Infrared wireless system for local area network and data communication

Author(s):  
M.J. Betancor ◽  
A. Santamaria ◽  
F.J. Gabiola ◽  
A. Polo ◽  
J. Martin-Bernardo ◽  
...  
Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2013 ◽  
Vol 468 ◽  
pp. 141-144
Author(s):  
Su Hua Chen ◽  
Yong Guang Liu ◽  
Xu Fang

Smart home system mainly consists of home networking, wireless local area network and external network, and with the advantages of low cost and high reliability, Zigbee wireless technology is the right choice for smart home system and the main part of home networking. The design of smart home system based on Zigbee is proposed, the Zigbeethe design process of the systemintelligent socket and data communication rule are elaborated. The system has been applied in smart community of Shaoxing Electric Power Bureau, which has good performances, high availability and reliability, better market prospects.


Author(s):  
Miroslav Škoric

Computer programs that radio amateurs use in their packet radio networks give various opportunities in simulating real data communication systems. Such systems include radio-relay networks of digital repeaters that operate in cities or in rural and remote locations, email servers that handle amateur radio messaging and file exchange, and a variety of end-user stations at home or work. This chapter summarizes the results of recent experiments in network simulations by using amateur radio software in a local area network. We tested the main features of those amateur radio programs and their repercussions to the functionality of simulated networks and to the comfort and satisfaction in average network participants. Described tests help practitioners, students, and teachers in computer science and communication technologies, in implementing amateur radio within the existing computer networks and in planning and using telecommunication systems without making any investment in hardware infrastructure.


2020 ◽  
Vol 8 (2) ◽  
pp. 159
Author(s):  
A'la Syauqi ◽  
Permata Rahmatul Hijjah

Computer games have been used as educational media or popularly named as educational games. However, most educational computer games that have been created can be played by one player. This study aims to build a multiplayer ladder and snake educational game focused on the server program as a moderator that handles players, player groups, and data traffic during the game is running. The game is built on Java socket programming and local area network (LAN) as a data communication medium between players. Whereas to handle the username and socket address of the whole player, the hash map data structure is used. A vector data structure is also used to manage data package sending for each player group. The experiment shows that the system works properly where the computer server’s performance is influenced by the specifications, especially the processor and random-access memory (RAM).


Bina Teknika ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. 73
Author(s):  
Qisthi Alhazmi Hidayaturrohman ◽  
Prasetyo Yuliantoro ◽  
Reda Rizal

The internet of things technology has become one technology that plays a role in the industrial revolution 4.0. Not only limited to the data communication between devices over internet protocol communication data networks, but on the IoT device is also need the proper interface to visualize the sensor data which has received by the server node, and with that result, the user can understand easily and get insight from those data which has an exchange or communicate each other on the system. In the previous research by Yuliantoro, et. al., the IoT device was designed only to communicate to other devices, where the web server as a server node was designed to receive the sensor data. The design of the visualize system in this research, designed by the PHP script and web server which is connected to the NodeMCU in a wireless local area network or WLAN. The sensor data from NodeMCU sent to the server, then the result will be shown visually by the website interface. Based on the results of this study, the visualized data has been shown the full sensor data, with the delay is following the delay of the NodeMCU, 60 seconds.


2020 ◽  
Vol 1 (2) ◽  
pp. 83
Author(s):  
Agung Tri Laksono ◽  
M. Alvian Habib Nasution

In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.


Author(s):  
Göran Pulkkis ◽  
Kaj J. Grahn ◽  
Jonny Karlsson ◽  
Mikko Martikainen ◽  
Daniel E. Daniel

This chapter is a topical overview of wireless local area network security evolution. WLAN security threats are surveyed. Covered standards include 802.11/WEP, 802.1X/EAP, 802.11i/WPA and 802.11i/WPA2. Special attention is given to user authentication schemes and to protection of data communication. WPA is also compared with the present WLAN security protocol WEP. Other covered issues are available WPA supported technology and open source WLAN security software. A WPA secured WLAN test network is described and tested. A WLAN designed according to the new security standards is a real alternative to a secure enterprise LAN and also a reliable platform for e-commerce. Finally, WLAN security management and current research related to WLAN security are surveyed.


1981 ◽  
Vol 1 (1) ◽  
pp. 21 ◽  
Author(s):  
David Hutchison ◽  
Doug Shepherd

1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


Sign in / Sign up

Export Citation Format

Share Document