Claim Missing Document
Check
Articles

Found 4 Documents
Search

Smart Chicken Coop Control and Monitoring System Design Automatically with Smartphone Notifications Sri Novida Sari; Romulo Aritonang; Sumarlin
Brilliance: Research of Artificial Intelligence Vol. 1 No. 2 (2021): Brilliance: Research of Artificial Intelligence, Article Research November 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.396 KB) | DOI: 10.47709/brilliance.v1i2.1193

Abstract

Technological developments and industrial automation encourage humans to meet their needs quickly. So that robotics technology was developed to help ease human work in the future. The chicken breeder is a business that has great profit prospects because the consumption of chicken meat in the community increases every year. It takes good management of chicken farmers so that farmers can get good harvests. In this study, the author designed a monitoring system to monitor conditions in the chicken coop such as temperature, light, feeding, and drinking. The smart chicken coop system that the author designed uses Smartphone notifications so that the condition of the chicken coop can be viewed and controlled using a smartphone via the internet/wifi network.
Teknik Maksimalisasi Keamanan Jaringan Hotspot Link dengan Metode Filtering IP Address dan MAC Address Pada SMA 1 Stabat Vidya Fitrah Aura; Surya Ananda; Reni Aulia; Reni Safitri; Sumarlin; Devita Permata Sari
JURNAL INFORMATIKA DAN PERANCANGAN SISTEM (JIPS) Vol 5 No 1 (2023): Volume 5, No.1 Januari 2023
Publisher : Prodi Teknik Informatika (S1) Institut Teknologi dan Bisnis Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.704 KB)

Abstract

Use of Hotspot services in daily life every year in increasing, because the Hotspot network makes it easy for its users. But besides the convenience, the Hotspot network also has weaknesses. Each user has the right to enter and exit easily into the network. This cause security holes to become vulnerable to access rights being breached. One way to secure the Hotspot Link network is by using the IP Address And MAC Address filtering method, it is able to drop the IP Address And MAC Address of each connected client. This research was conducted using Mikrotik, Radio HS AirPo and the Winbox Application. The result of this study are able to maintain and overcome security problems in the Hotspot network.
Mikrotik Optimization and Pc Cloning on Computer Networks with Using UBIQU Satellite Internet Vsat Broadband S Sumarlin; Muhammad Zarlis; S Suherman; Syahril Efendi
Brahmana : Jurnal Penerapan Kecerdasan Buatan Vol 4, No 1A (2022): Edisi Desember (Spesial Issue)
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/brahmana.v4i1A.140

Abstract

The internet is currently growing rapidly. The need and rapid development in the use of the Internet network requires a balance in the provision of Internet facilities. Internet standard services are the continuity of the connectivity of the Internet. Connections from the Internet are required to always be awake under any conditions, but not always connectivity will run smoothly, many obstacles or disturbances are encountered so that the connection does not run smoothly. One effective method that can be done is to apply the PCQ method in dividing the amount of internet bandwidth by paying attention to the distribution pattern of bandwidth speed based on the number of active users at a certain time. The subjects taken in this study were users who were active during the active period of students and other users in the Hotspot network at the Indonesian Institute of Technology and Business. The method used is a case study method based on the level of activity of the hotspot network on campus. Comparison between the amount of bandwidth for the number of users between the hours of high activity in the morning until the afternoon, and the hours of low activity in the afternoon until the evening. The PCQ method will divide the bandwidth based on the number of active users on the hotspot with the same amount. The design is continued by applying the PCQ method using Miktrotik Routerboard, testing is carried out by technical testing by testing the amount of bandwidth with division based on the number of active users and the same results are obtained.
Analisis Keamanan Jaringan Komputer Berbasis Routerboard Mikrotik Rb941 dengan Metode Extended Access List Pada SMK Negeri 1 Stabat Eva Agus Pratiwi; Desti Putri Rahayu; Priska Ayu Syahputri; Popi Melita; Sumarlin; Surizar Rahmi Danur
JURNAL INFORMATIKA DAN PERANCANGAN SISTEM (JIPS) Vol 5 No 2 (2023): Volume 5, No.2 Mei 2023
Publisher : Prodi Teknik Informatika (S1) Institut Teknologi dan Bisnis Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security in computer networks is very important to monitor network access and prevent unauthorized misuse of network resources. The task of network security is to protect and prevent it from causing system losses and damage to computer networks. One aspect of computer network security is to use the Extended Access List method, which is a type of Access Control List (ACL), which is an appropriate security method for network communications. The Extended Access List plays a role in managing the access rights of each host in a network simulation. The Extended Access List can filter network data traffic by controlling whether packets are forwarded or stopped. The Extended Access List can also guarantee computer security so that communication lines and access rights for each computer can work properly. With the Extended Access List method, it is hoped that it can monitor network access and prevent unauthorized misuse of network resources.