scholarly journals The Android Based Computer Network Monitoring Application

2018 ◽  
Vol 2 (1) ◽  
pp. 18-22
Author(s):  
Muhammad Nashrullah ◽  
Muhammad Alif Raher

Utilization of information technology and computer network as data communication media has been increased. The requirement for shared use of existing resources in the network both software and hardware has resulted in the development of various technologies of the network itself. Information technology and communications are widely used today using computer network system as a medium of information and data transformation, the greater the company or agency that uses the network computer the more complex the network system in the company or agency, and required a good handling for the system can run optimally. One of them that uses computer network system is Banyan Tree Bintan. Network monitoring activities in Banyan Tree Bintan are important to do by network administrator to ensure the network is always in good condition. Given the limitations of network administrators who can not always be in the workplace, it is necessary for a system that can monitor the computer network remotely. So that the network administrator can know the state of the computer network at any time and can perform actions that need to be done quickly.This application is based on android using an Internet connection for network administrators can monitor network anytime and anywhere. Desktop-based applications need to be installed on the computer so that computer system data can be retrieved and displayed on android devices.

Author(s):  
Desep Priandes ◽  
Ahmaddul Hadi ◽  
Dedy Irfan

Utilization of information technology and computer network as data communication media until now increasing. The need for shared use of resources (Resources) that exist in the network both software and hardware has led to the emergence of various development of network technology itself. The bigger a company or institution that use computer network hence more complex also network system at company or agency, and needed a good handling for system can run optimally The purpose of this Final Project is to design and supervise the condition of computer and also Clientr on network And can handle it. The computer network administrator tasked with organizing and manag`ing the local network requires a lot of information, so that the decisions made lead to the best decision in handling the problems on a network. Therefore,management information on a network system will correctly affect the security of the network. After Implementation of Remote Access System Based on the test of software engineering laboratory obtained convenience Port used in the process of remote monitoring computer network on port 6060. So that it can be Implemented by computer users, in the process of Monitoring Remote Network Computer. Keywords : Remote Komputer, Java, Netbeans, Framework,Unified Modelling Language.


2014 ◽  
Vol 10 (1) ◽  
pp. 42 ◽  
Author(s):  
Hidra Amnur ◽  
Defni - ◽  
Deddy Prayama ◽  
Febrina Agustin

Network Monitoring System is a system which has a function to observe or monitor the computer network system is running. Network monitoring system can be implemented in real time in a computer network.Development of network monitoring system using the local  ip and web-based applications, where the construction of this network monitoring system using CentOS 6.4 operating system as the server.Nagios is a network monitoring application based on open source that can be used according to user needs. To maximize the use of Nagios can use email and SMS as alerts.


2021 ◽  
Vol 12 (02) ◽  
pp. 46-53
Author(s):  
Bobi Akbar

In data communication, against a data security method known as cryptography (Cryptography). Cryptography is a data security method that can be used to maintain data confidentiality, data authenticity or integrity, and the authenticity of the sender. This method is intended so that important information of a limited or confidential nature sent through public telecommunications facilities cannot be known or utilized by unauthorized parties. In this case, data security is also needed at the internet cafe (internet cafe). Warnet which is a place that provides Interconnection Networking that connects computers to form a network system that covers the whole world (global). Each cafe requires a billing system that is used to determine the state of the user in using the facilities at the cafe, starting from how long it takes to use and how much it costs each user. For this reason, so that the data on the billing system cannot be manipulated or modified by unauthorized persons, it is necessary to secure data. The data security method that will be used is cryptography, especially by using the RC4 stream cipher.


2013 ◽  
Vol 760-762 ◽  
pp. 1241-1243
Author(s):  
Li Zhao ◽  
Yun Zi

The application and development of computer network system bring a great convenience for library management and readers. At the same time, the security of computer network system in library is faced with all kinds of threats. How to guarantee the security of library computer network system has become the most important question for each library. This paper analyzes the factors which affect the library network security, such as network hardware, network operating system and application system, data security and so on, and puts forward corresponding security strategies and solutions.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2018 ◽  
Vol 7 (2.13) ◽  
pp. 341 ◽  
Author(s):  
Janner Simarmata ◽  
Tonni Limbong ◽  
Efendi Napitupulu ◽  
S Sriadhi ◽  
A R S Tambunan ◽  
...  

In conventional learning, teachers frequently face difficulties to deliver their materials due to limited time and practical materials in teaching network computer. Conventional teaching process, especially practical materials, has still not yet been optimal. Thus, computer and multimedia based learning is required to help the students. Besides it can reduce costs in practical materials procurement, the students can absorb the given knowledge well without thinking of the costs to buy the practical materials. Computer Assisted Instruction Method can present the learning using various media either by picture or video that can assist the effective learning process and simplify the students to manage the learning speed since it is combined with the multimedia. By doing this, the students can practice the lesson materials, study whenever and wherever they want. Compuer learning application prioritize user interface, user friendly, which can make the students be diligent and passionate in learning. 


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Sign in / Sign up

Export Citation Format

Share Document