Claim Missing Document
Check
Articles

KLASIFIKASI PEMANFAATAN OPEN SOURCE RESOURCE PADA MULTI-EDGE COMPUTING DENGAN JARINGAN PRIVATE 5G YANG BERKUALITAS DAN LOW LATENCY MENGGUNAKAN TEKNOLOGI NETWORK SLICING Prasetiyo, Oka; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.391

Abstract

Multi-edge computing is one of the technologies that allows data processing to be performed at the edge of the network, thereby reducing latency and speeding up overall data processing. On the other hand, 5G private networks with high quality and low latency enable fast and stable data transmission. However, in implementing multi-edge computing technology with 5G private networks, it is necessary to use the right open source resources to support its success at a lower investment cost. This thesis aims to classify the utilization of open source resources in multi-edge computing technology with quality and low latency 5G private networks using network slicing technology. The development methodology includes literature study, system development, data collection, data analysis, and system performance evaluation implemented on top of type 2 hypervisor virtualization on Virtualbox. The results of this thesis are expected to show that there are several open source resources that can be used in multi-edge computing technology with 5G private networks, such as Open5gs, Kubernetes, Virtualbox, so as to form a network with low latency and low cost.
OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN Juliansah, Jodi; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.412

Abstract

DMVPN (Dynamic Multipoint Virtual Private Network) is a VPN technology that can simplify the configuration process and improve network efficiency. The purpose of this research was conducted as a response to the obstacles experienced by companies in VPN network performance that did not meet expectations and reduced high operational and infrastructure costs related to the performance of the current VPN network. In addition, to determine the extent to which the use of DMVPN can improve the performance of VPN networks in companies. The method used is data collection through observation and interviews, and analysis of the data that has been collected. The results showed that the use of DMVPN can increase the efficiency of the VPN network in the company by reducing traffic load and speeding up the data transmission process. Therefore, DMVPN technology is highly recommended for companies that require complex VPN networks and need optimal network performance. The results of this research are expected to provide a better understanding of the potential and effectiveness of using DMVPN in optimizing the performance of VPN networks in companies. It is expected that the implementation of DMVPN can increase data transfer speed, reduce latency, and increase data security in VPN networks. In addition, it is also expected that the use of DMVPN can reduce the operational and infrastructure costs associated with VPN networks, so that companies can achieve higher efficiency
Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping Nurfaishal, Muhammad Dzaky; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.975

Abstract

In the industrial era 4.0, which is marked by the rapid progress of computer networks and the internet, network security at Layer 2 is part of the Data Link Layer in the OSI model, which is very important considering the increasing number of cyber threats. This research aims to compare the effectiveness of various security algorithms applied to Layer 2 switches, namely MAC Address Filtering with Port Security, VLAN Hopping Mitigation, and DHCP Snooping. Some of these methods have the function or purpose of creating MAC address filtering, port limitations, VLAN protection, ARP, etc. The device used to conduct this research is a Cisco Switch. This research uses an experimental approach by implementing each method in different network scenarios and comparing it with external data, measuring effectiveness based on attack detection and prevention, as well as its impact on network performance, then combining several of these methods into one scope. The results show that each method has its own advantages and disadvantages, which function to block various types of attacks such as Flooding, Snooping, and Rogue DHCP. It is highly recommended to combine all security methods into one integrated system.
Analisis Sentimen Respon Publik Terhadap Program Internet Gratis di Platform X Melalui Pendekatan Algoritma Naïve Bayes Julianto, Muhammad Rizky; Akbar, Yuma; Wahyudi, Tri
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.981

Abstract

The free internet program was launched in response to the public's need for affordable internet access. Digital transformation relies on four main pillars, including infrastructure, government, digital society, and the economy. In addition, connectivity is also an important component. Indonesia is one of the countries where many people are not connected to the internet. We Are Social reported that there are 63.51 million people throughout the country who have not been connected to the internet until early 2023. The number is the eighth largest globally. After the acceleration of ICT infrastructure development, there is a need for a free internet program initiated by the government or certain organizations that aims to provide wider and more equitable internet access, especially to students and the general public, especially in areas that have not yet received internet access. Although free internet programs are very beneficial, it is undeniable that there are a number of negative impacts that need to be considered. It is important to be aware of and overcome its negative impact. It is necessary to Sentiment Analysis of free internet programs to find out how much positive and negative responses there are in this program with the Naive Bayes algorithm approach so that the need for free internet programs can be realized.
Manajemen Bandwidth Jaringan dengan Metode Per Connection Queue (PCQ) Pada Mikrotik di Masterpiece Family Karaoke Tebet Anwar, Imam Dzikrilloh; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.986

Abstract

Masterpiece Family Karaoke Tebet frequently faces bandwidth management issues, especially during evenings and weekends due to uneven bandwidth usage. This causes network congestion and a decline in service quality, negatively impacting customer experience. To address this issue, this study applies the Per Connection Queue (PCQ) method on MikroTik devices. The PCQ method ensures fair and efficient bandwidth distribution among users and manages usage time to maintain network stability. This study involves several stages: problem identification, a literature review to explore previously applied bandwidth management methods, and data collection through direct observation at Masterpiece Family Karaoke Tebet during peak times. The PCQ implementation involves configuring MikroTik devices to distribute bandwidth fairly among users. Network performance is evaluated based on connection speed, network stability, and perceived service quality by comparing data before and after PCQ implementation. The evaluation results show that implementing the PCQ method on MikroTik devices significantly improves network performance. Connection speed increases, network stability is maintained, and perceived service quality improves. Thus, PCQ proves to be an effective solution for addressing bandwidth management issues at Masterpiece Family Karaoke Tebet.
Analisis Konfigurasi Tunnel IPv6, Auto Tunnel, dan ISATAP dalam Pembangunan Infrastruktur Jaringan Akbar, Yuma; Setiawan, Kiki; Aula, Raisah Fajri; Aimar, Muqorrobin
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.993

Abstract

IP (Internet Protocol) is needed to be the address of a device that wants to connect to each other, whether connected locally or to the internet. As technology develops, IP addressing allocation becomes increasingly necessary. The IP address that is often used is IPv4, but IPv4 allocation is increasingly limited. For this reason, a renewable IP version was created, namely IPv6. IPv6 itself has many advantages in terms of security which is equipped with encryption, then in terms of effectiveness in configuration which can use Auto Config, as well as a larger number of allocations compared to IPv4. If IPv4 only uses 32 bits, IPv6 uses 128 bits, for this reason the number of allocations given by IPv6 is much greater. This amount should be able to cover the lack of allocation from IPv4. Therefore, IPv4 to IPv6 migration must be carried out slowly, in-order-to overcome the lack of allocation in IPv4. Fortunately, IPv6 tunneling can run in parallel with IPv4 without disrupting existing infrastructure. Where IPv4 can be used as an Underlay Network (a network that is the foundation of the virtual network above it), and IPv6 will be an Overlay Network (a virtual network that connects users as if they were connected directly, this virtual network must be built on top of the Underlay Network, in this case the IPv6 tunnel will be used as a virtual network).
Analisis Tingkat Kepuasan Pelanggan Terhadap Pengguna Jasa Layanan Grab Menggunakan Metode C4.5 Permatasari, Veren Nita; Aula, Raisah Fajri; Akbar, Yuma; Hidayat, Aditya Zakaria
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.1002

Abstract

Technological advances have brought significant changes in various aspects of life, including transportation. Grab as one of the pioneers of online transportation services in Indonesia is the main choice for many people. However, competition among online transportation service companies forces each service provider to compete in improving the quality of their services. This study aims to analyze the level of customer satisfaction with the use of Grab services using the C4.5 method. This method was chosen because of its ability to form a decision tree model that helps identify the main factors that influence customer satisfaction. The data for this study were obtained from a survey of Grab customers who used Grab driver services within a certain period of time. The survey covered various aspects of user experience, such as Ease of Use of the Application, Service Availability, Waiting Time, Price, Security. The data was analyzed using the C4.5 algorithm to gain an in-depth understanding of the factors that influence the level of customer satisfaction. The analysis shows that the C4.5 method is effective in identifying factors that influence customer satisfaction. The results of the rapidminer test show the accuracy of the C4.5 algorithm from 100 respondent data obtained, which is 94.00%. These results are expected to provide valuable input for the Grab company and drivers in an effort to improve the quality of their services.
Komparasi Penerapan Algoritma C4.5 dan Naïve Bayes untuk Ketepatan Waktu Pengiriman Barang Pada PT. Rtrans Logistik Artamandiri Azzahra, Yasmin Aulia; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.1003

Abstract

The logistics industry faces significant challenges in maintaining the punctual delivery of goods, which is a critical factor in enhancing customer satisfaction and reducing operational costs. This research aims to compare the effectiveness of the C4.5 and Naïve Bayes algorithms in analyzing the factors that influence delivery punctuality at PT. Rtrans Logistics Artamandiri. A dataset comprising 1,000 shipping records and 13 relevant attributes was utilized to assess each algorithm’s predictive performance in supporting decision-making processes related to delivery efficiency. The findings reveal that the C4.5 algorithm achieves a higher accuracy of 95.00%, compared to the Naïve Bayes algorithm, which reached an accuracy of 91.00%. Furthermore, this study highlights the importance of selecting the appropriate algorithm in logistics management to enhance operational efficiency and customer satisfaction. The results of this research are expected to provide a foundation for strategic decision-making in the field of goods delivery, particularly in optimizing delivery timeliness.
Implementasi Algoritma A* (A-Star) untuk mencari Rute Tercepat dari Bandara Soekarno Hatta ke Destinasi Kota Tua Jakarta Arfadhillah, Zahra; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.1006

Abstract

The tourism sector is an economic sector that is growing rapidly. One of the best destinations that can be used as a tourist destination in DKI Jakarta is the Old City of Jakarta. The Old City of Jakarta has easy access and very affordable costs. There are many roads to the Old City of Jakarta, but the road to the Old City of Jakarta is very far away and has traffic congestion, especially towards the weekend, which could potentially make it difficult for tourists who want to visit. Therefore, we need an effective method that can help find the route with the shortest distance and fastest travel time. In this research, the method that can be used to find the fastest path or route is the A*Star algorithm. The results obtained after examining three routes (Jalan Kapuk Kamal Raya, Jalan Peta Barat and Jalan Raya Daan Mogot), obtained the fastest route with a distance of 5,881.5 KM, namely the Jalan Kapuk Kamal Raya route. By applying this method, it is hoped that it can solve the problem of determining the fastest route to the tourist location of the Old City of Jakarta.
Analisis Penggunaan Metode XConnect Main and Backup Link Berbasis VPN MPLS Layer 2 pada Jaringan Metro-Ethernet Saputra, Mochammed Erryandra; Akbar, Yuma
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.1009

Abstract

The rapid development of information and communication technology requires excellent scalability, which is crucial for network performance availability. MPLS is a technology that can be used for communication in high-speed backbone networks based on virtual private networks (VPN). MPLS provides solutions to various current computer network problems such as speed, scalability, quality of service (QoS), and network traffic management. This research aims to optimize the scalability of MPLS Layer 2 VPN-based network traffic by applying the xconnect main and backup method implemented in metro Ethernet networks. The network simulation implementation was created using the Emulated Virtual Environment – Next Generation (EVE-NG) application to obtain data on convergence time and QoS parameters according to TIPHON standards, as well as the use of MPLS and Route Reflector to enhance MPLS backbone performance. This research shows that both main and backup MPLS L2VPN paths have good index values in packet delivery according to TIPHON standards, with an average rating of 3.0. Thus, this research can help optimize path scalability to improve the quality of MPLS L2VPN network traffic.
Co-Authors AA Sudharmawan, AA Abdul Shomad Abdulloh Abdurrahman Asyam Albahy Abror, Ikhsan Adhipramana, Fernanda Aditya Zakaria Hidayat Aditya Zakaria Hidayat Adzani, Adinda Mutiara Agung Pratama Agung Wianata Sugeng Kusuma Agung Wiranata Sugeng Kusuma Ahluna, Faza Ahmad Suprianto Ahmad Zulfikar Aidil Rizki Hidayat Aimar, Muqorrobin Akhsani, Ziyat Akmaludin Akmaludin Al Ammaar, Mohammad Farroos Albahy, Abdurrahman Asyam Aldi Sitohang Aldino Nur Ihsan Amrullah, Aziz Septian Angga Tristhanaya Anita Rosiana Anwar, Imam Dzikrilloh Ardana, Tegar Rizky Arfadhillah, Zahra Ari Ramadhan Arief, Yoga Sofyan Arif, Sulthan Cendikia Arika Karpina Arinal, Veri Aula, Raisah Fajri Aulia, Mutia Dwi Awang Hariman, Aloisius Az-zahra, Haura Salsabila Azis, Iim Muhaemin Abdul Aziz Septian Amrullah Azzahra, Yasmin Aulia Bachtiar, Yuliana Bebriani, Serli Betty Yel, Mesra Betty Yel, Mesra Bintoro, Bayu Bryan Pratama Cahyono, Bayu Adi Candra Milad Ridha Eislam Dadang Iskandar Mulyana` Dadang Iskandar, Dadang Damayanti, Yulia Dava Septya Arroufu Dedi Dwi Saputra Dewa Gde Adi Murthi Udayana Doddy Mulyadi Saputra Edhy Poerwandono Edhy Poerwandono Edhy Poerwandono Eka Satria Maheswara Fadhil Khanifan Achmad Fadillah, Fauzan Fahmi Chairulloh Faisal Akbar Faisal Akbar Nasution Farhani, Aulia Farisi, Muhamad Fatkul Toriq Febrianti, Syafira Feni Putriani Fentri Boy Pasaribu Fernanda Adhipramana Fitriani Noer Jamilah Franido, Richard Gipari Pradina Abdillah Gusniar Alfian Noor Hafiz, Tegar Muhamad Hartinah, Suci Sugih Hazrul Aswad Hengky, Mario Hidayat, Aditya Zakaria Hutabarat, Joey Abdiner Parlindungan Ikhsan Abror Ikhwanul Kurnia Rahman Jodi Juliansah Juliansah, Jodi Julianto, Muhammad Rizky Julvan Marzuki Putra Sibarani K, Benny Sulaiman Kamali, Muhamad Fawaz Kiki Setiawan Kusuma, Agung Wiranata Sugeng Laia, Apriyanus Laia, Masaranto Lestari, Dinny Amalia M Ilham Setya Aji M Jundi Hakim Mafazi, Luthfillah Marjuki Maulana Putra Hertaryawan, Ryfan Mayangsari, Descania Meilisa Miftahul Huda Mizsuari Muamar Rizky Mohammad Farroos Al Ammaar Muhamad Fikri Nugraha Muhamad Umar Hasan Asrori Muhamad Zaeni Nadip Muhammad Arham Muhammad Arya Ramadhan Muhammad Faizal Lazuardi Mulya, Citra Pricylia Ananda Nirat Nirat Nirat, Nirat Noor, Gusniar Alfian Novianto, Firza NST, Silvan Nufus, Reda Hayati Nugraha, Muhamad Fikri Nur Arif Khairudin Nurfaishal, Muhammad Dzaky Nurmaylina, Vivi Oka Prasetiyo Oktavian, Nur Oky Tria Saputra Oky Tria Saputra7 Pakpahan, Gabriel Alezhandro Pane, Ropindo Pelix Permatasari, Veren Nita Piqih Akmal Poerwandono, Edhy Praja Raymond , Samuel Pramudhi, Aditya Bagas Pramudita, Diky Prasetiyo, Oka Putri S, Dhiyah Labibah Nauli Putri Wibowo, Salsabila Qibthiyah, Mariyatul Qolbi, Rofika Raisah Fajri Aula Ramadhan, Muhammad Arya Regita, Anggit Nur Hannaa Rezha Mulia Revandy Richard Franido Richard Franido Rizki Maulana, Rizki Rizky Adawiyah Rosiana, Grace Lolita S, Fahmi Chairulloh Widia Safhani, Rizca Sahrul Hidayat Sahrul Hidayat Saputra, Mochammed Erryandra Sarimole, Frencis Matheos Septiansyah, Ade Setiawan, Kiki Sibarani, Julvan Marzuki Putra Sinaga, Putri Cahyani SRI LESTARI Sri Lestari Sri Lestari Sugiharto, Tri Sugiyono Sugiyono Sugiyono Sumpena Sumpena Sumpena, Sumpena Surapati, Untung Sutisna Sutisna Sutisna Sutisna Sutisna Suwandi Suwandi Tafonao, Rekardius Tafonao, Wewisman Tegar Muhamad Hafiz Tegar Muhamad Hafiz Toriq, Fatkul Tri Wahyudi Tristhanaya, Angga Tundo, Tundo Untung Surapati Untung Surapati Untung Surapati Untung Wahyudi Untung Wahyudi Vivi Nurmaylina Wahyu Saputro Widya Ayu Lestari Wijaya, Rohmat WINDU GATA Yusril Nurhadi AS