Claim Missing Document
Check
Articles

ANALISIS DAN PERANCANGAN JARINGAN DUAL STACK SEBAGAI METODE TRANSISI IPv4 KE IPv6 Anita, Merlie; Raharjo, Suwanto; Sholeh, Mohammad
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIPv6 present as IPv4 replacement with some feature to cover IPv4 weakness. Transition is needed in order to migrate to IPv6 because totally migration will cause much networking problem considering most of network device in this time are still designed for IPv4.Transition method used in this research is dual stack which connected to tunnel broker so that local network can communicate with internet and be able to access IPv6 sites. In dual stack network, host and router implements both IPv4 and IPv6. With these two kind of IP, gateway address must consists of two different addresses either because sending and receiving process from client to server or vice versa is happen in separate way. Dual stack most implemented in a network because its compatibility in network device and it doesn’t need necessary to change extremely configuration of IPv4 existing network.As a result from this research, IPv4 network performance has 2% faster for RTT than IPv6 network. For time used and speed transfer using FTP, IPv4 network has 3% faster than IPv6 network. IPv6 network has 10% better performance for throughput than IPv4 does. Whereas jitter, IPv6 has 44% smaller than IPv4. Considering IPv4 limited allocation address nowadays doing the transition to IPv6 using dual stack network is a good choice to deploy IPv6 used.Keywords: dual stack, IPv6, tunnel broker
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT Some of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services.Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks.Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.
PENGONTROLAN VPS (VIRTUAL PRIVATE SERVER) SEBAGAI SERVER RADIO STREAMING VIA ANDROID Hidayat, Rohmat; Sutanta, Edhy; Raharjo, Suwanto
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTRadio streaming is a technology for multimedia services are growing rapidly and become a trend at the moment is real-time multimedia, interactive and holding a very important role in todays society as a medium which is very actual for entertainment, information or business. Radio streaming service on computer networks generally involve a multipoint communication over the two sides simultaneously (server and client), which skipped on a TCP/IP network.On this research will be implemented a streaming server radio built on a VPS (virtual private server) namely a technology side about server operating systems and software that allows a machine with large capacity divided into several virtual machines. Every virtual machine serving the operating system and software independently and with new configuration that fast. With the technology advancement is very fast currently it is possible to develop a remote desktop application of a smartphone to a virtual machine.The trial was done in accordance with the principle of radio stream, where as the purpose of the research is how to develop the application as a streaming radio server control by leveraging advances in technology of mobile devices both smartphone or Android-based tablet PC anywhere so long as connected to the internet network. Give the admin a streaming radio the ease in doing his job without having to always carry a laptop or even a PC computer to do broadcasting a radio stream.Keywords: android, streaming radio, server, smartphone.
ANALISIS DAN IMPLEMENTASI HONEYPOT MENGGUNAKAN HONEYD SEBAGAI ALAT BANTU PENGUMPULAN INFORMASI AKTIVITAS SERANGAN PADA JARINGAN Nugroho, Ardianto Setyo; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT A honeypot is a system that is purposely built to be investigated , attacked, or compromised . In general, a honeypot is a computer , data or a network site that looks like part of the network , but actually terisolalsi and monitored . When viewed from the eyes of the hacker would attack , honeypot systems like that deservest to be attacked. One type of honeypot is Honeyd . Honeyd is a low interaction honeypot with types that have a much smaller risk than other types of interactions due to the high interaction honeypot does not directly involve the actual system . In testing this system , implemented on a local network honeypot to try some attacks such as footprinting , DoS , and bruteforce is expected to be one of the information to the administrator of hasillog honeypot in order to make the system more secure . This ,implementation of honeypot can be used as a tool administrators to view activity reports generated Honeyd in order to assist in determining the network security policy . Keywords : honeypot , Honeyd , footprinting , Dos , bruteforce 
PERBANDINGAN PERFORMA DAN KEAMANAN VOICE OVER INTERNET PROTOKOL DENGAN DAN TANPA OPEN VIRTUAL PRIVATE NETWORK (STUDI KASUS KOS GAYAM) Yulkarnain, Dani; Raharjo, Suwanto; Lestari, Uning
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT VoIP (Voice Over Internet Protocol) is a system that used by sending data package from one place to another places such as voice or video use mediator IP Address in a internet network. VoIP transmission voice signal by change to the digital form and it can be categorized be data packages that sent by using platform IP. However, the weakness of VoIP is security is not guaranteed. Because IP based, so anybody can tap and record the data of VoIP. So, it needs a security system to overcome that security problem. One of the solutions is by implement of OpenVPN (Virtual Private Network). OpenVPN is one method to overcome the security network in sending the data package. To implement that idea so, it made a system VoIP OpenVPN. Then analyze   how to Performa the sending of voice or video that resulted and the security of VoIP before and after used OpenVPN. Before using OpenVPN, data package VoIP that sent can be record and replay the data payload it also can be caught and can be saw. The Performa of sending data in the busy network it also can be long delayed. However, after using OpenVPN, the package data VoIP cannot record and replay and data payload also cannot catch. The Performa VoIP OpenVPN in busy network is better than VoIP without OpenVPN. Keywords : VoIP, OpenVPN, Performa, Security 
PERANCANGAN SISTEM MONITORING PADA JARINGAN LOAD BALANCING MENGGUNAKAN MUNIN MONITORING Raka Siwi, Robertus Desta; Raharjo, Suwanto; Hamzah, Amir
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThe increasing number of users who have connected to each other sometimes makes a lot of obstacles on the server, such as an increase in the performance of the server process that makes the server down and a lot of running processes. To overcome these problems, merging several servers into a single unit that can work simultaneously for load balancing server is the solution. One method is to use a proper load balancing or load balancing (request) to a web server aims to ease the burden on each server. In addition to cope with the load balancing methods, to keep the server in order to remain stable, the required monitoring network load balancing. In this issue, the monitoring process can be overcome with the addition of Munin to monitor the state of the server. With the addition of munin on the network load balancing, the activity on the server is going down in the event of a server, it can be directly terdeteksi.Munin produce produce a nice graph virtually every aspect of the server (load average, memory usage, CPU usage, traffic eth0 , etc.). Munin provide some information in graphs through a web interface. Keyword : Network, Load Balancing, Monitoring, Munin
BANDWIDTH MANAGER MENGGUNAKAN HIERARCHICAL TOKEN BUCKET PADA IMPLEMENTASI VIDEO STREAMING Soba, Saryadi K T; Rachamawati, Rr.Yuliana; Raharjo, Suwanto
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTScience and technology are increasingly evolving, has brought a wide range of new breakthrough, one that is increasingly technologically sophisticated and modern. This also participate in the field of computerization, computers that previously had limited functions only as a mere data processing, but now is able to play a major role in peoples lives everyday.Streaming video service is now urgently needed. It is characterized by many organizations or institutions that use streaming video access in bulk. The use of video streaming en masse this  network performasi downs along with the increasing number of users. One way to reduce the decline in performance is to set the bandwidth.Hierarchical Token Bucket (HTB) as implementer management of bandwidth available for free and can be run on Linux Operating system platform is a viable Bandwidth Manager analyzed their advantages and disadvantages, is expected to use proper and accurate will create a network that implements Bandwidth Manager is working optimallyKeywords: HTB, limit, bandwidth.
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTSome of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services. Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks. Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.
PENGONTROLAN VPS (VIRTUAL PRIVATE SERVER) SEBAGAI SERVER RADIO STREAMING VIA ANDROID Hidayat, Rohmat; Sutanta, Edhy; Raharjo, Suwanto
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTRadio streaming is a technology for multimedia services are growing rapidly and become a trend at the moment is real-time multimedia, interactive and holding a very important role in todays society as a medium which is very actual for entertainment, information or business. Radio streaming service on computer networks generally involve a multipoint communication over the two sides simultaneously (server and client), which skipped on a TCP/IP network.On this research will be implemented a streaming server radio built on a VPS (virtual private server) namely a technology side about server operating systems and software that allows a machine with large capacity divided into several virtual machines. Every virtual machine serving the operating system and software independently and with new configuration that fast. With the technology advancement is very fast currently it is possible to develop a remote desktop application of a smartphone to a virtual machine.The trial was done in accordance with the principle of radio stream, where as the purpose of the research is how to develop the application as a streaming radio server control by leveraging advances in technology of mobile devices both smartphone or Android-based tablet PC anywhere so long as connected to the internet network. Give the admin a streaming radio the ease in doing his job without having to always carry a laptop or even a PC computer to do broadcasting a radio stream. Keywords: android, streaming radio, server, smartphone.
PENERAPAN TEKNIK SEO (SEARCH ENGINE OPTIMIZATION) PADA BLOG (STUDI KASUS: NOVA13.COM) Cahyono, Nova Tri; Triyono, Joko; Raharjo, Suwanto
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 6 No 1 Agustus 2013
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (450.575 KB) | DOI: 10.34151/technoscientia.v6i1.589

Abstract

Websites on the internet is now very much and will continue to grow over time. To facilitate the search for websites on the internet, it needs a search engine. There are many types of search engines, but only one of the most popular and frequently visited, namely Google. The number of websites that have been indexed by Google is also very much, even in the millions. This will certainly lead to competition between the websites that have similar themes and discussions as well as having an almost similar keywords to snatch the top position of search results or SERP (Search Engine Result Page) on Google. With the SEO techniques applied, then the effort to get the best position in Google SERP will be easier. To implement the SEO techniques to blog with purpose to get the best position in Google SERP, first decide the targeted keywords and create a blog and set up the blog to make it more SEO Friendly, then implementation will use SEO methods SEO Onpage and SEO Offpage techniques to support performance. After making the implementation of these two methods will be tested on the Google SERP position blog for several days to know the progress of the SEO techniques. The results obtained that implemented SEO technique before the blog positions was on the second page of Google SERP, but after implementation SEO technique then slowly improved blog position and even be in the top five the first page of Google. It can be concluded that the implementation of proven SEO techniques went well.
Co-Authors -, Komarudin Abdul Malik Zuhdi Achmad Yusron Arif Ade Rizki Saputra Afifah Nur Aini Aflahah Apriliyani Ahmad irfa’i Alsyaibani, Omar Muhammad Altoumi Amalia Febryane Adhani Mazaya Amir Hamzah Amir Hamzah Amir Hamzah Amrullah, Yusuf Amri Andi Kriswantono Anggit Dwi Hartanto, Anggit Dwi Apolinarius Gusala Argaditia Mawadati Ari Sabela Anggraini Arief Setyanto Arief, Achmad Yusron Arif Nur Rohman Arif setiadi Arif, Achmad Yusron Aziz Nurwahidin Cahyono, Nova Tri Cahyono, Nova Tri Candra Kusuma Catur Iswahyudi Catur Iswahyudi Catur Iswahyudi Catur Iswayudi Danang Kastowo Dani Yulkarnain Dewo Pambudi Dimas Wiryatari Dodik Prakoso Eko Hery Suwandojo Dodik Prakoso Eko Hery Suwandojo Dzakiya, Nurul Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Edi Winarko Eka Suteja Eko Darmanto Eko Haryanto Eko Haryanto Eko Pramono Eko Pramono Ema Utami Ema Utami (Jurusan Sistem Informasi STMIK AMIKOM Yogyakarta) Emy Setyaningsih Emy Setyaningsih Enggar Febriyanti Enie Yuliani Erfanti Fatkhiyah Erma Susanti Ermawati - Erna Kumalasari N Erna Kumalasari Nurnawati Eska Almuntaha Faisal Siregar Fuad Hasan Gardyas Bidari Adninda Gardyas Bidari Adninda Gatot Santoso Gatot Santoso Gunawan Wicahyono Hanafi Eko Kurniawan Hardianto Nugroho Hari Rachmadi Hartanto, Anggit Dwi Hendrik Satria Harefa Heri Sismoro Hilarion Yogi Ibnu Berliyanto G.A Ibnu Berliyanto G.A, Ibnu Berliyanto Imam Syafii Imam Syafii Imam Thoib Indarto Indarto Irwan Siswanto Jazi Eko Istiyanto (Program Magister Ilmu Komputer Sekolah Pascasarjana UGM) Joko Triyono Joko Triyono Joko Waluyo Julianto JULIANTO Jussac Maulana Masjhoer Khalil Sidik Khalil sidik Koco Anggoro Kurniati, Devi Kurniawan, Hanafi Eko Laksono Trisnantoro M Yusuf Ali Fiqri M. Abdul Alim Alami M. Ari pamungkas1 M. Rudiyanto Arief Maulana Wahid, Rindo Mazaya, Amalia Febryane Adhani Merlie Anita Miftah Farid Moh Erzal Arighi Damopolii Moh. Ishaq Yanuar Mohammad Sholeh Muh. Ibnu Habil Hanafi Muh. Ibnu Habil Hanafi, Muh. Ibnu Habil Muhamad Fatahillah Z Muhammad Arif Setyawan Muhammad Fahrizal Farid Muhammad Farid Ali Safii Muhammad Puguh Pamungkas Muhammad Rosyid Muhammad Saleh Jafri MUHAMMAD SHOLEH Muhammad Sholeh Munandar, Arief Mursyid Ardiansyah Mustofa Wisnu Dhamara1 Naniek Widyastuti Nansi, Maria Regina Nidia Lestari Nurcahyo, Azriel Christian Okid Parama Astirin Omar Muhammad Altoumi Alsyaibani Prabowo Budi Utomo Prita Haryani Prita Haryani Purnawan Purnawan - Purnawan Purnawan Purnawan Purnawan R. K. ST., MT., Rr. Yuliana Rahardyan Bisma Setya Putra Ramadhan, Hanan Fajar Rauf, Budi Wijaya Rendi Saputra Rio Ponco Negoro Muhammad Hakim Rizal Fakhruddin Lubis Rizki Pratama Rizqa Luviana Musyarofah Rizqi Aji Nugroho Robertus Desta Raka Siwi Robertus Desta Raka Siwi, Robertus Desta Rohmat Hidayat Rohmat Hidayat Rr Yuliana Rachmawati Kusumaningsih Rr. Yuliana Rachmawati Rr.Y. Rachmawati Kusumaningsih Rr.Yuliana Rachamawati, Rr.Yuliana Ryvan Sirait S.T., M.T, Muhammad Sholeh, Samuel Kristiyana Saryadi K T Soba Saryadi K T Soba, Saryadi K T Setya Putra, Rahardyan Bisma Siswanto - Slamet Hani, Slamet Sofyan Pariyasto Sri Hartati Stefanus Samuel Tampi Suparni Setyowati Rahayu Suraya - Suraya - Suraya ., Suraya Syafrizal S Ardiansyah Syahrudin, Erwin Tampi, Stefanus Samuel Thaariq, Muhammad Rizqy Ath Than Raymond Toto Rusianto Triyono, Joko Uning Lestari Uning Lestari Utami, Ema Utami Utamu, Ema Vian Ardiyansyah Saputro Vian Ardiyansyah Saputro Wahyu Hidayat Wahyudi, Doni Yoga Arjanggi Nofianto Yuki Syambudi Setiadi Yuli Purwanto Yuli Purwanto Yuliana Rachmawati Yulianto Mustaqim Zeppi Maulana Bhakti