Figure 2 - uploaded by Mohd Aizaini Maarof
Content may be subject to copyright.
Ethernet communications through Hub.

Ethernet communications through Hub.

Source publication
Article
Full-text available
ASTRACT Ethernet has survived for several decades as essential media for LAN technology because of its relative inexpensive and reasonably fast. Shared Ethernet uses broadcast technology where CSMA/CD acts as medium access control. CSMA/CD deploys principle of media sharing and the drawback is promiscuous mode, whereby network interface device coul...

Similar publications

Conference Paper
Full-text available
Network security has become more important at present, due to an increase of cyber threats. One of the methods to protect our local area network from cyberattacks is a network monitoring system. It can capture traffic flowing in a network. However, the analysis of data from such network monitoring system is challenging, because it generates a large...
Conference Paper
Full-text available
This paper proposes an embedded router solution with packet filtering, to enhance the security of local area networks, prevent possible attacks, control the traffic of each host, and at the same time cut down the costs. Iptables over Linux is used for packet filtering, which can be controlled remotely using the web interface, while FPGA is used to...
Article
Full-text available
Background. Modern firewall systems are compared to classical concepts. The filtering rules are analyzed on the examples of the leading solutions (presented by Gartner Inc.). The collaborative intrusion detection systems and networks as well as the threats based on the insider attacks on CIDN are examined. A common CIDN functionality catalogue is d...
Article
Full-text available
Network security method is generally avoiding the losing data of the network infrastructure and, by increase protection of the information. The larger public network, the LAN network environment of the user is very vulnerable to DOS, phishing and other hacking attacks that can be devastating. In this paper, we examine the issues of wireless securit...
Article
Full-text available
The development of Information and Communication Technology (ICT) to access and provide information quickly and accurately becomes very important for an organization (commercial, tertiary, government, or individual). With the rapid development of ICT, it is necessary to consider the dangers and disadvantages of misuse in local network services or i...