To see the other types of publications on this topic, follow the link: VLAN (Virtual Local Area Network).

Journal articles on the topic 'VLAN (Virtual Local Area Network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VLAN (Virtual Local Area Network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Full text
Abstract:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.
APA, Harvard, Vancouver, ISO, and other styles
2

Wintolo, Hero, and Amalia Farhati. "Pembagian jaringan komputer menggunakan virtual local area network guna mendukung perpustakaan digital." Jurnal Kajian Informasi & Perpustakaan 8, no. 2 (December 30, 2020): 133. http://dx.doi.org/10.24198/jkip.v8i2.25218.

Full text
Abstract:
Digital libraries have been widely applied in educational institutions in Indonesia as a complement conventional libraries. The purpose of this research is to know division computer network access at the Adisutjipto Intitute of Technology (STTA) library. The research method used is a qualitative method using Prepare Plan Design Implement Operate and Optimize (PPDIOO). The result research is that people who have internet access will not be able to enter the digital library network. Computer network users who want to access digital libraries must log into the computer network that provides digital books in the library using a Virtual Local Area Network (VLAN). Making this VLAN requires a computer network infrastructure in the form of a Local Area Network (LAN) and computer network equipment in the form of a switch that can be used to configure multiple VLANs in a LAN. Some of the existing services in the library are placed on one VLAN and the digital library is placed on another VLAN. From the test results, it can be seen that between computers that provide services in the library on VLAN 2 cannot communicate via the connecting network to VLAN 1 where the digital library with website based services will be located. This is evidenced by the ping command which generates request time out information. VLANs network in the STTA library have been able to provide support for plans to improve services to members and academicians in the form of a digital library.
APA, Harvard, Vancouver, ISO, and other styles
3

Jurnal, Redaksi Tim. "ANALISA DAN IMPLEMENTASI VTP DENGAN ETHERCHANNEL TYPE LACP." KILAT 7, no. 1 (December 3, 2018): 78–85. http://dx.doi.org/10.33322/kilat.v7i1.106.

Full text
Abstract:
LAN computer network (Local Area Network) has been widely known since the last decade. However, due to the proliferation of its use, the LAN computer network is changing scalability. This problem can be solved by using Virtual Local Area Network (VLAN) technology. VLANs can address scalability issues and can flexibly reset virtual LAN networks. Especially in the VLAN Trunking Protocol which can minimize the number of switches every time that passes through its VLAN path. So also on the Etherchannel membundle link between switches. In fact a computer network also requires a technology to meet the availability (availability) needs of data traffic. One technology that can meet the availability of data traffic needs is VTP and Etherchannel.
APA, Harvard, Vancouver, ISO, and other styles
4

Fahri, Muhamad, Andrew Fiade, and Hendra Bayu Suseno. "Simulasi Jaringan Virtual Local Area Network (VLAN) Menggunakan Pox Controller." JURNAL TEKNIK INFORMATIKA 10, no. 1 (January 22, 2018): 85–90. http://dx.doi.org/10.15408/jti.v10i1.6821.

Full text
Abstract:
ABSTRAK Keterbatasan LAN melahirkan sebuah teknologi VLAN yang memungkinkan adanya konfigurasi dari suatu jaringan komputer secara virtual (virtualisasi). Proses mencocokkan fleksibilitas virtualisasi server sulit dilakukan dengan switch tradisional, sebab logika kontrol untuk setiap switch terletak dalam logika switching yang sama. Software Defined Network (SDN) memisahkan control plane dari forwarding hardware. Migrasi logic control yang digunakan pada perangkat yang terintegrasi (misalnya switch ethernet) menjadi mudah diakses dan secara logis jaringan menjadi terpusat dalam hal pengendalian. Pada penelitian ini dilakukan simulasi jaringan VLAN menggunakan Pox controller sehingga dapat mengetahui hasil evaluasi jaringan VLAN menggunakan pox controller. Berdasarkan fase simulation, konfigurasi jaringan VLAN lebih ditekankan pada controller. Berdasarkan hasil pengujian nilai rata-rata jitter, pada jaringan VLAN menggunakan 2 buah switch nilai rata-rata Jitter sebesar 0,009 ms. Nilai rata-rata jitter tersebut lebih kecil dari nilai rata-rata jitter pada jaringan VLAN yang menggunakan 3 buah switch yaitu sebesar 0,027 ms. Sedangkan hasil pengujian nilai rata-rata packet loss memiliki nilai yang sama, yaitu 0%. Nilai rata-rata packet loss tersebut menunjukkan bahwa kedua skenario tersebut tidak terjadi kehilangan paket. ABSTRACT Limitations of the LAN gave birth to a VLAN technology that allows the configuration of a virtual computer network (virtualization). The process of matching server virtualisation flexibility is difficult with traditional switches, since the control logic for each switch lies in the same switching logic. Software Defined Network (SDN) separates the control plane from hardware forwarding. The migration logic controls used on integrated devices (eg ethernet switches) are easily accessible and logically the network becomes centralized in terms of control. In this research VLAN network simulation using Pox controller so that can know result of evaluation of VLAN network using pox controller. Based on the simulation phase, VLAN network configuration is more emphasized on the controller. Based on the results of testing the average value of Jitter, on the VLAN network using 2 pieces of the average value of Jitter value of 0.009 ms. The average value of Jitter is smaller than the average value of Jitter on a VLAN network using 3 switches of 0.027 ms. While the test results the average value of Packet Loss has the same value, ie 0%. The average value of Packet Loss indicates that both scenarios do not occur Packet Loss. How to Cite : Fahri, M. Fiade, A. Suseno, H.B. (2017). SIMULASI JARINGAN VIRTUAL LOCAL AREA NETWORK (VLAN) MENGGUNAKAN POX CONTROLLER. Jurnal Teknik Informatika, 10(1), 85-90. doi:10.15408/jti.v10i1.6821Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i1.6821
APA, Harvard, Vancouver, ISO, and other styles
5

Yoga, Bhaskara Budi, and Made Agung Raharja. "IMPLEMENTASI VLAN (VIRTUAL LOCAL AREA NETWORK) PADA RUMAH SAKIT MATA RAMATA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 7, no. 3 (March 17, 2019): 177. http://dx.doi.org/10.24843/jlk.2019.v07.i03.p07.

Full text
Abstract:
Rumah Sakit Mata Ramata merupakan rumah sakit mata yang masih dalam tahap pembangunan baik dari segi bangunan, teknis, maupun sistem. Penelitian ini akan membahas tentang pembangunan dari segi sistem pada jaringan rumah sakit ini dengan tujuan untuk mengoptimalkan komunikasi data pada rumah sakit ini nantinya ketika sudah mulai beroperasi. Penelitian ini berfokus untuk membahas tentang konfigurasi VLAN yang berperan penting dalam mengoptimalkan komunikasi data nantinya. VLAN merupakan suatu model jaringan yang membagi jaringan secara logikal kedalam beberapa VLAN yang berbeda. VLAN tidak terbatas pada kondisi fisik jaringan seperti pada LAN, VLAN dapat di konfigurasi secara virtual tanpa harus melihat kondisi peralatan, sehingga VLAN memiliki fleksibilitas di dalam pengaturan jaringan dan memudahkan administrator jaringan dalam membagi jaringannya sesuai dengan fungsi dan kebutuhan keamanan jaringan tersebut. Karena itu lah RS Mata Ramata sangat memerlukan VLAN dalam komunikasi data nantinya yang dimana selain menghemat tempat VLAN juga dapat menghemat biaya karena tidak perlu menggunakan banyak switch untuk keperluan jaringan pada Rumah Sakit ini.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Lian Feng. "Exploration and Practice for Virtual Local Area Network (VLAN) Technology." Applied Mechanics and Materials 241-244 (December 2012): 2299–302. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2299.

Full text
Abstract:
VLAN technology refers to the virtual local area network technology, which is classifyd into several network segments in logic through the internal devices of existing LAN, rather than physical location, so as to realize a computer network technology of virtual working group. This paper analyzes and studies on the generation, characteristics, and communication method of VLAN technology, as well as its actual application and setting.
APA, Harvard, Vancouver, ISO, and other styles
7

Porime Matondang, Lipur Sugiyanta, and Bachren Zaini. "ANALISIS LAYANAN INFRASTRUKTUR JARINGAN VLAN (VIRTUAL LOCAL AREA NETWORK) DI SMK KARYAGUNA." PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer 4, no. 1 (June 1, 2020): 7–13. http://dx.doi.org/10.21009/pinter.4.1.2.

Full text
Abstract:
Penelitian ini bertujuan untuk menganalisis layanan infrastruktur jaringan VLAN (Virtual Local Area Network) di SMK Karyaguna. Penelitian ini menggunakan metode penelitian rekayasa teknik. SMK Karyaguna Jakarta telah memiliki intranet untuk menunjang kegiatan belajar mengajar. Infrastruktur jaringan VLAN sudah tersedia sejak 1 tahun terakhir selama kurun waktu tersebut staf IT belum mengetahui performasi jaringan yang ada, oleh karenanya penelitian ini dilakukan untuk mengetahui bagaimana performansi infrastruktur jaringan VLAN di SMK Karyaguna Jakarta serta memberi rekomendasi untuk pengembangan di masa yang akan datang. Sistem jaringan yang dikembangkan diharapkan mampu memenuhi kepuasan pengguna jaringan yang lebih optimal dalam mendukung kegiatan prosses belajar yang ada di SMK karyaguna Jakarta. Penelitian ini dilakukan di ruang LABKOM pada bulan Mei-Agustus 2018. Penelitian dilakukan dengan mengukur parameter QoS yaitu aktual bandwidth, delay, serta packet loss. Hasil pengukuran QoS sebelum dan sesudah menerapkan VLAN yang dilakukan pada tanggal 20-24 Agustus 2018 pukul 10.00 – 16.00 menunjukkan perbedaan antara sebelum dan sesudah menerapkan VLAN. Delay mengalami peningkatan dari 450 ms jelek setelah menerapkan VLAN termasuk dalam kategori sangat bagus, karena nilai delay berkisar antara 150 ms sampai dengan 300 ms. Sedangkan Pada parameter QoS packet loss yang menurut versi TIPHON, bahwa packet loss sebelum menerapkan VLAN jelek karena nilai packet loss-nya 25% sedangkan setelah menerapkan VLAN nilai packet loss termasuk dalam kategori bagus, karena nilai packet loss-nya 0% yang dapat dilihat dengan mekanisme pengukuran parameter QoS menggunakan piranti lunak Axence NetTools. Pengujian ini diharapkan mampu membuktikan bagaimana performansi jaringan VLAN yang ada di SMK Karyaguna Jakarta. Sehingga dapat memberi rekomendasi untuk perencanaan dan pengembangan infrastruktur jaringan VLAN di masa yang akan datang.
APA, Harvard, Vancouver, ISO, and other styles
8

Ayuningtyas, Astika, Sudaryanto Sudaryanto, and Deno Daseftra Cessara. "Sistem Manajemen Virtual Local Area Network (VLAN) Pada Cisco Catalyst 3750 Berbasis Web." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 297–306. http://dx.doi.org/10.24176/simet.v11i1.4084.

Full text
Abstract:
VLAN merupakan salah satu teknologi komputer yang saat ini sangat dibutuhkan. Hal ini dikarenakan VLAN dapat membagi satu jaringan pada perangkat switch menjadi bagian-bagian kecil jaringan lain. Cisco Catalyst 3750 merupakan perangkat switch yang sudah menyediakan teknologi VLAN. Permasalahan yang ditemukan pada Cisco Catalyst 3750 adalah sistem manajemen VLAN yang masih berbasis command line dan tidak dapat diakses dari jarak jauh. Untuk itu dibuat VLAN berbasis GUI dan dapat diakses dari jarak jauh. VLAN yang dibuat berbasis Web dengan tujuan untuk memberikan kebebasan pemakaian device dan tidak harus terfokus pada satu jenis device saja. VLAN berbasis Web ini dibuat dengan memanfaatkan API Cisco sebagai penghubung antara bahasa pemrograman pada VLAN berbasis Web dengan bahasa pada perangkat lunak Cisco Catalyst 3750.Pemanfaatan Telnet berperan penting dalam pembuatan VLAN berbasis Web ini, dimana Telnet memberikan akses lebih luas pada Cisco Catalyst 3750 untuk diakses di luar aplikasi terminal emulator. Dengan pemanfaatan Telnet administrator cukup mengujungi IP yang telah dibuat untuk mengakses Cisco Catalyst 3750. Akses jarak jauh pada VLAN berbasis Web ini menggunakan port fowarding. Serveo.net adalah salah satu penyedia layanan port fowarding. Dengan memanfaatkan Serveo.net, VLAN berbasis Web yang masih dalam server local dapat diakses dari jarak jauh meski tanpa IP publik. Hasil pengujian pada penelitian ini menunjukkan bahwa VLAN berbasis Web terbukti dapat melakukan konfigurasi VLAN sehingga dapat digunakan untuk mengatur hubungan antar komputer sesuai dengan kebutuhan pada jaringan yang digunakan.
APA, Harvard, Vancouver, ISO, and other styles
9

Tulloh, Rohmat, Ridha Muldina Negara, and Arif Nur Hidayat. "Simulasi Virtual Local Area Network (VLAN) Berbasis Software Defined Network (SDN) Menggunakan POX Controller." JURNAL INFOTEL - Informatika Telekomunikasi Elektronika 7, no. 2 (November 10, 2015): 129. http://dx.doi.org/10.20895/infotel.v7i2.40.

Full text
Abstract:
VLAN (Virtual LAN) merupakan sebuah teknologi yang dapat mengkonfigurasi jaringan logis independen dari struktur jaringan fisik. Hasil dari penelitian sebelumnya sudah diprediksi bahwa dibutuhkan Virtual Network yang akhirnya terciptalah VLAN. Namun paradigma jaringan saat ini tidak flexible, ketergantungan terhadap vendor sangat besar karena fungsi data plane dan control plane berada dalam satu paket device. SDN (Software defined network) yang merupakan salahsatu evolusi teknologi jaringan sesuai dengan tuntutan yang berkembang dimana memisahkan fungsi data plane dan control plane pada suatu perangkat. POX Controller digunakan untuk men-simulasikan dan menguji Platform SDN (Software defined network). Pada penelitian ini menggunakan Openflow versi 1.0 untuk memasang header VLAN sehingga penelitian ini difokuskan untuk mengevaluasi performa forwarding VLAN yang memanfaatkan Openflow sebagai control plane dapat berfungsi dengan baik. Hasil penelitian ini mengusulkan penerapan karakteristik teknologi VLAN pada SDN karena telah berjalan dengan benar sesuai hasil pengujian konektifitas, verifikasi dan keamanan. Kemudian hasil pengujian lanjutan untuk melihat pengaruh SDN dengan skenario penambahan jumlah VLAN ID didapatkan bahwa set-up time akan bertambah seiring meningkatnya jumlah host dan dengan menggunakan protokol OpenFlow, latency yang terjadi di jaringan dapat dipantau dengan parameter round trip time (RTT) yang stabil direntang 0,2 sampai 6 second walaupun jumlah vlan_id dan background traffic bertambah.
APA, Harvard, Vancouver, ISO, and other styles
10

Syarif, Muhamad Fariz, Ritzkal Ritzkal, and Ade Hendri Hendrawan. "ANALISIS DAN IMPLEMENTASI VIRTUAL LOCAL AREA NETWORK (VLAN) PADA LABORATORIUM PRODI TEKNIK INFORMATIKA UNIVERSITAS IBN KHALDUN BOGOR." INOVA-TIF 3, no. 1 (June 12, 2020): 75. http://dx.doi.org/10.32832/inova-tif.v3i1.4065.

Full text
Abstract:
<p>Penerapan manajemen jaringan <em>Local Area Network</em> (<em>LAN</em>) dapat diterapkan dengan menggunakan <em>Virtual Local Area Network</em> (<em>VLAN</em>), segementasi jaringan tersebut dapat meningkatkan keamanan pada jaringan <em>Local Area Network</em> (<em>LAN</em>). <em>Virtual Local Area Network</em> (<em>VLAN</em>) merupakan suatu model jaringan yang tidak terbatas pada lokasi fisik seperti <em>Local Area Network</em> (<em>LAN</em>), hal ini mengakibatkan suatu jaringan dapat dikonfigurasi secara <em>virtual</em> tanpa harus menuruti lokasi fisik peralatan. Pengguna <em>Virtual Local Area Network</em> (<em>VLAN</em>) akan membuat pengaturan jaringan menjadi lebih fleksibel dimana dapat dibuat segmen yang tidak bergantung pada lokasi <em>workstation</em>. Dari uraian di atas maka dilakukan sebuah penelitian tentang analisis dan implementasi sistem manajemen jaringan <em>Virtual Local Area Network </em>(<em>VLAN</em>) pada Laboratorium Program Studi Teknik Informatika, Universitas Ibn Khaldun Bogor.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Bayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1, no. 2 (October 15, 2018): 55–60. http://dx.doi.org/10.24246/j.icm.2018.v1.i2.p55-60.

Full text
Abstract:
Keamanan jaringan di era ini sangat dibutuhkan, dibalik kemudahan dalam mengakses informasi terdapat pula banyak ancaman. Dengan aplikasi GNS3 pengguna dapat membuat simulasi jaringan dengan perangkat yang dibutuhkan seperti aslinya serta dalam perangkat dapat dikonfigurasi langsung. Pada simulasi ini membuat Perancangan Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan penggunaan ACL solution serta trusted-servers yang menjadi salah satu cara agar menjadikan jaringan tersebut tetap aman dan stabil. Dari hasil penelitian yang dilakukan GNS3 mampu Merancangan Keamanan Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan memasukkan ACL solution serta fitur trusted-servers ke dalam switch ExtremeXOS.
APA, Harvard, Vancouver, ISO, and other styles
12

Оrdabayeva G.К., Dzhusupbekova G.T., and Rakhymbek N. "DESIGN AND SIMULATION OF VIRTUAL LOCAL AREA NETWORK USING CISCO PACKET TRACER." BULLETIN 6, no. 388 (December 15, 2020): 6–14. http://dx.doi.org/10.32014/2020.2518-1467.176.

Full text
Abstract:
Modern local networks consist of several subscriber devices located inside the same building. Computers on the local network are interconnected using network equipment - switches. By default, all devices connected to the ports of the same switch can communicate by exchanging network packets. Computer networks of data transmission are the result of the information revolution and in the future will be able to form the main means of communication. The worldwide trend towards the integration of computers in the network is due to a number of important reasons, such as the acceleration of the transmission of information messages, the ability to quickly exchange information between users, receiving and transmitting messages (faxes, E-mail letters, electronic conferences, etc.) without leaving the workplace, the ability to instantly receive any information from anywhere in the world, as well as the exchange of information between computers of different manufacturers working under different software. A large number of broadcast packets sent by devices leads to a decrease in network performance, because instead of useful operations, the switches are busy processing data addressed to everyone at once. The situation forces us to divide such large networks into autonomous subnets; as a result, the logical structures of the network are different from the physical topologies. This article discusses VLAN technology (Virtual Local Area Network - VLAN), which allows you to divide one local network into separate segments.
APA, Harvard, Vancouver, ISO, and other styles
13

F. Alshare, Mohammed. "Analysis of Virtual Local Area Network (VLAN) with Physical Network Security Implementation." Journal of Applied Sciences 16, no. 11 (October 15, 2016): 517–25. http://dx.doi.org/10.3923/jas.2016.517.525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Laksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.

Full text
Abstract:
In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
APA, Harvard, Vancouver, ISO, and other styles
15

Tulloh, Rohmat. "Analisis Performansi VLAN Pada Jaringan Software Defined Network (SDN)." JURNAL INFOTEL 9, no. 4 (November 8, 2017): 406. http://dx.doi.org/10.20895/infotel.v9i4.319.

Full text
Abstract:
Software defined network (SDN) adalah sebuah paradigma baru dalam dunia jaringan yang mampu memusatkan fungsi beberapa control plane pada layer 2 maupun di layer 3 secara terprogram, hal tersebut menyebabkan jaringan akan bersifat lebih fleksibel dan terskala. Dengan jumlah pertumbuhan pengguna internet yang semakin tinggi maka hal tersebut akan berbanding lurus terhadap kompleksitas dari jaringan internet itu sendiri. Sehingga paradigma SDN ini menjadi salah satu solusi yang muncul. Penerapan Virtual Local Area Network (VLAN) pada jaringan tradisional telah menjadi hal yang penting dan banyak diterapkan. Fungsi VLAN adalah untuk membatasi broadcast trafik dari suatu host, sehingga hanya dapat mengirim data kepada VLAN ID yang sama. Penelitian ini menganalisis performansi VLAN di jaringan SDN. Terjadi penurunan angka jumlah paket yang dapat terkirim (data transfer) dan nilai throughput pada sebuah VLAN ID karena terdapat pengaruh dari VLAN ID yang berbeda. Pada pengujian membandingkan VLAN dengan non VLAN over Netwok Functions Virtualization (NFV) didapatkan bahwa nilai data transfer dan throughput yang diperoleh pada VLAN lebih besar. Hasil analisis dari seluruh pengujian penambahan traffic terlihat bahwa kinerja VLAN pada SDN akan membebani kinerja jaringan pada VLAN yang berbeda
APA, Harvard, Vancouver, ISO, and other styles
16

Tian, An Hong, and Cheng Biao Fu. "The Design and Research of Virtualization Platform." Applied Mechanics and Materials 397-400 (September 2013): 2090–93. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.2090.

Full text
Abstract:
Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.
APA, Harvard, Vancouver, ISO, and other styles
17

Makeri, Yakubu Ajiji, Giuseppe T. Cirella, Francisco Javier Galas, Hamid Mohsin Jadah, and Adetayo Olaniyi Adeniran. "Network Performance Through Virtual Local Area Network (VLAN) Implementation & Enforcement On Network Security For Enterprise." International Journal of Advanced Networking and Applications 12, no. 06 (2021): 4750–62. http://dx.doi.org/10.35444/ijana.2021.12604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Natali, Juwanda, Fajrillah Fajrillah, and T. M. Diansyah. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (June 26, 2016): 51–58. http://dx.doi.org/10.35316/jimi.v1i1.444.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
19

Rahman, Taufik, Teguh Rahmat Zaini, and Giatika Chrisnawati. "PERANCANGAN JARINGAN VIRTUAL LOCAL AREA NETWORK (VLAN) & DHCP PADA PT.NAVICOM INDONESIA BEKASI." JIKA (Jurnal Informatika) 4, no. 1 (January 30, 2020): 36. http://dx.doi.org/10.31000/jika.v4i1.2366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sugiyanta, Lipur, and Badia Raja. "Kualitas Jaringan Pada Jaringan Virtual Local Area Network (VLAN) Yang Menerapkan Linux Terminal Server Project (LTSP)." PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer 1, no. 2 (December 1, 2017): 82–89. http://dx.doi.org/10.21009/pinter.1.2.1.

Full text
Abstract:
Virtual Local Area Network (VLAN) merupakan sebuah teknik dalam jaringan komputer untuk menciptakan beberapa jaringan yang berbeda tetapi masih merupakan sebuah jaringan lokal yang tidak terbatas pada lokasi fisik seperti LAN sedangkan Linux Terminal Server Project (LTSP) merupakan sebuah teknik terminal server yang dapat memperbanyak workstation dengan hanya menggunakan sebuah Linux server. Dalam membangun sebuah jaringan komputer perlu memperhatikan beberapa hal dan salah satunya adalah kualitas jaringan dari jaringan yang dibangun. Pada penelitian ini bertujuan untuk mengetahui pengaruh jumlah client terhadap kualitas jaringan berdasarkan parameter delay dan packet loss pada jaringan VLAN yang menerapkan LTSP. Oleh karena itu, penelitian ini menggunakan jenis metode penelitian kualitatif dengan memperhatikan standar yang digunakan dalam penelitian yaitu standar International Telecommunication Union – Telecommunication (ITU-T). Penerapan penelitian ini menggunakan sistem operasi pada server adalah Ubuntu Desktop 14.04 LTS. Berdasarkan dari hasil penelitian yang ditemukan dapat disimpulkan bahwa benar terbukti bahwa makin banyak client yang dilayani oleh server maka akan menurunkan kualitas jaringan berdasarkan parameter Quality of Service (QoS) yang digunakan yaitu delay dan packet loss.
APA, Harvard, Vancouver, ISO, and other styles
21

Euginia, Bertha, and Theresia Ghozali. "Simulasi Multi Protocol Label Switching Virtual Private Network (MPLS VPN) Dengan Virtual Local Area Network (VLAN) Menggunakan Router MIKROTIK." TESLA: Jurnal Teknik Elektro 20, no. 2 (February 13, 2019): 109. http://dx.doi.org/10.24912/tesla.v20i2.2987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Geraldi, Tommy Elco, Moh Iwan Wahyuddin, and Andri Aningsih. "Perancangan Backup Link Menggunakan Metode HSRP (Hot Standby Router Protocol) Dalam Penyediaan Layer-3 Redundansi." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 1 (January 29, 2020): 201. http://dx.doi.org/10.30865/mib.v4i1.1873.

Full text
Abstract:
With the increase of internet user today, if it only has one router, when the router experiencing a network failure, then the internet cannot be used. To overcome this problem, the HSRP (Hot Standby Router Protocol) method by creating one active link and one backup link has been applied in the previous research. In this research will be applying the HSRP, VTP (Vlan Trunking Protocol), InterVLAN, and VLAN (Virtual Local Area Network) as a comparison. The testing parameter in this research will be using packet loss and throughput. From the result of testing that has been done, it shows that by applying the HSRP method, it gives a network availability with the packet loss of only 0,32%, and throughput of 1,159Mb/s (95,58%) from using 100 PC.
APA, Harvard, Vancouver, ISO, and other styles
23

Suyanto, Suyanto, and Melisa Risanjani. "KONFIGURASI INTER VIRTUAL LOCAL AREA NETWORK MENGGUNAKAN ROUTING PROTOCOL OPEN SHORT PATH FIRST DENGAN SIMULASI PACKET TRACER." Jurnal Informasi dan Komputer 4, no. 2 (March 25, 2017): 55–70. http://dx.doi.org/10.35959/jik.v4i2.84.

Full text
Abstract:
ABSTRAKThe utilization of computer network technology as a medium of communication of data is currently increasing. The need for the use of shared resources that exist in both hardware and software network has resulted in the incidence of various technological development network itself. Along with the increasing level of needs and the growing number of network users who want a form a network that cal deliver maximum results both in terms of efficiency as well as an increase in the security of the network itself.The task of the end of this writer did a variety of research. The stage of this research, looking for gather what is required to the configuration of Inter Virtual Local Area Network using OSPF routing. In addition to the research stage of the write also do a method of drafting the system, the method used is a method of PPDIOO. PPDIOO is the methodology developed by cisco system (cisco, 2005)Based on the desire, consummation hence efforts continue to be done by various parties. By utilizing a variety of techniques subnetting particularly, configuration, the use of routing OSPF and use of hardware better, another switches between the emergence of the concept of an area of Inter Virtual Network (Inter VLAN) that is expected to provide tissue that broader, large and better results than Local Area Network (LAN)
APA, Harvard, Vancouver, ISO, and other styles
24

Gozali, Ferrianto, and Billion Lo. "Sistem Pengalokasian Dinamik VLAN Dalam Mendukung Proses Belajar Terdistribusi." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 1, no. 1 (March 8, 2012): 69. http://dx.doi.org/10.23887/janapati.v1i1.9781.

Full text
Abstract:
Seiring perkembangan pendidikan, penggunaan ICT sangatlah besar dalam proses perkembangan tersebut. Dengan penggunaan ICT ini, memungkinkan distance learning diimplementasi dimana proses belajar mengajar tidak harus lagi berada dikelas seperti pada pendidikan yang konvensional. Dengan adanya distance learning dapat memecahkan masalah spasial baik dari ukuran ruangan terhadap jumlah murid dan keterbatasan untuk dapat hadir kedalam ruang perkuliahan. Karena itulah, Sistem Pengalokasian Virtual Local Area Network (VLAN) secara Dinamis dibutuhkan. Sistem ini merupakan sistem yang berbasis protokol Radius yang dapat membantu untuk mengotentikasi dan memindahkan client antar sub jaringan (VLAN) didalam jaringan internal suatu perkuliahan.Perancangan sistem digunakan aplikasi berbasis open source. Pada perancangan sistem Dinamik VLAN ini, penulis menggunakan sistem otentikasi berdasarkan MAC-Address dari client yang akan dimapping kedalam VLAN yang akan dituju. MAC-Address dan VLAN yang akan dituju disimpan didalam database. Untuk skema jaringannya, server dan client akan terhubung menggunakan manageable switch.Mekanisme kerja dari sistem pengalokasian VLAN secara dinamis ini terdiri dari 3 (tiga) tahap yaitu: tahap penerimaan request dari Network Access Server (NAS), pengecekan MAC-Address terhadap VLAN yang dituju dan persetujuan otentikasi dan otorisasi. Untuk mendukung proses pembelajaran jarak jauh, digunakan Web Conference dan aplikasi seperti file sharing pada jaringan VLAN tersebut. Untuk pengujian sistem tersebut, kita menggunakan applikasi Web Conference dengan cara membandingkan performa jaringan pada saat dengan dan tanpa sistem tersebut.Dalam mengimplementasikan sistem ini, terbilang murah karena suatu perusahaan hanya membutuhkan sebuah server dengan Sistem Operasi yang gratis dan aplikasi yang gratis dan dapat diimplementasikan langsung ke dalam jaringan perusahaan tanpa perubahan topologi jaringan yang menyeluruh.Namun dalam sistem ini masih terdapat kekurangan, dimana sistem ini hanya dapat diaplikasikan dengan menggunakan Manageable Switch dan belum dapat digunakan untuk Wi-fi dan Unmanageable Switch.
APA, Harvard, Vancouver, ISO, and other styles
25

Rahmatullah, Sidik, and Elis Amalia. "PERANCANGAN BERBASISVLAN DENGAN ROUTING PROTOCOL EIGRP PADA SMK NUSANTARA 1 KOTABUMI." Jurnal Informasi dan Komputer 1, no. 1 (April 25, 2015): 75–81. http://dx.doi.org/10.35959/jik.v1i1.30.

Full text
Abstract:
Sekolah SMK Nusantara 1 Kotabumi merupakan (sekolah menengah atas ). SMK Nusantara 1 Kotabumi pada awalnya mengguankan jaringan komputer hanya dirungan TU (tata usaha, seiring bertambahnya kebutuhan, saat ini jaringan tersebut berkembang ke hampir semua bagian dari SMK Nusantara 1 Kotabumi. Meningkatkan tingkat kemajuan dan jumlah pengguna jaringan dan mengingatkan suatu bentuk jaringan yang dapat memberikan hasil maksimal baik dari segi efisien dan meningkatkan keamanan jaringan itu sendiri. Jadi jika kita perlu instruktur jaringan yang baik yang dapat menjawab kebutuhan itu. Sebuah instruktur jaringan harus mampu melayani lebih bayak pengguna, aplikasi dan workstation. Penelitina ini ditunjukan untuk memperlajari sedikit banyaknya mengenai Virtual Local Area Network (VLAN) yang dapat membantu manajer jaringan dalam memenuhi kebutuhan-kebutuhan yang telah disebutkan di atas, untuk meningkatkan kinerja jaringan ( network perfomance ) secara keseluruhan. VLAN segmentasi menyediakan jaringan yanng fleksibel dan dinamais yang mengakibatkan perubahan mendasar dalam cara LAN dirancang, dilaksanakan dan dikelolah.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Gui Ping, Er Dong Jia, Li Min Guan, Yun Ting Bai, and Xiao Yan Ma. "Remote Monitoring System for Unattended Electromechanical Equipment Based on Internet." Advanced Materials Research 466-467 (February 2012): 1176–80. http://dx.doi.org/10.4028/www.scientific.net/amr.466-467.1176.

Full text
Abstract:
The unattended electromechanical equipments are widely distributed in the harsh environment, which makes it difficult to construct the monitoring system. Therefore, this paper proposes a solution of the remote monitoring system based on Internet, which applies the VLAN (Virtual Local Area Network) technology in constructing the network. The network microprocessor STM32F107 is adopted to design a low-cost remote information terminal. The system software is designed based on B/S (Browser/Server) architecture by ASP (Active Server Page) technology, which implements SCADA (Supervisory Control and Data Acquisition) and pre-warning system for the unattended electromechanical equipments. The application shows that the system is stable, reliable and worth popularizing.
APA, Harvard, Vancouver, ISO, and other styles
27

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
APA, Harvard, Vancouver, ISO, and other styles
28

Chaniago, Muhammad Benny. "Penggunaan Teknologi Wireless Sensor Network (WSN) dan GSM Pada Konsep Smart City." JUMANJI (Jurnal Masyarakat Informatika Unjani) 2, no. 2 (January 7, 2019): 135. http://dx.doi.org/10.26874/jumanji.v2i2.40.

Full text
Abstract:
Smart city adalah sebuah konsep dimana semua sistem dan element baik itu alat atau moda tranfortasi bisa bekerja seseuai dengan konsep mobiltasnya, hardware dan software pendukung harus saling terintgrasi dan bisa berjalan pada semua platform pendukung, data pada platform bisa tersimpan dalam virtual server dalam hal ini disebut sebagai cloud computing, cloud sendiri akan menyimpan berbagai macam data penting seperti kode kependudukan, data transportasi, penjualan,dan akses kemanan, data inputan tadi berasal dari semua aplikasi yang terpisah – pisah dan tersebar dibeberapa penjuru kota, bagus tidaknya data yang tersimpan tergantung dari koneksi dan akses internet yang digunakan, sebagai contoh pada sistem retail penjualan barang, pada sistem yang lain jumlah pengguna tranfortasi bisa dikirm melalui data cloud tetapi masih terbatas dan tergantung pada area wilayah yang sangat luas, demikan juga penggunaan kamera CCTV yang terpasang dijalan raya atau tempat pembelajaan masih tersebar sulit dalam proses penyetingan dan membutuhkan proses penarikan kabel terdekat sebagai sumber arus listrik agar terkoneksi server, masalah tersebut bisa diatas dengan pemasangan perangkat yang di integrasikan dengan teknologi Wireless Sensor Network pada alat – alat pendukung Smart City misalkan untuk menghitung jumlah pengunjung mall atau bandara, penggunaan CCTV dengan WSN memungkinkan peralatan tersebut bisa ditempatkan secara fleksible memanfaatkan data GSM yang bisa disimpan pada switch dengan penambahan konfigurasi VLAN (virtula local Area ) ,penambahan metode ini bisa mengamankan data transaksi dengan mengamkan jaringan komputer LAN yang dimaksimalkan, penambahan WSN pada cctv mampu disimpan ditempat yang susah dijangkau dan terkoneksi dengan aplikasi multiface detection yang berguna sebagai tambahan fitur keamanan
APA, Harvard, Vancouver, ISO, and other styles
29

Rodrigues, Pablo, Mateus Saquetti, Guilherme Bueno, Weverton Cordeiro, and Jose Azambuja. "Virtualization of Programmable Forwarding Planes with P4VBox." Journal of Integrated Circuits and Systems 16, no. 2 (August 15, 2021): 1–8. http://dx.doi.org/10.29292/jics.v16i2.329.

Full text
Abstract:
Networking virtualization has shown to enable faster service provioning and server as a main driver of innovation, from Software-Defined Networking (SDN) to Network Function Virtualization (NFV) and Local Area Networks (VLAN). Recent investigations began assessing the feasibility of virtualization in Programmable Data Planes (PDP). Despite the progress achieved, much work remains to assess their effectiveness for programmable virtual switches. In a prior work, we introduced P4VBox, an architecture for virtualization of programmable switches written using the P4 language. P4VBox provides the execution of multiple P4 based switch instances running in parallel, with the ability of hot-swapping through full and partial reconfiguration. In this work, we build upon P4VBox to provide novel insights, substantiated by experimental evaluation on a real-world testbed, on the evaluation of the real power of switch virtualization in a NetFPGASUME board, deploying three use cases. We measured resource utilization and performance to observe the behavior of P4VBox when handling large flows. Our results demonstrate that P4VBox incurs a small overhead compared with the canonical NetFPGA reference design. Yet, it increases orders of magnitude considering the existing works.
APA, Harvard, Vancouver, ISO, and other styles
30

Ahmed, Alaa H., and Mokhaled N. A. Al-Hamadani. "Designing a secure campus network and simulating it using Cisco packet tracer." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (July 1, 2021): 479. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp479-489.

Full text
Abstract:
<span>The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs’) using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.</span>
APA, Harvard, Vancouver, ISO, and other styles
31

Christanto, Febrian Wahyu, Atmoko Nugroho, and Whisnumurti Adhiwibowo. "Implementasi Kemanan Jaringan LAN Berbasis ACLS dan VLAN." Jurnal Sisfokom (Sistem Informasi dan Komputer) 7, no. 2 (September 30, 2018): 121. http://dx.doi.org/10.32736/sisfokom.v7i2.568.

Full text
Abstract:
Manajemen jaringan di era jaringan komputer modern adalah hal yang sangat penting karena setiap perangkat dapat berkoneksi dengan perangkat lain yang berada di seluruh dunia melalui kecanggihan teknologi internet. Tentu saja dengan kemajuan ini membutuhkan suatu sistem pemantauan jaringan komputer yang membantu administrator jaringan dalam mengelola Local Area Network (LAN). Permasalahan yang sering timbul adalah kesulitan untuk mengetahui status open port disaat terjadi permasalahan ataupun serangan di dalam jaringan karena jumlah port jaringan mencapai 65.536, sehingga membutuhkan waktu yang lebih lama untuk melakukan perbaikan jaringan. Selain itu kebutuhan akan suatu sistem terintegrasi dalam pemantauan proses serta statistik port dalam Local Area Network (LAN) menjadi landasan dalam penelitian ini sehingga dapat meminimalisasi penggunaan sistem yang terlalu banyak dalam pemantauan jaringan komputer. Hasil dari penelitian ini adalah suatu sistem baru hasil modifikasi dari Mandau Registry Tools and Information System dengan menambahkan layanan seperti informasi protokol, statistik port, dan informasi tentang Domain Name System (DNS). Menggunakan tahapan perencanaan, analisis, desain, implementasi, dan pengujian sebagai metode pengembangan sistem, diharapkan penelitian ini dapat membantu pemantauan Local Area Network (LAN) yang lebih baik dengan kompleksitas informasi proses jaringan dan statistik port yang dihasilkan.
APA, Harvard, Vancouver, ISO, and other styles
32

Haryoyudhanto, Hendy Dwi, Iskandar Fitri, and Andri Aningsih. "Implementasi Encapsulation Jaringan Redudansi VLAN Menggunakan Metode Hot Standby Router Protocol (HSRP)." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 49. http://dx.doi.org/10.31328/jointecs.v5i1.1247.

Full text
Abstract:
Local Area Network is currently often used to minimize a public work, different network segmentation in a building requires attention in designing a network that has dense traffic and often occurs down and vails over on a network flow, certainly requires performance optimal and efficient network, by way of network encapsulation with one channel and dividing each network segmentation by VLAN. The purpose of this paper is to apply a design by optimizing a network using the network redundancy method to create a more optimal network. This redundancy method is a method that moves a network path when downtime occurs on one of the routers that are automatically changed to an active router and a standby router. In the implementation of the design using GNS3 software to create network topology and design. With the results of tests that have been carried out using the simulator, packet loss from using the HSRP method is at VLAN10 0.11%, VLAN20 0.13%, VLAN30 0.30%, VLAN40 0.13%, VLAN50 0.22% AND VLAN60 0.16%. So the purpose of research makes a network more optimal and flexible
APA, Harvard, Vancouver, ISO, and other styles
33

Blagorazumov, A. K., I. G. Kirpichev, and D. V. Petrov. "Isolation of corporate local area networks using server virtualization." Civil Aviation High Technologies 22, no. 6 (December 26, 2019): 100–111. http://dx.doi.org/10.26467/2079-0619-2019-22-6-100-111.

Full text
Abstract:
Secure enterprises have Local Area Networks (LANs) that store and process sensitive data that should not be accessed from outside. At the same time, no modern enterprise can successfully function without a LAN which provides the Internet access for the computers of the sales department, technical support service and E-mail server. In order to ensure information security, these two network segments are usually physically isolated from each other by means of exception of any cable interconnections. Enterprises with high demands for server uptime use server virtualization, which requires connecting physical servers to disk storage of virtual server image files. When highly reliable servers are needed only in one of two independent corporate network segments, the cost of creating such a server cluster is reasonable and fast paying off. But when a company encounters the need to place a small but highly reliable server into another network segment, the following problem arises: only server cluster with expensive components can provide the required reliability, but to solve the tasks assigned to the new server, the cluster computing capacity would be too high, and deploying of a cluster would be extremely costly and economically unjustified. On the other hand, the required computing capacity for a new server would be taken from the existing server cluster by creating a new virtual server without any expenses. However, in such case it is necessary to ensure isolation of the new virtual server from the network segment the physical hosts servers are connected to. The article examines the methods of configuring the LAN that allow to isolate virtual and physical servers at the network level. The authors also consider the episode when it is necessary to transfer files between the two computers located in the LAN segments isolated from each other and gives the appropriate solution.
APA, Harvard, Vancouver, ISO, and other styles
34

Ahn, Jinsoo, Young Kim, and Ronny Kim. "Virtual Reality-Wireless Local Area Network: Wireless Connection-Oriented Virtual Reality Architecture for Next-Generation Virtual Reality Devices." Applied Sciences 8, no. 1 (January 3, 2018): 43. http://dx.doi.org/10.3390/app8010043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Min, Zejun Li, and Ang Li. "Research on the Virtual Access Points in the Wireless Local Area Network." Open Cybernetics & Systemics Journal 9, no. 1 (September 14, 2015): 1281–88. http://dx.doi.org/10.2174/1874110x01509011281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Giaccai, Susanna. "FLAN: virtual inter‐linking using floppy disks as a local area network." Electronic Library 7, no. 3 (March 1989): 160–62. http://dx.doi.org/10.1108/eb044882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Malekzadeh, Mina, Abdul Azim Abdul Ghani, Jalil Desa, and Shamala Subramania. "Empirical Analysis of Virtual Carrier Sense Flooding Attacks Over Wireless Local Area Network." Journal of Computer Science 5, no. 3 (March 1, 2009): 214–20. http://dx.doi.org/10.3844/jcs.2009.214.220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

A., A., and Ahiaba Solomon. "An Empirical Study of IPV6 Multicast Routing over a Virtual Local Area Network." International Journal of Applied Information Systems 11, no. 3 (August 6, 2016): 31–37. http://dx.doi.org/10.5120/ijais2016451593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Malekzadeh. "Empirical Analysis of Virtual Carrier Sense Flooding Attacks Over Wireless Local Area Network." Journal of Computer Science 5, no. 3 (March 1, 2009): 214–20. http://dx.doi.org/10.3844/jcssp.2009.214.220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hyeon Kim, Ki, Dongkyun Kim, Yong Hwan Kim, and Joobum Kim. "Performance measurement using dpdk in software-defined local and wide area networks." International Journal of Engineering & Technology 7, no. 2.12 (April 3, 2018): 119. http://dx.doi.org/10.14419/ijet.v7i2.12.11105.

Full text
Abstract:
Background/Objectives: For data center-based enterprises, the use of data traffic continues to increase. As a result, the increasingly efficient processing of increasing data traffic is becoming a major issue. Effective processing of traffic can be performed through the addition of physical network equipment, but this requires considerable costs.Methods/Statistical analysis: To solve this problem, researches on server virtualization and network virtualization technology are being actively conducted. However, while network virtualization is a cost-effective solution, open-source virtual switches used in network virtualization technologies have the performance penalty because they handle packets at the kernel of server's operating system. As a result, the Intel has developed the Data Plane Development Kit (DPDK) technology to address the performance degradation of the operating system.Findings: In this paper, we propose the DPDK performance test environment based on Open Virtual Switch (OVS) to verify the stability and performance of the DPDK-oriented virtualization technology, in association with a new KREONET-S project which aims tothe softwarization of the Korea Research Environment Open Network (KREONET) infrastructure.Improvements/Applications: We perform conducted experiments on Software-Defined Local Area Network (LAN) and Wide Area Network (WAN) environment using KREONET-S show the result.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Li, Mingshan Xia, and Fazhi Qi. "Security Mechanism for user access to Single SSID WLAN." EPJ Web of Conferences 245 (2020): 07009. http://dx.doi.org/10.1051/epjconf/202024507009.

Full text
Abstract:
Wireless local area network (WLAN) technology is widely used in various enterprises and institutions. In order to facilitate the use of users, they often provide a single SSID access point, resulting in different identities of users authenticated and authorized can connect to the wireless network anytime, anywhere as needed and obtain the same accessible network resources such as bandwidth, access control (ACL) and so on. Multiple SSID can solve the problem but it will be confused to users who don’t know which SSID can be connected. Although we could prevent visitors from accessing intranet resources by isolating the wireless network from the internal network, this would make it impossible for users to use the wireless network for internal office work. In this paper, we propose an access control system that grouping users according to the different identities and users authenticated and authorized can access different network resources because a wireless access point dynamically maps an SSID provided by a mobile station to a BSSID based on a VLAN assignment. The deployment experiment of the solution proves that users of different identities accessing the same wireless network can set different access policies, which effectively improves the security of the wireless network and simplifies the management of the wireless network.
APA, Harvard, Vancouver, ISO, and other styles
42

Tomar, Deepak. "A Network Architecture for secure traffic management for the Internet of Things using Virtual Local Area Network." International Journal of Computer Trends and Technology 68, no. 12 (December 25, 2020): 11–14. http://dx.doi.org/10.14445/22312803/ijctt-v68i12p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Full text
Abstract:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Huiting, Hua Zhang, Weilin Xu, Yigang Yang, and Mengyuan Xu. "A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network." International Journal of Computer Network and Information Security 3, no. 2 (March 17, 2011): 19–25. http://dx.doi.org/10.5815/ijcnis.2011.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Solomon, Ahiaba, A. A., and ThankGod Sani. "A Performance Study of IPV6 Multicast Routing over a Dual Stack Virtual Local Area Network." International Journal of Computer Applications 147, no. 10 (August 16, 2016): 36–42. http://dx.doi.org/10.5120/ijca2016911201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Xing Cheng, Yun Xu Fu, Jin Yong Yu, Yue Peng Yan, and Jian Qiang Liu. "A Rapid Way to Build Prototypes of Wireless Sensor Network Based on Virtual Instruments Technology." Advanced Materials Research 301-303 (July 2011): 1588–91. http://dx.doi.org/10.4028/www.scientific.net/amr.301-303.1588.

Full text
Abstract:
This paper presents a new approach to build prototypes of Wireless Sensor Network rapidly based on virtual instruments technology. There are two different methods introduced in this paper. One of the two methods uses WSN (short for Wireless Sensor Network) Node and WSN Gateway manufactured by NI (short for National Instruments). The other method adopts Compact RIO (short for Reconfigurable Input and Output) and GPRS (short for General Packet Radio Service) module. Though they are two different methods, they have the same structure. Both of the two methods adopt DAQ (short for data acquisition) card and sensors to acquire specified data. The DAQ card and sensors compose a node which can sense and process data. Different nodes form a local area WSN. Nodes within a local area WSN communicate with each other via ZigBee or other means of communication. The local area WSN can access the Internet via a WSN Gateway or GPRS module. Modular hardware and graphic programming language LabVIEW (short for Laboratory Virtual Instrumentation Engineering Workbench) are adopted in this proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
47

Lazebnyy, Anton V. "The Details of Virtual Contention Window Concept for 802.11 IBSS Wireless Local Area Network Mathematic Modeling." International Journal of Wireless Communications and Mobile Computing 1, no. 1 (2013): 7. http://dx.doi.org/10.11648/j.wcmc.20130101.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Umamaheswari, K., and S. Sujatha. "Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud." Defence Science Journal 67, no. 6 (November 6, 2017): 645. http://dx.doi.org/10.14429/dsj.67.11118.

Full text
Abstract:
<p class="p1">Data security and privacy are perennial concerns related to cloud migration, whether it is about applications, business or customers. In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs). The model has two significant contributions for impregnable protection, one is to reduce alert generation delay by dynamic correlation and the second is to support the supervised learning of malware detection through system call analysis. The defence formation facilitates malware detection with linear support vector machine- stochastic gradient descent (SVM-SGD) statistical algorithm. It requires little computational effort to counter the distributed, co-ordinated attacks efficiently. The framework design, then, takes distributed port scan attack as an example for assessing the efficiency in terms of reduction in alert generation delay, the number of false positives and learning time through comparison with existing techniques is discussed.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Rumalutur, Sonny. "ANALISIS KEAMANAN JARINGAN WIRELESS LAN (WLAN) PADA PT. PLN (PERSERO) WILAYAH P2B AREA SORONG." Electro Luceat 1, no. 1 (May 14, 2015): 62–74. http://dx.doi.org/10.32531/jelekn.v1i1.15.

Full text
Abstract:
Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel.Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Network Stumbler, diikuti oleh Aircrack dan Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhao, Jing Ying, and Hai Guo. "The Development of a Local Area Network Communication Software Based on Peer-to-Peer Mode." Advanced Materials Research 905 (April 2014): 627–30. http://dx.doi.org/10.4028/www.scientific.net/amr.905.627.

Full text
Abstract:
Compared with traditional client/server modes, peer-to-peer (P2P) mode has obvious advantages in eliminating the performance bottleneck of server and enhancing the utilization rate of network resources. Based on P2P technology, local area network (LAN) communication software was well designed in this paper. By using the support function of Java for multithreading technology and socket technology, P2P mode was adopted to realize various communication functions, such as LAN text message transmission, file transfer and voice transmission. Though processing multicast messages, the software can detect the login and logout status of LAN users. Proved by testing, this software can operate stably in a system environment installed with Java Virtual Machine (JVM).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography