MANAJEMEN JARINGAN KOMPUTER DENGAN MENGGUNAKAN MIKROTIK ROUTER(COMPUTER NETWORK MANAGEMENT USED WITH MICROTIC ROUTER)
dc.contributor.author | Sujalwo | |
dc.contributor.author | Handaga, Bana | |
dc.contributor.author | Supriyono, Heru | |
dc.date.accessioned | 2012-04-30T06:03:08Z | |
dc.date.available | 2012-04-30T06:03:08Z | |
dc.date.issued | 2011-01 | |
dc.identifier.citation | Arinanto, Kurniawan Dwi, 2002,Wardriving Serangan Terhadap Wireless LAN, Program Magister Teknik Elektro, ITB, Bandung.Kuntoro Priyambodo Tri, Heriadi Dodi, 2005, Jaringan Wi-fi, Yogyakarta : Penerbit Andi.Muhammad, Reza, 2003, 15 Jenis Serangan Cracker, Artikel Populer Ilmu Komputer, www.ilmukomputer.com (diakses Juni 2008).Mulyana, Eueung; Purbo, Onno W., 2000,”Firewall: Sekuriti Internet”, Computer Network Research Group, ITB, Bandung.Neuman, Clifford B, 1993, Proxy-Based Authorization and Accounting for Distributed Systems, Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, May, 1993.Purbo, Onno W, 2005. Buku pegangan internet wireless dan hotspot. Jakarta : PT. Elek Media KomputindoRachman Oscar, Yugianto Gin-gin, 2008, TCP/IP, Bandung :InfoermatikaRahardjo, Budi, 2002, Kemanan Sistem Informasi Berbasis Internet, PT. Insan Infonesia, Jakarta.Rpoix, 2003, Mikrotik OS untuk bandwidth, management, Artikel Populer Ilmu Komputer, www.ilmukomputer.com (diakses Juni 2008).Tittel, Ed. 2002. Schaum’s Outline: Computer Networking (Jaringan Komputer). Jakarta: Erlangga.Taufan Riza, 2001. Manajemen Jaringan TCP/IP. Jakarta : PT. Elek Media KomputindoWidiyanto Andra, 2007, Networking & Wireless, Semarang : NeomediaPerancangan Tools Berbasis Python Untuk Memantau Keaktifan Server | en_US |
dc.identifier.issn | 2087-085X | |
dc.identifier.uri | http://hdl.handle.net/11617/1197 | |
dc.description.abstract | This study starts from making observations or collecting data about the condition of computer networks at the Faculties in the distribution of bandwidth and autentication. At the testing stage, it uses a simulation with 3 users in infrastructure and ad-hoc. Hotspot user authentication used to restrict the number of users that use wireless facilities. Speed Internet access becomes faster with the fair distribution of bandwidth for users. Mikrotik is a reliable operating system, not only because safety data are difficult to penetrate, but also router can be used for offices, cafes etc. With the hotspot usage management, it will speed up users to conduct their activities with a large bandwidth which is large enough. | en_US |
dc.subject | Network computer | en_US |
dc.subject | management bandwidth | en_US |
dc.subject | routing | en_US |
dc.title | MANAJEMEN JARINGAN KOMPUTER DENGAN MENGGUNAKAN MIKROTIK ROUTER(COMPUTER NETWORK MANAGEMENT USED WITH MICROTIC ROUTER) | en_US |
dc.type | Article | en_US |