Computer Network Security

On Wireless network security has become something that are inherent in such settings or network settings, this is one of them due to the methods used to communicate with other equipment with equipment using broadcast methods. So it becomes a very important thing for you is to use the model of the wireless network with WiFi technology mainly to find out some of the security model is usually provided by the Access Point (AP) to secure your WiFi network.
Network security includes a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. If observed regarding the security of the computer network security can be viewed in terms of its form is as follows:

Security Hardware
Hardware security-related hardware used in computer networks. Security hardware is often overlooked but is the main thing to keep in order to remain stable on the network. In security hardware, servers and data storage should be a major concern. Physical access to the servers and critical data should be limited as much as possible.
It would be easier for a thief to take a data disk or tape backup of the server and the storage of data rather than having to tap into software from the network. Garbage should also be considered because many hackers who go dumpster company to seek information on computer networks. One way of securing the hardware was put in a room that has good security. Hole airways should be addressed because it can be the entry into the channel through the server room. Network cables must be protected so that it is not easy for a hacker to cut the wires and then connect to the computer.

Access to a computer can also be limited by setting the security at the BIOS level that would prevent access to the computer, format the hard drive, and change the contents of the Main Boot Record (where information partition) hard disk. The use of smart cards and hardware autentifikasi seperti finger print detector is also worth considering to improve security.

Security Software

As the name implies, it is to be secured software. The software that we mean here can be the operating system, application systems, data and information stored in the computer network, especially on the server. For example, if the server is only serving in the router, the software does not need a web server and FTP server installed. Limit the software that is installed will reduce conflicts between software and restrict access, for example, if the router is also fitted with an FTP server, then people from outside the anonymous logins may be able to access the router.
Software to be installed should also have good security arrangements. Ability encryption (scrambling the data) is a specification that must be owned by the software to be used, especially for encryption 128 bit encryption with 56-bit system has to be solved easily at this time. Some software has security holes is the mail server sendmail and telnet applications. Sendmail has a disadvantage that can ditelnet without logging in port (25) and the access can create an email with a fake address. Telnet application has deficiencies transmit data without encrypting (scrambling the data) so that when tapped can be very easy to get the data.
The second thing to note is the password. Should set the minimum password length fatherly complicate password hacker suss. Password will also be better if it was not made or angak letters only, lower case or all capital, but should be combined. Encryption can increase network security by way of randomizing passwords and usernames, both in the host and on the record at the time it was passed username and password to login to the network while the other computers.
Routing not apart from security threats. Disorder that often arises is the provision of false information about the routing path (source routing in IP header). Giving false information is usually intended for datagrams can be tapped. To prevent such a thing, the router must be set to not allow source routing and routing protocols included in some sort of authentication or a password that only the routing information obtained from a reliable router.

Arief Wahyu W – 125150305111001



Computer Network Topology

Defines a map of the network topology. Network topology can be broadly divided into two kinds of physical topology and logical topology. Discussing the various topologies, but in this thesis the author initiative to design a network using a star topology.
physical topology
Physical topology defines how the composition of the laying of the nodes on the network. There are several types of physical topologies, among others:

 Bus Topology
Is a network architecture in which a set of clients connected to the main cable (baonckbe) is called buses. Bus network is the simplest way to connect multiple clients, but the most common problem encountered is when two client will send data at the same time on the same bus.
Bus Topology Advantages
1. Save cables.
2. Simple wiring layouts.
3. Network development or adding new workstations can be done easily without disturbing other workstations.
Bus Topology loss
1. Fault detection and isolation is very small.
2. Density of traffic on the main line.
3. The drawback of this topology is that if there is interference in the cable along the center of the whole network will be impaired.
4. Required repeater for long distance.

 Star Topology
Is one of the most commonly used topologies. Star network consists of a main switch serving as a router that transmits data.

Star Topology Advantages
1. Most flexible.
2. Installation / change station is very easy and does not interfere with other parts of the network.
3. Centralized control.
4. Ease of detection and fault isolation / damage tissue management.
Shortage of Star Topology
1. Boros cable.
2. Need special handling.
3. Centralized control (HUB) so the critical element.

 Ring Topology
Is a network topology in which each node is connected to two other nodes, so it will form a ring. Ring topology is less efficient when compared to the star topology as the topology of data to go through a lot of points before the data reaches the destination.
Ring Topology Advantages
• Not the collision or the collision of data transmission such as the bus topology, since only one node can transmit data at a time, the low level of network complexity (simple), also if there is a disruption or damage to the central flow of traffic can be passed in the other direction in systems.
Ring Topology shortage
• In each node in the network will always follow and manage the information that is passed in the network, so that if there is interference in a node then the entire network will be disrupted.

 Mesh Topology
Mesh topology is a way to download the route data, voice and instructions between nodes. Enabling continuous connection and reconfigure around broken or blocked paths by hopping from one node to another node until it reaches the destination. Mesh topology is a subclass of mobile ad hoc networking (MANET).
Mesh Topology Advantages
• If there is a broken link then a statin can find another link.
Disadvantages Mesh Topology
• Not practical for wearing a lot of wires.
• The cost is high enough to be implemented.

• If there is a broken link then a statin can find another link.
 Disadvantages Mesh Topology
• Not practical for wearing a lot of wires.
• The cost is high enough to be implemented.   


Arief Wahyu W – 125150305111001


Network Development

Future NetworkFuture development of the network will not be released to the Internet, because the Internet extensive global network. Below I will resume what technologies will be developed and will be popular in the future, there is in some of the countries that already use the technology but has not been popular in other countries. Continue reading

10 Tips Wireless Security

10 Tips Wireless Securitywireless network is fairly easy to set up, and also feels very comfortable, especially if we want to able to walk way around the house or office with a portable computer but it can still access the internet network. But, because wireless using waves, it will be easier to hack than using cable connection. There are some tips here to secure the wireless network. Continue reading



Computer network is a system that consist of computer and another network device which work together to achieve a common goal. The purpose of network computer is:

  • Sharing of resources: example: sharing printer, CPU, Memory, etc.
  • Communication: example: e-mail, chatting
  • Information access: example: web browsing

In order to achieve a common goal, each part of network ask and give service. The receiver is called client and the service provider called server. This architecture is called client-server system, and it’s used in almost whole network computer application. Continue reading

IP and Subnetmask

IP and SubnetmaskAs you know, Fajar has been post about IPv6 vs IPv4 and now i’ll discuss more detail about IP espescially about IPv4.

IP stand for Internet Protocol. IP is something we can see as address of device like computer, switch, router, etc. IP is used for communication beetwen 2 device or more in network or if the device were handphone, IP would be a phone number.

IP addres is consist of 4 block binary number and each block can be filled from 0 to 255, for example:

IP always have a couple called subnetmask. Subnetmask also have 4 block binary number like IP, but subnetmask have a diffrent function. Continue reading