Skip to main content
    • by 
    •   5  
      RoutersTcp/IpOSI layersKonfigurasi Dasar Cisco
En el presente documento, se muestran las configuraciones básicas en un router marca CISCO para la implementación de topologías de red. Además de una breve descripción y funcionamiento del simulador de redes CISCO PACKET TRACER.
    • by 
    •   5  
      RoutersRedesRedes informaticasPacket Tracer
–The Internet's exceptional scalability and sturdiness results in the formof end-to-end Internet crowding control. End-to-end crowding control algorithms are not responsible for preventingcrowdingdownfall and inequityproduced by... more
    • by 
    •   2  
      RoutersComputer Networks
Router merupakan alat yang penting di dunia internet. Dengan router, seorang network administrator jaringan dapat mengelola sebuah jaringan dengan dilengkapi dengan berbagai fitur seperti adanya fasilitas manajemen keamanan dan manajemen... more
    • by  and +1
    •   6  
      RoutersMikrotikSTT YBSI TasikmalayaKeamanan Jaringan
    • by 
    •   4  
      RoutersNetworkingWired NetworksTroubleshooting
menghubungkan 3 router dengan menggunakan kabel serial DTE dengan menambah module WIC-2T dan WIC-1T pada router, mengkonfigurasi Router RIP menggunakan CLI, Mengkonfigurasi Router menggunakan CLI, mengkonfigurasi Wireless Router,... more
    • by 
    •   24  
      RoutersDNSCiscowireless Local Area Networks
    • by 
    •   2  
      RoutersWiFI
Merupakan sebuah laporan yang berisikan tentang pembuatan sebuah jaringan dengan memanfaatkan network dan router, pembuatan serta pengujian kabel RJ-45 dan RS-232
    • by 
    •   2  
      RoutersPemasangan Kabel RJ45
With the shrinking technology, reduced scale and power-hungry chip IO leads to System on Chip. The design of SOC using traditional standard bus scheme encounters with issues like non-uniform delay and routing problems. Crossbars could... more
    • by 
    •   20  
      Vlsi DesignRoutersComputer NetworksElectronics
In comparison to earlier IEEE 802.11 standard (a/b/g/n) routers, today’s popular 802.11ac standard routers have enhanced security. However, 802.11ac router still has major security vulnerabilities. The novelty of this paper is that we not... more
    • by 
    •   4  
      Routers802.11acRouters Technology (Resource Control)Backdoors
os mikrotik dapat di install mellaui virtual box, dan feature yang ada dapat digunakan sepenuhnya tetapi mempunyai batas limit waktu yaitu 24 jam, dalam tutorial ini, akan diberikan cara pembuatan hostpot beserta pembagian bandwidth pada... more
    • by 
    •   6  
      RoutersMikrotikClient ServerHotSpot
Arbiters are a fundamental component in systems containing shared resources, and a centralized arbiter is a tightly integrated design for its input requests. In this study, we propose a new centralized arbiter, which may be used in... more
    • by 
    •   4  
      AlgorithmsRoutersDesigningArbiteration Law
    • by 
    •   5  
      RoutersWindowsMikrotikWinbox
Neste artigo é apresentada uma abordagem de cunho técnico e prático para a identificação da funcionalidade e aplicabilidade dos equipamentos de interconexão de redes mais relevantes no status atual da tecnologia (pontes, roteadores e... more
    • by 
    •   12  
      RoutersComputer NetworksInternet Routing ProtocolData Communication and Computer Networks
Network on chip (NOC) is used to connect Multiple Cores in a tiled multicore Processor. Here each core is connected to L1 cache where LLC (L2) is shared by the entire core. The data in the Last Level Cache slices can be accessed by... more
    • by 
    •   16  
      RoutersHealth Care Service Access and UtilizationProblem Based LearningHealth Care and Social Service Access and Utilization
    • by 
    • Routers
    • by 
    • Routers
    • by 
    •   6  
      RoutersComputer NetworksDebian (Linux)Proxy Servers
    • by 
    •   2  
      RoutersWiFI
    • by 
    •   14  
      Computer ScienceDistributed ComputingRoutersNetwork Security
    • by 
    •   46  
      MathematicsOperating SystemsComputer GraphicsObject Oriented Programming
    • by 
    •   2  
      RoutersWireless networks
Mikrotik router memang memiliki sangat banyak sekali fitur yang bisa admin katakan cukup lengkap. Setelah pada beberapa tulisan admin terdahulu, sudah membahas tentang konfigurasi jaringan menggunakan wireless. Pada pembahasan kali ini... more
    • by 
    •   3  
      RoutersMikrotikTutorial Mikrotik
Communication is the main motive in any Networks whether it is
    • by 
    •   10  
      Computer ScienceDistributed ComputingRoutersWireless Sensor Networks
Konfigurasi Router
Konfigurasi RUNNING RIPv1
    • by 
    •   6  
      RoutersKonfigurasi Routerrouter running RIPv1Konfigurasi Jaringan Router
    • by 
    •   6  
      RoutersSoftwareHardwareManuales
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an... more
    • by 
    •   3  
      Formal Methods (Formal Verification)RoutersConfiguration Management
    • by 
    •   9  
      Computer ScienceRoutersComputer EngineeringFacial Recognition
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi... more
    • by 
    •   2  
      RoutersLinux
In a defined point of view is to the Adoch On-Demand Distance Vector (AODV) is known as routing protocol utilizing a network simulator 2 (ns2). It uses the two AODV routing parameters, one is the HELLO message and another is local route... more
    • by 
    •   2  
      RoutersREPAIRS
    • by 
    •   7  
      RoutersSQL SERVERLinux (Ubuntu)Linux Servers & VPS Servers
This paper explores some challenges of supervising clinical work of trainees, known as 'routers', who live in countries with diverse cultural, social and political traditions, and the analysts who travel to supervise them. It is written... more
    • by 
    •   2  
      RoutersClinical Supervision
    • by  and +1
    •   3  
      RoutersComputer NetworksInternet Traffic Classification
Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are... more
    • by 
    •   3  
      AlgorithmsRoutersClash of Clans Hack Password
Password authentication is the main means of access control on network routers, and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum... more
    • by 
    •   3  
      RoutersPasswordClash of Clans Hack Password
    • by 
    •   3  
      RoutersInformationBandwidth
Rapid Application Development (RAD) enables ever expanding needs for speedy development of computer application programs that are sophisticated, reliable, and full-featured. Visual Basic was the first RAD tool for the Windows operating... more
    • by 
    •   4  
      RoutersVisual Basic 6.0CDROM VRML CHIME biochemistry VR virtualreality cosmoworlds cosmoplayerInterpolator filter
Improvements to router reliability using the generalized algorithm of fault tolerance (GAFT) are presented using time, structure and information types of redundancy. Router functionality and options to tolerate faults are discussed and... more
    • by 
    •   4  
      Fault Tolerant ComputingRoutersReliability EngineeringGeneralized Algorithm of Fault Tolerance
Improvements to router reliability using the generalized algorithm of fault tolerance (GAFT) are presented using time, structure and information types of redundancy. Router functionality and options to tolerate faults are discussed and... more
    • by 
    •   6  
      RoutersNetworkingFault ToleranceReliability
    • by 
    •   2  
      RoutersWiFI
Mountain marathon has attracted much attention and love, and its development is changing with each passing day. There is an urgent need for new methods and theories of marathon route development and design. For the safety of participants,... more
    • by 
    •   3  
      RoutersRunningMarathon
Mikrotik Sebagai gateway LAN, artinya memposisikan perangkat Mikrotik Router diantara jaringan Publik (Internet) dan Jaringan Lokal (LAN). Konfigurasi ini adalah konfigurasi yang harus anda lakukan pertama kali (konfigurasi dasar) sebelum... more
    • by 
    •   3  
      RoutersMikrotikTutorial Mikrotik
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the... more
    • by 
    •   6  
      RoutersPacket SwitchingDynamic Traffic AssignmentTraffic Classes
This work was able to integrate Internet of Things expertise on Principal Count Analysis (PCA) algorithm for facial recognition optimization. An internet-based real-time facial recognition system was developed using PCA algorithm that can... more
    • by 
    •   7  
      RoutersFacial RecognitionReal Time ComputingMatlab
This research paper describes the about of social network for various fields. Social networking is the grouping of individuals into specific groups. Social networking is possible in person, especially in the workplace, universities,... more
    • by 
    •   6  
      RoutersMicrosoft Visual StudioDatabaseInternet Information Services (IIS) management
This study proposes a new router architecture to improve the performance of dynamic allocation of virtual channels. The proposed router is designed to reduce the hardware complexity and to improve power and area consumption,... more
    • by 
    •   11  
      Dynamical SystemsRoutersComputational Fluid DynamicsStructural Dynamics
    • by  and +1
    •   3  
      RoutersComputer NetworksInternet Traffic Classification
    • by 
    •   5  
      RoutersComputer NetworksPerformanceNetwork
Seiring semakin berkembangnya sistem operasi dan perangkat lunak komputer sekarang ini, maka berkembang pula perangkat keras komputer yang dibutuhkan untuk kebutuhan tersebut. Komputer-komputer lama yang tidak mendukung sistem operasi... more
    • by 
    •   2  
      RoutersLinux
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths... more
    • by 
    •   5  
      RoutersWireless Mesh NetworksHeuristic algorithmMBPSO