Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
"This research describes the improvement of computer network performance with bandwidth management in Kemurnian II Senior High School. The main issue of this research is the absence of bandwidth division on computer, which makes user who is downloading data, the provided bandwidth will be absorbed by the user. It leads other users do not get the bandwidth. Besides that, it has been done IP address division on each room, such as computer, teacher and administration room for supporting learning process in Kemurnian II Senior High School, so wireless network is needed. The method is location observation and interview with related parties in Kemurnian II Senior High School, the network analysis has run and designed a new topology network including the wireless network along with its configuration and separation bandwidth on microtic router and its limitation. The result is network traffic on Kemurnian II Senior High School can be shared evenly to each user; IX and IIX traffic are separated, which improve the speed on network access at school and the implementation of wireless network.
"
621 COMMIT 6 (1-2) 2012
Artikel Jurnal  Universitas Indonesia Library
cover
Singh, Madhusudan
"This book highlights routing protocols for wireless mesh networks (WMNs; IEEE 802.11s). It provides an overview of the wireless networks (history, MANET, family of IEEE 802.11, WMNS, etc.) and routing protocols, such as AODV, DSR, OLSR, etc, and also highlights two resolutions of routing protocols with respect to end-to-end delay, packet delivery ratio and routing overhead in WMNs. Wireless mesh networks have become a hot topic for researcher into the deployment of wireless networks, and they represents the connectivity of mesh networking in IEEE 802.11 amendment in static and ad-hoc networks. Moreover, WMNs have numerous attractive features, such as highly reliable connectivity, easy deployment, self-healing, self-configuring, and flexible network expansion. The book describes two routing mechanisms: novel cluster-based routing protocols (NCBRP), and decentralized hybrid wireless mesh protocol (DHWMP)."
Singapore: Springer Nature Singapore, 2019
e20518880
eBooks  Universitas Indonesia Library
cover
Yoga Suharya Dipura
"ABSTRAK
Internet of Things menjadi sebuah bidang penemuan tersendiri semenjak berkembangnya teknologi internet dan media komunikasi lainnya. Semakin berkembang keperluan manusia tentang teknologi, maka semakin banyak penemuan yang hadir. Internet of Things salah satu hasil pemikiran para peneliti dan penemu yang mengoptimalisasi beberapa alat seperti identifikasi frekuensi radio, jaringan sensor nirkabel, rumah pintar, perangkat nirkabel pintar serta objek pintar lain yang memungkinkan manusia mudah berinteraksi dengan semua perangkat yang terhubung dengan jaringan internet. Potensi ancaman terhadap privasi pengguna dengan lingkungan Internet of Things menjadi sebuah perhatian yang harus diperhatikan dan diberikan perlindungan mengingat data atau informasi tersebut bisa disalahgunakan untuk kepentingan yang tidak dapat dipertangungjawabkan baik itu dari penyedia perangkat maupun pengguna lainnya. Tulisan ini menjelaskan dan melaporkan secara sistematis tinjauan mengenai teknologi dan metode yang digunakan pelaku usaha maupun pemerintah dalam melindungi privasi pada Internet of Things serta menganalisis solusi yang digunakan.

ABSTRACT
Internet of Thing has become a separated field of research since the development of internet technology and other communication media. The more growing human needs on technology, the more research will be available. The Internet of Things is one of the thoughts of researchers who have optimized several tools, such as radio frequency identification, wireless sensor network, smart home and other smart objects that allow people to easily interact with all the equipment connected to an internet network. Potential threats to the privacy of users with the Internet of Things environment have become a concern that should be considered and given protection as the data or such information may be used for unaccountable purposes both from the device providers and other users. This paper explains and systematically reports the review of the literature on technologies and methods used by businesses and governments to protect the privacy of the Internet of Things and analyze the solutions used."
Depok: Fakultas Hukum Universitas Indonesia, 2020
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library