scholarly journals An Improved Computer Network Access Control using Free BSD PFSENSE: A Case Study of UMaT Local Area Network

2016 ◽  
Vol 6 (1) ◽  
pp. 23-27
Author(s):  
Akpah Sylvester ◽  
Michael Asante ◽  
Frimpong Twum
2020 ◽  
Vol 8 (2) ◽  
pp. 133
Author(s):  
Hero Wintolo ◽  
Amalia Farhati

Digital libraries have been widely applied in educational institutions in Indonesia as a complement conventional libraries. The purpose of this research is to know division computer network access at the Adisutjipto Intitute of Technology (STTA) library. The research method used is a qualitative method using Prepare Plan Design Implement Operate and Optimize (PPDIOO). The result research is that people who have internet access will not be able to enter the digital library network. Computer network users who want to access digital libraries must log into the computer network that provides digital books in the library using a Virtual Local Area Network (VLAN). Making this VLAN requires a computer network infrastructure in the form of a Local Area Network (LAN) and computer network equipment in the form of a switch that can be used to configure multiple VLANs in a LAN. Some of the existing services in the library are placed on one VLAN and the digital library is placed on another VLAN. From the test results, it can be seen that between computers that provide services in the library on VLAN 2 cannot communicate via the connecting network to VLAN 1 where the digital library with website based services will be located. This is evidenced by the ping command which generates request time out information. VLANs network in the STTA library have been able to provide support for plans to improve services to members and academicians in the form of a digital library. 


2020 ◽  
Vol 1 (2) ◽  
pp. 83
Author(s):  
Agung Tri Laksono ◽  
M. Alvian Habib Nasution

In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2017 ◽  
Vol 6 (2) ◽  
pp. 20-32
Author(s):  
MengMeng Zhao

This article outlines a case study in which the author employs a Raspberry Pi 3 miniature computer as a Digital Signage System, which can be managed from either laptop, smartphone or desktop computers. The author presents it as a case study that high school students (and their teachers) can follow, as a collaborative project that delivers a cost effective and flexible, digital signage system for their school. While it does not require any coding on their part, it presents an excellent use of ICT, by configuring multiple interrelated hardware and open software, in a school community setting, that would fit in with many contemporary digital technology curriculums.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


Sign in / Sign up

Export Citation Format

Share Document