Home Archive Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 8, Issue 2, 2018
Pages: 275 - 284
Review paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
EKONOMSKI FAKULTET TRAVNIK U TRAVNIKU
PRAVNI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET ZA MEDIJE I KOMUNIKACIJE TRAVNIK U TRAVNIKU

u saradnji sa

MIT UNIVERZITET SKOPLJE, SJEVERNA MAKEDONIJA
VEVU, VELEUČILIŠTE LAVOSLAV RUZIČKA U VUKOVARU, HRVATSKA
VELEUČILIŠTE VIMAL, SISAK, HRVATSKA
CKKPI, TRAVNIK, BOSNA I HERCEGOVINA

organizuju

31. MEĐUNARODNU KONFERENCIJU

EKONOMSKE, PRAVNE I MEDIJSKE INTEGRACIJE BOSNE I HERCEGOVINE I ZEMALJA ZAPADNOG
BALKANA KAO KLJUČNI POKRETAČ EUROPSKIH VRIJEDNOSTI

12. – 13. decembar 2025. godine

Metrics and citations
Abstract views: 3
PDF Downloads: 1
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 02.12.2018. >> Accepted: 05.12.2018. >> Published: 14.12.2018. Review paper

KAKO POBOLJŠATI POSTOJEĆU MREŢNU INFRASTRUKTURU/HOW TO IMPROVE THE EXISTING NETWORK INFRASTRUCTURE

By
Muharem Redžibašić ,
Muharem Redžibašić

International University of Travnik , Travnik , Bosnia and Herzegovina

Mladen Radivojević
Mladen Radivojević

International University of Travnik , Travnik , Bosnia and Herzegovina

Abstract

With the rapid development of technology, many business processes were transferred to the electronic processing of data which implied development of local networks in many companies and organizations. Most network infrastructures have been developed incrementally, spread to the needs and in most cases these was an ad-hoc approach without a lot of planning and review about security. Network implementers, generally, have not been professionals so failures on the network and security risks are often. Many of today's network infrastructures have obsolete network equipment which has configured protocols that have become more insecure and physical implementation of the network is often a big collision domain. This paper will present approach, i.e. How can we improve the existing infrastructure and what are the key steps in identifying the weak points of the network infrastructure.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.