Claim Missing Document
Check
Articles

Found 33 Documents
Search

OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS: OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS Firmansyah Firmansyah; Rachmat Adi Purnama; Rachmawati Darma Astuti
Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika Vol. 15 No. 1 (2021): Jurnal Teknologi Informasi : Jurnal Keilmuan dan Aplikasi Bidang Teknik Inform
Publisher : Universitas Palangka Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47111/jti.v15i1.1910

Abstract

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
Analisis Performa Site to Site IP Security Virtual Private Network (VPN) Menggunakan Algoritma Enkripsi ISAKMP Firmansyah Firmansyah; Mochamad Wahyudi; Rachmat Adi Purnama
JUITA : Jurnal Informatika JUITA VoL. 7 Nomor 2, November 2019
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (364.236 KB) | DOI: 10.30595/juita.v7i2.4491

Abstract

Perkembangan jaringan internet sudah tidak terbendung lagi, hal ini dapat menyebabkan potensi terjadinya ancamanan didalam dunia intenet. Penggunaan Virtual Private Network (VPN) nampaknya menjadi salah satu metode keamanan jaringan yang sangat baik dalam melakukan pendistribusian layanan paket data didalam jaringan internet. Penggunaan VPN mampu memangkas alokasi penggunaan bandwidth serta meminimalisir terjadinya kebocoran terhadap paket data yang sedang ditransfer. Site to Site merupakan salah satu metode VPN IPSec Tunneling yang sering digunakan untuk menghubungkan antara lokasi yang berbeda agar menjadi satu kesatuan network. Penggunaan IPSec dapat melindungi transfer data antara host to host, network to network hingga network to host dikarenakan melakukan pengenkripsi terhadap paket data yang ditransfer. Hasil pengujian dalam pengimplementasian jaringan Site to Site IP Security Virtual Private Network With Algorithm Encryption ISAKMP didapatkan pengurangan hops terhadap jaringan yang menggunakan tunnel dengan Time to Live (TTL)=126 sedangkan jaringan tanpa menggunakan tunnel memiliki nilai TTL sebesar 124.
Filtering Domain Name Server (DNS) untuk Membangun Internet Sehat Menggunakan Routerboard Mikrotik Firmansyah Firmansyah; Rachmat Adi Purnama
JUITA : Jurnal Informatika JUITA VoL. 7 Nomor 1, Mei 2019
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (312.622 KB) | DOI: 10.30595/juita.v7i1.4164

Abstract

Maraknya penggunaan akses internet belakangan ini khususya pada remaja, membuat kekhawatiran tersendiri bagi orang tua. Dengan menggunakan jasa internet, pengguna layanan internet dengan sangat mudahnya melakukan pencarian dan mengakses kedalam website berkonten negatif dan pornografi. Dari data yang didapatkan akses terhadap website dengan konten negatif masih sangat tinggi dengan peringkat 17 dari Top Website Rangking. Hal ini merupakan sebuah alasan mengapa penulis melakukan penelitian menggunakan DNS filtering dengan tujuan untuk membatasi akses terhadap situs berkonten negatif dan barbau pornografi. Sesuai dengan peraturan pemerintah yang menginginkan Indonesia menjadi pengguna dan penyedia Internet Sehat bagi semua kalangan. Untuk mewujudkan penerapan Internet Sehat, penulis mencoba melakukan penelitian menggunakan RouterBoard Mikrotik untuk melakukan implementasi DNS Filtering untuk membangun Internet sehat menggunakan router mikrotik. Jika nantinya terdapat pengguna layanan internet yang mencoba melakukan akses kedalam jaringan internet dengan cara melakukan perubahan DNS secara manual dan menggunakan Open DNS maka akses internetnya akan terputus ataupun terblokir. Semua pengguna layanan internet pada jaringan ditekankan untuk menggunakan layanan DNS yang telah ditentukan.
Rancang Bangun Aplikasi Belajar Membaca Al-Qur'an Berbasis Android Fadhil Naufal Shodiq; Rachmat Adi Purnama; Sujiliani Heristian
Computer Science (CO-SCIENCE) Vol. 1 No. 1 (2021): Januari 2021
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/coscience.v1i1.127

Abstract

Reading the Al-Qur'an has always been a culture of Indonesian society, however recently the Al-Qur'an has begun to be abandoned. Muslims are more engrossed in following games and social media with fun playing than opening the Al-Quran mushaf. In order not to have hijaiyah illiterate young people, they must carry out learning that follows the present era, such as learning applications that are not inferior to applications that make young Muslims lazy, the main target in the learning method of reading the Al-Quran application is children at an early age to learn it because children at an early age have quite good comprehension and memory. Based on the background that the authors convey above, the authors are interested in conducting further research on learning methods based on reading the Al-Quran application. The system development method used in this study uses the RAD (Rapid Application Development) Model. Rapid Application Development (RAD) is a software development process model that is incremental, especially for short processing times. The results of the research show that learning with an interactive system increases children's interest in starting the initial learning process. In addition, interactive games are an alternative in conveying learning among other methods.
Virtual Link Aggregation Network Performance Using MikroTik Bonding Firmansyah Firmansyah; Mochamad Wahyudi; Rachmat Adi Purnama
IAIC Transactions on Sustainable Digital Innovation (ITSDI) Vol 2 No 2 (2021): April
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/itsdi.v2i2.394

Abstract

Quality of Service in a network is a big thing that must be resolved and dealt with as best as possible. The limitation of the maximum transfer rate in network devices creates an obstacle in the process of transferring data packets. To maximize the transfer rate in network devices, you can use Virtual Link Aggregation which can offer bandwidth optimization and failover in the network. Link aggregation is a solution in combining several physical links into one logical link. The method used in this research is to consider the allocation of bandwidth, load balancing and failover in the link aggregation. From the results of the link aggregation test using two (2) interface bonding, the results of the bandwidth averages when there is a UPD data packet transfer to 0 bps / 184.9 Mbps, which was previously around 0 bps / 91.6 Mbps. While the result of the bandwidth averages when the TCP data packet transfer occurs is 0 bps / 105.5 Mbps, which was previously around 0 bps / 93.8 Mbps. Link Aggregation using a Mikrotik Router is a solution to produce a larger Throughput Bandwidth by combining two (2) Ethernet Physical Links into one logical link.
Pemanfaatan Layanan SMS Telepon Seluler Berbasis Mikrokontroler Atmega328p Sebagai Sistem Kontrol Lampu Rumah Endri Maulana; Rachmat Adi Purnama
JURNAL TEKNIK KOMPUTER AMIK BSI Vol 3, No 1 (2017): JURNAL TEKNIK KOMPUTER AMIK BSI
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (303.214 KB) | DOI: 10.31294/jtk.v3i1.1349

Abstract

Lighting conditions of a house abandoned by the owner of a business for a long time to get home tonight. This makes the owner let the condition of the house in the dark at night when the weather starts. Therefore, to overcome it needed an integrated system with various devices in the home. This system also needs to be controlled by the homeowner from a distance. An SMS (Short Message Service) can be a solution, because almost every homeowner has a cell phone that supports SMS. Home lighting system is controlled by a microcontroller Atmega 328P as a control center connected to the device to turn on the house lights. Besides the microcontroller is connected with wavecome modem that serves as a device that receives short messages to be sent by the owner of the house.Key Words: SMS, Mikrokontroler Atmega328P, Modem Wavecome
MEMBANGUN KESADARAN MORAL DALAM ETIKA BERINTERAKSI DI DUNIA MAYA Rachmat Adi Purnama
Cakrawala - Jurnal Humaniora Vol 9, No 2 (2009): PERIODE SEPTEMBER 2009
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4280.363 KB) | DOI: 10.31294/jc.v9i2.3578

Abstract

Level of crime has had with the empirical branching directly or through cyber space or virtual world. Based on the data showed that a variety of behavioral changes and the more crime increase with the virtual world of crime. Meanwhile the government and the device has not been able to become legal issues existing controllers. ITE legislation which was passed in last March 2008 full debate is considered not healthy and in conflict with the Constitution, especially on the freedom of UUD 45. By using qualitative methods, the author tried to analyze and give a solution that may become a concern for the government and the public how to maintain ethics in the virtual world interacting with the moral awareness of how to build each individual IT users themselves.Keywords: crime, ethics, the moral awareness
Performa Redundancy Link Hot Standby Router Protocol IPv6 With Routing EIGRP for IPv6 Firmansyah Firmansyah; Rachmat Adi Purnama; Anton Anton; Rachmawati Darma Astuti
Jurnal Sains dan Informatika Vol. 7 No. 1 (2021): Jurnal Sains dan Informatika
Publisher : Teknik Informatika, Politeknik Negeri Tanah Laut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34128/jsi.v7i1.297

Abstract

Pengalokasi IP Address versi 4 (IPv4) yang mulai menipis berjalan secara beriringan dengan semakin meningkatnya kebu-tuhan dunia teknologi informasi. Untuk memenuhi permintaan dari penggunaan IP Address, maka diterapkanlah Internet Protocol version 6 (IPv6). Hadirnya IPv6 diharapkan menjadi sebuah solusi dari permasalahan yang dihadapi oleh IPv4 seperti permasalahan terbatasnya alokasi IP Address dan keamanan jaringan komputer. Pengimplementasian IP Address didalam jaringan komputer tidak lepas dari adanya protokol routing. Routing protocol Enhanced Interior Gateway Routing Protocol (EIGRP) pun ikut berkembang dengan adanya penggunaan IPv6 menjadi EIGRP for IPv6 (EIGRPv6). Perkem-bangan jaringan haruslah mempertimbangkan faktor Quality of Service (QoS) di dalamnya. Hot Standby Router Protocol (HSRP) IPv6 hadir untuk memastikan layanan jaringan dapat berjalan dengan maximal dan stabil saat terjadinya link failure pada layanan jaringan. HSRP IPv6 mampu mengoptimalkan packet loss saat terjadinya redundancy dengan nol (0) packet loss, serta redundancy time yang dibutuhkan saat terjadinya redundancy dari router active menuju router standby 10 second dan router standby menuju router active 26,2 second
SISTEM INFORMASI REGULASI PENGAJUAN MENJADI DOKTER SPESIALIS BERBASIS WEB PADA PERSATUAN DOKTER GIGI INDONESIA JAKARTA SELATAN Tri Putra Aditya; Rachmat Adi Purnama; Baginda Oloan Lubis
Jurnal Sistem Informasi Vol 3 No 2 (2014): JSI Periode Agustus 2014
Publisher : LPPM STMIK ANTAR BANGSA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.036 KB) | DOI: 10.51998/jsi.v3i2.51

Abstract

Abstract— Documenting the process of the new dentists in Persatuan Dokter Gigi Indonesia (PDGI) Jakarta Selatan during this label done conventionally operates as such participant registration Data Stored on archival paper only , the calculation of value Satuan Kredit Partisipasi (SKP) performed operating users. Expected with a system based building sites will facilitate the calculation of Satuan Kredit Partisipasi (SKP) To facilitate hearts get regulatory specialist dentist in Jakarta Selatan. Applications built using waterfall SDLC method that works used hearts Application Development. There are several phase hearts application development, phase analysis, design, coding, testing, and implementation. Application System design using ER Diagram. At phase coding, application built use with PHP programming language MySQL Database. Intisari—Proses pendataan dokter gigi baru di Persatuan Dokter Gigi Indonesia (PDGI) Jakarta Selatan selama ini dilakukan secara konvensional seperti seperti data pendaftaran peserta hanya disimpan di arsip kertas, penghitungan nilai Satuan Kredit Partisipasi (SKP) dilakukan secara manual. Diharapkan dengan membangun suatu sitem yang berbasis website akan mempermudah dan mempercepat perhitungan Satuan Kredit Partisipasi (SKP) hingga memudahkan dalam hal mendapatkan regulasi spesialis dokter gigi di Jakarta Selatan. Aplikasi ini dibangun dengan menggunakan SDLC metode waterfall yang umum digunakan dalam pembuatan aplikasi. Ada beberapa tahap dalam pengembangan aplikasi ini, yaitu tahap analisis, desain, koding, pengujian, dan implementasi. Aplikasi ini menggunakan desain sistem dengan menggunakan ER Diagram. Sedangkan pada tahap koding, aplikasi ini dibangun menggunakan bahasa pemrograman PHP dengan database MySQL.  Kata Kunci—Pendataan Dokter Spesialis Gigi, Regulasi Bebasis Website, Surat Keridit Partisipasi (SKP).
Quality of Service Gateway Load Balancing Protocol Message Digest algorithm 5 Authentication For Network Quality Enhancement Firmansyah Firmansyah; Rachmat Adi Purnama; Mustofa Mustofa; Sari Dewi
Journal of Telematics and Informatics Vol 7, No 1: MARCH 2019
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jti.v7i1.

Abstract

Gateway Load Balancing Protocol (GLBP) Message-Digest algorithm 5 (MD5) is a Cisco's proprietary protocol. GLBP used to enhance the Quality of Service(QoS)  on a network. It applies the IP Address Gateway Virtual that redundancy on the local network. GLBP run all used routers in time because of load balancing itself, there is no router used as a standby/backup only. Using the GLBP protocol, all network loads are shared equally to all connected routers. The way the GLBP network works is different from how the HSRP and VRRP networks work, which will run the standby/backup router if the active / master router experiences a problem (failover). The average time needed to redundancy the master to router backup router is 7.6 ms. While the average time needed to change from standby router redundancy  to master router redundancy or the master router reused is 33.4 Ms. The average packet loss obtained when the redundancy of the active router change to standby router is 1.7 packet, and The average packet loss obtained when the redundancy of the active router change to standby router is 1.7 packet and 0.5 packets in opposite ways.