Claim Missing Document
Check
Articles

Found 37 Documents
Search

PENERAPAN REPEATER DENGAN MENGGUNAKAN METODE NETWORK COVERAGE ANALYSIS DAN LOAD BALANCING UNTUK MENINGKATKAN KINERJA JARINGAN Arsa Wisesa, Gde Bagus Aryadita; Azhar, Raisul; Marzuki, Khairan
Djtechno: Jurnal Teknologi Informasi Vol 6, No 3 (2025): Desember
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/djtechno.v6i3.7553

Abstract

Perkembangan teknologi jaringan nirkabel menuntut ketersediaan layanan internet yang stabil, cepat, dan memiliki jangkauan luas. Namun, dibeberapa tempat masih ditemukan permasalahan berupa area blank spot serta distribusi bandwidth yang tidak merata. Hal ini berdampak pada menurunnya produktivitas dan mengganggu kualitas layanan publik. Penelitian ini bertujuan untuk menganalisis penerapan repeater dengan metode Network Coverage Analysis dan teknik Load Balancing berbasis Per Connection Classifier (PCC) dalam meningkatkan kinerja jaringan wireless. Penelitian ini menggunakan metode eksperimen (quasi experiment) dengan implementasi yang dilakukan dengan menempatkan repeater pada jarak 40 meter dan 50 meter dari access point utama, dan dilakukan pengujian parameter kinerja jaringan yang mencakup Received Signal Strength Indicator (RSSI), throughput, latency, dan packet loss. Hasil penelitian menunjukkan bahwa penerapan repeater mampu memperluas jangkauan sinyal hingga 50 meter dengan kualitas RSSI yang masih berada pada kategori Good hingga Fair. Sementara itu, penerapan load balancing dengan metode PCC terbukti efektif dalam mendistribusikan trafik secara merata sehingga tidak terjadi dominasi bandwidth oleh salah satu pengguna. Pengukuran QoS memperlihatkan bahwa throughput tetap stabil, latency masih dalam batas wajar, dan packet loss tercatat 0% di semua titik pengujian. Kesimpulannya, kombinasi penerapan repeater dan load balancing PCC berhasil meningkatkan kinerja jaringan pada aspek cakupan sinyal dan kestabilan koneksi.
SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) Dadang Priyanto; Raisul Azhar
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 16 No. 1 (2016)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v16i1.12

Abstract

Data is very important its existence to be protected if the data has a value, or a specific confidentiality. There are so many techniques that can be used to secure the data, one is to apply the method Encryption and Decryption. In the Encryption Method and Description using various types of algorithms. Applications built using algorithms Encription Data Standard (DES). This algorithm emphasizes on input (plaintext) whose length is 64 bits and a key length of 56 bits, and through 16 stages or iterations. Results from making this application can be used to encrypt all files except the video. This application has an encryption rate of 3 sec / each file capacity of 1024 bytes. The rate of speed encryption and decryption with polygons forming linear graph is a straight line.
APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL Raisul Azhar; Kurniawan Kurniawan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 16 No. 1 (2016)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v16i1.15

Abstract

Mobile phones and smartphones providing the basic features of SMS (Short Message Service). Messages sent through SMS facility sometimes confidential, so that the necessary mechanisms to protect messages from crime. Mechanism that can be used to protect the message is to use a cryptographic algorithm Rijndael. This algorithm is a cryptographic algorithm chipher 128-bit block that has the ability to protect confidential messages. This research resulted in an application that can be used to protect the SMS message when the message is sent and received by users. Based on research conducted on the length of different messages with the same key length is obtained that the length of the message used computing time takes longer than the length of the message is the same and different key lengths.
ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET Raisul Azhar
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 15 No. 1 (2015)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v15i1.26

Abstract

The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. The stages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confguring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffc transmission of data packets or internet traffc usage by users.
APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT Sadam Husen; Raisul Azhar
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 15 No. 2 (2016)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v15i2.36

Abstract

STMIK Bumigora has fve internet hotspot access point which can be used by students. Fifth hotspot wireless access point includes faculty, labs, students, faculty and for management purposes. The use of wireless networks for internet access led to the illegal activities that can not be monitored by the network administrator. Activity is mainly on the use of the router that serves as a proxy router connected directly to the ISP (Internet Service Provider). Illegal activities are often done by the students is trying to log into any network devices using bruteforce method. Techniques used include using remote access such as ssh, telnet and ftp. In addition, the activity of port scanning is often performed by the students to observe the security gaps that are still weak in a hotspot, especially at the port still open on the network. To overcome this problem, researchers built an application that is capable of managing and monitoring security hotspots making it easier for network administrators to take action against such illegal activities. Research method used is SDLC, in which the system is intended to develop a system that has existed previously in PUSTIK STMIK Bumigora Mataram
Developing Application in Anticipating DDoS Attacks on Server Computer Machines Anthony Anggrawan; Raisul Azhar; Bambang Krismono Triwijoyo; Mayadi Mayadi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 20 No. 2 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v20i2.410

Abstract

The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.
Sistem Monitoring Multi Perangkat Jaringan Berbasis Simple Network Management Protocol (SNMP) dengan Notifikasi Telegram Ardani, Awin Hersa; Azhar, Raisul; Asroni, Ondi
RIGGS: Journal of Artificial Intelligence and Digital Business Vol. 5 No. 1 (2026): Februari - April
Publisher : Prodi Bisnis Digital Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/riggs.v5i1.7125

Abstract

Perkembangan teknologi jaringan nirkabel menuntut sistem monitoring yang mampu memantau perangkat jaringan secara real-time dan terpusat. Monitoring manual berpotensi menimbulkan keterlambatan deteksi gangguan, berdampak pada penurunan kualitas layanan, dan meningkatnya risiko downtime operasional. Ketiadaan notifikasi otomatis mengharuskan administrator melakukan pengecekan berkala secara langsung, yang tidak efisien terutama saat administrator tidak berada di lokasi. Penelitian ini bertujuan merancang dan mensimulasikan prototipe Sistem Monitoring Multi Perangkat Jaringan Berbasis Simple Network Management Protocol (SNMP) dengan Notifikasi Telegram pada lingkungan jaringan virtual. Metode yang digunakan adalah Network Development Life Cycle (NDLC), dibatasi pada tiga tahapan: Analysis, Design, dan Simulation Prototype. Sistem monitoring menggunakan aplikasi The Dude sebagai Network Management System (NMS) yang melakukan polling SNMP terhadap perangkat wireless access point virtual melalui router MikroTik. Jaringan dibagi menjadi dua segmen, yaitu segmen operasional (192.168.55.0/24) dan segmen monitoring (192.168.7.0/24). Notifikasi dirancang untuk dikirimkan secara otomatis kepada administrator melalui Telegram Bot menggunakan script MikroTik RouterOS. Simulasi dilakukan melalui tujuh skenario pengujian meliputi kondisi normal, gangguan konektivitas, pemutusan koneksi, pemulihan koneksi, monitoring periodik, visualisasi status, dan pengiriman notifikasi otomatis. Hasil simulasi menunjukkan bahwa prototipe mampu mendeteksi perubahan status wireless access point secara akurat dengan tingkat keberhasilan 100% pada seluruh skenario. Notifikasi Telegram rata-rata terkirim dalam rentang 5 hingga 15 detik setelah perubahan status terdeteksi, menunjukkan peningkatan responsivitas yang signifikan dibandingkan metode monitoring manual.