63 research outputs found
LOCAL AREA NETWORK MANAGEMENT (Case Study at Assessment and Development Information Technology Units Brawijaya University Malang)
The purpose of this study was to know the management local area network at Assessment and Development Information Technology units, furthermore this study focusing on network management functions that applied by Assessment and Development Information Technology Units. This study will explain about the implementation of network management functions in the local area network management. The research method employ in this research is by using descriptive qualitative method by study case approach. The results of this study was in the implementation of network management functions Assessment and Development Information Technology units already applied all five network management functions in the local area network management. Each functions represented as a network management components in managing Assessment and Development Information Technology units local area network. Since the network management functions represented as a network management components it needed improvement in each network management functions policies and measurements
Wireless local area network management frame denial- of-service attack detection and mitigation schemes
Wireless Local Area Networks (WLAN) are increasingly deployed and in widespread use worldwide due to its convenience and low cost. However, due to the broadcasting and the shared nature of the wireless medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts to improve the security of wireless networks over the past years, some attacks remain inevitable. Attackers are capable of sending fake de-authentication or disassociation frames to terminate the session of active users; thereby leading to denial of service, stolen passwords, or leakage of sensitive information amongst many other cybercrimes. The detection of such attacks is crucial in today's critical applications. Many security mechanisms have been proposed to effectively detect these issues, however, they have been found to suffer limitations which have resulted in several potential areas of research. This thesis aims to address the detection of resource exhaustion and masquerading DoS attacks problems, and to construct several schemes that are capable of distinguishing between benign and fake management frames through the identification of normal behavior of the wireless stations before sending any authentication and de-authentication frames. Thus, this thesis proposed three schemes for the detection of resource exhaustion and masquerading DoS attacks. The first scheme was a resource exhaustion DoS attacks detection scheme, while the second was a de- authentication and disassociation detection scheme. The third scheme was to improve the detection rate of the de-authentication and disassociation detection scheme using feature derived from an unsupervised method for an increased detection rate. The effectiveness of the performance of the proposed schemes was measured in terms of detection accuracy under sophisticated attack scenarios. Similarly, the efficiency of the proposed schemes was measured in terms of preserving the resources of the access point such as memory consumptions and processing time. The validation and analysis were done through experimentation, and the results showed that the schemes have the ability to protect wireless infrastructure networks against denial of service attacks
Network performance monitors
Over the last 10 years both industry and academia have conducted extensive research and development in the areas of local area network management and performance. This thesis investigates some different ways of measuring the performance of local area networks and studies hardware and software systems designed to watch over network performance and events. These systems are termed network performance monitors. As part of the thesis, a network performance monitor has been implemented to monitor TOOLSNET, an Ethernet based local area network, supervised by the Engineering Tools Technology group at Compugraphic Corporation. This network performance monitor is called TOOLSNET ANALYSIS PACKAGE, or TAP for short. TAP runs Monday through Friday, from 8 a.m. to 5 p.m. to monitor TOOLSNET performance during working hours. A summary of the measurements from one of these 5 day sessions is reported in this paper. This summary includes the following tables: one showing a system by system contribution to TOOLSNET traffic for the session; another that shows the amount the network was utilized each day of the session; another that shows the total number of random errors experienced by TOOLSNET during the session; another that shows asymptotic throughput utilization, perceived utilization, relative load, and average response time for each day of the session; another that shows source-to-destination traffic for each day of the session
Design and Logistics for a LAN Management Course
This paper outlines an implementation for a hands-on Local Area Network (LAN) management course in the undergraduate curriculum of a department of Information Systems. Three major problems are addressed: faculty preparation, resource allocation, and course design/logistics. There are special difficulties in designing such a course because of the hardware preparation involved and the assignment of supervisor rights to a large number of students simultaneously for a single file server. A course outline and a sample practical exercise are given. This course has been successfully implemented and received a favorable student response
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
The Internet enables different computer networks to join together into one network in
which many different models of network devices can co-exist with each other. Standard
management protocol is necessary for the purpose of managing these networks. SNMP
(Simple Network Management Protocol), one of the standard protocols, is designed for
this open-class management function and is successfully implemented.
This thesis suggests a monitoring of network device statistical data from a remote place.
This approach reduced the complexity of existing techniques, which are basically
operable in specific operating system and having no standard Graphical User Interface
(GUI). To address this problem, a system based on WWW standard tool is developed
which is SNMP compatible as well as operable with any network device.
The network device monitoring tool is a client program, which is managed and could be
contacted with the server program. A web server and a browser are to provide static,
dynamic, and interactive management information. A web server, which plays a managing role, offers a variety of types of information. An SNMP agent, which cooperates
with a web server, uses SNMP protocol and provides access to management
information of network devices/agents. The implementation of the user interface using
the web-based technique of Java Applet makes it possible for a manager to easily search
and manage agent Management Information Base (Mill) through a browser. Java SNMP
class files and SNMP Applet Server (SAS) classes are used inside the Web-server to
communicate with network devices. The network device monitoring tool is configured
to collect network statistical data. It can monitor the real time graph on the basis of MIB
variable from remote place and shows more efficient than the existing tool
Curriculum Subcommittee Minutes, January 12, 2006
College of Business New Course
School of Accountancy Delete course
Department of Business Information Systems New Course Prerequisite Change Prefix Change, Course Description Change Prefix Change, Course Description Change, Title Change Prefix Change, Course Description Change, Prerequisite Change, Title Change Prefix Change, Course Number Change, Course Description Change, Title Change Prefix Change, Course Number Change, Prerequisite Change Delete Course
College of Education and Human Services Course Description Change Remove Prerequisite Prerequisite Change Title Change, Course Description Change
Department of Communicative Disorders and Deaf Education University Studies Request
Department of Family, Consumer, and Human Development Remove Prerequisites, Remove University Studies Designation Prerequisite Change, University Studies Request
Department of Health, Physical Education and Recreation Title Change Course Description Change, Course Number Change Prerequisite Change Title Change, Prerequisite Change, Course Description Change Credit Hour Change, Prerequisite Change
Department of Mechanical and Aerospace Engineering Prerequisite Change
Department of Art New Course Add Dual List Course Prefix Change Prerequisite Change Title Change, Prerequisite Change, Course Description Change Title Change Title Change, Prerequisite Change, Course Description Change, Remove Repeatable for Credit Delete Course
Department of English New Course Title Change, Course Description Change Delete Course
Interior Design Program Credit Hour Change
Department of Journalism and Communication Prerequisite Change Remove Prerequisite
Department of Landscape Architecture and Environmental Planning New Course Prerequisite Change Add Dual List, Credit Hour Change Prerequisite Change, Course Description Change Course Description Change Title Change, Course Description Change Title Change, Credit Hour Change, Prerequisite Change
Department of Languages, Philosophy, and Speech Communication New Course Delete Course
Department of Music New Course Title Change, Prerequisite Change Remove Prerequisite Prerequisite Change
Department of Political Science New Course Title Change
Department of Sociology, Social Work and Anthropology University Studies Request
Department of Theatre Arts Title Change Add Dual List
Department of Aquatic, Watershed, and Earth Resources Remove Prerequisite
Department of Biology New Course Prerequisite Change
Department of Chemistry and Biochemistry New Course Title Change, Prerequisite Change, Course Description Change
Department of Computer Science New Course Title Change, Prerequisite Change, Course Description Change
Department of Geology New Course
Department of Mathematics and Statistics New Course Prerequisite Change Course Description Change Inactivate Course Delete Course
Other Removing the Business Analysis and Decision Making Specialization Removing the Business Information Systems Specialization Removing the International Economics Specialization Removing the Quantitative Economic Analysis Specialization Suspending enrollment for the Business Information Technology and Education (BITE) and Marketing Education (MKED) programs Offering a Master of Science Degree: Plan C Engineering and Technology Education Degree Offering a Master of Science in Computer Engineering and a Master of Engineering in Computer Engineering Changing the name of the Management Information Systems Emphasis to Managerial Emphasis; changing the name of the Office Systems Management Emphasis to Training and Development Emphasis; and changing the name of the Electronic Commerce Emphasis to Technical Emphasis Suspending enrollment for Two-Year Certificate and Diploma Programs in the Department of Music College of Business courses that need additional wording added to the prerequisites Curriculum Subcommittee Handboo
The association of external auditor's attributes with management fraud risk assessment in financial reporting: empirical evidence from Yemen
As stated by the International Standard of Auditing (ISA No. 240), the effectiveness of the external auditors' attributes is the primary process in management fraud risk
assessment (MFRA). Therefore, the aim of this study is to examine the associations of external auditor effectiveness-related attributes and independent-related factors with MFRA in the context of Yemen. To achieve the objective of this study, questionnaires were distributed out to 410 external auditors working in private audit firms and the Yemeni Central Organization for Control and Accounting (COCA) for the year 2012. A total of 273 questionnaires were returned back out of which 19 were unusable. As such, the final sample of this study consists of 254 external auditors. Multiple regression analysis was used to test the study's hypotheses. This study finds positive associations of the external auditor's effectiveness score and external
auditor's independence score with MFRA. Furthermore, questioning discussion ability, professional qualification, fraud detection experience, information technology (IT) skill, training on fraud detection, and social relationships are reported to have positive and significant associations with MFRA, while job position is found to have a negative association. The findings of this study indicate that Yemeni government and COCA should issue new regulations to increase the external auditors' awareness and effectiveness towards MFRA. This study also indicates that the audit profession in Yemen needs more control, regulations, laws and policies to enhance the structure of the external auditors' decision in issues related to MFRA in
order to protect the interests of demand-supply sides of audit services and the related parties. Moreover, this study has implications for the Yemeni policy makers and
government to enrich the external auditors' effectiveness and independence by issuing new regulations, new laws, and applying more control on the quality of auditing profession to protect the economy and the society stability
Recommended from our members
On the management and performance of a class of local area networks
This dissertation is concerned with the management and performance issues of those register-insertion (R-I) ring type local area networks (LANs) which employ the message removal by destination node protocol. A typical example of such a network is the Distributed Loop Computer Network (DLCN). developed by Liu et al for fundamental research in the field of distributed computing. After considering the management issues of low cost R-J LANs. the research deals with performance analysis of the dynamically reconfigurable register-insertion (DRR) network.
In the first part of this research. a set of management functions is identified which are desirable and can be provided economically by a low cost LAN. A unique feature of the DLCN is that messages are removed from the network by the destination node. that is. messages do not travel whole of the loop. Therefore. it is not possible for a special control node to monitor the data traffic on the network without providing support functionality in each network access unit (NAU). The minimum functionality which must be provided in each NAU is identified in the thesis. A skeleton network was implemented to verify the feasibility of the proposed scheme. A paper describing the findings of this research was published and is reproduced as appendix A.
In the second part of this research. a new feature of the DLCN network is introduced. namely. that the performance of a network employing removal by destination protocol can be improved by reconfiguring the network in a particular way. A methodology to find the optimal configuration is developed and is shown. by worked examples. to lead to improved performance. The findings of this research are particularly applicable to the dynamically reconfigurable register-insertion (DRR) network. A paper dealing with the optimisation of a hypothetical fully connected DRR network has been accepted for publication. Another paper. which considers the general case of less than fully connected DRR networks. is to be published. Both papers are reproduced as append ices Band C.
Finally. a performance study of the ORR network is undertaken. As there seems to be no published attempt at formal analysis or simulation of a ORR network. a survey of literature dealing with performance study of the basic OLeN is performed. A simulation model of the DRR was then developed and implemented to verify the results arrived at in the previous section. Later. a queueing model of the DRR network. based on the work of Bux and Schlatter [7] is developed and analysed. Both simulation and analysis support the claim that the performance of a DRR network can be improved by adopting the configuration strategy developed in this thesis
Monitoring Aktivitas Komputer Jaringan LAN Menggunakan Net Monitor For Employees Berbasis Android
Abstrak—Aplikasi android Net Monitor For Employees merupakan aplikasi android yang begitu mudah digunakan untuk memonitoring atau memantau serta mengendalikan komputer yang terhubung dalam jaringan LAN atau WLAN. Tujuan kajian ini adalah memanfaatkan aplikasi Net Monitor For Employees untuk mengontrol dan memonitoring aktivitas komputer agen yang sedang aktif di dalam jaringan dan bisa untuk mendukung proses belajar dan mengajar yang efektif misalnya digunakan oleh lembaga pelatihan komputer, materi praktek di lab komputer, serta juga sangat digunakan untuk mengefisienkan opersional kantor pada suatu perusahaan dalam melakukan pemantauan aktivitas komputer yang digunakan oleh para pegawai perusahaan tersebut. Setiap karyawan yang disediakan komputer pada setiap mejanya dapat membuka komputer dan memungkinkan browsing yang tidak diinginkan. Hal inilah yang menyebabkan kurangnya pemantauan, Pemanfaatan aplikasi ini juga memungkinkan para manajer dan pemilik bisnis untuk melacak aktivitas, keterlibatan kerja, kinerja, dan produktivitas karyawan mereka. Para manajer dan pemilik bisnis tidak dapat memantau secara keseluruhan kinerja dari karyawanya satu per satu. Tetapi dengan adanya aplikasi ini diharapkan kinerja karyawanya dapat tetap terpantau oleh manager ataupun pemilik bisnis melalui komputer yang berada di ruangan ataupun dari gadget smartphone androidnya yang terhubung dalam satu jaringan LAN/WLAN. Dan dapat dimanfaatkan juga untuk para Administrator Jaringan untuk memantau aktivitas komputer dalam menajaga sistem keamaan jaringan yang dibuat dan mengurangi resiko terjadi ganguan yang tidak diinginkan
- …