218 research outputs found

    Manajemen Risiko Sistem Informasi Menggunakan ISO 31000 dan Standar Pengendalian ISO/EIC 27001 di Tripio Purwokerto

    Get PDF
    Bertambahnya ketergantungan organisasi terhadap penggunaan sistem informasi dalam rutinan sejalan dengan ancaman dan risiko yang timbul dari penggunaan sistem informasi tersebut. Permasalahan penggunaan sistem informasi juga dialami oleh Tripio Purwokerto. Tripio merupakan perusahaan yang bergerak di bidang teknologi di Purwokerto. Tripio memiliki dua sistem informasi untuk menunjang proses bisnisnya yaitu website dan Point of Sales (POS) systems. Dalam penggunaan sistem informasi mengalami permasalahan seperti server mengalami error, jaringan yang bermasalah, data yang rusak karena terkena virus dan human error. Tujuan penelitian adalah mengetahui risiko dan juga dampak dari penggunaan sistem informasi di Tripio Purwokerto. Metode yang digunakan adalah International Organization for Standardization (ISO) 3100:2018 dan standar pengendalian menggunakan International Organization for Standardization (ISO) 27001:2013. Dari hasil penelitian yang telah dilakukan dapat ditarik kesimpulan bahwa terdapat 15 risiko yang terdiri dari 6 risiko dengan tingkat risiko high, 7 risiko dengan tingkat risiko medium, dan 2 risiko dengan tingkat risiko low. Rekomendasi kontrol yang digunakan mengacu pada ISO 27001:2013 bagian human recource security, access control, physical and environmental security, operations security, protection from malware, communications security, system acquisition, development and maintenance

    A COMPARATIVE ANALYSIS OF 802.11b AND 802.11g NETWORK

    Get PDF
    Recent advances in wireless technology has led to the introduction of new devices utilizing the 2.4GHz industrial scientific and medical (ISM) unlicensed band traditionally used by Wireless LANS (WLAN). The increasing demand of higher data rate in WLANs has prompted the continual emergence of different 802.11 protocols with increased performance. Interoperability and coexistence between these networks become key issues and must be catered for, to guarantee satisfactory performance of both networks. 802.11 refer to a family of specifications developed by the International Institute of Electrical Electronics Engineering (IEEE) for wireless LAN technology. IEEE accepted the specification for 802.11 in 1997. Wireless Local Area Network (WLAN) has become popular in the home due to ease of installation, and the increasing popularity of laptop computers. WLAN is based on IEEE 802.11 standard and is also known as Wireless Fidelity (Wi-Fi) [1]. In this paper, the comparative analysis of IEEE 802.11b and IEEE 802.11g networks are x-rayed. KEYWORDS: 802.11b, 802.11g, WLAN, IEEE, OFDM, LRWPANS, Wireless Fidelity, Wireless Medium Access Control, Physical Layer

    Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet

    Get PDF
    The way in which a Local Area Network access mechanism (Medium Access Control protocol) designed for a specific type of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide service to the Twentenet real-time access mechanism. Relevant Ethernet and Twentenet concepts are explained, the approach taken is introduced, and problems encountered, along with the actual synthesis of both networks, are described

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    Random Matrix Theory applied to the Estimation of Collision Multiplicities

    Get PDF
    This paper presents two techniques in order to estimate the collision multiplicity, i.e., the number of users involved in a collision [1]. This estimation step is a key task in multi-packet reception approaches and in collision resolution techniques. The two techniques are proposed for IEEE 802.11 networks but they can be used in any OFDM-based system. The techniques are based on recent advances in random matrix theory and rely on eigenvalue statistics. Provided that the eigenvalues of the covariance matrix of the observations are above a given threshold, signal eigenvalues can be separated from noise eigenvalues since their respective probability density functions are converging toward two different laws: a Gaussian law for the signal eigenvalues and a Tracy-Widom law for the noise eigenvalues. The first technique has been designed for the white noise case, and the second technique has been designed for the colored noise case. The proposed techniques outperform current estimation techniques in terms of mean square error. Moreover, this paper reveals that, contrary to what is generally assumed in current multi-packet reception techniques, a single observation of the colliding signals is far from being sufficient to perform a reliable estimation of the collision multiplicities

    ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation

    Full text link
    A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmissions occur in a time-slotted ALOHA-type fashion but with an important difference: simultaneous transmissions of two users can be successful. If more than two users transmit in the same slot the collision cannot be resolved and retransmission is required. If only one user transmits, the transmitted packet is recovered with some probability, depending on the state of the channel. If two users transmit the collision is resolved and the packets are recovered by first over-sampling the collision signal and then exploiting independent information about the two users that is contained in the signal polyphase components. The ALOHA-CR throughput is derived under the infinite backlog assumption and also under the assumption of finite backlog. The contention probability is determined under these two assumptions in order to maximize the network throughput and maintain stability. Queuing delay analysis for network users is also conducted. The performance of ALOHA-CR is demonstrated on the Wireless Open Access Research Platform (WARP) test-bed containing five software defined radio nodes. Analysis and test-bed results indicate that ALOHA-CR leads to significant increase in throughput and reduction of service delays

    XTP for the NASA space station

    Get PDF
    The NASA Space Station is a truly international effort; therefore, its communications systems must conform to established international standards. Thus, NASA is requiring that each network-interface unit implement a full suite of ISO protocols. However, NASA is understandably concerned that a full ISO stack will not deliver performance consistent with the real-time demands of Space Station control systems. Therefore, as a research project, the suitability of the Xpress transfer protocol (XTP) is investigated along side a full ISO stack. The initial plans for implementing XTP and comparing its performance to ISO TP4 are described

    Sidelobe Control in Collaborative Beamforming via Node Selection

    Full text link
    Collaborative beamforming (CB) is a power efficient method for data communications in wireless sensor networks (WSNs) which aims at increasing the transmission range in the network by radiating the power from a cluster of sensor nodes in the directions of the intended base station(s) or access point(s) (BSs/APs). The CB average beampattern expresses a deterministic behavior and can be used for characterizing/controling the transmission at intended direction(s), since the mainlobe of the CB beampattern is independent on the particular random node locations. However, the CB for a cluster formed by a limited number of collaborative nodes results in a sample beampattern with sidelobes that severely depend on the particular node locations. High level sidelobes can cause unacceptable interference when they occur at directions of unintended BSs/APs. Therefore, sidelobe control in CB has a potential to increase the network capacity and wireless channel availability by decreasing the interference. Traditional sidelobe control techniques are proposed for centralized antenna arrays and, therefore, are not suitable for WSNs. In this paper, we show that distributed, scalable, and low-complexity sidelobe control techniques suitable for CB in WSNs can be developed based on node selection technique which make use of the randomness of the node locations. A node selection algorithm with low-rate feedback is developed to search over different node combinations. The performance of the proposed algorithm is analyzed in terms of the average number of trials required to select the collaborative nodes and the resulting interference. Our simulation results approve the theoretical analysis and show that the interference is significantly reduced when node selection is used with CB.Comment: 30 pages, 10 figures, submitted to the IEEE Trans. Signal Processin
    corecore