218 research outputs found
Manajemen Risiko Sistem Informasi Menggunakan ISO 31000 dan Standar Pengendalian ISO/EIC 27001 di Tripio Purwokerto
Bertambahnya ketergantungan organisasi terhadap penggunaan sistem informasi dalam rutinan sejalan dengan ancaman dan risiko yang timbul dari penggunaan sistem informasi tersebut. Permasalahan penggunaan sistem informasi juga dialami oleh Tripio Purwokerto. Tripio merupakan perusahaan yang bergerak di bidang teknologi di Purwokerto. Tripio memiliki dua sistem informasi untuk menunjang proses bisnisnya yaitu website dan Point of Sales (POS) systems. Dalam penggunaan sistem informasi mengalami permasalahan seperti server mengalami error, jaringan yang bermasalah, data yang rusak karena terkena virus dan human error. Tujuan penelitian adalah mengetahui risiko dan juga dampak dari penggunaan sistem informasi di Tripio Purwokerto. Metode yang digunakan adalah International Organization for Standardization (ISO) 3100:2018 dan standar pengendalian menggunakan International Organization for Standardization (ISO) 27001:2013. Dari hasil penelitian yang telah dilakukan dapat ditarik kesimpulan bahwa terdapat 15 risiko yang terdiri dari 6 risiko dengan tingkat risiko high, 7 risiko dengan tingkat risiko medium, dan 2 risiko dengan tingkat risiko low. Rekomendasi kontrol yang digunakan mengacu pada ISO 27001:2013 bagian human recource security, access control, physical and environmental security, operations security, protection from malware, communications security, system acquisition, development and maintenance
A COMPARATIVE ANALYSIS OF 802.11b AND 802.11g NETWORK
Recent advances in wireless technology has led to the introduction of new devices utilizing the 2.4GHz industrial scientific and medical (ISM) unlicensed band traditionally used by Wireless LANS (WLAN). The increasing demand of higher data rate in WLANs has prompted the continual emergence of different 802.11 protocols with increased performance. Interoperability and coexistence between these networks become key issues and must be catered for, to guarantee satisfactory performance of both networks. 802.11 refer to a family of specifications developed by the International Institute of Electrical Electronics Engineering (IEEE) for wireless LAN technology. IEEE accepted the specification for 802.11 in 1997. Wireless Local Area Network (WLAN) has become popular in the home due to ease of installation, and the increasing popularity of laptop computers. WLAN is based on IEEE 802.11 standard and is also known as Wireless Fidelity (Wi-Fi) [1]. In this paper, the comparative analysis of IEEE 802.11b and IEEE 802.11g networks are x-rayed. KEYWORDS: 802.11b, 802.11g, WLAN, IEEE, OFDM, LRWPANS, Wireless Fidelity, Wireless Medium Access Control, Physical Layer
Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet
The way in which a Local Area Network access mechanism (Medium Access Control protocol) designed for a specific type of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide service to the Twentenet real-time access mechanism. Relevant Ethernet and Twentenet concepts are explained, the approach taken is introduced, and problems encountered, along with the actual synthesis of both networks, are described
Benefits of Location-Based Access Control:A Literature Study
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud
attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud
the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud
first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud
(i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud
(iii) formulating design criteria for facilities and working environments for optimal LBAC usage
Random Matrix Theory applied to the Estimation of Collision Multiplicities
This paper presents two techniques in order to estimate the collision multiplicity, i.e., the number of users involved in a collision [1]. This estimation step is a key task in multi-packet reception approaches and in collision resolution techniques. The two techniques are proposed for IEEE 802.11 networks but they can be used in any OFDM-based system. The techniques are based on recent advances in random matrix theory and rely on eigenvalue statistics. Provided that the eigenvalues of the covariance matrix of the observations are above a given threshold, signal eigenvalues can be separated from noise eigenvalues since their respective probability density functions are converging toward two different laws: a Gaussian law for the signal eigenvalues and a Tracy-Widom law for the
noise eigenvalues. The first technique has been designed for the white noise case, and the second technique has been designed for the colored noise case. The proposed techniques outperform current estimation techniques in terms of mean square error. Moreover, this paper reveals that, contrary to what is generally assumed in current multi-packet reception techniques, a single observation of the colliding signals is far from being sufficient to
perform a reliable estimation of the collision multiplicities
ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is
proposed for high throughput wireless communications in a cellular scenario.
Transmissions occur in a time-slotted ALOHA-type fashion but with an important
difference: simultaneous transmissions of two users can be successful. If more
than two users transmit in the same slot the collision cannot be resolved and
retransmission is required. If only one user transmits, the transmitted packet
is recovered with some probability, depending on the state of the channel. If
two users transmit the collision is resolved and the packets are recovered by
first over-sampling the collision signal and then exploiting independent
information about the two users that is contained in the signal polyphase
components. The ALOHA-CR throughput is derived under the infinite backlog
assumption and also under the assumption of finite backlog. The contention
probability is determined under these two assumptions in order to maximize the
network throughput and maintain stability. Queuing delay analysis for network
users is also conducted. The performance of ALOHA-CR is demonstrated on the
Wireless Open Access Research Platform (WARP) test-bed containing five software
defined radio nodes. Analysis and test-bed results indicate that ALOHA-CR leads
to significant increase in throughput and reduction of service delays
XTP for the NASA space station
The NASA Space Station is a truly international effort; therefore, its communications systems must conform to established international standards. Thus, NASA is requiring that each network-interface unit implement a full suite of ISO protocols. However, NASA is understandably concerned that a full ISO stack will not deliver performance consistent with the real-time demands of Space Station control systems. Therefore, as a research project, the suitability of the Xpress transfer protocol (XTP) is investigated along side a full ISO stack. The initial plans for implementing XTP and comparing its performance to ISO TP4 are described
Sidelobe Control in Collaborative Beamforming via Node Selection
Collaborative beamforming (CB) is a power efficient method for data
communications in wireless sensor networks (WSNs) which aims at increasing the
transmission range in the network by radiating the power from a cluster of
sensor nodes in the directions of the intended base station(s) or access
point(s) (BSs/APs). The CB average beampattern expresses a deterministic
behavior and can be used for characterizing/controling the transmission at
intended direction(s), since the mainlobe of the CB beampattern is independent
on the particular random node locations. However, the CB for a cluster formed
by a limited number of collaborative nodes results in a sample beampattern with
sidelobes that severely depend on the particular node locations. High level
sidelobes can cause unacceptable interference when they occur at directions of
unintended BSs/APs. Therefore, sidelobe control in CB has a potential to
increase the network capacity and wireless channel availability by decreasing
the interference. Traditional sidelobe control techniques are proposed for
centralized antenna arrays and, therefore, are not suitable for WSNs. In this
paper, we show that distributed, scalable, and low-complexity sidelobe control
techniques suitable for CB in WSNs can be developed based on node selection
technique which make use of the randomness of the node locations. A node
selection algorithm with low-rate feedback is developed to search over
different node combinations. The performance of the proposed algorithm is
analyzed in terms of the average number of trials required to select the
collaborative nodes and the resulting interference. Our simulation results
approve the theoretical analysis and show that the interference is
significantly reduced when node selection is used with CB.Comment: 30 pages, 10 figures, submitted to the IEEE Trans. Signal Processin
- …