scholarly journals Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network

2020 ◽  
Vol 2 (2) ◽  
pp. 61-66
Author(s):  
Yulia Dwi Noviani

Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.

Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 693
Author(s):  
Kvitoslava Obelovska ◽  
Olga Panova ◽  
Vincent Karovič

The performance of Wireless Local Area Network (WLAN) is highly dependent on the processes that are implemented in the Medium Access Control (MAC) sublayer regulated by the IEEE 802.11 standard. In turn, various parameters affect the performance of the MAC sublayer, the most important of which is the number of stations in the network and the offered load. With the massive growth of multimedia traffic, research of the network performance depending on traffic types is relevant. In this paper, we present the impact of a high-/low-priority traffic ratio on WLAN performance with different numbers of access categories. The simulation results show different impact of high-/low-priority traffic ratio on the performance of the MAC sublayer of wireless LANs depending on different network-sizes and on network conditions. Performance of the large network with two access categories and with the prevalent high-priority traffic is significantly higher than in the case of using four categories on the MAC sublayer. This allows us to conclude that the performance improvement of the large network with the prevalent high-priority traffic can be achieved by an adaptive adjustment of the access categories number on the MAC sublayer.


2021 ◽  
Vol 12 (06) ◽  
pp. 4750-4762
Author(s):  
Yakubu Ajiji Makeri ◽  
Giuseppe T. Cirella ◽  
Francisco Javier Galas ◽  
Hamid Mohsin Jadah ◽  
Adetayo Olaniyi Adeniran

2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


Author(s):  
Kannan Balasubramanian

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.


2021 ◽  
Vol 5 (2) ◽  
pp. 407-412
Author(s):  
Febrian Wahyu Christanto ◽  
April Firman Daru ◽  
Arif Kurniawan

Bandwidth problems are the most frequently encountered problems in sharing information traffic or internet access on computer networks. The factor that causes slow internet access is the large number of devices connected to the internet that are not matched by the availability of sufficient bandwidth and the lack of available bandwidth. This can be accommodated with bandwidth management methods. Bandwidth management in Mikotik uses several bandwidth sharing methods such as PCQ (Per Connection Queue), Queue Tree, and HTB (Hierchichal Token Bucket). This research uses 2 (two) bandwidth management methods, namely PCQ and Queue Tree because these methods can divide bandwidth automatically according to the number of active users and are more effective in sharing bandwidth based on Mikrotik. PCQ is a method aimed at optimizing QoS for large-scale internet networks where all queues are the same for all sub-streams, while Queue Tree is a method designed to carry out more complex queuing tasks for network traffic. The purpose of this research is to optimize the limited internet bandwidth so that it can be accessed by all users in the Local Area Network and automate the queue of devices connected to the network according to user needs so as to produce a more stable computer network performance using the network development method, namely NDLC. The results of the tests were carried out 10 times using a bandwidth of 10 Mbps which resulted in an average jitter of 1.64 ms, ping 36.8 ms, 2 Mbps throughput, and 0.1% packet loss so that the QoS of internet access was categorized as satisfactory. It is hoped that from this research the company will be able to save on internet access expenses by maximizing a small bandwidth without having to increase the existing bandwidth.  


2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


Sign in / Sign up

Export Citation Format

Share Document