scholarly journals Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification

Author(s):  
Bima Putra Winasis ◽  
Bambang Sugiantoro

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.

2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


2020 ◽  
Vol 2 (1) ◽  
pp. 25-32
Author(s):  
Jeckson Sidabutar

The development of Information and Communication Technology (ICT) to access and provide information quickly and accurately becomes very important for an organization (commercial, tertiary, government, or individual). With the rapid development of ICT, it is necessary to consider the dangers and disadvantages of misuse in local network services or in internet-based applications. Campus LAN (Local Area Network) architecture was chosen as the standard used in computer network design. The network architecture approach in this study is a enterprise architecture approach that is used for organizational logic and planning throughout the organization and aims to determine how information technology will support business processes. This method begins by identifying the infrastructure and network security needs, as well as how the information technology system supports the process of activities for all parts of education, administration and other services.


2021 ◽  
Vol 7 (1) ◽  
pp. 55-63
Author(s):  
Yayan Hendrian ◽  
Dalhar Dalhar

PT. Patrakom as a company engaged in telecommunications, has many customers in the remote areas across Indonesia. Use satellite transmission media, data can be sent and from various cities in Indonesia. There are many customers in a location that is quite difficult to reach. One that is difficult to reach customers and need special monitoring system, namely Drilling PT. PHE ONWJ (Pertamina Hulu Energi Offshore North West Java) which is located in the Java Sea. Customer's computer network monitoring system PT. PHE ONWJ At PT.Patrakom currently still using PRTG Network Monitoring (network monitoring application) which only Displays graphs of bandwidth usage by user. Thus resulting in a notice to the engineer during a network interruption or VSAT link down time can not be disclosed in a fast time. Engineer and the NCC (Network Central Controler) must check the PRTG to detect network intrusions. The absence of notice to the engineer automatically lead to treatment interruption takes longer. Use network monitoring system based on SMS (Short Message Service) enables the earliest possible notification to the engineer when the network has a problem, so the engineer will be able to directly perform interference checking and will be quickly resolved. With the monitoring sisitem like this will certainly increase customer satisfaction with the services provided by PT.Patrakom


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2013 ◽  
Vol 330 ◽  
pp. 561-564 ◽  
Author(s):  
Ming Li ◽  
Chun Ping Wang ◽  
Zhi Qiang Wang

In order to meet the real-time demands of some equipment networked test, the time synchronization techniques of ATS based traditional instrument buses are compared with the techniques of LXI ATS. Accordingly,the necessity of LXI ATS time synchronization technique study is put forward. The sorts of time synchronization techniques based on Local Area Network are analyzed. In addition, some methods which could improve the level of LXI data real-time communications are presented. Afterwards, technique realizations of PTP are studied in detail. Local Area Network techniques and IEEE 1588 Precise Time Protocol are adopted in the LXI Automatic Test System which designed in the paper, and the level of time synchronization precision in the system is improved.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2013 ◽  
Vol 468 ◽  
pp. 141-144
Author(s):  
Su Hua Chen ◽  
Yong Guang Liu ◽  
Xu Fang

Smart home system mainly consists of home networking, wireless local area network and external network, and with the advantages of low cost and high reliability, Zigbee wireless technology is the right choice for smart home system and the main part of home networking. The design of smart home system based on Zigbee is proposed, the Zigbeethe design process of the systemintelligent socket and data communication rule are elaborated. The system has been applied in smart community of Shaoxing Electric Power Bureau, which has good performances, high availability and reliability, better market prospects.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


2012 ◽  
Vol 241-244 ◽  
pp. 2299-2302
Author(s):  
Lian Feng Zhao

VLAN technology refers to the virtual local area network technology, which is classifyd into several network segments in logic through the internal devices of existing LAN, rather than physical location, so as to realize a computer network technology of virtual working group. This paper analyzes and studies on the generation, characteristics, and communication method of VLAN technology, as well as its actual application and setting.


Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.


Sign in / Sign up

Export Citation Format

Share Document