ANALISA PERBANDINGAN DALAM RANGKA PEMILIHAN BEBERAPA IP UPSTREAM PROVIDER DI PT. INDOSAT

2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.

1997 ◽  
Vol 11 (6) ◽  
pp. 349-354 ◽  
Author(s):  
C. Grant ◽  
T. Scott

This paper examines how advanced technology and communication networks are revolutionizing the way university researchers, scientists and industrialists are communicating and working together. In collaborative projects, partners often come from different environments, backgrounds and possibly different regions and countries. Barriers such as geographical remoteness, lack of time in the working day, the cost of travel and differences in culture can seriously hinder regular communication and development work. However the Internet is fast becoming an indispensable international communications tool. It constitutes a resource that is invaluable to the knowledge and technology transfer process. It links over two-thirds of universities and is enabling industry and universities all over the world to develop in new and exciting ways – although there are both opportunities and threats associated with its explosive growth. This paper illustrates how the authors have gained advantage by exploiting current technology to form successful partnerships in this new high-speed ‘no boundaries’ information age.


2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS


2021 ◽  
Vol 2 (2) ◽  
pp. 293-301
Author(s):  
Pratama Aurellia Dewi Anggita ◽  
Leonard Adrie Manafe

Online business is one of method of promoting/offering goods/services that are carried out using the internet network by communicating with each other. In online business, marketing strategies are needed by advertising each product produced thru social media. One of these strategies is endorsement acts. There are several business ethics noted when endorsers or celebrities promote a product through their social media. The purpose of this study was to determine whether the endorsement strategy at PT Murbey Pasti Sukses is in accordance with business ethics. This type of research is qualitative and collected data from PT Murbey Pasti Sukses. The results of the research and discussion can be concluded that the business strategy at PT Murbey Pasti Sukses uses two types of endorsers, namely artists/celebrities and influencers who are active on social media. Endorsements selection choosen by PT Murbey Pasti Sukses considered by shown a good engagement rate. The four strategy indicators (product, promotion, price and people) describe that promotion indicator has a dominant impact to attract consumers' attention and encourage them to buy. Likewise with online business through social media on Instagram at this time, Murbey conducts online promotions using the endorsement system.


2011 ◽  
Vol 189-193 ◽  
pp. 227-230
Author(s):  
Shu Lin Shi ◽  
Guo Rui Pi

: This topic has designed a kind of virtual oscilloscope based on the embedded technical. On the hardware the S3C2410+IDT7204 structure were used, on the software real-time operating system uC/OS-II were used in the design of embedded virtual oscilloscope. ARM9 microprocessor's high speed handling ability are fully used, as well as FIFO in the read-write control logic, the superiority in high speed data exchange aspect, realizes the double channel synchronization profile demonstration. the multi-task run and the real-time processing were realized by using on the uC/OS-II operating system's in ARM9 microprocessor transplant. This oscilloscope has the cost lowly, to be possible to as the common oscilloscope, also to be possible to as an intelligent module the merit which used in the embedded system.


Author(s):  
Dr. Kiran B Malagi ◽  
Adarsh K M ◽  
Brijesh Reddy ◽  
Anusha T R ◽  
Bindhu R

The main purpose of this paper is to provide detailed and comprehensive research on the emergence of various cell phone manufacturing technologies in wireless communication. In this paper we focus on studying mobile generations from 1G to 5G and future mobile phones. The first generation has fulfilled the basic needs of the voice, and the second generation has delivered a high volume and a large amount of integration. The third generation included high-speed data transfer which gave its users a ‘mobile broadband experience’. The fourth generation will provide access to a variety of telecommunications services, including advanced mobile services, supported by mobile networks and fixed networks. We have compared all the mobile phones that have been created so far based on their technology.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 888
Author(s):  
Fazeel Ahmed Khan ◽  
Adamu Abubakar ◽  
Marwan Mahmoud ◽  
Mahmoud Ahmad Al-Khasawneh ◽  
Ala Abdulsalam Alarood ◽  
...  

The Internet of Things (IoT) smart city initiative has transformed technology spectrum into its new era of development. The increasing amount of data generated by millions of IoT devices and the rapid flow of data across distributed IoT devices are transmitting to remotely located cloud infrastructure over the Internet. Unfortunately, these large amounts of data and its flow based on the traditional energy-intensive network infrastructure is neither efficient nor substantially scalable. It is essential to design a comprehensive network infrastructure to handle large amount of high-speed data-processing in an IoT spectrum. Apparently, Blockchain and Software-Defined Networking (SDN) approaches can leveraged the scalability of the environment for IoT spectrum. In addition, the emergence of distributed cloud technology and Li-Fi spectrum can transform the capability of data-processing for IoT devices. The challenge lies in efficiently blend the integration of Li-Fi, Blockchain, SDN and Cloud technologies for IoT environment. To address this challenge, we design a multiaccess communication modulation model for efficient optimization of distributed network with an SDN based controller and integration of robust cloud infrastructure for high-speed data-processing. The proposed model is based on Li-Fi communication architecture which significantly reduced in the utilization of energy for managing large-scale infrastructure. We performed simulation and analysis across multiple dimensions to evaluate the performance and effectiveness of our proposed model. The evaluated output shows that our model significantly improved the overall performance and efficiency of the communication infrastructure as compared with other ultra-modern models.  


2020 ◽  
Vol 1 (2) ◽  
pp. 19-35
Author(s):  
Abdul Muthalib ◽  
Aisyah Aisyah ◽  
Endang Sukari ◽  
Rafika Aulia

The development of the Covid-19 outbreak has indeed had a major impact on all sides of human life, including in the world of education. The world of education seems to make the house an educational institution that can replace formal educational institutions. Learning using the internet network or so-called brave learning (online). Brave learning may be new to some teachers, but maybe some already consider it familiar. The purpose of this study was to find out about the Variety of Alternative Psychomotor-based PAI Learning Media During Covid-19 at MA Preparation 4 Medan.The results obtained from this research are learning that can be done in any condition, but of course the results will not be optimal learning that is done face-to-face in the classroom. To optimize it, of course many are done by teachers. Especially in the PAI subject, several innovations have been made to optimize learning outcomes, namely: 1) Innovations such as presenting learning with multimedia, 2) Online-based discussions and assignments. Teaching also has obstacles in its application, especially in the MA preparatory 4-field country, some of these obstacles: 1) Signal interference that cannot be avoided. 2) Lack of parental and teacher cooperation in managing courageous learning. 3) Limited costs make students reluctant to take bold lessons.


Author(s):  
Saiful Bari

Whether you are the usage of wireless net in an espresso shop, stealing it from the man subsequent door, or competing for bandwidth at a conference, you have probable gotten pissed off at the gradual speeds you face when extra than one system is tapped into the network. But radio waves are clearly one section of the spectrum that can raise our data. What if we can also wish to use exclusive waves to surf the internet? One German physicist. Harald Haas, has come up with a reply he calls “Data Through Illumination”—taking the fiber out of fiber optics with the resource of potential of sending records thru an LED moderate bulb that varies in intensity faster than the human eye can follow. And safety would be a snap—if you can’t see the light, you can’t get entry to the data. Li-Fi is a VLC, considered slight communication, technological perception developed by way of using a crew of scientists collectively with Dr Gordon Povey, Prof. Harald Haas and Dr Mostafa Afgani at the University of Edinburgh. The time size Li-Fi used to be coined via skill of the use of Prof. Haas when he amazed humans by means of potential of means of streaming high- definition video from a modern-day LED lamp, at TED Global in July 2011. Unseen with the resource of practicable of the human eye, this variant is used to elevate high-speed data,” says Dr Povey, Product Manager of the University of Edinburgh's Li-Fi Program ‘D-Light Project’.


2011 ◽  
Vol 130-134 ◽  
pp. 2495-2498
Author(s):  
Shi Xing Liu ◽  
Tian Deng ◽  
Kan Kan Du

Companying with a fire, several feature parameters will be generated. In order to indicate a fire disaster effectively, a design that can detect three kinds of these feature parameters (temperature, CO gas and smoke) is introduced in this paper. The peripheral environment feature parameters will be converted into digital data by corresponding sensing modules included in the nodes. The data will be transmitted to the host computer based on TCP/IP and processed by Neural-Net Algorithms. Though the analyze of the data from the experiment, the nodes show a quick real time response, good operation stability and high speed data transmission. They are very suitable for early fire monitoring in modern buildings to protect human life and properties.


2021 ◽  
Vol 6 (2) ◽  
pp. 142
Author(s):  
Pendi Ventri Hendika ◽  
M Suyanto ◽  
Emha Taufiq Luthfi

Teknologi internet of things menawarkan berbagai kemudahan bagi manuasia merupakan terobosan baru yang sangat bermafaat untuk kehidupan. Kesibukan pekerjaan yang begitu padat seringkali memaksa untuk banyak meninggalkan rumah dalam keadaan kosong. Tidak jarang rumah yang ditinggalkan dalam keadaan kosong menjadi sasaran pencuri ataupun bahaya kebakaran. Kasus kebakaran saat yang terjadi saat ini sebagian besar dipicu akibat kebocoran gas konsleting listrik dan pemilik rumah lupa mematikan alat listrik saat meninggalkan rumah. Tetapi masyarakat juga masih ragu jika sistem digital mengalami kendala yang harus dilakukan. Sebagai solusi dari keadaan tersebut maka diperlukan alat yang bisa mengontrol rumah dari jarak jauh menggunakan jaringan internet. Hal ini diharapkan dapat mencegah terjadinya hal yang tidak diinginkan. Untuk mewujudkannya, penulis melakukan riset untuk membangun sebuah sistem rumah pintar yang nantinya semua peralatan listrik dan elektronik dapat dikontrol menggunakan smartphone menggunakan jaringan internet yang menggunakan fungsi switch analog digital. Tujuan lainnya adalah membuat sebuah produk smart home yang cocok di aplikasikan di Indonesia yang nantinya smart home tersebut tidak meniggalkan saklar konvensional yang sudah terpasang dirumah. Penelitian ini berhasil merancang sebuah sistem rumah pintar yang dapat di bypass menjadi sistem listrik analog. Hal ini untuk mengantisipasi ketika terjadi error pada sistem digital sehingga kelistrikan rumah masih dapat berjalan seperti biasa. Kata Kunci— rumah pintar, pengontrol listrik, analog, digital.AbstractInternet technology about things that offer various conveniences for people today is a new breakthrough that is very useful for human life. The bustle of work is so crowded while waiting to go home. There is no damaged house there. Very important for homeowners. The current fire cases are mostly triggered by a gas leak and the homeowner forgets to turn off the electricity when leaving the house. However, the public is still in doubt if a digital system is being done which must be done. As a solution to this situation, we need a tool that can control the house remotely using the internet network. This is expected to be avoided. Unwanted things. To realize this, the authors conducted research to build a smart home system that allows all electrical and electronic equipment to be controlled using a smartphone that uses the internet network provided by a digital analog switch. Not only that, smart home makers that are suitable to be applied in Indonesia while smart homes do not leave conventional diversions installed at home. This research successfully completed a smart home system that can cut bypass into an analog electrical system. This is to correct errors that occur in digital systems so that electricity can still run as usual. Keywords—Smart home, electric controller, analog, digital.


Sign in / Sign up

Export Citation Format

Share Document