To see the other types of publications on this topic, follow the link: Internet (computer network).

Journal articles on the topic 'Internet (computer network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet (computer network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
APA, Harvard, Vancouver, ISO, and other styles
2

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each compu
APA, Harvard, Vancouver, ISO, and other styles
3

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Full text
Abstract:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer netwo
APA, Harvard, Vancouver, ISO, and other styles
4

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Full text
Abstract:
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
6

M.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Full text
Abstract:
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 m
APA, Harvard, Vancouver, ISO, and other styles
7

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Full text
Abstract:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the int
APA, Harvard, Vancouver, ISO, and other styles
8

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Full text
Abstract:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase u
APA, Harvard, Vancouver, ISO, and other styles
9

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Full text
Abstract:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
APA, Harvard, Vancouver, ISO, and other styles
10

Zulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.

Full text
Abstract:
A computer network system is defined as a collection of several independent computers connected to each other. This connection allows these computers to share information and programs with each other (Putuasduki, 2021). SOHO stands for Small Office, Home Office. SOHO is a hybrid apartment between residential and commercial space, where people can work and live in the same building. SOHO apartments are typically loft style, meaning they have high ceilings. High ceilings lend themselves well to building a mezzanine, an elevated area accessible by stairs that can be used as a bedroom or desk. (Ar
APA, Harvard, Vancouver, ISO, and other styles
11

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
12

Ariyadi, Tamsir, Timur Dali Purwanto, and Muhamad Malik Fajar. "IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA." JURNAL ILMIAH INFORMATIKA 11, no. 02 (September 5, 2023): 189–95. http://dx.doi.org/10.33884/jif.v11i02.8032.

Full text
Abstract:
In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this netw
APA, Harvard, Vancouver, ISO, and other styles
13

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Full text
Abstract:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The arti
APA, Harvard, Vancouver, ISO, and other styles
14

Sitanggang, Andri Sahata, R. Fenny Syafariani, Novrini Hasti, Febilita Wulan Sari, and Dhara Pasya. "LAN network architecture design at Nurul Jalal Islamic Boarding School, North Jakarta." International Journal of Advances in Applied Sciences 13, no. 1 (March 1, 2024): 123. http://dx.doi.org/10.11591/ijaas.v13.i1.pp123-133.

Full text
Abstract:
A computer network is a telecommunications network that allows computers to communicate with each other by exchanging data. At Nurul Jalal Islamic Boarding School, they have taken advantage of advances in computer network technology, but have not been fully connected properly. Therefore, in this research, a local area network (LAN) network architecture that is connected to speedy internet will be built and developed. The design of this network architecture includes designing a connection to the internet speedy network and designing a computer lab architecture that is connected to the network a
APA, Harvard, Vancouver, ISO, and other styles
15

Magnaye, Nicko A. "Advancements in computer network technologies: A review." Metaverse 5, no. 1 (April 25, 2024): 2315. http://dx.doi.org/10.54517/m.v5i1.2315.

Full text
Abstract:
<p>This article presents a comprehensive review of recent advancements in computer network technologies, emphasizing their impact on various sectors. The rapid evolution of computer networks has transformed communication, work, and business. From 5G networks and the Internet of Things (IoT) to network security and quantum networking, this review explores the current state of computer networks and their prospects.<strong></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
16

Afrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Full text
Abstract:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address con
APA, Harvard, Vancouver, ISO, and other styles
17

Mahmud, Mahmud, and Yarza Aprizal. "The Penerapan QoS (Quality Of Service) Dalam Menganalisis Kualitas Kinerja Jaringan Komputer (Studi Kasus Hotel Maxone Palembang)." Journal of Information System Research (JOSH) 3, no. 4 (July 31, 2022): 374–79. http://dx.doi.org/10.47065/josh.v3i4.1567.

Full text
Abstract:
MaxOne Hotel Palembang has a computer network that connects every device. A good network is reflected in the quality provided to its users. Computer networks and the internet become a necessity that can’t be separated when MaxOne Palembang Hotel runs its business processes, of course this results in higher tasks received by the network, therefore activities are needed to ensure the quality of the computer network network at MaxOne Hotel Palembang. This research applies the steps of action research method by applying the calculation of Quality of Service (QoS) with 4 (four) parameters, They are
APA, Harvard, Vancouver, ISO, and other styles
18

Mulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.

Full text
Abstract:
The development of computer networks is so fast along with technological developments. IPv6 is a new type of IP addressing as a successor to the IPv4 type. This study uses the type of network configuration using IPv6.The application of IPv6 in this computer network configuration is to prove that IPv6 can be used to replace IPv4 in building computer networks. The method used in this research is to conduct a trial with one of the computer network simulation software, namely Cisco Packet Tracer from a network topology that has been designed. This research was carried out through 5 stages as follo
APA, Harvard, Vancouver, ISO, and other styles
19

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Full text
Abstract:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
APA, Harvard, Vancouver, ISO, and other styles
20

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Full text
Abstract:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs
APA, Harvard, Vancouver, ISO, and other styles
21

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirement
APA, Harvard, Vancouver, ISO, and other styles
22

Armanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.

Full text
Abstract:
ABSTRACT
 The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experien
APA, Harvard, Vancouver, ISO, and other styles
23

Subhi, Doaa, and Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network." Condensed Matter 8, no. 1 (February 23, 2023): 24. http://dx.doi.org/10.3390/condmat8010024.

Full text
Abstract:
Computer networks consist of millions of nodes that need constant protection because of their continued vulnerability to attacks. Classical security methods for protecting such networks will not be effective enough if quantum computers become widespread. On the other hand, we can exploit the capabilities of quantum computing and communications to build a new quantum communication network. In this paper, we focused on enhancing the performance of the classical client–server Internet application. For this sake, we introduced a novel Internet of Things (IoT) quantum network that provides high sec
APA, Harvard, Vancouver, ISO, and other styles
24

Adhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.

Full text
Abstract:
With the increasing popularity of cryptocurrency (cryptocurrency) causing high crypto mining activity, crypto mining requires large resources so that many cybercriminals carry out illegal activities by stealing access to other people's computers to be used to mine cryptocurrencies (cryptojacking), this can interfere with the performance of a computer if the computer is used illegally without the knowledge of the computer owner, apart from that crypto mining also runs by utilizing the internet network, CPU usage and the power source from the victim's computer, for this reason this research will
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.

Full text
Abstract:
Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a pre
APA, Harvard, Vancouver, ISO, and other styles
26

Husna, Muhammad Aliyul, and Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.

Full text
Abstract:
The network administrator is a person who is responsible for managing computer networks. One of the duties of a network administrator is network monitoring because errors on the server and services running on the server cannot be known when it happened. This can be difficult if the administrator is far from a surveillance center. A network Monitoring System is a system that helps Network Administrators in supervising and managing computer networks that exist in an agency. By using the system that will be implemented in this research, the computer network monitoring process can be monitored rem
APA, Harvard, Vancouver, ISO, and other styles
27

Filimonova, N. A., and S. I. Rakin. "Calculation of Data Flow in Local Computer Networks. Combined (Experimental + Computer Simulation) Approach." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (March 17, 2023): 32–42. http://dx.doi.org/10.37394/23204.2023.22.3.

Full text
Abstract:
In the present paper, we consider a model that can be described as a “users – network applications” in local networks. The characteristic scales of the model are: the number of users up to 1024, time of events from several seconds to hours, the transmitted data volume –10-10000Kb. This scale rise to a new model that appears between the packet-level and the global Internet level models. We introduce the no-tion of the elementary data flow from an Internet service and from a peer. By using these notions, we develop the “metrology” approach to the modeling of data flow in local networks. Examples
APA, Harvard, Vancouver, ISO, and other styles
28

Hart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Full text
Abstract:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningf
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.

Full text
Abstract:
With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .
APA, Harvard, Vancouver, ISO, and other styles
30

Bamgbose, Augustine Adeoye. "Internet adoption in select Nigeria university libraries." Information Impact: Journal of Information and Knowledge Management 14, no. 2 (January 9, 2024): 16–33. http://dx.doi.org/10.4314/iijikm.v14i2.2.

Full text
Abstract:
The paper examined the Internet adoption in Nigerian university library with emphasis on the extent to which computer networks aid the use of the internet to obtain academic information within the university library. It also determined the extent at which students use the internet to obtain academic information within the university library and to determine the cost, labour and maintenance of Internet adoption in the university library. A descriptive survey design was employed and the convenience sampling method was employed to select 132 samples for analysis. The analytical tools employed are
APA, Harvard, Vancouver, ISO, and other styles
31

Carius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling, and Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life." Conjecturas 21, no. 5 (November 18, 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.

Full text
Abstract:
From personal computers with internet access from a fixed location to today's smartphones with personalized internet access anywhere, behavioral changes resulting from technological advances accumulate daily. With the COVID-19 pandemic and the expansion of the home office, home education, telemedicine, among countless other activities developed remotely because of social distancing, the internet has become a unique space in activities in which it did not play such a role before. Given this emergency and historical scenario, the present work aims to assess the social impact of a resilience solu
APA, Harvard, Vancouver, ISO, and other styles
32

Raharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.

Full text
Abstract:
The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic
APA, Harvard, Vancouver, ISO, and other styles
33

Zhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Full text
Abstract:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining eq
APA, Harvard, Vancouver, ISO, and other styles
34

Odhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (December 4, 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Full text
Abstract:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to
APA, Harvard, Vancouver, ISO, and other styles
35

Yuliana, Dela, and I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 2 (November 24, 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.

Full text
Abstract:
Technological developments are very beneficial for the world of education, such as the use of the internet in finding and managing information and can help in the teaching and learning process. Before using the internet, there was a computer network that played an important role in it. In building a computer network, a concept or method is needed in designing it, and here the PPDIOO method will be used and uses two types of network topologies, namely star and ring topologies. With the design of this computer network, it can help schools in the teaching and learning process and can improve the
APA, Harvard, Vancouver, ISO, and other styles
36

Dzulfikar, Mohammad, Anton Anton, and Fitra Septia Nugraha. "IMPLEMENTATION OF SHARED INTERNET SERVICE COMPUTER NETWORK (RT/RW NET) HOME.NET." Journal of Information System, Informatics and Computing 7, no. 1 (June 19, 2023): 36. http://dx.doi.org/10.52362/jisicom.v7i1.1050.

Full text
Abstract:
The home.net network in pademangan II Gg. 15 North Jakarta is being built to meet the needs of the local community's internet network at low cost. When building an internet network the author uses a Mikrotik Router with a firewall network setting method. The author uses the firewall method so that internet network security will be safe. The internet network is currently experiencing problems in managing user bandwidth which results in unbalanced bandwidth between clients when used together. This study discusses bandwidth management for home.net network users based on the priority value of each
APA, Harvard, Vancouver, ISO, and other styles
37

Wan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Full text
Abstract:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
APA, Harvard, Vancouver, ISO, and other styles
38

Tedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.

Full text
Abstract:
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers t
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Full text
Abstract:
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases t
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
41

Huang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 3 (June 26, 2024): p13. http://dx.doi.org/10.22158/sssr.v5n3p13.

Full text
Abstract:
The application of artificial intelligence (AI) technology in computer network technology is becoming increasingly extensive and in-depth. This paper analyzes the application of artificial intelligence in network security, network management, Internet of Things, edge computing and network services in detail. In network management, AI technology realizes network traffic optimization, automatic configuration and fault prediction, and improves the efficiency of network management. In the field of Internet of Things, AI technology helps manage and analyze a large amount of device data, supporting
APA, Harvard, Vancouver, ISO, and other styles
42

Huang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 2 (June 26, 2024): p191. http://dx.doi.org/10.22158/sssr.v5n2p191.

Full text
Abstract:
The application of artificial intelligence (AI) technology in computer network technology is becoming increasingly extensive and in-depth. This paper analyzes the application of artificial intelligence in network security, network management, Internet of Things, edge computing and network services in detail. In network management, AI technology realizes network traffic optimization, automatic configuration and fault prediction, and improves the efficiency of network management. In the field of Internet of Things, AI technology helps manage and analyze a large amount of device data, supporting
APA, Harvard, Vancouver, ISO, and other styles
43

Ramli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.

Full text
Abstract:
Distributed Denial of Service (DDoS) is a type of active attack, an attack that can overwhelm a system by flooding a computer or server with network traffic, disrupting user services. The goal of this attack is usually to disable services and disconnect from the compromised­­­­­­­­ computer or network. The impact is very large for companies or agencies that offer services. Victims of these attacks are unable to provide the services they are supposed to. Due to a bug or constraint on the server you are trying to use and one of the ways to deal with these attacks is to use a computer network fir
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research." Advanced Materials Research 989-994 (July 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.

Full text
Abstract:
If we apply the system internal elements as nodes, and the relationship between the elements as connection, then the system form a network. If we put emphasis on the structure of the system and analyze the function of the system from the angle of structure, we’ll find that real network topology properties differ from previous research network, and has numerous nodes, which is called complex networks. In the real word, many complex systems can be basically described by the network, while the reality is that complex systems can be called as “complex network”, such as social network, transportati
APA, Harvard, Vancouver, ISO, and other styles
45

Sheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.

Full text
Abstract:
Abstract: Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network s
APA, Harvard, Vancouver, ISO, and other styles
46

Saputro, Bagus Aji. "Network Security Analysis and Bandwidth Management." International Journal of Science, Engineering and Information Technology 5, no. 02 (July 27, 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.

Full text
Abstract:
Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement
APA, Harvard, Vancouver, ISO, and other styles
47

Howard, Matthew D. "Network security (and the internet)." International Journal of Network Management 5, no. 6 (November 1995): 296–304. http://dx.doi.org/10.1002/nem.4560050604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Full text
Abstract:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identificatio
APA, Harvard, Vancouver, ISO, and other styles
50

Qian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.

Full text
Abstract:
In this paper, we present a novel DC-centric architecture of telecommunication networks for next generation Internet. Data flow become the major traffic in existing telecommunication networks. Traditional computer networks and telecom networks meet many challenges in high-quality service, innovation, evolution, and management. Based on analysis existing telecom networks’ challenges, a DC-centric telecom network architecture with splitting the data plane from the control plane is proposed. The DC-centric telecom network is a widely-distributed data center network (DCN), which is composed of tho
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!