To see the other types of publications on this topic, follow the link: Internet (computer network).

Journal articles on the topic 'Internet (computer network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet (computer network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
APA, Harvard, Vancouver, ISO, and other styles
3

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Full text
Abstract:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer networks and the internet as a medium for data and information communication. However, the computer and internet network systems at SMA Negeri 2 Bojonegoro have not been managed properly. The solution to improve the effectiveness of using and managing internet bandwidth at SMA Negeri 2 Bojonegoro is to design and implement network management with Mikrotik Router to make it easier for administrators to manage the network. This research uses the Network Development Life Cycle (NDLC) method as a method of developing computer network management at SMA Negeri 2 Bojonegoro. The results showed that the use of a network system using a Mikrotik router in managing internet bandwidth efficiently facilitates and facilitates various activities related to internet use.
APA, Harvard, Vancouver, ISO, and other styles
4

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Full text
Abstract:
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
6

M.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Full text
Abstract:
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 million Indians accessed the internet via any device. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Lock it down, protect it, and block hackers. This paper reveals the issues related to categories & impact of cyber crime, basic cyber laws, security threats and protection which are a warning alarm to internet users.
APA, Harvard, Vancouver, ISO, and other styles
7

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Full text
Abstract:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the internet. Mikrotik can maximize network usage if the overall bandwidth has been set.</p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: </em><em>Mikrotik, Computer Network, Router and Type Network</em><em></em></p>
APA, Harvard, Vancouver, ISO, and other styles
8

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Full text
Abstract:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase user mobility with computer network technology using cable media. Bandwidth management is a way to manage the internet network for even distribution of bandwidth usage even though many network users use it. Hierarchical token bucket (HTB) one method to do a bandwidth management in this HTB
APA, Harvard, Vancouver, ISO, and other styles
9

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Full text
Abstract:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing
APA, Harvard, Vancouver, ISO, and other styles
10

Zulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.

Full text
Abstract:
A computer network system is defined as a collection of several independent computers connected to each other. This connection allows these computers to share information and programs with each other (Putuasduki, 2021). SOHO stands for Small Office, Home Office. SOHO is a hybrid apartment between residential and commercial space, where people can work and live in the same building. SOHO apartments are typically loft style, meaning they have high ceilings. High ceilings lend themselves well to building a mezzanine, an elevated area accessible by stairs that can be used as a bedroom or desk. (Armee et al., 2022). Mikrotik is a software-based operating system that turns a computer into a network router (Gamaliel and Arliyanto, 2022). This operating system is ideal for managing computer networks, such as building large or small computer network systems. (Putra et al., 2020). Gajah Putih University Faculty of Engineering always needs a very large network connection. In addition, many students use an internet connection. Difficulties in optimizing network use and equalizing bandwidth between students and faculties, internet network problems and difficulties in monitoring network users at the Gajah Putih Faculty of Engineering and students still asking for web searches off campus are the biggest problems. this lesson. For that we need a learning environment that can support the learning process in the field of computer networks. This study discusses learning media to build computer networks in small offices and home offices by using a proxy server, starting from the basic concept of computer networks so that the network can function properly. Network Development Life Cycle Model (NDLC). Flow Network Development Lifecycle Diagram Continuous process analysis is a step by step process that describes the journey of data or documents through ongoing processes in all research locations. The network topology that was operated at the Faculty of Engineering, University of Gajah Putih before using a proxy server is shown in Figure 2. Meanwhile, the network topology that was operated before using a proxy server in the laboratory of the Faculty of Engineering, University of Gajah Putih can be determined from the results of research and design of the home office network of the Faculty of Engineering, Gajah Putih University Using a proxy allows it to be concluded that with the help of the home office network of the Faculty of Technology, University of Gajah Putih using a proxy server technically students can easily access the internet for free and the signal in the university building can be easily closed. The security system used in this wireless network (base station) is implemented on the server. Therefore, if you want to use the Internet, the user must enter a username and password. This network uses a DHCP server so that the server distributes IP addresses as wide as possible resulting in long loading times when many users are active. Sharing Internet bandwidth with a proxy server enables efficient use of Internet bandwidth. By using a proxy server with Winbox, IT administrators can perform network configuration more easily.
APA, Harvard, Vancouver, ISO, and other styles
11

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
12

Ariyadi, Tamsir, Timur Dali Purwanto, and Muhamad Malik Fajar. "IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA." JURNAL ILMIAH INFORMATIKA 11, no. 02 (September 5, 2023): 189–95. http://dx.doi.org/10.33884/jif.v11i02.8032.

Full text
Abstract:
In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes.
APA, Harvard, Vancouver, ISO, and other styles
13

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Full text
Abstract:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The article presents several models for organizing bridges: a centralized network bridge on the side of a router and client computer, a distributed bridging system, and a dedicated bridge. Based on the accomplished analysis, it is recommended to use a centralized model for a network that has to comply with more stringent reliability requirements. If there is a need to have simultaneous access to several automation devices and high data exchange rates, a distributed model should be used. A dedicated bridge is used only in special cases, for example, when a high compactness is required in implementing a monitoring system.
APA, Harvard, Vancouver, ISO, and other styles
14

Sitanggang, Andri Sahata, R. Fenny Syafariani, Novrini Hasti, Febilita Wulan Sari, and Dhara Pasya. "LAN network architecture design at Nurul Jalal Islamic Boarding School, North Jakarta." International Journal of Advances in Applied Sciences 13, no. 1 (March 1, 2024): 123. http://dx.doi.org/10.11591/ijaas.v13.i1.pp123-133.

Full text
Abstract:
A computer network is a telecommunications network that allows computers to communicate with each other by exchanging data. At Nurul Jalal Islamic Boarding School, they have taken advantage of advances in computer network technology, but have not been fully connected properly. Therefore, in this research, a local area network (LAN) network architecture that is connected to speedy internet will be built and developed. The design of this network architecture includes designing a connection to the internet speedy network and designing a computer lab architecture that is connected to the network at the Nurul Jalal Islamic Boarding School. This study aims to design the existing technology with the system and add technologies and systems that do not yet exist so that they can be integrated into a computer network connected to the speedy internet network. It is hoped that this research will help teachers and students of Nurul Jalal Islamic Boarding School in exploring information so that it can help effective and efficient learning.
APA, Harvard, Vancouver, ISO, and other styles
15

Magnaye, Nicko A. "Advancements in computer network technologies: A review." Metaverse 5, no. 1 (April 25, 2024): 2315. http://dx.doi.org/10.54517/m.v5i1.2315.

Full text
Abstract:
<p>This article presents a comprehensive review of recent advancements in computer network technologies, emphasizing their impact on various sectors. The rapid evolution of computer networks has transformed communication, work, and business. From 5G networks and the Internet of Things (IoT) to network security and quantum networking, this review explores the current state of computer networks and their prospects.<strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
16

Afrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Full text
Abstract:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6
APA, Harvard, Vancouver, ISO, and other styles
17

Mahmud, Mahmud, and Yarza Aprizal. "The Penerapan QoS (Quality Of Service) Dalam Menganalisis Kualitas Kinerja Jaringan Komputer (Studi Kasus Hotel Maxone Palembang)." Journal of Information System Research (JOSH) 3, no. 4 (July 31, 2022): 374–79. http://dx.doi.org/10.47065/josh.v3i4.1567.

Full text
Abstract:
MaxOne Hotel Palembang has a computer network that connects every device. A good network is reflected in the quality provided to its users. Computer networks and the internet become a necessity that can’t be separated when MaxOne Palembang Hotel runs its business processes, of course this results in higher tasks received by the network, therefore activities are needed to ensure the quality of the computer network network at MaxOne Hotel Palembang. This research applies the steps of action research method by applying the calculation of Quality of Service (QoS) with 4 (four) parameters, They are Throughput, Packet Loss, Delay and Jitter with Wireshark as a tool for measurement. After the measurement results are obtained, they will be compared with the quality standards of the computer networks its Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON). The results of this research show the average throughput is 81.76%, packet loss is 2%, Delay is 0.432 ms, Jitter is 0.42 ms. The conclusion is the quality of the computer network and internet at the MaxOne Hotel Palembang from all the parameters used shows an index of 3.81 which means it is very satisfying.
APA, Harvard, Vancouver, ISO, and other styles
18

Mulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.

Full text
Abstract:
The development of computer networks is so fast along with technological developments. IPv6 is a new type of IP addressing as a successor to the IPv4 type. This study uses the type of network configuration using IPv6.The application of IPv6 in this computer network configuration is to prove that IPv6 can be used to replace IPv4 in building computer networks. The method used in this research is to conduct a trial with one of the computer network simulation software, namely Cisco Packet Tracer from a network topology that has been designed. This research was carried out through 5 stages as follows: making network design, analysis of network device requirements, conceptual analysis of configuration requirements, software network configuration and network connectivity tests. IPv6 can be used to build networks from the simplest to complex networks including LAN networks. The test results of the two network topology experiments made can be configured using IPv6 and it is proven that all computers connected to the network are all connected (100%) after the connectivity test using the ping utility. IPv6 is recommended to be used along with the increasing use of telecommunications equipment that requires an internet connection.
APA, Harvard, Vancouver, ISO, and other styles
19

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Full text
Abstract:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
APA, Harvard, Vancouver, ISO, and other styles
20

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Full text
Abstract:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.
APA, Harvard, Vancouver, ISO, and other styles
21

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO, and other styles
22

Armanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.

Full text
Abstract:
ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover
APA, Harvard, Vancouver, ISO, and other styles
23

Subhi, Doaa, and Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network." Condensed Matter 8, no. 1 (February 23, 2023): 24. http://dx.doi.org/10.3390/condmat8010024.

Full text
Abstract:
Computer networks consist of millions of nodes that need constant protection because of their continued vulnerability to attacks. Classical security methods for protecting such networks will not be effective enough if quantum computers become widespread. On the other hand, we can exploit the capabilities of quantum computing and communications to build a new quantum communication network. In this paper, we focused on enhancing the performance of the classical client–server Internet application. For this sake, we introduced a novel Internet of Things (IoT) quantum network that provides high security and Quality of Service (QoS) compared with the traditional IoT network. This can be achieved by adding quantum components to the traditional IoT network. Quantum counterpart nodes, channels, and servers are used. In order to establish a secure communication between the quantum nodes and the quantum server, we defined a new Communication Procedure (CP) for the suggested IoT quantum network. The currently available quantum computer has a small qubit size (from 50 to 433 qubits). The proposed IoT quantum network allows us to overcome this problem by concatenating the computation efforts of multiple quantum nodes (quantum processors).
APA, Harvard, Vancouver, ISO, and other styles
24

Adhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.

Full text
Abstract:
With the increasing popularity of cryptocurrency (cryptocurrency) causing high crypto mining activity, crypto mining requires large resources so that many cybercriminals carry out illegal activities by stealing access to other people's computers to be used to mine cryptocurrencies (cryptojacking), this can interfere with the performance of a computer if the computer is used illegally without the knowledge of the computer owner, apart from that crypto mining also runs by utilizing the internet network, CPU usage and the power source from the victim's computer, for this reason this research will implement software as service (Saas) services from Cloudflare zero trust that can detect and anticipate cryptojacking activities on the internet network in order to anticipate attacks, Cloudflare zero trust will be installed on the network using the MikroTik routerboard intermediary, besides that the author will conduct an attack trial (penetrator si testing) by carrying out crypto mining activities on computers in a network and analyzing whether Cloudflare Zero Trust is able to detect and anticipate these attacks.
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.

Full text
Abstract:
Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a preventive measure and important countermeasures.Twenty-first Century is the era of information and technology, as an important channel of acquiring knowledge and information and a wide platform of all kinds of cultural dissemination and communication, network has played a positive role in promoting the exchange of social information, making personal interaction convenient, promoting social and economic development. Along with the rapid development and maturity of the campus network, network activity has become one of college students’ daily activities, and made a profound effect on students in all aspects.
APA, Harvard, Vancouver, ISO, and other styles
26

Husna, Muhammad Aliyul, and Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.

Full text
Abstract:
The network administrator is a person who is responsible for managing computer networks. One of the duties of a network administrator is network monitoring because errors on the server and services running on the server cannot be known when it happened. This can be difficult if the administrator is far from a surveillance center. A network Monitoring System is a system that helps Network Administrators in supervising and managing computer networks that exist in an agency. By using the system that will be implemented in this research, the computer network monitoring process can be monitored remotely, anywhere and anytime as long as it is connected to the Internet network. With this Network Monitoring System, it is hoped that in the long term PT Cyber Network Indonesia can implement an integrated and well-monitored Internet network system. Test results using Network Monitoring Zabbix, generate real-time data regarding bandwidth usage, problem logs and resource availability.
APA, Harvard, Vancouver, ISO, and other styles
27

Filimonova, N. A., and S. I. Rakin. "Calculation of Data Flow in Local Computer Networks. Combined (Experimental + Computer Simulation) Approach." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (March 17, 2023): 32–42. http://dx.doi.org/10.37394/23204.2023.22.3.

Full text
Abstract:
In the present paper, we consider a model that can be described as a “users – network applications” in local networks. The characteristic scales of the model are: the number of users up to 1024, time of events from several seconds to hours, the transmitted data volume –10-10000Kb. This scale rise to a new model that appears between the packet-level and the global Internet level models. We introduce the no-tion of the elementary data flow from an Internet service and from a peer. By using these notions, we develop the “metrology” approach to the modeling of data flow in local networks. Examples are present-ed.
APA, Harvard, Vancouver, ISO, and other styles
28

Hart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Full text
Abstract:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningful after only a short time. Advisors who learn the terms and concepts enabling them to communicate via computer effectively will discover much of value in the world of computer-mediated communications.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.

Full text
Abstract:
With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .
APA, Harvard, Vancouver, ISO, and other styles
30

Bamgbose, Augustine Adeoye. "Internet adoption in select Nigeria university libraries." Information Impact: Journal of Information and Knowledge Management 14, no. 2 (January 9, 2024): 16–33. http://dx.doi.org/10.4314/iijikm.v14i2.2.

Full text
Abstract:
The paper examined the Internet adoption in Nigerian university library with emphasis on the extent to which computer networks aid the use of the internet to obtain academic information within the university library. It also determined the extent at which students use the internet to obtain academic information within the university library and to determine the cost, labour and maintenance of Internet adoption in the university library. A descriptive survey design was employed and the convenience sampling method was employed to select 132 samples for analysis. The analytical tools employed are simple percentages, frequency counts, Pearson Correlation and regression analysis via the Statistical Package for the Social Sciences (SPSS). The findings revealed that Local Area Network, Wide Area Network, Internet, Campus Area Network, and Networks were the existing computer networks available in selected Nigerian university libraries. The information services provided using internet include; digital library/ repositories, searching library data, searching scholarly content, file storage, building community power and library automation. The paper recommended that university libraries should be proactive. More academic research could only be achieved with effective internet adoption and integration into university libraries.
APA, Harvard, Vancouver, ISO, and other styles
31

Carius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling, and Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life." Conjecturas 21, no. 5 (November 18, 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.

Full text
Abstract:
From personal computers with internet access from a fixed location to today's smartphones with personalized internet access anywhere, behavioral changes resulting from technological advances accumulate daily. With the COVID-19 pandemic and the expansion of the home office, home education, telemedicine, among countless other activities developed remotely because of social distancing, the internet has become a unique space in activities in which it did not play such a role before. Given this emergency and historical scenario, the present work aims to assess the social impact of a resilience solution for computer networks, based on the continuous need for internet connection in present society. The device in question maintains the internet connection, considering that serious failures can occur in the main network, through a prototype that foresees problems in this network and anticipates it, presenting a solution so that the user does not notice connection failures. Considering such a device, it is intended to evaluate its impact on the well-being of the customer who acquires it, according to the connection needs of different groups. Therefore, exploratory research is described since the impact on the clients' well-being was not studied in previous analyses. For the design of this research, it is understood that a survey-type survey is indicated, as it is intended, through questionnaires with Likert-type scales and short open questions, to capture the different needs and reactions in different social groups, chosen according to the need for internet access. This work, however, analyzes a case study in a focus group, in a home office, from the perspective of the importance of a resilience device in computer networks as a promoter of the personal well-being of individuals participating in the research. At the end of this study, we intend to answer the following research question: "Does resilience in computer networks influence the well-being of individuals who use it?"
APA, Harvard, Vancouver, ISO, and other styles
32

Raharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.

Full text
Abstract:
The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks
APA, Harvard, Vancouver, ISO, and other styles
33

Zhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Full text
Abstract:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining equipment and DNC system can be easily with the CAD/CAM/CAE system, digital profile measurement system, fault diagnosis and error compensation of intelligent system integration, providing good technical conditions for further information of various advanced manufacturing environment integration.
APA, Harvard, Vancouver, ISO, and other styles
34

Odhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (December 4, 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Full text
Abstract:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to develop a software-based computer architecture on which Agents execution could be explored. The combination of Intelligent Agents and HYDRA computer architecture gave rise to a new computer concept: the NET-Computer in which the comput­ing resources reside on the Internet. The Internet computers form the hardware and software resources, and the user is provided with a simple interface to access the Internet and run user tasks. The Agents autonomously roam the Internet (NET-Computer) executing the tasks. A growing segment of the Internet is E-Commerce for online shopping for products and services. The Internet computing resources provide a marketplace for product suppliers and consumers alike. Consumers are looking for suppliers selling products and services, while suppliers are looking for buyers. Searching the vast amount of information available on the Internet causes a great deal of problems for both consumers and suppliers. Intelligent Agents executing on the NET-Computer can surf through the Internet and select specific information of interest to the user. The simulation results show that Intelligent Agents executing HYDRA computer architecture could be applied in E-Commerce.
APA, Harvard, Vancouver, ISO, and other styles
35

Yuliana, Dela, and I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 2 (November 24, 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.

Full text
Abstract:
Technological developments are very beneficial for the world of education, such as the use of the internet in finding and managing information and can help in the teaching and learning process. Before using the internet, there was a computer network that played an important role in it. In building a computer network, a concept or method is needed in designing it, and here the PPDIOO method will be used and uses two types of network topologies, namely star and ring topologies. With the design of this computer network, it can help schools in the teaching and learning process and can improve the quality of teaching, the quality of knowledge and the quality of the abilities of students and teachers. Keywords: Education, Technology, Computer Networks, PPDIOO Method, Network Topology
APA, Harvard, Vancouver, ISO, and other styles
36

Dzulfikar, Mohammad, Anton Anton, and Fitra Septia Nugraha. "IMPLEMENTATION OF SHARED INTERNET SERVICE COMPUTER NETWORK (RT/RW NET) HOME.NET." Journal of Information System, Informatics and Computing 7, no. 1 (June 19, 2023): 36. http://dx.doi.org/10.52362/jisicom.v7i1.1050.

Full text
Abstract:
The home.net network in pademangan II Gg. 15 North Jakarta is being built to meet the needs of the local community's internet network at low cost. When building an internet network the author uses a Mikrotik Router with a firewall network setting method. The author uses the firewall method so that internet network security will be safe. The internet network is currently experiencing problems in managing user bandwidth which results in unbalanced bandwidth between clients when used together. This study discusses bandwidth management for home.net network users based on the priority value of each user, which varies according to their needs. By using the internet network firewall can be controlled. The results achieved were that before bandwidth management was used, the speed on the network was 46.2 Mbps. After using the speed on the network will be reduced to 1360.3kbps.
APA, Harvard, Vancouver, ISO, and other styles
37

Wan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Full text
Abstract:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
APA, Harvard, Vancouver, ISO, and other styles
38

Tedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.

Full text
Abstract:
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers that use windows operating system. Computers that have been infected wannacry will make all existing data in the computer hard drive becomes encrypted, so the user can not open the data that has been infected with the virus.To solve the problem then it is proposed Design of Malware Detection and Prevention System Using Unified Modeling Language (UML). This system is designed using Router, Server, and SMS Gateway. Router is used for network configuration. The server is used for WEB-based storage systems that serve to detect ports. SMS Gateway is used to send SMS to the network admins. With the proposed system is expected to help detect the presence of malware that goes through the router, so that the system will automatically send notification of malware via SMS
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Full text
Abstract:
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
41

Huang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 3 (June 26, 2024): p13. http://dx.doi.org/10.22158/sssr.v5n3p13.

Full text
Abstract:
The application of artificial intelligence (AI) technology in computer network technology is becoming increasingly extensive and in-depth. This paper analyzes the application of artificial intelligence in network security, network management, Internet of Things, edge computing and network services in detail. In network management, AI technology realizes network traffic optimization, automatic configuration and fault prediction, and improves the efficiency of network management. In the field of Internet of Things, AI technology helps manage and analyze a large amount of device data, supporting the development of smart homes and smart cities. In edge computing, AI technology enhances the data processing capabilities of edge nodes and reduces latency. In network services, artificial intelligence technology optimizes routing, voice recognition and personalized recommendation services. However, the application of artificial intelligence in network technology also faces challenges such as data privacy, computing resources and laws and regulations. This paper aims to provide a comprehensive reference for industry insiders to promote the application and development of artificial intelligence technology in computer networks.
APA, Harvard, Vancouver, ISO, and other styles
42

Huang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 2 (June 26, 2024): p191. http://dx.doi.org/10.22158/sssr.v5n2p191.

Full text
Abstract:
The application of artificial intelligence (AI) technology in computer network technology is becoming increasingly extensive and in-depth. This paper analyzes the application of artificial intelligence in network security, network management, Internet of Things, edge computing and network services in detail. In network management, AI technology realizes network traffic optimization, automatic configuration and fault prediction, and improves the efficiency of network management. In the field of Internet of Things, AI technology helps manage and analyze a large amount of device data, supporting the development of smart homes and smart cities. In edge computing, AI technology enhances the data processing capabilities of edge nodes and reduces latency. In network services, artificial intelligence technology optimizes routing, voice recognition and personalized recommendation services. However, the application of artificial intelligence in network technology also faces challenges such as data privacy, computing resources and laws and regulations. This paper aims to provide a comprehensive reference for industry insiders to promote the application and development of artificial intelligence technology in computer networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Ramli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.

Full text
Abstract:
Distributed Denial of Service (DDoS) is a type of active attack, an attack that can overwhelm a system by flooding a computer or server with network traffic, disrupting user services. The goal of this attack is usually to disable services and disconnect from the compromised­­­­­­­­ computer or network. The impact is very large for companies or agencies that offer services. Victims of these attacks are unable to provide the services they are supposed to. Due to a bug or constraint on the server you are trying to use and one of the ways to deal with these attacks is to use a computer network firewall, which is useful for protecting computers from various outer space attacks. If the computer has a firewall security system, it is likely that no one on the Internet can access the data on the connected computer or web server. Firewall, works like a partition or wall that blocks the computer from the Internet. This "firewall" allows you to control what data, information, and activity can be transferred from the Internet to your computer and vice versa. With better data security and can avoid DDOS attacks that want to be carried out by irresponsible parties.
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research." Advanced Materials Research 989-994 (July 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.

Full text
Abstract:
If we apply the system internal elements as nodes, and the relationship between the elements as connection, then the system form a network. If we put emphasis on the structure of the system and analyze the function of the system from the angle of structure, we’ll find that real network topology properties differ from previous research network, and has numerous nodes, which is called complex networks. In the real word, many complex systems can be basically described by the network, while the reality is that complex systems can be called as “complex network”, such as social network, transportation network, power grids and internet etc. In recent years, many articles about the complex networks are released in the international first-class publications such as Nature, PRL, PNAS, which reflects that the complex networks has become a new research focus.
APA, Harvard, Vancouver, ISO, and other styles
45

Sheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.

Full text
Abstract:
Abstract: Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network security is becoming progressively diverse and complex, and as a matter of fact, completely different ways are being devised to exploit it. Network engineers got to sustain with recent advances in each hardware and software package field to forestall them from being employed, together with user information. Historically, solely mobile computers and phones were connected to the internet; however, with the advancement of technology, other items such as security cameras, microwaves, automobiles, and industrial machinery are all now connected to the internet. The web of stuff is the term given to this network of interconnected things. Prime Securities for the Web of Things are involved[1]. This paper gives detailed information on cyber security and crime as little more than a result. It addresses forms of cyber security, the need for cyber security, issues regarding cyber security, benefits and drawbacks, criminal background, and criminal offenses. Keywords: Computer Security, Internet, Protection, Application software, IP network, Exploits, Malware Threats, Virus, IoT, Network Security, Computer Network, Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
46

Saputro, Bagus Aji. "Network Security Analysis and Bandwidth Management." International Journal of Science, Engineering and Information Technology 5, no. 02 (July 27, 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.

Full text
Abstract:
Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.
APA, Harvard, Vancouver, ISO, and other styles
47

Howard, Matthew D. "Network security (and the internet)." International Journal of Network Management 5, no. 6 (November 1995): 296–304. http://dx.doi.org/10.1002/nem.4560050604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Full text
Abstract:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identification keys. This will make content management easier. It will generate revenue for the person who takes the copyrighted picture. A watermark is an embedded signature in a thing. It could be embedded in a video, image, and other file types for distinction and marking for ownership. It could be visible or invisible. It also provides a means to trace a product to the owner. This work looks into how images with watermark can be connected to the IoT for tracking and fighting piracy.
APA, Harvard, Vancouver, ISO, and other styles
50

Qian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.

Full text
Abstract:
In this paper, we present a novel DC-centric architecture of telecommunication networks for next generation Internet. Data flow become the major traffic in existing telecommunication networks. Traditional computer networks and telecom networks meet many challenges in high-quality service, innovation, evolution, and management. Based on analysis existing telecom networks’ challenges, a DC-centric telecom network architecture with splitting the data plane from the control plane is proposed. The DC-centric telecom network is a widely-distributed data center network (DCN), which is composed of thousands of public or private DCs. Each DC not only plays the role of storage and computing, but also is a network node of data aggregation, switching, and routing. We also design an optical switching, which is evaluated by experiment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography