Articles

Found 7 Documents
Search
Journal : Journal JCONES

Aplikasi Network Inventory Collection System Untuk Medukung Perencanaan Investasi Teknologi Informasi

Journal JCONES Vol 1, No 1 (2012): Pemanfaatan Teknologi Otomasi dan Jaringan Komputer
Publisher : Journal JCONES

Show Abstract | Original Source | Check in Google Scholar

Abstract

The growth of Information Technology (IT) investment is predicted to develop rapidly in the next few years. This will urge the need of a tool to help IT managers to manage and monitor their asset frequently. In this paper, we identify components that will contribute significantly to the planning of IT investment. The results were derived from a survey that was done in three big cities that might be considered as a representative of IT development in Indonesia, i.e. Jakarta, Surabaya and Denpasar (Bali). Based on the results of the survey, we have built a tool for managing and monitoring the IT assets, including configuration system, devices, storage media, interfaces and installed applications. The tool is utilizing the simple network management protocol (SNMP) for querying all IT assets information from each client/agent in a network.

ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC

Journal JCONES Vol 2, No 1 (2013)
Publisher : Journal JCONES

Show Abstract | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.

ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL UDP DENGAN DCCP MENGGUNAKAN TRAFIK DATA MULTIMEDIA

Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Original Source | Check in Google Scholar

Abstract

The rapid development of network technology has created a multimedia application enters the world of internet. Skype, Yahoo Messenger, Facebook and Line are some examples of applications that provides multimedia features such as free call (VoIP) and video call (video conference) in it. Most of these applications typically use UDP instead of TCP as the transport protocol. The increased of UDP traffic has threaten TCP traffic that appears issues of fairness between the two protocols.In 2006 the IETF introduced a new protocol called Datagram Congestion Control Protocol (DCCP) CCID2 and CCID3. In fact its almost 8 years was introduced to the public, such applications are not using DCCP instead of UDP. So the question of performance, fairness and the Quality of Service level arises for multimedia data services between UDP and DCCP.Based on the results of testing against the Protocol UDP and DCCP, it is found that the average bandwidth utilization between UDP and CCID2 are respectively, 62.15% and 36.54%, the packet loss 1.12% and 10.08%, both of the delay 627 ms, both of the jitter 141 ms and both of the fairness 0.923. Furthermore, the average bandwidth utilization between UDP and CCID3 reaches 63% and 29.79%, the packet loss 0.5% and 0.92%, the delay 148ms and 283ms, the jitter 46ms and 79ms and both of the fairness 0.874. In summary, it can be concluded that the DCCP CCID2 has better performance and more suitable for VoIP/Video Conferencing instead of using the DCCP CCID3.

PEMODELAN KARAKTERISITIK DENIAL OF SERVICE ATTACK MELALUI ANALISIS DATA TRAFIK

Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Original Source | Check in Google Scholar

Abstract

DoS is one example of attacks that can disrupt the infrastructure of computer networks, this type of attack has a typical pattern, where in each attack will send a number of data packets continuously to attack the target. DoS Attack consists of UDP, PING and SYN Flood Attack. This study aims to get a mean, relative frequency, parameter values, the probability distribution, plot the data and the value of MSE. Subsequently analyzed using statistical methods, and modeling to estimate the parameters in the form of a probability distribution. The probability distribution is composed of a gamma distribution, lognormal distribution and weibull distribution. By using this model, it can be shown that the DoS Attack characteristic of UDP Attack and SYN Flood Attack are much closer to the lognormal distribution than Gamma the distribution or Weibull distribution. On the other hand, the distribution of the PING flood attack resembles the gamma distribution.

ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC

Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.

ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL TCP VEGAS DAN UDP DENGAN MENGGUNAKAN DATA STREAMING

Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Original Source | Check in Google Scholar

Abstract

The development of an advanced technology has affected human living in the use of modern communication technology which based on data streaming. Streaming is a transmission technology of sending data, video or audio in real time or pre -recorded from the sender to the receiver. The usage of this technology is very diverse in various activities, so that the data streaming requires a rapid protocol performance in the delivery process. The final task generates comparative characteristics of TCP Vegas and UDP which based on the quality of data streaming services with the parameters of bandwidth utilization test, packet loss, latency, and jitter. The data streaming that has been used includes Voice over IP and video streaming. This comparison is performed using the network simulator 2.From the analysis that has been done, we get the value of the parameters that have been set. In general, it has been found that the percentage of bandwidth utilization on UDP protocol is larger than TCP Vegas. Then, the percentage of packet loss on TCP Vegas is higher than the UDP protocol. While, the value of a latency and jitter on TCP Vegas has a higher value than the UDP protocol. 

RANCANG BANGUN MODEL PENGUJIAN DESTROYER TESTER UNTUK MENGUJI SISTEM KEAMANAN JARINGAN

Journal of Control and Network Systems (JCONES) Vol 5, No 2 (2016)
Publisher : Journal of Control and Network Systems (JCONES)

Show Abstract | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi memudahkan manusia dalam melakukan akses terhadap komputer standalone maupun jaringan komputer. Hal ini dapat berdampak pada keamanan data pada komputer. Sehingga penting dilakukan pengujian terhadap kebijakan keamanan yang akan diambil. Metode pengujian yang digunakan adalah destroyer tester. Teknik serangan yang digunakan dalam pengujian kali ini adalah dos attack. Hal ini bertujuan untuk menguji kekuatan sistem keamanan jaringan. Penelitian tahap pertama adalah melakukan konfigurasi dan pengumpulan data pada target. Tahap kedua adalah membuat aplikasi untuk melakukan pengujian dengan teknik dos attack. Aplikasi ini berbasis web dengan melakukan serangan ping of death, syn attack, smurf attack, land attack, dan UDP flood. Tahap ketiga adalah melakukan pengujian dan menganalisa sistem keamanan pada target. Berdasarkan hasil penelitian dengan metode destroyer tester pada sebuah webserver, dapat ketahui bahwa kekuatan sebuah webserver pada suatu jaringan tidak hanya terdapat pada konfigurasi sistem keamanan menggunakan firewall saja, akan tetapi juga terletak pada spesifikasi server yang digunakan sebagai webserver. Selain itu untuk mengatasi serangan ping of death dan smurf attack, dapat dilakukan dengan cara membatasi ukuran packet icmp yang masuk. Sedangkan untuk serangan syn attack dan land attack, dapat diatasi dengan membatasi jumlah packet syn yang masuk dan permintaan ack.

Co-Authors Adi Nugroho Adi, Satriyo Adiprasetya, Rachmat Afrizal Afrizal Ananta Raditya Murti Andi Rahmatullah Tohir Andi Rahmatulloh Tohir Andre Yusdianto Andy Ardianto Anggraeni, Anindhia Antok Supriyanto Apriyanto, Samuel Christian Arifin Puji Widodo Artanto, Bunggi Rivan Arumsari, Farah Priminta Azwar Anas Benny Febriantono Christian, Samuel Damayanti, Metta Ameilia Dhyaksa, Gilang Wira Dinanta, Rangga Ekodono, Yohanes Endra Rahmawati, Endra Erik Priyo Trenggono Erwin Sutomo Faizal Ardhana Feri Setiawan Adinata Franstia Wira Sukma Susilo Hananto, Priyanggoro Dwi Hendra Setyo A. Nugroho Henry Bambang Setyawan Hoky Ajicahyadi I Putu Mulya Gunawan I Wayan Agus Ista Putra Mahardika Imaniyah, Solechatul Irene Rizky Andini Julianto Lemantara Jusak Jusak Khatulistiwa, Angga Kurniawan Jatmika Kurniawan Jatmiko Kwee, Herry Susanto Lengo, Elisabeth Maria Lestanto Atmaji Mardianto Basuki Mohammad Andriyas Muammar Qadhafi Muchollad, Azid Malil'ula Wildan Muhammad Fuad Muslim, Ibnu Ningsih, Norma Octavianus Wijaya Pantjawati Sudarmaningtyas Prasetya, Gandhi Angga Prasetyo Budi Jatmiko Prayogi, Welly Abdi Puji Widodo, Arifin Putra, Wahyu Septiono Asmara Rachmat Adiprasetya Ramdhani, Shubhan Rangsang Purnama Rilando, Alde Mohammad Rio Astamal Rizky Ananto Putri Rolando, Roy Se, Malkus Willybrodus Slamet Slamet Sofriansyah, Achmad Triadianto Sri Suhandiah Stanly Dody Setiawan Subijono, Tony Sulis Janu Hartati Tan Amelia Teguh Sutanto Tony Soebijono Valentinus Roby Hananto Vicky M Taufik Vicky M. Taufik Vicky Mohammad Taufik Wardana, Dwi Kusuma Wijaya, Iwan Willybrodus, Malkus Yermias Alfandy Oktario Wun Yohan Kurnia Putra Tjumoko Yohanes Setiawan Yudha, Putra Fajar Sandy Zulfikar Rahman, Zulfikar