To see the other types of publications on this topic, follow the link: Routers (Computer networks) Internet.

Journal articles on the topic 'Routers (Computer networks) Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Routers (Computer networks) Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Schwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (June 18, 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.

Full text
Abstract:
TP-Link Technologies Co, Ltd. is a Chinese manufacturer of networking products and has a 42% share of the consumer WLAN market, making it the market leader. The company sells about 150 million devices per year. Many people worldwide use the Internet every day and are connected to the Internet with their computers. In the world of smart homes, even coffee machines, refrigerators, smart sockets, and light bulbs have found their way to the Internet, not to mention the many smartphones, which are, of course, also connected to the Internet. Since many different dangers come from a heater or printer and the many other smart devices directly connected to the Internet, there is a safe haven: the local area network. To connect to the Internet, one needs a modem, which is built into a router in many cases. Routers route network packets back and forth between several computer networks. They are used to connect to the Internet, and they are the bridge between the home network and the Internet in almost every household connected to the Internet. Because of their nature as a bridge between local and global networks, they are also the largest attack vector. [19] This paper examines how up-to-date the firmware of standard home network routers is and how secure the firmware is. In order to obtain a representative result, the examined routers were selected according to fixed rules. Each router had to be a product of the manufacturer TP-Link, the routers had to be in the low-budged range (less than 20 Euro) and be available from Amazon. Also, two different types of investigations were identified for the selected devices. Firstly, the devices were examined in the form of physically existing hardware, and secondly, an attempt was made to access the firmware via the manufacturer’s website. It was found that even the fixing of current vulnerabilities and recently released update files are no guarantee that older vulnerabilities have been fixed. Secrets such as private keys and certificates are hard-coded in the firmware and can be extracted from update files. Moreover, devices are deliberately built to make it impossible to install the latest alternative firmware.
APA, Harvard, Vancouver, ISO, and other styles
2

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
APA, Harvard, Vancouver, ISO, and other styles
3

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Deebalakshmi, R., and V. L. Jyothi. "Intelligent Packet Delivery in Router Using Structure Optimized Neural Network." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (May 1, 2018): 545. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp545-553.

Full text
Abstract:
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.<span style="font-size: 9.0pt; line-height: 115%; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; letter-spacing: .05pt; mso-ansi-language: EN-IN; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;" lang="EN-IN">The Internet itself is a worldwide <a href="https://www.webopedia.com/TERM/I/network.htm"><span style="color: windowtext; text-decoration-line: none;">network</span></a> connecting millions of <a href="https://www.webopedia.com/TERM/I/computer.htm"><span style="color: windowtext; text-decoration-line: none;">computers</span></a> and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at <a href="https://www.webopedia.com/TERM/G/gateway.html"><span style="color: windowtext; text-decoration-line: none;">gateways</span></a>, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using <a href="https://www.webopedia.com/TERM/R/header.htm"><span style="color: windowtext; text-decoration-line: none;">headers</span></a> and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Ganjali, Yashar, and Nick McKeown. "Update on buffer sizing in internet routers." ACM SIGCOMM Computer Communication Review 36, no. 5 (October 10, 2006): 67–70. http://dx.doi.org/10.1145/1163593.1163605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DURRESI, ARJAN, VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, and S. S. IYENGAR. "EFFICIENT AND SECURE AUTONOMOUS SYSTEM BASED TRACEBACK." Journal of Interconnection Networks 05, no. 02 (June 2004): 151–64. http://dx.doi.org/10.1142/s0219265904001076.

Full text
Abstract:
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim results with an approximate location of the attacker. Reconstruction of the whole path is also very difficult due to the sheer size of the Internet. This paper presents lightweight schemes for tracing back to the attack-originating AS instead to the exact origin itself. Once the attack-originating AS is determined, all further routers in the path to the attacker are within that AS and under the control of a single entity; which can presumably monitor local traffic in a more direct way than a generalized, Internet scale, packet marking scheme can. We furthermore, provide a scheme to prevent compromised routers from forging markings.
APA, Harvard, Vancouver, ISO, and other styles
7

Curran, Kevin, Derek Woods, Nadene McDermot, and Colleen Bradley. "The effects of badly behaved routers on Internet congestion." International Journal of Network Management 13, no. 1 (January 2003): 83–94. http://dx.doi.org/10.1002/nem.464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vural, Serdar, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. "Caching Transient Data in Internet Content Routers." IEEE/ACM Transactions on Networking 25, no. 2 (April 2017): 1048–61. http://dx.doi.org/10.1109/tnet.2016.2616359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suthaharan, Shan. "Reduction of queue oscillation in the next generation Internet routers." Computer Communications 30, no. 18 (December 2007): 3881–91. http://dx.doi.org/10.1016/j.comcom.2007.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aminah, Nina Siti, Muhamamad Reza Ramadhani Raharjo, and Maman Budiman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5119. http://dx.doi.org/10.11591/ijece.v11i6.pp5119-5126.

Full text
Abstract:
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
APA, Harvard, Vancouver, ISO, and other styles
11

FUKUDA, KENSUKE, HIDEKI TAKAYASU, and MISAKO TAKAYASU. "SPATIAL AND TEMPORAL BEHAVIOR OF CONGESTION IN INTERNET TRAFFIC." Fractals 07, no. 01 (March 1999): 23–31. http://dx.doi.org/10.1142/s0218348x99000049.

Full text
Abstract:
We have developed an approach which allows the determination of relative congestion levels on nodes of TCP/IP computer network by observing test packet round trip time sequences for a series of routers located along the same path. We have also demonstrated the existence of strong spatial correlation of congestion levels. Propagation of congestion between neighboring routers can be observed directly. With increasing network load, distribution of congestion duration times changes from exponential to a distribution falling off slower than power law, via power law distribution. We thus conclude that direct observations of network congestion agree with predictions of a model based on contact process.
APA, Harvard, Vancouver, ISO, and other styles
12

Lombardo, Alfio, Carla Panarello, and Giovanni Schembra. "Achieving energy savings and QoS in internet access routers." ACM SIGMETRICS Performance Evaluation Review 38, no. 3 (January 3, 2011): 76–80. http://dx.doi.org/10.1145/1925019.1925035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Avrachenkov, K., U. Ayesta, J. Doncel, and P. Jacko. "Optimal congestion control of TCP flows for internet routers." ACM SIGMETRICS Performance Evaluation Review 40, no. 3 (December 4, 2012): 62–64. http://dx.doi.org/10.1145/2425248.2425263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Alanezi, Mohammed A., Houssem R. E. H. Bouchekara, and Muhammad S. Javaid. "Optimizing Router Placement of Indoor Wireless Sensor Networks in Smart Buildings for IoT Applications." Sensors 20, no. 21 (October 30, 2020): 6212. http://dx.doi.org/10.3390/s20216212.

Full text
Abstract:
Internet of Things (IoT) is characterized by a system of interconnected devices capable of communicating with each other to carry out specific useful tasks. The connection between these devices is ensured by routers distributed in a network. Optimizing the placement of these routers in a distributed wireless sensor network (WSN) in a smart building is a tedious task. Computer-Aided Design (CAD) programs and software can simplify this task since they provide a robust and efficient tool. At the same time, experienced engineers from different backgrounds must play a prominent role in the abovementioned task. Therefore, specialized companies rely on both; a useful CAD tool along with the experience and the flair of a sound expert/engineer to optimally place routers in a WSN. This paper aims to develop a new approach based on the interaction between an efficient CAD tool and an experienced engineer for the optimal placement of routers in smart buildings for IoT applications. The approach follows a step-by-step procedure to weave an optimal network infrastructure, having both automatic and designer-intervention modes. Several case studies have been investigated, and the obtained results show that the developed approach produces a synthesized network with full coverage and a reduced number of routers.
APA, Harvard, Vancouver, ISO, and other styles
15

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha, and Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things." International Journal of Grid and High Performance Computing 11, no. 3 (July 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Full text
Abstract:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy IoT); 2) The optimized reactive route is dynamically adjusted based on fuzzy based prediction accurately from the number of routes provided by base protocol. If the selection accuracy is high, the performance enhances the network quality; 3) FLWP takes full advantage of energy to further enhance target tracking performance by properly selecting reactive routes in the network. Authors evaluated the efficiency of FLWP with simulation-based experiments. FLWP scheme improves the energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
16

MAGONI, DAMIEN, and PASCAL LORENZ. "MULTICAST STATE DISTRIBUTION BY JOINS USING MULTIPLE SHORTEST PATHS." Journal of Interconnection Networks 06, no. 02 (June 2005): 115–29. http://dx.doi.org/10.1142/s0219265905001344.

Full text
Abstract:
The lack of resources in routers will become a crucial issue with the deployment of state storing protocols. In particular, single or any source multicast protocols will most probably take over large amounts of resources for maintaining multicast tree information. The aim of this paper is to study the possibility and benefit of using multiple shortest paths in order for a new member to reach a multicast tree. Such a mechanism would not reduce the overall amount of state information in the network but it would distribute this amount more evenly among all routers. The idea is to use alternate shortest paths provided by the underlying unicast routing protocol to avoid saturated routers, that is, routers that can not or do not want to store any more multicast state information. As the simulation results are very sensitive to the topology, we have used subgraphs of an Internet map. We have then simulated our multipath join mechanism and have found that depending on the tree size, the use of our mechanism can increase successful join attempts by up to 55% when the network is half saturated.
APA, Harvard, Vancouver, ISO, and other styles
17

Gunawan, Heri. "ANCAMAN KEAMANAN JARINGAN PADA SERVER UNTUK MEMBATASI WEBSITE TERTENTU MENGGUNAKAN MIKROTIK." INOVA-TIF 2, no. 1 (January 2, 2020): 22. http://dx.doi.org/10.32832/inova-tif.v1i2.2749.

Full text
Abstract:
<p><em>Mikrotik RouterOs ™ is an operating system and software that can be used to make a computer a reliable network router, designed to provide convenience for its users, the administration can be done through Windows application (Winbox), The server is a computer system that provides certain types of services (services) in a computer network, the server is supported by a processor that is scalable and a large ram is also equipped with a special operating system, called a (network operating system). The internet provides a lot of useful content if the user uses the internet well, besides that the<strong> </strong>internet can also have a negative impact on its users if the internet is used for negative things which will affect the young generation who will embrace this country to be the successor of this nation. outside the prevailing norms. Today the internet has many different types of social networking sites that have been used by many people, the goal or One of the solutions is that internet users do not access the negative or self-detrimental effects, using the Scientific of Inquiry method by limiting access to websites Specifically for prevention efforts in accessing negative internet sites in this case containing pornographic content is by blocking these negative sites permanently using a web proxy that serves to block some websites that cannot be accessed by clients through a browser on the Mikrotik Faculty of Engineering routers Ibn Khaldun Universit</em></p>
APA, Harvard, Vancouver, ISO, and other styles
18

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting. This paper implemented network automation using Ansible to configure EIGRP routing and advanced configuration in the GNS3 environment. This study is focused on automated scripting to configure IP Addresses to the interfaces, EIGRP routing protocol, a default static route and advanced EIGRP configurations. Ansible ran the scripting on Network Automation Docker and pushed the configurations to the routers. The network automation docker communicated with other routers via SSH. In the testing phase, the running configuration between the traditional approach and automation scripting in the Ansible playbook was compared to verify EIGRP configurations' accuracy. The findings show that Ansible has successfully deployed the configuration to the routers with no errors. Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment. Implementing EIGRP authentication and hardening process can enhance the network security level for future study.
APA, Harvard, Vancouver, ISO, and other styles
19

Musril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (September 1, 2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.

Full text
Abstract:
An autonomous system (AS) is the collection of networks having the same set of routing policies. Each AS has administrative control to its own inter-domain routing policy. Computer networks consisting of a bunch of AS's with different routing will not be able to interconnecttion one another. This is causes communication in the network to be inhibited. For that we need a protocol that can connect each different AS. Border Gateway Protocol (BGP) is an inter-domain routing protocol i.e. between different AS that is used to exchange routing information between them. In a typical inter-network (and in the Internet) each autonomous system designates one or more routers that run BGP software. BGP routers in each AS are linked to those in one or more other AS. The ability to exchange table routing information between Autonomous System (AS) is one of the advantages BGP. BGP implements routing policies based a set of attributes accompanying each route used to pick the “shortest” path across multiple ASs, along with one or more routing policies. BGP uses an algorithm which cannot be classified as a pure "Distance Vector", or pure "Link State". It is a path vector routing protocol as it defines a route as a collection of a number of AS that is passes through from source AS to destination AS. This paper discusses the implementation of the BGP routing protocol in the network that have different AS in order to interconnect. Its application using Packet Tracer 7.0 software for prototyping and simulating network. So that later can be applied to the actual network. Based on experiments that have been carried out, the BGP routing protocol can connect two routers that have different autonomous system.
APA, Harvard, Vancouver, ISO, and other styles
20

Beshley, Mykola, Natalia Kryvinska, Halyna Beshley, Oleg Yaremko, and Julia Pyrih. "Virtual Router Design and Modeling for Future Networks with QoS Guarantees." Electronics 10, no. 10 (May 11, 2021): 1139. http://dx.doi.org/10.3390/electronics10101139.

Full text
Abstract:
A virtual router model with a static and dynamic resource reconfiguration for future internet networking was developed. This technique allows us to create efficient virtual devices with optimal parameters (queue length, queue overflow management discipline, number of serving devices, mode of serving devices) to ensure the required level of quality of service (QoS). An analytical model of a network device with virtual routers is proposed. By means of the mentioned mathematical representation, it is possible to determine the main parameters of the virtual queue system, which are based on the first in, first out (FIFO) algorithm, in order to analyze the efficiency of network resources utilization, as well as to determine the parameters of QoS flows, for a given intensity of packets arrival at the input interface of the network element. In order to research the guaranteed level of QoS in future telecommunications networks, a simulation model of a packet router with resource virtualization was developed. This model will allow designers to choose the optimal parameters of network equipment for the organization of virtual routers, which, in contrast to the existing principle of service, will provide the necessary quality of service provision to end users in the future network. It is shown that the use of standard static network device virtualization technology is not able to fully provide a guaranteed level of QoS to all present flows in the network by the criterion of minimum delay. An approach for dynamic reconfiguration of network device resources for virtual routers has been proposed, which allows more flexible resource management at certain points in time depending on the input load. Based on the results of the study, it is shown that the dynamic virtualization of the network device provides a guaranteed level of QoS for all transmitted flows. Thus, the obtained results confirm the feasibility of using dynamic reconfiguration of network device resources to improve the quality of service for end users.
APA, Harvard, Vancouver, ISO, and other styles
21

Baskoro, Andri Nuki, Anton Anton, and Puji Astuti. "DESIGNING A ROUTER REDUCTION SYSTEM USING HOT STANDBY ROUTER PROTOCOL METHOD FOR BACKUP LINK IN DITJEN PPKL." Jurnal Techno Nusa Mandiri 17, no. 2 (September 15, 2020): 117–22. http://dx.doi.org/10.33480/techno.v17i2.1643.

Full text
Abstract:
Computer networks play an important role in data communication at companies or government institutions to support them in terms of work. In this case, the authors conducted observational research and direct interviews with IT staff at the Ditjen PPKL Control about how the network operates in that place. Routers have a very important role in data communication and connecting different networks, so a router reduction system is needed as a solution to minimize failures on the network or these devices. The network topology in each office or government agency is different, which makes the problems in each government office or agency different. Based on the research that has been done, the network of the Ditjen PPKL often experiences a link down which causes disconnection of the internet connection and hinders the productivity of staff. So a router redundancy system is needed to maintain network availability, such as the Hot Standby Router Protocol (HSRP) which has two lines, one as the mainline and the other as a backup if the mainline is down. That way network availability will always be maintained without having to wait for the IT staff to do troubleshooting if there is a network failure. The result of this research is to provide maintained network availability. Even if a link goes down, the network will automatically return to normal.
APA, Harvard, Vancouver, ISO, and other styles
22

Tantoni, Ahmad, Mohammad Taufan Asri Zaen, and Sofiansyah Fadli. "ANALISIS KOMPARASI PERFORMA JARINGAN KOMPUTER PADA IMPLEMENTASI IPv4 dan IPv6." Jurnal Informatika dan Rekayasa Elektronik 1, no. 2 (November 30, 2018): 55. http://dx.doi.org/10.36595/jire.v1i2.60.

Full text
Abstract:
Routers have important functions in the network, especially the internet. Routers can connect several network segments so that they can communicate with other users even though they are separated by a great distance (Sofana, 2013). IPv4 was originally a 32-bit binary number that was used to identify hosts on the network, after successful use by internet users then a new problem arises where IPv4 cannot accommodate Internet users in the future because it runs out of IPv4 addresses. Then IPv6 was created with the aim to provide more addressing than IPv4 (Sugeng, 2015). The problem is seen from the difference in the bit width between IPv4 and IPv6 whether it affects the CPU performance of the computer and the performance of data sent, average speed on the network. Then there will be research on the comparative performance of the CPU load and the performance of the data sent, the average speed of the computer network on the implementation of IPv4 and IPv6 using Passmark Advance Network Test. So that it can provide an overview of the results of the comparison of IPv4 and IPv6 QoS that are better than the 3 parameters tested with TCP and UDP protocols
APA, Harvard, Vancouver, ISO, and other styles
23

Hambi, M., D. J. Blumenthal, H. J. Chao, E. Leonardi, Chunming Qiao, and K. Y. Yun. "Guest editorial high-performance electronic switches/routers for high-speed internet." IEEE Journal on Selected Areas in Communications 21, no. 4 (May 2003): 481–85. http://dx.doi.org/10.1109/jsac.2003.813142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hamdi, M., H. J. Chao, D. J. Blumental, E. Leornardi, Chumming Qiao, K. Y. Yun, and R. Ramaswami. "Guest editorial high-performance optical switches/routers for high-speed internet." IEEE Journal on Selected Areas in Communications 21, no. 7 (September 2003): 1013–17. http://dx.doi.org/10.1109/jsac.2003.815677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Putra, Eka, and Rizky Aqmalsyah Bugis. "IMPLEMENTASI HOTSPOT DENGAN USER MANAGER UNTUK INTERNET WIRELESS MENGGUNAKAN MIKROTIK RB-951Ui DI SMK SWASTA AL-WASHLIYAH PASAR SENEN 2 MEDAN." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (July 20, 2019): 58. http://dx.doi.org/10.36294/jurti.v3i1.689.

Full text
Abstract:
Abstract - The purpose of this study is to use Microtic Router technology to support hotspot networks at the AL-WASHLIYAH PASAR SENEN 2 PRIVATE VOCATIONAL SCHOOL, so that it can provide proxy-based hotspots, hotspots for users other than wired connections around the AL-WASHLIYAH PASAR SENEN PRIVATE VOCATIONAL SCHOOL 2 and of course that brings additional revenue beyond cable connections. The research method that is carried out is the analytical method that is by making an observation on the current method and literature study, the use of network topology which is choosing the Network device to be used and the configuration of network devices used, conducting hotspot network testing from this research is by providing hotspot services hotspot, then AL-WASHLIYAH PASAR SENEN PRIVATE VOCATIONAL SCHOOL 2 gets revenue from hotspot services in addition to revenue from cable services. Keywords - Computer Networks, Wireless LANs, Microtic Routers, Hotspots. Abstrak - Tujuan penelitian ini adalah penggunaan teknologi Router Mikrotik dalam menunjang jaringan hotspot pada warnet SMK SWASTA AL-WASHLIYAH PASAR SENEN 2, sehingga dapat memberikan fasilitas hotspot berbasis mikrotik, hotspot bagi pengguna selain koneksi kabel disekitar lingkungan SMK SWASTA AL-WASHLIYAH PASAR SENEN 2 dan tentunya yang mendatangkan revenue tambahan diluar koneksi kabel. Metode penelitian yang dilakukan yaitu metode analisis yaitu dengan melakukan suatu pengamatan pada metode yang berjalan dan studi literatur, penggunaan topologi jaringan yaitu memilih perangkat Jaringan yang akan dipakai dan konfigurasi pada perangkat jaringan yang digunakan, melakukan testing jaringan hotspot dari penelitian ini adalah dengan penyediaan layanan hotspot hotspot, maka SMK SWASTA AL-WASHLIYAH PASAR SENEN 2mendapat revenue dari layanan hotspot selain revenue dari layanan kabel.Kata Kunci - Jaringan Komputer, Wireless LAN, Router Mikrotik, Hotspot.
APA, Harvard, Vancouver, ISO, and other styles
26

Tsai, Pang-Wei, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, and Teck Chaw Ling. "SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange." Future Internet 13, no. 7 (June 30, 2021): 171. http://dx.doi.org/10.3390/fi13070171.

Full text
Abstract:
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS), and it might cause performance and compatibility problems in legacy network infrastructure. Nevertheless, with recent advancements in network innovation, some traditional networks are planning to be restructured with Software-Defined Networking (SDN) technology for gaining more benefits. By using SDN, Internet eXchange Point (IXP) is able to enhance its capability of management by applying softwarized control methods, acting as a Software-Defined eXchange (SDX) center to handle numerous advertisement adaptively. To use the SDN method to strengthen routing security of IXP, this paper proposed an alternative SDX development, SD-BROV, an SDX-based BGP Route Origin Validation mechanism that establishes a flexible route exchange scenario with RPKI validation. The validating application built in the SDN controller is capable of investigating received routing information. It aims to support hybrid SDN environments and help non-SDN BGP neighbors to get trusted routes and drop suspicious ones in transition. To verify proposed idea with emulated environment, the proof-of-concept development is deployed on an SDN testbed running over Research and Education Networks (RENs). During BGP hijacking experiment, the results show that developed SD-BROV is able to detect and stop legitimate traffic to be redirected by attacker, making approach to secure traffic forwarding on BGP routers.
APA, Harvard, Vancouver, ISO, and other styles
27

Anuntachai Machim, Murray John Lawn, and Ikuo Yamamoto. "Robotic Control by Teleoperation and Delay Time Issues Using the Internet." Proceedings of Engineering and Technology Innovation 14 (January 1, 2020): 01–08. http://dx.doi.org/10.46604/peti.2020.3931.

Full text
Abstract:
Internet usage has become an essential part of our daily lives, it has become universal. The aim of this research is to consider existing Internet-based networks with regard to their support for the remote operation of robotic technology, in particular, looking at transmission speed and delay time as it relates to teleoperation. Currently dedicated connections are typically used when a high Quality of Service (QoS) is required for mission critical services or safety-critical systems (SCS), however such connections are very expensive to set up and maintain. Therefore, this study focuses on modifying existing internet networks in a manner to provide a better QoS with little additional cost. Using a number of microcontrollers, computers, and routers, two different protocols were used to control a robotic device remotely. Use of the Point-to-Point Tunnelling Protocol (PPTP) used for implementing a Virtual Private Network (VPN) was found to provide higher average transmission speeds compared to the using a Uniform Resource Locator (URL) which is a regular internet connection.
APA, Harvard, Vancouver, ISO, and other styles
28

Alassery, Fawaz, and Maha M. Althobaiti. "Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things." International journal of Computer Networks & Communications 13, no. 1 (January 31, 2021): 107–27. http://dx.doi.org/10.5121/ijcnc.2021.13107.

Full text
Abstract:
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
APA, Harvard, Vancouver, ISO, and other styles
29

Hariyadi, I. Putu. "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP." Jurnal Matrik 16, no. 2 (July 26, 2017): 86. http://dx.doi.org/10.30812/matrik.v16i2.8.

Full text
Abstract:
STMIK Bumigora is the first computer college in the province of West Nusa Tenggara (NTB). There are 11 hotspots spread across the campus to provide Internet services through a wireless connection for the academic community. The increasing number of hotspots that must be managed with locations scattered in various Mikrotik routers hence make the process of management and monitoring hotspots become complex, ineffective and efficient. Centralized campus hotspot management using a transparent bridge EoIP over SSTP can help solve the problems at hand. Ethernet over IP (EoIP) Tunneling is a Mikrotik RouterOS protocol that creates an Ethernet tunnel between routers over IP connections. EoIP tunnel built on SSTP tunnel (EoIP over SSTP) with Site-to-Site type. SSTP is a new form of Virtual Private Network (VPN) tunnel that provides a mechanism for encapsulating Point-to-Point Protocol (PPP) traffic through the SSL path of the HTTPS protocol. The IP address of the SSTP interface is used as the local reference and remote address of the EoIP over SSTP tunnel. The application of bridging on EoIP interfaces and interfaces connected to Access Point devices forms a logical network so that the management and monitoring of hotspot services can be performed centrally on one router.
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Jia, Hongke Zhang, Huachun Zhou, and Hongbin Luo. "Optimizing content routers deployment in large-scale information centric core-edge separation Internet." International Journal of Communication Systems 27, no. 5 (June 6, 2013): 794–810. http://dx.doi.org/10.1002/dac.2580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yun, Jung Mee, and Dae Hwan Kim. "A Study on the Convergence Adaptor Using Plug Computer." Advanced Materials Research 462 (February 2012): 348–52. http://dx.doi.org/10.4028/www.scientific.net/amr.462.348.

Full text
Abstract:
Recent studies have shown that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. Therefore, it is extremely important to look for energy-efficient Internet applications and protocols. For EPON, research on the development of protocols for higher energy efficiency at the PHY/MAC layers and the enactment of standards, and the improvement of energy efficiency of EPON devices is being conducted, while for networking equipment such as routers and switches and IDCs, research on saving the energy consumed by devices and the management of energy efficiency using power monitoring, cooling devices and metering technologies is being conducted. Against this backdrop, this study is aimed to develop methodology for the improvement of network energy efficiency in existing home/ small and medium-sized office network environments and to develop, test and evaluate an energy saving prototype for Convergence Adaptor
APA, Harvard, Vancouver, ISO, and other styles
32

Yi, Ping, Ting Zhu, Bo Jiang, Ruofan Jin, and Bing Wang. "Deploying Energy Routers in an Energy Internet Based on Electric Vehicles." IEEE Transactions on Vehicular Technology 65, no. 6 (June 2016): 4714–25. http://dx.doi.org/10.1109/tvt.2016.2549269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Armanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.

Full text
Abstract:
ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover
APA, Harvard, Vancouver, ISO, and other styles
34

Ohara, Seiji, Ermioni Qafzezi, Admir Barolli, Shinji Sakamoto, Yi Liu, and Leonard Barolli. "WMN-PSODGA - An Intelligent Hybrid Simulation System for WMNs Considering Load Balancing." International Journal of Distributed Systems and Technologies 11, no. 4 (October 2020): 39–52. http://dx.doi.org/10.4018/ijdst.2020100103.

Full text
Abstract:
Wireless mesh networks (WMNs) are becoming an important networking infrastructure because they have many advantages, such as low cost and increased high-speed wireless Internet connectivity. In the authors' previous work, they implemented a hybrid simulation system based on particle swarm optimization (PSO) and distributed genetic algorithm (DGA), called WMN-PSODGA. Moreover, they added to the fitness function a new parameter for mesh router load balancing a number of covered mesh clients per router (NCMCpR). In this article, the authors consider Exponential, Weibull, and Normal distributions of mesh clients and carry out a comparison study. The simulation results show that the performance of the Exponential, Weibull and Normal distributions was improved by considering load balancing when using WMN-PSODGA. For the same number of mesh clients, the Normal distribution behaves better than the other distributions. This is because all mesh clients are covered by a smaller number of mesh routers and the standard deviation is improved by effectively using NCMCpR.
APA, Harvard, Vancouver, ISO, and other styles
35

Rathan, Karunya, and Susai Roslin. "Q-Learning and MADMM Optimization Algorithm Based Interference Aware Channel Assignment Strategy for Load Balancing in WMNS." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 32–41. http://dx.doi.org/10.22266/ijies2021.0228.04.

Full text
Abstract:
Wireless Mesh Networks (WMNs) have been considered one of the main technologies for configuring wireless machines since they appeared. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts on the network and allow access to the internet through the gateway routers. These wireless routers are normally equipped with the multiple radios in the wireless mesh network that operate on multiple channels with the multiple interference, which is caused to reduce the network performance and end-to-end delay. In this paper, we proposed an efficient optimization algorithm to solve the channel assignment problem which cause due to the multichannel multiradios in WMN’s. The main objective of our paper is to minimize the channel interference among networked devices. So, initially we construct a multicast tree with minimum interference by using Q-Learning algorithm, which is helps to minimize the end-to-end delay of packet delivery. From the constructed multicast tree, we intend to develop a channel assignment strategy with the minimum interference by using Modified version of Alternative Direction Method of Multipliers (MADMM) optimization algorithm, which is helps to increase the network throughput and packet delivery ratio. The proposed strategy was implemented by using NS-2 (Network Simulator-2) and the experimental result show that the performance of the proposed method is very high compared to the other method and the performance was calculated by using the feature metrics such as average throughput, packet delivery ratio, end-toend delay and total cost, which is compared with the other existing channel assignment strategies such as Learning Automata and Genetic Algorithm (LA-GA), GA-based approach, link-channel selection and rate-allocation (LCR) and learning automata based multicast routing (LAMR) channel assignment methods.
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Shao-Jui, Jing-Ying Huang, Cheng-Ta Huang, and Wei-Jen Wang. "SAMEVED." International Journal of Grid and High Performance Computing 5, no. 2 (April 2013): 27–42. http://dx.doi.org/10.4018/jghpc.2013040102.

Full text
Abstract:
Cloud computing is an emerging computing paradigm that provides all kinds of services through the Internet. Existing elastic computing approaches are popular in cloud computing. They can fulfill the requirements of some cloud applications, but usually fail to provide an isolated computing environment consisting of connected virtual machines over a user-defined network topology. This paper presents a system architecture, namely SAMEVED, which exposes a cloud service that can allocate and manage a private, virtual elastic datacenter by integrating VPN and virtual routers into existing virtualization technologies. Authentication is required by user login while using SAMEVED. A user-friendly web interface and remote invocation interface are provided to support different operations for different users with different privileges.
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Talib, S. A., B. M. Ali, S. Khatun, and S. Subramaniam. "Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast." Journal of Network and Computer Applications 30, no. 4 (November 2007): 1445–54. http://dx.doi.org/10.1016/j.jnca.2006.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Budijono, Santoso, and Robby Saleh. "Penggunaan Virtual Machine dalam Pembelajaran Jaringan." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 495. http://dx.doi.org/10.21512/comtech.v5i1.2643.

Full text
Abstract:
Computer Networks is an important course as a basis in computer science. This is because at this time all activities are associated with the use of network system or communication system. In the course of learning in Computer Networks, students are often difficult to understand network concepts, especially with many layman terms for students. The term IP, Subnet Mask, Gateway, and Router are the terms widely used in network. To better understand the use of the IP, Subnet Mask, Gateway, and Router, it should be given concrete examples of the application day-to-day. Such as setting the IP, Subnet, Gateway, and Router on a PC connected to the network, it is hoped that students can quickly understand. This prototype used some Virtual Machines considered to represent the need for the creation of multiple virtual machines in one computer. The resulting prototype is expected to be useful in learning the Networking matter in Computer Networks subject. Research successfully created 2 Virtual Machines in 1 computer, with the network in both Virtual Machines isolated and not connected to the Internet.
APA, Harvard, Vancouver, ISO, and other styles
39

Leguay, Jérémie, Matthieu Latapy, Timur Friedman, and Kavé Salamatian. "Describing and simulating internet routes." Computer Networks 51, no. 8 (June 2007): 2067–85. http://dx.doi.org/10.1016/j.comnet.2006.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Khaleghnasab, Rogayye, Karamollah Bagherifard, Samad Nejatian, Hamid Parvin, and Bahman Ravaei. "A New Energy-Efficient Multipath Routing in Internet of Things Based on Gray Theory." International Journal of Information Technology & Decision Making 19, no. 06 (October 22, 2020): 1581–617. http://dx.doi.org/10.1142/s0219622020500388.

Full text
Abstract:
Internet of Things (IoT) is a network of smart things. It indicates the ability that the mentioned physical things transfer information with each other. The characteristics of these networks, such as topology dynamicity and energy constraint, make the routing problem a challenging task in these networks. Traditional routing methods could not achieve the required performance in these networks. Therefore, developers of these networks have to consider specific routing methods in order to satisfy their requirements. One of the routing methods is utilization of the multipath protocols in which data are sent to its destination using multiple routes with separate links. One of such protocols is AOMDV routing protocol. In this paper, AOMDV is improved using gray system theory which chooses the best paths used for separate routes to send packets. To do this, Ad hoc On-demand Multipath Distance Vector (AOMDV) packet format is altered and some fields are added to it so that energy criteria, link expiration time, and signal-to-noise ratio can also be considered during selection of the best route. The proposed method named RMPGST-IoT is introduced which chooses the routes with highest rank for concurrent transmission of data, using a specific method based on the gray system theory. In order to evaluate the results, the proposed Routing Multipath based on Gray System Theory (RMPGST)-IoT method is compared to the Emergency Response IoT based on Global Information Decision (ERGID) and Ad hoc Delay-aware Distributed Routing Model (ADRM)-IoT approaches in terms of throughput, packet receiving rate, packet loss rate, average remaining energy, and network lifetime. The results demonstrate that the performance of the proposed RMPGST-IoT is superior to that of ERGID and ADRM-IoT approaches.
APA, Harvard, Vancouver, ISO, and other styles
41

Zheng, Bing, and Mohammed Atiquzzaman. "A framework to determine the optimal weight parameter of RED in next-generation Internet routers." International Journal of Communication Systems 21, no. 9 (September 2008): 987–1008. http://dx.doi.org/10.1002/dac.932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (June 1, 2017): 1347. http://dx.doi.org/10.11591/ijece.v7i3.pp1347-1354.

Full text
Abstract:
<p class="Abstract">To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet. To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite. Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. To get more smoothed throughput, intermediate nodes (like Routers. etc.) have to use suitable procedures in all real time situations. To eradicate the level of congestion in the network, we introduce enhanced Holt-Winters equations to RED queue management algorithm and applied to TFRC. The simulation results have shown that this strategy reduces packet loss and increases throughput.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Walkowiak, Krzysztof. "Anycasting in connection-oriented computer networks: Models, algorithms and results." International Journal of Applied Mathematics and Computer Science 20, no. 1 (March 1, 2010): 207–20. http://dx.doi.org/10.2478/v10006-010-0015-5.

Full text
Abstract:
Anycasting in connection-oriented computer networks: Models, algorithms and resultsOur discussion in this article centers around various issues related to the use of anycasting in connection-oriented computer networks. Anycast is defined as aone-to-one-of-manytransmission to deliver a packet to one of many hosts. Anycasting can be applied if the same content is replicated over many locations in the network. Examples of network techniques that apply anycasting are Content Delivery Networks (CDNs), Domain Name Service (DNS), Peer-to-Peer (P2P) systems. The role of anycasting is growing concurrently with the popularity of electronic music, movies, and other content required by Internet users. In this work we focus on the optimization of anycast flows in connection-oriented networks. We formulate a model of anycast connections and next propose a heuristic algorithm based on the Lagrangean relaxation aimed to optimize jointly routes for anycast and unicast connections. Results of numerical experiments are presented and evaluated. Finally, we analyze briefly problems related to anycasting in dynamic routing and multi-layer networks.
APA, Harvard, Vancouver, ISO, and other styles
44

Rusdan, Muchamad. "Design of Wireless Network System for Digital Village Using Wireless Distribution System." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 2 (May 30, 2019): 51–59. http://dx.doi.org/10.20895/inista.v1i2.66.

Full text
Abstract:
The purpose of this research is to create a wireless network design in Cijambe Village using WDS so that Cijambe Village can enjoy internet services through wireless networks, which can be used to find information, communication, and market products owned by village communities. A wireless network is one of the best alternatives in building a computer network that is practical and flexible and has high mobility. Most organizations use wireless networks to support existing cable networks, but in reality, the wireless network still uses Unshielded Twisted Pair (UTP) cable media as the backbone of Access Points (AP). Cijambe Village is a village located in Paseh District, Sumedang Regency. Cijambe village is divided into two hamlets, namely Cijambe Hamlet and Parugpug Hamlet. Cijambe village has an area of 357 hectares. The research method used in this study is a qualitative descriptive research method. The steps taken in this research are analysis and design. the conclusion is that wireless network design for digital villages using Wireless Distribution System (WDS) has a better degree of flexibility than the backbone that uses Unshielded Twisted Pair (UTP) cable. Radio wave signals from 19 AP units can reach the entire area of Cijambe Village which has an area of 357 hectares and is divided into 2 hamlets namely, Hamlet Cijambe and Parugpug Hamlet. The design made has thought of a standard level of security with routers and firewalls.
APA, Harvard, Vancouver, ISO, and other styles
45

Gai, Xinnan, Yali Wang, Renliang Chen, and Liang Zou. "Research on Hybrid Microgrid Based on Simultaneous AC and DC Distribution Network and Its Power Router." Energies 12, no. 6 (March 20, 2019): 1077. http://dx.doi.org/10.3390/en12061077.

Full text
Abstract:
Under the dual pressure of environmental pollution and energy crisis, the global energy consumption structure reform deepens unceasingly and the concept of energy internet has developed rapidly. The widespread volatility, randomness, and uncertainty of distributed new energy generation impose new requirements on distribution systems. The zigzag transformer is used as the coupling and isolating device for simultaneous AC–DC transmission. The basic principle and structure of simultaneous AC–DC power distribution network is analyzed. The topology structure of the simultaneous AC–DC hybrid microgrid and basic operating principle of the microgrid under different operating modes are proposed for the distributed power grid technology. Combined with power electronic technology, a modular multi-interface structure of power routers applied to AC–DC hybrid microgrid and its control strategy are proposed to realize the power routing control of microgrid and ensure reliable operation control of the microgrid. By building the model of simultaneous AC–DC hybrid microgrid and its power router, the rationality and effectiveness of the power router for microgrid routing control are verified.
APA, Harvard, Vancouver, ISO, and other styles
46

Sun, Rong Chun, Yan Piao, Yu Wang, and Han Wang. "Parking Guidance Control System Based on Internet of Things." Applied Mechanics and Materials 273 (January 2013): 641–45. http://dx.doi.org/10.4028/www.scientific.net/amm.273.641.

Full text
Abstract:
To help drivers to quickly find a spare parking, a parking guidance control system was proposed. The principle of ultrasonic ranging was used to detect the state of a parking space, and through the internet of things the parking detector transmits the real-time information to the control center. The control center mainly is an industrial computer and is responsible for dealing with the real-time information and sending the control command by internet of things. The guidance signs at each crossroad receive the wireless commands and execute them, by which the guidance function is performed. The internet of things was realized by ZigBee star network, in which the control center is a coordinator and other parts are routers or terminal equipments. The simulation experiment results show that the parking guidance system works well, and has the value of application and promotion to some extent.
APA, Harvard, Vancouver, ISO, and other styles
47

Hua, Haochen, Yuchao Qin, Hanxuan Xu, Chuantong Hao, and Junwei Cao. "Robust Control Method for DC Microgrids and Energy Routers to Improve Voltage Stability in Energy Internet." Energies 12, no. 9 (April 29, 2019): 1622. http://dx.doi.org/10.3390/en12091622.

Full text
Abstract:
The energy internet (EI) is a wide area power network that efficiently combines new energy technology and information technology, resulting in bidirectional on-demand power transmission and rational utilization of distributed energy resources (DERs). Since the stability of local network is a prerequisite for the normal operation of the entire EI, the direct current (DC) bus voltage stabilization for each individual DC microgrid (MG) is a core issue. In this paper, the dynamics of the EI system is modeled with a continuous stochastic system, which simultaneously considers related time-varying delays and norm-bounded modeling uncertainty. Meanwhile, the voltage stabilization issue is converted into a robust H ∞ control problem solved via a linear matrix inequality approach. To avoid the situation of over-control, constraints are set in controllers. The problem of finding a balance between voltage regulation performance and constraints for the controllers was also extensively investigated. Finally, the efficacy of the proposed methods is evaluated with numerical simulations.
APA, Harvard, Vancouver, ISO, and other styles
48

Azhar, Raesul. "Analisa Perbandingan Penerapan PBR Dan Non PBR Pada Protocol OSPF Untuk Koneksi Internet." Jurnal Matrik 15, no. 1 (July 26, 2017): 29. http://dx.doi.org/10.30812/matrik.v15i1.26.

Full text
Abstract:
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. Thestages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confiuring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffi transmission of data packets or internet traffi usage by users.
APA, Harvard, Vancouver, ISO, and other styles
49

Kadhim, Hanan K., and Ahmed A. Oglah. "Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM." Engineering and Technology Journal 39, no. 2A (February 25, 2021): 233–47. http://dx.doi.org/10.30684/etj.v39i2a.1799.

Full text
Abstract:
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs handling some problems including congestion. In this paper, the fuzzy-PID controller is used to control the nonlinear TCP / AQM model. This controller adjusts congestion of the computer network and commits controlled pressurized signaling features. Many experiments were carried out using different network parameter values, various queue sizes, and additional disturbances to verify the robustness and efficiency of the proposed controller. From all experiments carried out in the NS-2 simulator version (2.35), the results show the superiority of the FPID controller under different network traffic conditions.
APA, Harvard, Vancouver, ISO, and other styles
50

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (April 2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.

Full text
Abstract:
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography