Skip to main content

Showing 1–3 of 3 results for author: Abro, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.14074  [pdf

    cs.NI cs.CY cs.PF

    Design And Develop Network Storage Virtualization By Using GNS3

    Authors: Abdul Ahad Abro, Ufaque Shaikh

    Abstract: Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness sectors utilized the concept of virtualization to reduce the cost of frameworks. In this paper, we have designed and developed storage virtualization for physical functional solutions. It is an auspicious type of virtualization that is accessibl… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: Journal of Information & Communication Technology - JICT Vol. 13 Issue. 1

  2. arXiv:1804.06691  [pdf

    cs.NI

    Modelling Evaluation of MPLS using Physical and virtual Network on GNS3

    Authors: Abdul Ahad Abro, Abdul Basit Abro, Mehvish Abro, Asad Aslam Siddique

    Abstract: The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems. Virtualization of the network could easily be assuring the network performance and virtual network… ▽ More

    Submitted 18 April, 2018; originally announced April 2018.

    Comments: conference ICETAS 2017 -- Strongly Recommended

  3. arXiv:1612.07685  [pdf

    cs.CR cs.NI

    Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA)

    Authors: Abdul Ahad Abro, Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani

    Abstract: The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the a… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Journal ref: Sindh Univ. Res. Jour. (Sci. Ser.) Vol. 48 (4D) 01-04 (2016)