Local Area Computer Networks

1986 ◽  
Vol 3 (10) ◽  
pp. 533-543
Author(s):  
A A Shamim
Keyword(s):  
2000 ◽  
Vol 37 (2) ◽  
pp. 157-166 ◽  
Author(s):  
T. Tuma ◽  
I. Fajfar ◽  
M. Perko ◽  
F. Bratkovič ◽  
J. Puhan

A new local area network (LAN) concept designed for educational purposes is proposed based upon the standard RS232 protocol. The concept enables students to gain hands-on experience of all seven open system interconnection (OSI) layers. The proposed approach to teaching computer networks has proved very popular with students. At the same time students' comprehension of basic OSI concepts has improved considerably.


1984 ◽  
Vol 21 (4) ◽  
Author(s):  
DonaldL. Iglehart ◽  
GeraldS. Shedler

2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


Sign in / Sign up

Export Citation Format

Share Document