To see the other types of publications on this topic, follow the link: VLANs.

Journal articles on the topic 'VLANs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VLANs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Full text
Abstract:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.
APA, Harvard, Vancouver, ISO, and other styles
2

Wintolo, Hero, and Amalia Farhati. "Pembagian jaringan komputer menggunakan virtual local area network guna mendukung perpustakaan digital." Jurnal Kajian Informasi & Perpustakaan 8, no. 2 (December 30, 2020): 133. http://dx.doi.org/10.24198/jkip.v8i2.25218.

Full text
Abstract:
Digital libraries have been widely applied in educational institutions in Indonesia as a complement conventional libraries. The purpose of this research is to know division computer network access at the Adisutjipto Intitute of Technology (STTA) library. The research method used is a qualitative method using Prepare Plan Design Implement Operate and Optimize (PPDIOO). The result research is that people who have internet access will not be able to enter the digital library network. Computer network users who want to access digital libraries must log into the computer network that provides digital books in the library using a Virtual Local Area Network (VLAN). Making this VLAN requires a computer network infrastructure in the form of a Local Area Network (LAN) and computer network equipment in the form of a switch that can be used to configure multiple VLANs in a LAN. Some of the existing services in the library are placed on one VLAN and the digital library is placed on another VLAN. From the test results, it can be seen that between computers that provide services in the library on VLAN 2 cannot communicate via the connecting network to VLAN 1 where the digital library with website based services will be located. This is evidenced by the ping command which generates request time out information. VLANs network in the STTA library have been able to provide support for plans to improve services to members and academicians in the form of a digital library.
APA, Harvard, Vancouver, ISO, and other styles
3

NUGROHO, KUKUH. "Pengaruh Native VLAN terhadap Overhead Trafik Data pada Jaringan LAN." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 9, no. 2 (April 4, 2021): 404. http://dx.doi.org/10.26760/elkomika.v9i2.404.

Full text
Abstract:
ABSTRAKPenggunaan switch pada jaringan yang sudah menerapkan teknologi VLAN dapat membagi jaringan menjadi beberapa wilayah jaringan yang berbeda dimana proses ini sebelumnya hanya bisa dilakukan oleh router. Data yang dipertukarkan antar wilayah jaringan yang berbeda akan melewati jalur trunk yang menghubungkan antar perangkat switch. Proses penambahan header ke dalam data dilakukan perangkat switch sebelum diteruskan melewati jalur trunk. Namun proses tersebut akan menambah overhead (beban trafik tambahan) dari setiap data yang dilewatkan pada jalur trunk. Produk switch dari Cisco memiliki fasilitas yang dinamakan sebagai native VLAN. Apabila asal wilayah VLAN dari data yang dilewatkan pada jalur trunk sama dengan informasi native VLAN yang tersimpan pada perangkat switch, maka data tersebut tidak perlu ditambahkan header disaat ingin dilewatkan jalur trunk. Penelitian ini bertujuan untuk menguji pengaruh penggunaan native VLAN dalam mengurangi beban trafik jaringan pada jalur trunk. Hasil pengujian memperlihatkan penggunaan native VLAN dapat mengurangi beban overhead trafik data sebesar 4,77%.Kata kunci: VLAN, Native VLAN, Trunk, Jaringan LAN, Overhead Trafik ABSTRACTThe use of switches in the switch network with implementing VLAN technology can divide a network into several different networks that previously just be done with a router. The data that is exchanged among different networks will pass the trunk link that connects between switches. The process of adding a header within data is done by a switch before entering that data into the trunk link. However, that process will increase overhead traffic (additional traffic load) within each data that passed on the trunk link. Cisco's switches have a facility known as native VLAN. If the origin of the data's VLAN area that will be passed on the trunk link is the same as native VLAN information, then the data will not add with a header when will pass on the trunk link. This research will analyze the effect of using native VLAN in reducing overload data traffic on the trunk link. The test result shows that the use of native VLAN can reduce data traffic overhead by 4.77%.Keywords: VLANs, Native VLANs, Trunk Link, Switch Network, Overhead Traffic
APA, Harvard, Vancouver, ISO, and other styles
4

Jurnal, Redaksi Tim. "ANALISA DAN IMPLEMENTASI VTP DENGAN ETHERCHANNEL TYPE LACP." KILAT 7, no. 1 (December 3, 2018): 78–85. http://dx.doi.org/10.33322/kilat.v7i1.106.

Full text
Abstract:
LAN computer network (Local Area Network) has been widely known since the last decade. However, due to the proliferation of its use, the LAN computer network is changing scalability. This problem can be solved by using Virtual Local Area Network (VLAN) technology. VLANs can address scalability issues and can flexibly reset virtual LAN networks. Especially in the VLAN Trunking Protocol which can minimize the number of switches every time that passes through its VLAN path. So also on the Etherchannel membundle link between switches. In fact a computer network also requires a technology to meet the availability (availability) needs of data traffic. One technology that can meet the availability of data traffic needs is VTP and Etherchannel.
APA, Harvard, Vancouver, ISO, and other styles
5

Nichol, Sandy. "VLANs usurped by virtual private networks." Computers & Security 18, no. 4 (January 1999): 340. http://dx.doi.org/10.1016/s0167-4048(99)90735-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gatra, Ramadhan, Reonaldo Akbar, Bambang Sugiantoro, and Naufal Asyhab. "VLAN-based LAN Network Management Comparison using Cisco and Brocade." IJID (International Journal on Informatics for Development) 7, no. 2 (January 9, 2019): 45. http://dx.doi.org/10.14421/ijid.2018.07208.

Full text
Abstract:
Abstract— The need for security and convenience in carrying out data requires all users to be able to create a safer network, both in terms of data communication and in terms of sharing internet connection lines. The effectiveness of performance in work is always required to be able to work quickly and on time without the constraints of one of the high data traffic that causes problems in network devices in one building. Which ultimately causes all work to be hampered in its completion. With the management of VLANs in a LAN connection, it will be able to parse problems especially in terms of data communication and logical data transmission. (Abstract)Keywords: LAN, VLAN, Network
APA, Harvard, Vancouver, ISO, and other styles
7

Júnior, Ciro Ferreira de Carvalho, and Kely Rejane Souza dos Anjos de Carvalho. "Aprimorando o desempenho e a segurança das redes locais universitárias com a utilização das técnicas de VLAN." ScientiaTec 6, no. 1 (June 28, 2019): 106–26. http://dx.doi.org/10.35819/scientiatec.v6i1.3470.

Full text
Abstract:
Este trabalho consiste em apresentar as características de uma rede de computadores de abrangência local (LAN), assim como também demonstrar o funcionamento de uma Rede Local Virtual – VLAN e mostrar até que ponto as VLANs podem melhorar ou não no desempenho e na segurança de uma rede local corporativa ou universitária. Foi realizado um levantamento bibliográfico para fundamentar e embasar o entendimento de redes locais (LAN) e redes locais virtuais (VLAN), tornando possível ao leitor entender melhor o conceito e funcionamento destas redes. Para a realização deste artigo foram utilizados dois switches da marca 3com com suporte ao protocolo VLAN e um computador, denominado Servidor com o Sistema Operacional – Debian. Ao final, os resultados obtidos foram satisfatórios, uma vez que foram verificadas melhorias gerais de desempenho ao reduzir significativamente o domínio de broadcast, e também melhorias na segurança da informação ao segmentar logicamente os usuários por grupos ou funções, podendo inclusive criar regras de acesso para cada rede virtual entre si ou entre as redes virtuais e a Internet, por meio de um firewall.
APA, Harvard, Vancouver, ISO, and other styles
8

Bahry, Muhammad Syaeful, and Bambang Sugiantoro. "Analysys and Implementation IEEE 802.1Q to Improve Network Security." IJID (International Journal on Informatics for Development) 6, no. 2 (November 28, 2018): 7. http://dx.doi.org/10.14421/ijid.2017.06202.

Full text
Abstract:
The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Balushi, Nada, Rahma Al-Klabani, and Faizal Hajmohideen. "Performance Evaluation using STP Across Layer 2 VLANs." International Journal of Communication and Networking System 001, no. 001 (June 16, 2012): 1–8. http://dx.doi.org/10.20894/ijcnes.103.001.001.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Xiaobo, and Tingting Yu. "An Algorithm of Physical Network Topology Discovery in Multi-VLANs." TELKOMNIKA (Telecommunication Computing Electronics and Control) 14, no. 3A (September 1, 2016): 375. http://dx.doi.org/10.12928/telkomnika.v14i3a.4416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Qin, Li Jun, and Ning Hui Guo. "A New Smart Substation Structure with Single Net and Single Equipment." Applied Mechanics and Materials 392 (September 2013): 572–75. http://dx.doi.org/10.4028/www.scientific.net/amm.392.572.

Full text
Abstract:
a new generation of single equipment and single network structure of intelligent substation is proposed in this paper on the basis of the current three layers two network smart substation, the key technology of this kind of new intelligent substation needs are also proposed in this paper, such as port mirroring, VLANs and IEEE1588. Examples of key technologies are presented,using industrial Ethernet switch, providing reference for engineering applications of new smart substation .
APA, Harvard, Vancouver, ISO, and other styles
12

Xiaowei, Ji, Li Zhimin, and Wenlong. "Application of Routing Communication Between VLANs in A Layer 3 Switch." IOP Conference Series: Materials Science and Engineering 569 (August 9, 2019): 032030. http://dx.doi.org/10.1088/1757-899x/569/3/032030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wenas, Gilby Lionska, Herlawati Herlawati, and Prima Dina Atika. "Simulasi Management Network Menggunakan Metode VLAN Pada SMPN 255 Jakarta." Journal of Students‘ Research in Computer Science 2, no. 1 (May 25, 2021): 99–110. http://dx.doi.org/10.31599/jsrcs.v2i1.638.

Full text
Abstract:
Abstract The need for network technology cannot be avoided anymore because of its very pronounced benefits, where the network can help communication in sharing information and data by cutting time and distance. Internet is an indispensable need, especially in education, network quality, distribution or network segmentation, the hardware used, especially SMPN 255 Jakarta. The development method used by NDLC. Data collection is the interview method, observation, literature study, network network design using Star Topology, a network simulation system built using the media routerboard 750 hEX lite as the main router as well as a router for network distribution. It is hoped that this can help SMPN 255 Jakarta a little in distributing the existing local network according to the needs and increasing existing users, then providing convenience in network system maintenance or changes. The result is the successful configuration for implementing VLANs on the Jakarta 255 SMPN network to be able to distribute the network and use the existing features optimally so that it can develop the existing network but at a cost that is not that big. Keywords: Mikrotik, Network Design, Network Management, NDLC, VLAN. Abstrak Kebutuhan akan teknologi jaringan tidak dapat dihindari lagi karena manfaatnya yang sangat terasa, dimana jaringan dapat membantu komunikasi dalam pembagian informasi maupun data dengan memangkas waktu dan jarak. Internet merupakan suatu kebutuhan yang sangat diperlukan, terutama dalam pendidikan, kualitas jaringan, pendistribusian atau segmentasi jaringan, perangkat keras yang digunakan khususnya SMPN 255 Jakarta. Metode pengembangan yang digunakan NDLC. Pengumpulan data yaitu metode wawancara, observasi, studi pustaka, Perancangan jaringan jaringan menggunakan Topologi Star, sistem simulasi jaringan yang dibangun menggunakan media routerboard 750 hEX lite sebagai router utama sekaligus router untuk mendistribusi jaringan. Diharapkan ini bisa sedikit membantu SMPN 255 Jakarta dalam mendistribusikan jaringan lokal yang ada sesuai dengan kebutuhan dan peningkatan pengguna yang ada, kemudian memberikan kemudahan dalam pemeliharaan sistem jaringan ataupun perubahan. Hasil yang ada berupa berhasilnya konfigurasi untuk penerapan VLAN pada jaringan SMPN 255 Jakarta untuk dapat mendistribusikan jaringan dan penggunaan fitur yang ada dimanfaatkan dengan optimal sehingga dapat mengembangkan jaringan yang ada namun dengan biaya yang tidak begitu besar. Kata kunci: Mikrotik, Management Network, NDLC, Perancangan Jaringan, VLAN.
APA, Harvard, Vancouver, ISO, and other styles
14

Khaleel, Mustafa I. "Load Balancing and Thermal-Aware in Geo-Distributed Cloud Data Centers Based on Vlans." Science Journal of University of Zakho 6, no. 3 (September 30, 2018): 113–17. http://dx.doi.org/10.25271/sjuoz.2018.6.3.515.

Full text
Abstract:
Power consumption in datacenters has become an emerging concern for the cloud providers. This poses enormous challenges for the programmers to motivate new paradigms to enhance the efficiency of cloud resources through designing innovative energy-aware algorithms. However, balancing the weights over geographically dispersed datacenters has been shown to be essential in decreasing the temperature consumption per datacenter. In this paper, we have formulated a load balancing paradigm to exploit the idea of scheduling scientific workflows over distributed cloud resources to make system outcome more efficient. The proposed heuristic works based on three constraints. First, initiating cloud resource locality for tenants and calculating the shortest distance in order to direct module applications to the closet resources and conserving more bandwidth cost. Second, selecting the most temperature aware datacenters based on geographical climate to maintain electricity cost for the providers. Third, running multiple datacenters within the same geographical location instead of housing the entire workloads in a single datacenter. This allows providers to take a tremendous advantage of sustaining the system from degradation or even unpredictable failure which in turn will frustrate the tenants. Furthermore, applications are formulated as Directed Acyclic Graph (DAG)-structured workflow. For the underlying cloud hardware, our model groups the cloud servers to communicate as if they were in the same physical location. Additionally, both modes, on-demand and reservation, are supported in our algorithm. Finally, the simulation showed that our method was able to enhance the utilization rates about 67% compared to the baseline model.
APA, Harvard, Vancouver, ISO, and other styles
15

Zaen, Mohammad Taufan Asri, and Syahadatul Intihan. "Perancangan Switch Manageable Untuk Pengelolaan Virtual LAN Menggunakan Linux CentOS Pada SMKN 2 Kuripan." Jurnal Informatika dan Rekayasa Elektronik 1, no. 1 (May 3, 2018): 18. http://dx.doi.org/10.36595/jire.v1i1.27.

Full text
Abstract:
In realizing an integrated service both internally and externally, SMK Negeri 2 Kuripan need a reliable computer network infrastructure and can connect all units in a single integrated network. Current state of computer networks in SMK Negeri 2 Kuripan is still a large computer networks and complex. With the computer network conditions like this, it causes traffic in computer networks become dense eventually cause some problems such as access to an application to be slow. Under these conditions, then the computer network in SMK Negeri 2 Kuripan requires a segmentation of the network / subnetwork according to the needs of the organization. Computer networks in SMK Negeri 2 Kuripan is still using a single network ID, so as to make the segmentation of networks of smaller needed a way to break the single Network ID into a Network ID. Subnetting is a way to break up the Network ID is by using hostid bits to form part subnetID. Subnetting process is done on a single Network ID is produced 11 subnet that has been established based on the needs of organizations SMK Negeri 2 Kuripan. Utilization of Virtual LAN topologies for the physical design and subnetting for logic design is able to provide optimization of the performance of computer networks. Optimization is achieved due to the use of VLAN network can reduce the collision data (collision) by blocking packets / frames that do not need to be outstanding in the network. In addition, VLANs can also be split in / out broadcast domain, so that data packets sent from a host will only be forwarded to the destination host and other hosts will not accept packets / frames.
APA, Harvard, Vancouver, ISO, and other styles
16

Ahmed, Alaa H., and Mokhaled N. A. Al-Hamadani. "Designing a secure campus network and simulating it using Cisco packet tracer." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (July 1, 2021): 479. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp479-489.

Full text
Abstract:
<span>The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs’) using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.</span>
APA, Harvard, Vancouver, ISO, and other styles
17

Umamaheswari, K., and S. Sujatha. "Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud." Defence Science Journal 67, no. 6 (November 6, 2017): 645. http://dx.doi.org/10.14429/dsj.67.11118.

Full text
Abstract:
<p class="p1">Data security and privacy are perennial concerns related to cloud migration, whether it is about applications, business or customers. In this paper, novel security architecture for the cloud environment designed with intrusion detection and prevention system (IDPS) components as a graded multi-tier defense framework. It is a defensive formation of collaborative IDPS components with dynamically revolving alert data placed in multiple tiers of virtual local area networks (VLANs). The model has two significant contributions for impregnable protection, one is to reduce alert generation delay by dynamic correlation and the second is to support the supervised learning of malware detection through system call analysis. The defence formation facilitates malware detection with linear support vector machine- stochastic gradient descent (SVM-SGD) statistical algorithm. It requires little computational effort to counter the distributed, co-ordinated attacks efficiently. The framework design, then, takes distributed port scan attack as an example for assessing the efficiency in terms of reduction in alert generation delay, the number of false positives and learning time through comparison with existing techniques is discussed.</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Yangrong, June Li, Qiuyu Lu, Hai Lin, Yu Xia, and Fuyang Li. "Cyber Security for Multi-Station Integrated Smart Energy Stations: Architecture and Solutions." Energies 14, no. 14 (July 15, 2021): 4287. http://dx.doi.org/10.3390/en14144287.

Full text
Abstract:
Multi-station integration is motivated by the requirements of distributed energies interconnection and improvements in the efficiency of energy systems. Due to the diversity of communication services and the complexity of data exchanges between in-of-station and out-of-station, multi-station integrated systems have high security requirements. However, issues related to cyber security for multi-station integrated systems are seldom explored. Hence, this paper designs the secondary system architecture and proposes cyber security protection solutions for smart energy stations (SESt) that integrate the substation, photovoltaic station, energy storage station, electric vehicle charging station, and data center station. Firstly, the composition of SESt and functions of each substation are presented, a layered architecture of SESt is designed, and data exchanges of SESt are analyzed. Then, the cyber security threats and requirements of SESt are illustrated. Moreover, the cyber security protection principle and a cyber security protection system for SESt are proposed. On this basis, a security zoning and isolation scheme for SESt is designed. Finally, a traffic isolation scheme based on virtual local area networks (VLANs), a real-time guarantee scheme for communications based on service priority, and an enhancing cyber security scheme based on improved IEC 62351 are proposed for SESt.
APA, Harvard, Vancouver, ISO, and other styles
19

Midha, Sugandhi, Khushboo Tripathi, and M. K. Sharma. "Practical Implications of Using Dockers on Virtualized SDN." Webology 18, Special Issue 01 (April 29, 2021): 312–30. http://dx.doi.org/10.14704/web/v18si01/web18062.

Full text
Abstract:
Containers, Dockers, and Software Defined Networks are one of the prominent topics in the market these days. In a wish to cater to new business needs of containers with clouds and linking all it to SDN gives promising results. To solve various issues like multiple located branch networks, high cost, technical resources required at each location, expertise requirement, decentralized control of network devices, dependency on separate VLANs for each branch, difficult traffic management, etc., we surveyed works of literature and studies for the various existing SDN controllers. In our paper, we have tried to predict the importance of using Dockers on the SDN Cloud Platform. Various Parameters like latency, throughput, bandwidth usage, availability, connectivity, packet loss, etc. have been used to check SDN performance with and without the use of Dockers. We have tried to provide detailed test analysis and results regarding various performance parameters based on the simulations on the Google Cloud Platform (GCP). Results on Dockers have been proven in terms of resource utilization; talk about CPU usage or memory usage; usage is rising exponentially in the case of VMs as compared to containers. Bootup latency time in Dockers is also almost half the time taken by VMs.
APA, Harvard, Vancouver, ISO, and other styles
20

Рытов, Михаил, Mikhail Rytov, Руслан Калашников, and Ruslan Kalashnikov. "APPLICATION OF STRIDE METHODOLOGY FOR DETERMINING CURRENT SECURITY THREATS FOR PROGRAM-DEFINED NETWORKS." Automation and modeling in design and management 2019, no. 3 (November 24, 2019): 19–24. http://dx.doi.org/10.30987/article_5d8d113d968333.98732766.

Full text
Abstract:
Software-defines networkstransfer the control of the entire network to a single autonomous software system. One outcome is the ability to flexibly configure and manage the network, but at the same time it opens up several new attack vectors. As the impact of compromised devices increases significantly, the development of SDN devices must be subject to ongoing threat analysis. A STRIDE-based security analysis of the SDN, presented in this paper, reveals a wide range of SDN-specific threats, which have not yet been counteracted adequately. Some of them are inherently tied to SDN design principles, such as controllers becoming potential central attack targets; others are inherited from the underlying infrastructure, e. g., the susceptibility to Spoofing.Based on the results of this analysis, this article identifies the main threats and proposes solutions that allow the development of a secure SDN architecture. It also emphasizes the role of authenticity and integrity controls for the involved components and the management protocol messages exchanged between them. A key element of the proposed model is to ensure that security measures not only prevent, but also detect attempts and successful attacks on SDN components. It is also worth noting that securing the management communication still has to rely on well-established traditional concepts, such as out-of-band management or at least separate management VLANs. Furthermore, solutions to prevent flow table flooding, e. g., as a result of DoS attacks, will need to be designed and deployed.
APA, Harvard, Vancouver, ISO, and other styles
21

Pokorný, Martin, and Petr Zach. "Design, implementation and security of a typical educational laboratory computer network." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 61, no. 4 (2013): 1077–87. http://dx.doi.org/10.11118/actaun201361041077.

Full text
Abstract:
Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts), and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments), which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. After that, a topological diagram of the network is described which is based on different VLANs and port-based access control using the IEEE 802.1x/EAP-TLS/RADIUS authentication to achieve defined level of network access. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices – inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a system of virtual machines preparation and automated deployment tailored for our needs is briefly outlined.
APA, Harvard, Vancouver, ISO, and other styles
22

Palmer, Peter. "Frédéric Rapin, Musik in Luzern, Rhapsodische Kammermusik aus der Schweiz’. ERNST LEVY, HERMANN SUTER." Tempo 58, no. 229 (July 2004): 58–60. http://dx.doi.org/10.1017/s0040298204350229.

Full text
Abstract:
‘Frédéric Rapin: Concertos suisses pour clarinettes’. Works by HERBERT FRIES, ARMIN SCHIBLER, JEAN BINET, JEAN BALISSAT, ANDOR KOVACH and ALEXIS CHALIER. Frédéric Rapin (cl), Kammerorchester Arpeggione Hohenems c. Jean-François Antonioli. Musiques Suisses Grammont Portrait MGB CTS-M 80.‘Musik in Luzern: Kammermusik Duo Lang’. FRITZ BRUN: Sonata No. 1 for Violin and Piano. THÜRING BRÄM: Album ‘Goodbye Seventies’. With works by MENDELSSOHN and RACHMANINOV. Brigitte Lang (vln), Yvonne Lang (pno). GALLO CD-1084.‘Rhapsodische Kammermusik aus der Schweiz’. ERNST LEVY: Quintet in C minor for 2 violins, viola, cello and double bass1. HERMANN SUTER: Sextet in C major for 2 violins, viola, 2 cellos and double bass2. FRANK MARTIN: Rhapsodie for 2 violins, 2 violas and double bass3. Florian Kellerhals, Stefan Häussler (vlns), 2,3Nicolas Corti, 1,3Bodo Friedrich (vlas), Imke Frank, 2Matthias Kuhn (vcs), Andreas Cincera (db). Musiques Suisses MGB CD 6201.HERMANN SUTER: Symphony in D minor. HANS JELMOLI: Three Pieces for Orchestra from the comic opera Sein Vermächtnis. Moscow Symphony Orchestra c. Adriano. Sterling CDS-1052-2.
APA, Harvard, Vancouver, ISO, and other styles
23

Tulloh, Rohmat. "Analisis Performansi VLAN Pada Jaringan Software Defined Network (SDN)." JURNAL INFOTEL 9, no. 4 (November 8, 2017): 406. http://dx.doi.org/10.20895/infotel.v9i4.319.

Full text
Abstract:
Software defined network (SDN) adalah sebuah paradigma baru dalam dunia jaringan yang mampu memusatkan fungsi beberapa control plane pada layer 2 maupun di layer 3 secara terprogram, hal tersebut menyebabkan jaringan akan bersifat lebih fleksibel dan terskala. Dengan jumlah pertumbuhan pengguna internet yang semakin tinggi maka hal tersebut akan berbanding lurus terhadap kompleksitas dari jaringan internet itu sendiri. Sehingga paradigma SDN ini menjadi salah satu solusi yang muncul. Penerapan Virtual Local Area Network (VLAN) pada jaringan tradisional telah menjadi hal yang penting dan banyak diterapkan. Fungsi VLAN adalah untuk membatasi broadcast trafik dari suatu host, sehingga hanya dapat mengirim data kepada VLAN ID yang sama. Penelitian ini menganalisis performansi VLAN di jaringan SDN. Terjadi penurunan angka jumlah paket yang dapat terkirim (data transfer) dan nilai throughput pada sebuah VLAN ID karena terdapat pengaruh dari VLAN ID yang berbeda. Pada pengujian membandingkan VLAN dengan non VLAN over Netwok Functions Virtualization (NFV) didapatkan bahwa nilai data transfer dan throughput yang diperoleh pada VLAN lebih besar. Hasil analisis dari seluruh pengujian penambahan traffic terlihat bahwa kinerja VLAN pada SDN akan membebani kinerja jaringan pada VLAN yang berbeda
APA, Harvard, Vancouver, ISO, and other styles
24

Ayuningtyas, Astika, Sudaryanto Sudaryanto, and Deno Daseftra Cessara. "Sistem Manajemen Virtual Local Area Network (VLAN) Pada Cisco Catalyst 3750 Berbasis Web." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 297–306. http://dx.doi.org/10.24176/simet.v11i1.4084.

Full text
Abstract:
VLAN merupakan salah satu teknologi komputer yang saat ini sangat dibutuhkan. Hal ini dikarenakan VLAN dapat membagi satu jaringan pada perangkat switch menjadi bagian-bagian kecil jaringan lain. Cisco Catalyst 3750 merupakan perangkat switch yang sudah menyediakan teknologi VLAN. Permasalahan yang ditemukan pada Cisco Catalyst 3750 adalah sistem manajemen VLAN yang masih berbasis command line dan tidak dapat diakses dari jarak jauh. Untuk itu dibuat VLAN berbasis GUI dan dapat diakses dari jarak jauh. VLAN yang dibuat berbasis Web dengan tujuan untuk memberikan kebebasan pemakaian device dan tidak harus terfokus pada satu jenis device saja. VLAN berbasis Web ini dibuat dengan memanfaatkan API Cisco sebagai penghubung antara bahasa pemrograman pada VLAN berbasis Web dengan bahasa pada perangkat lunak Cisco Catalyst 3750.Pemanfaatan Telnet berperan penting dalam pembuatan VLAN berbasis Web ini, dimana Telnet memberikan akses lebih luas pada Cisco Catalyst 3750 untuk diakses di luar aplikasi terminal emulator. Dengan pemanfaatan Telnet administrator cukup mengujungi IP yang telah dibuat untuk mengakses Cisco Catalyst 3750. Akses jarak jauh pada VLAN berbasis Web ini menggunakan port fowarding. Serveo.net adalah salah satu penyedia layanan port fowarding. Dengan memanfaatkan Serveo.net, VLAN berbasis Web yang masih dalam server local dapat diakses dari jarak jauh meski tanpa IP publik. Hasil pengujian pada penelitian ini menunjukkan bahwa VLAN berbasis Web terbukti dapat melakukan konfigurasi VLAN sehingga dapat digunakan untuk mengatur hubungan antar komputer sesuai dengan kebutuhan pada jaringan yang digunakan.
APA, Harvard, Vancouver, ISO, and other styles
25

Yoga, Bhaskara Budi, and Made Agung Raharja. "IMPLEMENTASI VLAN (VIRTUAL LOCAL AREA NETWORK) PADA RUMAH SAKIT MATA RAMATA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 7, no. 3 (March 17, 2019): 177. http://dx.doi.org/10.24843/jlk.2019.v07.i03.p07.

Full text
Abstract:
Rumah Sakit Mata Ramata merupakan rumah sakit mata yang masih dalam tahap pembangunan baik dari segi bangunan, teknis, maupun sistem. Penelitian ini akan membahas tentang pembangunan dari segi sistem pada jaringan rumah sakit ini dengan tujuan untuk mengoptimalkan komunikasi data pada rumah sakit ini nantinya ketika sudah mulai beroperasi. Penelitian ini berfokus untuk membahas tentang konfigurasi VLAN yang berperan penting dalam mengoptimalkan komunikasi data nantinya. VLAN merupakan suatu model jaringan yang membagi jaringan secara logikal kedalam beberapa VLAN yang berbeda. VLAN tidak terbatas pada kondisi fisik jaringan seperti pada LAN, VLAN dapat di konfigurasi secara virtual tanpa harus melihat kondisi peralatan, sehingga VLAN memiliki fleksibilitas di dalam pengaturan jaringan dan memudahkan administrator jaringan dalam membagi jaringannya sesuai dengan fungsi dan kebutuhan keamanan jaringan tersebut. Karena itu lah RS Mata Ramata sangat memerlukan VLAN dalam komunikasi data nantinya yang dimana selain menghemat tempat VLAN juga dapat menghemat biaya karena tidak perlu menggunakan banyak switch untuk keperluan jaringan pada Rumah Sakit ini.
APA, Harvard, Vancouver, ISO, and other styles
26

Sudha, M., Aishwaran K., Arun A., Jagadesh T., and Japus Nelson. "IMPLEMENTATION OF VLAN AND INTER VLAN IN CORPORATE NETWORKS." International Journal of Advanced Research 8, no. 02 (February 29, 2020): 1074–78. http://dx.doi.org/10.21474/ijar01/10548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Porime Matondang, Lipur Sugiyanta, and Bachren Zaini. "ANALISIS LAYANAN INFRASTRUKTUR JARINGAN VLAN (VIRTUAL LOCAL AREA NETWORK) DI SMK KARYAGUNA." PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer 4, no. 1 (June 1, 2020): 7–13. http://dx.doi.org/10.21009/pinter.4.1.2.

Full text
Abstract:
Penelitian ini bertujuan untuk menganalisis layanan infrastruktur jaringan VLAN (Virtual Local Area Network) di SMK Karyaguna. Penelitian ini menggunakan metode penelitian rekayasa teknik. SMK Karyaguna Jakarta telah memiliki intranet untuk menunjang kegiatan belajar mengajar. Infrastruktur jaringan VLAN sudah tersedia sejak 1 tahun terakhir selama kurun waktu tersebut staf IT belum mengetahui performasi jaringan yang ada, oleh karenanya penelitian ini dilakukan untuk mengetahui bagaimana performansi infrastruktur jaringan VLAN di SMK Karyaguna Jakarta serta memberi rekomendasi untuk pengembangan di masa yang akan datang. Sistem jaringan yang dikembangkan diharapkan mampu memenuhi kepuasan pengguna jaringan yang lebih optimal dalam mendukung kegiatan prosses belajar yang ada di SMK karyaguna Jakarta. Penelitian ini dilakukan di ruang LABKOM pada bulan Mei-Agustus 2018. Penelitian dilakukan dengan mengukur parameter QoS yaitu aktual bandwidth, delay, serta packet loss. Hasil pengukuran QoS sebelum dan sesudah menerapkan VLAN yang dilakukan pada tanggal 20-24 Agustus 2018 pukul 10.00 – 16.00 menunjukkan perbedaan antara sebelum dan sesudah menerapkan VLAN. Delay mengalami peningkatan dari 450 ms jelek setelah menerapkan VLAN termasuk dalam kategori sangat bagus, karena nilai delay berkisar antara 150 ms sampai dengan 300 ms. Sedangkan Pada parameter QoS packet loss yang menurut versi TIPHON, bahwa packet loss sebelum menerapkan VLAN jelek karena nilai packet loss-nya 25% sedangkan setelah menerapkan VLAN nilai packet loss termasuk dalam kategori bagus, karena nilai packet loss-nya 0% yang dapat dilihat dengan mekanisme pengukuran parameter QoS menggunakan piranti lunak Axence NetTools. Pengujian ini diharapkan mampu membuktikan bagaimana performansi jaringan VLAN yang ada di SMK Karyaguna Jakarta. Sehingga dapat memberi rekomendasi untuk perencanaan dan pengembangan infrastruktur jaringan VLAN di masa yang akan datang.
APA, Harvard, Vancouver, ISO, and other styles
28

Fahri, Muhamad, Andrew Fiade, and Hendra Bayu Suseno. "Simulasi Jaringan Virtual Local Area Network (VLAN) Menggunakan Pox Controller." JURNAL TEKNIK INFORMATIKA 10, no. 1 (January 22, 2018): 85–90. http://dx.doi.org/10.15408/jti.v10i1.6821.

Full text
Abstract:
ABSTRAK Keterbatasan LAN melahirkan sebuah teknologi VLAN yang memungkinkan adanya konfigurasi dari suatu jaringan komputer secara virtual (virtualisasi). Proses mencocokkan fleksibilitas virtualisasi server sulit dilakukan dengan switch tradisional, sebab logika kontrol untuk setiap switch terletak dalam logika switching yang sama. Software Defined Network (SDN) memisahkan control plane dari forwarding hardware. Migrasi logic control yang digunakan pada perangkat yang terintegrasi (misalnya switch ethernet) menjadi mudah diakses dan secara logis jaringan menjadi terpusat dalam hal pengendalian. Pada penelitian ini dilakukan simulasi jaringan VLAN menggunakan Pox controller sehingga dapat mengetahui hasil evaluasi jaringan VLAN menggunakan pox controller. Berdasarkan fase simulation, konfigurasi jaringan VLAN lebih ditekankan pada controller. Berdasarkan hasil pengujian nilai rata-rata jitter, pada jaringan VLAN menggunakan 2 buah switch nilai rata-rata Jitter sebesar 0,009 ms. Nilai rata-rata jitter tersebut lebih kecil dari nilai rata-rata jitter pada jaringan VLAN yang menggunakan 3 buah switch yaitu sebesar 0,027 ms. Sedangkan hasil pengujian nilai rata-rata packet loss memiliki nilai yang sama, yaitu 0%. Nilai rata-rata packet loss tersebut menunjukkan bahwa kedua skenario tersebut tidak terjadi kehilangan paket. ABSTRACT Limitations of the LAN gave birth to a VLAN technology that allows the configuration of a virtual computer network (virtualization). The process of matching server virtualisation flexibility is difficult with traditional switches, since the control logic for each switch lies in the same switching logic. Software Defined Network (SDN) separates the control plane from hardware forwarding. The migration logic controls used on integrated devices (eg ethernet switches) are easily accessible and logically the network becomes centralized in terms of control. In this research VLAN network simulation using Pox controller so that can know result of evaluation of VLAN network using pox controller. Based on the simulation phase, VLAN network configuration is more emphasized on the controller. Based on the results of testing the average value of Jitter, on the VLAN network using 2 pieces of the average value of Jitter value of 0.009 ms. The average value of Jitter is smaller than the average value of Jitter on a VLAN network using 3 switches of 0.027 ms. While the test results the average value of Packet Loss has the same value, ie 0%. The average value of Packet Loss indicates that both scenarios do not occur Packet Loss. How to Cite : Fahri, M. Fiade, A. Suseno, H.B. (2017). SIMULASI JARINGAN VIRTUAL LOCAL AREA NETWORK (VLAN) MENGGUNAKAN POX CONTROLLER. Jurnal Teknik Informatika, 10(1), 85-90. doi:10.15408/jti.v10i1.6821Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i1.6821
APA, Harvard, Vancouver, ISO, and other styles
29

Gozali, Ferrianto, and Billion Lo. "Sistem Pengalokasian Dinamik VLAN Dalam Mendukung Proses Belajar Terdistribusi." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 1, no. 1 (March 8, 2012): 69. http://dx.doi.org/10.23887/janapati.v1i1.9781.

Full text
Abstract:
Seiring perkembangan pendidikan, penggunaan ICT sangatlah besar dalam proses perkembangan tersebut. Dengan penggunaan ICT ini, memungkinkan distance learning diimplementasi dimana proses belajar mengajar tidak harus lagi berada dikelas seperti pada pendidikan yang konvensional. Dengan adanya distance learning dapat memecahkan masalah spasial baik dari ukuran ruangan terhadap jumlah murid dan keterbatasan untuk dapat hadir kedalam ruang perkuliahan. Karena itulah, Sistem Pengalokasian Virtual Local Area Network (VLAN) secara Dinamis dibutuhkan. Sistem ini merupakan sistem yang berbasis protokol Radius yang dapat membantu untuk mengotentikasi dan memindahkan client antar sub jaringan (VLAN) didalam jaringan internal suatu perkuliahan.Perancangan sistem digunakan aplikasi berbasis open source. Pada perancangan sistem Dinamik VLAN ini, penulis menggunakan sistem otentikasi berdasarkan MAC-Address dari client yang akan dimapping kedalam VLAN yang akan dituju. MAC-Address dan VLAN yang akan dituju disimpan didalam database. Untuk skema jaringannya, server dan client akan terhubung menggunakan manageable switch.Mekanisme kerja dari sistem pengalokasian VLAN secara dinamis ini terdiri dari 3 (tiga) tahap yaitu: tahap penerimaan request dari Network Access Server (NAS), pengecekan MAC-Address terhadap VLAN yang dituju dan persetujuan otentikasi dan otorisasi. Untuk mendukung proses pembelajaran jarak jauh, digunakan Web Conference dan aplikasi seperti file sharing pada jaringan VLAN tersebut. Untuk pengujian sistem tersebut, kita menggunakan applikasi Web Conference dengan cara membandingkan performa jaringan pada saat dengan dan tanpa sistem tersebut.Dalam mengimplementasikan sistem ini, terbilang murah karena suatu perusahaan hanya membutuhkan sebuah server dengan Sistem Operasi yang gratis dan aplikasi yang gratis dan dapat diimplementasikan langsung ke dalam jaringan perusahaan tanpa perubahan topologi jaringan yang menyeluruh.Namun dalam sistem ini masih terdapat kekurangan, dimana sistem ini hanya dapat diaplikasikan dengan menggunakan Manageable Switch dan belum dapat digunakan untuk Wi-fi dan Unmanageable Switch.
APA, Harvard, Vancouver, ISO, and other styles
30

Tulloh, Rohmat, Ridha Muldina Negara, and Arif Nur Hidayat. "Simulasi Virtual Local Area Network (VLAN) Berbasis Software Defined Network (SDN) Menggunakan POX Controller." JURNAL INFOTEL - Informatika Telekomunikasi Elektronika 7, no. 2 (November 10, 2015): 129. http://dx.doi.org/10.20895/infotel.v7i2.40.

Full text
Abstract:
VLAN (Virtual LAN) merupakan sebuah teknologi yang dapat mengkonfigurasi jaringan logis independen dari struktur jaringan fisik. Hasil dari penelitian sebelumnya sudah diprediksi bahwa dibutuhkan Virtual Network yang akhirnya terciptalah VLAN. Namun paradigma jaringan saat ini tidak flexible, ketergantungan terhadap vendor sangat besar karena fungsi data plane dan control plane berada dalam satu paket device. SDN (Software defined network) yang merupakan salahsatu evolusi teknologi jaringan sesuai dengan tuntutan yang berkembang dimana memisahkan fungsi data plane dan control plane pada suatu perangkat. POX Controller digunakan untuk men-simulasikan dan menguji Platform SDN (Software defined network). Pada penelitian ini menggunakan Openflow versi 1.0 untuk memasang header VLAN sehingga penelitian ini difokuskan untuk mengevaluasi performa forwarding VLAN yang memanfaatkan Openflow sebagai control plane dapat berfungsi dengan baik. Hasil penelitian ini mengusulkan penerapan karakteristik teknologi VLAN pada SDN karena telah berjalan dengan benar sesuai hasil pengujian konektifitas, verifikasi dan keamanan. Kemudian hasil pengujian lanjutan untuk melihat pengaruh SDN dengan skenario penambahan jumlah VLAN ID didapatkan bahwa set-up time akan bertambah seiring meningkatnya jumlah host dan dengan menggunakan protokol OpenFlow, latency yang terjadi di jaringan dapat dipantau dengan parameter round trip time (RTT) yang stabil direntang 0,2 sampai 6 second walaupun jumlah vlan_id dan background traffic bertambah.
APA, Harvard, Vancouver, ISO, and other styles
31

Mohr, Mary A., Brooke D. Vergales, Hoshik Lee, Matthew T. Clark, Douglas E. Lake, Anne C. Mennen, John Kattwinkel, et al. "Very long apnea events in preterm infants." Journal of Applied Physiology 118, no. 5 (March 1, 2015): 558–68. http://dx.doi.org/10.1152/japplphysiol.00144.2014.

Full text
Abstract:
Apnea is nearly universal among very low birth weight (VLBW) infants, and the associated bradycardia and desaturation may have detrimental consequences. We describe here very long (>60 s) central apnea events (VLAs) with bradycardia and desaturation, discovered using a computerized detection system applied to our database of over 100 infant years of electronic signals. Eighty-six VLAs occurred in 29 out of 335 VLBW infants. Eighteen of the 29 infants had a clinical event or condition possibly related to the VLA. Most VLAs occurred while infants were on nasal continuous positive airway pressure, supplemental oxygen, and caffeine. Apnea alarms on the bedside monitor activated in 66% of events, on average 28 s after cessation of breathing. Bradycardia alarms activated late, on average 64 s after cessation of breathing. Before VLAs oxygen saturation was unusually high, and during VLAs oxygen saturation and heart rate fell unusually slowly. We give measures of the relative severity of VLAs and theoretical calculations that describe the rate of decrease of oxygen saturation. A clinical conclusion is that very long apnea (VLA) events with bradycardia and desaturation are not rare. Apnea alarms failed to activate for about one-third of VLAs. It appears that neonatal intensive care unit (NICU) personnel respond quickly to bradycardia alarms but not consistently to apnea alarms. We speculate that more reliable apnea detection systems would improve patient safety in the NICU. A physiological conclusion is that the slow decrease of oxygen saturation is consistent with a physiological model based on assumed high values of initial oxygen saturation.
APA, Harvard, Vancouver, ISO, and other styles
32

Kwiecien, Grzegorz, Bahar Gharb, Kashyap Tadisina, Maria Madajka, Judith Drazba, James Zins, and Graham Schwarz. "Quantity of Lymph Nodes in the Vascularized Lymph Node Transfer Influences Its Lymphaticovenous Drainage." Journal of Reconstructive Microsurgery 34, no. 01 (October 15, 2017): 041–46. http://dx.doi.org/10.1055/s-0037-1606320.

Full text
Abstract:
Background The purpose of this study was to: (1) evaluate the mechanism of lymph drainage through a vascularized lymph node (VLN) flap, and (2) investigate if the number of VLNs impacts lymph transit time through the flap. Methods Twenty-seven axillary VLN flaps were elevated in 14 Sprague-Dawley rats and divided into three groups (n = 9 each) based on the number of lymph nodes present: group 1 (0-VLNs), group 2 (2-VLNs), and group 3 (4-VLNs). Indocyanine green (n = 8/group) and Alexa680-albumin (n = 1/group) were injected into the edge of flaps and the latency period between injection and fluorescence in the axillary vein was recorded. Stereomicroscopic fluorescent lymphography was performed to directly visualize lymphatic transit through VLNs. Results Fluorescence was detected in the axillary vein after 229s [47–476], 79s [15–289], and 56s [16–110] in group 1, 2, and 3, respectively (p < 0.01). There was a negative correlation between the number of VLNs in the flap and the latency period (r = -0.59; p < 0.05). Median flap weights were comparable in group 1, 2, and 3 (258 mg [196–349], 294 mg [212–407], 315 mg [204–386], respectively; p = 0.54). Stereoscopic lymphography allowed direct visualization of lymphatic fluid transit through VLNs. Conclusion Lymphatic fluid in VLN flaps drains into the venous system mainly by passing through the afferent lymphatics and lymph nodes. A secondary mechanism appears to be the diffusion of fluid into the venous system via intratissue lymphaticovenous connections created during flap elevation. Increasing the number of lymph nodes in the flap is associated with a more rapid transit of fluid.
APA, Harvard, Vancouver, ISO, and other styles
33

VENKATESWARAN, N., S. PATTABIRAMAN, R. DEVANATHAN, B. KUMARAN, ASHRAF AHMED, and SANKARA NARAYANAN. "A DESIGN METHODOLOGY FOR VERY LARGE ARRAY PROCESSORS—PART 1: GIPOP PROCESSOR ARRAY." International Journal of Pattern Recognition and Artificial Intelligence 09, no. 02 (April 1995): 231–62. http://dx.doi.org/10.1142/s0218001495000122.

Full text
Abstract:
Very Large Array Processors (VLAP) will be the need of the future for solving computationally intense Very Large Problems (VLP) common in pattern recognition, image processing and other related areas of digital signal processing. Design methodology of such VLAPs for massively parallel dedicated/general purpose applications is highly complex. Two companion papers (Part 1 and Part 2) on VLAP are presented in this issue. In Part 1, we propose a VLAP called Reconfigurable GIPOP Processor Array (RGPA). The RGPA is made up of high performance processing elements called the Generalized Inner Product Outer Product (GIPOP) processor. Unlike the traditional special/general purpose processors, ours has a totally different and new architecture and organization involving higher level functional units to match with the complex computational structures of numeric algorithms and suitable for massively parallel processing. We also present a strategy for mapping VLPs on VLAPs. In Part 2, we propose a novel VLSI design methodology for implementing cost effective and very high performance processors meant for special purpose applications and in particular, for VLAPs.
APA, Harvard, Vancouver, ISO, and other styles
34

Shimizu, Hiroshi. "Ring Network with VLAN Tag." IEEJ Transactions on Electronics, Information and Systems 125, no. 10 (2005): 1602–7. http://dx.doi.org/10.1541/ieejeiss.125.1602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Fata, Haris Diyaul, and Wahyu Andhyka Kusuma. "Implementasi Routing Inter-VLAN pada Sistem Jaringan Universitas Muhammadiyah Malang." Techno.Com 17, no. 4 (November 23, 2018): 377–83. http://dx.doi.org/10.33633/tc.v17i4.1803.

Full text
Abstract:
Pada era perkembangan teknologi seperti saat ini, kebutuhan internet sangat penting untuk mendukung segala aktifitas kita. Terlebih pada lingkungan kampus yang memiliki aktifitas yang sarat dengan internet, mulai dari aktifitas belajar mengajar, krs online, mencari materi kuliah dan lain sebagainya. Mengingat pentingnya internet maka dibutuhkan sebuah sistem jaringan yang dapat menyokong segala aktifitas tersebut. Akan tetapi sistem jaringan tersebut haruslah mudah dalam perawatannya dan memiliki efisiensi yang bagus, sehingga mengurangi cost yang harus dikeluarkan kampus. Inter-VLAN routing adalah salah satu metode yang dapat digunakan untuk mengatasi permasalahan tersebut. Hal ini dikarenakan konsep inter-VLAN routing yang terpusat pada satu router dimana semua jaringan dimanage melalui router tersebut. Hasil penelitian inter-VLAN routing ini menjadikan sistem jaringan universitas muhammadiyah malang menjadi lebih efisien.
APA, Harvard, Vancouver, ISO, and other styles
36

Zhao, Lian Feng. "Exploration and Practice for Virtual Local Area Network (VLAN) Technology." Applied Mechanics and Materials 241-244 (December 2012): 2299–302. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2299.

Full text
Abstract:
VLAN technology refers to the virtual local area network technology, which is classifyd into several network segments in logic through the internal devices of existing LAN, rather than physical location, so as to realize a computer network technology of virtual working group. This paper analyzes and studies on the generation, characteristics, and communication method of VLAN technology, as well as its actual application and setting.
APA, Harvard, Vancouver, ISO, and other styles
37

Jiang, Hongli, Steve Albers, Yuanfu Xie, Zoltan Toth, Isidora Jankov, Michael Scotten, Joseph Picca, et al. "Real-Time Applications of the Variational Version of the Local Analysis and Prediction System (vLAPS)." Bulletin of the American Meteorological Society 96, no. 12 (December 1, 2015): 2045–57. http://dx.doi.org/10.1175/bams-d-13-00185.1.

Full text
Abstract:
Abstract The accurate and timely depiction of the state of the atmosphere on multiple scales is critical to enhance forecaster situational awareness and to initialize very short-range numerical forecasts in support of nowcasting activities. The Local Analysis and Prediction System (LAPS) of the Earth System Research Laboratory (ESRL)/Global Systems Division (GSD) is a numerical data assimilation and forecast system designed to serve such very finescale applications. LAPS is used operationally by more than 20 national and international agencies, including the NWS, where it has been operational in the Advanced Weather Interactive Processing System (AWIPS) since 1995. Using computationally efficient and scientifically advanced methods such as a multigrid technique that adds observational information on progressively finer scales in successive iterations, GSD recently introduced a new, variational version of LAPS (vLAPS). Surface and 3D analyses generated by vLAPS were tested in the Hazardous Weather Testbed (HWT) to gauge their utility in both situational awareness and nowcasting applications. On a number of occasions, forecasters found that the vLAPS analyses and ensuing very short-range forecasts provided useful guidance for the development of severe weather events, including tornadic storms, while in some other cases the guidance was less sufficient.
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Jue, Jinbang Chen, Junchen Ling, Junlong Zhou, and Wei Zhang. "Link Failure Recovery in SDN: High Efficiency, Strong Scalability and Wide Applicability." Journal of Circuits, Systems and Computers 27, no. 06 (February 22, 2018): 1850087. http://dx.doi.org/10.1142/s0218126618500871.

Full text
Abstract:
Link failures are commonly observed in computer networks, including the newly emerging Software Defined Network (SDN). Considering that failure recovery methods used in traditional networks cannot be applied to SDN networks directly, we propose a method named pro-VLAN in this paper, which calculates a backup path and assigns a unique VLAN id for each link of the network based on the protection mechanism. It makes the most of SDN’s features and can recover a single link failure in SDN with the advantages of high efficiency, strong scalability and wide applicability. More specifically, high efficiency (i.e., a fast failure recovery with a low memory consumption) is achieved by calculating backup paths for each link instead of each flow and using group tables to switch backup paths automatically and locally when failures occur. Strong scalability (i.e., the amount of backup flow entries per switch is stable) is achieved by keeping the amount of links per switch no matter how the network scale extends or how the amount of flows increases. Wide applicability is achieved by always finding a path available without modifying any hardware or protocol as long as the network is still reachable after a link failure. Simulation results and mathematical analysis demonstrate that both pro-VLAN and a flow-based protection method achieve a fast failure recovery, while pro-VLAN consumes less than 1% of the forwarding entries to store backup paths as compared to the flow-based method. Moreover, when the network scale increases from 10 to 60 switches by 500%, the increase of the number of backup flow entries per switch built by pro-VLAN is only less than 50%.
APA, Harvard, Vancouver, ISO, and other styles
39

Soldan, A. "Changes to the VLA's diagnostic surveillance service." Veterinary Record 167, no. 13 (September 25, 2010): 499. http://dx.doi.org/10.1136/vr.c5211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Heimsath, A., T. Schmid, and P. Nitz. "Angle Resolved Specular Reflectance Measured with VLABS." Energy Procedia 69 (May 2015): 1895–903. http://dx.doi.org/10.1016/j.egypro.2015.03.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jiang, Li Zhu, and Xiu Ping Liu. "Research on Grouping Strategy Firewall Technology." Advanced Materials Research 791-793 (September 2013): 1630–33. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1630.

Full text
Abstract:
With the more and more complex computer network structure, security requirements are increasingly stringent and delicate. This paper based on the IEEE 802.1Q standard, Netfilter framework, proposes using use vlan technology, linux 802.1Q kernel module, designs the plan of Grouping Strategy Firewall to realize the security policies to configure the demands from the same level in different vlan, meets the security needs for different levels of the different networks and different business lines.
APA, Harvard, Vancouver, ISO, and other styles
42

Syarif, Muhamad Fariz, Ritzkal Ritzkal, and Ade Hendri Hendrawan. "ANALISIS DAN IMPLEMENTASI VIRTUAL LOCAL AREA NETWORK (VLAN) PADA LABORATORIUM PRODI TEKNIK INFORMATIKA UNIVERSITAS IBN KHALDUN BOGOR." INOVA-TIF 3, no. 1 (June 12, 2020): 75. http://dx.doi.org/10.32832/inova-tif.v3i1.4065.

Full text
Abstract:
<p>Penerapan manajemen jaringan <em>Local Area Network</em> (<em>LAN</em>) dapat diterapkan dengan menggunakan <em>Virtual Local Area Network</em> (<em>VLAN</em>), segementasi jaringan tersebut dapat meningkatkan keamanan pada jaringan <em>Local Area Network</em> (<em>LAN</em>). <em>Virtual Local Area Network</em> (<em>VLAN</em>) merupakan suatu model jaringan yang tidak terbatas pada lokasi fisik seperti <em>Local Area Network</em> (<em>LAN</em>), hal ini mengakibatkan suatu jaringan dapat dikonfigurasi secara <em>virtual</em> tanpa harus menuruti lokasi fisik peralatan. Pengguna <em>Virtual Local Area Network</em> (<em>VLAN</em>) akan membuat pengaturan jaringan menjadi lebih fleksibel dimana dapat dibuat segmen yang tidak bergantung pada lokasi <em>workstation</em>. Dari uraian di atas maka dilakukan sebuah penelitian tentang analisis dan implementasi sistem manajemen jaringan <em>Virtual Local Area Network </em>(<em>VLAN</em>) pada Laboratorium Program Studi Teknik Informatika, Universitas Ibn Khaldun Bogor.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Laksono, Agung Tri, and M. Alvian Habib Nasution. "Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (January 25, 2020): 83. http://dx.doi.org/10.30865/json.v1i2.1920.

Full text
Abstract:
In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
APA, Harvard, Vancouver, ISO, and other styles
44

Shimizu, Hiroshi. "A ring network with VLAN tag." Electrical Engineering in Japan 166, no. 1 (January 15, 2009): 60–66. http://dx.doi.org/10.1002/eej.20422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zagatto, Alessandro Moura, Willian Eiji Miyagi, Raphael Luiz Sakugawa, and Marcelo Papoti. "Utilização da distância total percorrida no teste específico de hoff como preditor da velocidade de limiar anaeróbio no futebol." Revista Brasileira de Medicina do Esporte 19, no. 4 (August 2013): 267–70. http://dx.doi.org/10.1590/s1517-86922013000400008.

Full text
Abstract:
OBJETIVO: Verificar a utilização da distância total percorrida no teste de Hoff como preditor da intensidade de limiar anaeróbio em jovens futebolistas. MÉTODOS: Para isso, 10 jovens jogadores de futebol (idade de 17 ± 1 ano e massa corporal de 64,3 ± 2,1 kg) participaram do estudo. Os sujeitos foram submetidos aos testes de 12 minutos, lactato mínimo para estimar a velocidade de limiar anaeróbio (vLAn) e ao teste de Hoff específico para o de futebol. O objetivo no teste de Hoff foi percorrer a máxima distância possível em 10 minutos de exercício conduzindo a bola de futebol em um circuito composto por dribles, saltos e corridas em direções diversas. RESULTADOS: A distância total percorrida no teste de 12 minutos foi 2.673,2 ± 64,7 m, a vLAn 11,6 ± 0,3 km.h-1 e a distância percorrida no Hoff 1.458,7 ± 49,6 m. A distância total percorrida no teste de Hoff não foi significativamente correlacionada com a vLAn (r = -0,20; P < 0,05) e com a distância percorrida no teste de 12 minutos (r = -0,15; P < 0,05). No entanto, a vLAn e a velocidade correspondente a 90% da velocidade média no teste de 12 minutos (12,0 ± 0,3 km.h-1) não foram diferentes significativamente e foram significativamente correlacionadas (r = 0,65; P < 0,05). CONCLUSÃO: Assim, pode-se concluir que a distância total percorrida no teste de Hoff não pode ser utilizada para predição da velocidade de limiar anaeróbia em futebolistas.
APA, Harvard, Vancouver, ISO, and other styles
46

Al'Ala, Fatah Mumtaz, Rinta Kridalukmana, and Eko Didik Widianto. "Perancangan Sistem Proxy Server Menggunakan Protokol WCCPv2 dengan Konfigurasi Multi Router." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (April 23, 2016): 242. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.242-248.

Full text
Abstract:
Numbers of internet users are increasing incredibly fast. Ideally, this increasing numbers of users are also supported by capacity uplift, in this case an increase in bandwidth to maintain the standard services that received by the users. However, increasing the bandwidth not always becomes the first option since it is quite expensive. Implementing proxy server as content/cache engine is the other option available. It will cache the content that user requested and keep it for a while for servicing the other users that will request the same content in the future. WCCP protocol is used to redirect user’s traffic to the proxy server. The standard proxy server configurations are using single router with one or more proxy servers. This thesis is aims to design and implement proxy server system with multi routers configuration. Multi routers configuration is used as a failover mechanism to provide network high availability. It will use HSRP protocol to provide the high availability services. Tests that conducted after implementation shows the increase in transaction and successful transaction by 296% and 284% also a decrease in response time as well as failed transaction by 18% and 99% consecutively. Failover test shows the percentage of packet loss amounted to 31,3% and 26,3% for clients in VLAN 10 and VLAN 20 consecutively. The average time required for clients to reconnect to the internet after router failure is 7 seconds for clients in VLAN 10 and 6 seconds for client in VLAN 20.
APA, Harvard, Vancouver, ISO, and other styles
47

Paršeliūnas, Eimuntas, Ričardas Kolosovskis, Raimundas Putrimas, and Arūnas Būga. "THE ANALYSIS OF THE STABILITY OF PERMANENT GPS STATION VILNIUS (VLNS) / NUOLAT VEIKIANČIOS VILNIAUS (VLNS) GPS STOTIES STABILUMO ANALIZĖ / АНАЛИЗ СТАБИЛЬНОСТИ ПОСТОЯННО ДЕЙСТВУЮЩЕЙ СТАНЦИИ ГПС VILNIUS (VLNS)." Geodesy and Cartography 37, no. 3 (November 1, 2011): 129–34. http://dx.doi.org/10.3846/13921541.2011.626261.

Full text
Abstract:
Lithuania has been participating in the activities of the EUREF permanent network since 1996, when GPS station VILNIUS started regular continuous tracking of GPS satellites. The GPS station was established with a help of the Onsala Space Observatory (Sweden) and was mounted in the territory of Vilnius international airport (Lithuania). Four character identifier VLNS and DOMES number 10801M001 were assigned to VILNIUS GPS station by the International Earth Rotation Service in 1999. VILNIUS station is operated and maintained by the Institute of Geodesy of Vilnius Technical University. The main task of the permanent VLNS GPS station is to take part in EUREF activities and serve as reference to GPS campaigns in Lithuania. The aim of this paper is to describe the evolution and current status of the technical equipment of VILNIUS station. The paper also presents the analysis of data quality and a few years interval of coordinate determination at VLNS within the EUREF network. Santrauka EUREF nuolat veikiančių stočių tinklo veikloje Lietuva dalyvauja nuo 1996 m., kai GPS VILNIAUS stotis pradėjo reguliarius matavimus iš GPS palydovų. Stotis įsteigta padedant Onsalos kosmoso observatorijai (Švedija). GPS stotis įrengta Vilniaus tarptautinio oro uosto teritorijoje 1999 metais. Tarptautinė žemės sukimositarnyba stočiai suteikė keturių simbolių identifikatorių VLNS ir DOMES numerį 10801M001. GPS VILNIAUS stotį prižiūri ir valdo Vilniaus Gedimino technikos universiteto Geodezijos instituto specialistai. Pagrindinis stoties uždavinys yra dalyvauti EUREF veikloje, ir tai turi būti atraminis geodezinis punktas GPS kampanijoms Lietuvoje. Straipsnio tikslas – aprašyti dabartinę techninės įrangos būklę ir jos tobulinimo eigą. Pateikiama kelerių metų matavimo duomenų kokybės analizė ir nustatytos koordinatės EUREF tinkle. Резюме В проекте сети постоянно действующих станций ГПС EUREF Литва участвует с 1996 г., когда станция VILNIUS стала производить постоянные измерения со спутников ГПС. Станция была основана при помощи Онсольской космической oбсерватории (Швеция). Станция ГПС установлена на территории Вильнюсского международного аэропорта. В 1999 г. Международная служба вращения Земли присвоила станции код VLNS и DOMES номер 10801М001. Станцией управляют специалисты из Геодезического института Вильнюсского технического университета им. Гедиминаса. Главной задачей станции является участие в мероприятиях EUREF, а также быть основным геодезическим пунктом в кампаниях ГПС на территории Литвы. В статье преследовалась цель описать состояние технического оборудования станции и меры по его улучшению. Представлен анализ данных измерений ГПС за несколько лет и определены геодезические координаты в сети EUREF.
APA, Harvard, Vancouver, ISO, and other styles
48

Altimari, Juliana Melo, Leandro Ricardo Altimari, Andréia Gulak, and Mara Patricia Traina Chacon-Mikahil. "Correlações entre protocolos de determinação do limiar anaeróbio e o desempenho aeróbio em nadadores adolescentes." Revista Brasileira de Medicina do Esporte 13, no. 4 (August 2007): 245–50. http://dx.doi.org/10.1590/s1517-86922007000400007.

Full text
Abstract:
O objetivo do presente estudo foi correlacionar as velocidades de limiar anaeróbio (LAn) obtidas a partir de concentrações fixas de lactato (VLAn 4 e VLAn 3,5mM), velocidade de lactato mínimo (VLac min) e velocidade crítica (VC) determinada a partir de diferentes distâncias e número de coordenadas: VC1 (50/100/200m), VC2 (100/200/400m), VC3 (50/100/200/400m) e VC4 (200/400m) com o desempenho nos 400m(s) em nadadores adolescentes. Fizeram parte da amostra 15 nadadores (10 meninos e cinco meninas = 14,7 ± 0,7 anos; 61,9 ± 8,5kg; 171,1 ± 8,8cm) de nível nacional, com experiência entre cinco e sete anos na natação competitiva. Para análise das correlações entre os índices e o desempenho nos 400m(s) foi utilizado o coeficiente de correlação de Pearson. O nível de significância adotado foi de p < 0,01. As correlações entre a VLAn 4mM, VLAn 3,5mM, VLac min e o desempenho nos 400m(s) foram de r = -0,63, r = -0,90 e r = -0,91, respectivamente (p < 0,01). As correlações entre a VC1 (50/100/200m), VC2 (100/200/400m), VC3 (50/100/200/400m), VC4 (200/400m) e o desempenho nos 400m(s) foram: r = -0,62, r = -0,97, r = -0,98 e r = -0,94, respectivamente (p < 0,01). Sugere-se que o LAn determinado a partir da concentração fixa de lactato de 3,5mM, bem como a VLac min e a VC obtidas por meio de distâncias maiores parecem ser os mais adequados índices preditores do desempenho aeróbio nos nadadores adolescentes estudados. Além disso, o número de coordenadas parece não influenciar a relação entre a VC e desempenho aeróbio.
APA, Harvard, Vancouver, ISO, and other styles
49

Tian, An Hong, and Cheng Biao Fu. "The Design and Research of Virtualization Platform." Applied Mechanics and Materials 397-400 (September 2013): 2090–93. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.2090.

Full text
Abstract:
Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.
APA, Harvard, Vancouver, ISO, and other styles
50

Bayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1, no. 2 (October 15, 2018): 55–60. http://dx.doi.org/10.24246/j.icm.2018.v1.i2.p55-60.

Full text
Abstract:
Keamanan jaringan di era ini sangat dibutuhkan, dibalik kemudahan dalam mengakses informasi terdapat pula banyak ancaman. Dengan aplikasi GNS3 pengguna dapat membuat simulasi jaringan dengan perangkat yang dibutuhkan seperti aslinya serta dalam perangkat dapat dikonfigurasi langsung. Pada simulasi ini membuat Perancangan Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan penggunaan ACL solution serta trusted-servers yang menjadi salah satu cara agar menjadikan jaringan tersebut tetap aman dan stabil. Dari hasil penelitian yang dilakukan GNS3 mampu Merancangan Keamanan Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue dengan memasukkan ACL solution serta fitur trusted-servers ke dalam switch ExtremeXOS.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography