scholarly journals Video Over Intranet (VDOIT)

2020 ◽  
Vol 6 ◽  
Author(s):  
Deepak Ahire

Video calling or voice calling through the use of the internet is a very common thing in today's world. Nevertheless, users have to pay charges directly or indirectly, tolerating all the delays even if you use the facility within the same network or sub-network. Over 30 million US households used Voice over IP (VoIP) until the end of 2010. Specialist found that 31.4% of the household used VoIP as the main and only home phone line by 2012. Users up till now have multiplied by a huge factor. There are several drawbacks of using video calling over the internet within a small network such as delay of packets (travel to the main server outside network and reenter the same network again), direct or indirect costs, users need to be always connected online and efficiency and speed of the user's system vary according to connection quality and bandwidth. In this project, we implemented a WebRTC enabled web application which provides free peer to peer video calling and conferencing tool for any private organization on top of their existing private network.

Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Author(s):  
David Romyn ◽  
Mark Kebbell

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.


Author(s):  
Ganeshkumar S ◽  
Elango Govindaraju

The end to end encryption of connections over the internet have evolved from SSL to TLS 1.3 over the years. Attacks have exposed vulnerabilities on each upgraded version of the cryptographic protocols used to secure connections over the internet. Organisations have to keep updating their web based applications to use the latest cryptographic protocol to ensure users are protected and feel comfortable using their web applications. But, the problem is that, web applications are not always standalone systems, there is usually a maze of systems that are integrated to provide services to the end user. The interactions between these systems happens within the controlled internal private network environment of the organisation. While only the front ending web application is visible to the end user. It is not often feasible to upgrade all internal systems to use the latest cryptographic protocol for internal interfaces/integration due to prohibitive cost of redevelopment and upgrades to infra and systems. Here we define an algorithm to setup internal & external firewalls to downgrade to a lower version of the cryptographic protocol (SSL) within the internal network for the integration/interfacing connections of internal systems while mandating the latest cryptographic protocol (TLS 1.x) for end user connections to the web application.


2020 ◽  
Vol 6 (1) ◽  
pp. 1-6
Author(s):  
Sugiarto Hartono

In English : Today, the use of the internet among the public is increasing. This gives a fairly large number in the business world specifically commercial companies. The internet makes it easier for companies to carry out sales activities, for example in marketing, sales, customer relations, or supplier relations. The objectives of the study were approved and a web application was made that made it easy for PT. SBM and other companies to promote its products to the general public. General problems at PT. SBM is limited in funds and resources for approval of a product. Therefore, we need a website that can help introduce or promote products that will be sold to the general public regardless of distance and time, as well as saving promotional costs. Data collection methods used are through surveys, interviews, and literature studies. The application design method uses the Object Oriented Analysis Diagram (OOAD) method which is divided into 2 processes, namely analysis and design. The research results consist of a web that can promote company products or individuals that are more effective and efficient. The conclusion of this research is the production of web-based e-marketing that can support companies or individuals in supporting their products. In Indonesian : Dewasa ini, penggunaan internet di kalangan masyarakat semakin meningkat. Hal ini memberikan dampak yang cukup besar dalam dunia bisnis khususnya perusahaan komersial. Internet menjadikan perusahaan lebih mudah melakukan kegiatan penjualan, misalnya dalam bidang pemasaran, penjualan, hubungan dengan pelanggan, ataupun hubungan dengan pemasok. Tujuan penelitian ialah merancang dan menghasilkan sebuah aplikasi berbasis web yang mempermudah PT. SBM dan perusahaan lain maupun perorangan untuk mempromosikan produk-produknya kepada khalayak ramai. Permasalahan umum pada PT. SBM adalah terbatasnya dana serta sumber daya untuk mempromosikan suatu produk. Karena itu, diperlukan sebuah website yang dapat membantu memperkenalkan atau mempromosikan produk-produk yang akan dijual kepada khalayak ramai tanpa memandang jarak dan waktu, serta menghemat biaya promosi. Metode pengumpulan data yang digunakan yaitu melalui survei, wawancara, dan studi kepustakaan. Metode perancangan aplikasi menggunakan metode Object Oriented Analysis Diagram (OOAD) yang dibagi menjadi 2 proses yaitu analisis dan perancangan. Hasil penelitian berupa web yang dapat mempromosikan produk-produk perusahaan maupun perorangan secara lebih efektif dan efisien. Kesimpulan dari penelitian ini ialah dihasilkannya e-marketing berbasis web yang dapat mendukung perusahaan maupun perorangan dalam mempromosikan produk-produknya.


Author(s):  
David Romyn ◽  
Mark Kebbell

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.


2020 ◽  
Vol 6 (1) ◽  
pp. 1-6
Author(s):  
Sugiarto Hartono

Today, the use of the internet among the public is increasing. This gives a fairly large number in the business world specifically commercial companies. The internet makes it easier for companies to carry out sales activities, for example in marketing, sales, customer relations, or supplier relations. The objectives of the study were approved and a web application was made that made it easy for PT. SBM and other companies to promote its products to the general public. General problems at PT. SBM is limited in funds and resources for approval of a product. Therefore, we need a website that can help introduce or promote products that will be sold to the general public regardless of distance and time, as well as saving promotional costs. Data collection methods used are through surveys, interviews, and literature studies. The application design method uses the Object Oriented Analysis Diagram (OOAD) method which is divided into 2 processes, namely analysis and design. The research results consist of a web that can promote company products or individuals that are more effective and efficient. The conclusion of this research is the production of web-based e-marketing that can support companies or individuals in supporting their products.


Author(s):  
Lindsey C Bohl

This paper examines a few of the numerous factors that may have led to increased youth turnout in 2008 Election. First, theories of voter behavior and turnout are related to courting the youth vote. Several variables that are perceived to affect youth turnout such as party polarization, perceived candidate difference, voter registration, effective campaigning and mobilization, and use of the Internet, are examined. Over the past 40 years, presidential elections have failed to engage the majority of young citizens (ages 18-29) to the point that they became inclined to participate. This trend began to reverse starting in 2000 Election and the youth turnout reached its peak in 2008. While both short and long-term factors played a significant role in recent elections, high turnout among youth voters in 2008 can be largely attributed to the Obama candidacy and campaign, which mobilized young citizens in unprecedented ways.


Sign in / Sign up

Export Citation Format

Share Document