Volume 6 , Issue 1 , PP: 26-31, 2021 | Cite this article as | XML | Html | PDF | Full Length Article
O. Aguilar Dowins 1 * , Omar M. Cornelio 2
Doi: https://doi.org/10.54216/FPA.060101
At present, every industry or company that wishes to improve efficiency in carrying out its social role needs to use the technological tools at its disposal, an example of this is computer networks, which is the set of computers interconnected with each other and that have resources shared. This document describes the implementation of a wired network in the telecommunications company SERTOD. This company had a network with obsolete equipment, it also had areas where the product network did not reach the remodeling and expansion of the company. A new network was designed following a series of steps well defined by the bibliographies for the implementation of wired networks, A market study was carried out to analyze the costs of the equipment to be used and to choose carefully in terms of cost and quality. A proposal was obtained for the new network to be implemented in the SETOD company.
infrastructure , LAN network , SETOD , telecommunications , topology
[1] G. Junco Romero, and S. Rabelo Padua, "Network resources and their monitoring," Cuban Journal of Medical Informatics,vol. 10, no. 1, pp. 76-83, 2018.
[2] M. Gaviria Gutierrez, and JC Lara Urrego, "Design of a LAN network for the company HEAVENS FRUIT SAS," Universidad Cooperativa de Colombia, Faculty of Engineering, Engineering of ..., 2020.
[3] IV Pustokhina, "Blockchain technology in the international supply chains," International Journal of Wireless and Ad Hoc Communication,vol. 1, no. 1, 2020.
[4] O. Mar-Cornelio, I. Santana-Ching, and J. González-Gulín, "Remote Laboratory System for the practice of Control Engineering," Scientific magazine, no. 36, pp. 356-366, 2019.
[5] M. Ilayaraja, "Particle Swarm Optimization based Multihop Routing Techniques in Mobile ADHOC Networks," International Journal of Wireless and Ad Hoc Communication,vol. 1, no. 1, 2020.
[6] BB Fonseca, OM Cornelio, and IP Pupo, "Linguistic summarization of data in decision-making on performance evaluation," 2020 XLVI Latin American Computing Conference (CLEI), pp. 268-274, 2020.
[7] MP Gómez, "DESIGN AND IMPLEMENTATION OF A LAN NETWORK FOR THE SOFTEL COMPANY," UNESUM-Sciences. Multidisciplinary Scientific Journal. ISSN 2602-8166,vol. 5, no. 4, pp. 123-142, 2021.
[8] AMS Ramírez, and OM Cornelio, "METHODOLOGICAL PROPOSAL AND IMPLEMENTATION OF A LAN NETWORK FOR THE INSTITUTE OF SPORTS MEDICINE," UNESUM-Sciences. Multidisciplinary Scientific Journal. ISSN 2602-8166,vol. 5, no. 4, pp. 169-184, 2021.
[9] AH Mirza, and S. Cosan, "Computer network intrusion detection using sequential LSTM neural networks autoencoders." pp. 1-4.
[10] B. Mao, ZM Fadlullah, F. Tang, N. Kato, O. Akashi, T. Inoue, and K. Mizutani, “Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning, "IEEE Transactions on Computers,vol. 66, no. 11, pp. 1946-1960, 2017.
[eleven] DA Effendy, K. Kusrini, and S. Sudarmawan, "Classification of intrusion detection system (IDS) based on computer network." pp. 90-94.
[12] X. Qu, and Z. Wang, "Influence of Computer Network Technology on Traditional Ideological and Political Education in China and Its Countermeasures." p. 032128.
[13] Y. Shen, "The application of artificial intelligence in computer network technology in the era of big data." pp. 173-177.
[14] S. Sujalwo, "Manajemen Jaringan Komputer Dengan Menggunakan Mikrotik Router (Computer Network Management Used With Microtic Router)," Komuniti: Jurnal Komunikasi dan Teknologi Informasi,vol. 2, no. 2, pp. 32-43, 2017.
[15] R. Samrin, and D. Vasumathi, "Review on anomaly based network intrusion detection system." pp. 141-147.
[16] O. Brekhov, "Integrated Tolerant Distributed Computing Network." pp. 311-326.