Claim Missing Document
Check
Articles

Perancangan Aplikasi Pengamanan Pesan E-mail Dengan Metode Kriptografi RSA Berbasis Android Studio Riadi, Rahadatul ‘Aisy; Safrianti, Ery; Sari, Linna Oktaviana
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Communication is the most important part of everyday activities. In the current era, communication can be done in various ways. One of them is through electronic messages (E-mail). E-mail is a means of exchanging information through electronic communication by sending, receiving, changing and storing messages. Using e-mail is more practical than writing and sending letters manually. However, the use of email is also very vulnerable to crimes in electronic communication or the internet. Security and confidentiality issues are an important aspect of messages, data and information. This is related to the importance of messages and information sent and received by interested parties or people, whether the authenticity of the messages and information is still maintained or not. Therefore, security is needed to maintain the authenticity of messages or information from the contents of the e-mail using cryptography. Cryptography is the art and science of encryption that aims to maintain the security and confidentiality of data. In maintaining the confidentiality and security of electronic messages, the RSA (Revest Shamir Adleman) algorithm method is used, so that the confidentiality and security of the data or information can be maintained and RSA has security at the level of difficulty in factoring nonprime numbers. RSA has a key pair, namely a public key and a private key. This research produces an android application that aims to maintain the authenticity of message contents and information sent by means of messages that have been sent can only be read through the application. Messages sent through the application will also enter into Gmail's incoming contacts. But the user cannot read the message from Gmail because the contents of the message are encrypted and can only be read from the application. And users can only send messages to other users of the application.Keywords: Cryptography, RSA, Email, Android, Enkripsi. Deskripsi
Optimalisasi Jaringan Menggunakan Teknik Load Balancing Metode Peer Connection Classifier (Studi Kasus: Dinas Perpustakaan Dan Kearsipan Provinsi Riau) Satiarini, Astri; Safrianti, Ery; Sari, Linna Oktaviana
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 7 (2020): Edisi 1 Januari s/d Juni 2020
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet is a necessity for the current era. The number of requests for internet access cause long response time and overload. Especially in offices that provide public services such as the Department of Library and Archives in Riau Province. To keep service work at the Soeman HS Regional Library not interrupted, so it will give comfortable for visitors, network optimization will be carried out with Load Balancing Technique. Load Balancing will balance load traffic on two or more connection lines, so that traffic can run optimally. The method used is Peer Connection Classifier, whereas this method will divide load based on sources, destination addresses and port addresses. All internet requests from users will go to Router that has been configured with PCC method, so on the Router will set up the exit request from user through ISP 1 line or ISP 2 line to be able to go to internet connections. The test results show that the equal distribution of outgoing access to ISP 1 and ISP 2 lines in a balanced manner, so there is no overload in any of ISP lines. The configuration will be applied in the Mikrotik Router using the Winbox application. Keywords : Load Balancing, Optimization, Peer Connection Classifier, Failover, ISP Lines.
Analisis Performansi Jaringan Fiber Optic Pada Penyambungan Single-Mode Ke Multi-Mode Provider Xl Menggunakan Perangkat Temporary Silalahi, Rhendy Theopilus; Sari, Linna Oktaviana
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fiber optic network (FO) is currently one of the telecommunications network transmissions widely used by operators to meet the needs of telecommunication services. FO is able to transmit data quickly. This is because the FO has a large bandwidth and has a small attenuation. Behind the advantages, the FO also has a disadvantage, namely the FO transmission does not always meet the damping standards provided by the operator. Such as fiber optic attenuation (attenuation loss), splice loss, connector attenuation (connector loss), bending loss, coupling loss and other attenuation. In general, operators use the single mode – single mode (SM) FO connection method. This research uses single mode – multi mode method. This research can help operators in performing maintenance and troubleshooting by analyzing power link bugdet on single mode – multi mode (MM) FO connection to improve FO network performance, so that operators can compete with other telecommunications service providers.Keywords : Power link budget, loss, single-mode, multy-mode, fiber optic
Sistem Keamanan Rumah Berbasis Iot (Internet Of Thing) Menggunakan Sensor PIR (Pyroelectric Infrared), Web Camera Dan Aplikasi Android Saputra, Fanny Eka; Sari, Linna Oktaviana
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 1 Januari s/d Juni 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet of Thing (IoT)- based home security system is a security system with an automatic system and connected to the internet network. Home security is an important thing to protect something valuable at home. The use of an IoT-based home security system can be applied such as wireless motion sensor and monitoring camera. Using a Pyroelectric infrared (PIR) sensor as a sensor to detect movement in a room, the PIR sensor can detect motion up to 6 meters and can be adjusted by rotating the tripot on the sensor. The monitoring camera uses an ESP32-cam which functions to monitor the conditions indoors and sends image data to the BLYNK application. Emergency calls are also embedded to increase the effectiveness of the system by making emergency calls to numbers registered to the system such as the numbers of neighbors or people entrusted with using the SIM800L and Arduino modules. An ESP32- cam camera is used as a remote monitoring camera. This system is controlled using the ESP8266 to turn on and off the module in the motion sensor processing section in the form of the ESP8266 and the PIR sensor and the camera monitoring section. The test results obtained that the sensor can detect motion and provide notification to the IFTTT application, sound an alarm and make an emergency call, along with the ESP32cam camera can send images to the BLYNK application. Keywords : IoT, PIR, ESP32-cam, ESP8266, IFTTT, BLYNK.
Analisis Wireless Access Point Pada Wifi Dengan Menggunakan Metode Wardriving Di Kecamatan Tampan Kota Pekanbaru (Studi Kasus: Kecamatan Tampan) Wijayanto, M. Rido; Sari, Linna Oktaviana
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of information technology is currently growing with the growth of human needs, wihich require simplicity, speed and security of access to information wireless tetchnolgoyn network rhas now become an important requiretment ofr the general public, userts who are usuallyfacilitated in public places such as: malls, offices, cafes, hotels, airports, hospitals, educational institutions and places of business and business. wireless network make it easy for users to get internet, wifi network are transmitted via radiio wave frequencies, for communication needs, information or data transfer and other purposess. The wirless network is divided into two frequensces two, 2.4 Ghz which consistes of 14 channels, and a frequenscy of 5 Ghz. The emission tha uses the same channel of frequenscy will experience overlapping interference from the emission of the same channel around it. From a number of overlalpping test point using InSSIDer and Vistumbler, the average signal quality can be produced -64,75 dBm, in good signal quality, and decreased by an average of -25, 25 dBm, so that network performance becomes -90 dBm in quality poor signal, and on adjacent channels the resulting average is -56 dBm, idn good signal quality, and decreased by -23,33 dBm average, so that the signal quality performance becomes -80 dBm, inlow signal quality. This has mild overlapping of many adjacent channel beams, the 5 Ghzfrequensicy test has absolutely no effect on many surrounding channels, the performance is inn good condition without any interference from the surrounding WiFi channel, channel usage in the Tampan District area still uses Frequency 2.4 Ghz with 91 % data results compared to 5 Ghz frequency with 9% result fro 1015 WiFi beam point in Tampan District, it is still fairly largeoverlapping interference in hansome sub-disctrict, from the result s of the comparison of the frequencies used. In terms of security used in the TAmpan District area, a lot of WPA2 securty type are used with 87% and the unknown security side is unknown or WEP 12%, and the WPA securityused is only 1%. The security side of the WiFi used in the TAmpan District is still safe. In terms of security used of the WiFi used in the Tampan Distrcit is still safe.Keywords : Wardriving, Sinyal Strength, Interferency, Mapping, Wirless WiFi
Perencanaan Pembaharuan Jaringan LTE FDD (Frequency Division Duplex) Pada Frekuensi 900 MHZ Di Kabupaten Bengkalis Erma Yuli Clara Saragih; Linna Oktavianasari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 5 (2018): Edisi 2 Juli s/d Desember 2018
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Long Term Evolution (LTE) is a technology that became a trend recently. Bengkalis Regency is area has not yet applied LTE technology optimally and even there is no positive change. This condition be basis for this paper. This paper uses design and simulation of Frequency Division Duplex (FDD) 900 MHz through Atoll Software, based on research that has been done previously in several other areas. FDD design is done with four scenarios that results will be compared, to see the best parameter in that area. There was used frequency 900 Mhz with bandwith 5 MHz and 10 MHz, 1800 MHz with bandwith 5 MHz and 10 MHz. That compared in that scenario are signal level, uplink and downlink CINR analysis, Service Area Analysis downlink and uplink and Monte Carlo analysis. The best scenario is a scenario with a frequency 900 MHz, bandwidth 10 MHz and required number of cells at least 137 eNodeB. Signal coverage level is capable of reaching ≤ -65 dBm, while the downlink CINR signal level ≥ 2,479 dB and ≥ 17 dB for uplink CINR signal level. While for Monte Carlo simulation can reach connected user is 81,4% which is connected, for uplink and downlink throughput reaching ≥ 1 Mbps.Keywords: LTE, Atoll, FDD, 900MHz
Optimalisasi Perancangan Jaringan 4G LTE Pada Frekuensi 2300 MHZ Berbasis TDD Di Kabupaten Rokan Hulu Muhammad Gunawan; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 6 (2019): Edisi 1 Januari s/d Juni 2019
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Long Term Evolution (LTE) is a technology developed by 3GPP as a development for cellular communication technology. LTE is a technology that can send and receive data at high speed. In Rokan Hulu Regency there are several areas that have not been reached by LTE and have a low Reference Signal Receipt Power (RSRP) value of approximately -100 dBm from ≥ -95 dBm from the standard. This study aims to optimize the LTE network based on planning by coverage and planning by capacity using the TDD radio access method. Specified frequency LTE is 2300 MHz, it is using 5 MHz and 10 MHz bandwidth. Coverage based on signal levels with a frequency of 2300 MHz with non-contoured maps at 5 MHz and 10 MHz bandwidth has a signal level value of ≥ -95 dBm at 99.99% and 100%. Coverage of signal level simulation results with contoured maps at 5 MHz and 10 MHz bandwidth has a signal level value of ≥ -95 dBm at 71.2% and 76.43%. So based on these parameters it can be concluded that the TDD technique with a bandwidth of 10 MHz is feasible to apply to Rokan Hulu Regency.Keywords: LTE, planning by coverage, planning by capacity, TDD, bandwitdh, signal level.
Perancangan Sistem Monitoring Jaringan Berbasis Web Menggunakan Simple Network Management Protocol (SNMP) (Studi Kasus: UPT TIK Universitas Riau) Nur Aprilia Sari; Linna Oktaviana Sari; Ery Safrianti
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 8 (2021): Edisi 2 Juli s/d Desember 2021
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Information and Communication Technology Integrated Services Unit (UPT TIK) is an unit in the University of Riau which is engaged in the service and management of everything related to information technology. UPT TIK manages network devices such as routers and switches that are scattered in every faculty/ institution building in the University of Riau. Network administrator who monitors the network equipment. Currently, the monitoring process uses the Cisco switches at UPT TIK by checking the devices one by one. This monitoring process is deemed ineffective because there are many devices unmanagable scattered in every faculty/institution building at the University of Riau so that administrator have difficulty checking the state of the devices whether they are connected or not. In this study, the design and implementation of the SNMP protocol for network management was carried out directly at the UPT TIK University of Riau. A monitoring system can also be called a Network Management System, which is a system that functions to assist network administrator in monitoring and controlling network devices. SNMP is anapplication protocol on a TCP / IP network that can be used as a protocol in Network Management System. The development of this system uses the PHP Programming Language and the MySQL database management system. From the results of system testing and analysis, it is found that the monitoring and network management systems that have been designed can run well in monitoring network devices. Keywords : Network Administrator, Monitoring, Network Management System, SNMP, Network Devices.
Analisa Perbandingan Pengaruh Penggunaan Protokol Secure Soket Layer (SSL) Dan Protokol Point To Point Protocol (PTTP) Terhadap Quality Of Service (QoS) Pada Jaringan Vitual Private Network (VPN) Lamhot Raden Sitorus; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 4, No 2 (2017): Wisuda Oktober Tahun 2017
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security Protocols Protocol Point-to-Point (PPTP) and Secure Socket Layer (SSL) are VPN security protocols that used to enhance the security of a network. The use of these protocols effect on performance network or Quality of Service (QoS). The QoS is measured using delay parameters, the jitter, throughput, and packet loss. Network testing scenario uses the topology bus. The results of this research is to compare the performance of each VPN protocols tested i.e. PPTP and SSL in a way of measuring the QoS performance without using the Protocol as a basis for comparing its effects byusing VPN protocols.Keywords : Virtual Private Network, PPTP, SSL, Quality of Services
Analisa Pengaruh Pemodelan Jaringan EBGP dan IBGP Terhadap QoS Multimedia Fajar Kurniawan; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 6 (2019): Edisi 1 Januari s/d Juni 2019
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today, internet has become a part of everyday life for millennial society. An internet network addressing protocol is needed in order to connect one user to another user. Border Gateway Protocol (BGP) is a standard routing protocol offered to choose interdomain paths. The main function of BGP is to exchange network coverage information between BGP routers and other BGP routers. BGP is also divided into 2 types, the External Border Gateway Protocol (EBGP) and the Internal Border Gateway Protocol (IBGP). GNS3 is used to design and simulate modeling the BGP protocol and capturing the data packets using wireshark. The results obtained from the measurement of Quality of Service (QoS) for multimedia traffic in the EBGP and IBGP networks are 55 ms delay (EBGP) and 82.5 ms (IBGP) for audio streaming. Meanwhile the throughput value is 1.182 Mbit/sec (EBGP) and 0.591 Mbit/sec (IBGP) for audio streaming. These results show the good performance is reached because the result meet both ITU-T G.114 and ITU-T G.1010 standards, which is a good average delay for sending packet data is <150 ms and packet loss is <1%. Keywords : Network, EBGP, IBGP, QoS, Delay
Co-Authors Abiyyah, Liandri Talitha Adi Syahputra Adinda Zilly Arsyika Agam Murtio Putra, Agam Murtio Ahmad Romadan Akbar, Zatryandy Aksana, Anandaku Aldi Kurniawan Batubara Aldi, Robi Aldy Fadilla Alfon Sera Anashroh Rizkiyah Siregar Andhi, Rahmat Rizal Andika Prinanda Angreany Yasmin Anhar Anhar Anhar Arianda, Habil Putra Arif Fauzar Arif Fauzar Arum Parastika As’ari, Azi Azmi, Agusurio Batubara, Aldi Kurniawan Batubara, Aldi Kurniawan Berlian, Dini Candra Galang Gemilang Putra Cristin Manora Dahliyusmanto, Dahliyusmanto Danny Wijaya Dara Incam Ramadhan Dara Incam Ramadhan, Dara Incam Darbi, Ahmad Dian Yayan Sukama Dian Yayan Sukma, Dian Yayan Dwi Putra Retdha Yuhana Edi Susilo Edi Susilo Erma Yuli Clara Saragih Ery Safrianti Ery Syafrianti Eryzal SP Siregar Fajar Kurniawan Feranita Feranita Feranita Feranita Feranita Feranita Feranita Feranita Feranita Jalil Feranita Jalil Fikri, Muhammad Haikal Firdaus Firmawan, Andes Fitri Wulandari Fitriani Saputri Fitriani Saputri Fri Murdiya, Fri Friska Yudhistira Gemilang, Hafiz Pradana Gozali, M Moriandy Hakim Ata Attaturk Hapzi Ali Haritsi, Salman Al Haziq Hazman Hazline Atika Suri Helena Helena, Helena Heryanto Chandra Indah Permata Sari Indah Permata Sari Indra Putra Wijaya, Indra Putra Irsan Fitrah Adhil IRSAN TAUFIK ALI Jalil, Feranita Julhendra, Satria Kiki Julita Ningsih Kurniawan, M. R. Lamhot Raden Sitorus M Arif Syiaruddin M. Fajar Edwin Saputra Mahan, Rian Arighi Marpaung, Ranto Anjasmara Marwa Miri Al-Haque Mei Safrina Mudinillah, Adam Muhammad Ariq Istiqlal, Muhammad Ariq Muhammad Gunawan Muhammad Rasyidin Siregar Muhammad Ridwan Saputra Muhammad Rizki Radhelan Mutia Indah Lestari Nestor Hasudungan Silaban, Nestor Hasudungan Nobon Lazirsah Adnil Nur Aprilia Sari Nurhalim Dani Ali Nurhidayah Rahman Pinarian Elni Endra Saneni Prio Setyo Putri Ramadhani Muliaqalbi R.A Rizka Qori Yuliani Putri Rahmad Rudi Clinton Rahmat, Fajar Ramadhan Imam Dzaky Ramadhani, Cut Muthia Retdha Yuhana, Dwi Putra Reza Pahlevi Rezki Ananda Gusma Rhendy Theopilus Silalahi, Rhendy Theopilus Riadi, Rahadatul ‘Aisy Rian Arighi Mahan Ridho Yatullah Ridho Zikril Hidayatullah Rifaldo, Rifaldo Riki Desrianto Rina Ayu Nabila Riyati Pasaribu Romadan, Ahmad Rosma, Iswadi Hasyim Rozy Syaputra Ryant Pratama Salhazan Salhazan Salim, Kelvin Rainey Saljuwita, Saljuwita Salwa Madihah Syahnevi Samudra, Bayu Saputra, Fanny Eka Satiarini, Astri Seprita Wulansari Sihotang, Hari Siti Maryam Sri Ayuni Sugianto, Aktub Suwitno Suwitno Suwitno, Suwitno Syah, Maulana Syahrul Taufano, Haza Tulus Rahayu Tulus Rahayu, Tulus Utari Nurul Fajar Nasution Valentino, Novri Veni Yuherlina Putri, Veni Yuherlina Wahyuningtias, Defvi Wijaya, Alvansya Hawari Wijayanto, M. Rido Yosef Asido Manalu Yostisel Oktaria Yusnita Rahayu Zikri Pradana