scholarly journals jaringan komputer di cafe

2020 ◽  
Author(s):  
Indraseptyjakarsi ◽  
habilmaulana ◽  
Pandu Pratama Putra M.Kom

A computer network is a system consisting of several computers that are designed to be able to share data, information, and resources. The purpose of computer networks is that every part of a computer network can request and provide information and data services. The party requesting or receiving the service is called the client and who sends or sends the service is called the server. In the Teaching Department of the Faculty of Engineering, Janabadra University designs using existing star-type network topologies so that network load development is not centered on switch hardware. In network design the proxy is a network device that functions as a gateway and router. In the configuration of IP Address use DHCP Server to facilitate the installation of new computers on the network. New computers don't need to be configured manually, it will automatically connect to the network

2020 ◽  
Author(s):  
dwimuladi ◽  
hardiansyah ramadhan ◽  
Pandu Pratama Putra M.Kom

A computer network is a system consisting of several computers that are designed to be able to share data, information, and resources. The purpose of computer networks is that every part of a computer network can request and provide information and data services. The party requesting or receiving the service is called the client and who sends or sends the service is called the server. In the Teaching Department of the Faculty of Engineering, Janabadra University designs using existing star-type network topologies so that network load development is not centered on switch hardware. In network design the proxy is a network device that functions as a gateway and router. In the configuration of IP Address use DHCP Server to facilitate the installation of new computers on the network. New computers don't need to be configured manually, it will automatically connect to the network


Author(s):  
Yuri Ariyanto ◽  
Budi Harijanto ◽  
Yan Watequlis S.

A virtual laboratory with a network emulator environment using NetKit is one of series of basic network laboratories on basic computer network competencies where students are given practical trial opportunities at low costs and little effort in their implementation. Teaching computer network subjects to be easily understood by students needs an instructional media as a tool in delivering material. This media uses computer virtualization technology, i.e. creating a virtual laboratory, as a means of students in conducting experiments from the material that has been obtained. In virtual laboratories it is possible to implement network topology designs based on actual network topologies. This implementation is used as a testing tool before the network topology is implemented on the actual network. Therefore, errors can be identified first without disturbing the system that is already running. For testing, the students are given training using a basic network design consisting of the implementation of routing tests, firewalls, ftp server implementation and web server. This paper is aimed at describing ways to develop a virtual laboratory with a network emulator environment using NetKit. Moreover, several exercises on network topology implementation that are applied directly to the real world with NetKit are introduced, such as describing laboratory settings, describing the main parts of the lab, illustrating lab instructions, and reporting lab feeds.


Respati ◽  
2019 ◽  
Vol 14 (2) ◽  
Author(s):  
Robby Cokro Buwono

INTISARISistem informasi dibuat untuk membantu kegiatan di suatu organisasi dan pengambilan keputusan para pimpinannya. Sistem informasi sudah banyak dibuat organisasi namun data atau informasi yang dihasilkan selalu berdiri sendiri sehingga mengakibatkan kesulitan mendapatkan informasi yang terkait antar sistem informasi pada organisasi tersebut, terjadi duplikasi informasi dan menjadikan informasi tidak berupa kesatuan yang lengkap dan utuh.Web sebagai sarana penyampaian informasi yang sederhana dari satu tempat ke tempat lain melalui jaringan komputer. Web dapat dimanfaatkan pula sebagai sarana interoperabilitas dan berbagi informasi antara sistem informasi di suatu organisasi. Suatu klien sistem informasi yang berada pada jaringan komputer dapat meminta layanan data berupa web services kepada server sistem informasi yang menyediakan layanan data yang diminta dengan cara mudah.JavaScript Object Notation (JSON) merupakan seperangkat aturan untuk memformat data berbasis teks yang ringan digunakan pada pertukaran data. Layanan web (web services) pada komunikasi antar sistem informasi untuk bertukar informasi dapat menggunakan JSON agar mendapatkan kemudahan mendapatkan informasi yang dibutuhkan dan untuk mendapatkan integritas data yang dihasilkan dari berbagai sistem informasi pada organisasi tersebut.Peneliti melakukan pengembangan web services untuk berbagi data antar suatu sistem informasi yang dibutuhkan oleh sistem informasi yang lainnya dengan format menggunakan JSON. Peneliti mengharapkan adanya web services dengan format JSON yang dapat membantu sistem informasi untuk mendapatkan informasi yang dibutuhkan dan mendapatkan integritas data yang dihasilkan antara sistem informasi tersebut.Kata kunci— web services, JSON, interoperabilitas, sistem informasi. ABSTRACTInformation systems are made to assist activities in an organization and the decisions of its leaders. Many information systems have been created by the organization, but the data or information produced always stands alone, resulting in difficulties in getting information related to information systems in the organization, duplication of information and making the information, not in the form of a complete and intact unit.The web as a means of delivering simple information from one place to another through computer networks. The web can also be used as a means of interoperability and information sharing between information systems in an organization. An information system client located on a computer network can request data services in the form of web services to an information system server that provides requested data services in an easy way.JavaScript Object Notation (JSON) is a set of rules for formatting lightweight text-based data used in data exchange. Web services (web services) on communication between information systems to exchange information can use JSON to get the ease of getting the information needed and to obtain data integrity generated from various information systems in the organization.The researcher develops web services to share data between information systems needed by other information systems in a format using JSON. The researcher expects the existence of web services with JSON format that can help information systems to get the information needed and get the integrity of the data generated between the information systems.Kata kunci—  web services, JSON, interoperability, information systems.


2021 ◽  
pp. 26-31
Author(s):  
Oswald Aguilar Dowins ◽  
◽  
◽  
Omar Mar Cornelio

At present, every industry or company that wishes to improve efficiency in carrying out its social role needs to use the technological tools at its disposal, an example of this is computer networks, which is the set of computers interconnected with each other and that have resources shared. This document describes the implementation of a wired network in the telecommunications company SERTOD. This company had a network with obsolete equipment, it also had areas where the product network did not reach the remodeling and expansion of the company. A new network was designed following a series of steps well defined by the bibliographies for the implementation of wired networks, A market study was carried out to analyze the costs of the equipment to be used and to choose carefully in terms of cost and quality. A proposal was obtained for the new network to be implemented in the SETOD company.


2019 ◽  
Vol 3 (1) ◽  
pp. 13
Author(s):  
Afrizal Afrizal ◽  
Fitriani Fitriani

The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6


2020 ◽  
Author(s):  
NOVALDY FIQRI ◽  
Hilmayani ◽  
Pandu Pratama Putra M.Kom

The design of a computer network is an essential and important instrument in institutions or universities, one of which is at the Riau Province Sports High School. To support maximum human resource performance, the Riau Province Sports High School applies the use of computer networks to manage administration and teaching and learning processes, so that the use of computer networks is urgently needed. Then it is necessary to have a better and more efficient network system to regulate information sharing, so as to facilitate access to information between employees in Riau Province Sports High School. This research uses simulation and implementation methods. Data collection is done by library research, observation and interviews. Before the implementation of computer network design that was built in the Riau Province Sports High School Building will be simulated with Cisco packet tracer in accordance with the data already obtained (needs analysis). The results of this study are network design used for the Riau Province Sports High School building. The network created can facilitate the performance of employees and instructors of Riau Province Sports High School. The design is done as well as possible so that the School does not have difficulties when doing network development.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


2019 ◽  
Vol 9 (11) ◽  
pp. 2256
Author(s):  
Yasmany Prieto ◽  
Nicolás Boettcher ◽  
Silvia Elena Restrepo ◽  
Jorge E. Pezoa

Current data networks are highly homogeneous because of management, economic, and interoperability reasons. This technological homogeneity introduces shared risks, where correlated failures may entirely disrupt the network operation and impair multiple nodes. In this paper, we tackle the problem of improving the resilience of homogeneous networks, which are affected by correlated node failures, through optimal multiculture network design. Correlated failures regarded here are modeled by SRNG events. We propose three sequential optimization problems for maximizing the network resilience by selecting as different node technologies, which do not share risks, and placing such nodes in a given topology. Results show that in the 75% of real-world network topologies analyzed here, our optimal multiculture design yields networks whose probability that a pair of nodes, chosen at random, are connected is 1, i.e., its ATTR metric is 1. To do so, our method efficiently trades off the network heterogeneity, the number of nodes per technology, and their clustered location in the network. In the remaining 25% of the topologies, whose average node degree was less than 2, such probability was at least 0.7867. This means that both multiculture design and topology connectivity are necessary to achieve network resilience.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Sign in / Sign up

Export Citation Format

Share Document