Claim Missing Document
Check
Articles

Found 22 Documents
Search

ANALISA PENCEGAHAN AKTIVITAS ILEGAL DIDALAM JARINGAN MENGGUNAKAN WIRESHARK Diansyah, Tengku Mohd
Jurnal TIMES Vol 4, No 2 (2015)
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.346 KB)

Abstract

Faktor kemanan jaringan computer merupakan satu hal yang mutlak dalam membangun suatu jaringan. Pada dasarnya system keamanan yang dimiliki oleh system operasi tidaklah cukup untuk mengamankan jaringan komputer. Oleh karena itu untuk mendapatkan sebuah keamanan jaringan computer maka diperlukan suatu tools yang dapat mendeteksi adanya suatu mekanisme serangan dari jaringan. Jenis serangan yang terjadi bias flooding ataupun syn flood. Dimana tujuan serangan ini adalah untuk membuat komputer yang mengakses tidak bisa berjalan dengan normal sehingga wireshark ini dapat membantu untuk mendeteksi serangan yang akan terjadi sehingga pengguna jaringan internet tidak khawatir dengan serangan tersebut.
Pemanfaatan Algortima K-Means Clustering Sebagai Pengamanan Pencurian Buah Kelapa Sawit Se-Distrik Tandun PT. Perkebunan Nusantara V Tanjung, Aristu Fahri; Diansyah, Tengku Mohd; Rismayanti, Rismayanti
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 3, No 4 (2019): Oktober 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v3i4.1443

Abstract

Oil palm fruit theft at PT. Perkebunan Nusantara V still occurs frequently, especially in one district, Tandun District which has 6 oil palm and rubber plantations. The high rate of theft of oil palm fruit causes a decrease in the production of oil palm fruit and palm kernel. This study discusses the use of the K-Means Clustering algorithm as one of the data mining algorithms in grouping data on palm oil theft in the oil palm plantation area of Tandun District. With a number of theft data, this study enables the discovery of the potential for theft of oil palm fruit in the location of oil palm plantations at low, medium and high levels. K-Means Clusering algorithm calculation uses 3 supporting parameters, namely the area of each afdeling, the number of fruits that have been saved, and the number of fruits that have been stolen. After knowing the locations that have the potential for theft of oil palm fruit, the company can implement a strategy to safeguard those potential locations.
METODE ACL(ACCESS CONTROL LIST) MENGGUNAKAN FRAME RELAY PADA JARINGAN WAN (WIDE AREA NETWORK) Diansyah, Tengku Mohd
Jurnal Warta Dharmawangsa No 49 (2016)
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/wdw.v0i49.154

Abstract

PEMANFAATAN FITUR CACTI BERBASIS TELEGRAM MESSENGER UNTUK NOTIFIKASI GANGGUAN JARINGAN DI PT. TELKOM AKSES MEDAN Prida Apriani; Tengku Mohd Diansyah syah; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (520.201 KB)

Abstract

Network monitoring helps to monitor and understand network problems that are happening so it can be handled as quickly as possible. CACTI is a network monitoring tools that monitors the network status when the network is up and down based on ping method and give a warning if a problem occurs in the network with an email form. However, the email function on CACTI has never been used by the engineer of PT Telkom Akses Medan due to the media coordination and communication that is being used on daily basic is Telegram Messenger. We need to install and analyze CACTI, designing the integration process of Telegram Messenger and handling fo notify network problems based on the operational area, to implement it with PHP and MySQL programs language by testing it with an exist device network. This final project create a CACTI function that able to notify a network problem through a notification from Telegram Messenger about the problem that occurs on the network with a dominance to deliver automatically and choosing each of the dynamic operational area.
Rancangan Media Penyimpanan Berbasis Mikrokontroler Menggunakan Raspberry Pi sebagai Mini Server Portabel Tengku Mohd Diansyah; Elza Ilyanda
JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP) Vol. 1 No. 1 (2018): Jutikomp Volume 1 Nomor 1 April 2018
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v1i1.339

Abstract

Pada saat ini teknologi kabel sudah tidak banyak digunakan lagi, karena teknologi nirkabel memungkinkan pengguna menggunakan media penyimpanan dengan lebih efesien. Aplikasi media penyimpanan mini berbasis mikrokontroler dengan raspberry pi sebagai server dimaksudkan untuk mempermudah pengguna dalam penyimpanan data karena bersifat portabel. Hardware yang diimplementasikan menggunakan metode client server dalam arsitekturnya. Dari hasil percobaan dapat disimpulkan bahwa server raspberry pi yang telah dibangun tidak dapat menumpung terlalu banyak user karena spesifikasi dari raspberry pi yang masih tergolong rendah. Setelah dianalisa diketahui bahwa setelah 10 user mengakses server raspberry pi secara bersamaan maka salah satu perangkat dari user akan mengalami Request Time Out atau biasa disebut error page. Oleh sebab itu kiranya perlu mengupgrade hardware raspberry pi ke versi terbaru yang peformanya lebih unggul agar dapat menampung lebih banyak user untuk mengakses server secara bersama-sama.
PERBANDINGAN ROUTING PROTOCOL EXTERIOR BGP VERSI 4 DENGAN ROUTING INTERIOR EIGRP PADA ALGORITMA LINKSTATE MENGGUNAKAN PARAMETER PACKET LOSS Muhammad Ikhsan Azhari; Tengku Mohd. Diansyah; Ari Usman
(JurTI) Jurnal Teknologi Informasi Vol 3, No 2 (2019): DESEMBER 2019
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (629.559 KB) | DOI: 10.36294/jurti.v3i2.1071

Abstract

Abstract - Computer networks very influential on the speed of transferring data from one computer to another computer by using a PC or server, in this case, the routing configuration is very influential. The best routing route selection is the solution to determine the most rapid and efficient routing, and as the best routing consideration,  the researcher has examined two routings, namely BGP (Border Gateway Protocol) routing and EIGRP (Enhanced Interior Gateway Routing Protocol) using the Cisco Paket Traccer application. After the researcher was done an experiment, the researcher gets the result of the average EIGRP delay that is 54.619 and the packet loss result between EIGRP and BGP is not available (successful packet delivery).  Keywords -  BGP Routing Protocol Exterior, EIGRP Interior Routing, Algorithm Link state, Packet loss Abstrak - Jaringan komputer sangat berpengaruh pada kecepatan transfer data antar satu komputer ke komputer lain baik itu pc maupun server, dalam hal ini konfigurasi routing sangat berpengaruh. Pemilihan jalur routing terbaik merupakan solusi untuk menentukan routing yang paling cepat dan efisien, dan sebagai bahan pertimbangan routing terbaik penulis meneliti dua routing yakni routing BGP (Border Gateway Protocol) dan routing EIGRP (Enhanced Interior Gateway Routing Protocol) mengguanakan aplikasi Cisco Packet Traccer. Setelah dilakukannya percobaan yang penulis perbuat, maka didapatkan hasil dari rata-rata delay EIGRP yaitu 54,619 dan hasil dari packetloss antara EIGRP dan BGP tidak ada (pengiriman paket sukses). Kata Kunci - Routing Protocol Exterior BGP, Routing Interior EIGRP, Algoritma Link state,  Packet loss.
Penerapan Algoritma C4.5 Untuk Memprediksi Penjualan Lele Pada Kolam Pancing Galatama Tengku Mohd Diansyah; Yogi Exprada
Jurnal Sistem Komputer dan Informatika (JSON) Vol 3, No 4 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v3i4.4264

Abstract

Advances in technology and information today can produce a smart innovation in business, which we can call business intelligence. In this technological advancement is the use of previous data which will later be used to obtain a data update to increase sales of a product in this case the technique is called a data mining technique which can extract useful information from the sales data warehouse. The use of data mining techniques is expected to help speed up the decision-making process,enabling decision-makers to manage the information contained in transaction data into new knowledge. Therefore the seller must be more careful in providing the type of product, in this case the researcher conducts research on the sale of catfish which will be in great demand, so that the seller will be able to provide recommendations for the type of catfish that has the most demand, so that the seller can classify types of catfish from the type, price, and weight of the catfish using aclassification method carried out using the C4.5 data mining algorithm. The C4.5 algorithm is a tree data type decision classification algorithm. The decision tree C4.5 algorithm is built in several stages which include selecting the attribute as the root, creating a branch for each value and dividing the case on the branch. This step will be repeated for each branch until all cases in the branch have the same class. From the results of tree testing of decision search results from sales datausing the RapidMiner Studio application, the results that have the highest gain in predicting catfish sales are weight and type so that it will produce the status of selling catfish in demand and those that are not selling by giving a value of >= 25 in katakana in demand. and <25 are said to be not selling well, so the Galatama pond manager can make a reference to pay attention to these two variables in selling catfish to get the best sales.
ANALISA PENCEGAHAN AKTIVITAS ILEGAL DIDALAM JARINGAN MENGGUNAKAN WIRESHARK Tengku Mohd Diansyah
Jurnal TIMES Vol 4 No 2 (2015)
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.346 KB)

Abstract

Faktor kemanan jaringan computer merupakan satu hal yang mutlak dalam membangun suatu jaringan. Pada dasarnya system keamanan yang dimiliki oleh system operasi tidaklah cukup untuk mengamankan jaringan komputer. Oleh karena itu untuk mendapatkan sebuah keamanan jaringan computer maka diperlukan suatu tools yang dapat mendeteksi adanya suatu mekanisme serangan dari jaringan. Jenis serangan yang terjadi bias flooding ataupun syn flood. Dimana tujuan serangan ini adalah untuk membuat komputer yang mengakses tidak bisa berjalan dengan normal sehingga wireshark ini dapat membantu untuk mendeteksi serangan yang akan terjadi sehingga pengguna jaringan internet tidak khawatir dengan serangan tersebut.
Penerapan Jaringan Wireless pada Desa Saentis Kabupaten Deli Serdang Tengku Mohd. Diansyah; Ilham Faisal; Dodi Siregar
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 2 No 02 (2020): EDISI SEPTEMBER 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/prioritas.v2i02.223

Abstract

Among the village administration, especially in Desa Saentis, the internet is a very important need in serving the community which is used as a medium for information exchange and direct communication with the community from a distance. However, the convenience of the internet is not really felt among the village government in the village of Percut Sei Tuan, apart from the internet network that is not supportive, the community service process is still completely manual, it is hoped that with a wireless network system connected to the internet it can serve the community through a website that will be provided by the government village. It is hoped that later the community around the Seantis Village Office can enjoy an internet connection and become an internet literate village and become a smart village with increasingly rapid technological developments. And the future benefit is that the village is expected to become a pilot village in Deli Serdang district by utilizing an internet connection to share information with the general public.
Simulasi Pengamanan Virtual Server Menggunakan Dionaea Honeypot Dan Tunneling Sebagai Proses Pengamanan Komunikasi Data Nauval Alfarizi; Tengku Mohd Diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.632 KB)

Abstract

Cybercrime is carried out to obtain information, where the information obtained is used as a source of data in carrying out an attack. Attacks generally lead to various scopes ranging from physical servers to virtual servers. This research was conducted by the author to be able to carry out the implementation process based on qualitative development of existing technology, namely the design of a virtual server system using Dionaea honeypot and PPTP tunneling in carrying out a form of security for data communication that can cover vulnerabilities to a device on a virtual server. The results of the research that the author conducted showed that there was a difference in each attack test. When an attack attempt is carried out into each port that is not configured on the main service on the virtual server, the results of the attack are that it can detect intruders and vice versa