Claim Missing Document
Check
Articles

Found 30 Documents
Search

ANALYSIS OF MPLS L3 AND MPLS L2 VPN NETWORK USE DURING THE COVID-2019 PANDEMIC TO SUPPORT WORK FROM HOME Haeruddin Haeruddin; Efendi Efendi
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

From the end of 2019 to 2021 the coronavirus (COVID-19) had hit most countries, the use of information and communication technology as a guide in social distancing restrictions proposed by the government and the health department during the pandemic. The purpose of this study is how to implement and compare the use of MPLS VPN L3 and L2 networks during the COVID-19 period to support the world of education and industry by using implementation parameters, Quality of Service (QoS), security, and scalability. In this research, the method used is the Network Development Life Cycle (NDLC), using several stages, namely analysis, design, implementation, and monitoring. The results of this study provide an overview of the world of education and industry in determining and implementing MPLS technology that suits their needs.
Network Design To Improve Network Quality At Pt. Batam Teknologi Gas Haeruddin Haeruddin; Alzi Alzi
ConCEPt - Conference on Community Engagement Project Vol 1 No 1 (2021): Conference on Community Engagement Project
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security is currently a very important issue and continues to grow. Development of computer technology, besides causing many benefits also have many bad side. One of them is an attack on computer systems connected to the Internet. As a result of the attack, many computer systems or networks disrupted even be damaged. Given these problems, then as soon as possible we must immediately secure computer networks from attack. Untangle is a Linux distribution that is used as a regulator of tissue. Untangle is an open source first terintegerasi to deal with spam, spyware, viruses, adware, web-filtering and report. Based on Debian Linux with supporting JAVA applications. Untangle Server delivers the ease in securing, controlling and monitoring of computer networks. Ease is a technology that is needed to secure from threats such as viruses and spyware, web access and control over the availability of the report of the Untangle Server to perform a system analysis. Everything is packaged within an interface / GUI (Graphical User Interface). Untangle is very handy and has a full feature in managing and securing the network from LAN to WAN scale.
Rancangan Dan Konfıgurası Jarıngan Pada PT. Samudera Idola Rahayu Haeruddin Haeruddin; Efendi Efendi
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 1 No 1 (2021): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer network is a very important requirement in a company, a network that is not managed will reduce the level of security and function of the network. The importance of management on the internet network in an agency so that the network that is created is centralized or well managed. The author uses Mikrotik to manage networks in companies that have 2 different providers and combine networks using a bridge and DHCP server as a configuration that will be applied and if one of the networks has problems, one of the internet providers can be a network backup. The author uses the Network Development Life Cycle (NDLC) method as a network design flow, the stages of the Network Development Life Cycle (NDLC) method that the author uses include several stages such as: Analysis, Design, Implementation, Monitoring the following stages will be the author's stage in designing the network. By using the Network Development Life Cycle (NDLC) method, it can make it easier for the author to determine the stages that will be carried out by the author
Analisa dan Implementasi Controller untuk Device PTMP Menggunakan Cloud UISP pada PT. Bandar Abadi` Haeruddin Haeruddin; Kelvin Kelvin
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 1 No 1 (2021): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A wireless network is a network that uses electromagnetic waves as the transmission medium. Wireless networks have advantages over wired transmission media such as ease of installation, expansion, and lower costs. In wireless networks there are several topologies that are commonly used, namely Point to Point and Point to Multipoint. This topology uses at least 2 devices to transmit data. This in turn makes it difficult to manage devices because of the large number of devices needed. To overcome this issue, the author uses a Controller, namely Cloud UISP to manage all existing PTMP devices. With this device, it enables IT to detect, register and configure PTMP devices all in one place. In designing this network the author uses Network Development Life Cycle (NDLC) method. The results of this implementation make it easier for IT to manage all Ubiquiti PTMP devices in the company.
Implementasi Website Profile Perusahaan JasaKonfig untuk Mendukung Pemasaran Digital Haeruddin Haeruddin; Stefanus Eko Prasetyo; Jemmy Jemmy; Avista Mindy
Madani: Jurnal Pengabdian Masyarakat dan Kewirausahaan Vol 1 No 4 (2023): Juli 2023
Publisher : LPPM Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/madani.v1i4.7717

Abstract

Kemajuan teknologi yang semakin pesat, membuat tren di dunia bisnis juga semakin berkembang, salah satunya yaitu Digital Marketing. Digital Marketing merupakan pemasaran produk atau layanan melalui perangkat elektronik atau internet, menggunakan saluran digital seperti media sosial, email, dan webssite agar terhubung dengan pelanggan. Ini sangat cocok diterapkan pada Jasa Konfig penyedia layanan jasa IT yang ada di Kota Batam. Pada perusahaan ini melayani berbagai macam keluhan yang sedang dialami oleh customer, dan menyediakan berbagai macam layanan, mulai dari service komputer, jaringan dan berbagai macam lainnya yang bertujuan untuk membantu perusahaan mengoptimalkan sistem IT mereka untuk mencapai tujuan bisnis. Digital marketing dapat membatu perusahaan ini agar dapat di kenal oleh masyarakat luas dalam waktu yang cepat. Untuk menerapkan digital marketing salah satu yang harus disiapkan adalah website. Pada kegiatan ini akan di buat website Profile Perusahaan Jasa Konfig, konten website dan Search Engine Optimation (SEO).
Implementasi VPS Hosting Cloudbank.id pada PT Pundi Mas Berjaya (gomarketsmy.id dan juraganit.my.id) Haeruddin Haeruddin; Husnul Khatimah
National Conference for Community Service Project (NaCosPro) Vol 5 No 1 (2023): The 5th National Conference for Community Service Project 2023
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/nacospro.v5i1.8085

Abstract

PT Pundi Mas Berjaya merupakan perusahaan yang bergerak dibidang solusi teknologi informasi salah satu layanan yang dimiliki yaitu cloudbank.id yang menyediakan penyewaan hosting, domain, VPS, dan colocation. Setiap pelanggan yang menyewa layanan tersebut harus mengelolah layanan secara mandiri, sehingga akan mempersulit pelanggan yang tidak memiliki sumber daya manusia di bidang Teknologi Informasi. Pada kegiatan ini membuat solusi layanan yang siap pakai khususnya layanan VPS. Paket yang diberikan pada layanan VPS ini adalah paket private web hosting, dan mail server, terdapat dua layanan yang akan diimplementasiakan kepada pelanggan cloudbank.id yaitu gomarkets.my.id dan juraganit.my.id. Adapun metode yang digunakan pada kegiatan ini adalah metode Network Developmen Life Cycle (NDLC) yang terdiri dari tahapan analisa, desain, implementasi dan pemantauan.
Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut Haeruddin Haeruddin; Gautama Wijaya; Husnul Khatimah
JITU : Journal Informatic Technology And Communication Vol. 7 No. 2 (2023)
Publisher : Universitas Boyolali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36596/jitu.v7i2.1086

Abstract

Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during WFA is VPN. Currently there are many VPN protocols that can be used for WFA. However, in implementing a VPN network, there are several things that must be considered to ensure that the VPN network is successful and functional, such as security, choosing the right architecture, selecting technology and protocols, scalability, quality of service, management and monitoring, as well as security and privacy policies. ZeroTier is a next-generation VPN that is easy to configure, can support multiple devices, and uses an end-to-end connection, eliminating the need for a centralized VPN server. In implementing VPN ZeroTier the method used is the Network Development Life Cycle (NDLC). This methodology is used to plan, implement, and manage a VPN network with ZeroTier to function according to WFA needs.
Phishing Website Detection Using the Decision Tree Algorithm Method Prasetyo, Stefanus Eko; Haeruddin , Haeruddin; ., Arron
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2167

Abstract

Along with the increasing number of internet users and the rapid development of technology, cyber security threats are becoming more complex, including phishing threats that often cause major losses such as loss of individual or corporate privacy. This study aims to identify phishing websites effectively through the application of machine learning algorithms. The dataset used in this study comes from the UCI learning repository developed by the University of Huddersfield. The research methodology includes the stages of problem identification, Cart algorithm collection, validation, and model evaluation. With this method, the study found that the CART algorithm was able to achieve an accuracy level of 90.5% in detecting phishing sites. These results show cyber security, especially in protecting users from phishing threats, this study is expected to contribute to improving data protection and privacy of internet users, as well as encouraging the application of machine learning technology in a more adaptive cyber security system.
Pengaruh Manajemen Bandwidth Terhadap QoS dengan Standar TIPHON Pada Alur Monitoring SNMP Alzi Alzi; Haeruddin Haeruddin
Jurnal Ilmiah Teknologi Informasi Asia Vol 17 No 1 (2023): Volume 17 Nomor 1 (8)
Publisher : LP2M INSTITUT TEKNOLOGI DAN BISNIS ASIA MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32815/jitika.v17i1.883

Abstract

Universitas Internasional Batam menyediakan fasilitas internet yang didominasi oleh pengguna jaringan wireless. Para pengguna yang terdiri dari staff, karyawan, tenaga pendidik dan mahasiswa memanfaatkan fasilitas internet di UIB, sehingga diperlukan manajemen bandwidth agar penggunaan trafik di UIB stabil, terbagi secara merata dan terjaga konektivitasnya. Metode yang digunakan adalah Network Development Life Cycle (NDLC). Penelitian ini bertujuan untuk melakukan stabilisasi trafik penggunaan bandwidth pada protokol Simple Network Management Protocol (SNMP), membagi kecepatan upload dan download secara merata dan proporsional ke masing-masing pengguna, serta meningkatkan Quality of Service melalui parameter throughput, delay, jitter, dan packet loss. Penelitian ini menghasilkan output kuantitatif dari masing-masing tujuan dan parameter QoS yang dapat digunakan sebagai referensi untuk menentukan pembagian bandwidth yang sesuai dengan kapasitas bandwidth yang dimiliki tanpa mengganggu QoS pada jaringan wireless.
Comparative Analysis of User Experience: A Study of MyPortal Universitas International Batam on Desktop and Mobile Platforms Aklani, Syaeful Anas; Haeruddin, Haeruddin; Elia, Elia
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 14, No 1: April 2025
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v14i1.2580

Abstract

This research evaluates the UX of MyPortal. Myportal is an academic information system established by Universitas International Batam (UIB) on desktop and mobile platforms. This research uses the UTAUT2 model. This study examines factors that can influence user satisfaction and behavioral intentions such as Performance Expectancy, Effort Expectancy, Social Influence, and Habit. A mixed-methods approach was taken by combining quantitative surveys and qualitative interviews conducted by 349 students who actively use Myportal. The results show that the Performance Expectancy and Effort Expectancy variables can significantly increase productivity and also ease of use, but the Hedonic Motivation variable is not the main factor. This study emphasizes that technical support, habits, and environmental recommendations also have an important role in shaping user behavior. The results of this study can provide practical insights in improving MyPortal and similar systems in academic environments by focusing on ease of use, satisfaction, and accessibility.Keywords: User Experience; UTAUT2; MyPortal AbstrakPenelitian ini mengevaluasi UX dari MyPortal. MyPortal adalah sebuah sistem informasi akademik yang dibentuk oleh Universitas Internasional Batam (UIB) pada platform desktop dan mobile. Penelitian ini menggunakan model UTAUT2. Dalam penelitian ini mengkaji faktor-faktor yang dapat memengaruhi kepuasan pengguna dan niat perilaku contonya seperti Performance Expectancy, Effort Expectancy, Social Influence, dan Habit. Pendekatan dengan mixed-methods dilakukan dengan menggabungkan survei kuantitatif dan wawancara kualitatif yang dilakukan oleh 349 mahasiswa yang aktif menggunakan Myportal ini. Hasilnya menunjukkan bahwa variabel Performance Expectancy dan Effort Expectancy secara signifikan dapat meningkatkan produktivitas dan juga kemudahan penggunaan, namun variabel Hedonic Motivation bukanlah faktor utama. Penelitian ini memberikan penekanan bahwa dukungan teknis, kebiasaan, dan rekomendasi lingkungan juga memiliki peran penting dalam membentuk perilaku pengguna. Hasil dari penelitian ini dapat memberikan wawasan praktis dalam meningkatkan MyPortal dan juga sistem yang serupa di lingkungan akademik dengan memberi fokus pada kemudahan penggunaan, kepuasan, dan aksesibilitas.