scholarly journals A comparative study of IP Versions 4, 5, and 6

2021 ◽  
Vol 2 (3) ◽  
pp. 10-15
Author(s):  
Naseef Husam Mohammad Alnile ◽  
Yasmin Makki Mohialden ◽  
Majd S. Ahmed ◽  
Majd S. Ahmed

This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the differences between them and which protocol is more suitable for the future of the internet, among other things. Through this research, we have established the most advantageous characteristics of these protocols, as well as the specific elements that each protocol uses to allow the internet network to operate at maximum capacity. The main aim of this study is to discover which of the internet protocols, IPv4, IPv5, or IPv6, is the most widely used. IPv4 is the most widely used protocol, followed by IPv5. The most essential elements of getting a more relevant job on the internet network are highlighted in this article. It all comes down to how IP protocols operate and what they accomplish.

2021 ◽  
Vol 4 (2) ◽  
pp. 280-289
Author(s):  
Lian Fawahan ◽  
Ita Marianingsih Purnasari

The occurrence of the Covid-19 pandemic  makes many MSMEs have to lose money and go out of business, whereas in Indonesia the most important joint that sustains the wheels of the country's economy is MSMEs. In addition to the pandemic, the challenge of MSMEs is rise of the digital economy movement is very  rapid  for making    MSMEs  demanded to understand information technology. The covid-19 pandemic is increasingly encouraging human activity through the internet network. One of the simplest steps to build a brand through TikTok social media. In  2020 number of downloads amounted to 63.3 million both in the Apple store and the play store the best-selling application is TikTok. Indonesia  is the downloader of the application amounting to 11% of the total downloads of tiktok application, with tiktok MSME actors can build their product brand, considering it does not require a lot of cost and energy. The potential of the wider market and the future business will also be a consideration because tiktok social media is widely used by millennials who have high consumptive power.  This study uses qualitative descriptive, uses literature studies quoted from book journals as well as relevant websites. The purpose of this study is to encourage MSMEs to have a good brand so that they can compete with other products, and through social media, especially TikTok, the MSME market segment can be wider internationally. Considering that social media has eliminated geography, meaning that when it can go viral social media, everyone can see MSME products. Keywords: MSMEs, Branding, TikTok


Electronics ◽  
2019 ◽  
Vol 8 (4) ◽  
pp. 442 ◽  
Author(s):  
Khudoyberdiev ◽  
Jin ◽  
Kim

The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor services based on Domain Name System (DNS) in the Open Connectivity Foundation (OCF) environment. We have used the Internet of Things Platform and DNS server for IoT Resource auto-registration and discovery in the Internet Protocol version 4 (IPv4). An existing system called Domain Name Auto-Registration in Internet Protocol version 6 can be used for Internet of Things devices for auto-registration and resource discovery. However, this system is not acceptable in the existing internet networks, because the highest percentage of the networks on the Internet are configured in Internet Protocol version 4. Through the proposed auto-registration system, clients can be able to discover the resources and access the services in the OCF network. Constrained Application Protocol (CoAP) is utilized for the IoT device auto-registration and accessing the services in the OCF network.


2017 ◽  
Vol 14 (2) ◽  
pp. 77
Author(s):  
Rastri Prathivi ◽  
Vensy Vydia

<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>


Author(s):  
K. Daniel Wong ◽  
Ashutosh Dutta

The Internet is in some ways like the proverbial massive software project whose requirements keep changing, and which is never completed. When the Internet protocols were first designed, there was no concept of the future requirement that IP would need to support mobility. In today’s wireless world, mobility support is one of the key requirements for IP. Like the requirements for QoS, security, and multimedia support, the mobility requirement has arisen due to the phenomenal success of the Internet, as a result of which people want to do more and more things over the Internet.


2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Domiko Fahdi Jaya Patih

Abstrack Voice over Internet Protocol (VoIP) is a technology that utilizes the Internet Protocol to provide real-time voice communication. VoIP technology is a today telecommunication technology, where the costs of the technology infrastructure is much cheaper than the telecommunications technology that is commonly used today. Forming elements are VoIP User Agent, Proxy, Protocol and Coder-Decoder (CODEC). Asterisk is a softswicth to operate a proxy, which is based on session initiation protocol (SIP). 10.10 Ubuntu operating system as a VoIP server is flexible to support a package of performance Asterisk. The goal of this research is to build Asterisk-based VoIP server, that can be developed in further research as needed. The methodology of research conducted, is devided by two, the study of literature and experimental. The research was conducted at the installation that has been built before the Internet network. VoIP so here functioned as maximizing existing internet network is to reduce expenses communication needs. Services provided in this study form with voice and video call services client to server, client to client call, video call conferencing, video conferencingKey Word : Voice over Internet Protocol (VoIP), Asterisk, Session Initiaton Protocol (SIP), VPN


Author(s):  
László Bokor ◽  
Gábor Jeney

Nowadays, the Internet Protocol is facing the version change; IPv4 (the old version of IP) will be replaced by IPv6 (the new version of IP) in the long run. Although they are based on the very same concept, the two protocols are not compatible with each other. This chapter deals with the coexistence issues, which might arise due to the simultaneous existence of IPv4 and IPv6. On the other hand, this chapter also covers transition concepts: how IPv6 only hosts can communicate either over IPv4 only networks, or with IPv4 only hosts in the Internet of the future.


2021 ◽  
Vol 2 (1) ◽  
pp. 68-72
Author(s):  
Zunainah Hamid ◽  
Sharipah Daud ◽  
Intan Shafinaz Abd. Razak ◽  
Nurzurawani Abd. Razak

The transition between the Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) will be a long process during both protocol coexists and it unreasonable to expect that many millions of IPv4 nodes will be converted overnight. Mobility is becoming ubiquitous nowadays. This paper has described about a background study of IPv4 and IPv6, the needs of IPv6, transition mechanisms in the various architectures, and comparison of the IPv4 and IPv6 in two major areas; header format and transition mechanism. Then, the transformation of IPv4 to IPv6 addressing by using tunnel and dual stack protocol will be discussed.


2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


2020 ◽  
Vol 4 (3) ◽  
pp. 29-39
Author(s):  
Sulkhiya Gazieva ◽  

The future of labor market depends upon several factors, long-term innovation and the demographic developments. However, one of the main drivers of technological change in the future is digitalization and central to this development is the production and use of digital logic circuits and its derived technologies, including the computer,the smart phone and the Internet. Especially, smart automation will perhaps not cause e.g.regarding industries, occupations, skills, tasks and duties


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Sign in / Sign up

Export Citation Format

Share Document