Journal articles on the topic 'Local area networks (Computer networks)'

To see the other types of publications on this topic, follow the link: Local area networks (Computer networks).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Local area networks (Computer networks).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shamim, A. A. "Local Area Computer Networks." IETE Technical Review 3, no. 10 (October 1986): 533–43. http://dx.doi.org/10.1080/02564602.1986.11438019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono, and Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB." Infotech: Journal of Technology Information 8, no. 2 (November 30, 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Full text
Abstract:
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networks using the web-based backward chaining method. With this expert system application, it can speed up and make it easier to detect damage to Local Area Network networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Kellermayr, Karl H. "Simulation of local area computer networks." Annual Review in Automatic Programming 12 (January 1985): 433–36. http://dx.doi.org/10.1016/0066-4138(85)90079-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hutchison, David. "Linked local area networks." Data Processing 28, no. 7 (September 1986): 381. http://dx.doi.org/10.1016/0011-684x(86)90159-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Newman, P. "ATM local area networks." IEEE Communications Magazine 32, no. 3 (March 1994): 86–98. http://dx.doi.org/10.1109/35.267446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Full text
Abstract:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Suarezsaga, Fredrikus, Alfred Yulius Arthadi Putra, Amok Darmianto, and Kristina Kristina. "MENINGKATKAN KEMAMPUAN SISWA SMA DALAM PEMBUATAN JARINGAN LOCAL AREA NETWORK." JMM (Jurnal Masyarakat Mandiri) 7, no. 2 (April 9, 2023): 1241. http://dx.doi.org/10.31764/jmm.v7i2.13462.

Full text
Abstract:
Abstrak: Jaringan komputer merupakan suatu cabang ilmu pengetahuan di bidang komputer dan dianggap sebagai pengimplementasian yang sangat penting mengingat jaringan komputer banyak diterapkan di berbagai bidang. Jaringan komputer memiliki beberapa klasifikasi berdasarkan lokasi, salah satunya adalah jaringan local area network (LAN). Pembuatan jaringan LAN sangat sederhana. Pelatihan pembuatan jaringan LAN dilaksanakan di SMA Widya Pratama Kubu Raya pada tanggal 12 November 2022. Tujuan dari kegiatan ini adalah mengenalkan kepada siswa bagaimana membuat sebuah kabel jaringan komputer lokal dan berbagi berkas di area lokal. Metode yang dilaksanakan berupa penyuluhan dan praktikum. Kegiatan ini diikuti oleh 27 siswa kelas XII. Hasil dari kegiatan ini dievaluasi dengan dua instrumen, yaitu tes dan survey kualitas PKM. Dari pelatihan yang sudah dilaksanakan, berdasarkan hasil pre-test dan post-test siswa mendapatkan peningkatan pengetahuan mengenai jaringan komputer sebesar 70,1 % dan untuk tingkat kualitas kegiatan ini sebanyak 91,36 % menyatakan setuju bahwa kegiatan ini bermanfaat. Abstract: Computer network is a dicipline of science in the computers science and is considered a very important implementation considering that computer networks are widely applied in various fields. Computer networks have several classifications based on location/geography, one of which is a local area network (LAN). In order to make a LAN network is very simple. LAN network creation training was held at SMA Widya Pratama Kubu Raya on November 12, 2022. The purpose of this activity is to introduce students to how to make a local computer network cable and share files in the local area. The method implemented is in the form of tutorial and practicum. This activity was attended by 27 students of class XII. The results were evaluated with two instruments, the test and the survey to measure of quality. From the test that has been carried out, based on the results of the pre-test and post-test students get an increase in knowledge about computer networks by 70.1% and for the quality level of this activity as much as 91.36% agree that this activity is useful.
APA, Harvard, Vancouver, ISO, and other styles
8

Оrdabayeva G.К., Dzhusupbekova G.T., and Rakhymbek N. "DESIGN AND SIMULATION OF VIRTUAL LOCAL AREA NETWORK USING CISCO PACKET TRACER." BULLETIN 6, no. 388 (December 15, 2020): 6–14. http://dx.doi.org/10.32014/2020.2518-1467.176.

Full text
Abstract:
Modern local networks consist of several subscriber devices located inside the same building. Computers on the local network are interconnected using network equipment - switches. By default, all devices connected to the ports of the same switch can communicate by exchanging network packets. Computer networks of data transmission are the result of the information revolution and in the future will be able to form the main means of communication. The worldwide trend towards the integration of computers in the network is due to a number of important reasons, such as the acceleration of the transmission of information messages, the ability to quickly exchange information between users, receiving and transmitting messages (faxes, E-mail letters, electronic conferences, etc.) without leaving the workplace, the ability to instantly receive any information from anywhere in the world, as well as the exchange of information between computers of different manufacturers working under different software. A large number of broadcast packets sent by devices leads to a decrease in network performance, because instead of useful operations, the switches are busy processing data addressed to everyone at once. The situation forces us to divide such large networks into autonomous subnets; as a result, the logical structures of the network are different from the physical topologies. This article discusses VLAN technology (Virtual Local Area Network - VLAN), which allows you to divide one local network into separate segments.
APA, Harvard, Vancouver, ISO, and other styles
9

Boyce, C. R. "Automotive local area networks." Computing & Control Engineering Journal 1, no. 3 (1990): 128. http://dx.doi.org/10.1049/cce:19900034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
APA, Harvard, Vancouver, ISO, and other styles
11

Reza Ziai, M., and Dileep R. Sule. "Plant layout — Local area networks." Computers & Industrial Engineering 15, no. 1-4 (January 1988): 259–63. http://dx.doi.org/10.1016/0360-8352(88)90096-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Full text
Abstract:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase user mobility with computer network technology using cable media. Bandwidth management is a way to manage the internet network for even distribution of bandwidth usage even though many network users use it. Hierarchical token bucket (HTB) one method to do a bandwidth management in this HTB
APA, Harvard, Vancouver, ISO, and other styles
13

Haas, Peter J., and Gerald S. Shedler. "Regenerative simulation methods for local area computer networks." IBM Journal of Research and Development 29, no. 2 (March 1985): 194–205. http://dx.doi.org/10.1147/rd.292.0194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ranai, K., and P. H. Leng. "Topological reliability analysis of local-area computer networks." Computers & Mathematics with Applications 15, no. 2 (1988): 119–29. http://dx.doi.org/10.1016/0898-1221(88)90081-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hamacher, V. C., and W. M. Loucks. "Packet Transfer Delays In Local Area Computer Networks*." INFOR: Information Systems and Operational Research 23, no. 3 (August 1985): 248–74. http://dx.doi.org/10.1080/03155986.1985.11731968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Hussein Ali Attallah. "Virtual Local Area Network Performance Improvement Using Ad Hoc Routing Protocols in a Wireless Network." Computers 12, no. 2 (January 28, 2023): 28. http://dx.doi.org/10.3390/computers12020028.

Full text
Abstract:
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
APA, Harvard, Vancouver, ISO, and other styles
17

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Full text
Abstract:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has &ldquo;knowledge&rdquo; of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Access Point (AP) availability and causes them to change connections to improve transmission performance. An Adaptive Channel Utilization (ACU) mechanism is designed for APs to identify a target AP that is suffering from interference, to analyze its alternative channel availability and to require it to change its working channel to improve transmission efficiency. Results of simulations of various scenarios indicate that the throughput of end devices is increased by 15 to 24%, the throughput of APs is increased by 6 to 47% and the retransmission rate of APs is reduced by 0.4 to 5.3%.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Yende, Raphael Grevisse, Tshiela Marie Alice Nkuna, Kazadi Pamphile Mulumba, Ntumba Freddy Katayi, Kaseka Viviane Katadi, Musubao Patient Swambi, and Muamba Bernard Tshiasuma. "Signal performance optimization in the local area network trafic management in the DRC : Models for transmission networks." European Journal of Computer Science and Information Technology 10, no. 5 (May 15, 2022): 1–23. http://dx.doi.org/10.37745/ejcsit.2013/vol10n5123.

Full text
Abstract:
The high availability of computer networks is a prerequisite in large companies and service providers. Thus, computer network administrators are called upon to face the various growing challenges related to unscheduled downtime of services; lack of expertise; lack of tools; the complexity of technologies; market consolidation and competition to provide better quality services. It should be remembered that the organization of the networks of telecommunication aims at giving control of the phenomena which occur there, during the treatment of the communications, and more generally of the services which they offer. These phenomena are governed by the randomness of the appearance of the requests, and are studied independently of the choices of technology implemented. They are amenable to the formalism of the calculation of probabilities, and give birth to the notion of traffic, which will play a central role in their apprehension, given that they condition for a large part the effective structure of modern networks. This research specifically examines the problems of optimization of signal performance in traffic management of local area networks of companies in the Democratic Republic of Congo, by presenting the different elements of network traffic theory and quality. Thus demonstrating their impact on the architectures of networks and computer systems, and at the same time introducing the major problems faced by IT network administrators on a daily basis; The main objective of this research is to evaluate the development performance of computer and telecommunications networks according to their applications in the areas of network design, equipment dimensioning, and characterization and quality measurement. Service, and network planning techniques.
APA, Harvard, Vancouver, ISO, and other styles
19

Dwyer, Samuel J., Nicholas J. Mankovich, Glendon G. Cox, and Roger A. Bauman. "Local area networks for radiology." Journal of Digital Imaging 1, no. 1 (November 1988): 28–38. http://dx.doi.org/10.1007/bf03167748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hamidha, Elda, and Jimmie. "Design of local area network at the laboratory of sma 2 pgri palembang." International Journal Cister 1, no. 02 (August 1, 2022): 76–79. http://dx.doi.org/10.56481/cister.v1i02.139.

Full text
Abstract:
Currently, the laboratory uses computers and LAN networks as school practical tools. During initial observations at SMA 2 PGRI Palembang, they found a problem, namely the large number of students and the lack of learning facilities to carry out activities in the computer room resulting in some students not being able to fully study in the room. computer due to the limited time for students to learn. In developing the system, the author will use the Network Development Life Cycle (NDLC) method for designing lan network infrastructure. Network Development Life Cycle (NDLC) is a method that relies on previous development processes such as business strategy planning, application development life cycle, and data distribution analysis. And can provide an overview of the design of computer network systems that in the future can be used as a reference for building a computer network that is good and efficient and easy to implement
APA, Harvard, Vancouver, ISO, and other styles
21

Bing, B., R. Van Nee, and V. Hayes. "Wireless local area and home networks." IEEE Communications Magazine 39, no. 11 (November 2001): 63. http://dx.doi.org/10.1109/mcom.2001.965360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Teguh Tamrin, Nur Muhaidi, Anang Fathul Arifin, and Ariyanto. "IMPLEMENTASI METODE VLSM (VARIABLE LENGTH SUBNET MASK) PADA PEMETAAN IP ADDRESS LAN (LOCAL AREA NETWORK) DI LAB FAKULTAS SAINT DAN TEKNOLOGI (FST) UNISNU JEPARA." Jurnal Publikasi Teknik Informatika 2, no. 1 (January 20, 2023): 6–11. http://dx.doi.org/10.55606/jupti.v1i1.963.

Full text
Abstract:
Information technology is increasingly playing a role in supporting the efficiency and effectiveness of communication in modern organizations. Especially after the development of information technology which has an impact on the ease of communication. Computer networks can provide a communication medium for computer-based devices to exchange data and information. One of the computer networks is a Local Area Network (LAN). LAN is a computer network that includes computers that are connected to each other in one room or a building. Computer network settings can be done at the host level, by configuring the host addressing in it. Good host addressing will make it easier for computer network management so that it will optimize the performance of the computer network. One of the rules that can be used for addressing computer networks is the Variable Length Subnet Mask (VLSM). VLSM is a development of subnetting, which further optimizes the use of the subnet itself. Sometimes the subnet division still leaves host addressing, VLSM sees this deficiency and makes the remaining host addresses then set to form a new subnet. So it can be said that VLSM forms a subnet within a subnet. This study performs network addressing by subnetting and using VLSM to better manage the addresses of all hosts on the computer network. The results of the addressing made are expected to be implemented in the Faculty of Industrial Technology. This study does not calculate the bandwidth load obtained after the implementation of VLSM.
APA, Harvard, Vancouver, ISO, and other styles
23

Hamid, Khalid, Muhammad Waseem Iqbal, Qaiser Abbas, Muhammad Arif, Adrian Brezulianu, and Oana Geman. "Discovering Irregularities from Computer Networks by Topological Mapping." Applied Sciences 12, no. 23 (November 25, 2022): 12051. http://dx.doi.org/10.3390/app122312051.

Full text
Abstract:
Any number that can be uniquely identified and varied by a graph is known as a graph invariant. This paper will talk about three unique variations of bridge networks, sierpinski networks, honeycomb, and hexagonal networks, with great capability of forecast in the field of software engineering, arithmetic, physics, drug store, informatics, and chemistry in setting with physical and chemical properties. Irregularity sombor invariant is newly introduced and has various expectation characteristics for various variations of bridge graphs or other networks, as mentioned. First, find the irregularities in the networks with the help of the Irregularity sombor index. This will be performed in a step by step procedure. The study will take an existing network, associate it with a graph after finding their vertices and edges, then solve the topology of a graph of a network. Graphical results demonstrate the upper and lower bounds and irregularities of certain networks, and mathematical results are used for modeling purposes. The review settled the topologies of graphs/networks of seven distinct sorts with an Irregularity sombor index. These concluded outcomes can be utilized for the demonstration and modeling of computer networks such as local area networks, Metropolitan area networks, Wide area networks, memory interconnection networks, processor interconnection networks, the spine of the internet, and different networks/designs of Personal computers, power generation networks, mobile base station and chemical compound amalgamation and so on.
APA, Harvard, Vancouver, ISO, and other styles
24

Burgess, Clifford G. "Unix and ADA - local area networks." Computers & Industrial Engineering 15, no. 1-4 (January 1988): 244–48. http://dx.doi.org/10.1016/0360-8352(88)90094-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Achlison, Unang, Joseph Teguh Santoso, Khoirur Rozikin, and Fujiama Diapoldo. "Analisis Latensi Video Streaming Antara Jaringan Berbasis Local Area Network dan Web." Pixel :Jurnal Ilmiah Komputer Grafis 15, no. 2 (January 24, 2023): 473–77. http://dx.doi.org/10.51903/pixel.v15i2.1037.

Full text
Abstract:
The current era is growing Live streaming which includes audio and video data. This research method collects data through the results of measuring Video Streaming latency (delay time) on variations of Local Area Network and Web-based computer networks. Based on the analysis of measurement results, the latency value (delay time) of Video Streaming on Local Area Network-based devices using Quality of Service (QoS) obtained a value of 8.58 ms and is smaller (optimal) compared to Web-based networks. Keywords : Quality of Service, latency, LAN, Web
APA, Harvard, Vancouver, ISO, and other styles
26

Miaoudakis, Andreas, Dimitrios Stratakis, Emmanouel Antonidakis, Vassilios Zaharopoulos, and Radovan Stojanovic. "Co-existence performance evaluation of wireless computer networks in a typical office environment." Computer Science and Information Systems 6, no. 1 (2009): 169–84. http://dx.doi.org/10.2298/csis0901169m.

Full text
Abstract:
The Wireless Local Area Networks (WLANs) are often used as a wireless extension to the typical office network infrastructure providing mobility to the users. In addition Wireless Personal Area Networks (WPANs) serve interconnection to computer and mobile phone peripherals as headsets, input devices, printers etc. Thus it is common that WLANs and WPANs have to operate in the same area. IEEE 802.11b/g is the most popular WLAN technology operating in the 2.4GHz Industrial Medical and Scientific (ISM) band. On the other hand Bluetooth (BT) is the technology often used to support WPANs. As BT also uses the 2.4GHz ISM band, there an issue of interference between WLANs and PANs. In this work the performance degradation in Wireless Local Area Networks and Wireless Local Area Networks due to coexistence is examined by real measurements. Both 802.11 to 802.11 and 802.11 to Bluetooth coexistence is addressed.
APA, Harvard, Vancouver, ISO, and other styles
27

Falk, Howard. "Adapter boards for local area networks." Electronic Library 9, no. 1 (January 1991): 31–37. http://dx.doi.org/10.1108/eb045034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sobol, Michael I. "Audit Concerns with Local Area Networks." EDPACS 14, no. 12 (June 1987): 6–9. http://dx.doi.org/10.1080/07366988709450420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.

Full text
Abstract:
Wireless networks are susceptible to many security problems since the wireless medium is open. Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network. One of the solutions is the development of tunneling technology as an attempt to secure communication networks. Virtual Private Network (VPN) tunneling technology when integrated with firewall would provide a suitable security. In this study, number of Jammers would interfere with the normal operation of the network resulting in performance degradation of network. These Jammers decrease throughput and increase delay and data dropped. The aim of this study is to improve the performance of Wireless Local Area Network (WLAN) by integrating Firewall with VPN in number of different Riverbed Modeler simulation scenarios which it is utilized in this study for video and data applications. Firewall is a technology employed to regulate the level of network connectivity. It can block unauthorized access from an external network to an internal network’s resources. In this study, the tunneling technology of VPN was integrated with firewall to improve the performance by increasing the throughput and decreasing delay and data dropped. The firewall would block any access to the server from the workstations and the VPN would filter the packets to allow a specific access to the specific server. The results showed that VPN when integrated with firewall increased the throughput from 1,350,000 to 1,500,000 bits/sec and decreased the delay from 0.0054 sec to 0.0047 sec and data dropped from 7,800 to 5,000 bits/sec so that this study proved that VPN incorporated with firewall provides a good throughput and delay improvement for wireless local area network.
APA, Harvard, Vancouver, ISO, and other styles
30

Peng, YunFeng, YuJun Kuang, and KePing Long. "Optical local area network emulations over Ethernet passive optical networks: A survey." Science in China Series F: Information Sciences 51, no. 8 (July 4, 2008): 1000–1009. http://dx.doi.org/10.1007/s11432-008-0116-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Smythe, C. "ISO 8802/3 local-area networks." Electronics & Communications Engineering Journal 5, no. 1 (1993): 25. http://dx.doi.org/10.1049/ecej:19930006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Geselowitz, Michael. "Local Area Networks: High (Plains) Tech." IEEE Annals of the History of Computing 31, no. 3 (July 2009): 77. http://dx.doi.org/10.1109/mahc.2009.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ar-Rasyid, Harun, Satrio Broto, and Windy Artika. "OPTIMASI INFRASTRUKTUR JARINGAN VLAN TRUNKING PROTOCOL MENGGUNAKAN SIMULASI PACKET TRACER PADA PT. RUKUN SEJAHTERA TEKNIK." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 4, no. 1 (January 31, 2024): 39–46. http://dx.doi.org/10.56486/jeis.vol4no1.422.

Full text
Abstract:
Modern companies with many floors and rooms need computer network technology to support operational activities. The computer network at PT Rukun Sejahtera Teknik often causes data transmission failures and unstable computer network systems that cause network performance to fall and become unresponsive. the purpose of this research is to design a Virtual Local Area Network using the VLAN Trunking Protocol (VTP) method and Packet Tracer Simulation to improve network performance and limit the access rights of each user. The type of this research is qualitative with field study methods by conducting observations for two weeks. Observations include the existing Local Area Network (LAN) network and the problem of slow data transmission on the existing network. The results of testing the network design with the configuration of the VLAN Trunking Protocol (VTP) server and client mode, show that the switch configured in VTP client mode cannot add and change the VLAN that has been set. The ping test results show that computers in each room cannot access networks outside of different VLAN networks. It proves that the network design is as planned and running well.
APA, Harvard, Vancouver, ISO, and other styles
34

Zielke, Gary. "Local Area Networks: Compatibility Versus Connectivity." Journal of Information Systems Management 2, no. 1 (January 1985): 87–90. http://dx.doi.org/10.1080/07399018508967746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zielke, Gary. "Local Area Networks — What About Performance?" Journal of Information Systems Management 4, no. 2 (January 1987): 76–79. http://dx.doi.org/10.1080/07399018708962848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yusnanto, Tri, Muhammad Abdul Muin, and Sugeng Wahyudiono. "Analisa Infrastruktur Jaringan Wireless dan Local Area Network (WLAN) Meggunakan Wireshark Serta Metode Penetration Testing Kali Linux." Journal on Education 4, no. 4 (August 30, 2022): 1470–76. http://dx.doi.org/10.31004/joe.v4i4.2175.

Full text
Abstract:
Computer networks and the internet play an important role for the smooth running of various fields of work. One example of information and communication technology is the Wireless Local Area Network (WLAN) or also called wireless local network technology. The method used in this research is the Penetration Testing method, with the intention of analyzing the Wireless Network computer security system in the STMIK Bina Patria Laboratory. Testing is carried out with several activities, including identifying and exploiting vulnerabilities in computer network security. In analyzing the security of the WLAN network, it is carried out using the Penetration Testing method where a form of attack on the network is simulated, one of the operating systems that has the right specifications in this regard is Kali Linux. Wireless network is a network that is widely used in institutions and public places. Even though it has a security system, wireless networks can still be attacked by attackers.
APA, Harvard, Vancouver, ISO, and other styles
37

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
38

Boyanov, Petar. "SECURITY ROUTING SIMULATION THE LOCAL AREA NETWORK OF ACADEMIC DEPARTMENTS USING A LINK-STATE ROUTING PROTOCOL - OSPF." Journal Scientific and Applied Research 11, no. 1 (March 3, 2017): 47–58. http://dx.doi.org/10.46687/jsar.v11i1.212.

Full text
Abstract:
In this paper a summarized simulation and providing security communication in the local area network of academic department using a link-state routing protocol - OSPF is made. Most of the professional system administrators and IT specialists have to use and apply static and dynamic methods of information routing. Thereby, each network system administrators, security professionals and network architects can use the free of charge software network program Cisco Packet Tracer in order to design and simulate various types of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Effendi, Rustam, and Yasin Efendi. "DESIGN AND IMPLEMENTATION OF VIRTUAL LOCAL AREA NETWORK NETWORK AT PT. EDS MANUFACTURING INDONESIA." Journal of Innovation And Future Technology (IFTECH) 2, no. 1 (February 24, 2020): 55–66. http://dx.doi.org/10.47080/iftech.v2i1.809.

Full text
Abstract:
The need for information and communication has become a fundamental thing in human life, marked by the increasing human activity that no longer sees the distance and time to communicate with and share information. In 1960, the US Department of Defense conducted research on computer networks. Research carried out is to build a computer network with a method that mimics the workings of the telephone network, where one computer can be connected to other computers, both in one location or area known as a Local Area Network (LAN), and even can be connected to a place or a different country known as a Wide Area Network (WAN). LAN limitations give birth to a VLAN technology that allows for the configuration of a virtualized computer network. The higher the level of demand and the increase in computer network users resulting in broadcasts and traffic on the network itself. The current condition of PT. EDS Manufacturing Indonesia does not yet have a computer network concept that is in line with company needs, computer network activities that occur every day require concepts that are appropriate to the company. Then it is necessary to design a VLAN concept that is expected to provide better results and make it easier for IP Address segmentation to manage broadcast and traffic on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
40

Olenev, V. L., I. Ya Lavrovskaya, L. I. Kurbanov, I. L. Korobkov, and Yu E. Sheynin. "COMPUTER AIDED DESIGN SYSTEM FOR SPACECRAFT ONBOARD NETWORKS." Issues of radio electronics, no. 8 (August 20, 2018): 145–53. http://dx.doi.org/10.21778/2218-5453-2018-8-145-153.

Full text
Abstract:
Modern spacecraft onboard networks consist of a large number of nodes which interact with each other via a communication network. SpaceWire is a new generation technology which is being integrated into new spacecraft systems. In order to check network operation on the early stages of network design it is reasonable to perform its software simulation. The paper provides an analysis of existing simulation tools for the on-board and local area networks. We overview the main abilities of the existing software and then propose the computer-aided design (CAD) system for SpaceWire onboard networks design and simulation - SANDS. This software will solve important tasks, which spacecraft developers face with during implementation of satellites and other space vehicles. SANDS system will support the full on-board network design and simulation flow, which begins from the network topology automated generation and finishes with getting the network structure, configuration and parameters setting, simulation results and statistics.
APA, Harvard, Vancouver, ISO, and other styles
41

Dimopoulos, Nikitas J., and Eric Chi-Wah Wong. "Collision-free protocol for local area networks." Computer Communications 11, no. 4 (August 1988): 208–14. http://dx.doi.org/10.1016/0140-3664(88)90084-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lathrop, David L. "Security aspects of wireless local area networks." Computers & Security 11, no. 5 (September 1992): 421–26. http://dx.doi.org/10.1016/0167-4048(92)90006-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Malaney, Gary D. "The Design and Implementation of Local and Wide Area Networks in Student Affairs." Journal of Educational Technology Systems 20, no. 3 (March 1992): 231–39. http://dx.doi.org/10.2190/alwd-c6r0-q8mm-8cbb.

Full text
Abstract:
Local and wide area networks on college campuses in general and in student affairs in particular still represent a relatively new technology. Accordingly, literature on the design and operation of these computer systems is just beginning to appear in the academic computing journals. The purpose of this article is to contribute to the literature on networks by describing the design and implementation of a wide area network within a large division of student affairs at a major research university.
APA, Harvard, Vancouver, ISO, and other styles
44

Sharifullina, Albina Y., Roman R. Galyamov, and Rimma S. Zaripova. "TECHNICAL PRINCIPLES FOR CREATING A WIRELESS LOCAL NETWORK WI-FI." T-Comm 15, no. 7 (2021): 28–33. http://dx.doi.org/10.36724/2072-8735-2021-15-7-28-33.

Full text
Abstract:
This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Ying. "Local Area Network Information Security and Virus Countermeasures of the Internet." Advanced Materials Research 1079-1080 (December 2014): 598–600. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.598.

Full text
Abstract:
With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.
APA, Harvard, Vancouver, ISO, and other styles
46

Bosio, S., A. Capone, and M. Cesana. "Radio Planning of Wireless Local Area Networks." IEEE/ACM Transactions on Networking 15, no. 6 (December 2007): 1414–27. http://dx.doi.org/10.1109/tnet.2007.896478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ball, E., N. Linge, P. Kummer, and R. Tasker. "Local area network bridges." Computer Communications 11, no. 3 (June 1988): 115–17. http://dx.doi.org/10.1016/0140-3664(88)90057-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Marsden, Brian W. "Local Area Network Architectures." Computer Communications 12, no. 2 (April 1989): 107. http://dx.doi.org/10.1016/0140-3664(89)90066-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Boyanov, Petar. "SIMULATION OF LOCAL AREA COMPUTER NETWORKS WITH DISTANCE-VECTOR ROUTING PROTOCOLS FOR THE NEEDS OF THE PRIVATE COMPANY." Journal Scientific and Applied Research 18, no. 1 (March 3, 2020): 83–93. http://dx.doi.org/10.46687/jsar.v18i1.283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Boyanov, Petar. "ROUTING INFORMATION SECURITY IN THE LOCAL AREA NETWORK OF ACADEMIC DEPARTMENTS USING AN ENHANCED DISTANCE VECTOR ROUTING PROTOCOL - EIGRP." Journal Scientific and Applied Research 11, no. 1 (March 3, 2017): 35–46. http://dx.doi.org/10.46687/jsar.v11i1.211.

Full text
Abstract:
In this paper a summarized simulation and providing security communication in the local area network of academic department using an enhanced distance vector routing protocol - EIGRP is made. Most of the professional system administrators and IT specialists have to use and apply static and dynamic methods of information routing. Thereby, each network system administrators, security professionals and network architects can use the free of charge software network program Cisco Packet Tracer in order to design and simulate various types of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography