scholarly journals Perancangan Jaringan Komputer Berbasis Mikrotik Router OS Pada SMAN 4 Praya

2018 ◽  
Vol 1 (1) ◽  
pp. 50
Author(s):  
Sopian Sumardi ◽  
Mohammad Taufan Asri Zaen

Information and Communication Technology (ICT) is a very important requirement in the implementation of education. Becoming a necessity for SMAN 4 Praya as an upper secondary educational institution to build computer network technology considering the complexity of the problems faced in the administrative system as well as the teaching and learning process. ICTs need to be well-designed to ensure that resources can be utilized optimally and mission vision can be achieved as expected. The design of computer networks at SMAN 4 Praya uses the Network Development Life Cycle (NDLC) approaches as a development method, covering a number of stages analysis, design, prototype simulation, implementation, monitoring and management. The process of analysis is divided into several processes, namely user needs analysis, device requirement analysis (hardware, software, brainware), network needs analysis, feasibility analysis (feasibility of infrastructure and human resource feasibility), and through network topology analysis by designing architecture and computer network design. Network Design Local Area Network (LAN) and Wireless Fidelity (WiFi) based on Mikrotik RouterOS. Implementation of the use of Mikroutik RouterOS on the Internet network SMAN 4 Praya can provide effective and optimal results to divide the bandwidth of each client as as reserved, and allows administrators in managing the network to remain stable and provide maximum results.

Author(s):  
Nurul I. Sarkar ◽  
Krassie Petrova

Previous studies have shown that motivating students to learn about local area network (LAN) design can be difficult when presented in the traditional lecture format. To overcome this problem, a Web-based tool (“WebLan-Designer”) was developed as an aid in teaching and learning of LAN design at the introductory level. A WebLan-Designer provides a set of learning resources (tutorials, quizzes, network modeling, network design scenarios, key terms and definitions, and review questions and answers) and assists undergraduate students in learning the basics of both wired and wireless LAN design. The tool is Internet-based and can be accessed at any time so that students can study LAN design at their own pace and convenience. This flexible learning approach contributes positively to distance education and e-learning. The effectiveness of WebLan-Designer is evaluated both formally and informally; positive student and peer feedback indicates that the design and implementation of the tool has been successful and that using WebLan-Designer may have a positive impact on student learning and comprehension.


Author(s):  
Nurul I. Sarkar ◽  
Krassie Petrova

Previous studies have shown that motivating students to learn about local area network (LAN) design can be difficult when presented in the traditional lecture format. To overcome this problem, a Web-based tool (“WebLan-Designer”) was developed as an aid in teaching and learning of LAN design at the introductory level. A WebLan-Designer provides a set of learning resources (tutorials, quizzes, network modeling, network design scenarios, key terms and definitions, and review questions and answers) and assists undergraduate students in learning the basics of both wired and wireless LAN design. The tool is Internet-based and can be accessed at any time so that students can study LAN design at their own pace and convenience. This flexible learning approach contributes positively to distance education and e-learning. The effectiveness of WebLan-Designer is evaluated both formally and informally; positive student and peer feedback indicates that the design and implementation of the tool has been successful and that using WebLan-Designer may have a positive impact on student learning and comprehension.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Prof. Nirav Halvadia ◽  
Prof. (Dr.) Ajay Joshi ◽  
Prof. Shekha Patel

E-governance system means the use of a range of modern Information and Communication Technologies (ICT) such as Internet, Local Area Network, and Mobiles etc, by Government to improve the effectiveness, efficiency, service delivery and to promote democracy. Gujarat is a frontline state in the implementation of e-governance policies & projects and setting up of key infrastructure for e-governance. This article deals with role of Gujarat egovernance system in improving Government to Government, Government to Citizen and Government to Business communication. This article also gives overview of system, E-governance system and benefits of.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2011 ◽  
Vol 55 (9) ◽  
pp. 2303-2314 ◽  
Author(s):  
Rafael Estepa ◽  
Antonio Estepa ◽  
Thiago Cupertino

2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Sign in / Sign up

Export Citation Format

Share Document