Claim Missing Document
Check
Articles

Pengembangan Sistem Visualisasi Access Log untuk Mengetahui Informasi Aktivitas Pengunjung pada Sebuah Website Rani Andriani; Eko Sakti Pramukantoro; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 6 (2018): Juni 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1363.508 KB)

Abstract

Access log record all requests that processed by the web server. Access log is a file that contains an important line about website visitors. However, access log data is still in the form of raw data so it is difficult to read and analyzed to get activity information of website visitors on a website. In this research, the solution offered is to make a web-based application that can be used as a tool for knowing visitors' activity information on a website using access log data from an apache server. The data of access log will be parsed and the result data of the parsed access log will be saved into the MySQL database. Then this data is filtered by using a specific query in MySQL for later visualized by the application to the form of graphics or tables for further analysis. Based on the results of this study, Access Log Visualizer has been able to parse access logs by using regex and retrieve the access log data from the database by using MySQL query and display the visualization of the data access log, so that this system can process access log data for knowing activity information of website visitors on a website.
Otomatisasi Publikasi Resource File Sharing Menggunakan UPnP Based System Anggi Atmajaya Siagian; Eko Sakti Pramukantoro; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (868.402 KB)

Abstract

Many technology offer to do the transfer data process. But those technology have its weakneses. UPnP is one of file sharing technology who able to cover the other weakneses. With using ssdp and soap protocol, UPnP able to zero configuration, multicast and can be used with various platform. Research using implementative method to able find out how UPnP can do the transfer data process and its performance in a network. The author do experiment to program model dan modify it so the program accordingly as desired. Program model successfully created and devided into server program and client program. From the program model UPnP able to do data transfer process with help from http protocol. For UPnP performance, with 500Mb data transfer speed can reach 15.69Mbps and with 1Gb data transfer speed can reach 4.65Mbps and from testing, server can accommodate 3 clients.
Analisis Konsumsi Daya dan Performa Pengunggahan dan Pengunduhan Data Pada Jaringan Ad-Hoc dan Jaringan Infrastructure Pada Raspberry Pi Dhani Wahyu Wijaya; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 7 (2018): Juli 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (644.773 KB)

Abstract

Nowdays, there are a lot of research about IoT that connects multiple devices to communicate with other devices using wireless network and several sensors. The sensor depends on the source of the electrical power, it is a battery or power bank which has limited power capacity. The limitation of electric power capacity cause some problems, for the sensor Raspberry Pi which is expected to be able to survive as long as possible. Thus, it is studied to upload and download the data by Ad-Hoc network and Infrastructure in one room and some rooms to figure out network performance and power consumption. A tool to measure the voltage and current used is the USB Doctor Weight and the protocol that is used is SCP. In testing of uploading and downloading 32 MB, 64 MB and 128 MB data in one room resulted in better performance and more efficient power consumption in network infrastructure. While on uploading and downloading data in some rooms with data 32 MB and 64 MB remain more efficient on Infrastructure network but on 128 MB data have decreased performance. The results of the 128 MB data upload test with Ad-Hoc network require power 0,06548 Wh and the download require power 0,04802 Wh. Then on a 128 MB data upload with Infrastructure network require power 0,09294 Wh and the download require power 0,07745 Wh. The power consumption difference with 128 MB data on upload is 0,0275 Wh and download 0,02943125 Wh by using Ad-Hoc network. So it can be concluded that in the study upload and download data of 32 MB, 64 MB, in one room and in some rooms more power efficient through the network Infrastucture. While on the upload and download 128 MB data in some rooms more power efficient through the Ad-Hoc network, because the Infrastructure network decreased performance.
Analisis Performa State Snapshot Transfers (SST) Tipe Blocking (Rsync) dan Non Blocking (Xtrabackup-V2) pada MariaDB Galera Cluster Gilang Ramadhan; Mahendra Data; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1125.575 KB)

Abstract

Reliability and availability of database server becomes the crucial things of application system. There are so many researches that have been done in order to increase the reliabilty and availability of database server. The example is using database replication mechanism. MariaDB is one of DBMS that has a replication mechanism through MariaDB Galera Cluster application. MariaDB Galera Cluster has several methods called State Snapshot transfer (SST) which is used for replication process, namely Rsync, Xtrabackup, Xtrabackup-v2, and Mysqldump. This study focused to compare the performance of Rsync method and Xtrabackup-v2 method. The experimental results show that both methods have a similar performance. Number of nodes in a cluster can affect the performance of cluster. Cluster with two nodes would be more vulnerable to become an error if one of the node becomes has failed. Therefore, the minimum number of nodes on a cluster is three on condition that there is just one node that failed. This experiment also results another conclusion that SST method that used and number of nodes can affect the replication times. Rsync method has a shorter duration of replication compared to the Xtrabackup-v2.
Analisis Performa Protokol 6LoWPAN pada Jaringan Sensor Nirkabel Menggunakan Cooja Simulator Wawan Darmawan; Sabriansyah Rizqika Akbar; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (892.211 KB)

Abstract

6LoWPAN (IPv6 over Low power Wireless Personal Area Networks), is an IPV6-based protocol that allows devices with small power consumption such as fixed sensors to connect and participate in IoT (Internet of Things) with greater scalability. This research simulate 6LoWPAN protocol on wireless sensor network (WSN) using Cooja simulator. Wireshark then used to analyse QoS (Quality of service) parameters, that is throughput, delay and jitter to know the performance of 6LoWPAN. Simulator is used because building a genuine propagation network takes a lot of time and costs. From the results of simulation that use cluster-based topology involving 10 clusters and routing protocol for low power and lossy network (RPL), the acquisition of throughput, delay and jitter based on Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) showing a good results. the highest throughput is obtained by Cluster 1 with 206 bps, the lowest delay was obtained by cluster 7 with 56 ms and the lowest jitter also obtained by cluster 7 with 0.003 ms. It can be concluded that the 6LoWPAN protocol performance on wireless sensor network is very good, consider the high throughput value with low delay and jitter value
Perbandingan Kinerja Protocol Routing Open Shortest Path First (OSPF) dan Routing Information Protocol (RIP) Menggunakan Simulator Cisco Packet Tracer Wahyu Sasongko Jati; Heru Nurwasito; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (944.031 KB)

Abstract

Routing is very important for the process of taking a packet from a device and sending it through the network to another device on a different network. The routing algorithm affects the sending process of a packet and also the network that exists on the routing. In a network topology to transmit data is used a variety of routing protocols. OSPF with link-state algorithms and RIP using distance vector algorithms is the most of popular used routing protocols. This study was conducted to compare the performance of the OSPF and RIP routing protocols on LAN networks. By comparing and analyzing the required travel time of the routing protocol in sending a number of different data packets, we can know which routing protocol is the fastest on topology that has been designed. From the results of the study can be concluded that the OSPF routing protocol faster in the delivery of data packets by looking at the results of the travel time required to deliver a specified number of data packets.
Implementasi Constrained Application Protocol (CoAP) pada Sistem Pengamatan Kelembaban Tanah Yosef Febri Wiryawan; Dany Primanita Kartikasari; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1104.568 KB)

Abstract

Recently, technology has been developed to facilitate human life in every aspects including agriculture. Implementation of technology in agriculture is still left behind for example in terms of observation soil moisture. Based on concept of Wireless Sensor Network (WSN) we can make a suitable network architecture to solve the problem. Wireless Sensor Network (WSN) is one of the emerging technologies which combine sensors and tiny embedded devices over a wireless communication medium. The aim of this study is how to make a reliable communication for the system. To accomplish our objectives, we implemented a lighweight protocol as a web transfer protocol named Constrained Application Protocol (CoAP) for the system. To collect the soil moisture data we integrated Microcontroller Wemos D1 and sensor YL-69 to perform as a sensor node, it sends sensing data to the server with bluetooth module HC-05. Then servers and clients will exchange data wirelessly using the CoAP protocol. To see the performance of the CoAP protocol, we tested the data exchanging that occurs between server and client in several scenarios. The test result revealed there is a significant increase of delay in payload size more than 64 bytes because of process blockwise mechanism in CoAP protocol. In addition, distance can also increase the delay in data transmission process.
Perbandingan Performa Database Apache HBase dan Apache Cassandra Sebagai Media Penyimpanan Data Sensor Internet of Things Dimas Malik Ibrahim; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1100.903 KB)

Abstract

Nowadays, internet has dominated the world, millions of data is exchanged daily either through web/mobile apps or internet use involving the objects around us to be able to communicate each another (currently known as Internet of Things/IoT). IoT requires a database with a good performance to be used as its storage media. Good performance it is like fast inserting data process and high level of availability. There are two types of databases at this time, Relational Database and Not Only SQL (NoSQL) Database. NoSQL Database is the proper type to be used as data storage media on IoT system because it has better scalability and availability level than Relational Databases. Of the many NoSQL Database, the author chooses HBase and Cassandra to compare their performance in this research, because both are the best in database Column-based storage model. The authors test the Throughput, Latency, Runtime CPU Usage, and Memory Usage using JMeter and YCSB to compare the performance of both these databases. The results suggest that Cassandra has Throughput, Latency and Runtime that is better than HBase. Meanwhile, HBase has CPU Usage and Memory Usage better than Cassandra.
Perbandingan Performa Intrusion Detection System (IDS) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood Emir Risyad; Mahendra Data; Eko Sakti Pramukantoro
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (738.016 KB)

Abstract

In recent years, Snort and Suricata have become based open source IDS which are progressing rapidly. However, there has been a problem among users to select both IDS in the case of TCP SYN Flood attack detection. Previous researches have compared both IDS in terms of POD and Social Engineering attacks on a sophisticated scope. Therefore, this study will be conducted within the scope of a single core and an apple-to-apple scenario.There are three methods that have been applied to the test environment. These methods are launching packets with normal traffic and bad traffic. Another method is to combine the two traffic and launch it into the research environment. The use of these three methods aims to determine the performance of IDS Snort and IDS Suricata in dealing with TCP SYN Flood attacks. The parameters to be tested in this research are detection accuracy, detection rate, detection effectiveness and use of system resources.Methods such as calculating percentage accuracy and standard deviation calculations are used to analyzing and discussing the results obtained in this test. From the discussion it was found that Snort IDS excel in aspects such as detection accuracy, detection speed and detection effectiveness. However, IDS Suricata is more efficient in resource usage compared to Snort IDS.
Analisis Performa Load Balancing Pada Broker MQTT Menggunakan Algoritma Round Robin Kevin Charlie; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (760.32 KB)

Abstract

MQTT is a communication protocol that requires a small resource and bandwidth. MQTT uses a broker in charge of connecting publishers and subscribers. MQTT brokers, especially Mosquitto, do not have mechanisms to overcome failures caused by CPU overload or device damage when only one broker is used. Thus, it takes load balancer and some brokers. In this research, a load balancer performance analysis using round robin algorithm is used to distribute MQTT brokers workload. The study was conducted on a single host using virtualization. There are 4 virtual devices, namely 3 brokers and 1 load balancer. Subscriber subscribes to the topic by accessing the load balancer address. Testing is done by using load balancer as differentiator variable to know impact given load balancer to broker. The result shows that load balancer with round robin algorithm is able to distribute the load evenly with the condition of all connected clients without any interruption with 13.56%, 13.68% and 15.12% CPU load for each broker with request of 400 that receive 10 publish message for each client. Then the system is able to reconnect to other brokers with a speed of 1.007 seconds when traffic is low and 1.005, 2.791, 4.593, and 2.005 seconds when traffic is high. Finally, the broker's message distribution takes about 0.362, 0.687, 0.891, 1.199, and 1.622 seconds for the number of publish messages of 25, 50, 75, 100, and 125.