40 research outputs found

    Computer Application: Practical Approach

    Get PDF
    This book aimed primarily for students who will be taking subject related to this field. It provides the student with introduction to the computer with the basic application software including Microsoft Office Word, Microsoft Office Excel, Microsoft Office Power Point, Microsoft Office Access, Adobe Photoshop and Adobe Dreamweaver. The hands-on practice is to equip the students with a basic range skills required for using computer applications

    Network performance evaluation of 6to4 tunneling

    Get PDF
    Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission. The assessment is based upon experimental work that is conducted on a controlled environment. User-to-user network performance software is used to obtain the throughput, round trip time and tunneling overhead for TCP and UDP transmission protocol. The performance of TCP and UDP through 6to4 tunnel is then compared over the native IPv4 and IPv6 environment. As a result, the findings prove the ease of TCP data transmission via the tunnel compared to both native networks. In contrast, the UDP implementations show the slight difference for them. © 2012 IEEE

    Network performance evaluation of 6to4 tunneling

    Get PDF
    Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission. The assessment is based upon experimental work that is conducted on a controlled environment. User-to-user network performance software is used to obtain the throughput, round trip time and tunneling overhead for TCP and UDP transmission protocol. The performance of TCP and UDP through 6to4 tunnel is then compared over the native IPv4 and IPv6 environment. As a result, the findings prove the ease of TCP data transmission via the tunnel compared to both native networks. In contrast, the UDP implementations show the slight difference for them. © 2012 IEEE

    Analysis Of Judge's Decision Against Substitute Charities In Religious Courts Consider From Islamic Law Commission

    Get PDF
    The purpose of this study is to analyze the judge's decision in case number: 132/Pdt.P/2019/PA.Gtloviewed from the Compilation of Islamic Law This research uses a normative-empirical legal research type, where an analysis of the written law is carried out with factual events in the field. In this study, the data sources used are primary data consisting of the results of interviews and field observations, the Civil Code, ILC, and judges' decisions related to the issues being discussed; and secondary data (supporting) scientific works, and other sources related to the problems discussed.The results of the study show that first, the substitute heirs proposed by the applicants in case no. 132/Pdt.P/2019/PA.Gtlo from the late. Zubaida Datau may become a substitute heir based on the provisions formulated in the Compilation of Islamic Law (ILC), provided that the plot of land is the property of the late. Saini Datau. However, if the plot of land is the property of the Almh. Kamaria Datau, then the substitute heir proposed by the applicant, must be declared not accepted by the panel of judges at the Gorontalo PA because he is prevented from becoming an heir based on the ILC formulation. Legal considerations of the panel of judges examining case No. 132/Pdt.P/2019/PA.Gtlo, where the case is declared unacceptable, is that it is unclear/fuzzy, no longer voluntary, but a contentious case, because it contains a dispute between the heirs of the deceased's heirs. Kamaria Datau, and the late. Zubaida Datau

    Data Communications and Networking: Practical Approach

    Get PDF
    This book aimed primarily for students who will be taking subject related to this field. All lab activity are divided to four subtopic which is learning outcomes, introduction, hands on exercises with step by step instruction and self review question. This will give the student knowledge about theoretical background of the lab activity and how to implement the activity by follow the procedures

    Development Of Home Network Sustainable Interface Tools

    Get PDF
    The home network has become a norm in today's life. Previous studies have shown that home network management is a problem for users who are not in the field of network technology. The existing network management tools are far too difficult to understand by ordinary home network users. Its interface is complex, and does not address the home user's needs in their daily use. This paper presents an interactive network management tool, which emphasizes support features for home network users. The tool combine interactive visual appearance with persuasive approach that support sustainability. It is not only understandable to all categories of home network users, but also acts as a feature for the user to achieve usability

    Establishment of IPv6 Network on Intranet Environment

    Get PDF
    Internet Protocol version six (IPv6) is the next generation internet protocol. It is not yet possible to completely migrate to IPv6, but several transitions mechanisms are available to allow IPv6 and IPv4 coexist together in the same network infrastructure. The main benefit of this protocol is a larger address space and enhanced security options. It is not easy to migrate from current Internet Protocol version four (IPv4) to Internet Protocol version six (IPv6) as it is not “Plug n Play” since both are incompatible protocol. For smooth integration between these protocols, native IPv6 testbed (TEST6) was deployed in an intranet environment. In other hand, this gained an experience and confidence before fully integrating it with an existing Internet protocol. This paper describes how TEST6 was setup in intranet environment (TEST6-I) through numerous of process and network test performed to verify the connectivity

    A Survey of IPv6 Deployment

    Get PDF
    The global internetworking (or popular known as Internet) has been very aggressively developed in the last recent years. The technologies of Internet including hardware, software, and protocols expand drastically years by years. IPv6 as the most popular Internet Protocol for Internet will be the main focused for this research. This future promising Internet Protocol which is going to replace the current Internet Protocol (IPv4) is in the right track with so many researches being carried out. This research focused a survey of IPv6 deployment all over the globe. This research also converge the research and development of IPv6 specifically in Malaysia. Although IPv6 technology is very promising, the deployment and development of IPv6 in Malaysia is quite slow compare to other countries. As a conclusion, A survey ofII’v6 came out with a suggestion and solution on how to evoke IPv6 technology in Malaysia

    IPv6 and IPv4 Security Issues

    Get PDF
    In the near future IPv6 is said to become the new version of internet protocol replacing IPv4 protocol. Other than providing huge populated address, IPv6 also provides simplicity in configuration, routing speed, quality of services and more importantly improve the security mechanism. The deployment of IPv6 will not occur over night but it may take several years. Several methods have been found to be applied in the transition of IPv6 to IPv4 protocol. As IPv6 is not yet in full throttle there are possibilities of intrusion and computer threat especially during the transition period. This paper reviews the security threats of an IPv4 and how it ’s going to effect the implementation of IPv6

    Location-Based Access Control In Neighborhood Geosocial Network: A Case Of Emergency Assistance

    Get PDF
    To enforce safer virtual neighborhood environment, access control is essential to specify privileges or access rights to resources in neighborhood geosocial network applications. In the case of emergency circumstances, several concerns in implementing access control have been identified: (1) inefficient message sending to irrelevant recipients (2) location spoofing (3) gossip and rumors due to disclosing information to wrong audience. To address such potential risks, access control specifically tailored for neighborhood geosocial network is required. The objective of this paper is two-fold: First, to propose an access control using density-based and position-based location conditions for neighborhood geosocial network. Second, to design mySOS, a proof-of-concept prototype that incorporate the proposed access control to improve access control for emergency assistance in neighborhood geosocial network. To achieve the objectives, a combination of proposed self-organized segmentation algorithms (density-based) and resident engagement incentives (position-based) are implemented. This study contributes to a new way for access control that will determine user profile in accessing emergency assistance features in a neighborhood geosocial network application
    corecore