scholarly journals Pengembangan Sistem Komunikasi Data Dan Jaringan Komputer Dengan Penerapan Wireless Distribution System (WDS) di SMK Negeri 1 Pringgabaya

2021 ◽  
Vol 4 (2) ◽  
pp. 345-355
Author(s):  
Muhammad Nuzuluddin ◽  

At Present, many schools have used wireless networks that are used to support wired networks. Cable network is used as an amplifier of access point to make internet access for users. The problems of networking using these cables can be a major constraint to inaccessible places that can reduce the flexibility of usage. The solution for this problem is to develop and implement Wireless Distribution System (WDS) on the access point. WDS is a system to develop wireless internet network without having to use cable as backbone for access point but to take advantage of wireless network path from access point. The parameters used in the WDS system are the parameters of jitter, througput, delay and packet loss. WDS performance can be analyzed so that will be known comparison of access point performance results with cable backbone

Author(s):  
Asep Wishnu ◽  
Bambang Sugiantoro

The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.


Author(s):  
Amel Meddeb Makhlouf ◽  
Noureddine Boudriga

The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.


2011 ◽  
Vol 12 (03) ◽  
pp. 137-154 ◽  
Author(s):  
NOBUO FUNABIKI ◽  
JUNKI SHIMIZU ◽  
MASAHARU HATA ◽  
SHIGERU TOMISATO ◽  
TORU NAKANISHI ◽  
...  

As an inexpensive, flexible, and scalable Internet-access wireless network, we have studied the architecture, protocols, and design optimizations of the Wireless Internet-access Mesh NETwork (WIMNET) that adopts multiple access-points (APs) connected through wireless links. WIMNET can improve the dependability to failures of APs and/or their links by allocating APs redundantly in the network field. Because redundant APs may increase the operational cost and degrade the throughput due to increasing radio interferences, only the necessary APs for connectivity between the hosts and the Internet gateway should be activated in communications. In this paper, we first define the active AP selection problem of selecting the minimum number of active APs, and prove the NP-completeness of its decision version through reduction from the known minimum set cover problem. Then, we propose an active AP selection algorithm of deactivating APs one by one until no more AP can be deactivated. Due to the limited transmission capacity in WIMNET, we further present an algorithm extension for throughput maximization. We verify the effectiveness of our proposal through simulations in three instances, where the number of active APs is reduced by more than 40% and the throughput is improved by more than 10% from the original in any instance.


2017 ◽  
Vol 16 (5) ◽  
pp. 6920-6925
Author(s):  
Rohmat Tulloh ◽  
Hasanah Putri ◽  
Dwi Andi Nurmantris ◽  
Desi Dwi Prihatin

At present, the need for internet access in public area using wireless connections is increasing drastically and this should be supported by good network infrastructure. Wireless network is one of the best alternative in building a practical internet network. WDS is a system to develop wireless internet network without having to use cable as its backbone for access point but instead utilize wireless path from its access point. The problems that often arise in the design of wireless LAN network is the poor signal received by the user due to the installation of an access point that is poor location-wise. This is because at some point it is very difficult to install Access point using cable because the distance is too far from the existing router. In this paper, we propose to use three scenario of WDS mode to compare its performance. We investigate three different topology policy models of the WDS Bridge point-to-point, WDS Bridge point to multipoint and WDS repeater. The use of these three topologies aims to reach locations that are not covered by wireless LAN network, in addition this method can save the use of network resources such as LAN cables. Based on the simulation results, it is found that the topology point to point gives better value but it generated higher delays. The delay generated on point to point is higher than other topologies. Meanwhile, the measurement results are not much different on topology point to multipoint with repeater topology. The point to multipoint topology is slightly better than the repeater of the three QoS parameters.


2021 ◽  
Vol 2 (2) ◽  
pp. 87-96
Author(s):  
Alvin Riady ◽  
Aan Restu Mukthi

Bukit Energi Servis Terpadu (BEST) is a company engaged in Operation & Maintenance (O&M) services which are members of the PT group. Bukit Asam Tbk. PT. Bukit Energi Servis Terpadu (BEST) already has a computer network in the form of adequate wired and wireless networks and has been connected to the internet. The bandwidth used for the scope of the office uses a bandwidth of 30 Mbps, but the problem of internet speed is not maximized where there is download activity and video streaming which causes the internet bandwidth in the office to be slow, thus affecting the activities of employees who are accessing the internet in the office either through wired networks and wireless internet hotspots. The results of the measurement of packet loss parameters (%) after Bandwidth Management with HTB is better, namely 0.12 % while before Bandwidth Management with HTB is carried out with a value of 0.52 %. The results of measuring the throughput parameters before using Bandwidth Management with HTB where the use of throughput after using Management Bandwidth with HTB obtained results of 624.9 kbps while the throughput before Bandwidth Management was carried out was 624.4 kbps. By limiting bandwidth using the Hierarchical Token Bucket (HTB) facility, bandwidth can be divided into certain sections or prioritized for those who need higher internet speeds, while those that do not require an internet connection are provided with a small speed.


2020 ◽  
Vol 8 (6) ◽  
pp. 5047-5052

This paper addresses the rate control problem for real-time applications streamed over wireless networks. In wired networks, an equation-based rate control such as TCP-friendly rate control (TFRC) can be used to control the rates of a source under the assumption that the loss is primarily due to congestion. But in wireless networks, packet loss may be due either to congestion or to channel errors. Thus, it is necessary to differentiate between packet loss due to wireless channel errors and that due to congestion. The MAC-aware rate control scheme for real-time streaming applications discriminates packet losses due to channel errors using the event generation in the MAC layer. The simulation results show that the MAC-aware rate control scheme has higher throughput than the rate control scheme without loss classification.


Wired networks add to cost and space required to setup while wireless networks are easy to expand without adding complexity of cables. Most organizations implement wireless networks as an extension to an existing wired connection by installing multiple access points at various locations to cover larger area. The wi-fi network users can be assigned limited and restricted access to the actual wired network and organizational resources. Although less reliable, wireless networks offer mobility, flexibility, ease of deployment, scalability with reduced cost of implementation. However, besides these many advantages, wireless network expands the security threat level by offering ease of intercepting network traffic to the hackers via open networks. Hence, there is a need to determine the potential wi-fi security threats, attacks, attacking tools, and possible countermeasures to be used to secure organizational wireless networks. This chapter focuses on different IEEE 802.11 wireless standards, authentication and association processes in 802.11, and WLAN frame structure. This chapter explains different wireless attacks like war-driving, war-chalking, wi-fi signal jamming, denial of service (DOS) attack, rogue access point attack, wireless traffic analysis, MAC spoofing, de-authentication attack, man-in-the-middle attack, evil twin attack, cracking wi-fi encryptions, spectrum analysis, bluetooth devices attacks, etc. The chapter also discusses different tools used for carrying out wireless attacks or auditing wireless security like NetStumbler, Kismet, Aircrack, insider, KisMAC, WEPWedgie, WIDZ, and Snort-wireless. The chapter also discusses countermeasures against these attacks.


Author(s):  
Sadam Husen ◽  
Raesul Azhar

STMIK Bumigora has five internet hotspot access point which can be used by students. Fifth hotspot wireless access point includes faculty, labs, students, faculty and for management purposes. The use of wireless networks for internet access led to the illegal activities that can not be monitored by the network administrator. Activity is mainly on the use of the router that serves as a proxy router connected directly to the ISP (Internet Service Provider). Illegal activities are often done by the students is trying to log into any network devices using bruteforce method. Techniques used include using remote access such as ssh, telnet and ftp. In addition, the activity of port scanning is often performed by the students to observe the security gaps that are still weak in a hotspot, especially at the port still open on the network. To overcome this problem, researchers built an application that is capable of managing and monitoring security hotspots making it easier for network administrators to take action against such illegal activities. Research method used is SDLC, in which the systemis intended to develop a system that has existed previously in PUSTIK STMIK Bumigora Mataram


Sign in / Sign up

Export Citation Format

Share Document