Articles
Perancangan Switch Manageable Untuk Pengelolaan Virtual LAN Menggunakan Linux CentOS Pada SMKN 2 Kuripan
Mohammad Taufan Asri Zaen;
Syahadatul Intihan
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 1 (2018): JIRE April 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i1.27
In realizing an integrated service both internally and externally, SMK Negeri 2 Kuripan need a reliable computer network infrastructure and can connect all units in a single integrated network. Current state of computer networks in SMK Negeri 2 Kuripan is still a large computer networks and complex. With the computer network conditions like this, it causes traffic in computer networks become dense eventually cause some problems such as access to an application to be slow. Under these conditions, then the computer network in SMK Negeri 2 Kuripan requires a segmentation of the network / subnetwork according to the needs of the organization. Computer networks in SMK Negeri 2 Kuripan is still using a single network ID, so as to make the segmentation of networks of smaller needed a way to break the single Network ID into a Network ID. Subnetting is a way to break up the Network ID is by using hostid bits to form part subnetID. Subnetting process is done on a single Network ID is produced 11 subnet that has been established based on the needs of organizations SMK Negeri 2 Kuripan. Utilization of Virtual LAN topologies for the physical design and subnetting for logic design is able to provide optimization of the performance of computer networks. Optimization is achieved due to the use of VLAN network can reduce the collision data (collision) by blocking packets / frames that do not need to be outstanding in the network. In addition, VLANs can also be split in / out broadcast domain, so that data packets sent from a host will only be forwarded to the destination host and other hosts will not accept packets / frames.
Implementasi Internal Wireless Roaming Menggunakan Mikrotik Wireless Distribution System (WDS) Pada STMIK Lombok
Mohammad Taufan Asri Zaen;
Falah Husni
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 1 (2018): JIRE April 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i1.30
Currently the hotspot network used by students in STMIK Lombok uses Basic Service Set topology (BSS), therefore different Service Set Identifier (SSID) in each Access Point (AP) causes the mobility and reliability of the hotspot network to decrease. To overcome this problem can be applied hotspot system with Extended Service Set topology (ESS) that uses more than one AP and integrate all AP into a single wireless network using Internal Wireless Roaming so that client mobility is not disturbed when moving locations in the campus area without having to reconfigured. The signal coverage test of roaming network that has been done in STMIK Lombok using Wireless Distribution System (WDS) has not reached all campus area but can be overcome by adding AP to increase coverage area. Roaming that runs between APs can work but requires more time in the process of moving.
Perancangan Jaringan Komputer Berbasis Mikrotik Router OS Pada SMAN 4 Praya
Sopian Sumardi;
Mohammad Taufan Asri Zaen
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 1 (2018): JIRE April 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i1.32
Information and Communication Technology (ICT) is a very important requirement in the implementation of education. Becoming a necessity for SMAN 4 Praya as an upper secondary educational institution to build computer network technology considering the complexity of the problems faced in the administrative system as well as the teaching and learning process. ICTs need to be well-designed to ensure that resources can be utilized optimally and mission vision can be achieved as expected. The design of computer networks at SMAN 4 Praya uses the Network Development Life Cycle (NDLC) approaches as a development method, covering a number of stages analysis, design, prototype simulation, implementation, monitoring and management. The process of analysis is divided into several processes, namely user needs analysis, device requirement analysis (hardware, software, brainware), network needs analysis, feasibility analysis (feasibility of infrastructure and human resource feasibility), and through network topology analysis by designing architecture and computer network design. Network Design Local Area Network (LAN) and Wireless Fidelity (WiFi) based on Mikrotik RouterOS. Implementation of the use of Mikroutik RouterOS on the Internet network SMAN 4 Praya can provide effective and optimal results to divide the bandwidth of each client as as reserved, and allows administrators in managing the network to remain stable and provide maximum results.
ANALISIS KOMPARASI WIRELESS NETWORK PADA SIMULASI AIRLINK UBIQUITI DENGAN REAL HADWARE UBIQUITI
Ahmad Tantoni;
Mohammad Taufan Asri Zaen
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 2 (2018): JIRE Nopember 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i2.55
In conducting PtP or PtMP wireless signals, a simulation is needed with a design to determine the height of the tower and see the height of the surrounding buildings from the Access Point (site A) and Station (site B) to avoid the Line of Sight (LOS) and Fresnel Zone. Not only that, in designing the rt/rw.net network, it is also necessary to select devices and network simulation in order to estimate the results of the desired network performance and how much it costs. Problems occur when the network hardware has been installed and pointed from Site A to Site B to get unsatisfactory results according to previous simulations. This study is to determine the accuracy of the results of the ubiquiti simulation performance with the real hardware network Ubiquitous products. This is done because when sometimes simulateds, the expected results do not match the real estate. The research methodology used by PPDIOO Method is made by Cisco. Research at Brembuk.net Pancor, East Lombok with comparative analysis of wireless networks using simulation airlink.com ubiquiti and real hardware network ubiquitous products, carried out from site A to site B with a distance of approximately 1.47 kilometers. From the RX signal strength in the simulation is better than when using real hardware because the simulation produces a signal of -37.80 dBm while in the real hardware produces the signal -41.00 dBm. The total capacity of download & upload in real hardware is better than when using simulation because in real hardware it produces 137.54 Mbps while in simulation it produces 121.10 Mbps performance, and between airlink.ubnt.com using ubiquiti simulation and real hardware network ubiquiti products almost get the same results.
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
Ahmad Tantoni;
Mohammad Taufan Asri Zaen
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 2 (2018): JIRE Nopember 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i2.56
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cipher algorithm, in order to secure the database given the database login user form to make it safer. Double caesar cipher is the development of symmetrical caesar cipher algorithms. The encryption and description process has the same key, each of which has a key. Not only that, the research will also show the double caesar cipher algorithm script using the ASCII (American Standard Code for Information Interchange) table and also in the .php programming language (hypertext preprocessor), then how do I run the double caesar cipher, the last is trying to enter plaintext into the double caesar cipher program then convert it to ciphertext and vice versa from ciphertext to plaintext again.
PENGENDALI LAMPU MONITORING RUMAH DENGAN SHORT MESSAGE SERVICE (SMS) BERBASIS ARDUINO UNO
Mohammad Taufan Asri Zaen;
Asep Yunandy
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 2 (2018): JIRE Nopember 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i2.59
The increasing activity of someone outside the home causes difficulties in controlling the lamps and monitoring the condition of the house from a distance, therefore it is necessary to control the lamps remotely. This research designed and built a lamps handling by short message service (SMS) based on arduino uno. Lamps handling by sms is a tool which act as the lamp and alarm switches at house, whenever without time limits as far as the GSM signal is still can be reached. Handling tool from distance by mobile sms act as an order producer, arduino uno as a microcontroller, sensor peer as a movement detector, gsm modul sim 900A as an information sender and acceptor and relay as a switcher of lamps or the alarms. The test results of this tool show that this too can be used based on the order which is given from distance to control the lamps and the alarms. Another function of this tool is to monitor the lamps condition by “cek†function to know in which lamp is on or off mode. It also can switch on an alarm and send some sms to the owner’s contact number when its sensor detected any object movements.
ANALISIS KOMPARASI PERFORMA JARINGAN KOMPUTER PADA IMPLEMENTASI IPv4 dan IPv6
Ahmad Tantoni;
Mohammad Taufan Asri Zaen;
Sofiansyah Fadli
Jurnal Informatika dan Rekayasa Elektronik Vol. 1 No. 2 (2018): JIRE Nopember 2018
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v1i2.60
Routers have important functions in the network, especially the internet. Routers can connect several network segments so that they can communicate with other users even though they are separated by a great distance (Sofana, 2013). IPv4 was originally a 32-bit binary number that was used to identify hosts on the network, after successful use by internet users then a new problem arises where IPv4 cannot accommodate Internet users in the future because it runs out of IPv4 addresses. Then IPv6 was created with the aim to provide more addressing than IPv4 (Sugeng, 2015). The problem is seen from the difference in the bit width between IPv4 and IPv6 whether it affects the CPU performance of the computer and the performance of data sent, average speed on the network. Then there will be research on the comparative performance of the CPU load and the performance of the data sent, the average speed of the computer network on the implementation of IPv4 and IPv6 using Passmark Advance Network Test. So that it can provide an overview of the results of the comparison of IPv4 and IPv6 QoS that are better than the 3 parameters tested with TCP and UDP protocols
MEMBANGUN SERVER HOTSPOT BERBASIS MIKROTIK DI SMAN 1 PRAYA TENGAH
Muhamad Hariadi;
Wire Bagye;
Mohammad Taufan Asri Zaen
Jurnal Informatika dan Rekayasa Elektronik Vol. 2 No. 1 (2019): JIRE April 2019
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v2i1.92
Sejalan dengan perkembangan teknologi informasi, peralatan pendukung jaringan komputer masih sangat diperlukan. Peralatan juga telah menjadi komponen penting dalam pengembangan jaringan komputer. Jaringan adalah perangkat keras dan perangkat lunak dalam suatu sistem yang memiliki aturan khusus yang mengatur semua kegiatan dan perilaku anggotanya dalam kelancaran kegiatan pembelajaran di SMAN 1 Praya Tengah ke jaringan internet yang membutuhkan pengelolaan aliran informasi yang tepat Penelitian ini mencakup bagaimana membangun mikrotik hotspot berbasis server di SMAN 1 Praya Tengah dengan metodologi NDLC, analisis dan tahap desain menggunakan metodologi analisis pemodelan PIECES dengan menggunakan Winbox, sedangkan desain pengembangan dan implementasi metode simulasi jaringan GNS3 Hasil tes koneksi jaringan internet yang dilakukan pengguna menunjukkan implementasi desain mikrotik di SMAN 1 Praya Tengah, berbagi bandwidth dengan mikrotik internet memberikan kemudahan dan kepraktisan dalam penggunaan internet
MANAJEMEN WIRELESS DENGAN MAPPING SSID ACCESS POINT PADA STMIK LOMBOK
Ahmad Tantoni;
Mohammad Taufan Asri Zaen
Jurnal Informatika dan Rekayasa Elektronik Vol. 2 No. 2 (2019): JIRE Nopember 2019
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v2i2.112
The wireless network at STMIK Lombok is connected to the local server network and the internet with the spread of access points in several buildings. In some parts of the building have different strengths and the access point or wireless signal strengths, some have broad and strong signal coverage, but there are also areas that have limited / weak signal coverage, even no wireless or blank-spot signal. This blank spot can be caused by many obstacles, including walls, tiles, trees, and others. Based on observations at STMIK Lombok, wireless signal coverage has not been able to cover the entire campus building area; many are unstable and tend to be weak. Therefore, wireless management research was conducted by mapping the SSID access point which is expected to offer/give a solution so that the wireless signal can cover all STMIK Lombok campus buildings. Wireless management by mapping SSID access points on STMIK Lombok provides a solution for location placement and number of access points to be installed so that the campus area of ​​STMIK Lombok can be covered by wireless networks. Keywords : wireless, wireless network, mapping SSID, access point, MikroTik
KLASIFIKASI TEKS SOSIAL MEDIA TWITTER MENGGUNAKAN SUPPORT VECTOR MACHINE (Studi Kasus Penusukan Wiranto)
Lalu Mutawalli;
Mohammad Taufan Asri Zaen;
Wire Bagye
Jurnal Informatika dan Rekayasa Elektronik Vol. 2 No. 2 (2019): JIRE Nopember 2019
Publisher : LPPM STMIK Lombok
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.36595/jire.v2i2.117
In the era of technological disruption of mass communication, social media became a reference in absorbing public opinion. The digitalization of data is very rapidly produced by social media users because it is an attempt to represent the feelings of the audience. Data production in question is the user posts the status and comments on social media. Data production by the public in social media raises a very large set of data or can be referred to as big data. Big data is a collection of data sets in very large numbers, complex, has a relatively fast appearance time, so that makes it difficult to handle. Analysis of big data with data mining methods to get knowledge patterns in it. This study analyzes the sentiments of netizens on Twitter social media on Mr. Wiranto stabbing case. The results of the sentiment analysis showed 41% gave positive comments, 29% commented neutrally, and 29% commented negatively on events. Besides, modeling of the data is carried out using a support vector machine algorithm to create a system capable of classifying positive, neutral, and negative connotations. The classification model that has been made is then tested using the confusion matrix technique with each result is a precision value of 83%, a recall value of 80%, and finally, as much as 80% obtained in testing the accuracy.