Artykuły w czasopismach na temat „Internet (computer network)”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Internet (computer network).

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Internet (computer network)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Pełny tekst źródła
Streszczenie:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Style APA, Harvard, Vancouver, ISO itp.
2

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro". Jurnal Pendidikan Madrasah 7, nr 2 (22.11.2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Pełny tekst źródła
Streszczenie:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer networks and the internet as a medium for data and information communication. However, the computer and internet network systems at SMA Negeri 2 Bojonegoro have not been managed properly. The solution to improve the effectiveness of using and managing internet bandwidth at SMA Negeri 2 Bojonegoro is to design and implement network management with Mikrotik Router to make it easier for administrators to manage the network. This research uses the Network Development Life Cycle (NDLC) method as a method of developing computer network management at SMA Negeri 2 Bojonegoro. The results showed that the use of a network system using a Mikrotik router in managing internet bandwidth efficiently facilitates and facilitates various activities related to internet use.
Style APA, Harvard, Vancouver, ISO itp.
3

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, nr 3 (15.06.1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Pełny tekst źródła
Streszczenie:
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
Style APA, Harvard, Vancouver, ISO itp.
4

Aisyah, Siti. "Computer Networking Company in Business Area". International Research Journal of Management, IT & Social Sciences 2, nr 7 (1.07.2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Pełny tekst źródła
Streszczenie:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
Style APA, Harvard, Vancouver, ISO itp.
5

M.J, Dr Kurian, i Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks". International Journal of Innovative Technology and Exploring Engineering 12, nr 3 (28.02.2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Pełny tekst źródła
Streszczenie:
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 million Indians accessed the internet via any device. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Lock it down, protect it, and block hackers. This paper reveals the issues related to categories & impact of cyber crime, basic cyber laws, security threats and protection which are a warning alarm to internet users.
Style APA, Harvard, Vancouver, ISO itp.
6

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra i Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark". DoubleClick: Journal of Computer and Information Technology 5, nr 2 (27.02.2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Pełny tekst źródła
Streszczenie:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the internet. Mikrotik can maximize network usage if the overall bandwidth has been set.</p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: </em><em>Mikrotik, Computer Network, Router and Type Network</em><em></em></p>
Style APA, Harvard, Vancouver, ISO itp.
7

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi i Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP". Elkom : Jurnal Elektronika dan Komputer 15, nr 1 (30.06.2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Pełny tekst źródła
Streszczenie:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase user mobility with computer network technology using cable media. Bandwidth management is a way to manage the internet network for even distribution of bandwidth usage even though many network users use it. Hierarchical token bucket (HTB) one method to do a bandwidth management in this HTB
Style APA, Harvard, Vancouver, ISO itp.
8

Goffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, nr 3 (1.08.1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Pełny tekst źródła
Streszczenie:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
Style APA, Harvard, Vancouver, ISO itp.
9

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin i Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols". Vestnik MEI, nr 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Pełny tekst źródła
Streszczenie:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The article presents several models for organizing bridges: a centralized network bridge on the side of a router and client computer, a distributed bridging system, and a dedicated bridge. Based on the accomplished analysis, it is recommended to use a centralized model for a network that has to comply with more stringent reliability requirements. If there is a need to have simultaneous access to several automation devices and high data exchange rates, a distributed model should be used. A dedicated bridge is used only in special cases, for example, when a high compactness is required in implementing a monitoring system.
Style APA, Harvard, Vancouver, ISO itp.
10

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks". Mathematics Teacher 89, nr 1 (styczeń 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Pełny tekst źródła
Streszczenie:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
Style APA, Harvard, Vancouver, ISO itp.
11

Noviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network". Journal of Information Technology 2, nr 2 (24.08.2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.

Pełny tekst źródła
Streszczenie:
Along with the development of technology, especially computers and the internet, we can get information more easily. This also encourages the number of computer and internet users to grow. Especially in the SMK ASY-SYARIFIY IBS PANDANWANGI, the number of students and employees who use the internet is increasing from time to time. The increase in users using the network will cause the existing network infrastructure to be further improved so as not to disappoint users due to decreased network performance. VLAN is a technology that allows a LAN to be divided into several different domains. VLANs also allow the joining of networks that are separate locations, but seem to be located in the same domain. Research on the use of VLANs in the laboratory environment of SMK ASY-SYARIFY IBS PANDANWANGI provides results that VLAN is can improve network performance, share networks based on certain conditions, simplify management, minimize costs, and apply security methods.
Style APA, Harvard, Vancouver, ISO itp.
12

Afrizal, Afrizal, i Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, nr 1 (9.09.2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Pełny tekst źródła
Streszczenie:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6
Style APA, Harvard, Vancouver, ISO itp.
13

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus i Markus Happe. "Self-Awareness in Computer Networks". International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Pełny tekst źródła
Streszczenie:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
Style APA, Harvard, Vancouver, ISO itp.
14

Chen, Hong Zhu. "Discussion on Computer Network Security". Applied Mechanics and Materials 427-429 (wrzesień 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.

Pełny tekst źródła
Streszczenie:
Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a preventive measure and important countermeasures.Twenty-first Century is the era of information and technology, as an important channel of acquiring knowledge and information and a wide platform of all kinds of cultural dissemination and communication, network has played a positive role in promoting the exchange of social information, making personal interaction convenient, promoting social and economic development. Along with the rapid development and maturity of the campus network, network activity has become one of college students’ daily activities, and made a profound effect on students in all aspects.
Style APA, Harvard, Vancouver, ISO itp.
15

Zhang, Kun, Hai Feng Wang, Jian Feng Zhu i Zhuang Li. "Computer Network Security Several Strategies". Key Engineering Materials 474-476 (kwiecień 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.

Pełny tekst źródła
Streszczenie:
With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .
Style APA, Harvard, Vancouver, ISO itp.
16

Armanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau". Jurnal Ilmiah Betrik 10, nr 03 (14.11.2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.

Pełny tekst źródła
Streszczenie:
ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover
Style APA, Harvard, Vancouver, ISO itp.
17

Hart, Joseph. "Computer Communications for Advisors". NACADA Journal 13, nr 2 (1.09.1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Pełny tekst źródła
Streszczenie:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningful after only a short time. Advisors who learn the terms and concepts enabling them to communicate via computer effectively will discover much of value in the world of computer-mediated communications.
Style APA, Harvard, Vancouver, ISO itp.
18

Subhi, Doaa, i Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network". Condensed Matter 8, nr 1 (23.02.2023): 24. http://dx.doi.org/10.3390/condmat8010024.

Pełny tekst źródła
Streszczenie:
Computer networks consist of millions of nodes that need constant protection because of their continued vulnerability to attacks. Classical security methods for protecting such networks will not be effective enough if quantum computers become widespread. On the other hand, we can exploit the capabilities of quantum computing and communications to build a new quantum communication network. In this paper, we focused on enhancing the performance of the classical client–server Internet application. For this sake, we introduced a novel Internet of Things (IoT) quantum network that provides high security and Quality of Service (QoS) compared with the traditional IoT network. This can be achieved by adding quantum components to the traditional IoT network. Quantum counterpart nodes, channels, and servers are used. In order to establish a secure communication between the quantum nodes and the quantum server, we defined a new Communication Procedure (CP) for the suggested IoT quantum network. The currently available quantum computer has a small qubit size (from 50 to 433 qubits). The proposed IoT quantum network allows us to overcome this problem by concatenating the computation efforts of multiple quantum nodes (quantum processors).
Style APA, Harvard, Vancouver, ISO itp.
19

Zhuang, Dian Zheng, i Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet". Applied Mechanics and Materials 441 (grudzień 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Pełny tekst źródła
Streszczenie:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining equipment and DNC system can be easily with the CAD/CAM/CAE system, digital profile measurement system, fault diagnosis and error compensation of intelligent system integration, providing good technical conditions for further information of various advanced manufacturing environment integration.
Style APA, Harvard, Vancouver, ISO itp.
20

Carius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling i Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life". Conjecturas 21, nr 5 (18.11.2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.

Pełny tekst źródła
Streszczenie:
From personal computers with internet access from a fixed location to today's smartphones with personalized internet access anywhere, behavioral changes resulting from technological advances accumulate daily. With the COVID-19 pandemic and the expansion of the home office, home education, telemedicine, among countless other activities developed remotely because of social distancing, the internet has become a unique space in activities in which it did not play such a role before. Given this emergency and historical scenario, the present work aims to assess the social impact of a resilience solution for computer networks, based on the continuous need for internet connection in present society. The device in question maintains the internet connection, considering that serious failures can occur in the main network, through a prototype that foresees problems in this network and anticipates it, presenting a solution so that the user does not notice connection failures. Considering such a device, it is intended to evaluate its impact on the well-being of the customer who acquires it, according to the connection needs of different groups. Therefore, exploratory research is described since the impact on the clients' well-being was not studied in previous analyses. For the design of this research, it is understood that a survey-type survey is indicated, as it is intended, through questionnaires with Likert-type scales and short open questions, to capture the different needs and reactions in different social groups, chosen according to the need for internet access. This work, however, analyzes a case study in a focus group, in a home office, from the perspective of the importance of a resilience device in computer networks as a promoter of the personal well-being of individuals participating in the research. At the end of this study, we intend to answer the following research question: "Does resilience in computer networks influence the well-being of individuals who use it?"
Style APA, Harvard, Vancouver, ISO itp.
21

Odhiambo, M. O., i P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce". Engineering, Technology & Applied Science Research 2, nr 6 (4.12.2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Pełny tekst źródła
Streszczenie:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to develop a software-based computer architecture on which Agents execution could be explored. The combination of Intelligent Agents and HYDRA computer architecture gave rise to a new computer concept: the NET-Computer in which the comput­ing resources reside on the Internet. The Internet computers form the hardware and software resources, and the user is provided with a simple interface to access the Internet and run user tasks. The Agents autonomously roam the Internet (NET-Computer) executing the tasks. A growing segment of the Internet is E-Commerce for online shopping for products and services. The Internet computing resources provide a marketplace for product suppliers and consumers alike. Consumers are looking for suppliers selling products and services, while suppliers are looking for buyers. Searching the vast amount of information available on the Internet causes a great deal of problems for both consumers and suppliers. Intelligent Agents executing on the NET-Computer can surf through the Internet and select specific information of interest to the user. The simulation results show that Intelligent Agents executing HYDRA computer architecture could be applied in E-Commerce.
Style APA, Harvard, Vancouver, ISO itp.
22

Wan, Xue Yong, Liang Zhang, Wei Xu i Hong Hui Gong. "Computer Network Security Strategy Research". Applied Mechanics and Materials 599-601 (sierpień 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Pełny tekst źródła
Streszczenie:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
Style APA, Harvard, Vancouver, ISO itp.
23

Yuliana, Dela, i I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir". JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, nr 2 (24.11.2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.

Pełny tekst źródła
Streszczenie:
Technological developments are very beneficial for the world of education, such as the use of the internet in finding and managing information and can help in the teaching and learning process. Before using the internet, there was a computer network that played an important role in it. In building a computer network, a concept or method is needed in designing it, and here the PPDIOO method will be used and uses two types of network topologies, namely star and ring topologies. With the design of this computer network, it can help schools in the teaching and learning process and can improve the quality of teaching, the quality of knowledge and the quality of the abilities of students and teachers. Keywords: Education, Technology, Computer Networks, PPDIOO Method, Network Topology
Style APA, Harvard, Vancouver, ISO itp.
24

Husna, Muhammad Aliyul, i Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram". JURIKOM (Jurnal Riset Komputer) 8, nr 6 (30.12.2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.

Pełny tekst źródła
Streszczenie:
The network administrator is a person who is responsible for managing computer networks. One of the duties of a network administrator is network monitoring because errors on the server and services running on the server cannot be known when it happened. This can be difficult if the administrator is far from a surveillance center. A network Monitoring System is a system that helps Network Administrators in supervising and managing computer networks that exist in an agency. By using the system that will be implemented in this research, the computer network monitoring process can be monitored remotely, anywhere and anytime as long as it is connected to the Internet network. With this Network Monitoring System, it is hoped that in the long term PT Cyber Network Indonesia can implement an integrated and well-monitored Internet network system. Test results using Network Monitoring Zabbix, generate real-time data regarding bandwidth usage, problem logs and resource availability.
Style APA, Harvard, Vancouver, ISO itp.
25

Raharjo, Mugi, Frengki Pernando i Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)". Jurnal Teknik Komputer 5, nr 1 (11.02.2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.

Pełny tekst źródła
Streszczenie:
The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks
Style APA, Harvard, Vancouver, ISO itp.
26

Upadhyay, Paramesh C., i Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks". International Journal of Mobile Computing and Multimedia Communications 2, nr 3 (lipiec 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Pełny tekst źródła
Streszczenie:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
Style APA, Harvard, Vancouver, ISO itp.
27

Wang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research". Advanced Materials Research 989-994 (lipiec 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.

Pełny tekst źródła
Streszczenie:
If we apply the system internal elements as nodes, and the relationship between the elements as connection, then the system form a network. If we put emphasis on the structure of the system and analyze the function of the system from the angle of structure, we’ll find that real network topology properties differ from previous research network, and has numerous nodes, which is called complex networks. In the real word, many complex systems can be basically described by the network, while the reality is that complex systems can be called as “complex network”, such as social network, transportation network, power grids and internet etc. In recent years, many articles about the complex networks are released in the international first-class publications such as Nature, PRL, PNAS, which reflects that the complex networks has become a new research focus.
Style APA, Harvard, Vancouver, ISO itp.
28

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures". Applied Mechanics and Materials 433-435 (październik 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Pełny tekst źródła
Streszczenie:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
Style APA, Harvard, Vancouver, ISO itp.
29

Saputro, Bagus Aji. "Network Security Analysis and Bandwidth Management". International Journal of Science, Engineering and Information Technology 5, nr 02 (27.07.2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.

Pełny tekst źródła
Streszczenie:
Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.
Style APA, Harvard, Vancouver, ISO itp.
30

Tedyyana, Agus, i Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway". INOVTEK Polbeng - Seri Informatika 3, nr 1 (3.06.2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.

Pełny tekst źródła
Streszczenie:
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers that use windows operating system. Computers that have been infected wannacry will make all existing data in the computer hard drive becomes encrypted, so the user can not open the data that has been infected with the virus.To solve the problem then it is proposed Design of Malware Detection and Prevention System Using Unified Modeling Language (UML). This system is designed using Router, Server, and SMS Gateway. Router is used for network configuration. The server is used for WEB-based storage systems that serve to detect ports. SMS Gateway is used to send SMS to the network admins. With the proposed system is expected to help detect the presence of malware that goes through the router, so that the system will automatically send notification of malware via SMS
Style APA, Harvard, Vancouver, ISO itp.
31

Babosov, Ye М. "Contradictory use of computer technology in a modern network society". Proceedings of the National Academy of Sciences of Belarus, Humanitarian Series 64, nr 3 (16.08.2019): 289–98. http://dx.doi.org/10.29235/2524-2369-2019-64-3-289-298.

Pełny tekst źródła
Streszczenie:
Ambivalence of constructive significance of social networks and negative ways of using them has been revealed. The fatality of long-term exposure and internet addiction to health, especially of children and adolescents, is characterized. Examples and typical features of committing internet hooliganism, cyber-fraud, cybercrime, blackmail of sexual nature, internet seduction of children and adolescents are presented. Attention to growing importance of formation of internet culture, development and improvement of legislative and legal provisions that toughen punishments for atrocities in cyberspace is drawn.
Style APA, Harvard, Vancouver, ISO itp.
32

Butler, Declan. "Experts fear network paralysis as computer worms blast Internet". Nature 425, nr 6953 (wrzesień 2003): 3. http://dx.doi.org/10.1038/425003a.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Sheikh, Yelena Mujibur, i Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.

Pełny tekst źródła
Streszczenie:
Abstract: Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network security is becoming progressively diverse and complex, and as a matter of fact, completely different ways are being devised to exploit it. Network engineers got to sustain with recent advances in each hardware and software package field to forestall them from being employed, together with user information. Historically, solely mobile computers and phones were connected to the internet; however, with the advancement of technology, other items such as security cameras, microwaves, automobiles, and industrial machinery are all now connected to the internet. The web of stuff is the term given to this network of interconnected things. Prime Securities for the Web of Things are involved[1]. This paper gives detailed information on cyber security and crime as little more than a result. It addresses forms of cyber security, the need for cyber security, issues regarding cyber security, benefits and drawbacks, criminal background, and criminal offenses. Keywords: Computer Security, Internet, Protection, Application software, IP network, Exploits, Malware Threats, Virus, IoT, Network Security, Computer Network, Cybersecurity.
Style APA, Harvard, Vancouver, ISO itp.
34

Qian, Fengchen, Yalin Ye, Ning Shan i Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet". MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.

Pełny tekst źródła
Streszczenie:
In this paper, we present a novel DC-centric architecture of telecommunication networks for next generation Internet. Data flow become the major traffic in existing telecommunication networks. Traditional computer networks and telecom networks meet many challenges in high-quality service, innovation, evolution, and management. Based on analysis existing telecom networks’ challenges, a DC-centric telecom network architecture with splitting the data plane from the control plane is proposed. The DC-centric telecom network is a widely-distributed data center network (DCN), which is composed of thousands of public or private DCs. Each DC not only plays the role of storage and computing, but also is a network node of data aggregation, switching, and routing. We also design an optical switching, which is evaluated by experiment.
Style APA, Harvard, Vancouver, ISO itp.
35

Puzmanová, Rita. "Simple Internet network management text". Computer Communications 16, nr 4 (kwiecień 1993): 262. http://dx.doi.org/10.1016/0140-3664(93)90097-c.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Ganapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera". American Journal of Trade and Policy 6, nr 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.

Pełny tekst źródła
Streszczenie:
Internet is the world's network of connected computer networks. Internet means an interconnected network. It is a network of connected web servers. Internet helps data and people across the globe. Internet of things refers to network-connected things with embedded computer chips. Things on the internet would include devices enabled for internet access. IoT association of images on content management websites with unique watermark signature to account for Royal to the owner of the picture will help against piracy, copyright infringement, and misuse of photos registered with unique identification keys. This will make content management easier. It will generate revenue for the person who takes the copyrighted picture. A watermark is an embedded signature in a thing. It could be embedded in a video, image, and other file types for distinction and marking for ownership. It could be visible or invisible. It also provides a means to trace a product to the owner. This work looks into how images with watermark can be connected to the IoT for tracking and fighting piracy.
Style APA, Harvard, Vancouver, ISO itp.
37

Wei, Li, i Da Zhi Deng. "A Novel Stable Algorithm of Getting User’s Account Based on Telnet Protocol". Applied Mechanics and Materials 299 (luty 2013): 130–34. http://dx.doi.org/10.4028/www.scientific.net/amm.299.130.

Pełny tekst źródła
Streszczenie:
In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,due to the vulnerability of the computer network system inherent,a direct impact on national security and social and political stability. Because of the popularity of computers and large-scale development of the Internet, network security has been increasing as the theme. Reasonable safeguards against violations of resources; regular Internet user behavior and so on has been the public's expectations of future Internet. This paper described a stable method of getting telnet user’s account in development of network management based on telnet protocol.
Style APA, Harvard, Vancouver, ISO itp.
38

VASILE, Cristinel Marius. "Firewall Technologies". International Journal of Information Security and Cybercrime 7, nr 1 (29.06.2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Pełny tekst źródła
Streszczenie:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
Style APA, Harvard, Vancouver, ISO itp.
39

Liu, Yang, Jie Jiang, Jiahao Sun i Xianghan Wang. "InterNet+: A Light Network for Hand Pose Estimation". Sensors 21, nr 20 (11.10.2021): 6747. http://dx.doi.org/10.3390/s21206747.

Pełny tekst źródła
Streszczenie:
Hand pose estimation from RGB images has always been a difficult task, owing to the incompleteness of the depth information. Moon et al. improved the accuracy of hand pose estimation by using a new network, InterNet, through their unique design. Still, the network still has potential for improvement. Based on the architecture of MobileNet v3 and MoGA, we redesigned a feature extractor that introduced the latest achievements in the field of computer vision, such as the ACON activation function and the new attention mechanism module, etc. Using these modules effectively with our network, architecture can better extract global features from an RGB image of the hand, leading to a greater performance improvement compared to InterNet and other similar networks.
Style APA, Harvard, Vancouver, ISO itp.
40

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha i Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things". International Journal of Grid and High Performance Computing 11, nr 3 (lipiec 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Pełny tekst źródła
Streszczenie:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy IoT); 2) The optimized reactive route is dynamically adjusted based on fuzzy based prediction accurately from the number of routes provided by base protocol. If the selection accuracy is high, the performance enhances the network quality; 3) FLWP takes full advantage of energy to further enhance target tracking performance by properly selecting reactive routes in the network. Authors evaluated the efficiency of FLWP with simulation-based experiments. FLWP scheme improves the energy efficiency.
Style APA, Harvard, Vancouver, ISO itp.
41

Dzhuliy, V. M., O. V. Miroshnichenko i L. V. Solodeeva. "METHOD OF CLASSIFICATION OF APPLICATIONS TRAFFIC OF COMPUTER NETWORKS ON THE BASIS OF MACHINE LEARNING UNDER UNCERTAINTY". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, nr 74 (2022): 73–82. http://dx.doi.org/10.17721/2519-481x/2022/74-07.

Pełny tekst źródła
Streszczenie:
The paper proposes a method for classifying applications of computer network traffic based on machine learning in conditions of uncertainty. Modern methods of classification of computer network traffic applications (such as the classification of transport layer protocols by port numbers) have significant shortcomings, which leads to and is the reason for the growth of research in the direction of classification of computer network traffic applications. The rapid growth in recent years of the types and number of transport layer network protocols increases the relevance of research in this area, the development of appropriate algorithms and methods for classifying applications of computer network traffic, which reduce computational complexity. At the present stage, the problem that needs to be urgently addressed is the classification of computer network traffic applications using appropriate protocols and encryption algorithms. A promising area of classification of computer network traffic applications is statistical methods, which are based on the analysis and identification of statistical characteristics of IP traffic. The most promising are the intellectual analysis of data flow, as well as machine learning technologies, which are currently widely used in related fields of science. The problem of research and training according to precedents is solved - classification of computer network traffic applications on the basis of pre-known set of attributes of their features, in order to improve the technical base of computer networks and theoretical base, while ensuring high performance and quality networks. example of using transport layer protocols (TCP / IP stack). The result of solving this problem is to assign the application, in accordance with the rules of the educational sample, to one of the outstanding classes, which are predetermined, which contains the relevant, but already classified applications. Statistical analysis and research of the attributes of Internet applications showed that the most important attributes associated with changes in the volume of Internet traffic flow are exponential. Fisher's criterion can be used to calculate anomalous changes in the amount of Internet traffic of applications to calculate averages. To classify Internet applications in data streaming mode, an algorithm for detecting the offset of the concept (drift) of data flow traffic is proposed for continuous data flow. Fisher's drift detector is based on the statistical characteristics of the attributes of Internet applications, analyzed using sliding windows that monitor changes in traffic current statistical characteristics of the attributes of applications.
Style APA, Harvard, Vancouver, ISO itp.
42

Saleh, Khairul, i Tini Fitriani. "ANALISA SISTEM INFORMASI KEAMANAN INTERNET SPEEDY PADA PLASA TELKOM TANJUNGBALAI". JURNAL TEKNOLOGI INFORMASI 1, nr 2 (7.09.2018): 137. http://dx.doi.org/10.36294/jurti.v1i2.302.

Pełny tekst źródła
Streszczenie:
Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account. Keywords - Security System, Speedy Network
Style APA, Harvard, Vancouver, ISO itp.
43

Alakbarov, Rashid. "AZSCIENCENET SCIENCE-COMPUTER NETWORK: STAGES OF DEVELOPMENT, INTERNET SERVICES AND PROSPECTS". Problems of Information Society 07, nr 1 (21.01.2016): 11–20. http://dx.doi.org/10.25045/jpis.v07.i1.02.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Qin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study". Advanced Materials Research 1079-1080 (grudzień 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.

Pełny tekst źródła
Streszczenie:
With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.
Style APA, Harvard, Vancouver, ISO itp.
45

CERNOV, Ana-Maria. "Security in Computer Networks". International Journal of Information Security and Cybercrime 7, nr 1 (29.06.2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Pełny tekst źródła
Streszczenie:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
Style APA, Harvard, Vancouver, ISO itp.
46

Abbate, Janet. "Government, Business, and the Making of the Internet". Business History Review 75, nr 1 (2001): 147–76. http://dx.doi.org/10.2307/3116559.

Pełny tekst źródła
Streszczenie:
In 1969, when few commercial communications networks existed, a U.S. Defense Department research agency created an experimental system that would eventually become the Internet. Driven by both research and military considerations, the designers of the Internet created a complex, robust, and flexible system that differed in significant ways from contemporary commercial communications networks. In the 1970s and 1980s, computer manufacturers (mainly based in the United States) and telecommunications carriers (mainly operating outside the United States) vied to offer commercial network products and services, but no single company or technology was able to dominate the market, in part because computer users preferred the type of nonproprietary technical standards used in the Internet. In the 1980s, the National Science Foundation took over operation of the Internet, and in the 1990s the NSF turned over the network to privatesector operators. While the Internet has rapidly increased in scale under commercial ownership, the technology also continues to reflect the systems research origins.
Style APA, Harvard, Vancouver, ISO itp.
47

Khasambiev, I. V., i E. A. Guseva. "Network architectures and protocols of M2M communications". Journal of Physics: Conference Series 2176, nr 1 (1.06.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.

Pełny tekst źródła
Streszczenie:
Abstract The issues of building the architecture of M2M networks and managing M2M services using the capabilities of the IMS platform are considered Introduction. M2M (Machine to Machine) is a complex of technologies that provide automatic interaction between devices (things) without human intervention. The Internet of Things is not a single technology, but a whole system of technological solutions. It is a global network infrastructure, which consists of computer networks of physical objects, the traditional IP Internet, and various devices connecting these networks.
Style APA, Harvard, Vancouver, ISO itp.
48

Lazarov, Andon D., i Petia Petrova. "Modelling Activity of a Malicious User in Computer Networks". Cybernetics and Information Technologies 22, nr 2 (1.06.2022): 86–95. http://dx.doi.org/10.2478/cait-2022-0018.

Pełny tekst źródła
Streszczenie:
Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition of the motivation as a psychological and emotional state and main prerequisites for modelling of network intruder’s activity are suggested. A mathematical model as a quadratic function of malicious individual’s behavior and impact on the computer network based on three quantified factors, motivation, satisfaction and system protection is developed. Numerical simulation experiments of the unauthorized access and its effect onto the computer network are carried out. The obtained results are graphically illustrated and discussed.
Style APA, Harvard, Vancouver, ISO itp.
49

Herlina, Elvi. "Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya". Jurnal Manajemen Informatika Medicom (JMI) 10, nr 2 (30.09.2022): 21–25. http://dx.doi.org/10.35335/jmi.v10i2.4.

Pełny tekst źródła
Streszczenie:
The need for internet in the learning process has a very significant role so that in its use it is necessary to regulate access and manage bandwidth well for the smooth internet access. This research was conducted to analyze the differences in bandwidth management design for computer network infrastructure in the old design and the new design at SMKN 1 ABDYA. This study aims to see how to analyze the difference in delay and throughput in the bandwidth management design of old and new computer networks. In this study using qualitative research methods where the data obtained by means of observation, interviews and documentation. This research uses the Wireshark version 2.6 application. 6 to see the use of delay and throughput on the bandwidth management design of old and new computer networks. Based on the results of the calculation of the use of delay and throughput using the Wireshark 2.6.6 application, there is a significant difference between the use of delay and throughput in the design of bandwidth management for the old computer network and the design of bandwidth management for the new computer network.
Style APA, Harvard, Vancouver, ISO itp.
50

Zhao, Ying. "Local Area Network Information Security and Virus Countermeasures of the Internet". Advanced Materials Research 1079-1080 (grudzień 2014): 598–600. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.598.

Pełny tekst źródła
Streszczenie:
With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii