Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9 dokumen yang sesuai dengan query
cover
Rendy Wijaya
Abstrak :
Perkembangan teknologi saat ini yang berkembang sangat pesat disertai penggunaan perangkat mobile yang sangat marak, maka diperlukan sebuah management system yang bisa mengatur semua hal itu. Mobile Device Management (MDM) adalah system yang sesuai untuk mengatur itu semua. Selain itu, MDM itu sendiri memiliki kaitan yang erat dengan Bring Your Own Device (BYOD) yang saat ini telah menjadi tren di masyarakat. Beberapa aspek yang dibahas dalam MDM itu adalah Bandwidth Control. Hasil dari pengujian Bandwidth Control ini menunjukkan nilai speed download dan upload turun sekitar 20 ? 30% dari batas bandwidth yang diberikan. Aspek berikutnya yang diuji adalah pengaruh dari jumlah device yang terkoneksi pada satu jaringan. Dalam pengujian ini, aktivitas yang dilakukan adalah streaming. Dan hasilnya adalah penurunan setiap penambahan device speed menurun sekitar 2 ? 17%. Sedangkan untuk aspek Mac Filtering telah dibuat sebuah Interface System digunakan untuk memfilter MAC Address yang akan masuk ke jaringan.
Technology currently growing with the use of mobile devices is very widespread, it would require a management system that can manage all of that. Mobile Device Management (MDM) is a suitable system to manage it all. In addition, MDM itself has a close connection with Bring Your Own Device (BYOD) which has now become a trend in society. Some aspects are discussed in the MDM is Bandwidth Control. Results of this test indicate the value of Bandwidth Control download and upload speed down about 20-30% of a given bandwidth limit. The next aspect examined is the influence of the number of devices connected to a network. In this test, the activity undertaken is streaming. And the result is a decrease each additional device speed decreased by about 2-17%. As for the aspects of the Mac Filtering has created an Interface System is used to filter MAC Address that will go into the network.
Depok: Fakultas Teknik Universitas Indonesia, 2013
S46407
UI - Skripsi Membership  Universitas Indonesia Library
cover
Elvin Aliyev
Abstrak :
Software-Defined Networking (SDN) merupakan istilah umum yang mencakup beberapa jenis teknologi jaringan yang bertujuan untuk membuat jaringan cerdas dan fleksibel sebagai sebagai server virtual dan infrastruktur penyimpanan pusat data modern. SDN adalah pemisahan control plane (yang membuat keputusan tentang bagaimana paket harus mengalir melalui jaringan) dari data plane (berfungsi packet-forwarding). Controller dan switch berkomunikasi melalui "south-bound" yang disebut OpenFlow protocol. Skripsi ini membahas tentang salah satu bagian paling penting dari teknologi Software-Defined Network (SDN) yaitu OpenFlow. Pada skripsi ini dievaluasi pengiriman aplikasi FTP dengan 4 skenario dengan berukuran 100, 200, 300 dan 400MB pada satu jaringan dengan sebuah controller POX dan satu Open Virtual Switch (OVS) dan dua host. Evaluasi dilakukan untuk mengukur parameter QoS throughput dan delay untuk setiap skenario dan eksperimen didapatkan data throughput dan delay dari satu yang berbeda di Mininet. Hasil pengujian throughput pada skenario 1 adalah 1.520 Mbits/sec yang paling tinggi dan delay 0.000103 s yang paling rendah dibandingkan dengan lainnya. Pada skenario 2 diukur throughput 1.320 Mbits/sec dan delay 0.00014775 s. Thtoughput pada skenario 3 adalah 1.122 Mbits/sec menjadi paling rendah di antara 4 skenario dan dengan delay yang paling tinggi 0.002618 s dan pada skenario 4 throughput adalah 1.191 Mbits/sec dan delay 0.0002543 s. ...... Software-Defined Networking (SDN) is a general term that covers several types of networking technology that aims to create intelligent and flexible network as a virtual server and storage infrastructure of modern data centers. SDN is the separation of the control plane (which makes decisions about how the package must flow through the network) from the data plane (packet-forwarding). Controllers and switches communicate through "south-bound" interface usually called OpenFlow protocol. This final project discusses about one of the most important pieces of networking technology Software-Defined Networking (SDN) which is OpenFlow. This final project evaluated the throughput and the delay on FTP application delivery time measuring 100, 200, 300 and 400MB on one network with a controller POX and an Open Virtual Switch (OVS) switch and with two hosts. The evaluation of throughput and delay were performed to measure the QoS parameter for each scenario and the data experiment taken with Mininet. The results of simulation scenario 1 the throughput is 1.520 Mbits/sec which is the highest result and the delay is 0.000103 s which is the lowest compared to other scenarios. In scenario 2 the throughput is 1.320 Mbits/sec and the delay is 0.00014775s. Throughput in scenario 3 is 1.122 Mbits/sec which is the lowest of the four scenarios and the delay is the highest which is 0.002618 s. In scenario 4 the throughput is 1,191 Mbits/sec and delay is 0.002543 s.
Depok: Fakultas Teknik Universitas Indonesia, 2015
S59836
UI - Skripsi Membership  Universitas Indonesia Library
cover
Abstrak :
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.
Heidelberg: Springer, 2012
e20408219
eBooks  Universitas Indonesia Library
cover
Johnson, Simon
New York: McGraw-Hill, 2004
303.48 JOH k
Buku Teks  Universitas Indonesia Library
cover
Abstrak :
The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services.
Dordrecht, Netherlands: Springer, 2012
e20406903
eBooks  Universitas Indonesia Library
cover
Davide Balzarotti
Abstrak :
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
Berlin: Springer-Verlag, 2012
e20409379
eBooks  Universitas Indonesia Library
cover
Abstrak :
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices, signature schemes, encryption schemes, efficient two-party and multi-party computation, security in the UC framework, cryptanalysis; efficient constructions, and protocols and combiners.
Berlin: Springer-Verlag, 2012
e20409399
eBooks  Universitas Indonesia Library
cover
Abstrak :
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
Abstrak :
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
Berlin: Springer-Verlag, 2012
e20410446
eBooks  Universitas Indonesia Library