Reliability, MTTF, and sensitivity evaluation of a computer network system connected in star topology

Author(s):  
Kuldeep Nagiya ◽  
Akshay Kumar ◽  
Mangey Ram ◽  
Adarsh Anand
2019 ◽  
Author(s):  
Bayu Kurniawan

Computer network connection is a fundamental thing in a network because if a connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system used. This paper designs two designs, namely the design with a star topology from one server using Cisco Packet Tracer software and connecting networks between computers. The results of this study are the connection between computer networks. This study was conducted to find out whether the server and client computers can communicate with each other


2020 ◽  
Vol 8 (2) ◽  
pp. 177
Author(s):  
Ni Putu Ega Meiliana Wijaya ◽  
I Komang Ari Mogi

Smart school is a technology-based school concept used in the teaching and learning process in the classroom. The use of educational technology includes an integrated system that assists the educational community in carrying out their respective functions with the aim of developing the potential of students. The use of technology in the field of education is expected to help and facilitate students and schools in conducting learning so that technology is able to facilitate and solve problems in learning. In building smart schools, it is also necessary to design technology developed in technology. The concept of network development that will be used is to use the Top-Down method and the topology used is to use ring topology and star topology. With the development of smart schools, it is expected that education using technology will continue to develop.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Author(s):  
Rendra Dwi Firmansyah ◽  
Esa Apriaskar ◽  
Tika Erna Putri

UAV formation is one of techology development in UAV world. The UAV formation can be utilized in various fields including agriculture, mapping and defense security (HANKAM). Communication is one of the important components in making UAV formations. To make UAV formations, position and direction data (AHRS) from each UAV will be sent to other UAVs so that when forming UAV formation, no collisions occur between UAVs. This study uses a star topology like the one on a computer network. This method involves two or more UAVs, both of which will exchange data. In this study the data sent is in the form of a dummy data package using the xbee module. The purpose of this study is the initial model of communication between UAVs which can later be developed into more complex communication models for many UAVs. The results obtained in the form of maximum communication distance between UAVs is 50m and the recommended optimal distance is 10-20m.


Author(s):  
G. Golovko ◽  
Ye. Chaika ◽  
M. Luchko

The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the enterprise Magnetic Corporation. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health.


2020 ◽  
Author(s):  
ADITYA WIRAGUNA ◽  
Tisa Seftiananda ◽  
Pandu Pratama Putra M.Kom

Computer network connection is a fundamental thing and is very important in the establishment of internet cafe businesses. LAN network design must also consider the cost budget so that the use of tools can be maximized and not cause losses. If the connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system to be used


2014 ◽  
Vol 1079-1080 ◽  
pp. 683-685
Author(s):  
Hong Jin Li

Computer network is a product of modern computer technology and communications technologies. Computer network management technology refers to the initialization operation and monitor operation of computer networks in the active state. Computer network management technology function is to collect the related information in the network system. This article will mainly focus on computer network management technology and its application to start on.


Sign in / Sign up

Export Citation Format

Share Document