scholarly journals Desain Jaringan Komputer Terintegrasi Menggunakan Arsitektur Campus LAN

2020 ◽  
Vol 2 (1) ◽  
pp. 25-32
Author(s):  
Jeckson Sidabutar

The development of Information and Communication Technology (ICT) to access and provide information quickly and accurately becomes very important for an organization (commercial, tertiary, government, or individual). With the rapid development of ICT, it is necessary to consider the dangers and disadvantages of misuse in local network services or in internet-based applications. Campus LAN (Local Area Network) architecture was chosen as the standard used in computer network design. The network architecture approach in this study is a enterprise architecture approach that is used for organizational logic and planning throughout the organization and aims to determine how information technology will support business processes. This method begins by identifying the infrastructure and network security needs, as well as how the information technology system supports the process of activities for all parts of education, administration and other services.

2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Author(s):  
Bima Putra Winasis ◽  
Bambang Sugiantoro

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


Author(s):  
Toshio Mitsufuji

This study aims at investigating the implementation process of electronic network systems in Japanese large firms, focusing on the innovativeness among industries to which firms belong. The electronic network systems such as Local Area Network (LAN) have spread rapidly during last several years. Accordingly, many firms in Japan have introduced them in their organizations. After the advent of the computer invention, computer and telecommunications technologies have merged into information technology, making a remarkable progress constantly for several decades. The electronic network systems are a kind of information technology, going back to 1950s when data communications systems were first developed. In the beginning were these systems managed by professional people. However, due to the rapid progress of the information technology, even untrained people who have no specific knowledge about IT or do not belong to the IT section have been able to use the electronic network systems in business organizations since the late 1980s. In addition, especially with the appearance of multimedia systems and the expansion of the usage of Internet, many organizations have begun introducing electronic network systems since 1990s. For this study, we sent questionnaires in 1996 to Japanese large firms in which they employed more than 1000 people. Based on the results and the interviews made in connection with this research work, we analyze first the state of the introduction of the electronic network systems, focusing on the innovativeness of firms. Next, we examine why the electronic network systems have come into wide use among Japanese large firms.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


1991 ◽  
Vol 3 (2) ◽  
pp. 115-147 ◽  
Author(s):  
K. Arvind ◽  
Krithi Ramamritham ◽  
John A. Stankovic

2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


Sign in / Sign up

Export Citation Format

Share Document