The Design and Research of Virtualization Platform

2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.

2019 ◽  
Author(s):  
alfin aswar

A computer network is a system consisting of computers that are designed to be able to shareresources (printers, CPUs), communicate (telephones, short messages), and can accessinformation (websites). The purpose of a computer network is to be able to achieve itsobjectives, every part of a computer network can request and provide services (service). Inalmost all computer network applications Parties who request / receive services are calledclients (clients) and those who provide / send services are called servers ( server). This design iscalled a client-server system. Networks are divided into 2 types based on their transmissionmedia, namely: 1. wired network and 2. wireless network. Wired Network is a data transmissionmedium used in this network in the form of cables and wireless networks that do not use cableinstead of using electromagnetic waves as the main transmission media.


2017 ◽  
Vol 4 (2) ◽  
pp. 55-70
Author(s):  
Suyanto Suyanto ◽  
Melisa Risanjani

ABSTRAKThe utilization of computer network technology as a medium of communication of data is currently increasing. The need for the use of shared resources that exist in both hardware and software network has resulted in the incidence of various technological development network itself. Along with the increasing level of needs and the growing number of network users who want a form a network that cal deliver maximum results both in terms of efficiency as well as an increase in the security of the network itself.The task of the end of this writer did a variety of research. The stage of this research, looking for gather what is required to the configuration of Inter Virtual Local Area Network using OSPF routing. In addition to the research stage of the write also do a method of drafting the system, the method used is a method of PPDIOO. PPDIOO is the methodology developed by cisco system (cisco, 2005)Based on the desire, consummation hence efforts continue to be done by various parties. By utilizing a variety of techniques subnetting particularly, configuration, the use of routing OSPF and use of hardware better, another switches between the emergence of the concept of an area of Inter Virtual Network (Inter VLAN) that is expected to provide tissue that broader, large and better results than Local Area Network (LAN)


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Aditya Wisnu Pratama ◽  
Hero Wintolo ◽  
Yenni Astuti

Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.


2019 ◽  
Author(s):  
Dewi Puspita Sari ◽  
Henny vera ningsih

Koneksi merupakan suatu hal yang mendasar dalam suatu jaringan karena bila koneksi bermasalah, maka semua jenis aplikasi yang dijalankan melalui jaringan komputer tidak dapat digunakan. Cisco Packet Tracer dapat digunakan untuk simulasi yang mencerminkan gambaran dari koneksi jaringan komputer pada sistem jaringan yang digunakan. Paper ini merancang dua buah perancangan, yakni perancangan dengan topologi Star dari satu server menggunakan software Cisco Packet Tracer dan menghubungkan jaringan antar komputer. LAN tergolong jaringan komunikasi kecepatan tinggi dan sifatnya dipengaruhi oleh media transmisi bersama dengan topologi dan protokol yang digunakan. Topologi yang digunakan dalam jaringan yang terbentuk di SMK TARUNA PEKANBARU adalah topologi bintang atau star, dan Jaringan Local Area Network (LAN) yang ada pada SMK TARUNA PEKANBARU.


Author(s):  
Md. Anwar Hossain ◽  
Mahabuba Zannat

Computer network has become the most significant issue in our day to day life. Networking companies depend on the proper functioning and analysis of their networks for education, administration, communication, e-library, automation, etc. Mainly interfacing with the network is induced by one of the other user/users to share some data with them. So, this paper is about communication among users present at remote sites, sharing this same network UANS. UANS stands for the University Area Network Scenario. So in this work the network is designed using Cisco Packet Tracer. The paper describes how the tool can be used to develop a simulation model of the Pabna University of Science and Technology, Pabna, Bangladesh. The study provides into various concepts such as topology design, IP address configuration and how to send information in the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate the traffic generated by a different department.


2021 ◽  
Vol 5 (2) ◽  
pp. 16-20
Author(s):  
Isnaeni Zulkarnaen ◽  
Jannatun Aliyah

In the current era of globalization, technological developments are increasingly advanced, therefore human resources are required to be competent in various fields. To produce competent human resources. This study aims to design a computer network using a Cisco router switch at the West Nusa Tenggara Office of Information Communication and Statistics. The type of network designed refers to the LAN network (Local Area Network). This network design aims to facilitate IT personnel in completing work with stable and optimal signal strength with signals divided into each sub-sector. This research was conducted using qualitative methods by conducting direct observations in the field. The network development method used in this research is the NDLC (Network Development Life Cycle) method with the stages of analysis, design, simulation prototyping, implementation, monitoring, and management.


2013 ◽  
Vol 284-287 ◽  
pp. 3275-3279
Author(s):  
Jin Cherng Lin ◽  
Men Jue Koo ◽  
Cheng Sheng Wang

IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Sign in / Sign up

Export Citation Format

Share Document