223 research outputs found

    ANALYSIS OF DATA & COMPUTER NETWORKS IN STUDENTS' RESIDENTIAL AREA IN UNIVERSITI TEKNOLOGI PETRONAS

    Get PDF
    In Universiti Teknologi Petronas (UTP), most of the students depend on the Internet and computer network connection to gain academics information and share educational resources. Even though the Internet connections and computers networks are provided, the service always experience interruption, such as slow Internet access, viruses and worms distribution, and network abuse by irresponsible students. Since UTP organization keeps on expanding, the need for a better service in UTP increases. Several approaches were put into practice to address the problems. Research on data and computer network was performed to understand the network technology applied in UTP. A questionnaire forms were distributed among the students to obtain feedback and statistical data about UTP's network in Students' Residential Area. The studies concentrate only on Students' Residential Area as it is where most of the users reside. From the survey, it can be observed that 99% of the students access the network almost 24 hours a day. In 2005, the 2 Mbps allocated bandwidth was utilized 100% almost continuously but in 2006, the bottleneck of Internet access has reduced significantly since the bandwidth allocated have been increased to 8 Mbps. Server degradation due to irresponsible acts by users also adds burden to the main server. In general, if the proposal to ITMS (Information Technology & Media Services) Department for them to improve their Quality of Service (QoS) and established UTP Computer Emergency Response Team (UCert), most of the issues addressed in this report can be solved

    Are IP Addresses "Personally Identifiable Information"?

    Get PDF

    Visualisasi Trafik Jaringan Dengan Metode Support Vector Machine (SVM) (Studi Kasus: Universitas Indo Global Mandiri)

    Get PDF
    Limited network resources and the increasing number of internet users in the current digital era have an impact on high traffic which results in decreased access speed to internet services. This is also a problem that occurs at the Indo Global Mandiri University (UIGM) Palembang, causing access to academic services to be slow. The purpose of this research is to identify the types of network traffic patterns which are then carried out by the process of grouping and visualizing these types of traffic. The data in this study were taken in real-time at the UIGM campus. The data obtained is the result of responses which are then extracted. The extraction results are processed using the Support Vector Machine (SVM) method for the process of grouping and visualizing data. The results of this study can distinguish types of traffic based on communication protocols, namely tcp and udp, where the results of the experiment were carried out six times with the results being the first experiment where 99.7% TCP and 0.1% for UDP, the second experiment 97.6% for TCP and 1.1% for UDP , trial three 99.7 % TCP and 0.2% UDP, trial four 97.5% and 1.3% UDP, trial five 99.5 TCP and 02% UDP, and the sixth or final try 97.7% TCP and 1.1% UDP. The data from the use of the SVM method obtained several types of traffic such as games by 0.4%, mail 0.2%, multimedia 0.4% and the web by 82.8% and this research still produces data that the pattern is not yet recognized by 15.5% Keywords : Network Traffic, Classification, Support Vector Mesi

    ANALYSIS OF DATA & COMPUTER NETWORKS IN STUDENTS' RESIDENTIAL AREA IN UNIVERSITI TEKNOLOGI PETRONAS

    Get PDF
    In Universiti Teknologi Petronas (UTP), most of the students depend on the Internet and computer network connection to gain academics information and share educational resources. Even though the Internet connections and computers networks are provided, the service always experience interruption, such as slow Internet access, viruses and worms distribution, and network abuse by irresponsible students. Since UTP organization keeps on expanding, the need for a better service in UTP increases. Several approaches were put into practice to address the problems. Research on data and computer network was performed to understand the network technology applied in UTP. A questionnaire forms were distributed among the students to obtain feedback and statistical data about UTP's network in Students' Residential Area. The studies concentrate only on Students' Residential Area as it is where most of the users reside. From the survey, it can be observed that 99% of the students access the network almost 24 hours a day. In 2005, the 2 Mbps allocated bandwidth was utilized 100% almost continuously but in 2006, the bottleneck of Internet access has reduced significantly since the bandwidth allocated have been increased to 8 Mbps. Server degradation due to irresponsible acts by users also adds burden to the main server. In general, if the proposal to ITMS (Information Technology & Media Services) Department for them to improve their Quality of Service (QoS) and established UTP Computer Emergency Response Team (UCert), most of the issues addressed in this report can be solved

    Наблюдаемость вычислительных систем как неотъемлемая часть комплекса средств защиты в автоматизированных системах

    Get PDF
    У цій статті розглядається необхідність реалізації властивостей спостерігання обчислювальних систем у програмах захисту від персонала й основні вимоги до методів і технологій, забезпечующим цю властивість.The necessity of computer systems accountability implementation in personnel security programs and general requirements to accountability technologies are discussed in this article

    ANALISIS DAN IMPLEMENTASI FIRST HOP REDUDANCY PROTOCOL PADA JARINGAN TOPOLOGI STAR

    Get PDF
    Perkembangan teknologi informasi dan komunikasi membentuk persyaratan yang lebih ketat untuk indikator keandalan dan ketersediaan layanan jaringan komunikasi modern, yang diharapkan tersedia 24 jam sehari sepanjang tahun, sehingga dapat menggunakan aplikasi dan layanan yang berjalan di atasnya setiap saat. Untuk mendukung aspek keandalan dan ketersediaan jaringan, dibutuhkan protokol routing dan redundansi untuk menangani kegagalan pada suatu jaringan. Solusi untuk meningkatkan ketersediaan dan keandalan jaringan dengan menggunakan protokol First Hop Redundancy Protocol (FHRP) yang terdiri dari tiga metode, Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), dan Gateway Load Balancing Protocol (GLBP). Hasil pengujian yang dilakukan, selisih delay antara VRRP dan HSRP adalah 0.16ms, 0.18ms dengan GLBP dengan kombinasi routing EIGRP. Di routing OSPF, perbedaan delay VRRP dan HSRP adalah 0,22 ms 0,24 ms di GLBP. Pada parameter packet loss, pada saat rute jaringan utama terputus, terjadi peningkatan packet loss sebesar 1,01% pada VRRP, 3,05% pada HSRP yang dikombinasikan dengan routing EIGRP, dan 0,2% pada VRRP, 0,4% pada HSRP yang dikombinasikan dengan routing OSPF. Meskipun delay dan packet loss meningkat, hasil yang diperoleh dalam penelitian ini memenuhi standar yang ditetapkan oleh ITU-T. Pada parameter throughput, perbedaan antara VRRP dan HSRP adalah 0,305 bit/ms dan 1,225 bit/ms dalam GLBP. Pada saat yang sama, protokol FHRP yang dikombinasikan dengan routing OSPF tidak meningkatkan nilai throughput. Waktu konvergensi pada VRRP adalah 5,14 detik, HSRP 5,07 detik, dan GLBP 5,11 detik pada routing OSPF. Waktu konvergensi dalam routing EIGRP adalah 2,43 detik di VRRP, 2,71 detik di HSRP, dan 8,53 detik di GLBP. Parameter downtime di VRRP 12.6s, 17.1s di HSRP, dan 71.9s di GLBP dengan kombinasi routing EIGRP. Sedangkan pada OSPF routing 29.6s di VRRP, 23.6s di HSRP, dan 29.6s di GLBP

    Statistical Analysis of Unauthorized-Access Log Data and Its Interpretation

    Get PDF
    We have studied how we analyse unauthorized network access logs and our empirical studies have suggested that we could classify the logs into some typical patterns and tried to develop methodology, to reveal them with aggregated statistical methodologies including symbolic data analysis (SDA). Our motivation is to extract some specific patterns from the logs. Many applications have been already developed to detect anomalies from them, but few are mainly based on statistics. To improve their quality, a mathematical viewpoint is key since most unauthorized actions are based on automatic algorithms. Thus we could apply some statistical (and intensive) model to them. When we develop an intensive statistical analysis for this data, SDA, known as a typical aggregated data analysis method would be applicable. In the study, we discuss how we aggregate the original log data and derive a reasonable classification and interpretation through the analyses

    SIMULASI WIRELESS MESH NETWORK (WMN) UNTUK MENDUKUNG IMPLEMENTASI NEXT GENERATION NETWORK (NGN)

    Get PDF
    Wireless LAN application has been widely used today. One of the wireless topology that cheap but reliable is mesh topology, otherwise known as wireless mesh network (WMN). To support the development of Next Generation Network (NGN), research about wireless mesh network is needed before it is implemented further. This paper represents the preliminary findings of research on the implementation of the WMN for rural areas, especially in areas that will connect between madrasah, majlis ta’lim, pesantren, and others. This paper contains a simulation scenario to determine how the characteristics of wireless mesh networks. This is also done to determine the End-to-End delay, Packet Drop and throughput that occur in the routing process. Simulations conducted in the laboratory using four indoor access point (IAP): 1 as a server, and 3 as a workstation. Routing protocol used in the experiments is OLSR (Optimized Link State Routing). Network monitoring using SNMP and operated on a Linux OS. The simulation results showed that the total bytes for the application packet bigger than packet routing. But the number of routing packets is larger than the application package. Trace routes results showed that the inter-hop in the configuration of the simulation WMN is connected properly
    corecore