Claim Missing Document
Check
Articles

Found 55 Documents
Search
Journal : Jurnal Jarkom

PERBANDINGAN PERFORMA DAN KEAMANAN VOICE OVER INTERNET PROTOKOL DENGAN DAN TANPA OPEN VIRTUAL PRIVATE NETWORK (STUDI KASUS KOS GAYAM) Yulkarnain, Dani; Raharjo, Suwanto; Lestari, Uning
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT VoIP (Voice Over Internet Protocol) is a system that used by sending data package from one place to another places such as voice or video use mediator IP Address in a internet network. VoIP transmission voice signal by change to the digital form and it can be categorized be data packages that sent by using platform IP. However, the weakness of VoIP is security is not guaranteed. Because IP based, so anybody can tap and record the data of VoIP. So, it needs a security system to overcome that security problem. One of the solutions is by implement of OpenVPN (Virtual Private Network). OpenVPN is one method to overcome the security network in sending the data package. To implement that idea so, it made a system VoIP OpenVPN. Then analyze   how to Performa the sending of voice or video that resulted and the security of VoIP before and after used OpenVPN. Before using OpenVPN, data package VoIP that sent can be record and replay the data payload it also can be caught and can be saw. The Performa of sending data in the busy network it also can be long delayed. However, after using OpenVPN, the package data VoIP cannot record and replay and data payload also cannot catch. The Performa VoIP OpenVPN in busy network is better than VoIP without OpenVPN. Keywords : VoIP, OpenVPN, Performa, Security
ANALISIS DAN IMPLEMENTASI HONEYPOT MENGGUNAKAN HONEYD SEBAGAI ALAT BANTU PENGUMPULAN INFORMASI AKTIVITAS SERANGAN PADA JARINGAN Nugroho, Ardianto Setyo; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT A honeypot is a system that is purposely built to be investigated , attacked, or compromised . In general, a honeypot is a computer , data or a network site that looks like part of the network , but actually terisolalsi and monitored . When viewed from the eyes of the hacker would attack , honeypot systems like that deservest to be attacked. One type of honeypot is Honeyd . Honeyd is a low interaction honeypot with types that have a much smaller risk than other types of interactions due to the high interaction honeypot does not directly involve the actual system . In testing this system , implemented on a local network honeypot to try some attacks such as footprinting , DoS , and bruteforce is expected to be one of the information to the administrator of hasillog honeypot in order to make the system more secure . This ,implementation of honeypot can be used as a tool administrators to view activity reports generated Honeyd in order to assist in determining the network security policy . Keywords : honeypot , Honeyd , footprinting , Dos , bruteforce . 
ANALISA PERBANDINGAN EASYHOTSPOT DAN MIKROTIK DALAM PENERAPAN HOTSPOT AREA DENGAN SISTEM AAA Lubis, Rizal Fakhruddin; Raharjo, Suwanto; Sutanta, Edhy
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT               At present more and more public places are provided hotspots area in order to attract consumers. Such facilities are generally only be used by a particular user is allowed, so needed a software to authenticate the prospective user prior to access to the Internet using hotspots area. Many alternative software options available, so that the necessary guidelines for choosing the right software to do security, one with the AAA system (Authentification, Authorized, Accounting). This study compared two software namely EasyHotspot and Mikrotik for the implementation of the AAA system in hotspot areas. Keywords: EasyeHotspot, Mikrotik, hotspots, internet.
ANALISIS DAN PERANCANGAN JARINGAN DUAL STACK SEBAGAI METODE TRANSISI IPv4 KE IPv6 Anita, Merlie; Raharjo, Suwanto; Sholeh, Muhammad
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIPv6 present as IPv4 replacement with some feature to cover IPv4 weakness. Transition is needed in order to migrate to IPv6 because totally migration will cause much networking problem considering most of network device in this time are still designed for IPv4. Transition method used in this research is dual stack which connected to tunnel broker so that local network can communicate with internet and be able to access IPv6 sites. In dual stack network, host and router implements both IPv4 and IPv6. With these two kind of IP, gateway address must consists of two different addresses either because sending and receiving process from client to server or vice versa is happen in separate way. Dual stack most implemented in a network because its compatibility in network device and it doesn’t need necessary to change extremely configuration of IPv4 existing network. As a result from this research, IPv4 network performance has 2% faster for RTT than IPv6 network. For time used and speed transfer using FTP, IPv4 network has 3% faster than IPv6 network. IPv6 network has 10% better performance for throughput than IPv4 does. Whereas jitter, IPv6 has 44% smaller than IPv4. Considering IPv4 limited allocation address nowadays doing the transition to IPv6 using dual stack network is a good choice to deploy IPv6 used. Keywords: dual stack, IPv6, tunnel broker
MEMAKSIMALKAN POTENSI BISNIS INTERNET PADA JARINGAN NIRKABEL (Studi Kasus: Pengembangan Jaringan Lan di Pondok Pesantren Terpadu Al Mumtaz Setiadi, Yuki Syambudi; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): Edisi Januari 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTWireless technology, has now spread all-over the nation. By using radio waves, wireless technology on computer network becomes indicate its existence compare to conventional network model (wired network). The existence of technology which becomes cheaper, has support the existence of these wireless network also. Nowadays, areas supported with wireless network or often called hotspot become easier to find. The cheaper the devices to build these hotspot networks, has passionate peoples to use this business opportunity on wireless network. Many tricks use by businessman, start with obligation to buy good before using hotspot facility until “Warung Internet” AKA “WARNET”. But, using prepaid cards AKA vouchers are the most prospective business strategy. This occurs because it simplicity to manage on businessman’s side and it simplicity on customer’s side. Consider to the target of PT. Telkom which obsessed to make Indonesia becomes nation with the largest numbers of WiFi area in Asia (Yandi, 2012), it is 10 millions WiFi radio at 2015, is certainly hotspot business is one of the “hottest” business in future. But thus, hotspot business must be controlled so it doesn’t cross-side with law and norm, moreover if this business runs within Islamic Boarding School’s environment. With some synchronization between the system and Islamic Boarding School’s ideology, then this hotspot business will becomes really useful for the instance. Keywords: Hotspot, Voucher, Ideology, Islamic Boarding School
ANALISA PERBANDINGAN EASYHOTSPOT DAN MIKROTIK DALAM PENERAPAN HOTSPOT AREA DENGAN SISTEM AAA Lubis, Rizal Fakhruddin; Raharjo, Suwanto; Sutanta, Edhy
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAt present more and more public places are provided hotspots area in order to attract consumers. Such facilities are generally only be used by a particular user is allowed, so needed a software to authenticate the prospective user prior to access to the Internet using hotspots area. Many alternative software options available, so that the necessary guidelines for choosing the right software to do security, one with the AAA system (Authentification, Authorized, Accounting). This study compared two software namely EasyHotspot and Mikrotik for the implementation of the AAA system in hotspot areas.Key words: EasyeHotspot, Mikrotik, hotspots, internet.
MEMAKSIMALKAN POTENSI BISNIS INTERNET PADA JARINGAN NIRKABEL (Studi Kasus: Pengembangan Jaringan Lan di Pondok Pesantren Terpadu Al Mumtaz) Setiadi, Yuki Syambudi; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTWireless technology, has now spread all-over the nation. By using radio waves, wireless technology on computer network becomes indicate its existence compare to conventional network model (wired network). The existence of technology which becomes cheaper, has support the existence of these wireless network also. Nowadays, areas supported with wireless network or often called hotspot become easier to find. The cheaper the devices to build these hotspot networks, has passionate peoples to use this business opportunity on wireless network. Many tricks use by businessman, start with obligation to buy good before using hotspot facility until “Warung Internet” AKA “WARNET”. But, using prepaid cards AKA vouchers are the most prospective business strategy. This occurs because it simplicity to manage on businessman’s side and it simplicity on customer’s side. Consider to the target of PT. Telkom which obsessed to make Indonesia becomes nation with the largest numbers of WiFi area in Asia (Yandi, 2012), it is 10 millions WiFi radio at 2015, is certainly hotspot business is one of the “hottest” business in future. But thus, hotspot business must be controlled so it doesn’t cross-side with law and norm, moreover if this business runs within Islamic Boarding School’s environment. With some synchronization between the system and Islamic Boarding School’s ideology, then this hotspot business will becomes really useful for the instance.Keywords: Hotspot, Voucher, Ideology, Islamic Boarding School
ANALISIS DAN PERANCANGAN JARINGAN DUAL STACK SEBAGAI METODE TRANSISI IPv4 KE IPv6 Anita, Merlie; Raharjo, Suwanto; Sholeh, Mohammad
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIPv6 present as IPv4 replacement with some feature to cover IPv4 weakness. Transition is needed in order to migrate to IPv6 because totally migration will cause much networking problem considering most of network device in this time are still designed for IPv4.Transition method used in this research is dual stack which connected to tunnel broker so that local network can communicate with internet and be able to access IPv6 sites. In dual stack network, host and router implements both IPv4 and IPv6. With these two kind of IP, gateway address must consists of two different addresses either because sending and receiving process from client to server or vice versa is happen in separate way. Dual stack most implemented in a network because its compatibility in network device and it doesn’t need necessary to change extremely configuration of IPv4 existing network.As a result from this research, IPv4 network performance has 2% faster for RTT than IPv6 network. For time used and speed transfer using FTP, IPv4 network has 3% faster than IPv6 network. IPv6 network has 10% better performance for throughput than IPv4 does. Whereas jitter, IPv6 has 44% smaller than IPv4. Considering IPv4 limited allocation address nowadays doing the transition to IPv6 using dual stack network is a good choice to deploy IPv6 used.Keywords: dual stack, IPv6, tunnel broker
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT Some of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services.Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks.Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.
PENGONTROLAN VPS (VIRTUAL PRIVATE SERVER) SEBAGAI SERVER RADIO STREAMING VIA ANDROID Hidayat, Rohmat; Sutanta, Edhy; Raharjo, Suwanto
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTRadio streaming is a technology for multimedia services are growing rapidly and become a trend at the moment is real-time multimedia, interactive and holding a very important role in todays society as a medium which is very actual for entertainment, information or business. Radio streaming service on computer networks generally involve a multipoint communication over the two sides simultaneously (server and client), which skipped on a TCP/IP network.On this research will be implemented a streaming server radio built on a VPS (virtual private server) namely a technology side about server operating systems and software that allows a machine with large capacity divided into several virtual machines. Every virtual machine serving the operating system and software independently and with new configuration that fast. With the technology advancement is very fast currently it is possible to develop a remote desktop application of a smartphone to a virtual machine.The trial was done in accordance with the principle of radio stream, where as the purpose of the research is how to develop the application as a streaming radio server control by leveraging advances in technology of mobile devices both smartphone or Android-based tablet PC anywhere so long as connected to the internet network. Give the admin a streaming radio the ease in doing his job without having to always carry a laptop or even a PC computer to do broadcasting a radio stream.Keywords: android, streaming radio, server, smartphone.
Co-Authors -, Komarudin Abdul Malik Zuhdi Achmad Yusron Arif Ade Rizki Saputra Afifah Nur Aini Aflahah Apriliyani Ahmad irfa’i Alsyaibani, Omar Muhammad Altoumi Amalia Febryane Adhani Mazaya Amir Hamzah Amir Hamzah Amir Hamzah Amrullah, Yusuf Amri Andi Kriswantono Anggit Dwi Hartanto, Anggit Dwi Apolinarius Gusala Argaditia Mawadati Ari Sabela Anggraini Arief Setyanto Arief, Achmad Yusron Arif Nur Rohman Arif setiadi Arif, Achmad Yusron Aziz Nurwahidin Cahyono, Nova Tri Cahyono, Nova Tri Candra Kusuma Catur Iswahyudi Catur Iswahyudi Catur Iswahyudi Catur Iswayudi Danang Kastowo Dani Yulkarnain Dewo Pambudi Dimas Wiryatari Dodik Prakoso Eko Hery Suwandojo Dodik Prakoso Eko Hery Suwandojo Dzakiya, Nurul Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Edi Winarko Eka Suteja Eko Darmanto Eko Haryanto Eko Haryanto Eko Pramono Eko Pramono Ema Utami Ema Utami (Jurusan Sistem Informasi STMIK AMIKOM Yogyakarta) Emy Setyaningsih Emy Setyaningsih Enggar Febriyanti Enie Yuliani Erfanti Fatkhiyah Erma Susanti Ermawati - Erna Kumalasari N Erna Kumalasari Nurnawati Eska Almuntaha Faisal Siregar Fuad Hasan Gardyas Bidari Adninda Gardyas Bidari Adninda Gatot Santoso Gatot Santoso Gunawan Wicahyono Hanafi Eko Kurniawan Hardianto Nugroho Hari Rachmadi Hartanto, Anggit Dwi Hendrik Satria Harefa Heri Sismoro Hilarion Yogi Ibnu Berliyanto G.A Ibnu Berliyanto G.A, Ibnu Berliyanto Imam Syafii Imam Syafii Imam Thoib Indarto Indarto Irwan Siswanto Jazi Eko Istiyanto (Program Magister Ilmu Komputer Sekolah Pascasarjana UGM) Joko Triyono Joko Triyono Joko Waluyo JULIANTO Julianto Jussac Maulana Masjhoer Khalil Sidik Khalil sidik Koco Anggoro Kurniati, Devi Kurniawan, Hanafi Eko Laksono Trisnantoro M Yusuf Ali Fiqri M. Abdul Alim Alami M. Ari pamungkas1 M. Rudiyanto Arief Maulana Wahid, Rindo Mazaya, Amalia Febryane Adhani Merlie Anita Miftah Farid Moh Erzal Arighi Damopolii Moh. Ishaq Yanuar Mohammad Sholeh Muh. Ibnu Habil Hanafi Muh. Ibnu Habil Hanafi, Muh. Ibnu Habil Muhamad Fatahillah Z Muhammad Arif Setyawan Muhammad Fahrizal Farid Muhammad Farid Ali Safii Muhammad Puguh Pamungkas Muhammad Rosyid Muhammad Saleh Jafri Muhammad Sholeh MUHAMMAD SHOLEH Munandar, Arief Mursyid Ardiansyah Mustofa Wisnu Dhamara1 Naniek Widyastuti Nansi, Maria Regina Nidia Lestari Nurcahyo, Azriel Christian Okid Parama Astirin Omar Muhammad Altoumi Alsyaibani Prabowo Budi Utomo Prita Haryani Prita Haryani Purnawan Purnawan - Purnawan Purnawan Purnawan Purnawan R. K. ST., MT., Rr. Yuliana Rahardyan Bisma Setya Putra Ramadhan, Hanan Fajar Rauf, Budi Wijaya Rendi Saputra Rio Ponco Negoro Muhammad Hakim Rizal Fakhruddin Lubis Rizki Pratama Rizqa Luviana Musyarofah Rizqi Aji Nugroho Robertus Desta Raka Siwi Robertus Desta Raka Siwi, Robertus Desta Rohmat Hidayat Rohmat Hidayat Rr Yuliana Rachmawati Kusumaningsih Rr. Yuliana Rachmawati Rr.Y. Rachmawati Kusumaningsih Rr.Yuliana Rachamawati, Rr.Yuliana Ryvan Sirait S.T., M.T, Muhammad Sholeh, Samuel Kristiyana Saryadi K T Soba Saryadi K T Soba, Saryadi K T Setya Putra, Rahardyan Bisma Siswanto - Slamet Hani, Slamet Sofyan Pariyasto Sri Hartati Stefanus Samuel Tampi Suparni Setyowati Rahayu Suraya - Suraya - Suraya ., Suraya Syafrizal S Ardiansyah Syahrudin, Erwin Tampi, Stefanus Samuel Thaariq, Muhammad Rizqy Ath Than Raymond Toto Rusianto Triyono, Joko Uning Lestari Uning Lestari Utami, Ema Utami Utamu, Ema Vian Ardiyansyah Saputro Vian Ardiyansyah Saputro Wahyu Hidayat Wahyudi, Doni Yoga Arjanggi Nofianto Yuki Syambudi Setiadi Yuli Purwanto Yuli Purwanto Yuliana Rachmawati Yulianto Mustaqim Zeppi Maulana Bhakti