Claim Missing Document
Check
Articles

Found 21 Documents
Search

ANALISIS DAN PERANCANGAN JARINGAN WIRELESS DENGAN WIRELESS DISTRIBUTION SYSTEM MENGGUNAKAN USER AUTHENTICATION BERBASIS MULTI-FACTOR AUTHENTICATION Rusdan, Muchamad; Sabar, Muhamad
JOINT (Journal of Information Technology) Vol 2 No 1 (2020): JOINT: Journal of Information Technology
Publisher : Bagian Penelitian, Pengabdian Masyarakat & Pusat Inovasi STMIK "AMIKBANDUNG"

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1287.487 KB) | DOI: 10.47292/joint.v2i1.004

Abstract

Jaringan wireless merupakan salah satu alternatif terbaik dalam membangun jaringan komputer yang praktis dan fleksibel serta memiliki mobilitas tinggi. Sebagian besar institusi menggunakan jaringan wireless untuk mendukung jaringan kabel yang sudah ada, namun pada kenyataannya jaringan wireless tersebut tetap menggunakan media kabel sebagai backbone dari access point, yang bertujuan supaya pengguna layanan bisa melakukan akses internet dan pencarian informasi. Permasalahan dari penggunaan kabel sebagai media backbone ini dapat menjadi kendala yang berarti pada tempat-tempat yang sulit dijangkau oleh kabel. Jaringan wireless memberikan kemudahan dan fleksibilitas yang cukup tinggi serta nyaman untuk digunakan. Selama berada dalam area cakupan jaringan wireless, pengguna dapat mengakses internet setiap saat. Untuk membuat sebuah jaringan wireless terkoneksi ke internet dengan aman dan user-friendly, maka kita dapat membuat sebuah sistem user authentication yang berbasis Multi-Factor Authentication (MFA) yang dapat digunakan untuk melakukan Authentication dan Authorization. Pada umumnya setiap pengguna dapat menggunakan layanan jaringan wireless yang ada dengan cara melakukan user authentication yang berbasis Wifi Protected Access 2 Pre-Shared Key (WPA2-PSK). Tujuan penelitian ini antara lain adalah mengembangkan jaringan wireless yang menggunakan user authentication berbasis Multi-factor Authentication (MFA) untuk dapat melakukan koneksi pada jaringan wireless demi meningkatkan keamanan serta kemudahan dalam penggunaan jaringan wireless yang ada. Metode penelitian yang digunakan pada penelitian ini menggunakan metode penelitian deskriptif kualitatif, dengan pengumpulan data menggunakan teknik studi literatur dan observasi. Setelah dilakukan analisis dan disain dapat disimpulkan bahwa user authentication berbasis Multi-factor Authentication (MFA) aman dan user-friendly yang mampu membedakan pengguna yang diizinkan dan tidak diizinkan untuk menggunakan layanan jaringan wireless.
USER AUTHENTICATION JARINGAN NIRKABEL BERBASIS WEB MENGGUNAKAN RADIUS DI UNIVERSITAS BALE BANDUNG (UNIBBA) Muchamad Rusdan; Asep Ririh Riswaya
Jurnal Computech & Bisnis (e-Journal) Vol 12, No 2 (2018): Jurnal Computech & Bisnis
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.882 KB) | DOI: 10.55281/jcb.v12i2.177

Abstract

In this study, problems arise due to the use of WPA2-based user authentication. Constraints faced in using WPA2 are difficult to distinguish between users of wireless network services that are permitted and not permitted. The purpose of this study is that each wireless network user at Bale Bandung University (UNIBBA) can be distinguished between users who are permitted and not permitted so that wireless networks become safe, comfortable and user-friendly. UNIBBA is one of the educational institutions in Bandung Regency, which makes wireless networks a standard facility provided to students, lecturers, and employees that can be accessed through mobile devices that support wireless networks. The research method used is the waterfall method. The results of this study created a web-based wireless network user authentication system using RADIUS that is safe and user-friendly, by testing on the RADIUS server side and web login form.Keywords:user authentication, RADIUS, waterfall, wireless network DOI 10.5281/zenodo.3373720
USER AUTHENTICATION JARINGAN NIRKABEL BERBASIS WEB MENGGUNAKAN RADIUS DI UNIVERSITAS BALE BANDUNG (UNIBBA) Muchamad Rusdan; Asep Ririh Riswaya
Jurnal Computech & Bisnis (e-Journal) Vol 12, No 2 (2018): Jurnal Computech & Bisnis
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.882 KB) | DOI: 10.55281/jcb.v12i2.177

Abstract

In this study, problems arise due to the use of WPA2-based user authentication. Constraints faced in using WPA2 are difficult to distinguish between users of wireless network services that are permitted and not permitted. The purpose of this study is that each wireless network user at Bale Bandung University (UNIBBA) can be distinguished between users who are permitted and not permitted so that wireless networks become safe, comfortable and user-friendly. UNIBBA is one of the educational institutions in Bandung Regency, which makes wireless networks a standard facility provided to students, lecturers, and employees that can be accessed through mobile devices that support wireless networks. The research method used is the waterfall method. The results of this study created a web-based wireless network user authentication system using RADIUS that is safe and user-friendly, by testing on the RADIUS server side and web login form.Keywords:user authentication, RADIUS, waterfall, wireless network DOI 10.5281/zenodo.3373720
Development of Front End on Tour and Travel Applications Using Python and Django Framework in PT. Industri Telekomunikasi Indonesia Siti Nurhasanah; Muchamad Rusdan
Journal of Informatics and Communication Technology (JICT) Vol 2 No 1 (2020): Juni
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (591.368 KB) | DOI: 10.52661/j_ict.v2i1.42

Abstract

The purpose of the study was to develop a website-based tour and travel application on the frontend and to make ticket reservation facilities. The research method uses a qualitative approach with data collection techniques using observation and literature study. While the system development method used is the Rational Unified Process (RUP) method. The results of the research, the development of website-based tour and travel applications on the frontend can be made with the programming language Python and Django framework and coupled with the bootstrap feature can make the frontend display on the tour and travel application more attractive. Creating a tour and travel application is expected to meet the needs of companies to improve performance in the business of PT INTI, especially in the field of information technology in the field of tour and travel services to facilitate customers to obtain information about tourist attractions, tour packages, and ticket reservations provided at tour and travel website.
PENGEMBANGAN KEAMANAN CYBER PADA CLOUD COMPUTING UNTUK USAHA KECIL DAN MENENGAH Muchamad Rusdan
Jurnal Ilmiah Teknologi Infomasi Terapan Vol. 5 No. 3 (2019)
Publisher : Universitas Widyatama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.475 KB) | DOI: 10.33197/jitter.vol5.iss3.2019.298

Abstract

The main objective of this research is to test effective security strategies for SMEs on cloud computing technology, by examining security threats for SMEs, mitigation measures, and the best strategies for effective security in a cloud computing environment. Cloud computing is a relatively new paradigm that presents significant business benefits and enormous opportunities for small and medium businesses. As the information technology (IT) landscape develops, SMEs need to find effective strategies to meet business demands. However, many SMEs are reluctant to adopt cloud computing technology due to inherent security, privacy, and trust issues, as well as regulatory risks and compliance implications. Preliminary studies show an increasing number of cybersecurity attacks targeting SMEs in the cloud environment. To address security threats, there is a need to establish best practices, standards, and guidelines that can be followed by SMEs. This study addresses two research objectives: (i) to identify security threats and challenges facing SMEs in the cloud environment and determine the best mitigation strategies and, (ii) to develop a security strategy framework for SMEs in the context of cloud computing. The overall contribution of this research is the proposed model, which integrates four strategic components: the Cloud Model, the Security Model, the Compliance Model, and the Main Security Component.
DESAIN JARINGAN WIRELESS MENGGUNAKAN DISTRIBUTION SYSTEM (WDS) DAN PENGUJIAN BERDASARKAN QUALITY OF SERVICE (QOS) Muchamad Rusdan; Muhamad Sabar
Jurnal Ilmiah Teknologi Infomasi Terapan Vol. 6 No. 1 (2019)
Publisher : Universitas Widyatama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (938.11 KB) | DOI: 10.33197/jitter.vol6.iss1.2019.318

Abstract

The purpose of this research is to design a wireless network that utilizes wireless lines as a backbone on all access points except the base station point that still uses UTP cable as its backbone and expands the coverage area of ??wireless networks that are able to cover all parts of Widyatama University. The results of wireless network design with WDS will be tested by simulating. Then testing will be focused on parameters of delay, packet loss, throughput, and jitter using the Quality of Service (QoS) method using the Axis netTools application. Wireless network design with Wireless Distribution System (WDS) has a better level of flexibility than a backbone that uses Unshielded Twisted Pair (UTP) cable. The test results show that throughput, delay, packet loss, and jitter show good results. Throughput test results obtained an average value of throughput with a percentage of 90%, can be categorized GOOD with index 3, while the delay test results obtained an average value of 107.8 can be categorized VERY GOOD with index 4, then the average value of packet loss with a percentage of 2%, can be categorized GOOD with index 3, and the results of the jitter test obtained varying values ??with an average value of jitter of 1.71 ms, can be categorized GOOD with index 3.
PENGEMBANGAN APLIKASI STANDAR PRODUKSI DAN PEMAKAIAN BAHAN PADA PERUSAHAAN KULIT IMITASI BERBASIS WEBSITE Muchamad Rusdan; Imam Yunianto; Kurniawan
Jurnal Ilmiah Teknologi Infomasi Terapan (JITTER) Vol. 6 No. 2 (2020)
Publisher : Universitas Widyatama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.775 KB) | DOI: 10.33197/jitter.vol6.iss2.2020.360

Abstract

The purpose of this research is to provide ease in reading articles on the standard production and use of imitation leather. Help reduce the level of errors in viewing the standard article production and use of materials by the operator. Operators can more easily enter and change data on the standard production and use of faux leather. It is helping operators who are elderly and have vision problems in seeing and determining production standards and material usage. Bits of help reduce night shift operator errors that lack concentration when looking at the standard production book and the use of faux leather due to drowsiness. This study uses a qualitative approach to data collection techniques using observation, interviews, and literature study. The system development model used in this study is the Waterfall model. The results of this study indicate that the application of production standards and the use of imitation leather material is very easy to use, fast enough in processing or carrying out its functions, very helpful for operators who have problems with their vision, it is quite feasible to replace the previous production standards.
Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication Muchamad Rusdan; Muhamad Sabar
Journal of Information Technology Vol 2 No 1 (2020): JOINT: Journal of Information Technology
Publisher : LPPM STMIK AMIK BANDUNG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47292/joint.v2i1.004

Abstract

Wireless networks are one of the best alternatives in building practical and flexible computer networks that have high mobility. Most of them use wireless networks to support existing cable networks, but on wireless networks, they still use cable media as a backbone of the access point, which supports communication users can access the internet and find information. The problem of using cables as backbone media can be a significant challenge in places that are difficult to reach by wires. Wireless networks provide convenience and convenience that is high enough to use. As long as they are in an area that is supported by a wireless network, users can access the internet at any time. To make the wireless network connected to the internet safe and easy to use, we can create a user authentication system based on Multi-Factor Authentication (MFA) that can be used to authenticate and authorize. In general, each user can use existing wireless network services by verifying users based on Wifi Protected Access 2 Pre-Shared Key (WPA2-PSK). The purpose of this research is to develop a wireless network that uses Multi-Factor Authentication (MFA) based user authentication to be able to connect to the wireless network to increase security and provide the use of existing wireless networks. The research method used in this study uses descriptive qualitative research methods, with data collection using literature study and observation techniques. After analysis and design, it can be concluded that user authentication is based on Multi-factor Authentication (MFA) in a safe and user-friendly manner that can determine the users who are allowed and not allowed to use wireless networks.
Design of Wireless Network System for Digital Village Using Wireless Distribution System Muchamad Rusdan
Journal of INISTA Vol 1 No 2 (2019): Mei 2019
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/inista.v1i2.66

Abstract

The purpose of this research is to create a wireless network design in Cijambe Village using WDS so that Cijambe Village can enjoy internet services through wireless networks, which can be used to find information, communication, and market products owned by village communities. A wireless network is one of the best alternatives in building a computer network that is practical and flexible and has high mobility. Most organizations use wireless networks to support existing cable networks, but in reality, the wireless network still uses Unshielded Twisted Pair (UTP) cable media as the backbone of Access Points (AP). Cijambe Village is a village located in Paseh District, Sumedang Regency. Cijambe village is divided into two hamlets, namely Cijambe Hamlet and Parugpug Hamlet. Cijambe village has an area of 357 hectares. The research method used in this study is a qualitative descriptive research method. The steps taken in this research are analysis and design. the conclusion is that wireless network design for digital villages using Wireless Distribution System (WDS) has a better degree of flexibility than the backbone that uses Unshielded Twisted Pair (UTP) cable. Radio wave signals from 19 AP units can reach the entire area of Cijambe Village which has an area of 357 hectares and is divided into 2 hamlets namely, Hamlet Cijambe and Parugpug Hamlet. The design made has thought of a standard level of security with routers and firewalls.
PERENCANAAN PENERAPAN GREEN COMPUTING DI LABORATORIUM KOMPUTER UMUM (LKU) UNIVERSITAS WIDYATAMA BANDUNG Muchamad Rusdan
Jurnal TEDC Vol 11 No 3 (2017): Jurnal TEDC
Publisher : UPPM Politeknik TEDC Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.588 KB)

Abstract

Green computing adalah suatu tindakan dan program untuk meminimalisir dampak buruk dari penggunaanteknologi terhadap kelangsungan lingkungan hidup. Tujuan dan manfaat penelitian ini adalah membuatperencanaan penerapan green computing di Laboratorium Komputer Umum Universitas Widyatama dalamupaya penghematan energi listrik, mengurangi penggunaan daya listrik yang berlebihan, dan mengurangiemisi karbon yang berpengaruh terhadap naiknya suhu bumi (global warming). Pengumpulan data dilakukandengan studi pustaka, observasi dan wawancara yang dilakukan terhadap Biro Fasilitas, Pusat TeknologiInformasi, dan Sekretariat Laboratorium Universitas Widyatama. Hasil penelitian menunjukkan kontribusipenggunaan energi listrik Laboratorium Komputer Umum Universitas Widyatama Bandung terhadap biayadan emisi CO2 cukup tinggi, sebagai upaya penghematan energi listrik, mengurangi penggunaan daya listrikyang berlebihan, dan mengurangi emisi karbon yang berpengaruh terhadap naiknya suhu bumi telahdilakukan oleh Universitas Widyatama Bandung dengan pendekatan konsep green use, green disposal,green design, dan green manufacturing.Kata kunci: Green Computing, Ramah Lingkungan, Laboratorium Komputer