scholarly journals Microcomputers big and little: Selecting a low-cost laboratory computer network

1978 ◽  
Vol 10 (2) ◽  
pp. 241-245 ◽  
Author(s):  
Evan L. Brown ◽  
Kenneth Deffenbacher
Talanta ◽  
1984 ◽  
Vol 31 (8) ◽  
pp. 565-571 ◽  
Author(s):  
R.L.A. Sing ◽  
Eric D. Salin

2018 ◽  
Vol 7 (2.15) ◽  
pp. 58
Author(s):  
Mohamad Nur Haziq Mohd Safri ◽  
Wan Nor Shuhadah Wan Nik ◽  
Zarina Mohamad ◽  
Mumtazimah Mohamad

In the past five decades, computer network has kept up growing with the increases of its complexity. In such situation, the management, monitoring and maintenance of such computer network requires special attention to ensure optimal network access capability is achieved. Wireless network traffic analysis is a process of recording, studying and analyzing packets in wireless network for network performance analysis purposes. In some cases, the quality of network access performance can be very low without knowing the actual problem. Therefore, in this paper, the performance of wireless network traffic is proposed to be analyzed by using a Raspberry Pi which further able to send an alert to network admin to lessen the downtime. Raspberry Pi is a low cost, a small and portable size of a computer board that can be used to plug-in to monitor, keyboard, mouse, pen drive, etc. In this project, a MyTraceroute (MTR) program is installed on the Raspberry Pi to capture the IP of the Access Point (AP) and show packets loss percentage in the network. The results will be saved in the form of text file and sent to network admin by using email. The solution proposed in this paper is able to support solution to a problem on efficient monitoring, managing and maintaining wireless network traffics.    


1990 ◽  
Vol 20 (1) ◽  
pp. 13-24 ◽  
Author(s):  
N. Wirth
Keyword(s):  

2011 ◽  
Vol 183-185 ◽  
pp. 1297-1301
Author(s):  
Bing Zhang ◽  
Tao Cheng

Since the 21st century, the rapid development of computer network technology has driven the new changes of all industries, of which institutes of higher education are the first to be affected, and a new revolution of methods of teaching and model of teaching has been started, namely, the wide application of modern educational technology. However, the new type model of teaching has suffered certain restrictions in the process of spread and exploitation due to the limitation of network access, and has not been fully utilized, which causes an unsatisfactory teaching effect. The expansion of network cabling requires a certain degree of economic strength, which is just generally deficient in all institutes of higher education. If depending on the wireless network infrastructure, we can connect variety of modern educational methods and network together under the premise of low cost investment so as to give full play to their important roles in teaching and create new mode of teaching for all institutes of higher education.


2017 ◽  
Vol 29 (6) ◽  
pp. 857-867 ◽  
Author(s):  
Miyeon Lee ◽  
Dong Il Yoo ◽  
Sungmin Kim

Purpose The purpose of this paper is to develop a relatively inexpensive and easily movable three-dimensional (3D) body scanner. Design/methodology/approach Multiple depth perception cameras and a turntable were used to form the hardware and a client-server computer network was used to control the hardware. Findings A portable and inexpensive yet quite accurate body scanner system has been developed. Research limitations/implications The turntable mechanism and semi-automatic model alignment caused some error. Practical implications This scanner is expected to facilitate the acquisition of 3D human body or garment data easily for various research projects. Social implications Many researchers might have an easy access to 3D data of large object such as body or whole garment. Originality/value Inexpensive yet expandable scanning system has been developed using readily available components.


2014 ◽  
Vol 1 (2) ◽  
Author(s):  
Syarif Hidayatulloh

Abstract - Data network secure is very important, especially if the data is secret. However, the refuge of the data is usually considered as unimportant thing and less monitored by the user. Because, the data security system is difficult to be applied by the user either in personal computer or in the company. It becomes more important to be applied when the data have been attacked or stolen. It is better for the user to anticipate before it’s too late. There are so many ways to protect data in a network computer. For instance, encryption, digital signature, firewall and so on. Some solutions can be applied to increase security system based on the needs of network. It is caused by other factors in the priority system secure such as performance, network specification, device specification, and the cost. IPsec is one of solution to increase the data computer network secure which is supporting many authentic and encryption methods. IPsec work by processing encryption the data before it has been sent automatically. Thus, although the data was successfully intercepted by a third, then the data would not be useful because the data has been encrypted. IPSec also check the data integrity and authenticity fromthe source. In addition, the more important is the ease of implementation does not require high system requirements and certainly low cost. So, the user can realize to apply the secure system immediately. Keywords: Network security, Data security, IPSec Abstrak - Keamanan lalu lintas data pada jaringan komputer sangatlah penting, terutama jika data bersifat rahasia. Namun keamanan data masih menjadi sesuatu hal yang dirasa kurang panting dan tidak mendapat perhatian dari pengguna komputer. Ini dikarenakan pengamanan data masih dirasakan sulit untuk diterapkan oleh penguna komputer baik pribadi ataupun diperusahaan. Pengamanan data mulai dianggap penting untuk diterapkan ketika telah terjadi penyerangan atau pencurian data. Ini tentunya Sudah terlambat Karena seharusnya kita sebagai pengguna berfikir cara pencegahan bukan mencegah setelah terjadi. Karena hal tersebut akan sangat merugikan. Banyak cara dalam pengamanan data pada sebuah jaringan komputer, misalnya enkripsi, digital signature, firewall dan masih banyak lagi. Beberapa solusi dapat diterapkan untuk meningkatkan keamanan dengan melihat kebutuhan yang sesuai dengan keadaan jaringan yang ada, itu disebabkan karena disamping keamanan yang kita prioritaskan ada faktor-faktor lain seperti Performa, spesifikasi Jaringan, spesifikasi perangkat dan biaya yang Perlu diperhatikan. IPSec merupakan salah satu solusi untuk meningkatkan keamanan data pada jaringan komputer yang mendukung banyak metode otentikasi dan enkripsi. IPSec bekerja dengan melakukan enkripsi pada paket data secara otomatis sebelum dikirimkan. Dengan demikian walaupun data berhasil disadap oleh pihak ketiga maka data tidak akan berguna karena data telah terenkripsi. IPSec pun memeriksa integritas data dan keaslian sumber pengirim. Dan yang lebih penting adalah kemudahan dalam implementasi dengan tidak memerlukan prasyarat sistem yang tinggi dan mahal. Sehingga penguna komputer bisa berfikir kembali untuk segera melakukan pengamanan data. Kata kunci: Keamanan jaringan, Keamanan data, IPSec.


Sign in / Sign up

Export Citation Format

Share Document