75,173 research outputs found

    IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA

    Get PDF
    In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes.In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes

    Power Factor Correction Using Bridgeless Boost Topology

    Full text link
    Power quality is becoming a major concern for many electrical users. The high power non linear loads (such as adjustable speed drives, arc furnace, static power converter etc) and low power loads (such as computer, fax machine etc) produce voltage fluctuations, harmonic currents and an inequality in network system which results into low power factor operation of the power system. The devices commonly used in industrial, commercial and residential applications need to go through rectification for their proper functioning and operation. Due to the increasing demand of these devices, the line current harmonics create a major problem by degrading the power factor of the system thus affecting the performance of the devices. Hence there is a need to reduce the input line current harmonics so as to improve the power factor of the system. This has led to designing of Power Factor Correction circuits. Power Factor Correction (PFC) involves two techniques, Active PFC and Passive PFC. An active power factor circuit using Boost Converter is used for improving the power factor. This thesis work analyzes the procedural approach and benefits of applying Bridgeless Boost Topology for improving the power factor over Boost Converter Topology. A traditional design methodology Boost Converter Topology is initially analyzed and compared with the Bridgeless Boost topology and the overall Power Factor (PF) can be improved to the expectation. Method of re-shaping the input current waveform to be similar pattern as the sinusoidal input voltage is done by the Boost converter and the related controls that act as a Power Factor Correction (PFC) circuit. Higher efficiency can be achieved by using the Bridgeless Boost Topology. In this paper simulation of Boost Converter topology and Bridgeless PFC boost Converter is presented. Performance comparisons between the conventional PFC boost Converter and the Bridgeless PFC Boost Converter is done

    The implementation of a LAN

    Get PDF
    Includes bibliography.The subject of this thesis concerns the development of a Local Area Network (LAN) for the Department of Electrical and Electronic Engineering at the University of Cape Town. Motivation for this project was as a result of the ever increasing demands placed on the department's micro-computer training facilities by larger student intakes. The original training system consisted of a PDP 11/23 mini-computer connected via 9600 baud asynchronous links to 11 U.C.T. built micro-computers. This network topology was limiting in three ways: 1. It was slow because of the 9600 baud links and because the PDP was doing a large proportion of the processing.2. High-leve 1 software development tools for the PDP were too expensive and would over-load the computer. Because the micro-computers have no operating system but only an "in-house" monitor program which is not able to support any high-level language utility, all high-level software tools would have to be individually developed for this particular environment. 3. Switching was impractical. Because the PDP was the hub of the network all communication between computers had. to pass through it. This switching would lead to a greater processing load on the PDP, thus further degrading its performance. A two pronged attack was used to overcome these weaknesses: firstly, by designing a high-speed (1 Mbps) LAN to provide communications between a PDP 11/23 and up to 30 U.C.T. built micro-computers, faster inter-computer communication as well as switching and resource sharing was facilitated. Secondly, by customizing an operating system for the micro-computers, standard high-level software development tools could be used on these computers, consequently reducing the PDP's processing load

    Mathematical problems for complex networks

    Get PDF
    Copyright @ 2012 Zidong Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. This article is made available through the Brunel Open Access Publishing Fund.Complex networks do exist in our lives. The brain is a neural network. The global economy is a network of national economies. Computer viruses routinely spread through the Internet. Food-webs, ecosystems, and metabolic pathways can be represented by networks. Energy is distributed through transportation networks in living organisms, man-made infrastructures, and other physical systems. Dynamic behaviors of complex networks, such as stability, periodic oscillation, bifurcation, or even chaos, are ubiquitous in the real world and often reconfigurable. Networks have been studied in the context of dynamical systems in a range of disciplines. However, until recently there has been relatively little work that treats dynamics as a function of network structure, where the states of both the nodes and the edges can change, and the topology of the network itself often evolves in time. Some major problems have not been fully investigated, such as the behavior of stability, synchronization and chaos control for complex networks, as well as their applications in, for example, communication and bioinformatics

    Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases

    Get PDF
    The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker
    • …
    corecore