Claim Missing Document
Check
Articles

Found 38 Documents
Search
Journal : Journal JCONES

Aplikasi Network Inventory Collection System Untuk Medukung Perencanaan Investasi Teknologi Informasi Sukmaaji, Anjik; Jusak, Jusak
Journal JCONES Vol 1, No 1 (2012): Pemanfaatan Teknologi Otomasi dan Jaringan Komputer
Publisher : Journal JCONES

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The growth of Information Technology (IT) investment is predicted to develop rapidly in the next few years. This will urge the need of a tool to help IT managers to manage and monitor their asset frequently. In this paper, we identify components that will contribute significantly to the planning of IT investment. The results were derived from a survey that was done in three big cities that might be considered as a representative of IT development in Indonesia, i.e. Jakarta, Surabaya and Denpasar (Bali). Based on the results of the survey, we have built a tool for managing and monitoring the IT assets, including configuration system, devices, storage media, interfaces and installed applications. The tool is utilizing the simple network management protocol (SNMP) for querying all IT assets information from each client/agent in a network.
ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC Putri, Rizky Ananto; Jusak, Jusak; Sukmaaji, Anjik
Journal JCONES Vol 2, No 1 (2013)
Publisher : Journal JCONES

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL UDP DENGAN DCCP MENGGUNAKAN TRAFIK DATA MULTIMEDIA Adinata, Feri Setiawan; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of network technology has created a multimedia application enters the world of internet. Skype, Yahoo Messenger, Facebook and Line are some examples of applications that provides multimedia features such as free call (VoIP) and video call (video conference) in it. Most of these applications typically use UDP instead of TCP as the transport protocol. The increased of UDP traffic has threaten TCP traffic that appears issues of fairness between the two protocols.In 2006 the IETF introduced a new protocol called Datagram Congestion Control Protocol (DCCP) CCID2 and CCID3. In fact its almost 8 years was introduced to the public, such applications are not using DCCP instead of UDP. So the question of performance, fairness and the Quality of Service level arises for multimedia data services between UDP and DCCP.Based on the results of testing against the Protocol UDP and DCCP, it is found that the average bandwidth utilization between UDP and CCID2 are respectively, 62.15% and 36.54%, the packet loss 1.12% and 10.08%, both of the delay 627 ms, both of the jitter 141 ms and both of the fairness 0.923. Furthermore, the average bandwidth utilization between UDP and CCID3 reaches 63% and 29.79%, the packet loss 0.5% and 0.92%, the delay 148ms and 283ms, the jitter 46ms and 79ms and both of the fairness 0.874. In summary, it can be concluded that the DCCP CCID2 has better performance and more suitable for VoIP/Video Conferencing instead of using the DCCP CCID3.
Karakterisasi profil serangan pada jaringan dengan melakukan pemodelan terhadap lalu lintas data Andinata, Phompi; Jusak, Jusak; Kusumawati, Weny Indah
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

: Network security became one of principal subtance in the world of information technology that alway experiencing developments. The rate of internet crime or cyber crime tended to increase as offered by publicist Kominfo Gatot S Dewa Broto throughout the year of 2012 in indonesia recorded an average of 1.25 million times per day. Genearlly hackers using a bias attack pattern know as DdoS (Distributed Denial of Service). The occurence of a DdoS attack is generally be preceded by pre-attack using media traffic data network. This step is to find security gaps bu using several techniques like port scanning ACK Scan, FIN Scan, SYN Scan or Scan tool by using a Port Scanner.To understand the statistical characteristics and pattern of some ACK Scan attacks, FIN Scan, SYN Scan and Port Scanner, in this project we do analysing and modeling of multiple attack in LAN and WAN networksResult of the analysis showed that the normal data traffic and data traffic that contains ACK Scan, FIN Scan, SYN Scan and Port Scanner in two netwok model (A) and (B) is lognormal with a comparison of Mean Square Error and the smallest value test of Anderson Darling compared to Gamma distribution and Weibull distribution
PEMODELAN KARAKTERISITIK DENIAL OF SERVICE ATTACK MELALUI ANALISIS DATA TRAFIK Wijaya, Octavianus; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DoS is one example of attacks that can disrupt the infrastructure of computer networks, this type of attack has a typical pattern, where in each attack will send a number of data packets continuously to attack the target. DoS Attack consists of UDP, PING and SYN Flood Attack. This study aims to get a mean, relative frequency, parameter values, the probability distribution, plot the data and the value of MSE. Subsequently analyzed using statistical methods, and modeling to estimate the parameters in the form of a probability distribution. The probability distribution is composed of a gamma distribution, lognormal distribution and weibull distribution. By using this model, it can be shown that the DoS Attack characteristic of UDP Attack and SYN Flood Attack are much closer to the lognormal distribution than Gamma the distribution or Weibull distribution. On the other hand, the distribution of the PING flood attack resembles the gamma distribution.
ANALISIS KARAKTERISTIK LALU LINTAS DATA INTERNET: APLIKASI WEB VIDEO STREAMING Jusak, Jusak; Susanto, Pauladie
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of technology, the need for information is increasing, which is not only in the form of text and picture information are needed but also involves all aspects of multimedia available, for example is video streaming technology. So analysis of QoS for data traffic on web applications video streaming like youtube is need to be done. QoS is the ability to guarantee the provision of resources (resource) and service differentiation in various types of applications which is one of the characteristics Internet data traffic. To determine the quality of web video streaming applications, QoS analysis must be done. delay, jitter, packet loss, and bandwidth utilization is the one of the parameter needed for QoS analysis. This analysis is expected to help network administrators in terms of network design for better future.
ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC Putri, Rizky Ananto; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.
IMPLEMENTASI DAN ANALISIS UNJUK KERJA JARINGAN OPENSWAN DAN OPENVPN PADA PT RELIANCE Yulianto, Wahyu Andy; Jusak, Jusak; Mardiana, I Dewa Gede Rai
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Virtual Private Network (VPN) is a communications technology that allows  connections to and from public network as if working on a private network. By using this technology, users are possible to access files, or even a database server inside the private network. The users are able to access the network using the same settings as they were physically located in a private network.This experiment are intended to get the value of the parameters and analyzing performance of the VPN network. To get these values real computer networks that consists of two VPN gateways equipped with tools and testing applications such as PING, FTP, tcpdump, video streaming (IP CCTV) applications and VoIP (SJPhone) were built.Network performance examination have obtained values of latency, packet loss, bandwidth delay  product and bandwidth utilization. It is shown that smaller latency will produce the most efficient bandwidth delay product. At the same time, small value of latency will produce large bandwidth utilization for TCP applications. On the other hand, small value of packet loss will result in large bandwidth utilization for UDP applications.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL TCP VEGAS DAN UDP DENGAN MENGGUNAKAN DATA STREAMING Andini, Irene Rizky; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of an advanced technology has affected human living in the use of modern communication technology which based on data streaming. Streaming is a transmission technology of sending data, video or audio in real time or pre -recorded from the sender to the receiver. The usage of this technology is very diverse in various activities, so that the data streaming requires a rapid protocol performance in the delivery process. The final task generates comparative characteristics of TCP Vegas and UDP which based on the quality of data streaming services with the parameters of bandwidth utilization test, packet loss, latency, and jitter. The data streaming that has been used includes Voice over IP and video streaming. This comparison is performed using the network simulator 2.From the analysis that has been done, we get the value of the parameters that have been set. In general, it has been found that the percentage of bandwidth utilization on UDP protocol is larger than TCP Vegas. Then, the percentage of packet loss on TCP Vegas is higher than the UDP protocol. While, the value of a latency and jitter on TCP Vegas has a higher value than the UDP protocol. 
RANCANG BANGUN WIRELESS SENSOR NETWORK UNTUK MONITORING SUHU DAN KELEMBABAN PADA LAHAN TANAMAN JARAK Pambudi, Kusbiono Wisnu; Jusak, Jusak; Susanto, Pauladie
Journal of Control and Network Systems Vol 3, No 2 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One source of vegetable oil highly prospective to be used as raw material for biodiesel is Jatropha curcas nkL. But to get the maximum oil content of Jatropha, takes temperature and soil moisture are controlled continuously. Because it takes a tool for monitoring crop. In this final project used technology Wireless Sensor Network ( WSN ). WSN is a wireless network consisting of multiple sensors that work together to monitor physical and environmental conditions. Thus supporting the sensor devices can facilitate monitoring temperature and humidity in the soil around the plant plantations distance.WSN communication protocol testing, showed that the sending or receiving data in accordance with the address of the destination node and 100meter range of reach. The average percentage error in moisture sensor node1 is 4% and node2 is 5.1%, the temperature sensor node is 0.43% and node is3.87% . While in the process of data validation, 95% of the system works well.
Co-Authors A. B. Tjandrarini Adani, Muhammad Faizin Aderusman, Rizky Adi Suryaputra Paramita Agus Ariyanto Agus Dwi Churniawan, Agus Dwi Alfian Angga Pradika Alim Rahmat Rido Anggara, Faris Widi Anjik Sukmaaji Atmaja, Bhagus Sugamayana Dwi Atmaja, Bhagus Sugamayana Dwi Budi Hari Nugroho Burhanuddin Surya Putra David Palguna Djojosuroto, Muh.Rahmat Dodi Wirawan Irawanto Effendy, Edwin David Eka Sari Oktarina Ekinasti, Anggi Tiara Citra Erwin Sutomo Feri Setiawan Adinata Firdaus, Deddy Mohammad Fumio Highy Suparlan Hakim, Arnaz Malikul Hakim, Arnaz Malikul Harianto Harianto Harianto, Gaguk Hasyim, Dealis Dinamika Henry Bambang Setyawan Heri Pratikno Hikam, Dicky Sirojul Hoky Ajicahyadi I Dewa Gede Rai Mardiana Ignatius Adrian Mastan Imam Fauzi Ira Puspasari Irene Rizky Andini Jap Fen Dy, Jap Fen Julianto Lemantara Kurnia, Lassa Nusti Kusbiono Wisnu Pambudi Kusuma, Otniel Reza Kusuma, Yusuf Budi M. J. Dewiyani Sunarto Mardianto Basuki Martinus Sony Erstiawan Mochammad Arifin Muhammad Nizar Muhammad Syakir Kautsar Mustafa, Putra Yoga Dwiangga Mustafa, Putra Yoga Dwiangga Nabiela , Noorsy Zidna Nahusuly, Nova Nahusuly, Nova Nanda Surya Setiawan Octavianus Wijaya Oktaviyani, Tri oktorianto, kevin widoni Pamungkas, Johan Pantjawati Sudarmaningtyas Pauladie Susanto Phompi Andinata Pietter, P. Earl Pietter, P. Earl Pradana, Yulyus Effendi Prastyo, Pangky Ari Wibowo Putra, Febri Pradana Putra, Febri Pradana Putro, Abid Eka Sukatno Ramadhanis, Puspayati Ramadhanis, Puspayati Ramzi, Muhammad Ramzi, Muhammad Rendi Haris Nofianto Reppy Reisa Rido, Alim Rahmat Rido, Alim Rahmat Rizky Ananto Putri Rizky Kurniawan Robiyanto Robiyanto, Robiyanto Rohmat Solikin Rudi Santoso, Rudi Saputro, Dedy Tri Saraswati, Dyah Lestari Sembiring, Rinawati Septian Adi Herlambang, Septian Adi setiawan, ashari SETIAWAN, BRAMASTA AGNANDA SETIAWAN, BRAMASTA AGNANDA SOLEHUDIN, SONY SOLEHUDIN, SONY Suarjaya, I Gede Sugiarto, Wahyu Rokhman Susanti, Ririn Susanti, Ririn Susanto, Ubaidillah Susianto Tri Resmana Syafi'i, Imam Syaiful, Putri Oktaviani Tajuddin Akbar Tegar Heru Susilo Teguh Sutanto Triwibowo, Aris Viranda, Rizkyana Surya Vivine Nurcahyawati Wahyu Andy Yulianto Wahyu Setiawan Weny Indah Kusumawati Wirandha Ryan Pratama Wiyono, Reynaldi Arfian Agus Yoga Eka Saputra Yosefine Triwidyastuti Zamri Ibrahim, Mohd