Abstract
There is no doubt that technological advances, Many can be done easily without having to go through a long process. For example, by utilizing a network connection in various ways. Like looking to collect and get data whether it's using a LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). This application mentions that every user who wants to use the Internet must register with the Administrator by using the Mac Address on the device. So, not too many devices are connected to the network so that it makes an Internet network.
Cite
CITATION STYLE
Gea, A., Purba, M. J., Putra, A. A., Jamaluddin, J., & Siringoringo, R. (2022). IMPLEMENTASI METODE ACCESS CONTROL LIST UNTUK MEMONITORING AKSES JARINGAN MENGGUNAKAN SQUID PROXY. METHOMIKA Jurnal Manajemen Informatika Dan Komputerisasi Akuntansi, 6(1), 79–84. https://doi.org/10.46880/jmika.vol6no1.pp79-84
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.