scholarly journals ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK

2021 ◽  
Vol 1335-8243 (1338-3957) ◽  
pp. 30-34
Author(s):  
Cyril Filip KOVACIK ◽  
◽  
Gabriel BUGAR ◽  

Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.

2019 ◽  
Vol 5 (1) ◽  
pp. 87-92
Author(s):  
Mugi Raharjo ◽  
Frengki Pernando ◽  
Ahmad Fauzi

The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2021 ◽  
Vol 1 (4) ◽  
pp. 233-243
Author(s):  
Alhimni Alhimni ◽  
Ilman Zuhri Yadi

This research is based on the observations and experiences of researchers, that now the internet has become a basic need for an agency, almost all Directorates of Water Resources (SDA) have a computer network. The Directorate of Water Resources (SDA) Central Sumatra River Basin VIII has implemented a network to support the performance of the Directorate of Water Resources (SDA), but still has problems where the network often experiences disconnections due to damage, interference with switches, damage to cables and network connectors. and Hang routers. To meet the internet needs at the Directorate of Water Resources (SDA) Central Sumatra VIII River Basin, stable internet is needed, therefore a failover method is needed. The problem in this research is that there are frequent disturbances in the internet network. The transfer of the main internet line to the backup path is done manually. Given how important the network is to support performance at the Directorate of Water Resources (SDA), the authors suggest to create a failover backup system for Mikrotik routers in the Directorate of Water Resources (SDA). This research uses the Action Research development method, which consists of Diagnostic, Action planning, action taking, evaluating and e-learning. With this application, it is hoped that if there is a problem with the router device, it will not interfere with the use of the existing network. On the internet network of the Directorate of Water Resources (SDA) Central Sumatra River Region VIII.


Author(s):  
Anton Anatolevich Komarov

The object of this research is the statistical aggregate of people who by objective (external) reasons are prone to become the victims of fraud within the Russian segment of the global computer network. The subject of this research is the quantitative aspect of the aforementioned phenomenon. Special attention is given to the search of effective methods for determination of quantitative aspects of victimization. The goal consists in most accurate assessment of the total number of the potential victims of fraud committed via Internet. The main results of this work contain the most accurate among previously existed in criminology numbers of: potential victims of fraud in the Internet (the author specifies the number of users of the Russian segment of Internet aged from 6 to 80), persons out of 24-hour Internet audience of criminogenic age; and a number of statistical indicators of victimization. All of the listed above can assist proper organization of research carried out by scholars dealing with the problems of cybercrimes.


2021 ◽  
Vol 9 (2) ◽  
pp. 16-25
Author(s):  
Renaldi Adha Nawawi

Bandwidth management is very important in a computer network concept. Bandwidth management functions to regulate network bandwidth so that each network user gets an evenly distributed bandwidth as a whole, even though there are many network users. In this Java shop, the distribution of bandwidth to each client has not been implemented. , there is no bandwidth management on the Java cafe internet network. The results of the internet speed test at the Java cafe use speedtest.net. The result is the distribution of bandwidth between client 1 and client 2 is not evenly distributed. On client 1 get download and upload speeds up to 0.65 and 1.14 Mbps. While on client 2 only get 2.9 and 1.14 Mbps, due to the absence of a bandwidth management system. Hierarchical Token Bucket (HTB) is a method of bandwidth management, HTB can provide more bandwidth to the client in a few seconds the client will get more bandwidth, the research methodology used is (Network Development Life Cycle) with a system development method for the network which includes the stages of Analysis, Design, Simulation, Implementation, Monitoring, and Management. The results show that bandwidth distribution in each client can be done with each client getting a maximum bandwidth of 768Kbps and getting a bandwidth limit-at of 268Kbps so that customers can still get an internet network even though internet traffic is heavy. . and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can be accepted by clients or visitors to Java stalls.. and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can accepted by clients or visitors to shop jawa..


2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Sign in / Sign up

Export Citation Format

Share Document