Show simple item record

dc.contributor.authorSujalwo
dc.contributor.authorHandaga, Bana
dc.contributor.authorSupriyono, Heru
dc.date.accessioned2012-04-30T06:03:08Z
dc.date.available2012-04-30T06:03:08Z
dc.date.issued2011-01
dc.identifier.citationArinanto, Kurniawan Dwi, 2002,Wardriving Serangan Terhadap Wireless LAN, Program Magister Teknik Elektro, ITB, Bandung.Kuntoro Priyambodo Tri, Heriadi Dodi, 2005, Jaringan Wi-fi, Yogyakarta : Penerbit Andi.Muhammad, Reza, 2003, 15 Jenis Serangan Cracker, Artikel Populer Ilmu Komputer, www.ilmukomputer.com (diakses Juni 2008).Mulyana, Eueung; Purbo, Onno W., 2000,”Firewall: Sekuriti Internet”, Computer Network Research Group, ITB, Bandung.Neuman, Clifford B, 1993, Proxy-Based Authorization and Accounting for Distributed Systems, Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, May, 1993.Purbo, Onno W, 2005. Buku pegangan internet wireless dan hotspot. Jakarta : PT. Elek Media KomputindoRachman Oscar, Yugianto Gin-gin, 2008, TCP/IP, Bandung :InfoermatikaRahardjo, Budi, 2002, Kemanan Sistem Informasi Berbasis Internet, PT. Insan Infonesia, Jakarta.Rpoix, 2003, Mikrotik OS untuk bandwidth, management, Artikel Populer Ilmu Komputer, www.ilmukomputer.com (diakses Juni 2008).Tittel, Ed. 2002. Schaum’s Outline: Computer Networking (Jaringan Komputer). Jakarta: Erlangga.Taufan Riza, 2001. Manajemen Jaringan TCP/IP. Jakarta : PT. Elek Media KomputindoWidiyanto Andra, 2007, Networking & Wireless, Semarang : NeomediaPerancangan Tools Berbasis Python Untuk Memantau Keaktifan Serveren_US
dc.identifier.issn2087-085X
dc.identifier.urihttp://hdl.handle.net/11617/1197
dc.description.abstractThis study starts from making observations or collecting data about the condition of computer networks at the Faculties in the distribution of bandwidth and autentication. At the testing stage, it uses a simulation with 3 users in infrastructure and ad-hoc. Hotspot user authentication used to restrict the number of users that use wireless facilities. Speed Internet access becomes faster with the fair distribution of bandwidth for users. Mikrotik is a reliable operating system, not only because safety data are difficult to penetrate, but also router can be used for offices, cafes etc. With the hotspot usage management, it will speed up users to conduct their activities with a large bandwidth which is large enough.en_US
dc.subjectNetwork computeren_US
dc.subjectmanagement bandwidthen_US
dc.subjectroutingen_US
dc.titleMANAJEMEN JARINGAN KOMPUTER DENGAN MENGGUNAKAN MIKROTIK ROUTER(COMPUTER NETWORK MANAGEMENT USED WITH MICROTIC ROUTER)en_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record