Selasa, 18 Oktober 2016

Pemanfaatan Metede Blowfish Pada Aplikasi Kriptografi Berbasis Mobile Untuk Teks

4.1 Implementasi Antarmuka
            Implementasi Antarmuka, pada tahap ini akan diperlihatkan beberapa tampilan antarmuka penggunaan pada aplikasi.
4.1.1 Splash Screen dan Login
Splash Screen adalah tampilan awal ketika aplikasi pertama kali dijalankan dan sebelum masuk pada menu login. Gambar 4.1 merupakan implementasi dari  Splash Screen akan muncul hanya beberapa detik dan selanjutnya akan muncul tampilan Login. Gambar 4.1 merupakan tampilan Splash Screen dan Menu Login Aplikasi Enkripsi “ST-Blowfish”:
  

Gambar 4.1 Antarmuka Splash Screen & Login
Pemanfaatan Metede Blowfish Pada Aplikasi Kriptografi Berbasis Mobile Untuk Teks

4.1 Implementasi Antarmuka
            Implementasi Antarmuka, pada tahap ini akan diperlihatkan beberapa tampilan antarmuka penggunaan pada aplikasi.
4.1.1 Splash Screen dan Login
Splash Screen adalah tampilan awal ketika aplikasi pertama kali dijalankan dan sebelum masuk pada menu login. Gambar 4.1 merupakan implementasi dari  Splash Screen akan muncul hanya beberapa detik dan selanjutnya akan muncul tampilan Login. Gambar 4.1 merupakan tampilan Splash Screen dan Menu Login Aplikasi Enkripsi “ST-Blowfish”:
  

Gambar 4.1 Antarmuka Splash Screen & Login

Rabu, 29 Oktober 2014

Computer Science & Engineering



               Computer science is the scientific and practical approach to computation and its applications. It is the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to information, whether such information is encoded as bits in a computer memory or transcribed in genes and protein structures in a biological cell. A computer scientist specializes in the theory of computation and the design of computational systems
Its subfields can be divided into a variety of theoretical and practical disciplines. Some fields, such as computational complexity theory (which explores the fundamental properties of Computational and intractable problems), are highly abstract, while fields such as computer graphics emphasize real-world visual applications. Still other fields focus on the challenges in implementing computation. For example, programming language theory considers various approaches to the description of computation, whilst the study of computer programming itself investigates various aspects of the use of programming language and complex systemsHuman-computer interaction considers the challenges in making computers and computations useful, usable, and universally accessible to humans.
               Computer engineering is a discipline that integrates several fields of electrical engineering and computer science required to develop computer hardware and software. Computer engineers usually have training in electronic engineering (or electrical engineering),software design, and hardware-software integration instead of only software engineering or electronic engineering. Computer engineers are involved in many hardware and software aspects of computing, from the design of individual microprocessorspersonal computers, andsupercomputers, to circuit design. This field of engineering not only focuses on how computer systems themselves work, but also how they integrate into the larger picture.
Usual tasks involving computer engineers include writing software and firmware for embedded microcontrollers, designing VLSI chips, designing analog sensors, designing mixed signal circuit boards, and designing operating systems. Computer engineers are also suited forrobotics research, which relies heavily on using digital systems to control and monitor electrical systems like motorscommunications, andsensors.

Packet Tracer – Investigating a VLAN Implementation Topology




VLAN


Topologi jaringan adalah sebuah pola interkoneksi dari beberapa terminal komputer. Topologi jaringan merupakan representasi geometri dari hubungan antar perangkat (terminal komputer, repeaters, bridges) satu dengan lainnya (Green, 1985:22).

Topologi jaringan sendiri terbagi menjadi dua yaitu:
  1. Physical. Merupakan gambaran fisik dari hubungan antara perangkat (komputer, server, hub, switch, dan kabel jaringan) yang membentuk suatu pola khusus 
  2. Logical. Merupakan gambaran bagaimana suatu perangkat dapatberkomunikasi dengan perangkat lainnya. 
Addressing Table



Objectives
Part 1: Observe Broadcast Traffic in a VLAN Implementation
Part 2: Observe Broadcast Traffic without VLANs
Part 3: Complete Reflection Questions
Background
In this activity, you will observe how broadcast traffic is forwarded by the switches when VLANs are configured and when VLANs are not configured.

Part 1: Observe Broadcast Traffic in a VLAN Implementation
Step 1: Ping from PC1 to PC6.
a. Wait for all the link lights to turn to green. To accelerate this process, click Fast Forward Time located in the bottom yellow tool bar.
b. Click the Simulation tab and use the Add Simple PDU tool. Click on PC1, and then click on PC6.
c. Click the Capture/Forward button to step through the process. Observe the ARP requests as they traverse the network. When the Buffer Full window appears, click the View Previous Events button.
d. Were the pings successful? Why?
e. Look at the Simulation Panel, where did S3 send the packet after receiving it?
Packet Tracer – Investigating a VLAN Implementation
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
In normal operation, when a switch receives a broadcast frame on one of its ports, it forwards the frame out all other ports. Notice that S2 only sends the ARP request out Fa0/1 to S1. Also notice that S3 only sends the ARP request out F0/11 to PC4. PC1 and PC4 both belong to VLAN 10. PC6 belongs to VLAN 30. Because broadcast traffic is contained within the VLAN, PC6 never receives the ARP request from PC1. Because PC4 is not the destination, it discards the ARP request. The ping from PC1 fails because PC1 never receives an ARP reply.
Step 2: Ping from PC1 to PC4.
a. Click the New button under the Scenario 0 dropdown tab. Now click on the Add Simple PDU icon on the right side of Packet Tracer and ping from PC1 to PC4.
b. Click the Capture/Forward button to step through the process. Observe the ARP requests as they traverse the network. When the Buffer Full window appears, click the View Previous Events button.
c. Were the pings successful? Why?
d. Examine the Simulation Panel. When the packet reached S1, why does it also forward the packet to PC7?
Part 2: Observe Broadcasts Traffic without VLANs
Step 1: Clear the configurations on all three switches and delete the VLAN database.
a. Return to Realtime mode.
b. Delete the startup configuration on all 3 switches. What command is used to delete the startup configuration of the switches?
c. Where is the VLAN file stored in the switches?
d. Delete the VLAN file on all 3 switches. What command deletes the VLAN file stored in the switches?
Step 2: Reload the switches.
Use the reload command in privileged EXEC mode to reset all the switches. Wait for the entire link to turn green. To accelerate this process, click Fast Forward Time located in the bottom yellow tool bar.
Step 3: Click Capture/Forward to send ARP requests and pings.
a. After the switches reload and the link lights return to green, the network is ready to forward your ARP and ping traffic.
b. Select Scenario 0 from the drop down tab to return to Scenario 0.
c. From Simulation mode, click the Capture/Forward button to step through the process. Notice that the switches now forward the ARP requests out all ports, except the port on which the ARP request was received. This default action of switches is why VLANs can improve network performance. Broadcast traffic is contained within each VLAN. When the Buffer Full window appears, click the View Previous Events button.
Packet Tracer – Investigating a VLAN Implementation
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Part 3: Complete Reflection Questions
1. If a PC in VLAN 10 sends a broadcast message, which devices receive it?
2. If a PC in VLAN 20 sends a broadcast message, which devices receive it?
3. If a PC in VLAN 30 sends a broadcast message, which devices receive it?
4. What happens to a frame sent from a PC in VLAN 10 to a PC in VLAN 30?
5. In terms of ports, what are the collision domains on the switch?
6. In terms of ports, what are the broadcast domains on the switch?

Jumat, 24 Oktober 2014

komputer terbaik

Bets Computer

A personal computer (PC) is a general-purpose computer, whose size, capabilities and original sale price makes it useful for individuals, and is intended to be operated directly by an end-user with no intervening computer operator. This contrasted with the batch processing or time-sharing models which allowed larger, more expensive minicomputer and mainframe systems to be used by many people, usually at the same time. Large data processing systems require a full-time staff to operate efficiently.

5 PC Terbaik 2014 :

1. Apple iMac 27

Engineered to the very last detail

And then some

Creating such a stunningly thin design took equally stunning feats of technological innovation. We meticulously designed and engineered everything about iMac from the inside out. The result is an advanced, elegant all-in-one computer that’s as much a work of art as it is state of the art.

Spesifikasi Apple iMac Nvidia Geforce GT 775M with 1 GB – 3.2GHz Intel Quad-Core Ci5 – 27″ – Silver

  • Ukuran (L x W x H cm) = 65×51.6×1
  • Berat (kg) = 9.54
  • Warna = Putih
  • Tipe = iMac
  • Ukuran Layar (in) = 27.0
  • Hard Disk = 1000
  • RAM = 8
  • Kapasitas Penyimpanan = 1000
  • Kecepatan CPU = 3.20
  • Tipe Processor = Intel
  • Sistem Operasi = iOS
  • Fitur Tampilan = HD
  • Tipe Memori = 8
  • Built in Memory = 8 GB RAM
  • Kecepatan Processor = 3.2 GHz
  • Tipe Processor = Intel Core i5
  • Sistem Operasi = Mac OS
Kelebihan Apple iMac Nvidia Geforce GT 775M with 1 GB – 3.2GHz Intel Quad-Core Ci5 – 27″ – Silver
  • 27″
  • Quad Core i5 3.2 GHz
  • Nvidia GeForce GT 775M
  • 1 TB HDD
  • 8 GB RAM
Apple iMac Nvidia Geforce GT 775M with 1 GB – 3.2GHz Intel Quad-Core Ci5 – 27″ – Silver
  • Apple iMac
  • Apple Wireless Keyboard
  • Apple Magic Mouse
  • Kabel Power

 

2 dell precision T1700 SFF

Compact, affordable and powerful

Get Workstation performance for about the price of a desktop with the Dell Precision™ T1700, available in two compact sizes that are perfect for any environment. Available with 4th Gen Intel® Core™ i5 and i7 processors. Fully customizable (optional).

  • Starting Price $91867

Processor

  • Intel® Xeon® Quad Core (E3-1271, E3-1270, E3-1246, E3-1241, E3-1245, E3-1240, E3-1226, E3-1225, E3-1220)
  • Intel® Core™ i7 (4790, 4770)
  • Intel® Core™ i5 (4690, 4590, 4570)
  • Intel® Core™ i3 (4150, 4130)
  • Windows 8.1 Pro, 64-bit English
  • Windows 7 Professional English64bit (Includes Windows 8.1 Pro license)
  • Tech Specs
  • Overview
  • Services

Processor Help Me Choose

  • Intel® Xeon® Quad Core (E3-1271, E3-1270, E3-1246, E3-1241, E3-1245, E3-1240, E3-1226, E3-1225, E3-1220)
  • Intel® Core™ i7 (4790, 4770)
  • Intel® Core™ i5 (4690, 4590, 4570)
  • Intel® Core™ i3 (4150, 4130)

Operating SystemHelp Me Choose

  • Windows 8.1 Pro, 64-bit English
  • Windows 7 Professional English64bit (Includes Windows 8.1 Pro license)

Chipset

  • Intel® C226

Memory

  • Up to 32GB2 DDR3 SDRAM at 1600Mhz - 4 DIMMS

 

 

 

3 Apple iMac-27 inci


4 Dell optiplex 9010 AIO


5 Gateway DX4870 - UB2B

IPV6 TUTORIAL

IPv6 Tutorial

Internet Protocol version 6

Internet has been growing extremely fast so the IPv4 addresses are quickly approaching complete depletion. Although many organizations already use Network Address Translators (NATs) to map multiple private address spaces to a single public IP address but they have to face with other problems from NAT (the use of the same private address, security…). Moreover, many other devices than PC & laptop are requiring an IP address to go to the Internet. To solve these problems in long-term, a new version of the IP protocol version 6 (IPv6) was created and developed. IPv6 was created by the Internet Engineering Task Force (IETF), a standards body, as a replacement to IPv4 in 1998. So what happened with IPv5? IP Version 5 was defined for experimental reasons and never was deployed. While IPv4 uses 32 bits to address the IP (provides approximately 232 = 4,294,967,296 unique addresses but in fact about 3.7 billion addresses are assignable because the IPv4 addressing system separates the addresses into classes and reserves addresses for multicasting, testing, and other specific uses), IPv6 uses up to 128 bits which provides 2128 addresses or approximately 3.4 * 1038 addresses. Well, maybe we should say it is extremely extremely extremely huge :)

IPv6 Address Types


A single interface may be assigned multiple IPv6 addresses of any type (unicast, anycast, multicast)
IPv6 address format
Format:
x:x:x:x:x:x:x:x– where x is a 16 bits hexadecimal field and x represents four hexadecimal digits.
An example of IPv6:
2001:0000:5723:0000:0000:D14E:DBCA:0764
There are:
+ 8 groups of 4 hexadecimal digits.
+ Each group represents 16 bits (4 hexa digits * 4 bit)
+ Separator is “:”
+ Hex digits are not case sensitive, so “DBCA” is same as “dbca” or “DBca”…
IPv6 (128-bit) address contains two parts:
+ The first 64-bits is known as the prefix. The prefix includes the network and subnet address. Because
addresses are allocated based on physical location, the prefix also includes global routing information. The
64-bit prefix is often referred to as the global routing prefix.
+ The last 64-bits is the interface ID. This is the unique address assigned to an interface.
Note: Addresses are assigned to interfaces (network connections), not to the host. Each interface can have
more than one IPv6 address.
Rules for abbreviating IPv6 Addresses:
+ Leading zeros in a field are optional
2001:0DA8:E800:0000:0260:3EFF:FE47:0001 can be written as
2001:DA8:E800:0:260:3EFF:FE47:1
+ Successive fields of 0 are represented as ::, but only once in an address:
2001:0DA8:E800:0000:0000:0000:0000:0001 -> 2001:DA8:E800::1
Other examples:
– FF02:0:0:0:0:0:0:1 => FF02::1
– 3FFE:0501:0008:0000:0260:97FF:FE40:EFAB = 3FFE:501:8:0:260:97FF:FE40:EFAB =
3FFE:501:8::260:97FF:FE40:EFAB
– 0:0:0:0:0:0:0:1 => ::1
– 0:0:0:0:0:0:0:0 => ::
IPv6 Addressing In Use
IPv6 uses the “/” notation to denote how many bits in the IPv6 address represent the subnet.
The full syntax of IPv6 is


 

where
+ ipv6-address is the 128-bit IPv6 address
+ /prefix-length is a decimal value representing how many of the left most contiguous bits of the address
comprise the prefix.
Let’s analyze an example:
2001:C:7:ABCD::1/64 is really
2001:000C:0007:ABCD:0000:0000:0000:0001/64
+ The first 64-bits 2001:000C:0007:ABCD is the address prefix
+ The last 64-bits 0000:0000:0000:0001 is the interface ID
+ /64 is the prefix length (/64 is well-known and also the prefix length in most cases)
In the next part, we will understand more about each prefix of an IPv6 address.
The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for the assignment of
IPv6 addresses. ICANN assigns a range of IP addresses to Regional Internet Registry (RIR) organizations.
The size of address range assigned to the RIR may vary but with a minimum prefix of /12 and belong to the
following range: 2000::/12 to 200F:FFFF:FFFF:FFFF::/64. 

......

 

 

 

Sabtu, 18 Oktober 2014

software engineer vs software developer

Software developer

Tidak semua pengembang perangkat lunak itu dikerjakan oleh insinyur. Software engineering berarti menerapkan prinsip-prinsip rekayasa untuk pembuatan perangkat lunak. Hal ini dapat terasa aneh untuk berbicara tentang rekayasa sesuatu yang tidak memiliki massa atau mengambil ruang, tetapi perangkat lunak tertanam dalam hal-hal yang memiliki massa. Software melakukan segala sesuatu dari membuang obat untuk mengontrol peralatan besar. Banyak orang juga mengandalkan perangkat lunak untuk melakukan tugas pekerjaan, apakah mereka bekerja di kantor atau telecommute. Seperti yang kita semua tahu, aplikasi perangkat lunak dapat kerusakan. Ini bukan hanya menjembatani kecelakaan itu ... dan itu bukan hanya jembatan yang membutuhkan dasar yang baik. Insinyur perangkat lunak dimulai dengan studi yang mendalam tentang persyaratan. Mereka bekerja melalui proses pembangunan secara sistematis; ini disebut siklus hidup pengembangan perangkat lunak.Pengembangan perangkat lunak dan rekayasa perangkat lunak adalah istilah yang saling terkait, tetapi tidak cukup sampai disitu. Seorang insinyur perangkat lunak yang terlibat dalam pengembangan perangkat lunak; 

Different Educational Paths

Karena istilah yang sering bingung, itu bisa rumit untuk tahu siapa yang seorang insinyur perangkat lunak dan yang berpengalaman dalam hanya bagian dari proses pengembangan perangkat lunak - misalnya coding.Beberapa negara yang ketat tentang software engineer judul, tetapi banyak yang tidak. Banyak perusahaan memilih jabatan untuk bagaimana mereka terdengar. Steve McConnell, insinyur perangkat lunak dan penulis buku, mengingatkan kita, meskipun, bahwa hanya karena istilah ini terlalu sering digunakan, bukan berarti tidak memiliki nilai. Teknik, ia berpendapat, adalah apa pengembangan perangkat lunak harus sekitar. Cari perguruan tinggi untuk Pengembangan Perangkat Lunak di sini dan Kolese Rekayasa Perangkat Lunak di sini .
Jika seseorang tertarik dalam penciptaan perangkat lunak atau pengembangan, mereka memiliki beberapa pilihan. Ini termasuk program studi dalam pemrograman perangkat lunak, ilmu komputer, atau rekayasa perangkat lunak. Program dalam pemrograman umumnya ditawarkan di asosiasi atau tingkat sarjana.[Informasi tambahan mengenai program gelar pengembangan perangkat lunak ] program rekayasa perangkat lunak, di sisi lain, yang ditawarkan di tingkat sarjana atau master. Mereka tidak hanya panjang, tetapi lebih komprehensif. Mereka berusaha untuk menerapkan prinsip-prinsip rekayasa untuk semua tahapan proses pengembangan perangkat lunak, dari analisis persyaratan untuk proses perangkat lunak. Insinyur perangkat lunak tahu banyak tentang komputer, dan mereka juga tahu sedikit tentang kerja sama tim. Dalam posisi keluar di dunia nyata, mereka sering akan mengkhususkan, dengan fokus pada tahap tertentu; mereka diharapkan, meskipun, untuk dapat masuk ke salah satu peran ganda. Seorang programmer, di sisi lain, terutama akan belajar untuk melakukan coding komputer - salah satu bagian dari siklus hidup pengembangan perangkat lunak. Cari Sarjana Software Program Rekayasa di wilayah Anda ]
Insinyur perangkat lunak diharapkan untuk menyelesaikan sebuah proyek desain di mana mereka menerapkan prinsip-prinsip rekayasa. Hal ini memberikan pengalaman berharga bagi dunia di luar kelas. Insinyur perangkat lunak kadang-kadang menghasilkan dikemas perangkat lunak, tetapi mereka lebih sering menciptakan sistem yang disesuaikan untuk klien individu. Tujuan mereka adalah untuk membantu klien mencapai tujuan nya dan melakukannya dengan cara yang efisien.

Prospek pekerjaan untuk Programmer Software dan Software Engineers

Pengusaha dapat memilih untuk menggunakan judul yang berbeda. Apapun yang sedang digemari di wilayah geografis Anda, meskipun, itu penting untuk menyadari realitas pasar kerja. Dalam tahun-tahun mendatang, prospek pekerjaan diharapkan jauh lebih baik untuk perangkat lunak profesional dengan khusus, pengetahuan yang komprehensif dari mereka adalah untuk orang-orang yang keahliannya terbatas pada pemrograman. Biro Statistik Tenaga Kerja memperkirakan kenaikan 32% dalam pekerjaan untuk insinyur perangkat lunak selama tahun 2008 sampai 2018. Selama tahun-tahun yang sama, pekerjaan untuk programmer diperkirakan menurun sebesar 3%. Menurut BLS, posisi rekayasa perangkat lunak cenderung outsourcing.

Sebuah gelar dalam rekayasa perangkat lunak, sementara itu, dapat menjadi norma bagi mereka yang bekerja dengan perangkat lunak tertanam atau aplikasi berisiko tinggi lainnya.
 Sebuah ujian lisensi saat ini sedang dikembangkan atas permintaan sepuluh negara. Organisasi seperti IEEE-USA memprediksi bahwa rekayasa lisensi akan menjadi norma bagi sebagian orang, meskipun tidak semua, peran pengembangan perangkat lunak
.