scholarly journals Techniques of Enhancing usage Management of a Local Area Network of a Higher Educational Institution

Managing the usage of Local Area Network is an important task as it helps in maintaining the productivity of the LAN There exists tools for this purpose and most of them are web interface based, they can control and monitor the usage only when connected to internet. Moreover proper usage logging and usage control based on the already set schedule is also absent. Practically, this management do not suffice the need of higher educational institutions because the areas like accountability, usage logging and control is not addressed in this approach. Both are important factor of enhancing management of LAN. This research paper proposes a tool-LABGUARD to incorporate these features. Further the tool has been implemented using .Net Technology. As a result, the usage of systems was accountable, only the authorized user could access the assigned sites with granted privileges at the retrospective time. Thus the system became more accountable and secured. It also enhanced the control of administrator on entire lab setup. It also facilitates the administrator to retrieve log details.

1989 ◽  
Vol 9 (7) ◽  
pp. 51-52 ◽  
Author(s):  
M. Suzuki ◽  
T. Matsuda ◽  
N. Ohashi ◽  
Y. Sano ◽  
R. Tsukui ◽  
...  

2019 ◽  
Vol 7 (01) ◽  
pp. 31
Author(s):  
Martanto Martanto

Data is a very important need for an Education institute, one of them is SMK Persatuan Ummat Islam. Because data is an important asset that must be protected and protected by its security. For this reason, a media is needed that can store data that are important and valuable assets so that they are guaranteed security and maintenance. Data processing is connected to the local area network (LAN) of SMK Persatuan Ummat Islam. Storage media with good and reliable performance will certainly greatly assist agencies for data storage in improving information access services at educational institutions. It is very important to secure data from the server so that it is necessary to backup the data by adding software or hardware as a backup server computer. To be guaranteed the data backup process periodically requires an application that can backup data automatically from the server or client. NAS4Free is a server with a Linux-based operating system that is very specialized to handle data storage centrally, so that it becomes one of the very good solutions to be implemented, because by using one media as a center of data storage can reduce the risk of data loss or data damage. And can restore (restore) data if the computer is damaged. So that the hope can facilitate the work of educators and education staff in improving services in educational institutions using data backup in ensuring the security and maintenance of data which are important and valuable assets


1989 ◽  
Vol 4 (3) ◽  
pp. 1668-1675 ◽  
Author(s):  
M. Suzuki ◽  
T. Matsuda ◽  
N. Ohashi ◽  
Y. Sano ◽  
R. Tsukui ◽  
...  

1990 ◽  
Vol 5 (2) ◽  
pp. 63-72 ◽  
Author(s):  
Rodger Jamieson ◽  
Graham Low

This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network administrators, consultants and information systems management for the review of local area network security during network operations.


2014 ◽  
Vol 114 (2) ◽  
pp. 439-460 ◽  
Author(s):  
Hongmei Gao ◽  
Hongbei Cao ◽  
Yan Xu ◽  
Ya Zhou ◽  
Yubo Feng ◽  
...  

Implicit Schadenfreude of disaster spectators, with augmentation of implicit self-esteem and higher reward responsiveness as indicators, and the influence of insecurity and masculinity was explored in two studies. Both studies were conducted under conditions without any clearly legitimizing factors. Experimental (priming with disaster video) and control (priming with neutral video) groups were compared using the Implicit Association Test in Study 1, the results of which showed augmentation of implicit self-esteem in the experimental group. In Study 2, participants who read and believed a fabricated news report of fire disaster via a local area network website showed higher reward responsiveness in a reward-based signal-detection task. Other results showed that insecurity negatively predicted the augmentation of implicit self-esteem and reward responsiveness, while masculinity only negatively predicted the augmentation of implicit self-esteem.


Author(s):  
MUSMUHARAM . ◽  
Cosmas Eko Suharyanto

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.


2019 ◽  
Vol 1 (1) ◽  
pp. 90-98
Author(s):  
Ignasius Irawan Budi P

Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level for security in wireless local area network because this method can protect man-in-middle vulnerability.The proposed framework is evaluated by using scenario in testing and live environment to ensure that the authentication has been securely for mutual device authentication.


Author(s):  
Medha Misra ◽  
◽  
Pawan Singh ◽  
Anil Kumar

Smart home is an emerging technology which is growing continuously now. It integrates many of the new technologies with the help of home networking for improving human’s quality and standard of living, so there are many projects which are researching in diverse technologies in order to apply them to the smart home system. As the technology evolves it comforts mankind with some additional ease and advancement. At the time the evolution calls upon all the daily routine devices to operate over internet and this project is based on the idea to make these devices accessible to the owner anytime anywhere. Particularly for now we intend to connect electrical appliances in any house to a kind of a local area network so that it can be operated by the respective authorities so as to minimize the electricity wastage. Further these devices along with sensors can be made to operate on their own, intelligently and accurately. The excellency of the project can be utilized in hostels and classrooms as well where most of the times we find electrical appliances operational even when not necessary. The idea is to turn a house into a smart house. The project utilizes the current technology such as wifi and low cost electronic modules to meet the requirements of IOT and gives it a web as well as an app interface for an ease of access. The technologies which we are using include - Wifi module, Relay module, Raspberry pi, Sensors for automatic support and feedback to user. The project can be extended to cloud also for data storage and providing access to authorized user.


Author(s):  
Dang Quang Hieu ◽  
Nguyen Xuan Truong

The article presents the basic principles of design and development of integrated middle range Coastal Surveillance System (CSS) used for water surface lookout. It provides solutions for such missions as command and control of maritime forces, border monitoring and control, prevention of illegal activities such as piracy, smuggling, illegal immigration, illegal fishing, supporting search and rescue (SAR) operations, and creates a common situation awareness picture of the Naval Theatre. The system structure diagram is designed to solve computational overload problem when processing large volume of data received from radar stations. The measurement-level fusion algorithm is developed based on the JPDA framework, in which radar data received from a single or group of radars and AIS data is aggregated in a processing center. The servers and workstations make use of local area network (LAN), using standard Gigabit Ethernet technologies for local network communications. Acquisition, analysis, storage and distribution of target data is executed in servers, then the data is sent to automated operator stations (console), where functional operations for managing, identifying and displaying of target on digital situational map are performed.


2018 ◽  
Vol 1 (1) ◽  
pp. 50
Author(s):  
Sopian Sumardi ◽  
Mohammad Taufan Asri Zaen

Information and Communication Technology (ICT) is a very important requirement in the implementation of education. Becoming a necessity for SMAN 4 Praya as an upper secondary educational institution to build computer network technology considering the complexity of the problems faced in the administrative system as well as the teaching and learning process. ICTs need to be well-designed to ensure that resources can be utilized optimally and mission vision can be achieved as expected. The design of computer networks at SMAN 4 Praya uses the Network Development Life Cycle (NDLC) approaches as a development method, covering a number of stages analysis, design, prototype simulation, implementation, monitoring and management. The process of analysis is divided into several processes, namely user needs analysis, device requirement analysis (hardware, software, brainware), network needs analysis, feasibility analysis (feasibility of infrastructure and human resource feasibility), and through network topology analysis by designing architecture and computer network design. Network Design Local Area Network (LAN) and Wireless Fidelity (WiFi) based on Mikrotik RouterOS. Implementation of the use of Mikroutik RouterOS on the Internet network SMAN 4 Praya can provide effective and optimal results to divide the bandwidth of each client as as reserved, and allows administrators in managing the network to remain stable and provide maximum results.


Sign in / Sign up

Export Citation Format

Share Document