Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Edi Surya Negara Harahap

    With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for service providers, enterprises, application developers, and governmentsto begin their own deployments of IPv6. A seamless migration... more
    With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for service providers, enterprises, application developers, and governmentsto begin their own deployments of IPv6. A seamless migration from IPv4 to IPv6 is hard to achieve. Therefore several mechanisms are required which ensures smooth, communication and independent change to IPV6. Not only is the transition, integration of IPv6 is also required into the existing networks. The solutions (mechanisms) can be divided into three categories: dual stack, tunneling and translation. In this project the Tunneling transition mechanism is implemented in GNS3 (Graphical Network Simulator), using CISCO routers. The operation of this network is viewed with the help of Wireshark (Packet analyzer). The topology Tunneling technologies, which can be observed by capturing the packets in the router interfaces. Dengan ketersedian (space) dari pengalamatan IPv4 yang telah sedikit, itu telah menjadi alasan utama bagi penyedia layanan, perusahaan, pengembang aplikasi, dan pemerintah untuk memulai beralih dengan IPv6. Sebuah migrasi dari IPv4 ke IPv6 sulit dicapai. Karena beberapa mekanisme yang diperlukan untuk menjamin kelancaran, komunikasi dan peralihan secara utuh ke IPv6. Tidak hanya transisi, integrasi IPv6 juga diperlukan ke dalam jaringan yang ada. Solusi (mekanisme) dapat dibagi menjadi tiga kategori: dual stack, tunneling dan translation. Dalam proyek ini mekanisme transisi Tunneling diimplementasikan di GNS3 (Graphical Network Simulator), menggunakan CISCO router. Jaringan ini dilihat dengan bantuan Wireshark (Packet analyzer). Topologi Tunneling yang dapat diamati dengan menangkap paket pada interface router.
    Research Interests:
    ABSTRACT Information is one of a very valuable asset owned by a company or organization. Sufficient resources and adequate, should be allocated to protect information assets through the implementation of information systems security... more
    ABSTRACT Information is one of a very valuable asset owned by a company or organization. Sufficient resources and adequate, should be allocated to protect information assets through the implementation of information systems security policies measured in accordance with existing standards. Bina Darma University is one of the university in South Sumatra that carry out education system by using information technology. Therefore we need an information security policy in accordance with the standards of information security. Information security policies are able to developed based on standard Information Security Management System (ISMS) or better known as the Information Security Management System (ISMS) ISO / IEC 27001. Information security management system provides a systemic approach to the form control objective in managing sensitive information with the aim of securing information. The approach taken to achieve this is to use the model of Plan-Do-Check-Act (PDCA). PDCA is a recurring activity to solve a problem of quality control.
    ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has... more
    ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has become an important issue recently due to the increasing dependence of organizations and the people in the system. So with the standardization of information security technologies will have a signi�cant impact in improving the safe use of the system. A review of the security framework of information technology will be presented in this paper. This paper will review some of the recommended framework for the security of information technology development based on cloud computing such as: European Network and Information Security Agency (ENISA), Cloud Security Alliance (CSA), National Institute of Standards and Technology (NIST).
    ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has... more
    ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has become an important issue recently due to the increasing dependence of organizations and the people in the system. So with the standardization of information security technologies will have a signi�cant impact in improving the safe use of the system. A review of the security framework of information technology will be presented in this paper. This paper will review some of the recommended framework for the security of information technology development based on cloud computing such as: European Network and Information Security Agency (ENISA), Cloud Security Alliance (CSA), National Institute of Standards and Technology (NIST).
    With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for service providers, enterprises, application developers, and governmentsto begin their own deployments of IPv6. A seamless migration... more
    With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for service providers, enterprises, application developers, and governmentsto begin their own deployments of IPv6. A seamless migration from IPv4 to IPv6 is hard to achieve. Therefore several mechanisms are required which ensures smooth, communication and independent change to IPV6. Not only is the transition, integration of IPv6 is also required into the existing networks. The solutions (mechanisms) can be divided into three categories: dual stack, tunneling and translation. In this project the Dual-Stack transition mechanism is implemented in GNS3 (Graphical Network Simulator), using CISCO routers. The operation of this network is viewed with the help of Wireshark (Packet analyzer). The topology combines both, Dual-Stack and Tunneling technologies, which can be observed by capturing the packets in the router interfaces. Dengan ketersedian (space) dari pengalamatan IPv4 yang telah sedikit, itu telah menjadi alasan utama bagi penyedia layanan, perusahaan, pengembang aplikasi, dan pemerintah untuk memulai beralih dengan IPv6. Sebuah migrasi dari IPv4 ke IPv6 sulit dicapai. Karena beberapa mekanisme yang diperlukan untuk menjamin kelancaran, komunikasi dan peralihan secara utuh ke IPv6. Tidak hanya transisi, integrasi IPv6 juga diperlukan ke dalam jaringan yang ada. Solusi (mekanisme) dapat dibagi menjadi tiga kategori: dual stack, tunneling dan translation. Dalam proyek ini mekanisme transisi Dual-Stack diimplementasikan di GNS3 (Graphical Network Simulator), menggunakan CISCO router. Jaringan ini dilihat dengan bantuan Wireshark (Packet analyzer). kedua topologi dibandingkan, Dual-Stack dan Tunneling, yang dapat diamati dengan menangkap paket pada interface router.
    Research Interests: