid to them. Technique of router security is the technical importance of the network security to constitute the part, a scheme of router security operation of the enterprise network has been described.
APA, Harvard, Vancouver, ISO, and other styles
6

Haris, Arief Indriarto, and Rd Angga Ferianda. "Desain Infrastructure as Code (IaC) untuk Automasi Pengamanan Jaringan: Hardening Router Berbasis Mikrotik." Jurnal Pekommas 8, no. 1 (2023): 39–46. http://dx.doi.org/10.56873/jpkm.v8i1.4936.

Full text
Abstract:
Router berperan penting dalam mengatur lalu lintas paket data didalam infrastruktur jaringan, sehingga perannya menjadi sentral dan krusial. Terganggunya fungsi Router oleh serangan siber akan berdampak secara langsung pada kualitas layanan Teknologi Informasi (TI) di dalam jaringan secara keseluruhan. Oleh sebab itu, diperlukan adanya pengamanan (Hardening) sebagai upaya untuk melindungi Router dari serangan siber. Namun disisi lain, proses Hardening terhadap Router juga kerap menemui beberapa kendala dan tantangan, seperti kesalahan konfigurasi atau proses konfigurasi yang berulang-ulang dan cenderung menghabiskan banyak waktu serta energi, terutama jika perangkat yang dikonfigurasi tersebut berjumlah banyak. Dengan menggunakan metode PPDIOO, penelitian ini bertujuan untuk mendesain Infrastructure as Code (IaC) yang berfokus pada Hardening Router berbasis MikroTik melalui proses automasi. Hasil yang diperoleh adalah seluruh desain IaC berhasil diimplementasi melalui proses automasi dan tidak ditemui adanya eror. Total durasi pelaksanaan hardening melalui automasi adalah 4 menit 28 detik. Dari hasil uji keamanan sistem diperoleh hasil bahwa Router berhasil terlindungi dan tidak ditemui adanya celah keamanan.
APA, Harvard, Vancouver, ISO, and other styles
7

Aminah, Nina Siti, Muhamamad Reza Ramadhani Raharjo, and Maman Budiman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5119. http://dx.doi.org/10.11591/ijece.v11i6.pp5119-5126.

Full text
Abstract:
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
APA, Harvard, Vancouver, ISO, and other styles
8

Nina, Siti Aminah, Reza Ramadhani Raharjo Muhamamad, and Budiman Maman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5119–26. https://doi.org/10.11591/ijece.v11i6.pp5119-5126.

Full text
Abstract:
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
APA, Harvard, Vancouver, ISO, and other styles
9

Alfani, Muhammad Nur, and Bambang Sugiantoro. "Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 23. http://dx.doi.org/10.14421/ijid.2018.07205.

Full text
Abstract:
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
APA, Harvard, Vancouver, ISO, and other styles
10

Suhanda, Yogasetya, Lela Nurlaela, Andy Dharmalau, and Benediktus Sidhi Widjojo. "Perancangan Infrastruktur Jaringan Berbasis Aplikasi Packet Tracer dengan Metode Hot Standby Router Protocol." Jurnal Teknologi Terpadu 8, no. 1 (2022): 9–16. http://dx.doi.org/10.54914/jtt.v8i1.497.

Full text
Abstract:
Infrastruktur jaringan yang digunakan oleh PT. Quantum pada saat ini menggunakan satu buah jalur komunikasi di dalam infrastruktur jaringannya. Sehingga ketika jalur tersebut mati, maka pekerjaan yang memerlukan koneksi internet akan terganggu dan merugikan instansi tersebut, untuk itu dibutuhkan dua buah jalur komunikasi. Dengan memanfaatkan konfigurasi jaringan Hot Standby Router Protocol (HSRP), sebuah jaringan high availability yang menyediakan sarana alternatif pada semua infrastructure paths dan key server yang dapat diakses setiap saat. Hal ini sangat berguna ketika jalur utama pada jaringan mengalami mati, maka secara otomatis jalur kedua pada jaringan akan segera mem-backup jalur komunikasi, sehingga pekerjaan tidak terganggu. Tujuan dari penelitian ini untuk membuat rancangan infrastruktur jaringan Hot Standby Router Protocol (HSRP) berbasis aplikasi Cisco Packet Tracer. Sebuah konfigurasi jaringan pada Router untuk mengatur jalur paket data, yang dapat mengalihkan jalur utama (Router Active) ke jalur backup (Router Backup) jika terjadi gangguan dalam menyalurkan paket data ke router tujuan (Router Utama). Hasil uji tes konfigurasi jaringan yang dibuat berjalan dengan baik, tidak ada data loss dan menunjukan kecepatan reply rata rata di bawah 10 ms.
APA, Harvard, Vancouver, ISO, and other styles
11

Anurag, Misra. "Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 960–68. https://doi.org/10.31142/ijtsrd158.

Full text
Abstract:
Mobile Ad hoc Networks MANETs are collection of wireless mobile nodes. MANETs are infrastructure less temporary networks. They do not have fixed static infrastructure. As no fixed infrastructure is available all nodes itself, work as receiver, transmitter as well as router. These nodes are also mobile so providing stable route is a big challenge. We have different approaches to find route in MANETs and all approaches use some protocols. This paper concentrates upon the analysis of two Mobile Ad Hoc Networking protocols. Ad hoc On demand Distance Vector AODV and Destination Sequenced Distance Vector DSDV . DSDV uses proactive or table driven approach to route the data whereas AODV is a reactive protocol and uses on demand routing. Main target of this paper is to highlight different aspect of both protocols and compare them. So, one can decide which protocol is better suited to their needs. Anurag Misra "Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: https://www.ijtsrd.com/papers/ijtsrd158.pdf
APA, Harvard, Vancouver, ISO, and other styles
12

Ohara, Seiji, Ermioni Qafzezi, Admir Barolli, Shinji Sakamoto, Yi Liu, and Leonard Barolli. "WMN-PSODGA - An Intelligent Hybrid Simulation System for WMNs Considering Load Balancing." International Journal of Distributed Systems and Technologies 11, no. 4 (2020): 39–52. http://dx.doi.org/10.4018/ijdst.2020100103.

Full text
Abstract:
Wireless mesh networks (WMNs) are becoming an important networking infrastructure because they have many advantages, such as low cost and increased high-speed wireless Internet connectivity. In the authors' previous work, they implemented a hybrid simulation system based on particle swarm optimization (PSO) and distributed genetic algorithm (DGA), called WMN-PSODGA. Moreover, they added to the fitness function a new parameter for mesh router load balancing a number of covered mesh clients per router (NCMCpR). In this article, the authors consider Exponential, Weibull, and Normal distributions of mesh clients and carry out a comparison study. The simulation results show that the performance of the Exponential, Weibull and Normal distributions was improved by considering load balancing when using WMN-PSODGA. For the same number of mesh clients, the Normal distribution behaves better than the other distributions. This is because all mesh clients are covered by a smaller number of mesh routers and the standard deviation is improved by effectively using NCMCpR.
APA, Harvard, Vancouver, ISO, and other styles
13

Anandha Lakshmi, R., and T. Suresh. "A Relative Study of Various Routing Protocols in Mobile Ad Hoc Network." Asian Journal of Computer Science and Technology 7, S1 (2018): 78–81. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1800.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an infrastructure fewer networks built on a multihop conveying idea. It transmits data from base node to end node. Because MANETS don’t have any fixed infrastructure and it works in a distributed manner. For efficient communication, many routing protocols are used in MANET. Routing protocols are to find a new route to transmit data from base to accurate end through the midway nodes. Every in-between node is act as a router. So, this paper is covers the routing protocols AODV, DSR, DSDV and OLSR to keep current routing information from every node to each other nodes. The purpose of this paper to offers a relative study of routing protocols in MANET and energy aware performance metrics are analyzed on two routing protocols of AODV and DSDV.
APA, Harvard, Vancouver, ISO, and other styles
14

Banu, S. Munawara. "EVALUATING THE PERFORMANCE OF MULTIPATH ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS: A COMPARATIVE STUDY." international journal of advanced research in computer science 16, no. 1 (2025): 36–41. https://doi.org/10.26483/ijarcs.v16i1.7187.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a dynamic wireless network that links mobile devices without fixed infrastructure. All device in MANET acts as a node and a router, dynamically establishing and maintaining network connections as they move. Mobile Ad Hoc Networks find widespread application in scenarios where conventional network infrastructure is absent or unfeasible, including military deployments, emergency response efforts, and vehicle-to-vehicle communication systems. Routing in MANETs can be ambitious due to dynamic topologies, limited bandwidth, and power restraints. The protocols governing these networks fall into three basic categories, proactive, reactive, and hybrid routing protocols. Multipath routing in MANET involves establishing several paths between source and destination. This technique enhances network performance by providing numerous benefits. This research examines multipath routing protocols like MP-OLSR, SMR, AOMDV, ZRP, TORA and analyses key metrics including route discovery efficiency, route maintenance, end-to-end delay, packet delivery ratio, and energy usage.
APA, Harvard, Vancouver, ISO, and other styles
15

Mastilak, Lukas, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, and Michal Ries. "Enhancing Border Gateway Protocol Security Using Public Blockchain." Sensors 20, no. 16 (2020): 4482. http://dx.doi.org/10.3390/s20164482.

Full text
Abstract:
Communication on the Internet consisting of a massive number of Autonomous Systems (AS) depends on routing based on Border Gateway Protocol (BGP). Routers generally trust the veracity of information in BGP updates from their neighbors, as with many other routing protocols. However, this trust leaves the whole system vulnerable to multiple attacks, such as BGP hijacking. Several solutions have been proposed to increase the security of BGP routing protocol, most based on centralized Public Key Infrastructure, but their adoption has been relatively slow. Additionally, these solutions are open to attack on this centralized system. Decentralized alternatives utilizing blockchain to validate BGP updates have recently been proposed. The distributed nature of blockchain and its trustless environment increase the overall system security and conform to the distributed character of the BGP. All of the techniques based on blockchain concentrate on inspecting incoming BGP updates only. In this paper, we improve on these by modifying an existing architecture for the management of network devices. The original architecture adopted a private blockchain implementation of HyperLedger. On the other hand, we use the public blockchain Ethereum, more specifically the Ropsten testing environment. Our solution provides a module design for the management of AS border routers. It enables verification of the prefixes even before any router sends BGP updates announcing them. Thus, we eliminate fraudulent BGP origin announcements from the AS deploying our solution. Furthermore, blockchain provides storage options for configurations of edge routers and keeps the irrefutable history of all changes. We can analyze router settings history to detect whether the router advertised incorrect information, when and for how long.
APA, Harvard, Vancouver, ISO, and other styles
16

Subandri, Subandri, and Zaenal Mutaqin Subekti. "Optimalisasi Infrastruktur Jaringan Menggunakan Link Aggregation Control Protocol Dengan Device Cloud Router Switch." Jurnal Informatika: Jurnal Pengembangan IT 4, no. 2-2 (2019): 170–76. http://dx.doi.org/10.30591/jpit.v4i2-2.1866.

Full text
Abstract:
The development of data in a company is getting bigger and requires fast access time. the existence of a system that uses computer networks and internet access to support the activities of the company becomes an important part in the use of infrastructure in the company. Computer networks are accessed by all staff and employees in the building and there are servers and databases that are accessed all the time. In the building part consists of several work processes that simultaneously access to the same network and server. Then each staff and employee will access the same network infrastructure, where the data transfer burden is delegated to only one (1) switch port to connect. This can result in a large burden and network access can be slowed. By providing a configuration to optimize the switch network that adopts the link agro-protocol protocol (LACP) method on the use of network infrastructure so that it can be a solution for overcoming large network loads and slow access. By applying PPDIOO to the infrastructure development method so that the expectations can be achieved in accordance with the desired results
APA, Harvard, Vancouver, ISO, and other styles
17

Putra, Fauzan Prasetyo Eka, Ubaidi Ubaidi, R. Okky Firmansyah Kusuma, Abd Mu’iz Syam, and Satrio Ananta Efendy. "Effect Of Distance On Wi-Fi Signal Quality In The Home Environment." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 391–98. http://dx.doi.org/10.47709/brilliance.v4i1.4319.

Full text
Abstract:
This study aims to analyze the effect of distance on Wi-Fi signal quality in a home environment. With the increasing use of wireless devices and applications that rely on internet connectivity, Wi-Fi signal quality has become crucial to support daily activities such as streaming, online gaming, remote work, and smart home automation. This research employs an experimental method by measuring signal strength and data transmission speed at various distances from the Wi-Fi router. Measurements were taken at several points, ranging from 1 meter to 15 meters from the router, in different rooms and through different obstacles like walls and furniture.To conduct the analysis, a Wi-Fi analyzer was used to measure signal strength (in dBm) and a speed test was employed to determine data transmission speed (in Mbps) at each distance. The results showed that the greater the distance from the router, the Wi-Fi signal strength decreased significantly, leading to a corresponding decrease in data transmission speed. In addition, obstacles such as walls and electronic interference further degraded the signal quality.This study concludes that optimizing router placement and using signal booster devices, such as Wi-Fi extenders or mesh networks, can be effective solutions to improve Wi-Fi signal quality at home. It also highlights the importance of understanding and managing home network infrastructure to maximize Wi-Fi usage efficiency. By strategically placing routers and employing additional network hardware, users can ensure a stable and fast internet connection throughout their home, enhancing the overall user experience and productivity. Research provides valuable insights for homeowners and technology enthusiasts on how to achieve optimal Wi-Fi performance in various home environments.
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar, Rajeev, and Prabhudev Jagadeesh M.P. "QoS Routing Based on Available Bandwidth for Mobile Ad hoc Network." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 14–18. http://dx.doi.org/10.35940/ijeat.e1003.0585s19.

Full text
Abstract:
Mobile Ad-hoc network is a self configuring wireless network. It does not have any fixed infrastructure. Mobile node can leave and join the network. Therefore network topology changes any time. In Manet hosts can work as a router and forwards data from initiator to receiver. Since wireless channel is shared and topology is dynamic, providing quality of service (QoS) is a challenging task. QoS routing can find optimal routes that supports QoS requirement based on the received information during route discovery process. If QoS requirement cannot be supported, the admission control mechanism reject incoming request. Bandwidth estimation is a technique to determine available data rate on a route in the network. The term bandwidth means data rate not the physical bandwidth in hertz. QoS routing is required because most of the real time applications depend on the network’s condition. QoS in terms of bandwidth ensures transmission of real time data. In this paper a new bandwidth estimation method EAB (enhanced available bandwidth) is proposed. The performance of EAB-AODV is compared with AODV. The performance of EAB-AODV is better than AODV in terms of bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
19

Chumachenko, S.M., A.S. Partalian, A.A. Moshensky, M.L. Sukalo, and L.D. Filatova. "Automated system of transmission of data on the state of critical infrastructure objects with the use of modern information and telecommunications." Engineering of nature management, no. 3(21) (November 18, 2022): 127–35. https://doi.org/10.5281/zenodo.7336168.

Full text
Abstract:
The article presents the results of the authors' research on the use of modern information and telecommunication technologies for the transmission of monitoring information about the state of critical infrastructure. Today, these facilities are key to the operation of the country's life support systems and support at the appropriate level of man-made and cybersecurity of existing infrastructure. In the context of the growth of man-made accidents and catastrophes, great importance is attached to the development of modern approaches to the system of prevention and monitoring of emergencies at potentially dangerous critical infrastructure. Significant efforts are focused on creating realistic technical solutions for the construction of wireless sensor networks using intelligent monitoring and signaling sensors, unmanned aerial vehicles and geographic information technologies to ensure operational monitoring of such facilities and surrounding areas. One of the key components of such technology is telecommunications, which is based on new approaches to the reconfiguration of radio networks. A wireless radio network that can operate in complex emergencies can be a medium for the reliable transmission of critical infrastructure data. Given the significant saturation of the radio space, regional standards should be considered to avoid mutual interference, including LoRaWAN, developed by LoRa Alliance in 2015 to provide a low-power connection for battery-powered end devices. The article details the protocols of the LoRaWAN standard and key approaches to the development of different topologies of such radio networks for the regions of Europe, the USA and Australia. The analysis of topologies of wireless sensor networks and their application for creation of various radio networks is carried out. The target customers of such radio networks are critical infrastructure facilities, such as nuclear power plants, regional radioactive waste repositories, hazardous chemical plants and other potentially hazardous facilities, and SES services that monitor radiation and chemical conditions, etc.
APA, Harvard, Vancouver, ISO, and other styles
20

Mukti, Yogi Isro. "Implementasi Jaringan Hotspot Kampus Menggunakan Router Mikrotik." Indonesian Journal of Computer Science 8, no. 2 (2019): 130–38. http://dx.doi.org/10.33022/ijcs.v8i2.181.

Full text
Abstract:
This research aims to implement the existing hotspot network on the campus of the Pagar Alam College of Technology by using a proxy router for the needs of all users, especially students and lecturers to support the academic process. This research is based on the existing internet network at the Pagar Alam College of Technology, which cannot be enjoyed entirely by students and lecturers on campus, because the internet network is only intended for the staff, LPPM room and multimedia lab room and the network lab room is only a few computers which is connected to the internet using a LAN cable. This study uses the method PPDIOO is prepare, plan, design, implement, operate, optimize network has been generated using a proxy router, starting with providing infrastructure, user management, bandwidth management and has been used by the academic community.
APA, Harvard, Vancouver, ISO, and other styles
21

Iqbal, Muddesar, Muhammad Shafiq, Jin-Ghoo Choi, Hasina Attaullah, Khawar Akram, and Xingheng Wang. "Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (2014): 20–39. http://dx.doi.org/10.4018/ijaras.2014070102.

Full text
Abstract:
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The proposed work presents a design of a novel routing algorithm for optimal route discovery, congestion reduction, dynamic route selection and scalability in hybrid mesh networks. The authors have focused on Hybrid Routing Protocols to originate a novel routing scheme based on AODV (Ad hoc On-Demand Distance Vector routing protocol) in Ad-Hoc level with clustering scheme and DSDV (Destination Sequence Distance Vector) as proactive routing protocol in Backbone Mesh Router Level to form a new hybrid routing protocol. In this work a Novel Hybrid Distance Vector (NHDV) routing protocol algorithm has been introduced, which is the combination of DSDV (Destination Sequence Distance Vector) and AODV routing protocols. A clustering scheme with the combination of two efficient clustering schemes for Ad-hoc mesh client levels is discussed in detail and a performance metric for DSDV is also discussed which ETX (Expected Transmission Count) is for measuring packet loss ratio at each link for higher throughput. A new performance metric introduced in AODV as Mesh Router Count is used to improve the performance of communication to the Mesh Routers. The proposed work is the design of new algorithm that presents an optimal solution in bringing out a revolutionary change to Hybrid Routing.
APA, Harvard, Vancouver, ISO, and other styles
22

Panitzek, Kamill, Immanuel Schweizer, Axel Schulz, Tobias Bönning, Gero Seipel, and Max Mühlhäuser. "Can We Use Your Router, Please?" International Journal of Information Systems for Crisis Response and Management 4, no. 4 (2012): 59–70. http://dx.doi.org/10.4018/jiscrm.2012100104.

Full text
Abstract:
During rescue missions first responders rely on voice communication making crisis management nearly impossible without good means of communication. Unfortunately the communication technology used by first responders today does not scale well. Also most of the given infrastructure, such as cell towers, might be destroyed after a disaster. Therefore, ad-hoc and peer-to-peer-based communication schemes have been proposed in recent research to provide scalable and resilient communication. Most mobile phones today are equipped with wireless transceivers that make them suitable to participate in ad-hoc networks. But in this case, device density might be too small for a connected topology. In this paper, the authors propose an emergency switch for privately owned wireless routers. The switch allows wireless routers to transition to an emergency mode creating a supportive wireless mesh network. To analyze if such a network would result in a resilient topology real data from wireless routers in a city is gathered. They calculate the locations of private and public routers from GPS traces and compare the resulting networks with each other. Finally, the authors discuss open and critical questions and implications the proposed emergency switch would introduce.
APA, Harvard, Vancouver, ISO, and other styles
23

Pratama, Bayu, Zulhendra, Ahmaddul Hadi, and Lativa Mursyida. "Development of Network Infrastructure Monitoring System at Vocational High School Using MikroTik and Telegram Integration." Journal of Hypermedia & Technology-Enhanced Learning (J-HyTEL) 2, no. 3 (2024): 188–201. http://dx.doi.org/10.58536/j-hytel.v2i3.133.

Full text
Abstract:
This study aimed to develop a monitoring system for the computer network infrastructure at SMKN 7 Sijunjung. The system was designed to provide real-time monitoring of traffic, activity logs, and connected user devices on the MikroTik router; additionally, the application integrated notifications through the Telegram service to offer prompt information regarding network disruptions. The design methodology employed was PPDIOO (prepare, plan, design, implement, operate, and optimize). The system is implemented using a combination of hardware and software, including the utilization of the CodeIgniter framework for the user interface (UI). System testing was conducted using the BlackBox method to evaluate the functionality of the application comprehensively. The test results confirm that the application effectively monitored the network and promptly notified us of its status. However, there were certain challenges identified during testing, such as problems with online connectivity to the MikroTik router and limitations in database storage. The proposed solutions include activating the VPN on MikroTik and enhancing database storage capacity. This research contributes to the development of computer network infrastructure-monitoring systems in educational environments. These findings will lay the groundwork for other educational institutions to enhance the efficiency of network monitoring and maintenance in schools.
APA, Harvard, Vancouver, ISO, and other styles
24

Chaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (2019): 7. http://dx.doi.org/10.3390/jlpea9010007.

Full text
Abstract:
Denial of Service (DoS) attacks are an increasing threat for Multiprocessor System-on-Chip (MPSoC) architectures. By exploiting the shared resources on the chip, an attacker is able to prevent completion or degrade the performance of a task. This is extremely dangerous for MPSoCs used in critical applications. The Network-on-Chip (NoC), as a central MPSoC infrastructure, is exposed to this attack. In order to maintain communication availability, NoCs should be enhanced with an effective and precise attack detection mechanism that allows the triggering of effective attack mitigation mechanisms. Previous research works demonstrate DoS attacks on NoCs and propose detection methods being implemented in NoC routers. These countermeasures typically led to a significantly increased router complexity and to a high degradation of the MPSoC’s performance. To this end, we present two contributions. First, we provide an analysis of information that helps to narrow down the location of the attacker in the MPSoC, achieving up to a 69% search space reduction for locating the attacker. Second, we propose a low cost mechanism for detecting the location and direction of the interference, by enhancing the communication packet structure and placing communication degradation monitors in the NoC routers. Our experiments show that our NoC router architecture detects single-source DoS attacks and determines, with high precision, the location and direction of the collision, while incurring a low area and power overhead.
APA, Harvard, Vancouver, ISO, and other styles
25

Lutfi, Salkin, Amal Khairan, Yasir Muin, and Munazat Salmin. "Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik." MATEC Web of Conferences 372 (2022): 04008. http://dx.doi.org/10.1051/matecconf/202237204008.

Full text
Abstract:
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the Minister of Research, Technology, and Higher Education Number 62 of 2017 concerning the governance of information technology in the university environment that is to support the achievement of increasing access, relevance, quality of higher education, innovation, and strengthening governance and accountability of a university. The consequence of the application of information technology is the emergence of information security risks, the threat of this attack is a concern that every university must be wary of to secure network infrastructure from these attacks. Open access provides great potential for everyone to commit crimes against network infrastructure. as explained that computer network security is part of a system that is very important to be maintained, for that it is necessary to make efforts that can be made by the party responsible for securing the University X network from DDoS attacks. the method used to secure the network infrastructure makes a filtering policy to block DDoS attacks, the results obtained from the application according to the filter rules applied to the proxy device successfully block DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

Amantha Olan Sahat Manik, Lukas, Theresia Ghozali, and Veronica Windha Mahyastuty. "Perancangan Jaringan Internet Menggunakan GNS3, Qemu, dan Virtual Box." Jurnal Elektro 15, no. 1 (2024): 11–20. http://dx.doi.org/10.25170/jurnalelektro.v15i1.5119.

Full text
Abstract:
In the modern era, information technology continues to develop in line with human needs who want efficiency, ease, speed and accuracy in obtaining information and sending information. Moreover, in an office building, facilities for accessing information require a fast and efficient internet network as facilities and infrastructure to support office activities. In general, Mikrotik routers are widely used in office buildings as a means of distributing the internet. With the use of a mikrotik router that requires a lot of design and simulation first to get good internet performance GNS3 can design a topology that will be used in 2 ways, namely using Qemu and Virtual Box. Both of these methods have their respective advantages over the design process and test results
APA, Harvard, Vancouver, ISO, and other styles
27

Mishbahuddin, Ahmad, Puspanda Hatta, and Cucuk Wawan Budiyanto. "ANALYSIS OF WIRELESS NETWORK SIMULATION BASED ON OPENWRT AND PFSENSE WITH QUALITY OF SERVICE INDICATORS ON LOW-COST NETWORK INFRASTRUCTURE." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1713–22. https://doi.org/10.52436/1.jutif.2024.5.6.4047.

Full text
Abstract:
The need for high network traffic in Indonesia with the challenge of geographical topology that is difficult to reach makes the majority of internet network users access via wireless networks with limited budgets, resulting in poor internet QoS in Indonesia. An available solution to optimize low-cost network quality is to use the OpenWRT, open source router operating system with a focus on ease of application implementation in network projects. Another solution is pfSense, which is an open source router operation with a firewall network security focus to prevent intrusion. These two operating systems have different comparison methods in performance testing, making it difficult to make decisions about the performance differences between the two operating systems. This study aims to analyze the difference in performance and significance of open source operating systems with different development focuses on low-cost wireless network services. Analysis obtained from the quality of service measurement method on OpenWRT and Pfsense router operating systems on users that connected to a simulated wireless network topology. Data was collected by sending data between a number of users to the server and vice versa using iperf3 and mtr tools. The data consisted of QoS parameters: troughput, delay, jitter, and packet loss. The data shows that there are significant differences in several QoS parameters in the service of a number of users between the OpenWRT and PfSense operating systems. The results of this study show the limitations of each operating system in its implementation in low-cost wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Mousa, Ahmed Ayoob, Aisha Hassan Abdalla, and Huda Adibah Mohd Ramli. "MROM Scheme to Improve Handoff Performance in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 17 (2020): 167. http://dx.doi.org/10.3991/ijim.v14i17.16639.

Full text
Abstract:
Mobile Router (MR) mobility supported by Network Mobility Basic Support Protocol (NEMO BS) is a Mobile IPv6 (MIPv6) extension that supports Host Mobility. Proposed Multihoming and Route Optimization for MANEMO (MROM) scheme is designed to provide Route Optimization (RO) and Multihomed in NEMO architectures. This paper proposes two novel schemes; MANEMO routing scheme and Multihoming-based scheme. These are to provide support for next generation networks. The proposed MROM scheme differs from other schemes for NEMO environment because it considers the requirements of more application flows parameters as packet lost delivery, handoff delay as well as throughput). Another difference is that not only the network infrastructure can begin the functionality of flow routing, but also an Edge Mobile Router (EMR) can do this flow for routing. Moreover, it utilizes the state of the art and presently active access network to perform the separation of each flow in mobile network. Thus, proposed MROM exhibits multihoming features and improves handoff performance by initiating flow-based fast registration process in NEMO environment. A handoff method is proposed with enhanced functionalities of the Local Mobility Anchors (LMA), Mobile Routers (MRs) and signaling messages with a view to achieve continuous connectivity through handoff in NEMO. Both analytical and simulation approaches are used. Analytical evaluation is carried out to analyze packet delivery lost and handoff delay of our proposed scheme. It was also shown that cost of signaling messages and packet delivery are contributing to total handoff cost. At the simulation part, network simulator 3 (NS 3) has been used as the tool to get performance metrics that have been considered like packet delivery ratio, handoff delay, and packet loss. Our proposed scheme (MROM) has been benchmarking to the standard NEMO BS Protocol and P-NEMO. In this paper, we discuss proposed MROM for next generation networks, providing detailed analysis with a numerical model, proposed MROM, by maximizing the handoff performance, has been justified to have better mobility support than the ordinary NEMO BS Protocol and PNEMO.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhou, Xiaofeng, Lu Liu, and Zhangming Zhu. "A Fault-Tolerant Deflection Routing for Network-on-Chip." Journal of Circuits, Systems and Computers 26, no. 03 (2016): 1750037. http://dx.doi.org/10.1142/s0218126617500372.

Full text
Abstract:
Network-on-Chip (NoC) has become a promising design methodology for the modern on-chip communication infrastructure of many-core system. To guarantee the reliability of traffic, effective fault-tolerant scheme is critical to NoC systems. In this paper, we propose a fault-tolerant deflection routing (FTDR) to address faults on links and router by redundancy technique. The proposed FTDR employs backup links and a redundant fault-tolerant unit (FTU) at router-level to sustain the traffic reliability of NoC. Experimental results show that the proposed FTDR yields an improvement of routing performance and fault-tolerant capability over the reported fault-tolerant routing schemes in average flit deflection rate, average packet latency, saturation throughput and reliability by up to 13.5%, 9.8%, 10.6% and 17.5%, respectively. The layout area and power consumption are increased merely 3.5% and 2.6%.
APA, Harvard, Vancouver, ISO, and other styles
30

Mercy, Mbise, and Simba Fatuma. "Performance Evaluation of UDSM Network to Deliver Multimedia eLearning Contents: Case of CoICT." Tanzania Journal of Engineering and Technology 41, no. 4 (2022): 205–18. http://dx.doi.org/10.52339/tjet.v41i4.860.

Full text
Abstract:
The use of technology in education in Sub-Saharan Africa has been reported to be hindered by many factors including inadequate Information and Communication Technology (ICT) infrastructure, low internet speed, and lack of skills to use educational technologies. This paper aim at evaluating how the available ICT infrastructure at the College of Information and Communication Technologies (CoICT) can support, with acceptable Quality of Service (QoS), the delivery of multimedia applications for eLearning services. The evaluation was performed over a network testbed implemented in a computer laboratory for wired and wireless connections. The testbed consisted of five personal computers (PCs) connected via a switch and a router to the internet for the wired connection. The wireless connection consisted of three PCs and a laptop connected through a switch and a router to the internet via a wireless access point. Four different multimedia applications were run through the PCs, and traffic data was mirrored and captured at one of the PC using Wireshark network analyzer. The traffic included streamed and conversational video and audio using YouTube and Zoom applications, respectively; interactive web browsing using web browsers; bulk file transfer, and a mixture of all applications running on the computers. Traffic data captured during the running of these applications were packet loss, delay, jitter, and throughput. The QoS performance parameters obtained were within the acceptable threshold values as per International Telecommunication Union, Telecommunication Standardization Sector (ITU-T) values. Results revealed that ICT infrastructure at CoICT can support delivery of multimedia content for eLearning purposes for both wired and wireless connections. Having the infrastructure capable of supporting multimedia applications with the acceptable QoS implies that instructors are equipped with a conducive environment that supports multimedia application. Hence, they are expected to use and continue using educational technologies to facilitate teaching and learning processes.
APA, Harvard, Vancouver, ISO, and other styles
31

Samman, Faizal A., Thomas Hollstein, and Manfred Glesner. "Networks-On-Chip Based on Dynamic Wormhole Packet Identity Mapping Management." VLSI Design 2009 (April 7, 2009): 1–15. http://dx.doi.org/10.1155/2009/941701.

Full text
Abstract:
This paper presents a network-on-chip (NoC) with flexible infrastructure based on dynamic wormhole packet identity management. The NoCs are developed based on a VHDL approach and support the design flexibility. The on-chip router uses a wormhole packet switching method with a synchronous parallel pipeline technique. Routing algorithms and dynamic wormhole local packet identity (ID-tag) mapping management are proposed to support a wire sharing methodology and an ID slot division multiplexing technique. At each communication link, flits belonging to the same message have the same local ID-tag, and the ID-tag is updated before the packet enters the next communication link by using an ID-tag mapping management unit. Therefore, flits from different messages can be interleaved, identified, and routed according to their allocated ID slots. Our NoC guarantees in order and lossless message delivery.
APA, Harvard, Vancouver, ISO, and other styles
32

Zeng, Li, Hong Ni, and Rui Han. "An Incrementally Deployable IP-Compatible-Information-Centric Networking Hierarchical Cache System." Applied Sciences 10, no. 18 (2020): 6228. http://dx.doi.org/10.3390/app10186228.

Full text
Abstract:
The major advantage of information-centric networking (ICN) lies in in-network caching. Ubiquitous cache nodes reduce the user’s download latency of content and the drain of network bandwidth, which enables efficient content distribution. Due to the huge cost of updating an entire network infrastructure, it is realistic for ICN to be integrated into an IP network, which poses new challenges to design a cache system and corresponding content router. In this paper, we firstly observed that the behavior pattern of data requests based on a name resolution system (NRS) makes an ICN cache system implicitly form a hierarchical and nested structure. We propose a complete design and an analytical model to characterize an uncooperative hierarchical ICN caching system compatible with IP. Secondly, to facilitate the incremental deployment of an ICN cache system in an IP network, we designed and implemented a cache-supported router with multi-terabyte cache capabilities. Finally, the simulation and measurement results show the accuracy of proposed analytical model, the significant gains on hit ratio, and the access latency of the hierarchical ICN cache system compared with a flat cache system based on naming routing, as well as the high performance of the implemented ICN router.
APA, Harvard, Vancouver, ISO, and other styles
33

Hernández-Jiménez, Roberto, Cesar Cardenas, and David Muñoz Rodríguez. "Modeling and Solution of the Routing Problem in Vehicular Delay-Tolerant Networks: A Dual, Deep Learning Perspective." Applied Sciences 9, no. 23 (2019): 5254. http://dx.doi.org/10.3390/app9235254.

Full text
Abstract:
The exponential growth of cities has brought important challenges such as waste management, pollution and overpopulation, and the administration of transportation. To mitigate these problems, the idea of the smart city was born, seeking to provide robust solutions integrating sensors and electronics, information technologies, and communication networks. More particularly, to face transportation challenges, intelligent transportation systems are a vital component in this quest, helped by vehicular communication networks, which offer a communication framework for vehicles, road infrastructure, and pedestrians. The extreme conditions of vehicular environments, nonetheless, make communication between nodes that may be moving at very high speeds very difficult to achieve, so non-deterministic approaches are necessary to maximize the chances of packet delivery. In this paper, we address this problem using artificial intelligence from a hybrid perspective, focusing on both the best next message to replicate and the best next hop in its path. Furthermore, we propose a deep learning–based router (DLR+), a router with a prioritized type of message scheduler and a routing algorithm based on deep learning. Simulations done to assess the router performance show important gains in terms of network overhead and hop count, while maintaining an acceptable packet delivery ratio and delivery delays, with respect to other popular routing protocols in vehicular networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Wijayanto, Agus, Imam Riadi, Yudi Prayudi, and Tri Sudinugraha. "Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method." Register: Jurnal Ilmiah Teknologi Sistem Informasi 8, no. 2 (2023): 156–69. http://dx.doi.org/10.26594/register.v8i2.2953.

Full text
Abstract:
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.
APA, Harvard, Vancouver, ISO, and other styles
35

Jim, Lincy Elizebeth, and Mark A. Gregory. "An Artificial Immune System-Based Strategy to Enhance Reputation in MANETs." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 68–82. http://dx.doi.org/10.18080/jtde.v7n1.176.

Full text
Abstract:
In Mobile Ad hoc Networks (MANETs) the nodes act as a host as well as a router, thereby forming a self-organizing network that does not rely upon fixed infrastructure, other than gateways to other networks. Security is important for MANETs and trust computation is used to improve collaboration between nodes. This paper proposes an Artificial Immune System-based reputation (AISREP) algorithm to compute trust and thereby provide a resilient reputation mechanism. In this paper, the presence of selfish nodes are considered. Selfish nodes are known to enhance the reputation of their selfish peers which in turn causes packet loss. In the event of the packet being routed using the AISREP algorithm, even though the number of selfish nodes increases, this algorithm identifies the selfish nodes and avoids using the selfish nodes from the routing path thereby improving the overall performance of the network.
APA, Harvard, Vancouver, ISO, and other styles
36

Neha, Parveen Haque. "A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad Hoc Network." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 159–61. https://doi.org/10.5281/zenodo.3892461.

Full text
Abstract:
Wireless ad hoc network is dispersing type of wireless network. The network is called as ad hoc network as it is not dependent on already existing infrastructure, like routers in wired networks or access points in managed network. Ad hoc networks become reliable for emergency response situation such as natural disasters, military conflicts, etc by using minimum composition of system and quick distribution methods. Mobile ad hoc network relies on the existence of the least some infrastructure. Mobile IP requires home agent, tunnels, and default router. DHCP requires servers and broadcast capabilities of the medium reaching all participants or relays to server. Cellular phone network requires base stations, infrastructure network etc. However, there may be several situations where users of a network cannot rely on an infrastructure, it too expensive, or there is none at all. It is necessary to note that it target on so called multi hop ad hoc network when describing ad hoc networking. The ad hoc setting up of a connection with an infrastructure is not the main issues here. These networks should be mobile and use wireless communications. This research paper focuses on routing techniques in Mobile ad hoc networks and it also deciphers the issues and challenges of Mobile ad hoc networks. Neha Parveen Haque "A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad-Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30218.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30218/a-study-of-various-routing-techniques-with-issues-and-challenges-in-mobile-adhoc-network/neha-parveen-haque
APA, Harvard, Vancouver, ISO, and other styles
37

Choi, Ju-Ho, Jung-Hwan Cha, Youn-Hee Han, and Sung-Gi Min. "A Dual-Connectivity Mobility Link Service for Producer Mobility in the Named Data Networking." Sensors 20, no. 17 (2020): 4859. http://dx.doi.org/10.3390/s20174859.

Full text
Abstract:
With the exponential growth of Cyber-Physical Systems (CPSs) technologies, the Internet of Things (IoT) infrastructure has evolved from built-in static infrastructure to a flexible structure applicable to various mobile environments. In this Internet of Mobile Things (IoMT) environment, each IoT device could operate simultaneously as a provider and consumer of information, and could provide new services through the exchange of such information. Named Data Networking (NDN), which could request data by content name rather than location (IP address), is suitable for such mobile IoT environments. However, in the current Named Data Networking (NDN) specification, producer mobility is one of the major problems in need of remedy. Previously proposed schemes for producer mobility use an anchor to hide the producer’s movement from consumers. As a result, they require a special anchor node and a signaling procedure to track the current locations of contents. A few anchorless schemes have also been proposed, but they still require mobility signaling and all NDN routers on the signaling path must understand the meaning of the signaling. We therefore propose an anchorless producer mobility scheme for the NDN. This scheme uses a dual-connectivity strategy that can be expressed as a soft handover. Whenever a producer changes its NDN Access Router (NAR), the new mobility link service located on the mobile producer’s old NDN face repairs the old link so that the connectivity with the pNAR can be maintained for a while. The old NDN face is removed after the new location information on the contents of the producer is disseminated over the NDN network by the Named-data Link State Routing Protocol (NLSR) routing protocol at the nNAR. The new mobility link service decouples connection and transaction to hide the collapse of the link. Therefore, the NDN’s mobility procedure could be simplified as the handover is defined as transaction completion as opposed to a breakdown of links. The proposed scheme prevents the routing information from being abruptly outdated due to producer mobility. Our simulation results show seamless handover when the producer changes its default access router.
APA, Harvard, Vancouver, ISO, and other styles
38

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Full text
Abstract:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive & active attacks. Sinkhole is one of severe kind of attack which attempts to attract most of network traffic towards it & degrade the performance of network. this paper, shows performance metrics as throughput, PDR, End to end delay & Packet loss. Simulation is carried out using widely used simulator NS2. 
APA, Harvard, Vancouver, ISO, and other styles
39

Nehnouh, Chakib. "A new architecture for online error detection and isolation in network on chip." Journal of High Speed Networks 26, no. 4 (2020): 307–23. http://dx.doi.org/10.3233/jhs-200646.

Full text
Abstract:
The Network-on-Chip (NoC) has become a promising communication infrastructure for Multiprocessors-System-on-Chip (MPSoC). Reliability is a main concern in NoC and performance is degraded when NoC is susceptible to faults. A fault can be determined as a cause of deviation from the desired operation of the system (error). To deal with these reliability challenges, this work propose OFDIM (Online Fault Detection and Isolation Mechanism),a novel combined methodology to tolerate multiple permanent and transient faults. The new router architecture uses two modules to assure highly reliable and low-cost fault-tolerant strategy. In contrast to existing works, our architecture presents less area, more fault tolerance, and high reliability. The reliability comparison using Silicon Protection Factor (SPF), shows 22-time improvement and that additional circuitry incurs an area overhead of 27%, which is better than state-of-the-art reliable router architectures. Also, the results show that the throughput decreases only by 5.19% and minor increase in average latency 2.40% while providing high reliability.
APA, Harvard, Vancouver, ISO, and other styles
40

Arini, Arini, Andrew Fiade, and Ridwan Baharsyah. "Perbandingan Load Balancing Router Mysql Dan HAProxy Menggunakan SysBench dan Cluster Innodb Pada Sistem Operasi Centos." Cyber Security dan Forensik Digital 8, no. 1 (2025): 17–24. https://doi.org/10.14421/csecurity.2025.8.1.5004.

Full text
Abstract:
Load balancing merupakan penyeimbang server dalam mendistribusikan beban kerja ke beberapa server dengan mempertimbangkan kapasitas masing-masing server. Ketika beberapa server digunakan, layanan yang ada dapat tetap berfungsi meskipun salah satu server mengalami kegagalan. Dua model load balancing yang akan digunakan adalah MySQL Router dan HAProxy. Penelitian ini bertujuan untuk membandingkan kinerja MySQL Router dan HAProxy dari segi waktu respons, throughput, dan distribusi beban server. Selain itu, penelitian ini juga menguji sinkronisasi data antar server database dengan menggunakan Sysbench sebagai alat pengujian. Sysbench merupakan utilitas benchmark yang dapat mengevaluasi kinerja sistem melalui berbagai parameter pengujian. Hasil penelitian menunjukkan bahwa MySQL Router memiliki kemampuan load balancing yang signifikan dalam mendistribusikan beban dan memastikan ketersediaan server dibandingkan dengan HAProxy. Pengujian dengan thread (beban) terkecil hingga terbesar pada load balancer MySQL Router menghasilkan rentang TPS (Transaction Per Second) 2900 hingga 2600; seiring bertambahnya thread (beban), TPS yang diperoleh semakin menurun, dengan rentang waktu respons 2 hingga 50 ms. Namun, HAProxy menunjukkan nilai TPS yang lebih kecil, berkisar antara sekitar 900 hingga 800 TPS, tetapi menghasilkan waktu respons yang relatif lama, berkisar antara 8 hingga 160 ms. Pengujian sinkronisasi database menunjukkan efisiensi kedua model dalam menangani perubahan data pada server yang berbeda. Penelitian ini memberikan kontribusi yang signifikan terhadap pengembangan infrastruktur TI yang lebih andal dan efisien dalam organisasi, khususnya dalam konteks penggunaan MySQL InnoDB Cluster dan HAProxy pada OS CentOS. Kata kunci: Load Balancing, MySQL Router, HaProxy, InnoDB Cluster, Centos Os, Networking ---------------------------- Abstract Load balancing is a server balancer that distributes the workload among several servers, taking into account the capacity of each server. When multiple servers are used, existing services can continue to function even if one server fails. The two load balancing models to be used are MySQL Router and HAProxy. This study aims to compare the performance of MySQL Router and HAProxy in terms of response time, throughput, and server load distribution. Additionally, this study also tests data synchronization between database servers using Sysbench as a testing tool. Sysbench is a benchmark utility that can evaluate system performance through various test parameters. The results of the study show that MySQL Router has significant load balancing capabilities in distributing loads and ensuring server availability compared to HAProxy. Testing with the smallest to the largest threads on the MySQL Router load balancer resulted in a TPS range from 2900 to 2600; as the thread (load) increases, the TPS obtained decreases, with a response time range of 2 to 50 ms. However, HAProxy showed a smaller TPS value, ranging from around 900 to 800 TPS, but resulted in a relatively long response time, ranging from 8 to 160 ms. Database synchronization tests also reveal the efficiency of both models in handling data changes on different servers. This research makes a significant contribution to the development of more reliable and efficient IT infrastructure within organizations, particularly in the context of using MySQL InnoDB Cluster and HAProxy on CentOS OS. Keywords: Load Balancing, MySQL Router, HaProxy, InnoDB Cluster, Centos Os, Networking.
APA, Harvard, Vancouver, ISO, and other styles
41

Novianto, Dian, Yohanes Setiawan Japriadi, Lukas Tommy, and Sujono. "MITIGASI DHCP STARVATION ATTACK PADA ROUTERBOARD MIKROTIK DAN PENGARUHNYA TERHADAP PERFORMANSI." Jurnal Ilmiah Informatika Global 15, no. 2 (2024): 52–57. http://dx.doi.org/10.36982/jiig.v15i2.3930.

Full text
Abstract:
As people become more dependent on information technology, the need for Internet availability increases. Various types of devices are connected to the network, increasing the convenience of using information technology. However, this convenience can often be disrupted by attacks on the network infrastructure, one of which is a DHCP Starvation attack. The Dynamic Host Configuration Protocol (DHCP) is a client-server-based protocol used to automatically assign or obtain IP addresses for client computers or other network devices. Mitigating DHCP Starvation attacks is one form of protection for users. The impact of this attack is that the attacker can become one of the hosts on the network and perform a man-in-the-middle attack, so the impact of information leakage can occur. In addition, it is necessary to know the impact on router resources when a DHCP Starvation attack occurs, so that network managers can calculate how much resources are needed. The author uses a Filtering method based on Mac address es, ARP, and alerts on the Mikrotik router. In addition, the PPDIOO method is also used to develop this system, which consists of preparation, planning, design, Implementation, operation, and optimization. The test results showed that the application of this Filtering method proved to be very effective in preventing DHCP Starvation attacks, and the router board resources were not significantly affected when this Filtering method was applied.
APA, Harvard, Vancouver, ISO, and other styles
42

Kaur, Rajveer, Dr Shaveta Rani, and Dr Paramjeet Singh. "Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (2013): 214–19. http://dx.doi.org/10.24297/ijct.v5i3.3522.

Full text
Abstract:
In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.
APA, Harvard, Vancouver, ISO, and other styles
43

Papan, Jozef, Pavel Segec, Oleksandra Yeremenko, Ivana Bridova, and Michal Hodon. "A New Bit Repair Fast Reroute Mechanism for Smart Sensors IoT Network Infrastructure." Sensors 20, no. 18 (2020): 5230. http://dx.doi.org/10.3390/s20185230.

Full text
Abstract:
Today’s IP networks are experiencing a high increase in used and connected Internet of Things (IoT) devices and related deployed critical services. This puts increased demands on the reliability of underlayer transport networks. Therefore, modern networks must meet specific qualitative and quantitative parameters to satisfy customer service demands in line with the most common requirements of network fault tolerance and minimal packet loss. After a router or link failure within the transport network, the network convergence process begins. This process can take an unpredictable amount of time, usually depending on the size, the design of the network and the routing protocol used. Several solutions have been developed to address these issues, where one of which is the group of so-called Fast ReRoute (FRR) mechanisms. A general feature of these mechanisms is the fact that the resilience to network connectivity failures is addressed by calculating a pre-prepared alternative path. The path serves as a backup in the event of a network failure. This paper presents a new Bit Repair (B-REP) FRR mechanism that uses a special BIER header field (Bit-String) to explicitly indicate an alternative path used to route the packet. B-REP calculates an alternative path in advance as a majority of existing FRR solutions. The advantage of B-REP is the ability to define an alternative hop-by-hop path with full repair coverage throughout the network, where, unlike other solutions, we propose the use of a standardized solution for this purpose. The area of the B-REP application is communication networks working on the principle of packet switching, which use some link-state routing protocol. Therefore, B-REP can be successfully used in the IoT solutions especially in the field of ensuring communication from sensors in order to guarantee a minimum packet loss during data transmission.
APA, Harvard, Vancouver, ISO, and other styles
44

Adhi, B. Anantasatya, Ruki Harwahyu, Abdusy Syarif, Harris Simaremare, R. Fitri Sari, and Pascal Lorenz. "AODV-UI Proof of Concept on MIPS-based Wireless Router." Journal of Communications Software and Systems 10, no. 1 (2014): 14. http://dx.doi.org/10.24138/jcomss.v10i1.136.

Full text
Abstract:
AODV routing protocol facilitates changing and simple-to-setup network environment. It helps setting up a network without sufficient infrastructure, such as in disaster area. Development of AODV protocol has gathered a worldwide research interest. However, not many researches implement AODV routing protocol in real mobile nodes and real MANET. In addition, real implementation deals with other works concerning underlying protocol, firmware and hardware configuration, as well as detailed topology both in logical and physical arrangement. This work aims to implements Ad-hoc On-demand Distant Vector – particularly University of Indonesia AODV (AODV-UI) routing protocol on low-end inexpensive generic wireless routers as a proof of concept. AODV-UI is an improved version of AODV routing protocol that implements gateway interconnection and reverse route capability. This routing protocol has been previously successfully tested in NS-2. In this work, current AODV-UI protocol is ported to OpenWRT + MIPS (Microprocessor without Interlocked Pipeline Stages) little endian architecture then tested on the real networking environment. Underlying media access layer is also altered to provide the protocol greater control over the network. Performance of this implementation is measured in terms of energy consumption, routing overhead, end-to-end delay, protocol reliability and packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
45

Gottschalk, Thomas D., Philip Amburn, and Dan M. Davis. "Advanced Message Routing for Scalable Distributed Simulations." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 2, no. 1 (2005): 17–28. http://dx.doi.org/10.1177/154851290500200103.

Full text
Abstract:
On large Linux clusters, scalability is the ability of the program to utilize additional processors in a way that provides a near-linear increase in computational capacity for each node employed. Without scalability, the cluster may cease to be useful after adding a very small number of nodes. The Joint Forces Command (JFCOM) Experimentation Directorate (J9) has recently been engaged in Joint Urban Operations (JUO) experiments and counter mortar analyses. Both required scalable codes to simulate over 1 million SAF clutter entities, using hundreds of CPUs. The JSAF application suite, utilizing the redesigned RTI-s communications system, provides the ability to run distributed simulations with sites located across the United States, from Norfolk, Virginia, to Maui, Hawaii. Interest-aware routers are essential for scalable communications in the large, distributed environments, and the RTI-s framework, currently in use by JFCOM, provides such routers connected in a basic tree topology. This approach is successful for small to medium sized simulations, but faces a number of constraining limitations precluding very large simulations. To resolve these issues, the work described herein utilizes a new software router infrastructure to accommodate more sophisticated, general topologies, including both the existing tree framework and a new generalization of the fully connected mesh topologies. The latter were first used in the SF Express ModSAF simulations of 100,000 fully interacting vehicles. The new software router objects incorporate an augmented set of the scalable features of the SF Express design, while optionally using low-level RTI-s objects to perform actual site-to-site communications. The limitations of the original MeshRouter formalism have been eliminated, allowing fully dynamic operations. The mesh topology capabilities allow aggregate bandwidth and site-to-site latencies to match actual network performance. The heavy resource load at the root node now can be distributed across routers at the participating sites. Most significantly, realizable point-to-point bandwidths remain stable as the underlying problem size increases, sustaining scalability claims.
APA, Harvard, Vancouver, ISO, and other styles
46

Gupta, Parul. "Comparative Study of Fault Detection Techniques in Wireless Networks and Manets." International Journal of Advanced Multidisciplinary Research and Studies 3, no. 2 (2023): 1207–13. https://doi.org/10.62225/2583049x.2023.3.2.4114.

Full text
Abstract:
The internet has dominated global communication for over three decades, largely due to the robustness and ease of deployment offered by wired networks. However, in recent years, the decreasing hardware costs associated with wireless networks have significantly boosted their popularity worldwide. Traditional wireless networks typically require a central device, such as a router (acting as a server), to which multiple devices (clients) connect wirelessly. In contrast, Mobile Ad-Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) operate without such centralized devices. MANETs are decentralized wireless networks where each node can function as both a host and a router, allowing for flexible and dynamic communication without relying on fixed infrastructure. WSNs consist of spatially dispersed sensor nodes that monitor environmental conditions and communicate wirelessly, often without a central server, to collect and transmit data. The objective of this study is to identify faulty readings in wireless networks, specifically in WSNs and MANETs, by utilizing local diagnostic messages to create a global diagnosis status table. This approach aims to detect both hard and soft faults and facilitate comparative analysis between WSNs and MANETs.
APA, Harvard, Vancouver, ISO, and other styles
47

Carara, Everton, Ney Calazans, and Fernando Moraes. "A New Router Architecture for High-Performance Intrachip Networks." Journal of Integrated Circuits and Systems 3, no. 1 (2008): 23–31. http://dx.doi.org/10.29292/jics.v3i1.278.

Full text
Abstract:
For almost a decade now, Network on Chip (NoC) concepts have evolved to provide an interesting alternative to more traditional intrachip communication architectures (e.g. shared busses) for the design of complex Systems on Chip (SoCs). A considerable number of NoC proposals are available, focusing on different sets of optimization aspects, related to specific classes of applications. Each such application employs a NoC as part of its underlying implementation infrastructure. Many of the mentioned optimization aspects target results such as Quality of Service (QoS) achievement and/or power consumption reduction. On the other hand, the use of NoCs brings about the solution of new design problems, such to the choice of synchronization method to employ between NoC routers and application modules mapping. Although the availability of NoC structures is already rather ample, some design choices are at base of many, if not most, NoC proposals. These include the use of wormhole packet switching and virtual channels. This work pledges against this practice. It discusses trade-offs of using circuit or packet switching, arguing in favor the use of the former with fixed size packets (cells). Quantitative data supports the argumentation. Also, the work proposes and justifies replacing the use of virtual channels by replicated channels, based on the abundance of wires in current and expected deep sub-micron technologies. Finally, the work proposes a transmission method coupling the use of session layer structures to circuit switching to better support application implementation. The main reported result is the availability of a router with reduced latency and area, a communication architecture adapted for high-performance applications.
APA, Harvard, Vancouver, ISO, and other styles
48

Rahman, Shaikh Mohammad Ehsanur, Farhat Anwar, and Aisha Hassan Abdalla Hashim. "Performance Enhancement of NEMO based VANET using Localization Router (LR) to reduce Handoff delays." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 2 (2017): 511. http://dx.doi.org/10.11591/ijeecs.v8.i2.pp511-521.

Full text
Abstract:
<p>Vehicular Ad hoc networks (VANETs) combined with vehicle-to-vehicle and vehicle-to-infrastructure communications can be considered as the most suitable technology to enable ITS (Intelligent Transport System) application bestowed upon travellers with mobility, safety and productivity with human comfort. As a delay sensitive ITS application, handoff delays and packet losses are critical parameters for maintaining seamless connectivity in VANET solution. During handoff, when mobile node (vehicle) is acquiring new CoA (care of address), packets directed towards that node are lost; because it’s old identity is no more valid. So in high speed dynamic vehicular environment the number of frequent handoffs would produce delay beyond the normal limit. Therefore, it is very important to resolve the issues of handoff delay and packet losses in VANET environment. As a solution, a domain based RHD-NV (Reducing Handoff Delay in NEMO based VANET) scheme is proposed in this paper. Number of vehicles moving towards the road constructs a domain where network mobility NEMO-BS protocol is applied. A vehicle is selected as MR (master router) and connected to the RSU (road side unit) to the internet and other vehicles in the domain work as LRs (localization router) and communicate through MR. Simulation tests performed in NS3 (network simulator) and MATLAB SIMULINK demonstrate that using LRs (localization router) in the domain, the number of handoffs and handoff delay are significantly reduced.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Velagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.

Full text
Abstract:
A MANET can be treated as a network in which the nodes have the capability of self-configuring among themselves. These nodes are connected by wireless links to form an distributed topology without the help of any pre-existing infrastructure. Each node in a MANET can itself act as a router on its own. To perform effective routing operation in MANETS , several routing protocols were proposed, addressing several issues in MANETS. In this paper ,we tried to study the operation of DSDV protocol ,which is a proactive protocol and analyse the results obtained by simualting the DSDV protocol using NS-2 Simulator.
APA, Harvard, Vancouver, ISO, and other styles
50

Kulkarni, Raghavendra, and Kalpana Sharma. "A Routing Algorithm with Sdn Controller Using Policy-Based Routing (PBR)." ECS Transactions 107, no. 1 (2022): 12661–70. http://dx.doi.org/10.1149/10701.12661ecst.

Full text
Abstract:
Software defined networking (SDN) is a modern computer network architecture in which the control plane is separated from the data plane and applied centrally. SDN use in businesses necessitates the replacement of legacy network infrastructure, which comes at a high cost to the business. The phased rollout of SDN in the form of hybrid networks is the solution to this issue. Legacy devices' control planes must communicate with the SDN controller in hybrid networks. This connectivity facilitates the use of SDN in hybrid networks. Policy-based routing (PBR) is a mechanism in legacy networks that makes routing decisions based on policies set by network administrators and offers a versatile routing mechanism. Using an SDN controller and the Open Flow protocol, we presented a new approach for policy-based routing (PBR) in RIP-based hybrid networks in this article. The Open Flow switches send false metrics advertising packets to the legacy routers using this tool. We may alter the routing table of a legacy router using this procedure, which is dependent on the controller's policy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography