A Mobile-Based Network Tools Information System to Enhanced Connectivity and Security
DOI:
https://doi.org/10.51519/journalisi.v6i3.787Keywords:
network management, mobile application, troubleshooting, system design, efficiencyAbstract
This paper addresses the common challenges faced by network administrators in managing and troubleshooting network issues. Traditional desktop-based network management tools often restrict mobility and responsiveness, hindering the ability to address network problems promptly. To address these limitations, this study presents the development of a mobile-based network tools information system. The proposed solution integrates various network management functionalities into a mobile application, enabling administrators to monitor, diagnose, and resolve network issues remotely. Employing a design and implementation approach, the research includes user requirements analysis, system design, and rigorous testing. Results show significant improvements in response times and diagnostic accuracy. User feedback highlights high satisfaction with the system's functionality and ease of use. Overall, the mobile-based network tools information system offers a versatile and effective solution for network management, enhancing operational efficiency and responsiveness in diverse network environments.
Downloads
References
S. Domingo, N. Guererro, and A. Acoba, “Real-time Remote Monitoring and Security System for a Local Area Network Environment,” Int. J. Inf. Commun. Technol. Educ., vol. 1, no. 1, pp. 1–22, 2021, doi: 10.53378/346472.
A. Mardiyono, W. Sholihah, and F. Hakim, “Mobile-based Network Monitoring System Using Zabbix and Telegram,” in 2020 3rd Int. Conf. Comput. Informatics Eng. (IC2IE), Sep. 01, 2020.
H. Wu, L. Qiao, S. Chen, W. Liu, and F. Li, “Research on mobile application support system based on internal and external network,” MATEC Web Conf., vol. 272, p. 01052, 2019, doi: 10.1051/matecconf/201927201052.
V. Tong, H. A. Tran, S. Souihi, and A. Mellouk, “Network troubleshooting: Survey, Taxonomy and Challenges,” in 2018 Int. Conf. Smart Commun. Netw. Technol. (SaCoNeT), Oct. 2018, doi: 10.1109/saconet.2018.8585610.
X. Wenchao and Y. Lijuan, “Strengthen the Application Research of Computer Network Management Technology Innovation,” J. Phys. Conf. Ser., vol. 1744, no. 4, pp. 042046–042046, Feb. 2021, doi: 10.1088/1742-6596/1744/4/042046.
C. Vieira Junior and M. L. Anido, "The architecture of a novel tool for network management using GSM/GPRS mobile devices," in The First IEEE Consum. Commun. Netw. Conf., 2004. CCNC 2004., Las Vegas, NV, USA, 2004, pp. 539-544, doi: 10.1109/CCNC.2004.1286919.
W. Cahyono, W. H. Kusuma Atmaja, and A. Palupi Karyuniati, "Digitalization Solution on Customer Services to Leverage the Ease of Getting Electricity," in Int. Conf. Technol. Policies Electr. Power Energy, Yogyakarta, Indonesia, 2019, pp. 1-6, doi: 10.1109/IEEECONF48524.2019.9102543.
A. Puspitasari, H. Hairistryan, and R. Nasution, “Implementasi Hot Standby Router Protocol (HSRP) Pada PT Indonesia Power Jakarta Pusat,” JIKA (J. Inform.), vol. 4, no. 2, p. 55, May 2020, doi: 10.31000/jika.v4i2.2611.
Y. Antoni and M. Asvial, "Strategy of National Fiber Optic Backbone Network Utilization Enhancement in Rural Area of Indonesia," in IEEE Int. Conf. Innovative Res. Dev. (ICIRD), Jakarta, Indonesia, 2019, pp. 1-8, doi: 10.1109/ICIRD47319.2019.9074750.
M. Chen and N. Yang, "Design and Implementation of a Business Management Information System Under Improved Neural Network Algorithm," in Int. Conf. Distrib. Comput. Optim. Techn. (ICDCOT), Bengaluru, India, 2024, pp. 1-5, doi: 10.1109/ICDCOT61034.2024.10516249.
I. Vingestin, T. U. Kalsum, and Y. Mardiana, “The Design of Network Monitoring System Using SNMP Protocol With Telegram Notification,” J. Media Comput. Sci., vol. 2, no. 1, pp. 93–100, Jan. 2023, doi: 10.37676/jmcs.v2i1.3441.
N. R. Fachrurrozi, A. A. Wirabudi, and S. A. Rozano, “Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification,” SINERGI, vol. 27, no. 1, pp. 111–122, Feb. 2023, doi: 10.22441/sinergi.2023.1.013.
Y. Liu and J. Lan, “An Optimization Model of an Intelligent Monitoring Network Security System,” Jul. 2023, doi: 10.1109/aiars59518.2023.00061.
C. Yang, Y. Tan, J. Zhang, X. Chen, S. Li, and P. Li, “Information System Information Security Hidden Danger Monitoring Tool,” Apr. 2023, doi: 10.1109/pandafpe57779.2023.10140388.
F. Shu, X. Ma, Z. Tian, Y. Yang, and W. Liu, "Research on construction technology of network security shooting range for power monitoring system," in 2021 IEEE 2nd Int. Conf. Inf. Technol. Big Data Artif. Intell. (ICIBA), pp. 754-757, 2021.
M. Klügel et al., "Joint Cross-Layer Optimization in Real-Time Networked Control Systems," in IEEE Trans. Control Netw. Syst., vol. 7, no. 4, pp. 1903-1915, Dec. 2020, doi: 10.1109/TCNS.2020.3011847.
P. Leonardo and J. Wiratama, “Empowering Efficiency: A Web-Based Inventory and Sales Information System for Drinking Water Distributors through Rapid Application Development,” J. Inf. Syst. Inform., vol. 5, no. 2, pp. 742-757, May 2023.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














