Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11993 dokumen yang sesuai dengan query
cover
Nichols, Randall K.
New York: McGraw-Hill , 2002
005.8 NIC w
Buku Teks  Universitas Indonesia Library
cover
"Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses."
London: Institution of Engineering and Technology, 2002
e20451710
eBooks  Universitas Indonesia Library
cover
Rudiyanto
"Nilai Superframe Order Dan Beacon Order pada protokol IEEE 802.15.4 untuk menentukan besarnya paket data yang bisa ditransmisikan dalam setiap Superframe dan juga lamanya masa tidak aktif dalam setiap Superframe. Jaringan multihop mempunyai ketersedian bandwith yang bagus sehingga digunakan pada penelitian ini. Penelitian ini menggunakan simulasi NS2 untuk menganalisis pengaruh nilai Beacon Order dan nilai Superframe Order terhadap kinerja jaringan nirkabel multihop yang memiliki topologi pohon pada protokol IEEE 802.15.4. Kinerja jaringan telah dievaluasi secara rinci pada throughput rata-rata, delay rata-rata, delivery ratio dan persentase dari energi rata-rata yang digunakan terhadap variasi nilai Beacon Order dan nilai Superframe Order. Nilai Beacon Order dan nilai Superframe Order optimum yang diperoleh dari eksperimen adalah 9.

Superframe order value and beacon order value on IEEE 802.15.4 protocol determine the number of data packets that can be transmitted in each Superframe and also the length of the inactive period in each Superframe. Multihop networks with good bandwidth availability are used in this study. This study uses NS2 simulation to analyze the influence of the Beacon Order value and Superframe Order value to the performance of multihop wireless networks with a tree topology base on IEEE 802.15.4 protocol. The performance of the network which have been evaluated in detail are the average throughput, average delay, delivery ratio and the percentage of the average energy used towards the variation of the Beacon Order value and Superframe Order value. The optimum number of Beacon Order and Superframe Order found from the experiment is 9."
Depok: Fakultas Teknik Universitas Indonesia, 2012
T32528
UI - Tesis Membership  Universitas Indonesia Library
cover
Neely, Matthew
"In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling. Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testingIncludes real-world case studies of actual penetration tests using radio profiling. Covers data leakage, frequency, attacks, and information gathering."
Amsterdam : Elsevier/Syngress, 2013
621.389 NEE w
Buku Teks  Universitas Indonesia Library
cover
"This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers.
Presents extensive information and data on research and challenges in 5G networks; Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks; Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks."
Switzerland: Springer Nature , 2019
e20505365
eBooks  Universitas Indonesia Library
cover
Sjaiful Rijal
"Untuk memenuhi peningkatan kebutuhan atas jaringan komunikasi wireless, IEEE mengeluarkan standard 802.16 WiMax yang mampu memberikan layanan dengan jangkauan yang luas, data rate yang tinggi dan mobilitas pengguna. Namun, selain jangkauan dan kecepatan data, privasi dan keamanan juga merupakan kebutuhan yang harus diperhatikan dalam teknologi jaringan telekomunikasi. Diantaranya yaitu untuk menjaga kerahasiaan informasi pengguna dan mencegah penggunaan layanan tanpa hak. Dalam penulisan skripsi ini akan dibahas mengenai analisis prinsip kerja sistem keamanan pada Mobile WiMax tersebut.
Pada arsitektur protokol WiMax, sistem keamanan berada pada MAC layer, tepatnya pada security sublayer. Penulisan skripsi ini membahas proses authentikasi dan pemebentukan koneksi antara SS dengan BS, struktur MAC Protocol Data Unit serta beberapa teknik pengamanan. Dari pengujian, analisis dan program simulasi, sistem Mobile WiMax di PT. CSM menggunakan teknik pengamanan melalui pengenalan sertifikasi digigital X.509, autentikasi EAP-TTLS dan enkripsi AES-128.

In order to fulfill the requirement of wireless communication network, IEEE has released 802.16 standard (WiMax) that able to provide capacious range and high data rate. However, beside high bandwidth and wide-area access, privacy and security is the aspects that been concerned in the telecommunication network technology. The paper describes the analysis of security system principle in mobile WiMax.
WiMax protocol architecture describes security system at MAC Layer especially security sub layer. This paper describes authentication process and connection establish between SS and BS, MAC Protocol Data Unit Structure and some protection technique. Refer to the test, analysis and simulation program, WiMax System that used in PT. CSM using security system with digital certificate X.509 and EAP-TTLS authentication, and AES-128 encryption.
"
Depok: Fakultas Teknik Universitas Indonesia, 2008
R.03.08.144 Rij a
UI - Skripsi Open  Universitas Indonesia Library
cover
"Contents :
- Table of contents by author
- Network security
- Wireless security
- Service-provider and enterprise business issues
- Authentication and encryption
- Regulation, standards, and protocols
- Acronym guide "
Chicago: International Engineering Consortium, 2004
e20442515
eBooks  Universitas Indonesia Library
cover
Sidabutar, Roland
"ISP (Internet Service Provider) diharapkan untuk mampu menawarkan layanan paket data melalui beberapa teknologi nirkabel (seperti: 3G, 802.11g, WiMAX). Seiring dengan perkembangan teknologi perangkat komunikasi sekarang ini, maka kebutuhan akan penggunaan jaringan teknologi 3G mengakibatkan penambahan jumlah traffic. Offloading jaringan seluler merupakan solusi yang cukup menjanjikan untuk digunakan sebagai alternatif layanan telekomunikasi karena tidak membutuhkan biaya yang relatif banyak untuk mengaplikasikannya, proses pembangunan infrastrukturnya cepat, dan dapat digunakan dalam semua sistem operasi perangkat mobile.
Proses offloading memerlukan suatu skema pengambilan keputusan perpindahan jaringan agar jumlah handover dapat dilakukan seminimal mungkin, mengingat bahwa pemancar setiap teknologi mempunyai paramter-parameter seperti mobilitas, bandwidth, daya yang dipancarkan, kekuatan sinyal, dan jumlah kapasitas pengguna. Dengan demikian, diperlukan suatu model pengambilan keputusan sebagai mekanisme dalam pemilihan teknologi guna untuk meningkatkan efektivitas proses offloading dan performance jaringan. Algoritma pengambilan keputusan yang berbasiskan bandwidth dapat melihat bagaimana proses perpindahan jaringan secara vertikal dan ada beberapa parameter yang menjadi pertimbangan, yaitu: nilai RSS, gangguan, daya pada sisi pemancar, bandwidth yang dibutuhkan aplikasi, dan bandwidth teknologi.

ISP (Internet Service Provider) is expected to be able to offer a packet data service through multiple wireless technologies (such as 3G, 802.11g, WiMAX). Along with the recent development of communication technology devices, the need for the use of 3G technology network resulted in increase in the number of traffic. Offloading mobile networks is a solution that is promising to be used as an alternative for telecommunications services, for cheaper resolution, rapid infrastructure development process, and able be applied in all mobile device operating system.
Offloading process requires as minimum as possible handover decision, since the transmitter has the a lot of parameters such as mobility, bandwidth, the radiated power, signal strength, and the number of user capacity. So, there should be a handover decision model as a mechanism in an election technology to improve the effectiveness of offloading process and network performance. Handover decision for vertical handover algorithm is based on bandwidth so it can show the process of handover. Parameters used as consideration of the algorithm is the value of RSS, interference, power of the transmitter, the required bandwidth, and bandwidth the wireless technologies.
"
Depok: Fakultas Teknik Universitas Indonesia, 2016
S63304
UI - Skripsi Membership  Universitas Indonesia Library
cover
Wrightson, Tyler
New York: McGraw-Hill, 2012
005.8 WRI w
Buku Teks  Universitas Indonesia Library
cover
Elmansyah
"Bring Your Own Device (BYOD) merupakan sistem e-learning yang memanfaatkan perangkat teknologi berupa laptop, netbook, smartphone/handhelds, tablet yang dimiliki sendiri oleh mahasiswa maupun dosen dalam proses belajar mengajar melalui jaringan Internet. Penelitian ini mengembangkan dan menganalisa sistem kelas pengajaran Bring Your Own Device (BYOD) berbasis cloud computing pada teknologi mobile smartphone Android. Pengembangan sistem terdiri dari perancangan aplikasi perangkat lunak berbasis Android, cloud computing menggunakan eucalyptus dan membangun aplikasi berbasis Web menggunakan moodle.
Hasil penelitian didapatkan melalui tiga skenario pengujian yang diikuti oleh 31 responden. Pada pengujian fungsional didapatkan hasil bahwa setiap menu dan fitur yang terdapat pada aplikasi yang dirancang dapat berjalan dengan baik. Pada pengujian User Acceptance Test, 86% responden menyetujui sistem ini mudah digunakan.
Dari pengujian unjuk kerja sistem, didapatkan hasil bahwa peningkatan jumlah pengguna saat mengakses sistem kelas pengajaran BYOD tidak mempengaruhi kinerja sistem cloud computing namun mempengaruhi mesin virtual Web server. Peningkatan jumlah pengguna menyebabkan penurunan performa mesin virtual web server sebanyak 55% pada saat beban server tinggi. Saat pengguna berjumlah lima orang beban kinerja mesin virtual Web server adalah 36%. Saat pengguna berjumlah lima belas orang beban kinerja mesin virtual Web server adalah 42%. Saat pengguna berjumlah tiga puluh satu orang beban kinerja mesin virtual Web server adalah 45%.

Bring Your Own Device (BYOD) refers to e-learning system technology devices, such as laptop, netbook, smartphone/handhelds, tablet which is utilizes by students or teachers for the purpose of learning through the Internet. This research developing and analysis of Bring Your Own Device (BYOD) teaching class system based on cloud computing using smartphone technology. This development system consist of software application design based on Android smartphone, cloud computing using Eucalyptus and Web based application using Moodle.
The results obtained through three scenarios of evaluation which is followed by 31 of respondents. Functional evaluation indicates that menu and fitures in applications is running well. User Acceptance Test evaluation shows that 86% of respondents stated that this application is easy to use.
Performance evaluation indicates that increase of users when accessing BYOD teaching class system was not affecting cloud computing performance. However it was affecting the performance of virtual machine Web server. An increase of users causes of virtual machine web server performance decrease of 55% on high load conditions. With five users, the load server is 36 %. With fifteen users, the load of server is 42 %. With thirty one users, the load server is 45 %.
"
Depok: Fakultas Teknik Universitas Indonesia, 2013
T32609
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>