{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:19:14Z","timestamp":1730215154933,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166444","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:31:59Z","timestamp":1512671519000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["DMVPN simulation in GNS3 network simulation software"],"prefix":"10.1109","author":[{"given":"N.","family":"Angelescu","sequence":"first","affiliation":[]},{"given":"D. C.","family":"Puchianu","sequence":"additional","affiliation":[]},{"given":"G.","family":"Predusca","sequence":"additional","affiliation":[]},{"given":"L. D.","family":"Circiumarescu","sequence":"additional","affiliation":[]},{"given":"G.","family":"Movila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"4271 A Border Gateway Protocol 4 (BGP-4)","year":"0","key":"ref4"},{"journal-title":"Cisco Systems Enhanced Interior Gateway Routing Protocol (EIGRP) Informational RFC Frequently Asked Questions","year":"2013","key":"ref3"},{"key":"ref10","first-page":"109","article-title":"A method for implementing, simulating and analyzing a Voice over Internet Protocol Network","author":"enache","year":"2015","journal-title":"The 6th International Conference on Modern Power Systems - MPS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICBMEI.2011.5916984"},{"key":"ref11","first-page":"49","article-title":"A survey on the use of GNS3 for virtualizing computer networks","volume":"5","author":"dayanand lal","year":"2016","journal-title":"International Journal of Computer Science and Engineering (IJCSE)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2009.5196156"},{"journal-title":"GNS3 network simulator software","year":"0","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/b19094-212"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015905249"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2328"},{"key":"ref9","first-page":"361","article-title":"Analytical performance and evaluation of the scalability of layer 3 tunneling protocols: case of voice traffic over IP","volume":"17","author":"bensalah","year":"2017","journal-title":"IJCNS International Journal of computer science and network security"},{"journal-title":"Dynamic Multipoint IPsec VPN s (U sing Multipoint GRE\/NHRP to Scale IPsec VPNs)","year":"0","key":"ref1"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166444.pdf?arnumber=8166444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:53:49Z","timestamp":1516038829000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8166444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166444","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}