Routers Research Papers - Academia.edu (original) (raw)
En el presente documento, se muestran las configuraciones básicas en un router marca CISCO para la implementación de topologías de red. Además de una breve descripción y funcionamiento del simulador de redes CISCO PACKET TRACER.
–The Internet's exceptional scalability and sturdiness results in the formof end-to-end Internet crowding control. End-to-end crowding control algorithms are not responsible for preventingcrowdingdownfall and inequityproduced by... more
–The Internet's exceptional scalability and sturdiness results in the formof end-to-end Internet crowding control. End-to-end crowding control algorithms are not responsible for preventingcrowdingdownfall and inequityproduced by applications that are impassive to network crowding. To overcome these, we have proposed a newcrowding-avoidance tool called Congestion Free Router (CFR). CFR involves the give-and-take of response between routers at the boundaries of a network in order to sense and curbimpassive traffic flow before they enter the network, thereby preventing crowding within the network.
Router merupakan alat yang penting di dunia internet. Dengan router, seorang network administrator jaringan dapat mengelola sebuah jaringan dengan dilengkapi dengan berbagai fitur seperti adanya fasilitas manajemen keamanan dan manajemen... more
Router merupakan alat yang penting di dunia internet. Dengan router, seorang network administrator jaringan dapat mengelola sebuah jaringan dengan dilengkapi dengan berbagai fitur seperti adanya fasilitas manajemen keamanan dan manajemen penggunaan bandwidth. Namun dalam penerapannya, router seringkali terkendala dengan beberapa masalah diantaranya tidak adanya seorang yang ahli dalam konfigurasi router ataupun tidak adanya anggaran biaya untuk menggandakan peralatan jaringan seperti router tersebut. Berdasarkan hal tersebut, penulis menemukan sebuah aplikasi yang mempunyai kegunaan hampir sama dan dapat digunakan dalam mengelola sebuah jaringan yaitu aplikasi myhotspot. Penelitian ini dimaksudkan untuk mengetahui perbandingan kinerja antara sebuah perangkat router yaitu sebuah router mikrotik berbasis sistem operasi dengan aplikasi myhotspot dari berbagai aspek dan manfaat. Penelitian ini dilakukan dengan menguji dan mensimulasikan sistem mikrotik dan aplikasi myhotspot sehingga dapat diperoleh performa dan kinerja dari masing-masing sistem tersebut. Setelah melakukan beberapa percobaan dengan menjalankan fitur-fitur yang ada dalam router mikrotik dan aplikasi myhotspot, maka diperoleh kesimpulan bahwa perangkat router merupakan alat yang bagi seorang network administrator dalam mengelola sebuah jaringan dengan berbagai fitur dan keunggulan yang cukup lengkap, namun disamping perangkat router tersebut, aplikasi myhotspot merupakan terobosan bagi seorang yang masih awam dalam jaringan komputer untuk dapat mengelola sebuah jaringan secara mudah dan cepat dengan tidak mengabaikan pula aspek keamanan dan kehandalan.
- by Deni Kurnia and +1
- •
- Routers, Mikrotik, STT YBSI Tasikmalaya, Keamanan Jaringan
menghubungkan 3 router dengan menggunakan kabel serial DTE dengan menambah module WIC-2T dan WIC-1T pada router, mengkonfigurasi Router RIP menggunakan CLI, Mengkonfigurasi Router menggunakan CLI, mengkonfigurasi Wireless Router,... more
menghubungkan 3 router dengan menggunakan kabel serial DTE dengan menambah module WIC-2T dan WIC-1T pada router, mengkonfigurasi Router RIP menggunakan CLI, Mengkonfigurasi Router menggunakan CLI, mengkonfigurasi Wireless Router, mengkonfigurasi DNS dan DHCP.
- by Wahyudi Rahmat
- •
- Routers, WiFI
Merupakan sebuah laporan yang berisikan tentang pembuatan sebuah jaringan dengan memanfaatkan network dan router, pembuatan serta pengujian kabel RJ-45 dan RS-232
With the shrinking technology, reduced scale and power-hungry chip IO leads to System on Chip. The design of SOC using traditional standard bus scheme encounters with issues like non-uniform delay and routing problems. Crossbars could... more
With the shrinking technology, reduced scale and power-hungry chip IO leads to System on Chip. The design of SOC using traditional standard bus scheme encounters with issues like non-uniform delay and routing problems. Crossbars could scale better when compared to buses but tend to become huge with increasing number of nodes. NOC has become the design paradigm for SOC design for its highly regularized interconnect structure, good scalability and linear design effort. The main components of an NoC topology are the network adapters, routing nodes, and network interconnect links. This paper mainly deals with the implementation of full custom SRAM based arrays over D FF based register arrays in the design of input module of routing node in 2D mesh NOC topology. The custom SRAM blocks replace D FF(D flip flop) memory implementations to optimize area and power of the input block. Full custom design of SRAMs has been carried out by MILKYWAY, while physical implementation of the input module with SRAMs has been carried out by IC Compiler of SYNOPSYS.The improved design occupies approximately 30% of the area of the original design. This is in conformity to the ratio of the area of an SRAM cell to the area of a D flip flop, which is approximately 6:28.The power consumption is almost halved to 1.5 mW. Maximum operating frequency is improved from 50 MHz to 200 MHz. It is intended to study and quantify the behavior of the single packet array design in relation to the multiple packet array design. Intuitively, a common packet buffer would result in better utilization of available buffer space. This in turn would translate into lower delays in transmission. A MATLAB model is used to show quantitatively how performance is improved in a common packet array design.
In comparison to earlier IEEE 802.11 standard (a/b/g/n) routers, today’s popular 802.11ac standard routers have enhanced security. However, 802.11ac router still has major security vulnerabilities. The novelty of this paper is that we not... more
In comparison to earlier IEEE 802.11 standard (a/b/g/n) routers, today’s popular 802.11ac standard routers have enhanced security. However, 802.11ac router still has major security vulnerabilities. The novelty of this paper is that we not only highlight multiple security vulnerabilities in 802.11ac router technologies that still have not been secured since the earlier standards, but also present some new ideas with solutions. We believe that our line of thoughts on security vulnerabilities, gaps, and on new solutions will provide network security researchers, router manufacturers and network administrators with new disclosures to redesign even better security mechanisms in routers to counter attacks on networks via routers.
os mikrotik dapat di install mellaui virtual box, dan feature yang ada dapat digunakan sepenuhnya tetapi mempunyai batas limit waktu yaitu 24 jam, dalam tutorial ini, akan diberikan cara pembuatan hostpot beserta pembagian bandwidth pada... more
os mikrotik dapat di install mellaui virtual box, dan feature yang ada dapat digunakan sepenuhnya tetapi mempunyai batas limit waktu yaitu 24 jam, dalam tutorial ini, akan diberikan cara pembuatan hostpot beserta pembagian bandwidth pada mikrotik
- by dian kurnia
- •
- Routers, Mikrotik, Client Server, HotSpot
Arbiters are a fundamental component in systems containing shared resources, and a centralized arbiter is a tightly integrated design for its input requests. In this study, we propose a new centralized arbiter, which may be used in... more
Arbiters are a fundamental component in systems containing shared resources, and a centralized arbiter is a tightly integrated design for its input requests. In this study, we propose a new centralized arbiter, which may be used in arbitration of a crossbar switch in NoC routers. As fabrication technology continues to improve, smaller feature sizes allow increasingly more integration of system components onto a single die. Communication between these components can become the limiting factor for performance unless embodying the correct scheduling algorithm. In this paper, we design iSLIP arbiter using iSLIP scheduling algorithm with mesh router for NoC. An iterative, round-robin algorithm, iSLIP can achieve 100% throughput for uniform traffic, yet is simple to implement in hardware. Prototype and commercial implementations of iSLIP exist in systems with aggregate bandwidths ranging from 50 to 500 Gb/s. When the traffic is nonuniform, iSLIP quickly adapts to a fair scheduling policy that is guaranteed never to starve an input queue. This new arbiter is fair for any input combinations and faster & it is designed using ModelSimSE 6.3f for simulation of code and xilinx for synthesis.
- by Faizal Kusmawan
- •
- Routers, Windows, Mikrotik, Winbox
Neste artigo é apresentada uma abordagem de cunho técnico e prático para a identificação da funcionalidade e aplicabilidade dos equipamentos de interconexão de redes mais relevantes no status atual da tecnologia (pontes, roteadores e... more
Neste artigo é apresentada uma abordagem de cunho técnico e prático para a identificação da funcionalidade e aplicabilidade dos equipamentos de interconexão de redes mais relevantes no status atual da tecnologia (pontes, roteadores e comportas) visando sua utilização nas redes de empresas e instituições.
Network on chip (NOC) is used to connect Multiple Cores in a tiled multicore Processor. Here each core is connected to L1 cache where LLC (L2) is shared by the entire core. The data in the Last Level Cache slices can be accessed by... more
Network on chip (NOC) is used to connect Multiple Cores in a tiled multicore Processor. Here each core is connected to L1 cache where LLC (L2) is shared by the entire core. The data in the Last Level Cache slices can be accessed by multiple cores simultaneously and results in congestion at the LLC and increases the access time .So in order to find a solution to this problem, Propose a congestion management Technique in the LLC that contains NOC Router with small storage (Router Buffer Cache) to keep a copy of heavily shared cache blocks. The simulation of the Multicore system can be done by Gem5 tool and evaluate its effectiveness by running a set of parallel benchmarks , Thereby Reducing the LLC access Time "
- by Wahyudi Rahmat
- •
- Routers, WiFI
Mikrotik router memang memiliki sangat banyak sekali fitur yang bisa admin katakan cukup lengkap. Setelah pada beberapa tulisan admin terdahulu, sudah membahas tentang konfigurasi jaringan menggunakan wireless. Pada pembahasan kali ini... more
Mikrotik router memang memiliki sangat banyak sekali fitur yang bisa admin katakan cukup lengkap. Setelah pada beberapa tulisan admin terdahulu, sudah membahas tentang konfigurasi jaringan menggunakan wireless. Pada pembahasan kali ini admin akan membahas tentang konfigurasi hotspot gateway.
Pada kenyataannya dilapangan hotspot gateway ini sangat banyak dimanfaatkan oleh hotel, perpusatakaan, kafe, atau bahkan warung kopi yang ada dipinggir jalan sekalipun. Pasti anda bertanya bukankah sudah sangat cukup kita melakukan konfigurasi keamanan dari modem saja, cukup kita ganti setiap berapa minggu sekali maka itu akan menyelessaikan masalah.
Communication is the main motive in any Networks whether it is
Konfigurasi Router
Konfigurasi RUNNING RIPv1
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an... more
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an information model. We propose in this paper a model for validation based on XML schema trees. By using an existing logical formalism called TQL, we express important dependencies between parameters that appear in those information models, and automatically check these dependencies on sample XML trees in reasonable time. We illustrate our claim by showing different rules and an example of validation on a Virtual Private Network.
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi... more
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi yang baru pun akhirnya terabaikan dan tidak digunakan. Namun komputer-komputer tersebut dapat dipergunakan kembali sebagai router. Linux Freesco adalah salah satu aplikasi router yang dapat digunakan sebagai alternatif pembuatan router yang berbasiskan komputer 386 dengan menggunakan resource yang kecil tetapi mempunyai kemampuan yang powerfull sebagai router. Linux Freesco merupakan sebuah proyek open source yang mengijinkan penggunanya untuk dapat mendistribusikan kembali dan memodifikasinya secara bebas tanpa harus membayar lisensi. Walaupun berbasis teks namun Linux Freesco dirancang untuk memudahkan penggunanya dimana semua perintah yang ada pada Linux Freesco dibuat secara interaktif. Penelitian ini mengimplementasikan Linux Freesco sebagai rout...
- by Aril Apria Susanto
- •
- Routers, Linux
In a defined point of view is to the Adoch On-Demand Distance Vector (AODV) is known as routing protocol utilizing a network simulator 2 (ns2). It uses the two AODV routing parameters, one is the HELLO message and another is local route... more
In a defined point of view is to the Adoch On-Demand Distance Vector (AODV) is known as routing protocol utilizing
a network simulator 2 (ns2). It uses the two AODV routing parameters, one is the HELLO message and another is local route
fix, the more adaptable proposition on these two significant parameters, rather than the set setting inside the default AODV. Hi
message is utilized to distinguish the connection which is broken, while the other neighborhood route fix in AODV is utilized to
retouch and discover the which is the elective route inside the occasion of route failure. Here, there are two parameters to
streamline AODV execution are used.
This paper explores some challenges of supervising clinical work of trainees, known as 'routers', who live in countries with diverse cultural, social and political traditions, and the analysts who travel to supervise them. It is written... more
This paper explores some challenges of supervising clinical work of trainees, known as 'routers', who live in countries with diverse cultural, social and political traditions, and the analysts who travel to supervise them. It is written as an evolving dialogue between the authors, who explore together the effects of their own culture of origin, and in particular the legacy and values of their own training institutes on the styles and models of analytic supervision. Their dialogue is framed around the meaning of home and experiences of homesickness for analysts working away from home in an interactive field of strangeness in countries where analytical psychology is a relatively new discipline. The authors outline the findings from their own qualitative survey, where other supervisors working abroad, and those they have supervised, describe their experiences and their encounters with difference. The dialogue ends with both authors discussing what they have learned about teaching and supervising abroad, the implications for more flexible use of Jungian concepts, and how such visits have changed their clinical practice in their home countries.
- by Mateo Cortes and +1
- •
- Routers, Computer Networks, Internet Traffic Classification
Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are... more
Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.
Password authentication is the main means of access control on network routers, and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum... more
Password authentication is the main means of access control on network routers, and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password, how widely the manufacturers themselves are adhering to the minimum standards, and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default passwords have been analyzed and documented from such a large variety of router models to reveal password strengths or weaknesses against brute-force attacks. Firstly, individual default router password of each model was collected, tabulated, and tested using password strength meter for entropy. Then, descriptive statistical analysis was performed on the tabulated data. The analysis revealed quantitatively how strong or weak default passwords are against brute-force attacks. The results of this research give router security researchers, router manufacturers, router administrators a useful guide on the strengths and weaknesses of passwords that follow similar patterns.
Rapid Application Development (RAD) enables ever expanding needs for speedy development of computer application programs that are sophisticated, reliable, and full-featured. Visual Basic was the first RAD tool for the Windows operating... more
Rapid Application Development (RAD) enables ever expanding needs for speedy development of computer application programs that are sophisticated, reliable, and full-featured. Visual Basic was the first RAD tool for the Windows operating system, and too many people say still it is the best. To provide very good attraction in visual basic 6 applications, this paper directing to use VRML scenes over the visual basic environment.
Improvements to router reliability using the generalized algorithm of fault tolerance (GAFT) are presented using time, structure and information types of redundancy. Router functionality and options to tolerate faults are discussed and... more
Improvements to router reliability using the generalized algorithm of fault tolerance (GAFT) are presented using time, structure and information types of redundancy. Router functionality and options to tolerate faults are discussed and analysed. Separation of toleration of malfunction and permanent faults is discussed in terms of their impact on system reliability. A scheme of reliability improvement for router is proposed using system software recovery pointswith brief explanation of their implementation.
Improvements to router reliability using the generalized algorithm of fault tolerance (GAFT) are presented using time, structure and information types of redundancy. Router functionality and options to tolerate faults are discussed and... more
- by Wahyudi Rahmat
- •
- Routers, WiFI
Mountain marathon has attracted much attention and love, and its development is changing with each passing day. There is an urgent need for new methods and theories of marathon route development and design. For the safety of participants,... more
Mountain marathon has attracted much attention and love, and its development is changing with each passing day. There is an urgent need for new methods and theories of marathon route development and design. For the safety of participants, the marathon route design needs to meet the requirements of slope and distance. This paper proposes the theory and method of marathon route design, which is embodied as a 5-step design method (downhill trajectory slope of equidistant points, interactive point layout, close route, route check, route adjustment), and further designs the interactive route design program. And a specific example is provided in the text. The 5-step design method and the compiled program have good operability and can complete the design of the marathon route very well. It has an excellent guiding value for the development and design of future marathon routes and can also be used to check the completed marathon routes.
- by Jichao Sun
- •
- Routers, Running, Marathon
Mikrotik Sebagai gateway LAN, artinya memposisikan perangkat Mikrotik Router diantara jaringan Publik (Internet) dan Jaringan Lokal (LAN). Konfigurasi ini adalah konfigurasi yang harus anda lakukan pertama kali (konfigurasi dasar) sebelum... more
Mikrotik Sebagai gateway LAN, artinya memposisikan perangkat Mikrotik Router diantara jaringan Publik (Internet) dan Jaringan Lokal (LAN). Konfigurasi ini adalah konfigurasi yang harus anda lakukan pertama kali (konfigurasi dasar) sebelum melakukan konfigurasi - konfigurasi yang lainnya. Paper ini dapat anda download dan sebarkan secara gratis, untuk mendapatkan file dalam bentuk dokumen ataupun pdf silahkan kunjungi laman https://bit.ly/mikrotikroutergateway.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the... more
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
This work was able to integrate Internet of Things expertise on Principal Count Analysis (PCA) algorithm for facial recognition optimization. An internet-based real-time facial recognition system was developed using PCA algorithm that can... more
This work was able to integrate Internet of Things expertise on Principal Count Analysis (PCA) algorithm for facial recognition optimization. An internet-based real-time facial recognition system was developed using PCA algorithm that can detect and track faces, a label name that indicates the face identified was also incorporated to easily track the face in situations where multiple faces are identified at the same time. A router was used to set up a wireless connection with an internet protocol (IP)-camera via the IP-camera firmware. As the router broadcast this connection, a link is set up with a personal computer through the network and sharing centre tab on the computer system, thereby creating a wireless connection between the computer and the camera on the internet. Graphical interface designed on MATLAB was used to access the feed from the camera which PCA algorithm explored in detecting and tracking faces in real-time. Security features such as timestamp and database were also integrated with the system developed.
This research paper describes the about of social network for various fields. Social networking is the grouping of individuals into specific groups. Social networking is possible in person, especially in the workplace, universities,... more
This research paper describes the about of social
network for various fields. Social networking is the grouping of
individuals into specific groups. Social networking is possible in
person, especially in the workplace, universities, and high
schools, it is most popular online. When it comes to online social
networking, websites are commonly used. Social networking
websites function like an online community of internet users. In
this social network; it was implemented with many aspects and
features of what makes up the majority of today's social networks
or online communities. The goal is to implement the creation of a
community in a scalable fashion. The objectives of our social
network is to build a Social Network for staffs and students with
common features such as direct messaging, download link,
posting, etc.
This study proposes a new router architecture to improve the performance of dynamic allocation of virtual channels. The proposed router is designed to reduce the hardware complexity and to improve power and area consumption,... more
This study proposes a new router architecture to improve the performance of dynamic allocation of virtual
channels. The proposed router is designed to reduce the hardware complexity and to improve power and
area consumption, simultaneously. In the new structure of the proposed router, all of the controlling
components have been implemented sequentially inside the allocator router modules. This optimizes
communications between the controlling components and eliminates the most of hardware overloads of
modular communications. Eliminating additional communications also reduces the hardware complexity.
In order to show the validity of the proposed design in real hardware resources, the proposed router has
been implemented onto a Field-Programmable Gate Array (FPGA). Since the implementation of a
Network-on-Chip (NoC) requires certain amount of area on the chip, the suggested approach is also able
to reduce the demand of hardware resources. In this method, the internal memory of the FPGA is used for
implementing control units. This memory is faster and can be used with specific patterns. The use of the
FPGA memory saves the hardware resources and allows the implementation of NoC based FPGA.
- by Ruken Zilan and +1
- •
- Routers, Computer Networks, Internet Traffic Classification
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi... more
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi yang baru pun akhirnya terabaikan dan tidak digunakan. Namun komputer-komputer tersebut dapat dipergunakan kembali sebagai router. Linux Freesco adalah salah satu aplikasi router yang dapat digunakan sebagai alternatif pembuatan router yang berbasiskan komputer 386 dengan menggunakan resource yang kecil tetapi mempunyai kemampuan yang powerfull sebagai router. Linux Freesco merupakan sebuah proyek open source yang mengijinkan penggunanya untuk dapat mendistribusikan kembali dan memodifikasinya secara bebas tanpa harus membayar lisensi. Walaupun berbasis teks namun Linux Freesco dirancang untuk memudahkan penggunanya dimana semua perintah yang ada pada Linux Freesco dibuat secara interaktif. Tugas akhir ini mengimplementasikan Linux Freesco sebagai rout...
- by Aril Apria Susanto
- •
- Routers, Linux
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths... more
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths among nodes such as PDR, E2E delay and throughput. This study summarized different types of previous heuristic algorithms in order to adapt with proper algorithm that could solve the issue. Therefore, the main objective of this study is to determine the proper methods, approaches or algorithms that should be adapted to improve the throughput. A Modified Binary Particle Swarm Optimization (MBPSO) approach was adapted to improvements the throughput. Finally, the finding shows that throughput increased by 5.79% from the previous study. Keyword: Heuristic algorithm MBPSO Minimize cost of distance Routers Wireless mesh networks