scholarly journals Role of packet tracer in simulating server services on the client-server computer network

2020 ◽  
Vol 1511 ◽  
pp. 012007
Author(s):  
Ida Bagus Irawan Purnama
2019 ◽  
Author(s):  
Bayu Kurniawan

Computer network connection is a fundamental thing in a network because if a connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system used. This paper designs two designs, namely the design with a star topology from one server using Cisco Packet Tracer software and connecting networks between computers. The results of this study are the connection between computer networks. This study was conducted to find out whether the server and client computers can communicate with each other


2019 ◽  
Author(s):  
alfin aswar

A computer network is a system consisting of computers that are designed to be able to shareresources (printers, CPUs), communicate (telephones, short messages), and can accessinformation (websites). The purpose of a computer network is to be able to achieve itsobjectives, every part of a computer network can request and provide services (service). Inalmost all computer network applications Parties who request / receive services are calledclients (clients) and those who provide / send services are called servers ( server). This design iscalled a client-server system. Networks are divided into 2 types based on their transmissionmedia, namely: 1. wired network and 2. wireless network. Wired Network is a data transmissionmedium used in this network in the form of cables and wireless networks that do not use cableinstead of using electromagnetic waves as the main transmission media.


Author(s):  
Roman Maximov ◽  
Sergey Sokolovsky ◽  
Ivan Voronchikhin

The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2020 ◽  
Author(s):  
ADITYA WIRAGUNA ◽  
Tisa Seftiananda ◽  
Pandu Pratama Putra M.Kom

Computer network connection is a fundamental thing and is very important in the establishment of internet cafe businesses. LAN network design must also consider the cost budget so that the use of tools can be maximized and not cause losses. If the connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system to be used


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


Author(s):  
Kurniati Kurniati ◽  
Rahmat Novrianda Dasmen

PT. KAI Palembang is a branch of PT. Kereta Api Indonesia (KAI) Persero located in South Sumatra Province, where PT. KAI Persero is an Indonesian State-Owned Enterprise that organizes railway transportation which provide services including passenger and goods transportation. PT. KAI Palembang has a computer network connected to PT. KAI Persero central is located in Jakarta. Now, PT. KAI Palembang is trying to improve computer network security, where one of them is limiting the access of users who connected to PT. KAI Palembang computer network. This can be done by implementing Access Control Lists (ACLs) and Frame Relay on PT. KAI Palembang computer network. In this research used the Network Development Life Cycle (NDLC) method which has several stages, namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. This research method is used because the results of this research will be displayed in the Cisco packet tracer simulator. In addition, the results of this research were tested using a ping test between computers to show that the ACLs design had been running well.  


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


2013 ◽  
Vol 411-414 ◽  
pp. 729-732
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Computer network is one of the compulsory course for computer professional students, but students are boring for abstract network concepts, in order to improve the innovation of students, a virtual simulation tools named Packet Tracer is introduced into the classroom teaching, which can provide network simulation environment as real life with enough network equipment. This paper presents the configuration example of Open Shortest Path Firs Protocol, and proves the network connectivity simulation results, this is an efficient method for teaching and learning by visual emulator.


Sign in / Sign up

Export Citation Format

Share Document