Claim Missing Document
Check
Articles

Implementasi Perangkat Mobile Publisher Subscriber Sebagai Perantara Pengiriman Data Sensor Dari Lapangan Ke Pusat Data Sukma Alamsyah Budianto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.984 KB)

Abstract

Sensor devices implemented in the field facing a problem when sending data on unstable network conditions to the data center. To solve these problems, we develop an application based on the Android operating system implementing publish/ subscribe communication as an intermediary for sending sensor data in the field to the data center using the MQTT protocol. To prove the application can operate as an intermediary for sending sensor data in the field to the data center, three tests are carried out. There are functional testing, scenario testing and performance testing. In functional tests, five functional requirements designed can be fulfilled by the application as an intermediary for sending sensor data to the data center. In scenario tests, from the three test scenarios performed the results of the application can be carried out without any application errors. In performance testing by calculation application performances and get the results of Subscriber Throughput is equal to 161.55 message/s, Publihser Throughput is equal to 2.13 message/s, the latency message average Subscriber apps are 1488.28 ms and the publisher message latency average app is 5208.86 ms.
Implementasi Sistem Akuisisi Data Sensor Pertanian Menggunakan Protokol Komunikasi LoRa Richad Gilang Wisduanto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 3 (2019): Maret 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.026 KB)

Abstract

Periodic monitoring of agricultural environmental condition is needed to growth the plant will be better, so it will improve the quality and quantity of agricultural products. The way of monitor environmental conditions periodically is an acquisition data system. The system requires minimum of two nodes, namely sensor nodes and gateways. Sensor node has function to put the data from the sensor and transmit it to the gateway, while the gateway receives the data and store it. Beside that a communication protocol is needed to connect both of nodes and to transmit the data wirelessly to remote monitoring, which one of it is LoRa. LoRa is a technology which has a wide range with low battery consumption, so it is suitable for monitoring agriculture in Indonesia, which is known as an agricultural country because of the wide area of agricultural land. There are two tests had been done, that are functional testing and performance testing. In the functional testing, the system can run properly where the system can put the till save it. The performance testing was hold to see the performance of the LoRa HopeRF-RFM9x module based on packet loss and delay with the influence of distance, packet size, and interval of delivery time. The result of the performance is the HopeRF-RFM9x module can transmit the packets well for 200, 300 and 400 meters.
Studi Penggunaan Energi pada Implementasi Protokol Routing RPL dan LOADng di Wireless Sensor Network Rozali Syahputra; Reza Andria Siregar; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.767 KB)

Abstract

Wireless Sensor Networks can generally interpret as wireless networks that are distributed using embedded devices equipped with sensor nodes. The sensor node has limited resources that are equivalent to two AA type batteries. Some of the things that spend more energy on WSN are Package Control in the WSN routing. Routing over Low Power and Lossy Network (RPL) is one of the protocols used for routing WSN networks. However, in some cases, it is necessary to use other protocols as an alternative. Light On-demand Ad hoc Distance-vector Routing (LOADng) is the right lightweight protocol for RPL alternative. Both of this protocol then implemented in several topology scenarios and is also on node placement factor, radio transmission distance, and control package for each node affecting the RPL and LOADng protocol's energy consumption. From this study, the results obtained for the Package Control scheme around reducing energy consumption by an average of 19% for the RPL protocol with Imin changes 4 seconds to 8 seconds and then cutting the average energy consumption by 14% for LOADng with changes in Route Hold Time from 5 minutes to 10 minutes.
Implementasi Shared Session Dalam Klaster Server Web Menggunakan PHP dan MySQL R. Moch Makruf Puja Pradana; Mahendra Data; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 5 (2019): Mei 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.098 KB)

Abstract

Session is a method that used to store information on a computer server that can be used on several pages including the page itself. In using a web server cluster, it can produce a better performance than using a single server that handles a website. But there are some problems that arise in the development between the web server cluster against the use of the session itself. In a web server cluster is a represented by a single node will run independently, if the initial session formed in the web application only have one node server, then the other server nodes can't get the same session access. The solution that can be used is to save the data session into database with mySQL, and the access of data session can be shared to another web servers. Another problem was revealed is how one web server cluster can communicate with the database in storing dan requesting data sessions. With these problems, this study developed the Shared Session method that will be applied through PHP. To prove that the method can run the system according to function, two tests are applied, login and logout testing and black box testing. In testing the login and logout that is designed can be fulfilled in storing and sharing data sessions even though there is a condition of one disabled web server. In the black box testing the response time results obtained in each scenario, in the first scenario of 100 session requests produces a response time of 18.7 second to 26.2 second, in the second scenario of 200 session requests produces a response time of 1 minutes up to 1.38 minutes, in the third scenario of 300 session requests to produce a response time of 10.07 seconds to 15.25 seconds.
Deteksi Serangan ARP Spoofing berdasarkan Analisis Lalu Lintas Paket Protokol ARP Veny Charnita Br Ginting; Mahendra Data; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 5 (2019): Mei 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (508.112 KB)

Abstract

ARP(Address Resolution Protocol) is a protocol to translate an IP address into MAC address. ARP is used when a host wants to communicate with another hosts whose MAC address is unknown, it broadcast an ARP request packet for the hardware address associated with the IP address of a destination. The host with corresponding protocol address sends a unicast reply to the sender. Protocol ARP is a stateless protocol which caused ARP protocol has a vulnerability. ARP vulnerability support a network attack called ARP Spoofing attack or ARP cache poisoned attack. ARP Spoofing attack perform cache poisoning by sending spoofed ARP packet. ARP spoofing is capable of executing the other attack such as DOS attack, Man in the middle attack, host impersonating, etc. This research was conducted to detect ARP Spoofing attack using based on ARP packet traffic. ARP packet traffic will be checked by detector host. Detector host checks the header of packet, amount of packet, MAC duplication and ARP request of ARP reply packet. The information of ARP spoofing packet will be written on log file. The classification rate was 89.64% and the average time to detect the attack is 0.4 second.
Implementasi Encounter Record untuk menangani Flood Attack pada Routing Protocol Epidemic dan Routing Protocol Spray-And-Wait DTN Yefta Kristiyanto; Rakhmadhany Primananda; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.834 KB)

Abstract

Delay Tolerant Network (DTN) is a network architecture that can be applied in areas that have a delay But. DTN has limits on its network storage size. DTN has two routing protocols, single-copy and multi-copy routing. In multi-copy, resources become full faster because they are used to store message replicas and its becomes more vulnerable to flood attacks than single-copy routing protocol. Flood attack is an attack from a malicious node by sending a huge number of packets into the network. Encounter records are one of many security mechanism that can be used to detect flood attack on DTN. In this research, ER development was carried to handle flood attack. The time needed to detect flood attacks in Epidemic is 1.22349 seconds and in Spray-and-wait routing is 0.97765 second. The accuracy of detection using ER is more than 80% for both protocols. Difference of PDR result of using ER and without ER in Epidemic 17.209% and in Spray-and-wait is 66.7139%. The average latency in epidemic routing is 2774.35489 ms and in spray-and-wait routing is 2794.70716 ms. The result of overhead ratio in epidemic routing is 281.52343 and in Spray-and-wait routing is 8.82161.
Analisis Kinerja Protokol LoRaWAN untuk Transmisi Data pada Skenario Urban Area Fathan Muhammad; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (261.205 KB)

Abstract

Long Range Wide Area Network (LoRaWAN) is a type of network for wireless telecommunication area designed to enable remote communication with long distance communication and low bit rate. LoRaWAN can be used on communication networks that have a wide range using end devices. LoRaWAN offers a wide range of advantages to the challenge of IoT implementation, but the current implementation of LoRaWAN technology is still very limited, requiring feasibility testing and analysis to what extent LoRaWAN technology is capable of being implemented in urban areas in Indonesia. In this research, an analysis of the performance of the LoRaWAN protocol for data transmission with urban area scenarios in Malang City is carried out. The method used in this study is to simulates LoRaWAN protocol in Network Simulator 3 (NS-3) application by changing the parameters to determine the effect on the the number of end devices, radius of the gateway range, and data sending period to the parameters throughput and packet loss. From the results of research proved that for the use of protocol LoRaWAN in urban areas, the more end devices used, the greater the throughput value and the greater the value of packet loss obtained. In addition, the wider the area needed, the throughput and packet loss obtained are constant. And then, the larger the period of data transmission, the smaller the throughput value is obtained and the smaller the value of packet loss obtained.
Implementasi Sistem Deteksi dan Mitigasi Serangan Distributed Denial of Service (DDoS) menggunakan SVM Classifier pada Arsitektur Software-Defined Network (SDN) Jodi Chris Jordan Sihombing; Dany Primanita Kartikasari; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (396.257 KB)

Abstract

Software-defined network (SDN) provides a promising architecture for future networks and can benefit from programmability on the controller to manage all behavior on the network. Apart from the advantages SDN has, there are challenges to SDN network security. Distributed Denial of Service (DDoS) is one of the attacks that can attack components that exist on the SDN architecture. In this study the detection and mitigation system of DDoS attacks was built to minimize DDoS attacks on SDN architecture using SVM Classifier. SVM is applied to the machine learning model to classify normal traffic and DDoS attack traffic based on features taken from flow entries. From the test results the system has been able to detect DDoS attacks with an average accuracy of 96.83% and an average detection time of 67.80 ms. In addition, the system can also reduce the number of DDoS attack packets sent to the victim host.
Implementasi Video Conference dengan File Sharing menggunakan WebRTC Fathi Nur Azzam; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.091 KB)

Abstract

Meeting or consultation serves to bring two or more people to discuss together. Technology serves to facilitate access communication meetings and consultations are video conferencing. Video conferencing is communication using audio and video which connects users even though they are not in the same place and time. There is a service to share data or called file sharing when using video conferencing. Applications support video conferencing and file sharing is Skype, Cisco Webex, and Zoom. However, the above application has a disadvantage that each operating system is different and application installation is required for each different device. WebRTC is a solution to the problem. WebRTC can run on all browsers, open-source, and free. WebRTC uses JavaScript-based APIs to establish peer-to-peer connections. WebRTC requires two additional servers namely STUN and TURN to communicate peer-to-peer through NAT. Testing is to measure the reliability of file sharing to video conferencing. Testing is using six types of connections and three types of file sizes. First test result file sharing does not affect video conferencing because it runs on a different port. One Way Delay test results increase in line with the increase in the size of the file sent.
Implementasi WebRTC Pada Sistem Broadcast Pembelajaran Untuk Menampilkan Bahasa Isyarat Farouq Alamsyah; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.063 KB)

Abstract

In public schools, deaf people have communication problems when teaching in class. Teaching in class depends on using verbal communication between students and students. This means that students and other students have communication problems with deaf people. Based on these problems, we need tools that can help students, especially the deaf in the classroom. The system in question has the main feature of converting sound into sign language in real-time while learning takes place. The system was built using Web Real-time Communication (WebRTC) is a protocol for sending data in real-time. WebRTC's Application Programming Interface (API) is free and is supported by all web browsers. In this research, network system performance testing is performed to determine the quality of the system and the use of computer resources on the side of the user. Testing is divided into two test environments namely local networks and different networks. In each testing environment, four stages of testing are conducted based on the number of users, namely 5 students, 10 students, 20 students, and 40 students. The test results show that there is an increase in jitter, delay, packet loss, memory, and processor for each additional student.