scholarly journals Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X

2020 ◽  
Vol 1 (2) ◽  
pp. 83
Author(s):  
Agung Tri Laksono ◽  
M. Alvian Habib Nasution

In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.

Author(s):  
MUSMUHARAM . ◽  
Cosmas Eko Suharyanto

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.


2020 ◽  
Vol 7 (2) ◽  
pp. 229
Author(s):  
Bil Klinton Sihotang ◽  
Sumarno Sumarno ◽  
Bahrudi Efendi Damanik

The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements


Author(s):  
Miguel Ángel RUÍZ-JAIMES ◽  
Jorge ALARCÓN-ÁLVAREZ ◽  
Juan José FLORES-SEDANO

Current messaging applications communicate users through the use of the Internet, in their absence, they cannot operate. Gmail and WhatsApp are the main means that the students of the campus of the Polytechnic University of the State of Morelos (Upemor), use to communicate within the facilities of the university. However, when the Internet of the campus tends to fail, network users cannot use these applications and as a consequence student have to resort to rudimentary methods to transfer files or text messages. A possible solution to this problem is the use of the network infrastructure already available by the Polytechnic University of the State of Morelos, added to a system that allows the transfer and sending of messages and files through a local area network. During the present, the development of this system, its implications and its pros and cons will be described.


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2013 ◽  
Vol 468 ◽  
pp. 141-144
Author(s):  
Su Hua Chen ◽  
Yong Guang Liu ◽  
Xu Fang

Smart home system mainly consists of home networking, wireless local area network and external network, and with the advantages of low cost and high reliability, Zigbee wireless technology is the right choice for smart home system and the main part of home networking. The design of smart home system based on Zigbee is proposed, the Zigbeethe design process of the systemintelligent socket and data communication rule are elaborated. The system has been applied in smart community of Shaoxing Electric Power Bureau, which has good performances, high availability and reliability, better market prospects.


Sign in / Sign up

Export Citation Format

Share Document