scholarly journals Implementación de un sistema que permita a los usuarios de la red comunicarse mediante el envío de mensajes de texto o archivos, sin necesidad de una conexión a internet

Author(s):  
Miguel Ángel RUÍZ-JAIMES ◽  
Jorge ALARCÓN-ÁLVAREZ ◽  
Juan José FLORES-SEDANO

Current messaging applications communicate users through the use of the Internet, in their absence, they cannot operate. Gmail and WhatsApp are the main means that the students of the campus of the Polytechnic University of the State of Morelos (Upemor), use to communicate within the facilities of the university. However, when the Internet of the campus tends to fail, network users cannot use these applications and as a consequence student have to resort to rudimentary methods to transfer files or text messages. A possible solution to this problem is the use of the network infrastructure already available by the Polytechnic University of the State of Morelos, added to a system that allows the transfer and sending of messages and files through a local area network. During the present, the development of this system, its implications and its pros and cons will be described.

2020 ◽  
Vol 1 (2) ◽  
pp. 83
Author(s):  
Agung Tri Laksono ◽  
M. Alvian Habib Nasution

In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.


1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


2018 ◽  
Vol 30 (2) ◽  
pp. 238-247 ◽  
Author(s):  
Yuya Nishida ◽  
Takashi Sonoda ◽  
Shinsuke Yasukawa ◽  
Kazunori Nagano ◽  
Mamoru Minami ◽  
...  

A hovering-type autonomous underwater vehicle (AUV) capable of cruising at low altitudes and observing the seafloor using only mounted sensors and payloads was developed for sea-creature survey. The AUV has a local area network (LAN) interface for an additional payload that can acquire navigation data from the AUV and transmit the target value to the AUV. In the handling process of the state flow of an AUV, additional payloads can control the AUV position using the transmitted target value without checking the AUV condition. In the handling process of the state flow of an AUV, additional payloads can control the AUV position using the transmitted target value without checking the AUV condition. In this research, water tank tests and sea trials were performed using an AUV equipped with a visual tracking system developed in other laboratories. The experimental results proved that additional payload can control the AUV position with a standard deviation of 0.1 m.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


Author(s):  
Kannan Balasubramanian

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.


2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


2020 ◽  
Vol 4 (1) ◽  
pp. 201
Author(s):  
Tommy Elco Geraldi ◽  
Moh. Iwan Wahyuddin ◽  
Andri Aningsih

With the increase of internet user today, if it only has one router, when the router experiencing a network failure, then the internet cannot be used. To overcome this problem, the HSRP (Hot Standby Router Protocol) method by creating one active link and one backup link has been applied in the previous research. In this research will be applying the HSRP, VTP (Vlan Trunking Protocol), InterVLAN, and VLAN (Virtual Local Area Network) as a comparison. The testing parameter in this research will be using packet loss and throughput. From the result of testing that has been done, it shows that by applying the HSRP method, it gives a network availability with the packet loss of only 0,32%, and throughput of 1,159Mb/s (95,58%) from using 100 PC.


Sign in / Sign up

Export Citation Format

Share Document