Claim Missing Document
Check
Articles

Found 40 Documents
Search

Implementasi 5G Core Network Pada Bare Metal Server Suranegara, Galura Muhammad; Setyowati, Endah; Fauzi, Ahmad; Zakaria, Diky
TELKA - Telekomunikasi Elektronika Komputasi dan Kontrol Vol 11, No 2 (2025): TELKA
Publisher : Jurusan Teknik Elektro UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/telka.v11n2.142-150

Abstract

5G Core (5GC) Network merupakan salah satu teknologi utama pada teknologi seluler generasi ke-5. Perubahan besar yang terjadi pada 5GC adalah perubahan dari arsitektur monolithic menjadi arsitektur yang modular dan aksesnya dibuka untuk umum. Hal ini merubah pengembangan 5GC menjadi lebih baik. Beberapa penelitian yang sudah dilakukan masih menggunakan 5GC non-standalone yang ditandai dengan hadirnya Evolved Packet Core (EPC) dalam implementasinya. Maka dari itu penelitian ini bertujuan untuk mengimplementasikan arsitektur 5GC standalone yang didefinisikan oleh 3GPP release 15 pada baremetal server. Kemudian 5GC diintegrasikan dengan User Equipment (UE) dan Radio Access Network (RAN). Percobaan ini menggunakan metode penelitian yang mencakup instalasi dan konfigurasi source code Free5GC, integrasi dengan simulator UERANSIM, serta pengujian performa menggunakan metrik bandwidth, throughput, dan round-trip time (RTT). Setelah dilakukan pengukuran performa menggunakan beberapa metrik pengukuran dari 5GC yang telah dibangun dapat disimpulkan bahwa 5GC yang dibangun berhasil diimplementasikan dan berfungsi dengan baik dalam mendukung konektivitas data. Pengujian performa mencatat bandwidth rata-rata sebesar 3,5 Gbps, throughput rata-rata 21,04 Mbps untuk unduh dan 19,125 Mbps untuk unggah, serta RTT rata-rata 21,229 ms. Penelitian ini memberikan kontribusi penting dalam pengembangan jaringan 5G yang terbuka dan dapat diandalkan, terutama pada aspek konektivitas data. 5G Core (5GC) Network is a key technology in fifth-generation cellular systems. One of the significant advancements in 5GC is the shift from a monolithic to a modular architecture with open access, enabling better development of the technology. However, many existing studies still focus on non-standalone 5GC, which includes the Evolved Packet Core (EPC) in its implementation. This study aims to implement a standalone 5GC architecture, as defined by 3GPP Release 15, on a bare metal server. The implementation integrates 5GC with User Equipment (UE) and Radio Access Network (RAN). The research methodology involves installing and configuring the Free5GC source code, integrating it with the UERANSIM simulator, and evaluating its performance using metrics such as bandwidth, throughput, and round-trip time (RTT). Results show that the implemented 5GC operates successfully and effectively supports data connectivity. The performance tests recorded an average bandwidth of 3.5 Gbps, a download throughput of 21.04 Mbps, an upload throughput of 19.125 Mbps, and an average RTT of 21.229 ms. This study contributes significantly to the advancement of open, flexible, and reliable 5G networks, particularly in enhancing data connectivity performance.
Reactive Forwarding and Proactive Forwarding Performance Comparison on SDN-Based Network Suranegara, Galura Muhammad; Ichsan, Ichwan Nul; Setyowati, Endah
JOIN (Jurnal Online Informatika) Vol 5 No 1 (2020)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v5i1.382

Abstract

Software-defined networking (SDN) technology is one key technology in telecommunications networks that are currently widely studied. In SDN-based networks, the controller holds the key to the reliability of a network because all control functions are held by the controller as one of the open-source controllers, the Open Network Operating System (ONOS) has two forwarding mechanisms, namely reactive forwarding, and proactive forwarding. This study compares performance between reactive forwarding and proactive forwarding on ONOS with VM migration as traffic. The parameter measured is the total migration time using simple network topology. From the test results, the proactive forwarding scenario can optimize the fastest potential of the topology tested by using the path that has the largest bandwidth available on the network topology. In comparison, reactive forwarding can only pass through the smallest hops of the tested topology. From the measurement results, the average migration time performance using a proactive forwarding scenario is 36.16% faster than the reactive forwarding scenario.
Efficient Image Transmission for Autonomous Systems Using Residual Dense Feature Networks Over LoRa Networks Praptawilaga, Muhamad Fadly Rizqy; Suranegara, Galura Muhammad; Satyawan, Arief Suryadi
Paradigma - Jurnal Komputer dan Informatika Vol. 27 No. 1 (2025): March 2025 Period
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v27i1.7584

Abstract

Autonomous systems face challenges in transmitting high-quality images over bandwidth-constrained networks like LoRa, which operates at data rates of 0.3–50 kbps. This study proposes the Residual Dense Feature Network (RDF Net), a super-resolution model designed to optimize image transmission within the constraints of LoRa networks. By leveraging Contrast-Aware Channel Attention (CCA), Enhanced Spatial Attention (ESA), Blueprint Separable Convolution (BSConv), and a progressive approach, RDF Net achieves 20x upscaling, enabling low-resolution images (40x40 pixels) to be reconstructed into high-resolution outputs (800x800 pixels) on a central server. Experimental evaluations demonstrate that Model-4, combining CCA and ESA, delivers state-of-the-art perceptual quality and structural fidelity, while Model-3, using ESA, offers a computationally efficient alternative for resource-constrained scenarios. Simulations of LoRa’s bandwidth limitations reveal that transmitting a single 40x40 image requires approximately 0.208–0.56 seconds at a data rate of 50 kbps. While this demonstrates the feasibility of near real-time communication, the trade-off between latency and visual fidelity remains a critical consideration, particularly for latency-sensitive applications. These findings underscore RDF Net’s potential to address the challenges of high-quality visual communication in bandwidth-constrained environments, paving the way for enhanced autonomous system applications. Further optimization, including adaptive compression strategies, and testing on actual LoRa hardware are recommended to validate its performance in real-world scenarios and explore its applicability to diverse autonomous systems.
DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer Ulfa, Husnul; Basuki, Akbari Indra; Suranegara, Galura Muhammad; Fauzi, Ahmad
Sistemasi: Jurnal Sistem Informasi Vol 13, No 2 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i2.3802

Abstract

DDoS attacks on SDN networks can create a single point of failure that has the potential to disrupt the overall network performance. In a single controller scheme, there is a potential risk of experiencing buffer overload, leading to traffic congestion as switches must wait for responses from the controller before forwarding network packets. To address this challenge, this research implements security measures using a multi-controller and load balancer approach, aiming to enhance SDN network resilience against DDoS attacks. The system operates by distributing the workload from the main controller to a backup controller through a load balancer when indications of a DDoS attack are detected. These attack indications are determined based on the miss rate value of unique forwarding requests exceeding a specific threshold. The results of this approach have proven effective in improving the reliability, responsiveness, and quality of SDN network traffic during DDoS attacks. The testing parameters involved in this research include controller response time and network traffic quality, comprising latency, bandwidth, throughput, and jitter. Based on the test results, the multi-controller and load balancer-based approach successfully enhanced network quality and controller responsiveness by 66.51% compared to the longer single controller scenario, specifically 202.49% during DDoS attacks. In terms of controller responsiveness, there is a very slight increase of around 0.01% in latency between the two. While Multi Controller demonstrated a remarkable 43.21% increase in throughput compared to Single Controller, this improvement in throughput is accompanied by a significant 204% increase in jitter.
Hyperparameter Tuning of XGBoost for Flooding Attack Detection in SDN-based Vehicular Ad Hoc Networks (VANETs) under Limited Resources Putri, Chairunisa Rahma; Suranegara, Galura Muhammad; Ichsan, Ichwan Nul
Aviation Electronics, Information Technology, Telecommunications, Electricals, and Controls (AVITEC) Vol 8, No 1 (2026): February
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/avitec.v8i1.3510

Abstract

Software-Defined Network (SDN) based Vehicular Ad Hoc Network (VANET) infrastructure network enables centralized vehicle control. However, due to its centralized nature, SDN-based VANET is vulnerable to flooding attacks such as Distributed-Denial of Services (DDoS) or Denial of Service (DoS) attacks that can disrupt network availability and endanger traffic safety. This study aims to detect flooding attacks using the Extreme Gradient Boosting (XGBoost) algorithm with a focus on hyperparameter tuning in a limited computing environment to find optimal hyperparameter values for the model. This study uses basic Google Colab with 12 GB RAM with a total dataset of 431,371 entries. The results obtained from this study conclude that hyperparameter tuning achieves optimal performance at n_estimators = 150 and max_depth = 15, resulting in 99.97% accuracy, 99.99% precision, 99.97% recall, and 99.98% F1 score, which proves the effectiveness of the model in detecting flooding attacks. The novelty of this study lies in the application and evaluation of hyperparameter tuning on the XGBoost algorithm in a resource-constrained environment to improve attack detection in SDN-VANET.
A Comparative Study of Dynamic Load Balancing Algorithms for Microservices in Heterogeneous Multi-Cloud Environments Uli Sitinjak, Domma; Suranegara, Galura Muhammad
Eduvest - Journal of Universal Studies Vol. 6 No. 1 (2026): Eduvest - Journal of Universal Studies
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/eduvest.v6i1.52467

Abstract

Microservices-based application architectures in cloud environments require load balancing mechanisms that can adapt to differences in server capacity and workload fluctuations. This study aims to evaluate the performance of dynamic load balancing algorithms—Least Connection, Weighted Least Connection, and Least Response Time—in heterogeneous server environments using Amazon Web Services (AWS) and Google Cloud Platform (GCP). The evaluation was conducted through staged testing by observing application performance based on p95 latency, throughput, error rate, and load distribution patterns. The results indicate that no single algorithm consistently outperforms the others across all scenarios and platforms. Weighted Least Connection tends to produce a more proportional load distribution according to server capacity, while Least Connection and Least Response Time are more influenced by the number of active connections and initial response time. Overall, both AWS and GCP are able to maintain application performance stability across all load levels. These findings confirm that the effectiveness of dynamic load balancing algorithms in heterogeneous cloud environments is influenced by workload characteristics and server capacity, indicating that algorithm selection should be tailored to the specific system objectives.
Rain Effect to A 60 GHz Broadband Wireless System’s Performance: Study Case In Purwakarta Endah Setyowati; Galura Muhammad Suranegara; Ichwan Nul Ichsan
JURNAL INFOTEL Vol 13 No 1 (2021): February 2021
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v13i1.556

Abstract

Nowadays, world wide telecommunication researchers are developing 5G technology. One of most important key technology in 5G is Milimeter-Wave (mmWave). This study measure 60 GHz broadband wireless system performance because of it’s promising potentials. However, the use of these frequencies is quite sensitive to rain that resulting an atenuation in the channel. Therefore, this study proposes two schemes to address the problem. The first scheme is the use of QAM modulation (Quadrature Amplitude Modulation) and the second scheme is an addition of LDPC (Low Density Parity Check) code techniques. From the results of this study, by using 4-QAM modulation and LDPC coderate 1/2, the broadband wireless system’s performance on the second scheme is better compared to the first scheme with 8.33 dB Signal to Noise Ratio (SNR) value to provides BER (Bit Error Rate) 10-4
Performance of Load Balancing Algorithms on Homogeneous and Heterogeneous Servers in On-Premise Environments Avia Aulia Faridah, Tsabitah; Suranegara, Galura Muhammad
Journal of Applied Informatics and Computing Vol. 10 No. 1 (2026): February 2026
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v10i1.11614

Abstract

This research evaluates the performance of Round Robin, IP Hash, and Random Allocation algorithms in a homogeneous server environment, as well as Least Response Time, Least Connection, and Weighted Least Connection algorithms in a heterogeneous server environment implemented on on-premise servers. This study was motivated by the need to improve traffic management efficiency in local server infrastructure, where system performance is greatly influenced by resource diversity and distribution strategies. The experimental method was applied using NGINX and NGINX Plus as load balancing platforms, with Apache JMeter as a testing tool with low, medium, and high load test scenarios, while Netdata monitored the load distribution in real-time. Performance evaluation was based on six key metrics: throughput, latency, error rate, load distribution, CPU usage, and memory consumption. The results show that in a homogeneous environment, static algorithms such as Round Robin, IP Hash, and Random Allocation maintain stable performance with consistent throughput and minimal latency. Conversely, in a heterogeneous environment, dynamic algorithms, such as Weighted Least Connection, achieve lower latency and more balanced resource utilization. These findings highlight that algorithm selection must match system characteristics: static algorithms are more suitable for small-scale, uniform deployments, while dynamic approaches are recommended for heterogeneous or large-scale systems that require adaptive load management. Overall, weight-based dynamic approaches demonstrate superior scalability and resilience under high workloads.
Performance Evaluation of Multi-Cloud Failover Using Domain Name System Zaelani, Cahya; Muhammad Suranegara, Galura
Journal of Applied Informatics and Computing Vol. 10 No. 1 (2026): February 2026
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v10i1.11788

Abstract

This research implements and analyzes a multi-cloud failover system using DNS failover via AWS Route53 and Nginx reverse proxy load balancers on Google Cloud (primary) and Herza Cloud (backup), with AWS EC2 as shared backend web servers. An Ubuntu control node orchestrates deployments across these providers, enabling automatic traffic rerouting from the primary to secondary load balancer upon failure detection via health checks. Performance testing employed wrk benchmarking (4 threads, 250 connections, 300s) and Python monitoring scripts under baseline and failover scenarios with DNS TTLs of 30s, 60s, and 120s. Baseline yielded 2,291.81 req/s throughput, 108.42ms average latency, and 231.15ms p99 latency. Failover results showed TTL 30s optimal for reliability (152.65s downtime, 48.62% failed requests, 30.53s average recovery), outperforming TTL 60s (243.92s downtime, 83.48% failures due to health check mismatch) and TTL 120s (186.88s downtime) and TTL 30s is recommended for high availability in low-budget SMEs, balancing reduced downtime against DNS overhead. However, this approach is limited to small-scale infrastructure.
Evaluasi Kinerja Algoritma AES-128 dan SPECK-128/128 pada Sistem Smart Door Lock Berbasis IoT Yunita Sari; Galura Muhammad Suranegara
JURNAL RISET KOMPUTER (JURIKOM) Vol. 13 No. 1 (2026): Februari 2026
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v13i1.9524

Abstract

The Internet of Things (IoT) is increasingly being used in smart home systems, one of which is the Smart Door Lock. However, data communication on IoT devices is vulnerable to network attacks such as sniffing and man-in-the-middle, especially since many devices are still designed with weak security mechanisms. The main issue studied in this research is how to protect RFID data from being easily intercepted, while maintaining efficiency on devices with limited resources. The proposed solution is the implementation of AES-128 and SPECK-128/128 cryptographic algorithms on the MQTT communication protocol using ESP8266 devices. The research was conducted experimentally with 50 measurements for each algorithm, covering encryption and decryption time parameters, memory usage, and encryption effectiveness against sniffing. The results show that AES-128 has stable performance but requires more execution time and memory because its algorithm is complex with many stages. In contrast, SPECK-128/128 is faster and more memory-efficient thanks to its simple ARX-based structure, although its consistency is slightly lower. Sniffing analysis shows that both algorithms are capable of encrypting all packets with 100% security, so that no plaintext data can be read. Thus, this study confirms that there is a trade-off between security and efficiency
Co-Authors A.A. Ketut Agung Cahyawan W Abd. Rasyid Syamsuri Afina Carmelya, Anindya Agnesia, Gisella Agustin, Sarah Ahmad Fauzi Ahmad Fauzi Ash Shiddiq, Reza Nurfaudzan Avia Aulia Faridah, Tsabitah Basuki, Akbari Indra Dani Prasetyo Adi, Puput Dewi Dewi, Tarisa Citra Dianti, Palda Puspita Diky Zakaria Dinata, Hane Yorda Dwi Wahyu Lestariningsih Dwitami, Ghalda Azzahra Elysa Nensy Irawan Endah Setyowati Endah Setyowati Fadhila, Esa Noer Fadillah, Khoerunnisa Nur Faudzan, Muhammad Iqbal Fauzi Ahmad Muda Fauzi, Sadam Fauziyah Rhaudhatul Jannah Fujiyanti, Vina Gumelar, Ega Restu Hadi Putri, Dewi Indriati Hafiyyan Hamdani, Nizar Alam Helfy Susilawati Ichwan Ichwan Nul Ichsan Istiqomah, Mutia Jamilah, Nur Asy-Syifa Jannah, Fauziyah Rhaudhatul Jayadinata, Asep Kurnia Kheqal, Abdul Laili, Adisty Nurrahmah Larasati, Sifa Liptia Venica Maranatha, Jojor Renta Meiliya Cahya Yustina Mirza Etnisa Haqiqi, Mokhamamad Muhammad Gani Baihaqi Darussalam Muhammad Husni Muttaqin Nikawanti, Gia Paramaputra, Arya Pandya Pebriyanti, Cahyani Perkasa, Aldewo Dillon Praptawilaga, Muhamad Fadly Rizqy Pratama, Hafiyyan Putra Pratama, Herdi Rizky Putri, Adhwa Alifia Putri, Chairunisa Rahma Putri, Nova Nurul Rahman, Fadhila Dwi Restyasari, Nissa Reza Nurfaudzan Ashsiddiq Sanada, Pratiwi Satyawan, Arief Suryadi Subagja, Banda Suprih Widodo, Suprih Suryadi Satyawan, Arief Syaifullah, Muhammad Wildan Syifaul Fuada Ulfa, Husnul Uli Sitinjak, Domma Vormes Gema Merdeka winda pratiwi Yovanka, Diva Nuranty Yunita Sari Zaelani, Cahya