Claim Missing Document
Check
Articles

Found 22 Documents
Search

Teknologi Pengembangan Jaringan Internet Untuk Sekolah di Pedesaan Tengku Mohd Diansyah; Ilham Faisal; Dodi Siregar; Ade Zulkarnain Hasibuan; Sayuti Rahman
JPM: Jurnal Pengabdian Masyarakat Vol. 3 No. 3 (2023): Januari 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jpm.v3i3.413

Abstract

In this community service activity we are developing an internet network that will be used by schools in rural areas, one of the areas in Stabat City in building this internet network we use the ubnt antenna which is reliable in spreading signals in the countryside and our goal is to build an internet network in the village, namely to help the community in obtaining information that is currently very fast and the obstacles that the surrounding community has are very difficult to connect to the internet network after the team pays attention to the problem because of the large number of palm trees that make it very difficult to get a signal in the village and even the school when the school is very fast. The obstacle that the village has is that the signal in the village is not up to 2 bars so that the surrounding community is very difficult to connect to the internet network after the team noticed the problem because of the large number of palm trees which made the signal very difficult to get by local residents and even schools currently have difficulty in the learning process, let alone accessing dapodik owned by the school which must be connected to the internet network.
Analisis Pemanfaatan Teknik Serangan DDOS pada Mikrotik Cloud dan Melakukan upaya penangannya Syahendra Surya; Tengku Mohd Diansyah; Risko liza
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (220.192 KB)

Abstract

Internet services have many benefits and are widely used, but also have disadvantages that can be utilized by hackers to carry out attacks such as DDoS. One solution to manage and control internet networks is to use MikroTik CHR (Cloud Hosted Router), a virtual router solution provided by MikroTik. CHR is designed to run on various virtualization platforms such as VMware, VirtualBox, Hyper-V, and Clouds such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure.This research aims to analyze DDoS attack techniques used and implemented on the MikroTik CHR platform and the security effort strategies that can be used to protect MikroTik CHR from DDoS attacks that can cause service disruptions and financial losses and their handling. This research only focuses on DDoS attacks on MikroTik CHR and security strategies that can protect it from attacks. The results show that some effective security strategies include configuring firewalls, enabling protection features, and performing regular monitoring and software updates. In conclusion, the MikroTik CHR can be protected from DDoS attacks with proper security strategies, and it is necessary to pay attention to strict security monitoring, software updates, and an integrated and comprehensive security strategy to protect the MikroTik CHR from DDoS attacks.
Manajemen Pencegahan Serangan Jaringan Wireless Dari Serangan Man In The Middle Attack Tengku Mohd Diansyah; Ilham Faisal; Dodi Siregar
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 1 (2023): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i1.134

Abstract

Currently, wireless networks are very widely used to communicate because wireless networks are very fast and communicate without using cables, by using this wireless it turns out that there are weaknesses or security gaps due to irresponsible people illegally such as looking for backdoor gaps to infiltrate and attack aspects of authenticity. If a crime occurs, how to prevent the crime or attack. In this article, the possibility of an attack with the type of attack carried out is a man in the middle attack from this attack experiment will be carried out 5 times the attack experiment in this experiment the calculation of QoS (Quality of Service) is carried out, namely calculating how much packet loss and the results obtained in this attack experiment with the calculation of packet loss as much as 0.291% loss, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss which means this attack successfully attacks wireless communication. To prevent this attack activity, first know the technique of how the attack runs on a wireless network, using ettercap on linux times.
Penggunaan Router Mikrotik Untuk Memberikan Kualitas Suara Yang Dihasilkan Pada Protokol IPV4 Dan IPV6 Habibie, Ananda; Diansyah, Tengku Mohd; Handoko, Divi
Journal of Computer Science and Informatics Engineering Vol 3 No 2 (2024): April
Publisher : Ali Institute of Research and Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55537/cosie.v3i2.742

Abstract

IP addresses are also known as computer identification codes on the network / internet, every computer connected to the network must have an IP address on each interface and the IP address itself must be unique because no computer can use the same IP address. same. 32-bit IPv4 addresses will be increasingly limited and difficult to obtain in the future, therefore a new development of IP addresses is needed, namely, Internet Protocol vesion 6 (IPv6) or known as Internet Protocol Next Generation (IPNG) is a layer third protocol created to replace IPv4. At this time not only computers are connected to the internet, but everyday equipment such as cell phones, PDAs, household appliances and so on are also connected to the internet. The author tries to do a comparative study of the use of IPv4 and IPv6 in building a Local Area Network (LAN). This research is expected to help users who will make the transition from IPv4 to IPv6
Penggunaan Set top box Bekas untuk Dimanfaatkan sebagai Cloud Server Ardiansyah, Muhammad Fahri; Diansyah, Tengku Mohd; Liza, Risko
Blend Sains Jurnal Teknik Vol. 1 No. 2 (2022): Edisi Oktober
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (417.247 KB) | DOI: 10.56211/blendsains.v1i2.115

Abstract

The utilization of data storage media is currently very necessary to support the progress process in the digital era as it is today. One of the hardware needed to build personal data storage is HDD. But there are times when users need extra storage space using the internet or using the cloud. However, not all users can afford to rent or build an adequate server for securing personal data storage. Not all users need a server infrastructure that has high specifications to meet their needs. set top box is a device in the single-board computer category that is widely circulated in Indonesia. Set top box devices can be obtained at an affordable price, but can be a server. This research develops data storage based on a samba server application on a set top box device. Testing was done to change the default set top box operating system to the Linux operating system, the results showed that used set top box devices can be used as mini servers, the results of all the tests carried out obtained a result, namely a comparison of RAM and storage usage between the Pulpstone operating system and the system. armbian Linux operation has an increase in total RAM usage. Armbian Linux is greater than Pulpstone RAM usage which has an increase of 7.4% of the total RAM usage of the Pulpstone operating system, and data storage of the armbian Linux operating system has an increase of 74.4% from the data storage of the Pulsptone operating system, so Operating system changes can affect the total usage of RAM and data storage on the operating system used on the set top box device.
Desain Grafis Peningkatan Kemampuan Multimedia Pada Remaja Desa Seantis Diansyah, Tengku Mohd; Aulia, Rachmat; Siregar, Dodi
Jurnal TUNAS Vol 1, No 1 (2019): Edisi November
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (180.639 KB) | DOI: 10.30645/jtunas.v1i1.10

Abstract

The theme in the implementation of community service activities is graphic design. Increasing the ability of multimedia in Saentis village adolescents in order to increase the ability of graphic design for youth in Seantis village. As the aim of this activity is to introduce, train and improve mosque skills in the IT field specifically in the field of graphic design through the design of banners or banners. This dedication supports the creation of young people who have talent and skills in the field of graphic design that can be used to get additional training with attractive designs such as printing business.
Analisis Algoritma Link-State yang digunakan pada Protokol Routing Is-Is dan OSPF Robbi, Sabbiisma; Diansyah, Tengku Mohd
Jurnal Ilmiah Universitas Batanghari Jambi Vol 25, No 3 (2025): Oktober
Publisher : Universitas Batanghari Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33087/jiubj.v25i3.6316

Abstract

This study aims to analyze the link-state algorithm implemented in two interior routing protocols, OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System), based on Quality of Service (QoS) parameters and convergence time. The research uses a quantitative approach with an experimental method through network simulation using GNS3 and traffic analysis via Wireshark. A nine-router topology with area segmentation is built to evaluate the performance of each protocol under normal and failure conditions. The parameters tested include delay, jitter, throughput, packet loss, hop count, routing cost, and convergence time. The results indicate that IS-IS tends to provide more stable delay and routing cost across areas, while OSPF performs better in convergence speed. Therefore, selecting the appropriate routing protocol depends on the network’s preference between stability and recovery speed.
Strategi Iklan Google Ads yang Efektif untuk Meningkatkan Omset UMKM Hasibuan, Ade Zulkarnain; Siregar, Dodi; Diansyah, Tengku Mohd; Faisal, Ilham
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol. 6 No. 01 (2024): EDISI MARET 2024
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/prioritas.v6i01.901

Abstract

Pengabdian pada masyarakat ini mengkaji permasalahan pemasaran yang dihadapi oleh UMKM Sekar Handycraft, yang secara kreatif menggunakan sampah sebagai bahan baku untuk produk handycraft mereka. Meskipun UMKM ini telah aktif memanfaatkan media sosial seperti Facebook, Instagram, dan platform lainnya untuk mempromosikan produk mereka, mereka masih mengalami kendala dalam mencapai pasar yang lebih luas dan meningkatkan penjualan produk yang mereka miliki. Salah satu solusi yang ditawarkan melalui kegiatan pengabdian masyarakat ini adalah memberikan pelatihan penggunaan iklan Google Ads kepada UMKM Sekar Handycraft. Pelatihan ini dirancang untuk memberikan pemahaman yang komprehensif tentang cara menggunakan Google Ads sebagai alat untuk memperluas jangkauan pemasaran dan meningkatkan visibilitas produk yang mereka hasilkan di platform pencarian. Dengan memanfaatkan fitur penargetan konsumen yang tepat dan strategi iklan yang efektif, diharapkan bahwa UMKM Sekar Handycraft dapat menarik lebih banyak calon pembeli dan meningkatkan penjualan mereka secara signifikan. Selain itu, melalui pelatihan ini, diharapkan bahwa UMKM Sekar Handycraft akan memperoleh keterampilan baru dalam merancang dan mengelola promosi iklan secara mandiri, sehingga memungkinkan mereka untuk terus memperbarui dan menyesuaikan strategi pemasaran mereka sesuai dengan perubahan dalam kebutuhan pasar dan tren konsumen. Dengan demikian, kegiatan pengabdian masyarakat ini tidak hanya bertujuan untuk memberikan solusi jangka pendek terhadap masalah pemasaran yang dihadapi oleh UMKM Sekar Handycraft, tetapi juga untuk memberdayakan mereka dengan pengetahuan dan keterampilan yang dapat mendukung pertumbuhan dan keberlanjutan bisnis mereka dalam jangka panjang.
IMPLEMENTASI METODE WEIGHTED PRODUCT DALAM PENENTUAN PEMBERIAN PUPUK SUBSIDI UNTUK PETANI Salsabila, Salsabila; Lubis, Abdul Jabbar; Diansyah, Tengku Mohd
JUDIS : Jurnal Multidisiplin dan Sains Vol 1, No 2 (2025): Maret
Publisher : Compart Digital

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63854/jms.v1i2.45

Abstract

Pemberian subsidi pupuk merupakan langkah penting dalam mendukung produktivitas pertanian dan kesejahteraan petani. Penelitian ini bertujuan untuk menerapkan metode Weighted Product (WP) sebagai alat bantu dalam menentukan penerima pupuk subsidi secara objektif dan terukur. Metode WP dipilih karena kemampuannya untuk menangani berbagai kriteria penilaian dengan memperhitungkan bobot kepentingan setiap kriteria. Dalam penelitian ini, beberapa kriteria penilaian seperti luas lahan, produktivitas tanaman, dan kebutuhan pupuk digunakan untuk mengevaluasi alternatif petani. Data petani dinormalisasi dan dihitung menggunakan rumus WP, dengan hasil akhir menunjukkan nilai untuk setiap petani. Hasil analisis menunjukkan bahwa petani nomor 5 memperoleh nilai tertinggi sebesar 0.120. Nilai ini menandakan bahwa petani nomor 5 adalah alternatif yang paling optimal untuk menerima pupuk subsidi berdasarkan kriteria yang telah ditetapkan. Penelitian ini menggarisbawahi efektivitas metode WP dalam membuat keputusan distribusi subsidi yang adil dan berbasis data. Implementasi metode ini tidak hanya menjamin transparansi tetapi juga memfasilitasi pengalokasian sumber daya yang lebih efisien. Rekomendasi untuk ke depan termasuk pembaruan berkala pada bobot kriteria dan data untuk mencerminkan perubahan kebutuhan dan prioritas serta penerapan metode ini pada bidang-bidang lain yang memerlukan pengambilan keputusan berbasis kriteria.
SISTEM MONITORING JARINGAN DAN OPTIMALISASI MANAJEMEN BANDWIDTH DENGAN ALGORITMA HTB (HIERARCHICAL TOKEN BUCKET) Riyan, Muhammad; Lubis, Abdul Jabar; Diansyah, Tengku Mohd
CompTech : Jurnal Ilmu Komputer dan Teknologi Vol 1, No 2 (2025): Maret
Publisher : Compart Digital

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63854/comptech.v1i2.40

Abstract

Di era digital yang terus berkembang, efisiensi manajemen jaringan menjadi kebutuhan yang krusial, terutama dalam menjaga stabilitas dan distribusi penggunaan bandwidth yang adil. Penelitian ini mengajukan sistem pemantauan jaringan yang dioptimalkan melalui integrasi algoritma manajemen bandwidth Hierarchical Token Bucket (HTB). Algoritma HTB memungkinkan pembagian bandwidth secara terstruktur dan hierarkis, memastikan alokasi bandwidth sesuai dengan prioritas yang telah ditentukan untuk setiap pengguna atau layanan. Dengan penerapan HTB, jaringan dapat dikelola lebih efisien, mengurangi kemacetan lalu lintas, dan memaksimalkan pemanfaatan sumber daya jaringan. Sistem pemantauan yang dikembangkan dalam penelitian ini juga dilengkapi dengan fitur pemantauan waktu nyata, memungkinkan administrator jaringan untuk mengawasi penggunaan bandwidth secara akurat dan tepat waktu. Data penggunaan bandwidth dikumpulkan dan dianalisis untuk memberikan wawasan mendalam mengenai kondisi jaringan serta rekomendasi penyesuaian kebijakan manajemen berdasarkan kebutuhan operasional. Hasil pengujian menunjukkan bahwa sistem ini mampu meningkatkan efisiensi penggunaan bandwidth, mengurangi waktu respons jaringan, serta memberikan prioritas yang lebih optimal kepada layanan-layanan kritis. Dengan demikian, implementasi HTB dalam sistem monitoring ini memberikan solusi efektif bagi tantangan manajemen bandwidth, khususnya pada jaringan berskala menengah hingga besar.