scholarly journals ANALISIS KEBUTUHAN BANDWIDTH DENGAN MODEL SHARING SYSTEM PADA MIKROTIK ROUTERBOARD 450G DI JARINGAN OFFICE STTA

Compiler ◽  
2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Mardiana Irawaty ◽  
Ferry Mulyawan ◽  
Yenni Astuti

The limitations between the amount of bandwidth and users can make the internet slow. Observing the flow of data on the internet network is one way to identify the  bandwidth requirements which used on the STTA office network. This thesis analyzes the data traffic with sharing system model. The observed data is in the category of elastic flow rate, i.e: TCP (Transmission Control Protocol). The traffic data is converted to a measured data graph and then  analyzed  by  traffic  load,  throughput,  and  flow  of  loss  parameters.  The  highest observation value of traffic load is 0.37, Throughput of 9.3 Mbps (93%), and the flow of loss of 23%. From the results of the research, it can be concluded that in general internet network at STTA office is in good category.

2008 ◽  
Vol 22 (4) ◽  
pp. 519-536 ◽  
Author(s):  
Kostia Avrachenkov ◽  
Uri Yechiali

Data on the Internet is sent by packets that go through a network of routers. A router drops packets either when its buffer is full or when it uses the Active Queue Management. Currently, the majority of the Internet routers use a simple Drop Tail strategy. The rate at which a user injects the data into the network is determined by transmission control protocol (TCP). However, most connections in the Internet consist only of few packets, and TCP does not really have an opportunity to adjust the sending rate. Thus, the data flow generated by short TCP connections appears to be some uncontrolled stochastic process. In the present work we try to describe the interaction of the data flow generated by short TCP connections with a network of finite buffers. The framework of retrial queues and networks seems to be an adequate approach for this problem. The effect of packet retransmission becomes essential when the network congestion level is high. We consider several benchmark retrial network models. In some particular cases, an explicit analytic solution is possible. If the analytic solution is not available or too entangled, we suggest using a fixed-point approximation scheme. In particular, we consider a network of one or two tandem M/M/1/K-type queues with blocking and with an M/M/1/∞-type retrial (orbit) queue. We explicitly solve the models with particular choices of K, derive stability conditions for K≥1, and present several graphs based on numerical results.


2020 ◽  
Vol 16 (1) ◽  
pp. 19-24
Author(s):  
Pether V B Romony ◽  
Lanny Sitanayah ◽  
Junaidy B Sanger

Asap rokok adalah salah satu asap beracun yang berbahaya bagi kesehatan manusia dari sisi biologis maupun sisi kimiawi. Pada penelitian ini, penulis mengimplementasikansebuah sistem deteksi asap rokok berbasis The Internet of Things menggunakan sensor MQ135, Arduino board dan NodeMCU. Kemudian, penulis melakukan perbandingan Quality of Service dari dua protokol komunikasi data, yaitu Transmission Control Protocol dan User Datagram Protocol pada sistem tersebut. Parameter Quality of Service yang dibandingkan saat proses pengiriman data adalah delay dan data loss. Untuk setiap protokol, simulasi dilakukan selama 1 jam dengan pengiriman data setiap 5 detik, 10 detik, sampai 1 menit. Hasil yang diperoleh adalah data loss dengan Transmission Control Protocol lebih rendah dari pada data loss dengan User Datagram Protocol, sedangkan delay dengan User Datagram Protocol lebih rendah dari pada delay dengan Transmission Control Protocol.


2017 ◽  
Vol 14 (2) ◽  
pp. 77
Author(s):  
Rastri Prathivi ◽  
Vensy Vydia

<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>


2011 ◽  
pp. 1417-1421
Author(s):  
John F. Clayton

The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.


Author(s):  
John F. Clayton

The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.


2017 ◽  
Vol 866 ◽  
pp. 433-438
Author(s):  
Nattapong Phanthuna ◽  
Teerachai Lumnium

This article was studied and designed to merge the IoT (Internet of Thing) technology in an agricultural technology. The IoT technology will use the sensor and transducer technology to measure and record agricultural parameters for monitoring and controlling many orchards automatically and simultaneously. All measured data (such as ambient temperature, pressure of water supply system, water level in a clarifier, water quality for watering, and etc.) will be send via 3G into the internet network and shown on user smart phone. Therefore, any users will be able to monitor their farm status from anywhere all the time. The experimental result verifies that this proposed water management system can actually work following controller’s conditions and all data can be sent via the internet network in real time.


2020 ◽  
Vol 29 ◽  
pp. 2633366X1989819
Author(s):  
Hsiung-Cheng Lin ◽  
Chao-Wei Wei ◽  
Hong-Ming Chen

Currently, 3.6 V 700 mAh NiCd/NiMH battery is the most popular one used in emergency lights or other devices. It is well known that the state of health is related to the battery internal resistance and charging/discharging characteristics. However, the information needed may not be unveiled sufficiently from the manufactory although some certain specifications are provided. To provide users more accurate information, this system proposes an online battery quality measurement system based on two-pulse approach for internal resistance estimation along with long-term charging/discharging life cycle test. The measurement tasks are carried out using the microprocessor that connects with the computer via universal serial bus. Through the data acquisition system, every measured data from the microprocessor can be immediately transmitted to the data server via transmission control protocol/internet protocol. Accordingly, all testing results can be viewed online from the website, and their history record can be also tracked in the database. The experimental results verify that the proposed scheme can perform the quality measurement effectively and accurately.


Sign in / Sign up

Export Citation Format

Share Document