8 research outputs found

    Pengurusan Rangkaian : Analisis Tahap Kesihatan Rangkaian Komputer UUM Berasaskan Analisis Paket

    Get PDF
    Network existed long before computers became a reality. In 1846 Samuel F.B. Morse invented the digital code, in 1876 Alexander Graham Bell registered the telephone patent and in 1878 the first voice network was established. In the nineteen seventies IBM introduced the computer network which was based on the mainframe host known as SNA while Zerox introduced the concept of Ethernet. The utilization of computer network has increasingly become a necessity in line with the development of internet technology. Today every computer needs to be connected to the computer network system . With this network, varieties of information and sources can be shared. For certain sectors such as industrial, banking, business, telecommunication and security, computer network is the catalyst to their activities. If the network system fails to function, their operations will be crippled. Thus, efficient network management needs to be introduced so that network configuration can be executed accurately and management of defects can be carried out effectively in order that the network performance can be maintained at a satisfactory level. One of the methods to manage the network is to analyze the network system based on the packet analysis or protocol analysis. Through this method or protocol, several phenomena can be identified. This study aims to analyze the Northern University of Malaysia Computer Network System(1SLb.N). The objective of the study is to provide packet capture through ISLAN computer network in order to identify packet types based on delivery protocol, types of packet such as size and format, packet which cause congestion in the network, methods of packet delivery, packet which are generated and passed through the network at certain times such as low, moderate and peak utilization periods. It also aims to identify the packet generated by the system itself for the purpose of activating the system by certain protocol, surveying the packet route and measuring the utilization of the bandwidth. The analysis uses Sniffer Pro software for capture analysis. The study reveals that there are differences in the number of packet among certain utilization periods, work days and holidays, student and staff VLAN segments. Nevertheless there are no obvious differences among the various locations. A large number of packet are sent through broadcast from other segments and distributed to the whole network which involved network bandwidth. However, the bandwidth used by the system is very low. Based on the packet analysis, description of the network fitness level is done and the information obtained will help identify ways to solve the related problems

    Masa tindakbalas rangkaian

    Get PDF
    Rangkaian komunikasi telah wujud lama dulu.Alexander Graham Bell telah mendaftar paten bagi telefon pada tahun 1876 dan pada tahun 1878 rangkaian suara pertama telah dibina. Rangkaian suara (telefon) dan rangkaian data (komputer) pada suatu masa dulu adalah terpisah mengikut peralatan dan fungsinya tetapi kini sukar dipisahkan apabila gabungan teknologi digital berlaku.Rangkaian komunikasi kini, yang merupakan tulang belakang kepada teknologi Internet terus berkembang bagi menampung keperluan yang terus meningkat. Pelbagai aplikasi samada bagi sistem berkomputer setempat atau aplikasi berasaskan web terus berkembang.Permintaan pengguna terhadap Internet sangat besar seperti aplikasi e-mel, e-dagang dan capaian maklumat.Aplikasi Internet sosial seperti aplikasi YouTube, Friendster dan kini Facebook meliputi segenap pelosok negara di dunia. Teknologi komunikasi bagi rangkaian setempat (LAN) terus dipertingkatkan daripada thin-ethernet kepada fast-ethernet kemudian kini gigabit-etehrnet.Begitu juga bagi MAN atau WAN, jalur-lebar berkelajuan tinggi (high-speed broadband) telah diperkenalkan.Walaupun teknologi komunikasi semakin pantas telah digunakan tetapi permintaan kepada kelajuan yang lebih baik masih terus wujud.Isu lambat masih lagi menjadi kekangan kepada penggunaan yang berkesan. Bagi tujuan menghuraikan persoalan tentang isu komunikasi yang lambat ini maka kajian ini dijalankan.Dengan cara kajian deskriptif kajian ini mencuba mendapatkan data masa tindakbalas bagi rangkaian.Data diperolehi daripada rangkaian setempat dan juga data melalui rangkaian awam. Beberapa alatan kajian (tools) digunakan bagi mendapatkan data masa tindakbalas iaitu CMIP-ping, Ping-Plotter, Qcheck dan EndPoint, dan Trace-route-ping.Alatan ini dipilih bagi mendapatkan data yang melalui rangkaian data tanpa mengambil kira aplikasi yang digunakan.Data dikumpul melaui alatan berasaskan alamat IP yang dapat menyokong kepada persoalan ramai pengguna yang menggunakan protocol IP seperti Internet.CMIP-ping misalnya adalah merupakan protocol yang mandatori bagi setiap pelayan melaksanakan tindakbalas apabila terdapat permintaan terhadapnya berdasarkan RFC1122.Oleh itu ianya tidak terpengaruh dengan format aplikasi tertentu bagi sesetengah aplikasi.Data yang direkodkan bagi kajian ini berdasarkan kepada jenis komputer yang digunakan bagi mendapatkan data, lokasi komputer dan jenis alatan.Ini adalah bertujuan agar data yang diperolehi dapat dianalisis dan perbandingan yang relevan dapat dibuat.Data yang diperolehi telah dianalisis agar ianya dapat memberikan nilai yang bermakna.Berdasarkan daripada kajian ini beberapa perbincangan dan cadangan dikemukakan agar tahap prestasi sesuatu rangkaian komunikasi dapat dinilai dan penambahbaikan dapat dilaksanakan

    The evaluation performance of letter-based technique on text steganography system

    Get PDF
    Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation

    Performance analysis on secured data method in natural language steganography

    Get PDF
    The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific

    Knowledge transfer of the wireless healthcare application in rural community: A case study in Baling, Kedah

    Get PDF
    Healthcare system in rural area is equally as important as who live in the urban or modern city counterparts.Due to geographically difficulty to access by the modern transportation, wireless communication is one of the possible approaches to reach these areas.On the key aspect is the infrastructure reliability to securing knowledge transfer amongst knowledge of the rural society.This study is to determine the readiness of the rural communities in accepting wireless healthcare applications for the effective transfer of acquired knowledge from healthcare expertise to the rural communities.The instruments were developed and survey was conducted in rural area of Baling, Kedah. 435 questionnaires have been distributed and only 245 are qualified to be analyzed using quantitative analysis.The result shows that the rural communities are appreciate and long-wait with this new type of technology in helping them to improve the healthcare rural system even though the wireless infrastructure is hindering

    Design of a cell selection mechanism to mitigate interference for cell-edge macro users in femto-macro heterogeneous network

    Get PDF
    The Femto-Macro heterogeneous network is a promising solution to improve the network capacity and coverage in mobile network. However interference may rise due to femtocell deployment nearby to macro user equipment (MUE) within macrocell network coverage. Femtocell offers main priority in resource allocation to its subscribed femto user equipment (FUE) rather than unsubscribed MUE. MUEs will suffer severe interference when they are placed near or within the femtocell area range especially at the cell edge. This phenomenon occurs due to the distance is far from its serving macro base station (MBS) to receive good signal strength. This paper presents a design of cell selection scheme for cell-edge MUE to select an optimal femto base station (FBS) as its primary serving cell in physical resource block allocation. In this study, the proposed cell selection consists of four main elements: measuring the closest FBS distance, Signal to Interference-plus-Noise-Ratio (SINR), physical resource block (PRB) availability and node density level for the selected base station. The main goal is to ensure cell-edge MUE has priority fairly with FUE in physical resource block allocation per user bandwidth demand to mitigate interference. Hence, the cell-edge MUE has good experienced on receiving an adequate user data rate to improve higher network throughput

    A test model for telecentre value creation

    Get PDF
    This paper presents results of a research to create a model for telecentre value creation. The aim is to study the effect of diffusion and adoption of information and communication technology through telecentre implementation. The National Strategic Framework for Bridging Digital Divide states that the socio-economic value could not achieve its optimal level when the focus is on diffusion.Hence this study attempts to determine the effect of diffusion and adoption on value creation individually and combined.A conceptual model was developed based on review of related literatures and then operationalized into research variables that form the questionnaire.A survey was administered and descriptive and multivariate analyses were conducted to examine the model fit and verify the model for telecentre value creation. Results of the study found compelling strong relationships on both diffusion and adoption with value creation with adoption have stronger effect on value creation as compared to diffusion

    Performance Analysis on Secured Data Method in Natural Language Steganography

    Full text link
    The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect. The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific
    corecore