2022
DOI: 10.29100/jipi.v7i4.3192
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Wireless and Cable Network Quality-of-Service Performance at Telkom University Landmark Tower Using Network Development Life Cycle (Ndlc) Method

Abstract: There are some infrastructure problems in the Telkom University Landmark Tower building, which still lacks human resources to help troubleshoot the network when an interference happens. The second problem is that the TULT has a closed concept building, which will be an issue for the network stability. The last problem is the lack of information transparency when handling a network problem. In this research, the author uses the NDLC (Network Development Life Cycle) method as a step to solve the problem. The seq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
2
0
2
Order By: Relevance
“…Based on the experiment results and discussions regarding the analysis of system security using the HTTP protocol against packet sniffing attacks, the following conclusions can be drawn: [1] The HTTP protocol becomes highly dangerous when used and accessed in a public manner to transmit or input sensitive and confidential data and information such as usernames and passwords. [2]Ettercap and Wireshark applications enable the interception of sensitive and essential data and communication by capturing data through the Wireshark and Ettercap applications. Sniffing actions can lead to data leakage that is difficult to prevent.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the experiment results and discussions regarding the analysis of system security using the HTTP protocol against packet sniffing attacks, the following conclusions can be drawn: [1] The HTTP protocol becomes highly dangerous when used and accessed in a public manner to transmit or input sensitive and confidential data and information such as usernames and passwords. [2]Ettercap and Wireshark applications enable the interception of sensitive and essential data and communication by capturing data through the Wireshark and Ettercap applications. Sniffing actions can lead to data leakage that is difficult to prevent.…”
Section: Discussionmentioning
confidence: 99%
“…As internet and technology use continues to grow, it hurts cybercrime. Internet access becomes one of the threats to system and network crimes by disrupting network traffic, leading to information and data loss [2]. Various protocols commonly used in networks and the Internet include TCP/IP, HTTP, SSL, HTTPS, Ethernet, FTP, RTP, DNS, IMAP, SSH, ICMP, and UDP [3].…”
Section: Introductionmentioning
confidence: 99%
“…Terakhir, pada tahap Testing, penelitian memfokuskan pada pengujian Quality of Service (QoS) dari dua mode, yaitu Infrastruktur-Wireless Distribution System (I-WDS) dan Adhoc-Wireless Distribution System (A-WDS). Pengujian ini bertujuan untuk mengevaluasi efisiensi dan kualitas layanan dari masing-masing mode, memberikan pemahaman mendalam terhadap performa jaringan nirkabel yang dikembangkan [11].…”
Section: Metode Penelitianunclassified
“…Tampilan visualisasi berbagai mikrotik routerboard dapat dilihat pada Gambar 1 dibawah ini. NDLC adalah metode yang digunakan dalam mengembangkan atau merancang jaringan infrastruktur yang memungkinkan terjadinya pemantauan jaringan untuk mengetahui statistic dan kinerja jaringan (Naim, et al 2022). Hasil analisis kinerja tersebut dijadikan sebagai pertimbangan dalam perancangan desain jaringan, baik desain jaringan yang bersifat fisik atau jaringan logis (Isnanta, et.al.…”
Section: Mikrotikunclassified